Windah Sahara, Sanjai Dekariski Saragih, Agus Perdana Windarto
{"title":"Teknik Asosiasi Datamining Dalam Menentukan Pola Penjualan dengan Metode Apriori","authors":"Windah Sahara, Sanjai Dekariski Saragih, Agus Perdana Windarto","doi":"10.47065/tin.v2i12.1577","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1577","url":null,"abstract":"Camping or what is commonly called camping is an activity that is carried out outside the room. This activity usually requires some equipment such as a carriel, tent, gas cylinder, stove, mattress, salamon jacket, and several other equipment. AM Camping is a shop that sells equipment camping. AM Camping has quite a lot of sales transaction activities. Sales transaction data can be used and processed into useful information to increase sales of equipment at AM Camping stores. The problem that often occurs in AM Camping stores is that the camping equipment needed by consumers does not exist or is out of stock because the owner does not pay attention to the camping equipment stock. To solve this problem, the authors use association datamining with a priori algorithm. Based on these results, it can be obtained that there are 8 rules that meet a minimum confidence of 50%, but because of the same itemset, only one rule is chosen so that the results of the itemset rules are 5 final rules, namely if you buy a 60 L Carrier, then 94% most likely buy a Gas Cylinder, if you buy a flat stove, you are 89% most likely to buy a gas cylinder, if you buy a frem rope, then you have an 84% chance of buying a gas cylinder, if you buy a cuff, you are 73% most likely to buy a gas cylinder and if you buy a gas cylinder you are 67% likely to buy a rope frem. With this research, it is hoped that it can provide information to AM Camping shop owners in providing stock of camping equipment needed by consumers and to find out the combination of itemset from consumer purchases","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perbandingan Algoritma Fisherface dan Algoritma Local Binary Pattern Untuk Pengenalan Wajah","authors":"N. Amalia","doi":"10.47065/tin.v2i12.1568","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1568","url":null,"abstract":"Face recognition system is a system used to detect facial images, which is used to provide accuracy in a system used for access control for facilities that require such a security system. However, it is not uncommon to find problems in the face recognition process, such as the difficulty of the system to recognize faces if similar training data are found. In addition, there are difficulties in the face recognition process due to the lack of the number of images and/or poses of the training data images which results in the system not being optimal in recognizing faces. Several methods were proposed to create a reliable facial recognition system, such as Fisherface and Local Binary Pattern. The advantage of using the Fisherface method is that the processing time is relatively fast. This is because the fisherfaces process uses a matrix process. In addition to the fisherface method, the Local Binary Pattern method is also used in facial recognition systems. This method is also known to be quite easy and efficient in its application to obtain facial image characteristics. With the advantages and disadvantages of each of the above methods, the author will conduct a comparative test between the two methods to measure the level of accuracy of each method. In this study, two algorithms are used, namely the Fisherface algorithm and the Local Binary Pattern algorithm. Where the Fisherface algorithm is a derivative of FLD combined with (PCA). PCA is in charge of reducing input data to simplify and speed up the process and FLD is in charge of producing a distribution matrix to facilitate classification and recognition. In addition to the fisherface method, the Local Binary Pattern algorithm is also used in the face recognition system. LBP is defined as the comparison of the binary value of the pixel at the center of the image with the 8 values of the surrounding pixels so that the test image can be matched with the reference image. This research is useful for the development of facial recognition systems to be precise in the selection of methods, to minimize the occurrence of errors in the face recognition process. As well as getting a high level of accuracy and speed in facial recognition","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sri Wahyuni Siregar, L. Sianturi, Chandra Frenki Sianturi
{"title":"Penerapan Metode CRC32 dalam Mendeteksi Orisinalitas File Video","authors":"Sri Wahyuni Siregar, L. Sianturi, Chandra Frenki Sianturi","doi":"10.47065/tin.v2i12.1502","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1502","url":null,"abstract":"One of the courses in higher education, especially in the field of computers, is cryptography. The rapid development of technology today proves that it is easy to commit crimes using computer science in the video field. In addition, from time to time more and more free video editing software and easier to use. However, the development of this technology is often misused by cases of scattered videos that cannot be trusted by the public. Video file forgery is an act of modifying documents, products, images or videos among other media. This video, which is very easy to edit and fake, has made many irresponsible people destroy the authenticity of the video and spread the video to social media so that the information or message in the video can change its authenticity. Computer-based learning is one way to improve the quality of learning. Various methods that can be applied in computer-based learning, one of which is CRC32 (Cyclic Redundancy Check) can be used to ensure the integrity of the data to be transmitted or stored. CRC works in a simple way, namely by using a mathematical calculation of a number called a checksum, which is made based on the total bits to be transmitted or to be stored. CRC is designed in such a way as to ensure data integrity against random degradation due to noise or other sources (media corruption etc.). So that later the learning application that will be made can help students in the process of answering about material concerning the authenticity of a video file more easily and can be understood using the CRC32 method. In addition, it is hoped that the learning application which will be made more interactive is able to attract students' interest to be more curious","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sistem Pendukung Keputusan Perekrutan Internal Audit Officer (Audit) Menerapkan Kombinasi Metode AHP dan MABAC","authors":"Siti Aspah Panjaitan","doi":"10.47065/tin.v2i12.1582","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1582","url":null,"abstract":"PT. Mahkota Group, Tbk and its subsidiaries own a number of palm oil processing mills located in North Sumatra and Riau. Mahkota Group companies need an Internal Audit Officer (AUDIT). Internal Audit is a job position whose function is to audit all balance sheet transactions in the company. An effective recruitment process is expected to be able to attract AUDIT candidates who truly meet the needs. In this era of technological advances, the process of recruiting employees can use the help of computer applications such as decision support systems. Leaders often face difficulties in recruiting because they are still using the manual system. One of the appropriate solutions to these problems is to use a Decision Support System (DSS). The Decision Support System (SPK) can assist the company in recruiting the right members of PT. MAHKOTA GROUP, Tbk and increase the efficiency of the decision. The AHP method is used to calculate the weighting of the criteria, and produces a reject rate as the main criterion, the MABAC method investigates the compatibility in discrimination between a set of alternative value data on certain criteria described in the Decision Matrix (DM), using the AHP method the criteria with the highest value variation will get the highest weight , While the MABAC method is used for ranking, the effect of maximizing and minimizing criteria on the evaluation results is considered separately. The selection of the best alternative is based on considering the ideal and anti-ideal solutions","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pengaruh Pembelajaran Daring dan Motivasi Terhadap Hasil Pembelajaran","authors":"Suginam Suginam","doi":"10.47065/tin.v2i12.1564","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1564","url":null,"abstract":"Online learning is a system that is applied to the world of education with a distance learning process with teaching methods applied through the internet network. However, in the practice of implementing online learning, there are many obstacles, including there are still many students and also teaching staff who still do not understand or master the use of the learning media used. Learning outcomes are a benchmark for achievement in the learning process carried out by teaching staff and students. The benchmark for learning outcomes is student scores. Good learning outcomes are obtained when students are able to fully understand learning well. Motivation is an impulse that must be possessed by humans to get something. The purpose of the study was to see whether online learning and the use of learning media had an influence on students' learning motivation. Where in this study using quantitative research methods by testing using SPSS. The results showed that H1 was accepted, which means that online learning has an influence on student learning outcomes. While H1 is accepted, which means that the motivation possessed by students has an impact on student learning outcomes. Overall, the variables have a stimulant effect on student learning outcomes, which can be seen from the H3 received","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rancangan Tata Kelola Teknologi Informasi Pada Usaha Mikro, Kecil, dan Menengah Penjualan Tanaman","authors":"Ilmi Rasyidah Firdaus, Agung Teguh Wibowo Almais","doi":"10.47065/tin.v2i12.1614","DOIUrl":"https://doi.org/10.47065/tin.v2i12.1614","url":null,"abstract":"Information technology is an important part in the management and development of the company's business. However, there are several problems and challenges in managing information technology resources. So it is necessary to design a good and structured information technology governance to overcome it. Good technology governance can take advantage of opportunities in a planned, coordinated, prioritized and cost-effective way. This paper proposes a comprehensive and integrated design of information technology governance for UMKM plants. The design of IT governance is based on five focus areas of IT governance and also uses the Service Oriented Architecture (SOA) method as a guide in creating UMKM web services. This is because many applications of IT governance in UMKMs have not run optimally, even most UMKMs do not implement information technology strategies in their businesses. Therefore, it is necessary to design information technology governance for UMKMs to support the development of UMKMs. The design of IT governance in this paper is based on five focus areas of information technology governance and also uses the Service Oriented Architecture (SOA) method as a guide in making UMKM web services. The importance of this research is to develop UMKM business by utilizing information technology governance.","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129260331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Penerapan K-Means Clustering Untuk Pengelompokan Penyebaran Demam Berdarah Dengue (DBD) Di Kabupaten Deli Serdang","authors":"Erica Melysa Sembiring","doi":"10.47065/tin.v2i11.1503","DOIUrl":"https://doi.org/10.47065/tin.v2i11.1503","url":null,"abstract":"DBD is a disease that spread rapidly. Usually if there is an area affected by dengue fever, it is likely to spread to other people in the area. Due to the large number of DBD sufferers, so much data is collected and processing needs to be done on these data, such as the grouping of DBD sufferers data with the aim of focusing vector control in areas that are vulnerable to DBD. The area will be the main priority to carry out socialization related to the handling of DBD. Data mining is a series of processes to get useful information from large database warehouses. One function of the data mining process for finding groups or group identification is Clustering. There are two types of clustering methods, namely hierarchical clustering and non-hierarchical clustering, commonly called Kmeans. K-Means Clustering begins by determining the number of clusters first. The results obtained from grouping the data are in the form of areas that have the highest DBD potential in Deli Serdang. By using clustering method to do calculations, it can help solve problems in Deli Serdang Regency in classifying the data of DBD sufferers which is still done manually","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134189720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sistem Pakar Diagnosis Penyakit Saraf Motorik Menerapkan Metode Fuzzy Mamdani","authors":"Bagus Prasetyo","doi":"10.47065/tin.v2i11.1030","DOIUrl":"https://doi.org/10.47065/tin.v2i11.1030","url":null,"abstract":"Motor nerve diseases are a group of neurological disorders that cause gradual loss of muscle strength. Motor nerves are divided into two types, namely upper motor neurons and lower motor neurons. The UMN originates in the brain and is responsible for sending signals from the brain to the brainstem or to the spinal cord. While the LMN originates from the brain stem and spinal cord, and functions to transmit signals to all muscles. The signals sent are used to regulate body muscle movements, such as walking, gripping, breathing, speaking, or swallowing. When motor nerve function is disturbed, the sufferer will find it difficult to carry out these movements. Problems that occur in the RSU. Mitra Medika Medan in the process of consulting patients who experience motor nerve disease problems, namely the process of diagnosing motor nerve diseases using the services of an expert doctor in the field of motor nerve disease diagnosis by consulting conventional methods, the time needed to serve many patients is less efficient, so long queues can be avoided. so that not a few patients feel disappointed. Overcome problems that occur in RSU. Mitra Medika Medan, it is necessary to have a tool in the form of an expert system that provides diagnostic results in accordance with expert knowledge. Therefore, in this study, the authors built an expert system for diagnosing motor neuron disease using visual-based visual basic net 2008 by applying the Mamdani method as a method of solving diagnostic problems in the expert system that was built","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126132420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Riski Nabila Hasanah Hutasuhut, Harly Okprana, Bahrudi Efendi Damanik
{"title":"Penerapan Data Mining Untuk Menentukan Penerima Program Bidikmisi Menggunakan Algoritma K-Medoids","authors":"Riski Nabila Hasanah Hutasuhut, Harly Okprana, Bahrudi Efendi Damanik","doi":"10.47065/tin.v2i11.1516","DOIUrl":"https://doi.org/10.47065/tin.v2i11.1516","url":null,"abstract":"Bidikmisi scholarship is a program that facilitates prospective students who have good academic achievements but lack in economics to be able to receive quality education by receiving various facilities. The distribution of Bidik Misi scholarships to students who come from underprivileged families must go through a selection involving certain criteria. The criteria are: parents' income, parent's occupation, number of dependents, and home ownership. To make it easier to determine prospective students who receive Bidikmisi, the K-Medoids algorithm is used. The K-Medoids algorithm is one of the algorithms in data mining to group data based on the closest criteria values.","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Pembelajaran Problem-Based Learning Berbasis Daring di Masa Pandemi Covid-19","authors":"Sinta Ulina Situmorang, Oktavianus Oktavianus, Lidya Lestari, Sarwandi Sarwandi","doi":"10.47065/tin.v2i11.1539","DOIUrl":"https://doi.org/10.47065/tin.v2i11.1539","url":null,"abstract":"Coronavirus (Covid-19) is a disease that can be transmitted by the SARS-CoV-2 virus, this virus has attacked various countries including Indonesia. To minimize the spread of the virus, various online or virtual activities are carried out. In the field of education, which is the impact of the Covid-19 pandemic, is the creation of virtual learning programs (Online). Teachers as educators are very important as a determining factor for the smooth running of the learning process even though they are online and not face-to-face, as usual, one of which is by choosing a learning model. As educators, teachers are required to sort out suitable and appropriate learning models to deliver a concept to their students. One of the learning models that focuses on students and can be tried by teachers to improve student's critical thinking skills is the problem-based learning model or Problem-Based Learning (PBL) where this learning model can support students to relate directly to the surrounding environment. The method in this study uses a literature study by collecting references related to the research. Learning with a problem-based learning model can be supported by using media to maximize competition or learning outcomes that are expected, especially during Virtual (Online) learning. One of the suitable media to be applied in the problem-based learning model is to use PowerPoint media and this media can be displayed (share screen) while carrying out online classes such as virtual Zoom, Google Meet, and so on","PeriodicalId":345721,"journal":{"name":"TIN: Terapan Informatika Nusantara","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114773873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}