Claim Missing Document
Check
Articles

Found 36 Documents
Search

Analisa Perancangan Fuzzy C-Means dalam Menentukan Dosen Pembimbing Tugas Akhir Siregar, Yunita Sari; Harliana, Putri
Sinkron : jurnal dan penelitian teknik informatika Vol. 3 No. 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.876 KB)

Abstract

Algoritma fuzzy c-means merupakan suatu teknik pengelompokan data dimana keberadaan tiap-tiap titik data dalam suatu cluster ditentukan oleh derajat keanggotaan. fuzzy c-means adalah algoritma pengelompokan yang terawasi, karena pada algoritma fuzzy c-means jumlah cluster yang akan dibentuk perlu diketahui terlebih dahulu. Dalam penelitian ini, model fuzzy c-means akan digunakan untuk menentukan dosen pembimbing tugas akhir sesuai dengan bidang keahliannya. Penelitian ini dilakukan tidak sampai pada tahap pengujian, hanya sebatas perancangan perhitungan algoritma fuzzy c-means. Dari hasil analisis perancangan yang dilakukan dapat diketahui beberapa syarat dalam menentukan dosen pembimbing.
ALGORITMA C4.5 DALAM PEMETAAN POLA PENERIMAAN MAHASISWA BARU DI TEKNIK KOMPUTER: Data Mining Siregar, Yunita Sari; Sembiring, Boni Oktaviana; Hasdiana, Hasdiana; Dewi, Arie Rafika; Harahap, Herlina
Sinkron : jurnal dan penelitian teknik informatika Vol. 5 No. 2B (2021): Article Research October 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v6i1.11154

Abstract

University of Harapan Medan is one of the private universities in North Sumatra which has computer-based study programs such as Informatics Engineering and Information Systems. Every year this college receives many registrations from students who have completed their education at the school stage. The large number of incoming student data makes it difficult for the admin to select new students who will register. In this study using the C4.5 algorithm data mining method to map the pattern of student admissions selection in the field of Engineering and computers. The attributes used are the average value of report cards (high, enough, low), basic academic ability tests (very high, high, medium, low, very low), basic computer knowledge tests (very high, high, enough, low, very low) and interviews (good, bad). Data mining is a mathematical calculation process that uses algorithms and requires large data. While the C4.5 algorithm is an algorithm that processes data by calculating entrophy and information gain, where after the calculation process is carried out, those who get the largest information gain value will become nodes and branches. This C4.5 algorithm will describe a decision tree that will form a pattern in student selection. The results of this study indicate that in mapping the selection pattern of interview attributes into level 1 nodes, the attributes of the basic computer knowledge test become the level 1 branch, the attributes of the basic academic ability test become the level 2 branch and the attribute average value of report cards becomes the level 3 branch.
IMPLEMENTASI METODE DISCRETE COSINE TRANSFORM (DCT) DAN BLOWFISH DALAM KEAMANAN VIDEO DIGITAL Khairani, Mufida; Harahap , Herlina; Siregar, Yunita Sari; Lubis, Yessy Fitri Annisa
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11286

Abstract

Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it from the spatial domain to the frequency domain. Blowfish works by dividing the message into 64-bit blocks of equal length with varying aty lengths that encrypt the data in 8 byte blocks. Messages that are not multiples of 8 bytes will be added extra bits (padding), so that the size for each block is the same. After the final result is obtained, the value is inserted into the digital video without destroying the original digital video. From the research that has been done in the implementation of digital video watermarking, it can be concluded that the Blowfish cryptography method and the Discrete Cosine Transform (DCT) watermarking cryptography method can be applied properly. In the watermarking process, digital image insertion does not damage the watermaratd video and at the security level it is provided with blowfish cryptographic encryption, so that it can increase security in copyright protection
Penerapan Teknik Data Mining Dengan Menggunakan Algoritma Eclat Untuk Mendukung Startegi Promosi Dhea Rulana Arfasyah P; Dodi Siregar; Yunita Sari Siregar
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.722 KB)

Abstract

Business competition, especially in supermarkets and retail stores, forces shoppers to decide and find the best policy they want, especially in terms of convenience in choosing products. The problem faced by companies, especially customers or buyers, is that they cannot take full advantage of obtaining business information in terms of getting product locations easily and can save time. so the company database can not be used to support business decisions. This research requires a simple model that allows to determine the model when placing a product to overcome the problems that arise at this time by using data mining techniques in determining the product to be placed in a strategic place. products and can form this transaction pattern to find out information from products that often appear and is the process needed to change unused data points to provide more useful and valuable information to support decision making. This research produces a web-based system to be used in determining the items that must always be available according to the results of the eclat algorithm. The purpose of this study is to obtain an accurate pattern of transaction tendencies by applying the ECLAT Algorithm calculations and developing a varied search for case studies in minimarkets to find out patterns of shopping behavior based on consumer history using the ECLAT algorithm.
Implementasi Steganografi Menggunakan Algoritma Diversity Pada Citra Digital Dodi Siregar; Roji Ramadhani; Yunita Sari Siregar
JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP) Vol. 1 No. 1 (2018): Jutikomp Volume 1 Nomor 1 April 2018
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v1i1.337

Abstract

Providing security and confidentiality to information is very important when exchanging information though a communication network. It is intended that the information sent by the sender can be fully accepted by the recipient without interference from parties who are not interested in the information. Steganography techniques can be used to secure secret massages. Steganography is a method for hiding information on a media. Can be in the form of image, sound or video media. The most important aspect of steganography is the level security in hiding information, which refers to how much the third party is unable to detect hidden information. The goal is to avoid suspicion. Steganography commonly used is the hiding of text information on image media. The method used is Diversity. From the results of the trial, it is known that with Diversity insertion and extraction of massages can be done well.
Analisis Penerima Bantuan Beasiswa Program Studi Teknik Informatika Menggunakan Metode MOORA dan TOPSIS Yunita Sari Siregar
JITEKH Vol 9 No 1 (2021): Maret 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v9i1.399

Abstract

During the current pandemic, there are many permanent or temporary termination of employment by the company so that it has a very significant impact on the income of parents or students, where the reduced income generated makes it difficult for students to pay tuition fees every year. Therefore, in this study, a comparative analysis of the feasibility of students to be able to receive scholarship assistance will be carried out using the Moora and Topsis methods. Moora method is one of the methods in a decision support system where the way it works is by creating a normalization matrix and calculating the optimization value of each attribute, resulting in a ranking that is done by reducing the maximum and minimum values. While Topsis method is a method that produces rankings by making alternative preferences and comparing the results of the best alternatives. The variables used in the simulation of the eligibility analysis of scholarship recipients are the Grade Point Average (GPA), Parents' Income, House Type and Children's Dependents. The results of the research using the Moora method get an accuracy value of 70% , while the Topsis method gets an accuracy value of 80%. So it can be said that the Moora method produces better decisions in the selection of eligibility for scholarship recipients in the Informatics Study Program
PEMANFAATAN TEKNOLOGI CLOUD COMPUTING PADA E-SPT DINAS KOMINFO KOTA MEDAN MENGGUNAKAN PHP NATIVE Muhammad Ardi Siregar; Yunita Sari Siregar; Mufida Khairani
Djtechno: Jurnal Teknologi Informasi Vol 2, No 2 (2021): Desember
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/djtechno.v2i2.1622

Abstract

Dalam proses pembuatan surat perintah tugas, dinas kominfo kota medan saat ini masih melakukan secara sederhana  dengan pencatata manual menggunakan bantuan microsoft office dan microsoft excel. Hal ini mengakibatkan sistem menjadi kurang efektik dan efesien baik segi materi maupun waktu,terjadi kerusakan atau kehilangan data perjalanan dinas karena proses dan tata cara penyimpanan data yang tidak baik serta waktu pembuatan laporan perjalanan dinas yang cukup lama. Maka diperlukan suatu sistem komputerisasi yang sangat sesuai untuk mendukung kinerja dalam pengelolaan SPT, Sehingga dapat mengatasi permasalahan atau kendala pada sistem berjalan saat ini dengan memanfaatkan teknologi cloud computing serta menggunakan php native sebagai pemrograman dengan cara  pengamatan langsung, dan wawancara kepada pihak yang terkait menjadi analisa sistem yang digunakan untuk membangun sistem baru dalam penelitian ini. Dengan memanfaatkan sistem komputersisasi yang diusulkan ini secara baik kemungkinan adanya kesalahan dapat diminimalisasi serta pengolahan SPT menjadi lebih mudah.
Analisis Penentuan Kelayakan Judul Skripsi Mahasiswa dengan Metode Profile Matching dan TOPSIS Boni Oktaviana Sembiring; Yunita Sari Siregar
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 5, No 1 (2021): April 2021
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v5i1.9953

Abstract

The selection of a proper student thesis title really requires precise accuracy, because there are often similarities with existing thesis or discrepancies with the vision and mission of the study program. The supervising lecturer is the one who selects the feasibility of the student thesis title, where the number of students being mentored is sometimes more than 3 people. Therefore we need a method that can assist in making decisions to determine the feasibility of student thesis titles. The method used in this research is Profile Matching and Topsis. Profile Maching is a method that is often used in decision making where the stages in the method consist of determining criteria, determining the gap value, calculating the core factor value and secondary factor value, the sum of the core factor and secondary factor values and then the final conclusion or final selection. While Topsis is one of the methods in a decision support system where the steps in this method are to normalize the matrix and determine the ideal positive and negative matrix solutions so as to produce values from the largest to the smallest. The criteria used consist of title renewal (K1), suitability of the study program vision (K2), suitability of study program mission (K3), suitability of specialization courses (K4), and similarity of research with previous titles (K5). In this study, it was found that the TOPSIS method produces an accuracy value of 80% and is effectively better than the results of the Profile Matching method with an accuracy of 60% in making decisions about whether the student title is feasible or not. Keywords: TOPSIS, Profile Matching, Eligibility of Thesis Title
Visualisasi Pencarian Lokasi Tempat Kuliner Dan Wisata Di Kota Siantar Menggunakan Collaborative Filtering Roberto Nainggolan; Yunita Sari Siregar; Mufida Khairani
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 5, No 2 (2021): November 2021
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v5i2.11088

Abstract

Tourist and culinary places are a trip or visit to a place with the aim of trying or tasting local specialties to enjoy the food and drinks that exist in the area. There are many tourist and culinary places in Indonesia that can be visited by tourists, one of which is culinary tourism in the city of Siantar. Enjoying culinary is the main goal for tourists in choosing tourist and culinary places. Convenience is a factor that influences tourists when they want to visit tourist and culinary places and sometimes tourists find it difficult to determine which tourist and culinary places to visit with the variety of tourist and culinary attractions available. For this reason, information about tourist and culinary attractions in the city of Siantar is needed by tourists who are visiting the city. This application is designed based on a website and uses a collaborative filtering algorithm method that will provide recommendations in the form of address information, ratings that have been given by previous users, and provide recommendations based on visiting patterns by users who have visited these tourist and culinary places. Keywords: Culinary, Tourist attraction, Siantar City, Website, Collaborative Filtering
Noise Removal Pada Citra Digital Dengan Menggunakan Metode Active Contour Randika Setyansyah; Yunita Sari Siregar; Mufida Khairani
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 5, No 2 (2021): November 2021
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v5i2.10700

Abstract

Disturbance in the image, especially digital images can be caused by noise, resulting in a decrease in the quality of the image. Image restoration is a technique used to recover the original image from a degraded image. Restoration is intended so that the information contained in a digital image becomes better/clear. The restoration process is carried out because the image quality is blurred or because of the noise contained in the image. Noise is the main problem encountered in digital image processing. The digital image restoration process always involves a filtering algorithm that is able to suppress the noise contained in the image. The active contour method is one approach to segmentation, where this method uses a closed curve that can move wide or narrow. The active contour process is a process that takes some of the signals of a certain frequency and discards signals at other frequencies. An initialization curve is placed outside of the object to be segmented, then through the iteration process the curve will move closer to the boundary of the object until finally finding the object boundary. This study aims to design a special system for character restoration in digital images using the active contour method. The implementation results show that the active contour method can be used to restore the image properly, this can be from the restored image, the condition of the image that has been given noise can approach the initial data. Keywords: active contour, digital image, character, restoration