Yana Aditia - Academia.edu (original) (raw)

Papers by Yana Aditia

Research paper thumbnail of Comparison of search algorithms in Javanese-Indonesian dictionary application

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2020

This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algor... more This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. While the processing time, Knuth Morris Pratt algorithm has the highest average speed level of 25ms, Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is 44.2 ms. While the complexity test results, the Boyer Moore algorithm has an overall number of n 26n 2 , Knuth Morris Pratt and Horspool 20n 2 each.

Research paper thumbnail of The Implementation of Breadth First Search in Determining of Waris

IOP Conference Series: Materials Science and Engineering, 2018

Breadth First Search is one of the search pattern in an expert system inference mechanism. The us... more Breadth First Search is one of the search pattern in an expert system inference mechanism. The use of methods of Breadth First Search in the science of Waris, can be used for the recipient of Waris and the amount of the accepted of Waris. Determination of Waris in this study refers to the madzhab of Hanafi and Hambali. There are three categories of recipient of Waris (Dzawil Furudh, 'Ashabah, and Dzawil Arham), with 73 rules of Waris and added with 24 rules for heirs who obstructed, which are made in 10 level decision tree of Waris. The test results against 10 cases heirs acquired the suitability and value of the recipient of waris 33 categorized as Dzawil Furudh, and 4 are categorized 'Ashabah

Research paper thumbnail of Design of digital image application using vigenere cipher algorithm

2016 4th International Conference on Cyber and IT Service Management, 2016

This research focuses on engineering applications using digital image security vigenere cipher al... more This research focuses on engineering applications using digital image security vigenere cipher algorithm. vigenere cipher algorithm method is used for securing data in the form of digital images, especially for the logo of a company that is one of the methods of science of cryptography, in which the order logos or digital image that secure during transmission over the Internet. a method used to secure the data in the form of digital imagery to ascertain and assess whether the use of this method was successful or not. This research is presented to determine the safety of digital images, especially for a company logo using vigenere cipher algorithm through the application that created because so far we know only vigenere algorithm method used for the security of data in text form only. the final results of this study focuses on securing data in the form of a digital image for the company logo showed a significant result that the image of the once encrypted to be safe and successful, and decrypted to its original shape in accordance with the original digital image by using vigenere cipher.

Research paper thumbnail of Augmented Reality using Natural Feature Tracking Method to Introduce Science Verses in Qur’an

2021 7th International Conference on Wireless and Telematics (ICWT)

Technology support for multimedia learning is interesting ways as knowledge transfer to student, ... more Technology support for multimedia learning is interesting ways as knowledge transfer to student, including Augmented Reality (AR). Qur’an as main life guidance source for Muslim which not only contains instructions for life but also contains various sciences. Therefore, this study aims to discuss about AR implementation as a technology that can be used as a medium for introducing and learning science verses from the Qur'an. The method used is Natural Feature Tracking (NFT) to detect markers of object. Three Dimension (3D) objects and simulations can help users easily understand the meaning of the science verses of the Qur'an on the marker. The implementation of AR multimedia for learning science verses of Qur’an is developed in mobile-based application with Android operating system using Vuforia. The experiment result showed that NFT can detect all of objects with speed test on 20 markers have an average speed of 0.306 s/marker. Besides, this research conducted the user acceptance with several respondents from students and teachers. The user acceptance test showed that this AR multimedia learning application is accepted by users and can attract interest and make it easier to understand and recognize science verses in the Qur’an by obtaining an assessment percentage of 87%.

Research paper thumbnail of Breakdown film script using parsing algorithm

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2020

Breakdown script is a breakdown of the scenario into parts that describe each detail of the scene... more Breakdown script is a breakdown of the scenario into parts that describe each detail of the scene for shooting. The scenario is broken down into more detailed parts using the parsing algorithm. The film script used is a script in Bahasa Indonesia. The process starts from the film script file/scenario in FBX format uploaded to the website then is solved using a parsing algorithm into film elements such as cast members, extras, props, costumes, makeup, vehicles, stunts, special effects, music and sound. The results of this breakdown into sheets according to film elements. The purpose of this research is to produce breakdown sheets from film scripts according to film elements. The parsing algorithm test results showed the correct results of 12 scenes out of 19 scenes.

Research paper thumbnail of Comparison of search algorithms in Javanese-Indonesian dictionary application

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algor... more This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. While the processing time, Knuth Morris Pratt algorithm has the highest average speed level of 25ms, Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is 44.2 ms. While the complexity test results, the Boyer Moore algorithm has an overall number of n 26n2, Knuth Morris Pratt and Horspool 20n2 each.

Research paper thumbnail of Design of Digital Image Application Using Vigenere Cipher Algorithm

This research focuses on engineering applications using digital image security vigenere cipher al... more This research focuses on engineering applications using digital image security vigenere cipher algorithm. vigenere cipher algorithm method is used for securing data in the form of digital images, especially for the logo of a company that is one of the methods of science of cryptography, in which the order logos or digital image that secure during transmission over the Internet. a method used to secure the data in the form of digital imagery to ascertain and assess whether the use of this method was successful or not. This research is presented to determine the safety of digital images, especially for a company logo using vigenere cipher algorithm through the application that created because so far we know only vigenere algorithm method used for the security of data in text form only. the final results of this study focuses on securing data in the form of a digital image for the company logo showed a significant result that the image of the once encrypted to be safe and successful, and decrypted to its original shape in accordance with the original digital image by using vigenere cipher.

Research paper thumbnail of Comparison of search algorithms in Javanese-Indonesian dictionary application

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2020

This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algor... more This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. While the processing time, Knuth Morris Pratt algorithm has the highest average speed level of 25ms, Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is 44.2 ms. While the complexity test results, the Boyer Moore algorithm has an overall number of n 26n 2 , Knuth Morris Pratt and Horspool 20n 2 each.

Research paper thumbnail of The Implementation of Breadth First Search in Determining of Waris

IOP Conference Series: Materials Science and Engineering, 2018

Breadth First Search is one of the search pattern in an expert system inference mechanism. The us... more Breadth First Search is one of the search pattern in an expert system inference mechanism. The use of methods of Breadth First Search in the science of Waris, can be used for the recipient of Waris and the amount of the accepted of Waris. Determination of Waris in this study refers to the madzhab of Hanafi and Hambali. There are three categories of recipient of Waris (Dzawil Furudh, 'Ashabah, and Dzawil Arham), with 73 rules of Waris and added with 24 rules for heirs who obstructed, which are made in 10 level decision tree of Waris. The test results against 10 cases heirs acquired the suitability and value of the recipient of waris 33 categorized as Dzawil Furudh, and 4 are categorized 'Ashabah

Research paper thumbnail of Design of digital image application using vigenere cipher algorithm

2016 4th International Conference on Cyber and IT Service Management, 2016

This research focuses on engineering applications using digital image security vigenere cipher al... more This research focuses on engineering applications using digital image security vigenere cipher algorithm. vigenere cipher algorithm method is used for securing data in the form of digital images, especially for the logo of a company that is one of the methods of science of cryptography, in which the order logos or digital image that secure during transmission over the Internet. a method used to secure the data in the form of digital imagery to ascertain and assess whether the use of this method was successful or not. This research is presented to determine the safety of digital images, especially for a company logo using vigenere cipher algorithm through the application that created because so far we know only vigenere algorithm method used for the security of data in text form only. the final results of this study focuses on securing data in the form of a digital image for the company logo showed a significant result that the image of the once encrypted to be safe and successful, and decrypted to its original shape in accordance with the original digital image by using vigenere cipher.

Research paper thumbnail of Augmented Reality using Natural Feature Tracking Method to Introduce Science Verses in Qur’an

2021 7th International Conference on Wireless and Telematics (ICWT)

Technology support for multimedia learning is interesting ways as knowledge transfer to student, ... more Technology support for multimedia learning is interesting ways as knowledge transfer to student, including Augmented Reality (AR). Qur’an as main life guidance source for Muslim which not only contains instructions for life but also contains various sciences. Therefore, this study aims to discuss about AR implementation as a technology that can be used as a medium for introducing and learning science verses from the Qur'an. The method used is Natural Feature Tracking (NFT) to detect markers of object. Three Dimension (3D) objects and simulations can help users easily understand the meaning of the science verses of the Qur'an on the marker. The implementation of AR multimedia for learning science verses of Qur’an is developed in mobile-based application with Android operating system using Vuforia. The experiment result showed that NFT can detect all of objects with speed test on 20 markers have an average speed of 0.306 s/marker. Besides, this research conducted the user acceptance with several respondents from students and teachers. The user acceptance test showed that this AR multimedia learning application is accepted by users and can attract interest and make it easier to understand and recognize science verses in the Qur’an by obtaining an assessment percentage of 87%.

Research paper thumbnail of Breakdown film script using parsing algorithm

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2020

Breakdown script is a breakdown of the scenario into parts that describe each detail of the scene... more Breakdown script is a breakdown of the scenario into parts that describe each detail of the scene for shooting. The scenario is broken down into more detailed parts using the parsing algorithm. The film script used is a script in Bahasa Indonesia. The process starts from the film script file/scenario in FBX format uploaded to the website then is solved using a parsing algorithm into film elements such as cast members, extras, props, costumes, makeup, vehicles, stunts, special effects, music and sound. The results of this breakdown into sheets according to film elements. The purpose of this research is to produce breakdown sheets from film scripts according to film elements. The parsing algorithm test results showed the correct results of 12 scenes out of 19 scenes.

Research paper thumbnail of Comparison of search algorithms in Javanese-Indonesian dictionary application

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algor... more This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. While the processing time, Knuth Morris Pratt algorithm has the highest average speed level of 25ms, Horspool 39.9 ms, while the average speed of the Boyer Moore algorithm is 44.2 ms. While the complexity test results, the Boyer Moore algorithm has an overall number of n 26n2, Knuth Morris Pratt and Horspool 20n2 each.

Research paper thumbnail of Design of Digital Image Application Using Vigenere Cipher Algorithm

This research focuses on engineering applications using digital image security vigenere cipher al... more This research focuses on engineering applications using digital image security vigenere cipher algorithm. vigenere cipher algorithm method is used for securing data in the form of digital images, especially for the logo of a company that is one of the methods of science of cryptography, in which the order logos or digital image that secure during transmission over the Internet. a method used to secure the data in the form of digital imagery to ascertain and assess whether the use of this method was successful or not. This research is presented to determine the safety of digital images, especially for a company logo using vigenere cipher algorithm through the application that created because so far we know only vigenere algorithm method used for the security of data in text form only. the final results of this study focuses on securing data in the form of a digital image for the company logo showed a significant result that the image of the once encrypted to be safe and successful, and decrypted to its original shape in accordance with the original digital image by using vigenere cipher.