syafri arlis - Academia.edu (original) (raw)

Papers by syafri arlis

Research paper thumbnail of Automated Identification and Reconstruction of 3D Images on the Mastoid Air Cell System

TEM Journal

The mastoid air cell system (MACS) protects the structures in the ear and regulates air pressure ... more The mastoid air cell system (MACS) protects the structures in the ear and regulates air pressure in the ear cavity. MACS segmentation is very difficult because of the many overlapping object characteristics in the temporal bone. This study aims to accurately identify and measure MACS areas from CT-scan images of mastoiditis patients. The data tested consisted of 128 CT images from 13 different patients. Images were taken using the Siemens SOMATOM Perspective CT Scanner model 10662260 axially. The extended Adaptive Threshold (eAT) method was developed to produce optimal threshold values for each test image. Furthermore, the eAT results are used to convert the test image into a binary image and then applied to the identification and extraction model automatically for reconstruction from 2D to 3D images. Smaller MACS sizes indicate inflammation of the mastoid bone and require intensive care. Thus, this research can be used to help doctors make the right decisions in carrying out furthe...

Research paper thumbnail of Prediction of Drug Demand Based on Deep Learning Approach and Classification Model

International Journal on Advanced Science, Engineering and Information Technology

The high demand for drugs in the last period has caused problems with drug shortages in several p... more The high demand for drugs in the last period has caused problems with drug shortages in several pharmacies. Almost all pharmacies experience the same problem, causing many people who do not to get their drug needs during the current pandemic. To overcome this, analyzing the process of predicting drug demand in the next period is necessary. The prediction process can be used as an initial solution in solving problems to see the number of drug demand numbers that will occur. This study aims to develop a predictive analysis model for drug demand using a deep learning approach and a classification model. Deep learning is an approach that does well in the case of prediction. The classification model also includes the right concept for solving the problem. The prediction and classification analysis methods include K-Means clustering, Multiple Linear Regression (MRL), Artificial Neural Network (ANN), and Decision Tree algorithms C.45. This method can provide better performance results in the prediction process to get precise and accurate output. Prediction results obtained from the learning process provide an accuracy rate of 99.99%. The output of the classification model also provides an overview of the knowledge base in the form of a decision tree. The level of classification model testing carried out gives the accuracy of the classification pattern of 97.05% so that the analytical model developed can predict future drug demand.

Research paper thumbnail of Pengenalan Web Desain Kepada Santri Rahmatan Lil’Alamin International Islamic Boarding (Rla Iibs) Aripan Kabupaten Solok

Community Development Journal : Jurnal Pengabdian Masyarakat

Pemanfaatan komputer saat ini cukup beragam mulai sebagai alat bantu dalam menyelesaikan suatu pe... more Pemanfaatan komputer saat ini cukup beragam mulai sebagai alat bantu dalam menyelesaikan suatu pekerjaan sampai mengolah data hasil penelitian maupun untuk mengoperasikan program-program penyelesaian problem-problem ilmiah, industri dan bisinis. Seperti misalnya website yang digunakan untuk melihat informasi serta memberikan kemudahan dalam mengerjakan suatu pekerjaan. Pada zaman sekarang ini hampir semua kantor sudah memanfaatkan komputer dalam menunjang pekerjaan, tetapi masih sangat banyak yang belum tau bagaimana cara memanfaatkan teknologi komputer tersebut dengan benar dan maksimal. Oleh karena ini pada objek pengabdian masyarakat yang akan dilakukan adalah bertujuan untuk memberikan pengtahuan teknologi komputer khususnya web desain untuk memberikan pengetahuan kepada Santri RLA IIBS Aripan Kab. Solok. Di dalam laporan ini akan dipaparkan mengenai kegiatan pengabdian kepada masyarakat khususnya di Rahmatan Lil Alamin Boarding School (RLA-IIBS) dalam rangka memberikan pengarah...

Research paper thumbnail of Automated model for identification on mastoid of temporal bone image

Indonesian Journal of Electrical Engineering and Computer Science

Mastoiditis occurs due to inflammation that can affect the structure of the mastoid bone. The mas... more Mastoiditis occurs due to inflammation that can affect the structure of the mastoid bone. The mastoid bone consists of the mastoid air cell system (MACS) which protects the ear structures and regulates air pressure in the ear and has different sizes and characteristics, making it very difficult to identify precisely. This study aims to identify and find the right MACS size by developing an automatic identification model and obtaining the optimal threshold value in the segmentation process using the extended adaptive threshold (eAT) method. The research dataset uses computed tomography (CT)-scan images of 308 slices of 12 patients indicated for mastoiditis. The results of this study provide identification that has the right MACS accuracy and size. Overall, the optimal segmentation process obtained the smallest threshold value of 57 and the largest threshold value of 63, the smallest MACS size is 4.025 cm2 and the largest is 8.816 cm2 with an accuracy rate of 93.4%. The smaller MACS s...

Research paper thumbnail of Development of Mastoid Air Cell System Extraction Method on Temporal CT-scan Image

Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the ... more Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone. Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid air cell system (MACS), but the fact that medical personnel are experiencing difficulties in determining the size MACS is due to the many different characteristics and objects overlap, so that in the measurement of the area, precise and accurate results have not been obtained. This study aims to separate the object of the MACS with the development of extraction. The proposed method uses Morphology and Regionprops operations. The dataset used in the testing process is 347 of 5 patients indicated for Mastoiditis. The results obtained can calculate the area of MACS for each test image. Based on image testing, the area of the smallest MACS in this study was 0.589 cm2 and the largest was 6.183 cm2. This, the smaller the size of the MACS indicates...

Research paper thumbnail of Hybrid Method Air Quality Classification Analysis Model

TEM Journal

This paper aims to present a discussion of air quality based on the classification analysis devel... more This paper aims to present a discussion of air quality based on the classification analysis developed by hybrid method. Problems that occur, where the longer the air quality is getting worse and can cause serious problems for human life. The method in performing the used analysis consisted of K-Means clustering, Multiple Linear Regression (MRL), Artificial Neural Network (ANN), and Decision Tree Algorithm C.45. The results of MRL measurement show that correlation relationship is the same as the variable with an output of 70.7%. Then the results of determination with ANN showed an MSE value of 0.0018197 and output accuracy of 99.99%.

Research paper thumbnail of Sistem Pakar dalam Mengidentifikasi Penyakit Malnutrisi pada Balita Metode Forward Chaining

Jurnal KomtekInfo

Sistem.pakar merupakan.cabang berasal kecerdasan.buatan, yang menyerap pengetahuan manusia. Siste... more Sistem.pakar merupakan.cabang berasal kecerdasan.buatan, yang menyerap pengetahuan manusia. Sistem pakar dapat diimplementasikan pada berbagai perangkat lunak buat memecahkan banyak dilema, mirip bidang medis. salah satu metode yg digunakan pada sistem pakar ialah forward chaining. Metode rantai maju dipergunakan buat mencocokkan tanda-tanda pasien menggunakan tanda-tanda penyakit lanjut. dengan memakai sistem ahli dan metode forward chain, proses diagnosa balita gizi jelek bisa diselesaikan secara efisien, berhemat ketika, serta membantu dokter serta bidan.

Research paper thumbnail of Sistem Keamanan Aktivitas Komputer Anak Berbasis Opensource

Jurnal Teknologi Informasi dan Pendidikan, 2016

Technological developments at the present time is very rapid, starting from local access to be ab... more Technological developments at the present time is very rapid, starting from local access to be able to access information of the world. But behind it all the time management in the use of computers should be is arranged, especially in children. Parents must be responsible and can adjust their schedules, especially in scheduling use of a home computer. So that use can be controlled schedule and could make children more independent and disciplined. Designing an application form Parental Control can minimize the child in excessive computer use.

Research paper thumbnail of Analysis of sales levels of pharmaceutical products by using data mining algorithm C45

Indonesian Journal of Electrical Engineering and Computer Science, 2021

This research was conducted to analyze the level of sales of pharmaceutical products at a Pharmac... more This research was conducted to analyze the level of sales of pharmaceutical products at a Pharmacy. This is done to find out the types of products that have high and low sales levels. This study uses the C45 Data Mining Algorithm concept that will produce a conclusion on the prediction of sales of pharmaceutical products through data processing obtained from sales transactions at pharmacies. This C45 algorithm will form a decision tree that provides users with knowledge about products that are in great demand by consumers based on sales data and predetermined variables. The final result of the C45 algorithm produces a number of rules that can identify the inheritance of a type of medicinal product. C45 algorithm is able to produce 20 types of categories that will be labeled goals based on the number of pharmaceutical products, since it can be concluded that C45 successfully defines 55% of the existing objective categories.

Research paper thumbnail of Machine Learning Algorithms for Predicting the Spread of Covid‒19 in Indonesia

TEM Journal, 2021

Coronavirus 2019 or Covid-19 is a major problem for health, and it is a global pandemic that has ... more Coronavirus 2019 or Covid-19 is a major problem for health, and it is a global pandemic that has to be controlled. Covid-19 spread so fast to 196 countries, including Indonesia. The government has to study the pattern and predict its spread in order to make policies that will be implemented to tackle the spread of some of the existing data. Therefore this research was conducted as a precautionary measure against the Covid-19 pandemic by predicting the rate of spread of Covid-19. The application of the machine learning method by combining the k-means clustering algorithm in determining the cluster, k-nearest neighbor for prediction and Iterative Dichotomiser (ID3) for mapping patterns is expected to be able to predict the level of spread of Covid-19 in Indonesia with an accuracy rate of 90%.

Research paper thumbnail of Keamanan Web Server Menggunakan Bahasa Pemrograman Php dan VB Net

Majalah Ilmiah UPI YPTK, 2018

Seiring perkembangan teknologi yang semakin canggih, kebutuhan manusia akan teknologi semakin bes... more Seiring perkembangan teknologi yang semakin canggih, kebutuhan manusia akan teknologi semakin besar. Peran teknologi saat ini sangat memungkinkan untuk dimanfaatkan dalam aktifitas penyebaran informasi, teknologi ilmu pengetahuan dapat ditransformasikan menjadi suatu solusi yang efisien dalam mengatasi terlambatnya informasi disampaikan kepada yang bersangkutan. Dengan sekolah yang mempunyai website akan mampu menyebarkan informasi dengan cepat kepada muridnya. Dengan demikian pembelajaran maupun penyebaran informasi dalam aktifitas belajar mengajar menjadi lebih efektif

Research paper thumbnail of Diagnosis Desease of Down Syndrome In Children with Forward Chaining Methods

Research paper thumbnail of Analisis Firewall Demilitarized Zone Dan Switch Port Security Pada Jaringan Universitas Putra Indonesia Yptk

Perkembangan teknologi informasi semakin pesat, hal ini dapat membantu semua aspek pekerjaan manu... more Perkembangan teknologi informasi semakin pesat, hal ini dapat membantu semua aspek pekerjaan manusia dalam mengolah dan mendapatkan suatu informasi. Pada sisi positif memudahakan pekerjaan manusia, tetapi pada sisi lain dari aspek keamanan sangat mengancam privasi manusia dalam mengolah dan mendapatkan suatu informasi. Teknik-teknik sistem keamanan jaringan dan pencegahan terhadap serangan pada sistem informasi perlu dikembangkan sehingga integrity, availability dan confidentiality. Salah satunya adalah dengan cara membangun sistem keamanan jaringan dan sistem pencegahan serangan. Pada penelitian ini melakukan analisa sistem keamanan jaringan komputer menggunakan firewall Demiliteralized Zone (DMZ) dengan menggunakan IPtables yang merupakan standar dari system Linux dan Switch Port Security (SPS). Pemanfaatan dengan memadukan kedua teknologi ini untuk mencapai tingkat keamanan yang maksimum dan mampu mem-block usaha penyerangan intruder dengan berbagai serangan yang terindentifikasi.

Research paper thumbnail of SISTEM INFORMASI AKADEMIK DAN PENGARSIPAN FILE BERBASIS ExTJS DAN WEBSERVICE MENGGUNAKAN APLIKASI ANDROID

Abstrak Sistem informasi akademik dan pengasipan file membawa manfaat ketersediaan informasi yang... more Abstrak Sistem informasi akademik dan pengasipan file membawa manfaat ketersediaan informasi yang dapat diakses setiap saat dan visualisasi yang menarik. Dengan perkembangan teknologi perangkat mobile saat ini, maka penulis membuat sebuah aplikasi sistem informasi akademik dan pengarsipan file secara mobile yang menjadi media akses dan menampilkan informasi serta pengarsipan file berbasis ExTJS dan Android Kata Kunci : file, mobile, extjs, android

Research paper thumbnail of Perancangan Content Management System (CMS) Dengan Studi Kasus E-Bisnis Pada Toko Alya Gorden

- When an website become more complex, hence its handling shall no longger earn to be handled onl... more - When an website become more complex, hence its handling shall no longger earn to be handled only by a webmaster. presented Information type become more immeasurable, so that content of website even also have to be taken away from various immeasurable information. When this handling only done/conducted by webmaster, hence band update of information become to be pursued, and of course this matter will cause process update situs will become tardy and will eat the expense of much more big. One of the way of to overcome the problem of done/conducted by using CMS ( Content Management System) as an solution in giving amenity in management of website. At this research is woke up by a e-bisnis website base on CMS (Content Management System). Bisniser enough do/conduct download to file of website. By doing/conducting its computer running of bisniser have got website sale of online. By doing/conducting update of website, file which is download have turned into page;yard of website such as th...

Research paper thumbnail of Towards a Privacy Mechanism for Preventing Malicious Collusion of Multiple Service Providers (SPs) on the Cloud

Advances in Intelligent Systems and Computing, 2018

Cloud computing is cyberspace computing, where systems, packages, data and other required service... more Cloud computing is cyberspace computing, where systems, packages, data and other required services (such as appliances, development platforms, servers, storage and virtual desktops) are dispensed. It has generated a very significant interest in educational, industrial and business set-ups due to its many benefits. However, cloud computing is still in its early stage of development and is faced with many difficulties. Researchers have shown that security issues are the major concerns that have prevented the wide adoption of cloud computing. One of the security issues is privacy which is about securing the personal identifiable information (PII) or attributes of users on the cloud. Although researches for addressing privacy on the cloud exist (uApprove, uApprove.JP and Template Data Dissemination (TDD)), users’ PII remains susceptible as existing researches lack efficient control of user’s attribute of sensitive data on the cloud. Similarly, users are endangered to malicious service providers (SPs) that may connive to expose a user’s identity in a cloud scenario. This paper provides a mechanism to solve the malicious SP collusion problem and control the release of user’s attribute in the cloud environment. This will require the use of policies on the SPs, where SPs are only allowed to request for attributes that are needed only to process a user’s service at any point in time. This can be achieved using a combination of Kerberos ticket concept, encryption and timestamp on the attribute to be released to SPs from the identity provider (IdP), thereby helping to control attributes given to SPs for processing the release of services to users for one-time usage by the SPs and not kept for future use by them. Thus, replay attacks and blocking other SPs from accessing them are prevented. Hence, any malicious intention of assembling users’ attributes by other SPs to harm them is defeated.

Research paper thumbnail of Pola Penentuan Status Peminjaman Dengan Algoritma Perceptron

Sebatik, 2019

Pada setiap penentuan pemberian dana pinjaman koperasi yang dilakukan, pada umumnya memiliki sist... more Pada setiap penentuan pemberian dana pinjaman koperasi yang dilakukan, pada umumnya memiliki sistem yang sama dengan melihat data-data yang diajukan oleh pihak peminjam sebelumnya. Penelitian ini memiliki tujuan untuk mampu mengenali pola pemberian status peminjaman yang akan diberikan oleh pihak koperasi dengan mengkobinasikan konsep ilmu pada jaringan saraf tiruan algoritma perceptron. Algoritma ini sangat cocok dalam mengenali pola yang berkerja dengan melakukan pelatihan jaringan berdasarkan variabel-variabel dari data yang digunakan pada jaringan. Dalam proses pelatihan yang dilakukan jaringan, penulis menggunakan alat bantu software matlab. Hasil penelitian yang didapat akan mampu memberikan masukan pada pihak pengelola koperasi dalam memberikan status pemberian dana pinjaman yang lebih terkonsepdan tersistem agar proses pemberian status peminjaman lebih cepat dan efisien.

Research paper thumbnail of Multiple Thresholding Methods for Extracting & Measuring Human Brain and 3D Reconstruction

Journal of Physics: Conference Series, 2019

Thresholding changes the gray image to binary imagery and improves image quality. This study appl... more Thresholding changes the gray image to binary imagery and improves image quality. This study applies the multiple thresholding method to extract and calculate the area of bleeding in the human brain. 10 samples of human brain image using multiple threshold method (Otsu and hybrid thresholding). The results of the Otsu method that still have noise can be overcome by the hybrid thresholding method. The results of the original image research with images that have been processed using the multiple thresholding method yield the optimum threshold value, the method applied produces excellent image quality. Results of calculation of MSE, RMSE and PSNR. the average PSNR Otsu thresholding: an average of 60.93 dB, the average PSNR Hybrid thresholding: 59.06 dB, and the average PSNR Multiple thresholding: 56.96 dB, the average MSE Otsu thresholding: 38.27, the average MSE Hybrid thresholding 36.15, mean MSE multiple thresholding: 34.30, mean RMSE Otsu: 9.49, mean RMSE Hybrid thresholding: 8.88,...

Research paper thumbnail of Peningkatan Keamanan Website Menggunakan Metode XML dengan Framework Codeigniter

Indonesian Journal of Computer Science, 2019

Website security is needed in the dissemination of every information and data in cyberspace now. ... more Website security is needed in the dissemination of every information and data in cyberspace now. On the previous website the security used was not optimal in securing the website so we needed a reliable website security. XML (eXtensible Markup Language) is a markup language that is designed to store and deliver data by forming its own tags as needed. Codeigniter Framework is a php framework that is open source and uses the MVC method (Model, View, Controller). codeigniter is free or not paid if you use it. Codeigniter framework is made with the same purpose as other frameworks, namely to facilitate developers or programmers in building a web-based application without having to create it from scratch. The results of testing of this method are able to help and minimize the entry of hackers and secure data that will later become information. Using this method of combining can safeguard the entry of hackers and help secure the data and information on the website.

Research paper thumbnail of Penerapan Metode Simple Additive Sistem (Saw) Pendukung Keputusan Seleksi Penerima Beasiswa Pada SMK N 5 Padang

Jurnal Teknologi Informasi dan Pendidikan, 2017

In an institution or organization especially education, would be required a system to support the... more In an institution or organization especially education, would be required a system to support the decision. There is a possibility decision system is also carried out concerned by the levels in the organization. The decision support systems application has designed to help the school management determine to select the students are eligible to receive a scholarship. That’s why using a decision support system admission scholarship at the Vocational High School 5 Padang using SAW (Simple Addiitive weighting) method. The method of calculation are going by manually first, then maded a computerized using a web-based application. With hoping this system is expected to reduce the occurrence of errors in the selection of students to get the scholarships of the schools proposed format. Keyword : Scholarship, Simple Addiitive weighting, Decision Support Systems

Research paper thumbnail of Automated Identification and Reconstruction of 3D Images on the Mastoid Air Cell System

TEM Journal

The mastoid air cell system (MACS) protects the structures in the ear and regulates air pressure ... more The mastoid air cell system (MACS) protects the structures in the ear and regulates air pressure in the ear cavity. MACS segmentation is very difficult because of the many overlapping object characteristics in the temporal bone. This study aims to accurately identify and measure MACS areas from CT-scan images of mastoiditis patients. The data tested consisted of 128 CT images from 13 different patients. Images were taken using the Siemens SOMATOM Perspective CT Scanner model 10662260 axially. The extended Adaptive Threshold (eAT) method was developed to produce optimal threshold values for each test image. Furthermore, the eAT results are used to convert the test image into a binary image and then applied to the identification and extraction model automatically for reconstruction from 2D to 3D images. Smaller MACS sizes indicate inflammation of the mastoid bone and require intensive care. Thus, this research can be used to help doctors make the right decisions in carrying out furthe...

Research paper thumbnail of Prediction of Drug Demand Based on Deep Learning Approach and Classification Model

International Journal on Advanced Science, Engineering and Information Technology

The high demand for drugs in the last period has caused problems with drug shortages in several p... more The high demand for drugs in the last period has caused problems with drug shortages in several pharmacies. Almost all pharmacies experience the same problem, causing many people who do not to get their drug needs during the current pandemic. To overcome this, analyzing the process of predicting drug demand in the next period is necessary. The prediction process can be used as an initial solution in solving problems to see the number of drug demand numbers that will occur. This study aims to develop a predictive analysis model for drug demand using a deep learning approach and a classification model. Deep learning is an approach that does well in the case of prediction. The classification model also includes the right concept for solving the problem. The prediction and classification analysis methods include K-Means clustering, Multiple Linear Regression (MRL), Artificial Neural Network (ANN), and Decision Tree algorithms C.45. This method can provide better performance results in the prediction process to get precise and accurate output. Prediction results obtained from the learning process provide an accuracy rate of 99.99%. The output of the classification model also provides an overview of the knowledge base in the form of a decision tree. The level of classification model testing carried out gives the accuracy of the classification pattern of 97.05% so that the analytical model developed can predict future drug demand.

Research paper thumbnail of Pengenalan Web Desain Kepada Santri Rahmatan Lil’Alamin International Islamic Boarding (Rla Iibs) Aripan Kabupaten Solok

Community Development Journal : Jurnal Pengabdian Masyarakat

Pemanfaatan komputer saat ini cukup beragam mulai sebagai alat bantu dalam menyelesaikan suatu pe... more Pemanfaatan komputer saat ini cukup beragam mulai sebagai alat bantu dalam menyelesaikan suatu pekerjaan sampai mengolah data hasil penelitian maupun untuk mengoperasikan program-program penyelesaian problem-problem ilmiah, industri dan bisinis. Seperti misalnya website yang digunakan untuk melihat informasi serta memberikan kemudahan dalam mengerjakan suatu pekerjaan. Pada zaman sekarang ini hampir semua kantor sudah memanfaatkan komputer dalam menunjang pekerjaan, tetapi masih sangat banyak yang belum tau bagaimana cara memanfaatkan teknologi komputer tersebut dengan benar dan maksimal. Oleh karena ini pada objek pengabdian masyarakat yang akan dilakukan adalah bertujuan untuk memberikan pengtahuan teknologi komputer khususnya web desain untuk memberikan pengetahuan kepada Santri RLA IIBS Aripan Kab. Solok. Di dalam laporan ini akan dipaparkan mengenai kegiatan pengabdian kepada masyarakat khususnya di Rahmatan Lil Alamin Boarding School (RLA-IIBS) dalam rangka memberikan pengarah...

Research paper thumbnail of Automated model for identification on mastoid of temporal bone image

Indonesian Journal of Electrical Engineering and Computer Science

Mastoiditis occurs due to inflammation that can affect the structure of the mastoid bone. The mas... more Mastoiditis occurs due to inflammation that can affect the structure of the mastoid bone. The mastoid bone consists of the mastoid air cell system (MACS) which protects the ear structures and regulates air pressure in the ear and has different sizes and characteristics, making it very difficult to identify precisely. This study aims to identify and find the right MACS size by developing an automatic identification model and obtaining the optimal threshold value in the segmentation process using the extended adaptive threshold (eAT) method. The research dataset uses computed tomography (CT)-scan images of 308 slices of 12 patients indicated for mastoiditis. The results of this study provide identification that has the right MACS accuracy and size. Overall, the optimal segmentation process obtained the smallest threshold value of 57 and the largest threshold value of 63, the smallest MACS size is 4.025 cm2 and the largest is 8.816 cm2 with an accuracy rate of 93.4%. The smaller MACS s...

Research paper thumbnail of Development of Mastoid Air Cell System Extraction Method on Temporal CT-scan Image

Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the ... more Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone. Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid air cell system (MACS), but the fact that medical personnel are experiencing difficulties in determining the size MACS is due to the many different characteristics and objects overlap, so that in the measurement of the area, precise and accurate results have not been obtained. This study aims to separate the object of the MACS with the development of extraction. The proposed method uses Morphology and Regionprops operations. The dataset used in the testing process is 347 of 5 patients indicated for Mastoiditis. The results obtained can calculate the area of MACS for each test image. Based on image testing, the area of the smallest MACS in this study was 0.589 cm2 and the largest was 6.183 cm2. This, the smaller the size of the MACS indicates...

Research paper thumbnail of Hybrid Method Air Quality Classification Analysis Model

TEM Journal

This paper aims to present a discussion of air quality based on the classification analysis devel... more This paper aims to present a discussion of air quality based on the classification analysis developed by hybrid method. Problems that occur, where the longer the air quality is getting worse and can cause serious problems for human life. The method in performing the used analysis consisted of K-Means clustering, Multiple Linear Regression (MRL), Artificial Neural Network (ANN), and Decision Tree Algorithm C.45. The results of MRL measurement show that correlation relationship is the same as the variable with an output of 70.7%. Then the results of determination with ANN showed an MSE value of 0.0018197 and output accuracy of 99.99%.

Research paper thumbnail of Sistem Pakar dalam Mengidentifikasi Penyakit Malnutrisi pada Balita Metode Forward Chaining

Jurnal KomtekInfo

Sistem.pakar merupakan.cabang berasal kecerdasan.buatan, yang menyerap pengetahuan manusia. Siste... more Sistem.pakar merupakan.cabang berasal kecerdasan.buatan, yang menyerap pengetahuan manusia. Sistem pakar dapat diimplementasikan pada berbagai perangkat lunak buat memecahkan banyak dilema, mirip bidang medis. salah satu metode yg digunakan pada sistem pakar ialah forward chaining. Metode rantai maju dipergunakan buat mencocokkan tanda-tanda pasien menggunakan tanda-tanda penyakit lanjut. dengan memakai sistem ahli dan metode forward chain, proses diagnosa balita gizi jelek bisa diselesaikan secara efisien, berhemat ketika, serta membantu dokter serta bidan.

Research paper thumbnail of Sistem Keamanan Aktivitas Komputer Anak Berbasis Opensource

Jurnal Teknologi Informasi dan Pendidikan, 2016

Technological developments at the present time is very rapid, starting from local access to be ab... more Technological developments at the present time is very rapid, starting from local access to be able to access information of the world. But behind it all the time management in the use of computers should be is arranged, especially in children. Parents must be responsible and can adjust their schedules, especially in scheduling use of a home computer. So that use can be controlled schedule and could make children more independent and disciplined. Designing an application form Parental Control can minimize the child in excessive computer use.

Research paper thumbnail of Analysis of sales levels of pharmaceutical products by using data mining algorithm C45

Indonesian Journal of Electrical Engineering and Computer Science, 2021

This research was conducted to analyze the level of sales of pharmaceutical products at a Pharmac... more This research was conducted to analyze the level of sales of pharmaceutical products at a Pharmacy. This is done to find out the types of products that have high and low sales levels. This study uses the C45 Data Mining Algorithm concept that will produce a conclusion on the prediction of sales of pharmaceutical products through data processing obtained from sales transactions at pharmacies. This C45 algorithm will form a decision tree that provides users with knowledge about products that are in great demand by consumers based on sales data and predetermined variables. The final result of the C45 algorithm produces a number of rules that can identify the inheritance of a type of medicinal product. C45 algorithm is able to produce 20 types of categories that will be labeled goals based on the number of pharmaceutical products, since it can be concluded that C45 successfully defines 55% of the existing objective categories.

Research paper thumbnail of Machine Learning Algorithms for Predicting the Spread of Covid‒19 in Indonesia

TEM Journal, 2021

Coronavirus 2019 or Covid-19 is a major problem for health, and it is a global pandemic that has ... more Coronavirus 2019 or Covid-19 is a major problem for health, and it is a global pandemic that has to be controlled. Covid-19 spread so fast to 196 countries, including Indonesia. The government has to study the pattern and predict its spread in order to make policies that will be implemented to tackle the spread of some of the existing data. Therefore this research was conducted as a precautionary measure against the Covid-19 pandemic by predicting the rate of spread of Covid-19. The application of the machine learning method by combining the k-means clustering algorithm in determining the cluster, k-nearest neighbor for prediction and Iterative Dichotomiser (ID3) for mapping patterns is expected to be able to predict the level of spread of Covid-19 in Indonesia with an accuracy rate of 90%.

Research paper thumbnail of Keamanan Web Server Menggunakan Bahasa Pemrograman Php dan VB Net

Majalah Ilmiah UPI YPTK, 2018

Seiring perkembangan teknologi yang semakin canggih, kebutuhan manusia akan teknologi semakin bes... more Seiring perkembangan teknologi yang semakin canggih, kebutuhan manusia akan teknologi semakin besar. Peran teknologi saat ini sangat memungkinkan untuk dimanfaatkan dalam aktifitas penyebaran informasi, teknologi ilmu pengetahuan dapat ditransformasikan menjadi suatu solusi yang efisien dalam mengatasi terlambatnya informasi disampaikan kepada yang bersangkutan. Dengan sekolah yang mempunyai website akan mampu menyebarkan informasi dengan cepat kepada muridnya. Dengan demikian pembelajaran maupun penyebaran informasi dalam aktifitas belajar mengajar menjadi lebih efektif

Research paper thumbnail of Diagnosis Desease of Down Syndrome In Children with Forward Chaining Methods

Research paper thumbnail of Analisis Firewall Demilitarized Zone Dan Switch Port Security Pada Jaringan Universitas Putra Indonesia Yptk

Perkembangan teknologi informasi semakin pesat, hal ini dapat membantu semua aspek pekerjaan manu... more Perkembangan teknologi informasi semakin pesat, hal ini dapat membantu semua aspek pekerjaan manusia dalam mengolah dan mendapatkan suatu informasi. Pada sisi positif memudahakan pekerjaan manusia, tetapi pada sisi lain dari aspek keamanan sangat mengancam privasi manusia dalam mengolah dan mendapatkan suatu informasi. Teknik-teknik sistem keamanan jaringan dan pencegahan terhadap serangan pada sistem informasi perlu dikembangkan sehingga integrity, availability dan confidentiality. Salah satunya adalah dengan cara membangun sistem keamanan jaringan dan sistem pencegahan serangan. Pada penelitian ini melakukan analisa sistem keamanan jaringan komputer menggunakan firewall Demiliteralized Zone (DMZ) dengan menggunakan IPtables yang merupakan standar dari system Linux dan Switch Port Security (SPS). Pemanfaatan dengan memadukan kedua teknologi ini untuk mencapai tingkat keamanan yang maksimum dan mampu mem-block usaha penyerangan intruder dengan berbagai serangan yang terindentifikasi.

Research paper thumbnail of SISTEM INFORMASI AKADEMIK DAN PENGARSIPAN FILE BERBASIS ExTJS DAN WEBSERVICE MENGGUNAKAN APLIKASI ANDROID

Abstrak Sistem informasi akademik dan pengasipan file membawa manfaat ketersediaan informasi yang... more Abstrak Sistem informasi akademik dan pengasipan file membawa manfaat ketersediaan informasi yang dapat diakses setiap saat dan visualisasi yang menarik. Dengan perkembangan teknologi perangkat mobile saat ini, maka penulis membuat sebuah aplikasi sistem informasi akademik dan pengarsipan file secara mobile yang menjadi media akses dan menampilkan informasi serta pengarsipan file berbasis ExTJS dan Android Kata Kunci : file, mobile, extjs, android

Research paper thumbnail of Perancangan Content Management System (CMS) Dengan Studi Kasus E-Bisnis Pada Toko Alya Gorden

- When an website become more complex, hence its handling shall no longger earn to be handled onl... more - When an website become more complex, hence its handling shall no longger earn to be handled only by a webmaster. presented Information type become more immeasurable, so that content of website even also have to be taken away from various immeasurable information. When this handling only done/conducted by webmaster, hence band update of information become to be pursued, and of course this matter will cause process update situs will become tardy and will eat the expense of much more big. One of the way of to overcome the problem of done/conducted by using CMS ( Content Management System) as an solution in giving amenity in management of website. At this research is woke up by a e-bisnis website base on CMS (Content Management System). Bisniser enough do/conduct download to file of website. By doing/conducting its computer running of bisniser have got website sale of online. By doing/conducting update of website, file which is download have turned into page;yard of website such as th...

Research paper thumbnail of Towards a Privacy Mechanism for Preventing Malicious Collusion of Multiple Service Providers (SPs) on the Cloud

Advances in Intelligent Systems and Computing, 2018

Cloud computing is cyberspace computing, where systems, packages, data and other required service... more Cloud computing is cyberspace computing, where systems, packages, data and other required services (such as appliances, development platforms, servers, storage and virtual desktops) are dispensed. It has generated a very significant interest in educational, industrial and business set-ups due to its many benefits. However, cloud computing is still in its early stage of development and is faced with many difficulties. Researchers have shown that security issues are the major concerns that have prevented the wide adoption of cloud computing. One of the security issues is privacy which is about securing the personal identifiable information (PII) or attributes of users on the cloud. Although researches for addressing privacy on the cloud exist (uApprove, uApprove.JP and Template Data Dissemination (TDD)), users’ PII remains susceptible as existing researches lack efficient control of user’s attribute of sensitive data on the cloud. Similarly, users are endangered to malicious service providers (SPs) that may connive to expose a user’s identity in a cloud scenario. This paper provides a mechanism to solve the malicious SP collusion problem and control the release of user’s attribute in the cloud environment. This will require the use of policies on the SPs, where SPs are only allowed to request for attributes that are needed only to process a user’s service at any point in time. This can be achieved using a combination of Kerberos ticket concept, encryption and timestamp on the attribute to be released to SPs from the identity provider (IdP), thereby helping to control attributes given to SPs for processing the release of services to users for one-time usage by the SPs and not kept for future use by them. Thus, replay attacks and blocking other SPs from accessing them are prevented. Hence, any malicious intention of assembling users’ attributes by other SPs to harm them is defeated.

Research paper thumbnail of Pola Penentuan Status Peminjaman Dengan Algoritma Perceptron

Sebatik, 2019

Pada setiap penentuan pemberian dana pinjaman koperasi yang dilakukan, pada umumnya memiliki sist... more Pada setiap penentuan pemberian dana pinjaman koperasi yang dilakukan, pada umumnya memiliki sistem yang sama dengan melihat data-data yang diajukan oleh pihak peminjam sebelumnya. Penelitian ini memiliki tujuan untuk mampu mengenali pola pemberian status peminjaman yang akan diberikan oleh pihak koperasi dengan mengkobinasikan konsep ilmu pada jaringan saraf tiruan algoritma perceptron. Algoritma ini sangat cocok dalam mengenali pola yang berkerja dengan melakukan pelatihan jaringan berdasarkan variabel-variabel dari data yang digunakan pada jaringan. Dalam proses pelatihan yang dilakukan jaringan, penulis menggunakan alat bantu software matlab. Hasil penelitian yang didapat akan mampu memberikan masukan pada pihak pengelola koperasi dalam memberikan status pemberian dana pinjaman yang lebih terkonsepdan tersistem agar proses pemberian status peminjaman lebih cepat dan efisien.

Research paper thumbnail of Multiple Thresholding Methods for Extracting & Measuring Human Brain and 3D Reconstruction

Journal of Physics: Conference Series, 2019

Thresholding changes the gray image to binary imagery and improves image quality. This study appl... more Thresholding changes the gray image to binary imagery and improves image quality. This study applies the multiple thresholding method to extract and calculate the area of bleeding in the human brain. 10 samples of human brain image using multiple threshold method (Otsu and hybrid thresholding). The results of the Otsu method that still have noise can be overcome by the hybrid thresholding method. The results of the original image research with images that have been processed using the multiple thresholding method yield the optimum threshold value, the method applied produces excellent image quality. Results of calculation of MSE, RMSE and PSNR. the average PSNR Otsu thresholding: an average of 60.93 dB, the average PSNR Hybrid thresholding: 59.06 dB, and the average PSNR Multiple thresholding: 56.96 dB, the average MSE Otsu thresholding: 38.27, the average MSE Hybrid thresholding 36.15, mean MSE multiple thresholding: 34.30, mean RMSE Otsu: 9.49, mean RMSE Hybrid thresholding: 8.88,...

Research paper thumbnail of Peningkatan Keamanan Website Menggunakan Metode XML dengan Framework Codeigniter

Indonesian Journal of Computer Science, 2019

Website security is needed in the dissemination of every information and data in cyberspace now. ... more Website security is needed in the dissemination of every information and data in cyberspace now. On the previous website the security used was not optimal in securing the website so we needed a reliable website security. XML (eXtensible Markup Language) is a markup language that is designed to store and deliver data by forming its own tags as needed. Codeigniter Framework is a php framework that is open source and uses the MVC method (Model, View, Controller). codeigniter is free or not paid if you use it. Codeigniter framework is made with the same purpose as other frameworks, namely to facilitate developers or programmers in building a web-based application without having to create it from scratch. The results of testing of this method are able to help and minimize the entry of hackers and secure data that will later become information. Using this method of combining can safeguard the entry of hackers and help secure the data and information on the website.

Research paper thumbnail of Penerapan Metode Simple Additive Sistem (Saw) Pendukung Keputusan Seleksi Penerima Beasiswa Pada SMK N 5 Padang

Jurnal Teknologi Informasi dan Pendidikan, 2017

In an institution or organization especially education, would be required a system to support the... more In an institution or organization especially education, would be required a system to support the decision. There is a possibility decision system is also carried out concerned by the levels in the organization. The decision support systems application has designed to help the school management determine to select the students are eligible to receive a scholarship. That’s why using a decision support system admission scholarship at the Vocational High School 5 Padang using SAW (Simple Addiitive weighting) method. The method of calculation are going by manually first, then maded a computerized using a web-based application. With hoping this system is expected to reduce the occurrence of errors in the selection of students to get the scholarships of the schools proposed format. Keyword : Scholarship, Simple Addiitive weighting, Decision Support Systems