Table of contents

Volume 1255

2019

Previous issue Next issue

The International Conference on Computer Science and Applied Mathematic 10–12 October 2018, Niagara Hotel, Parapat, Indonesia

Accepted papers received: 20 May 2019
Published online: 06 September 2019

Preface

011001
The following article is Open access

The cover page is available in this pdf.

011002
The following article is Open access

Assalamu'alaikum Wr. Wb. and Greetings.

I am pleased and honored to welcome you at the First International Conference on Computer Science and Applied Mathematic (ICCSAM 2018), which was held this year by AMIK and STIKOM Tunas Bangsa Pematangsiantar in collaboration with the Indonesian Computer and Information Professional Association (IPKIN), Indonesian Mathematical Society (INDOMS) and Bank Muamalat. As Chair of the Foundation, I would like to convey a greeting Welcome to Parapat City Lake Toba to presenters from various countries and especially those I respect for the presence of scientists in the field of Computer and Mathematical Sciences and industry practitioners in the 2018 ICCSAM event.

I see that this activity is designed to enhance the exchange of knowledge and new discoveries in computer science and mathematics and related fields in industry. I hope that scientists in the field of computer science and mathematics and those who work in the industry can share knowledge and work together as a team that has mutual relations with each other. I am very pleased to say that the theme of this conference, "Advancing Computability Innovation" is very much in line with the objectives of AMIK and STIKOM conferences and missions, namely "to become a Science and Technology based Study Program that meets industrial needs and functions as a research center in Information Data Science. The conference was held in response to output and aoutcame which had a significant contribution in the field of computer science and mathematics as an inseparable unit of science towards the development of local and global industries. It is our happiness and honor to welcome distinguished professors present to convey their expertise at this conference.

I hope this meeting will enable the development of productive dialogue between participants from various countries. They also provide invaluable opportunities for networking among participants, institutions and industries. I also hope that diversity in these fields can reveal more opportunities for researchers and practitioners from all over the world to start a lot of research related to the industry in the future.

I would like to congratulate AMIK and STIKOM Tunas Bangsa for starting this conference with a synergistic contribution from dedicated partners namely the USU Faculty of Mathematics and Natural Sciences, USU's Faculty of Computer and Information Technology, the Indonesian Computer and Informatics Professional Association (IPKIN), Indonesian Mathematical Society (INDOMS), Bank Muamalat, Malaysia Pahang University (UMP), University of Essex, United Kingdom, Ankara, Turkey and Institute of Applied Mathematics Middle East Technical University to all delegates for their full support, cooperation and contribution to the 2018 ICCSAM. I also want to thank the Organizing Committee for their perseverance and extraordinary efforts. Various sponsors are also rewarded for their contributions. I really hope that all participants will get a pleasant stay here at NIAGARA HOTEL and bring back unforgettable experiences and valuable knowledge from this conference.

Thanks.

H. Ahmad Ridwansyah Putra

011003
The following article is Open access

List of conference photographs are available in this pdf.

011004
The following article is Open access

All papers published in this volume of Journal of Physics: Conference Series have been peer reviewed through processes administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a proceedings journal published by IOP Publishing.

Papers

012001
The following article is Open access

, , , , , , and

One of the important needs of environmental health is clean water. Clean water is the most important necessity of living beings in supporting survival. The study aimed to cluster the number of cleaned water customers by province (1995-2015). The method used is data mining clustering using k-means. The sample data used 34 provinces with attribute assessment of the number of cleaned water customers by province. The clustering process is done with 3 clusters, namely (C1) Cluster High, (C2) Cluster Normal and (C3) Cluster Low, for the number of cleaned water customers who are low on the need of clean water. The results showed, C1: 6 provinces, C2: 4 provinces and C3: 24 provinces. The end centroid values used are: C1 (296587.22), C2 (995898.56) and C3 (70832.29). The results obtained on the Davies-Bouldin index for "the number of cleaned water consumers" are -0.470. based on performance results, it can be concluded that k-means algorithm is best because it has the smallest Davies-Bouldin index value. Based on research results, 70% of Indonesian people are still low awareness of the need for clean water.

012002
The following article is Open access

, , , and

This study aims to classify the quality of customer service at Bank BTN Pematangsiantar Branch. Data is obtained from the results of the customer questionnaire of Bank BTN Pematangsiantar Branch. Attributes used are 7, namely Age (C1), Job (C2), Old to Customer (C3), Tangiable (C4), Reliability (C5), Assurance (C6), Responsivenenss (C7). Motede used in this research is C4.5 Algorithm and assisted by Rapidminer software to make decision trees. From the results of the study, there were 5 rules for classification in determining the quality of customer service with 3 rules with satisfaction status and 2 rules with dissatisfied status. The C.45 algorithm can be used in the case of determining customer service quality of Bank BTN Pematangsiantar Branch with an accuracy of 77.78%. With this analysis, it is expected that Bank BTN can improve the quality of service to customer satisfaction.

012003
The following article is Open access

, , , , , , , and

Analysis of research is very important to do, so that research becomes more precise and directed. As well as analyzing the development of aquaculture companies in Indonesia, studies and the use of appropriate methods are needed to get optimal results. This research is expected to be widely useful, both for the Government of Indonesia and the private sector as one of the study materials in business development in the fisheries sector. The data used in this study is data on the number of aquaculture companies according to the type of cultivation obtained from the Indonesian Statistical Center from 2000 to 2016. This study uses the Batch training method with weight and bias learning rules with 5 architectural models, namely: 8-5-1, 8-10-1, 8-5-10-1, 8-10-20-1 and 8-20-40-1. Of these 5 architectural models, the best is 8-5-1 with an accuracy rate of 75%, MSE 0.0445464533, with an error rate of 0.001 - 0.07.

012004
The following article is Open access

, , , and

This study aims to determine the recipient lecturers of the service to the internal community at STIKOM Tunas Bangsa. The data were obtained from the archive of the Institute for Research and Service to the Tunas Bangsa STIKOM Community in 2017 and conducted interviews with the Chairperson of the Institute. The alternatives used are 6, namely Situation Analysis (C1), Partner prioritization problems and solutions offered (C2), output targets (C3), accuracy of approach methods to overcome problems, activity plans, partner participation contributions (C4), college feasibility (C5), the cost of work for the feasibility of the proposed cost (C6). The method used in the research of the PROMETHEE II Method. From the results of the study obtained 5 alternatives selected lecturers who received internal service grants, namely: A1 (Net flow 13.79), A5 (Net flow 7.23), A2 (Net flow 7.16), A6 (Net flow 6.29), A3 (Net flow 2.08) of 9 Alternatives. The implementation of the PROMETHEE II method is expected to provide an objective assessment and to compare the results of the reviewer's assessment in determining the recipients of internal service grants. So that it is expected that the decisions given can maintain the quality and quality of the assessment.

012005
The following article is Open access

, , , , and

This study aims to classify the level of understanding of students at STIKOM Tunas Bangsa. Data obtained from the results of even semester semester student questionnaires, with data samples of 165 students. The attributes used are 5, namely communication (C1), learning atmosphere (C2), learning media (C3), appearance (C4) and teaching methods (C5). The method used in this research is C4.5 Algorithm and processed using RapidMiner software to make decision trees. From the results of the study obtained eight rules to determine the level of student understanding, 4 rules understand and 4 rules do not understand. The C4.5 algorithm is accurately applied to determine the level of understanding of students with an accuracy rate of 87.50%. With this analysis, it is expected that it can help institutions in improving the quality of education through the performance of lecturers in the teaching and learning process. So as to produce STIKOM Tunas Bangsa graduates who are rich in knowledge and useful for the community.

012006
The following article is Open access

, , , , and

The Institute for Research and Community Service is a forum for lecturers at every university/institution to develop their knowledge according to their respective disciplines through research fields. This study aims to determine the recipient of the best research grant at STIKOM Tunas Bangsa Pematangsiantar. Research data comes from relevant agencies. There are 9 names of lecturers that are used as alternatives and 5 criteria as the assessment of grantees, namely type of problem formulation (C1), research output opportunities (C2), research method (C3), literature review (C4) and research feasibility (C5). This study uses the Preference selection index (PSI) method. In this method does not require relative determination of attributes, so the researcher does not need to determine the weight criteria. Based on the results of the study obtained several alternatives with the highest preference value, A8 (index selection value 0.8819), A9 (index selection value 0.8627), A4 (index selection value 0.8447), A3 (index selection value 0.83123) and A5 (Index selection value 0.8184) are entitled to get an internal research grant at STIKOM Tunas Bangsa. With this system, it can be used as a comparison between reviewer evaluators and the PSI system so as to maintain the quality of assessment in determining the recipients of internal research grants objectively. It is hoped that this research can provide recommendations to the Institute for Research and Community Services in determining internal lecturer research proposal grants so that the results obtained are more objective.

012007
The following article is Open access

, , , and

This study aims to search for factors causing lazy students at STIKOM Tunas Bangsa. Data obtained from student questionnaire results with a sample of 20 students. The attributes used are 4, namely body condition (A1), lack of learning motivation (A2), lecturer influence (A3) and environment (A4). The method used in the study is ELECTRE II. From the results of the study, the condition factor of the body (A1) is the first alternative to get the first rank with a pure concordance value of 1.8571 and a pure discordance value of -2. Followed by the influence factor of lecturer (A3) on the second rank with pure concordance value of 1.1905 and pure discordance value of -1.6935. With this analysis, it is expected that it can contribute to universities to pay attention to the lazy symptoms of lectures that can hinder students' success and pay attention to students based on ELECTRE II calculation analysis on the causes of lazy lectures so as to improve the educational process.

012008
The following article is Open access

, , , , and

Transportation plays an important role in helping every community activity and also has an important function in economic, social and developmental development. Online transportation provides alternative transportation solutions in the middle of the density of vehicles to be fast and able to reach places that are likely to be inaccessible to other public vehicles. People who usually use public transport or conventional taxi services have begun to switch to online-based taxis that are considered cheaper and more practical. Market research institutes in Southeast Asia show that 250 million Indonesians are quickly adapting the growth of application-based transportation (taxis and ojek online) to facilitate their lives. Various factors that influence people prefer online transportation compared to public transport or conventional taxis. The purpose of the study is to determine the main factors that people prefer to use Oline transportation. The study used the VIKOR method system which obtained the results based on the VIKOR index value where alternative A1: Easy and Safe (VIKOR index value 0) as a rank one and alternative A2: Price (VIKOR index value 0.1809520) as the second rank.

012009
The following article is Open access

, , , , , , and

Mother's own milk is the best source of nutrition for almost all babies. Beyond somatic growth, breast milk as a biological fluid has various other benefits, including modulation of postnatal bowel function, ontogeny immunity, and brain development. Although breastfeeding is highly recommended, breastfeeding may not always be possible, appropriate or just adequate. However, following baby's growth and development, breast milk alone is no longer enough to add nutrition to children. Because of that the baby must be given Mother's Milk Complementary Food. One milk product that has the best market is a formula, but it is not easy to choose what formula is suitable to meet the nutritional content of babies. Baby formula milk is a substitute produced by the industry for baby consumption. Infant formula tries to mimic the nutritional composition of ASI as close as possible, and is based on cow's milk or soy milk. A number of alternatives for cow milk-based formulas also exist. One of the SPK methods that can be used is PROMETHEE II. Based on the results of research using 9 criteria, namely: Energy, Fat, Sugar Protein, Carbohydrates, Sodium, Protein, Affordable Prices, More Variants of Flavor, Easy to Search and 5 Alternatives, namely: Dancow, SGM Eksplor, Vidoran Xmart, LactoGrow, Bebelac 3. The results of the assessment obtained the final result of the calculation of net flow is Vidoran Xmart (0.2075: Ranking 1), Bebelac 3 with net flow (0.0825: Ranking 2) and Dancow with net flow (0.0425: Ranking 3). It is hoped that this research can contribute to parents so that they will no doubt choose formula milk that is suitable for babies.

012010
The following article is Open access

, , , and

Online businesses are no stranger to the community where online businesses are increasingly in demand by the public because of the various supporting factors in which the public does not need to plunge into places to buy the desired items simply through online media but the lively online media in the community cannot be separated from various frauds. Other business people are still many who are reluctant to switch to online business that is inseparable from various factors or reasons they still stick with the old business method. It is very easy to play online recently in various circles of students and even housewives, can be used as additional capital. To find out what factors are the main reason people still hesitate to do business with online methods realized by the application of a decision support system determines the doubts of the online business community with the ELECTRE II method. It is hoped that research can find factors that cause public doubt in online business, so that later the output of this system can be a good evaluation material for the community in doing business. ELECTRE II method can be applied in the case of determining the failure factor of students in the main subject of community doubt in online business by considering several alternatives and criteria. Which alternatives are Cost Expenses (A1), Faced Risks (A2), and Difficult / Doubt to start the business to be run (A3). Data taken from the questionnaire respondents to STIKOM Tunas Bangsa Pematangsiantar students. From the results of this study, it was concluded that (A1) Cost Expenses with a value of 1.0238. For further research, criteria and alternatives can be added, so that the data entered is more varied. In addition, the ELECTRE II method can be compared with other methods. Research as a recommendation for business people who want to enter the world of online business.

012011
The following article is Open access

, , and

Creativity is a potential that is owned by every human being and not received from outside the individual. Human creativity, born together with the birth of the human being. Student Creativity Program is one form of effort carried out by students and lecturers in improving the quality of students' education in universities so that they can apply, develop, and disseminate knowledge, technology and culture and enrich national culture. This study aims to analyze the selection of proposals that are eligible to be submitted to the Directorate General of Learning and Student Affairs, Ministry of Research Technology, and Higher Education through the url https://simbelmawa.risteldikti.go.id using the ELECTRE (ELimination and Choice Expressing Reality) method by using 8 assessment criteria namely Title (C1), Abstract (C2), Introduction (C3), Objective (C4), Method (C5), Results and Discussion (C6), Conclusions (C7), Bibliography (C8). And the results of the study obtained 10 proposals worth submitting from the 15 proposals selected. The results of this study can answer the formulation of the problem and become a recommendation in the selection of the Student Creativity Program which aims to improve the quality of students and improve the value of accreditation for related institutions, especially in the STIKOM Tunas Bangsa environment.

012012
The following article is Open access

, , , , and

The importance of efficiency in the space of search rules C4.5 decision tree algorithm has been the focus of a lot of researchers. Therefore, the development needs to be conducted to form a new, more efficient method but it can not be separated from the accuracy of the analysis as the results of the algorithm itself. For that purpose, by using a genetic algorithm (GA), it is expected to optimize and simplify the search rules of more complex combinations. The use of C4.5 with Hybrid genetic algorithm in search of a more effective rules requires a better understanding and a long time. But the use of the two algorithms will be mostly effective if the cases faced are very complex, having more branching condition and highly accurate.

012013
The following article is Open access

, , , , , , and

In this study, we will discuss the development of import values in general based on the main country of origin in units of net weight (tons). The import value to be discussed is focused on the value of imports in North Sumatra Province, whose data is obtained from the Central Bureau of Statistics in 2009-2014. The algorithm that will be used to see and measure the level of development of import values is the backpropagation algorithm. This algorithm is one part of the Artificial Neural Network algorithm that is quite reliable in solving problems related to times series data. With the backpropagation algorithm, 5 architectural models will be formed that will be used to measure the level of development of import values, namely 4-12-1 architectural models, 4-15-1 models, 4-18-1 models, 4-19-1 models and model 4-20-1. From the 5 models, one of the best that will be used as a reference to measure the development of import values will be chosen. After analyzing the best models were obtained 14-19-1 with the level of truth produced more than 90%. With this architectural model, calculations will be made on the level of development of import values based on the main country of origin for 2015 to 2020.

012014
The following article is Open access

, , , , , , and

The development of livestock agribusiness includes all activities that begin with the procurement and regulation of production and marketing suggestions. With the many types of livestock found in Simalungun Regency, Indonesia should be able to increase the potential for livestock agribusiness development. In this study, the authors will analyze the best architecture that can be used to predict the number of livestock populations according to the type of livestock in Simalungun District Indonesia so that certain parties can make improvements to the development of livestock agribusiness in Simalungun District Indonesia. In this study, there are five 5 architectural models namely, 3-5-1 architecture, 3-6-1, 3-7-1, 3-8-1, and 3-9-1. Of the five architectural models, the best architectural model is 3-7-1 with 75% accuracy and 1693 epoch. While the error rate is 0.001-0.01. It is expected that this architectural model can help academics in the process of predicting the number of livestock populations in Simalungun Regency in the coming year.

012015
The following article is Open access

, , , , , and

The problem of poverty is a fundamental problem that is of concern to every country. The Indonesian state has established a poverty reduction program as the main program. Poverty occurs in urban and rural communities. This research raises the problem of poverty in rural communities. The contribution of research to the government is to predict the per capita income of rural communities according to the poverty line based on the future provinces. The data used is data from the National Statistics Agency. These data are 2015 semester 1 data up to 2018 semester 1. The algorithm for its completion uses the artificial neural network backpropagation method. Input data is 2015 data for the 1 to 2017 semester 2. The training and testing architecture model is 4, namely 6-2-1, 6-3-1, 6-2-3-1, and 6-3-2-1. Target data is 2018 semester 1 data. The best architectural model is 6-2-1 with 79 epoch, MSE 0,004801 and 100% accuracy rate. From this model, a prediction of rural income per capita in the poverty line is based on the provinces of each province in Indonesia.

012016
The following article is Open access

, , , , , , and

The purpose of this study is to see the development of the volume (value) of exports and Imports of oil and gas in Indonesia in the form of estimated results for the coming years. Research data was taken from the Central Statistics Agency and the Indonesian Customs Service. Data is divided into 7 variables, namely; In the year, crude oil exports, crude oil Imports, oil exports, oil Imports, gas exports and gas Imports. The application of the method for estimating the volume of Crude Oil, Oil Products and Gas export Imports is the ANN backpropagation algorithm with 4 network architectural models namely; 12-5-1, 12-8-1, 12-10-1 and 12-14-1. The best network architectural model is 12-5-1 with an accuracy of 83% and MSE 0.0281641257. The minimum error used is 0.001-0.05 with a learning rate of 0.01. While the activation function used is bipolar and linear sigmoid with gradient descent training function.

012017
The following article is Open access

, , , , and

Life expectancy is the average number of years of life that is still lived by someone who has reached a certain age. Life Expectancy is a tool to evaluate government performance in improving the welfare of the population in general and improving health status in particular. The purpose of this paper is to estimate the life expectancy of the world population so that the government has a benchmark in determining policies to further improve the health and health of the people in their respective countries. The estimation stated in this paper will use the Cyclical Order Weight Neural Network method. The data used in this paper is the number of world population expectations. Data sources come from the United Nations: "World Population Prospect: The 2010 Revision Population Database". The results of this study are expected to be a reference for the governments of each country to pay more attention to the level of health and welfare of its population so that the life expectancy of the population will be higher. This study uses 5 architectural models. Of these 5 models, the best architectural model is 3-5-10-1 with an accuracy of 97% and an MSE value of 0,0008358919.

012018
The following article is Open access

, , , and

The internet is now a primary need for its users. According to the e-Marketer market research institute, there are the top 25 countries with the most internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users, it is expected to be able to contribute to advancing the economy and education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict in the coming years so that the government can provide adequate facilities and infrastructure in order to compensate for the growing number of internet users and as a precaution when there is a decrease in the number of internet users. The data used in this study focus on the data on the number of internet users in 25 countries in 2013-2017 sourced from the Indonesian Ministry of Communication and Information. The algorithm used is the Backpropagation Neural Network. Data analysis was performed using Artificial Neural Network method using Matlab R2011b. This study uses 5 architectural models. The best network architecture produced is 3-50-1 with an accuracy rate of 92% and the Mean Squared Error (MSE) value is 0.00151674.

012019
The following article is Open access

, , and

Randomized quasi-Monte Carlo (RQMC) method is presented to compute the problem of a barrier option pricing. It is assumed that stock prices are modeled with a fractional Brownian motion (FBM). The FBM is a Gaussian process with dependent and stationary increments except H = ½. The FBM can model stock prices with short or long memory. We propose a trajectory generation technique based on fast Fourier transforms to simulate stock prices modeled by FBM. A stock price trajectory is utilized to predict pricing of barrier options. Barrier options are options whose payoff function depend on the stock prices during the option's lifetime. Using the results of the stock price trajectory and RQMC method can be determined the price of a barrier option under FBM. We conclude that RQMC is an efficient technique for calculating the price of barrier options rather than a standard Monte Carlo (MC).

012020
The following article is Open access

, , , , , , , , and

To improve patient care requires intelligent and better Health Care, where it collaboration between many people is needed and resources. The use of data together by each agency needs to be done, to avoid repetition when doing data entry. In smart hospitals patient data can be received in real-time at various offices in smart hospitals or even smart hospitals in villages and towns. Medical technicians, nurses, and doctors and patients can also have access to test data without losing time in physically transferring the same information from different hospitals to another hospital. Implementation of IPV6 as a tool for the numbering of regional region and region class of hospital services, where the type of hospital in Indonesia itself consists of 5 classes of hospitals. The results in this research are IPV6 can be applied to patients who provide location information, which is integrated with the patient's social media or can be tracked using GPS, patients will be very helpful in utilizing better hospital service facilities, the patient data in a shared database can be assessed jointly by the authorized party, in this case the hospital or the doctor handling of the patient is referred to and can be done more optimally.

012021
The following article is Open access

, , , , , and

Illegal fishing which until today is still a very serious attention by the government due to resource depletion can lead to fish in the EEZ of Indonesia. It was due to conduct surveillance in Indonesian waters is difficult where Indonesia is an archipelago with a lot of beaches. Wireless Sensor Network (WSN) used for monitoring, tracking and controlling short distance and long distance. Wireless Sensor Network The randomized in a particular region to get comprehensive information. However, namely the possibility of data collision will occur in the data transmission process if performed simultaneously. So the application of methods of TDMA (Time Division Multiple Access) as a channel access method for networks together, allowing users to be able to share signals with time slots that are not the same in sharing the same frequency channel. Smart fishing Vessel Monitoring function for handling the problem of illegal fishing, where the latter any fishing vessels will be monitored from the location, the number of crew, cargo and fishing licenses.

012022
The following article is Open access

Cervical cancer becomes a major cause of cancer deaths in women around the world. The objective of this study is to provide a comprehensive analysis of different data mining methods to diagnose the malignant cancer samples. Different data mining algorithms (SVM, Naïve Bayes, and KNN) has been applied on four different medical tests (Biopsy, Cytology, Hinselmann, and Schiller) as four different target variables. The attributes influence the disease most is extracted since the disease has no symptoms in the early stage. The extraction involved over 32 attributes and two different algorithms such as Correlation-based Filter (CFS) and Random Forest. The results showed that the performance of Naïve Bayes classifier outperforms other classifiers after evaluation using 10-fold cross-validation method in R environment. In addition, the use of attribute selection has been proved not only can select the highly important attributes but also to increase the performance of all classifiers on cervical cancer dataset. In this study, the work reveals the classifiers can effectively achieve the best performance with the least number of highly important attributes.

012023
The following article is Open access

, , and

Backpropagation method is an artificial neural network method that is often used for prediction. However, the use of activation functions and training functions greatly affects the accuracy of a prediction. In this study will discuss the backpropagation method by applying the activation function of Sigmoid bipolar and linear to predict population growth in Simalungun regency, Indonesia. The purpose of this paper is to look at the level of population growth in the district so that the government has a benchmark in determining policies so that a surge in population growth can be minimized and that the government pays more attention to the level of welfare of its population. As for academics, this research can be used as input if you want to do a prediction or forecasting with different cases. The data used in this paper is population density data in Indonesia's Simalungun district, which is sourced from the Simalungun regency statistics center of Indonesia. This study uses 5 architectural models, namely 3-5-1, 3-10-1, 3-5-10-1, 3-5-15-1 and 3-10-15-1. Of these 5 models, the best architectural model is 3-5-10-1 with an accuracy of 97% and an MSE value of 0.00034833. Minimum Error 0,001-0,01 and learning rate 0,01.

012024
The following article is Open access

, , , , , and

Early detection and proper management of Chronic Kidney Disease (CKD) are solicited for augmenting survivability due to fact that CKD is one of the life-threatening diseases. The UCI's CKD dataset which is selected for this study is consisting of attributes like age, blood pressure, specific grativity, albumin, sugar, red blood cells, plus cell, pus cell clumps, bacteria, blood glucose random, and blood urea. The main purpose of this work is to calculate the performance of various decision tree algorithm and compare their performance. The decision tree techniques used in this study are DecisionStump, HoeffdingTree, J48, CTC, J48graft, LMT, NBTree, RandomForest, RandomTree, REPTree, and SimpleCart. Hence, the results show that RandomForest serves the highest accuracy in identifying CKD.

012025
The following article is Open access

, , , and

From the performance measurement of the two algorithms that have been done based on the amount of data, it can be concluded that ID3 algorithm has better performance (precision, recall, and accuracy) than C4.5 algorithm. The performance measurement of the two algorithms based on the number of attributes indicates that the ID3 algorithm has better performance (precision, recall, and accuracy) than the C4.5 algorithm. Overall, From the experiments that have been carried out it can be concluded that ID3 has a better performance than C4.5 algorithm. Performance measurement of a data mining algorithm can be done based on several criteria such as accuracy of prediction, speed / efficiency, reliability, scalability and interpretation. In this study the authors suggest using the ID3 algorithm method.

012026
The following article is Open access

, , , and

The length of the plaintext affects the round trip time, where the longer the plaintext, the longer round trip time. In an attempt of 35 plaintext characters obtained 1.171 ms round trip time. Whereas on an attempt of 113 plaintext characters obtained 2.355 ms round trip time. In Figure 2 can be seen the graph increase of the round trip time. The author concludes that the length of the plaintext affects the round trip time in the client server based AES algorithm. The longer the plaintext, the longer the round trip time process will run.

012027
The following article is Open access

, , , , , , and

Small Industry is an industrial company whose workforce consists of 5-19 people. While the Micro Industry is an industrial company whose workforce consists of 1-4 people. The purpose of this study is to estimate the Production Index of Micro and Small Industries according to KBLI for years to come. KBLI is a reference classification used to classify Indonesian economic activities/activities into several business fields/business fields that are distinguished based on the type of economic activity that produces products/outputs in the form of goods and services. In this study, the estimation method used is the Bayesian Regulation Algorithm. This algorithm is one of the Artificial Neural Networks algorithms that can solve many estimation problems by building a trained model and showing good performance. The data to be estimated in this study are data of Micro and Small Industry Production Index according to KBLI processed from the Central Board Statistics of Indonesia. This study uses 3 architectural models, namely: 5-10-20-1, 5-15-30-1 and 5-20-40-1. The best architectural model is 5-10-20-1, resulting in 83% accuracy, MSE 0.0031434897 with a minimum error of 0.001 - 0.05.

012028
The following article is Open access

, , , and

The use of the Three-Pass Protocol method in exchanging secret text messages is one effective method because the two interested parties do not need to use a single key to open the message sent. But there is a possibility that the message cannot be described because the cipher used is not suitable. The purpose of this study is to show whether the Affine Cipher Algorithm with One Time Pad Cipher using the Three-Pass Protocol method can be used to encrypt and decryption the text message.

012029
The following article is Open access

, , , , and

Expert system for the diagnosis of eye diseases in humans using forward chaining method aims to trace the symptoms that are displayed in the form of questions in order to diagnose the type of disease with the software. Expert system software can recognize the type of eye disease after consultation with answering some of the questions that is displayed by the application of an expert system and can infer some kind of eye disease suffered by the patient. Data recognizable disease customize the rules are made to be able to match the symptoms of eye disease and give value to determine the percentage of the value of the patient's disease type approach

012030
The following article is Open access

, , , , and

Lately more IoT use of devices both used at home, disaster prone, hospitals, highways and government agencies and many other places that use IoT device for data acquisition in realtime therefore the authors want to examine the security of IoT devices that is increasingly being used by utilizing OTP codes sent by smartphone devices or GSM modules to keep IOT devices from people who want to exploit the IoT device.

012031
The following article is Open access

, , , , , and

Classification is a method of data analysis that is used to create models that describe data classes that are considered important. For the classification of the classification process, the data used is THPS Visitor data which consists of 4 classes including Education, Gender, Age and Visit. The classification used as a comparison of results is the Naive Bayes Classifier. By classifying the number of visitors who are most dominant visiting by age category consisting of adults, adolescents and children. This study aims to classify the highest number of values for visitors by age category. This study was reviewed using the Naive Bayes algorithm. The results of this study indicate that the visitor data that is the most dominant visiting by age category is children who have 77% accuracy is the age of children. This accuracy value is the age that most often visits THPS.

012032
The following article is Open access

, , , and

To Improve the student skills in learning is constitute hope of every lecturer. For/In computer base-study programme master of programming is needed. the Algorithms and Programming are basic course that must be studied. Mean while/that for, using the backpropogation methods which is part of the Artificial Neural Networks will test and train data by using the backpropogation algorithm to improve students ability to understand the subject. The result obteined can be analyzed about the results if the output is that the closed to the target then the trainning process can be finished. Furthermore/Hereafter, The average error can be calcutate obteined from the result of the trainning that has been carried out. If the results have not reached then the backpropagation method always do iteration with make to update weignt until maximal output and can to get output of exelent with used backpropagation method.

012033
The following article is Open access

, , , , , , and

Disaster is a series of events that threaten and disrupt human life caused by natural factors, non-natural factors and human factors themselves. Therefore, disasters cause casualties, environmental damage, property losses, and psychological impacts. In this study will be discussed about the prediction of the number of victims affected by the disaster, either died, lost, injured, suffered or displaced. Data sources were obtained by the National Disaster Management Agency and the Indonesian Central Statistics Agency. The method used to predict is the Incremental Sequential Order method. This method is one part of the Artificial Neural Network method. With this method, network architecture patterns will be established to predict the number of victims affected by the disaster for years to come. The network architecture models used are 4-5-1, 4-10-1, 4-5-10-1, 4-10-20-1 and 4-15-30-1. Of the five models, the best models will be obtained, namely 4-15-30-1 with an accuracy rate of 80%. With this architectural model, predictions will be made on the number of victims affected by the disaster for years to come.

012034
The following article is Open access

, , and

One of the problems in this field of communication is the insecurity of messages sent across computer networks. Even though sometimes the contents of a message can be something that is sensitive and prone to abuse. One method that can be used to overcome this problem is by using a combination of cryptography and steganography. In this research, an add-on menu for Mozilla application was developed to secure messages to be sent via e-mail using Hill Cipher's cryptographic method on messages and insert them using steganographic pixel value differencing method on image files to be extracted and returned to the form originally. The results of this study indicate that with experiments using messages with length and image file extensions that are also different, namely. bmp, .jpg, .png, and .gif can insert the initial message into the image file and be returned to its original form with a maximum length limit message 1000 characters and no manipulation of the image file from the insertion message.

012035
The following article is Open access

, , and

Export of CPO and its derivative products is one of the biggest revenues for Indonesian foreign exchange. Through this research, predictions of foreign exchange earnings from CPO exports are made using backpropagation artificial neural networks. The data used in the form of export data for the period September 2013 to December 2016. The final results of this research using epoch 10000, learning rate 0.2, and hidden layer 10.

012036
The following article is Open access

, , and

One technology that can be applied in hydroponic farming systems is sensing. Sensors used in this research are pH, electrical conductivity, water level, and temperature sensor. The First Come First Served (FCFS) algorithm is used to help scheduling data plotting. In order to be serviced by the processor, data entities in the queue must wait until all previous processes have been completed. The final test results show that the average success of the system succeeded in activating the actuator to operate the feeding was 92.5% and operating the heater to warm the water temperature was 83.33% for the 720-hour testing period. All sensing data also successfully plotted in graphical form for each of the results of sensing the pH value, water temperature, and electrical conductivity in water.

012037
The following article is Open access

, and

Data Envelopmemt Analysis (DEA) serves to assess efficiency in the use of resources (input) to achieve results (output) whose purpose is to maximize efficiency. DEA was first introduced by Charnes, Cooper dan Rhodes in 1978. DEA is a nonparametric approach which is basically the development of Linear Programming (LP). The characteristic of DEA CCR model is that it allows the DMU to measure the maximum efficiency value with the most favorable weight. The efficiency of the DMU obtained differs from the different sets of weight may not be comparable and rank on the same basis. In DEA model optional sets of input weight and output weight are usually assumed to represent the DMU that is considered the best to compare with all DMUs. This set of weights is usually different for each DMU. In this journal to determine the set of weights in the DEA is performed with a linear programs. After the linear program is determined, the value of the output weight and input weight is solved using the software POM-QM for Windows.

012038
The following article is Open access

, and

This paper discusses the nurse scheduling model with work shifts and work locations. In general, scheduling is a very complicated problem and often occurs in agencies that operate 24 hours a day, one of which is a hospital whose mission is to provide maximum patient health services. Scheduling nurses with work shift and work location can have a positive impact, namely the efficiency of time and work effectiveness so that it is very important in optimizing human resources to be able to improve their quality. The goal is to design a nurse scheduling model with work shift and work location with the objective function of minimizing the number of nurses working in the hospital by paying attention to the constraints associated with the regulations of the hospital so that the nurse's schedule is fair. This model is solved by the Integer Linear Programming (ILP) method, it is hoped that it will be better and can overcome the difficulties in manually scheduling.

012039
The following article is Open access

, and

Vehicle Routing Problem (VRP) is a problem of determining the route by minimizing the number of vehicles used to minimize the total mileage of a vehicle to deliver an item to a customer that starts from a depot and ends at the depot. VRP relates to the distribution of goods, people, information, vehicles and roads. All customers must be visited only once and by one vehicle must not exceed the capacity of the vehicle. VRP varies due to real life constraints related to the type of vehicle, number of depots, conditions, transportation, and time period. Among them the problem of a heterogeneous vehicle fleet is a type of VRP whose vehicles have different capacities and costs, besides different vehicles also have a Split Delivery variation where customers can be visited by one, two, three or even four vehicles. This is due to the capacity constraints possessed by each courier, as a result if the first courier is unable to complete all orders from the customer then the order delivery can be continued by a second courier or other courier who also crosses the route from the customer. The aim is to minimize vehicle fixed costs and transportation costs. Where the problem is, each customer will get at least one delivery. capacity limit for each vehicle and determine the number of vehicles to be used in the delivery of goods. To find a solution to this problem, the Integer Linear Programming (ILP) model is used. The solution obtained is an optimal solution that minimizes the objective function and fulfills all constraints or constraints made. The results obtained show that the model created produces a distribution route with a minimum total distance.

012040
The following article is Open access

, and

The problem of evacuation is very important when a disaster occurs. Evacuation must have systematic planning and good calculation. The planning is related to determining the route and flow of the vehicle. The shortest route problem is a matter of how to travel from one point of source through the paths to the destination with the shortest distance. The shortest path is the minimum trajectory needed to reach a certain point. In addition to the trajectory that has passed the shortest route, it needs to be taken into account about the maximum flow of a network. The maximum flow problem aims to maximize the movement of a number of items or objects through certain paths from the point of source to the end point. In this paper, in the future a model of vehicle movement will be developed to evacuate victims with maximum flow and through the shortest evacuation route by taking into account the paths to be followed in order to implement an effective evacuation process.

012041
The following article is Open access

, , and

During this time to find out the volume of Crude Palm Oil (CPO) in the palm oil mill, it was monitored every day on the vertical tank manually using a sounding meter. Monitoring data taken manually is less accurate and requires more time and manpower. So that this weak monitoring data can cause losses if there is oil loss in the tank. Therefore, research aims to help control vertical tanks and can detect any loss of CPO that can harm the company. This research uses data obtained by an ultrasonic sensor connected to a microcontroller and installed solenoid valve on the tank discharge faucet. Data received by the microcontroller is then sent to the server and then stored in the database to be retrieved visually on the monitoring system dashboard. The test results show that the system built can facilitate monitoring of CPO volume in vertical tanks.

012042
The following article is Open access

and

After carrying out the manufacture of prototypes and desin from the robots that carry goods, it needs to be developed into the actual robot making so that dpat can be implemented with a real goods lifting robot so that it can be useful for the survival of the academic activities. The academic activity here is to lift goods in this case is a book or file from the third floor corner to the academic bureau room. With various tests have been carried out so that later the work of this tool is expected to operate properly in accordance with the wishes of the researcher. With the right analysis and calculation, this tool can lift items with a maximum weight of 5 kg and all items or items that are lifted can be placed in the designated place at the top of the robot. Control of the smartphone can move the robot so that it reaches the destination. The voice command is inputted to the smartpone that has been connected to the Arduino Uno system so that it can command the robot with a forward, backward movement, turn left and turn right. The control system is centered on the Arduino Uno microcontroller that has been loaded with a program to run this tool or robot. Research has succeeded in making robots designed according to the work and the desired system to help work in the lifting of goods.

012043
The following article is Open access

, , , , , , and

Illiteracy is one of the serious problems experienced by Indonesia. The lack of care from the government and the private sector towards illiterate people makes the illiteracy rate quite high. Because of this, this problem must be one of the government's targets going forward, because directly or indirectly illiteracy plays a role in increasing the number of poverty in Indonesia. The purpose of this study is to predict the percentage of the illiterate population in Indonesia according to the age group 15-44 years because this age group category is a productive age. The results of this prediction are expected to be a reference and benchmark for the government in determining and making policies to reduce illiteracy rates. The data that will be predicted is the illiteracy rate data for each province in Indonesia sourced from the Indonesian Central Bureau of Statistics from 2011 to 2017. The method used for prediction is Backpropagation Artificial Neural Network. Data analysis and calculation were carried out with the help of Matlab and Microsoft Excel software. This study uses 5 architectures, 4-5-1, 4-6-1, 4-9-1, 4-14-1 and 4-18-1. Of the five models, the best network architecture is 4-14-1 with an accuracy rate of 91% and the Mean Squared Error 0.00274166. Using this 4-14-1 network model, a prediction on the percentage of illiteracy in Indonesia will be calculated for 2018 until 2020.

012044
The following article is Open access

, and

Let G be a finite simple graph and A be the adjacency matrix of G. Then each row of A is a bit string of finite length. Hamming distance between any two rows of A is defined to be the number of positions with different digit. For any two vertices vi and vj in graph G we define Hamming distance, generated the adjacency matrix A, between vi and vj as the Hamming distance between rows of A corresponding to the vertices vi and vj. The Hamming index of the graph G is the sum of Hamming distances over all distinct pairs of vertices vi and vj in G. This paper discuss Hamming index of finite simple graphs. We present a formula for Hamming index of graphs in terms of known parameters of the graph namely the number of vertices, the number of edges and the degree of each vertex. We then apply the formula to determine the Hamming index for some graph operations.

012045
The following article is Open access

, , , and

This study describes the Fuzzy Logic Control for the movement of Solar Cells that use fuzzy logic algorithms to achieve intelligent and flexible knowledge-based systems in the design of hardware to achieve efficiency in controlling the movement of solar cells that are better and maximize the function of the solar cell motor works based on time input. Fuzzy Logic allows mapping from the input given based on time to an output. involves components of variables, membership functions, Fuzzy Logic operators and if-then rules. And with an analysis it can produce optimum output of Solar cell rotation.

012046
The following article is Open access

, , , and

In entering competition the quality and predicate best the national and the quality of graduates, college trying to use information technology as an instrument for might win this competition. That IT can be used to fulfill and support the system in college, it needs assessment from information technology regularly. One method of conducting evaluation of the performance of the department of information technology is to use the framework Cobit 5 as yardstick efficiency in the use of information technology currently consisting of 5 (five) domain namely: EDM, APO, DSS, MEA A measuring instrument his as. With this method, researchers trying to make it a blueprint as the end result of utilization of information technology in college, so the management can plan exactly how of development of information technologies company to the next few years. An evaluation, known level capabilities inside the area mea and APO is entirely located at the level of 1 (performed) with the level of the target to be achieved is the level of 3 (established). Weakness governance information technology in STMIK Pelita Nusantara Medan is the lack of formalization rules and procedures management information technology. To reduce the gap between capability the current level was level and capability to be achieved, so STMIK Pelita Nusantara Medan must meet PA2.1, PA2.2, PA3.1 and PA3.2, that capability the current level was that is at the level of 1 could rise to the level of 3. Along with that, STMIK Pelita Nusantara Medan moved closer to the purpose..

012047
The following article is Open access

, , , and

Increasing technology in digital encourages the human to create computer aplication to process two-dimensional data (Citra). Image retrieval that is the form of test files uses CCD cameras with a fairly expensive price, such as CCTV cameras. In this research, the author uses the methods thresholding and region merging to correct the answer sheet with a tool Webcam that the form of Image and it is procesed for correction the answer multiple choice. in this study, the author focuses on the application of the thresholding method in which the purpose is to classify the gray degree value into two, namely black and white. the application of the region merging method is the process of combining regions less than the threshold. The use of webcam, thresholding methods and merging region is expected to facilitate all circles of agencies, especially in the education field in the correction sheet answer. It can increase the output of quality teachers.

012048
The following article is Open access

, , and

In open vehicle routing problems, the vehicles are not required to return to the depot after completing service. In this paper, the problem is extended by considering the reliability of the fulfillment of customer demands. Each customer has a demand and each customer is necessarily to be served by a single vehicle and no vehicle may serve a set of customers whose total demand exceeds the vehicle capacity. Each vehicle route must start at the depot and after serving the last customer it is not necessary for the vehicle to return to the depot. The objective is to determine the set of vehicle routes that minimizes the total costs, with chance constrained to guarantee that customers' demand is satisfied. We solve the stochastic model using sample average approximation approach.

012049
The following article is Open access

, , and

The hub location, regarded as a special variant of facility location problem. can be defined as an assignment problem of locating hubs and assigning the terminal nodes to these hubs. The objective is to minimize the cost of hub installation and the cost of routing the traffic in the communication network. There may also be capacity restrictions on the amount of traffic that can transit by hubs. This paper discusses how to model the polyhedral properties of the problems and develop a feasible neighbourhood search method to solve the model.

012050
The following article is Open access

, , and

The main concern of this paper is to decide the locations and allocations of facilities that impact not only the profitability of an organization but the fast ability to serve customers. Generally the location-routing problem is to minimize the overall cost by simultaneously selecting a subset of candidate facilities and constructing a set of delivery routes that satisfy some restrictions. In this paper we consider the periodic routing of vehicle to be used to distribute goods. Integer programming model is built to solve the problem. A feasible neighbourhood search is developed to solve the result model.

012051
The following article is Open access

, and

Model-based estimates have been developed in statistics. Often, the statisticians use the data that obtained through complex sampling designs for estimation. If the probability of inclusion in the sampling design is informative, then the informativeness of sampling must be taken into account in the estimation process. We extended the nested error regression model at the unit level by adding the probability of inclusion as a covariate in the model but with an unknown functional form to reduce the informativeness effect. This extended part in the model is then approached using a penalized spline function. In the mixed model framework, we derived the EBLUP estimator for the mean areas of population. A simulation is given to applying this approach by using the first order of the p-spline function. The RMSPE value and the average absolute bias value obtained through the use of the bootstrap method then compared with that results from the approach using the nested error regression model.

012052
The following article is Open access

, , and

The transmission of infectious disease in epidemiological models usually is based on the assumption that population within random-mixing. Although medical developments can reduce the consequences of the spread of infectious diseases, prevention of plague remains a major toehold. After a model is formulated containing the main fitur the development and transmission of infectious disease, onward to the model can be used to predict, making eradication strategies, control or prevent the spread. Modeling the spread of the disease has the potential to improve the quality of human life. The social life of humans far more complex exceed a diverse population. The transmission dynamics of infectious diseases is sensitive to patterns the interaction between the individual vulnerable (susceptible) and contracted (infectious). Human social contact very heterogeneous group. To predict the impact of this pattern against the transmission of infectious diseases, the use of epidemiological random network model, where the nodes serves individuals exposed, contracting or cured and connectedness presents contact transmission. Type the model spread (epidemic) that examined the model type is exposed, tetular exposed, and cured, or better known as a type of SIRS.

012053
The following article is Open access

, , and

Hospital management information systems are very helpful in carrying out services to customers. In this study, problems were found regarding the process of presenting the results of radiological image data that have not been facilitated throughout the patient's examination room. The slow results of radiological image data, especially for immediate results (CITO) in emergency department services have not been facilitated due to having to wait for the results printed. The results of reading radiological images (expertise) are waiting to be printed first. To solve this problem, a research was conducted focusing on the development of the Radiology Information System (RIS) information system model and Picture Archiving and Communication System (PACS). The development of this system is analysed using the KANO method to classify the expected system menu needs attributes. The test results get the percentage of better value higher than the worse that is 9.81 which means that it can be known attributes that greatly influence the increase in customer satisfaction if these attributes are not fulfilled, the disappointment level is very high, but the implementation stage is not optimal so that future research can present results better research.

012054
The following article is Open access

, , and

Selection of qualified prospective students is very important for schools to be able to achieve successful learning in school. Problems will arise if the school is wrong in choosing students who are not in accordance with their abilities. The admission selection process for prospective students in Bintaro Informatics Development Vocational School still uses manual method in calculating grades. Determination of the weight of each criterion is also not used optimally, giving rise to difficulties in selecting prospective students based on their talents and abilities. Schools need a decision support system that can help in making decisions to select new students according to their talents and abilities. The system designed using the Simple Additive Weighting (SAW) method is used for ranking, and to determine the weighting using the Analitycal Hierarchy Process (AHP) method. The results of the calculation of the two methods can select prospective students who are accepted in school more precisely and accurately in accordance with the abilities and expertise of students.

012055
The following article is Open access

, , and

SMK Nusantara 1 Ciputat is a vocational high school that has seven vocational schools including: Multimedia, Software Engineering, Computer and Network Engineering, Marketing, Accounting, Catering and Hospitality Services. To improve the quality of education in schools, principals are required to know information about the performance of educators in their schools. At present, the Ciputat 1 Vocational School principal has difficulty in making decisions on teacher performance appraisal because there is no weighting on teacher performance appraisal competencies that refer to Minister of National Education Regulation 16/2007 concerning Academic Qualification Standards and Teacher Competencies. Therefore, the AHP method is used to determine the weight of teacher competency and TOPSIS is used to produce a ranking on teacher alternatives according to the weight of the competencies determined by the AHP method. The results of weighting teacher competency with the AHP method have tested the consistency of the ratio of 0.088, this value is said Consistent because it is still below 0.1. Based on the weighting of the teacher's competency, an alternative ranking is obtained in the assessment of teacher performance using the TOPSIS method with the highest teacher's alternative value of 0.8052.

012056
The following article is Open access

, , , , , , , , and

Decision Tree is a classification technique in data mining that aims to predict behaviour from database. This goal is supported by several algorithms, one of which is Iterative Dichotomiser 3 (ID3) that displays predictions in a tree structure. With the application of decision trees, warehouses or heaps of data can be processed so as to produce rules or decision trees as decision support in solving problems faced by agencies. In fact, the information or rules produced by decision trees are limited to rules using the logic of propositions. The challenge in making decisions on decision trees is how to determine algorithms with a high degree of accuracy from various algorithms in the decision tree and how to find support and confidence for each rule produced by the decision tree to add support value and confidence level of each rule produced. The resulting rule has weaknesses, namely the unavailability of support and confidence, all rules are considered equal in strength based on data before being processed, found records that vary or different amounts of data. By making support and confidence, it will be easier to make decisions based on the results obtained.

012057
The following article is Open access

, , , , , and

Consumer purchasing patterns are a form of purchases made by consumers, whether someone or a lot of people to get the desired item by making a purchase transaction. One characteristic of the purchase pattern is the existence of acquiring something through exchanging money. This study aims to create an application that is used in determining consumer purchasing patterns by applying a priori algorithms and using Visual Basic 2010 as a tool for determining consumer purchase patterns. This application uses a priori algorithm calculation method where the sample consumer purchase data will be sorted and calculated by providing the value of the minium support and configuration parameters and based on the results of confidence the largest number of conclusions such as: can be used as information for determining sales, the application of a priori algorithms can provide information pattern combination item set from consumer purchase data that is with support above 15% and confidence above 50% on item set.

012058
The following article is Open access

, , , , , and

Digital Dictionary of Computer and Network Engineering can be used in the learning process of computer and nerwork enginering students. Dictionaries are generally book-shaped is hard to carry because of their thick and heavy, now can be accessed anywhere by development of web technology. Digital dictionaries can be accessed through computers, laptops dan cellphones, this is make student easily in learning process. The digital dictionary can not only be used by students of computer and network engineering, but can also by general public, as long as you have an internet connection, anyone can be use this digital dictionaries. The main process in this digital dictionary is the search process. Binary search algorithm used in the search process of binary search algoritm. Binary search algoritm search is applied to word search in this digital dictionary, because this algoritm is intended for sequintal data. Program language that will be used to build this digital dictionary is PHP and MySQL.

012059
The following article is Open access

, , , , , and

Photocopying machines are machines that make paper copies of documents and other visual images quickly and cheaply. PT. TRITANU has a copy machine product, such as the Fotocpy Sharp machine Type B201D. The rapid development of photocopying technology at this time can be seen that adult photocopying machines are now not only operating copier but can scan, print, and even fax. The rapid development of photocopying technology does not necessarily provide complete convenience to users. This can be seen from the high cost of consultation in the event of damage to the photocopy machine, requiring time to check the damaged machine, and not to mention other procedures in the repair that exist at PT. TRANANU. So from to provide solutions to these problems, the researchers made an Expert System for Handling Print Results Problems on Sharp Photocopying Machines Type B201D Using the Certainty Factor Method. System testing shows that the system is able to diagnose damage to the B201D copy machine based on the symptoms in the printout, even though these symptoms contain uncertainty. The results of the diagnosis are accompanied by Certainty Factor values that indicate the level of truth, accuracy of possible damage to the B201D copy machine.

012060
The following article is Open access

, , , , and

Implementation of Data Mining with various methods will generate new knowledge and information in the form of rule which is very useful, but in implementation of data mining experience some weakness in data processing process. One weakness is that not all variable data can be easily processed, if the data is processed has a numerical value or data in the form of numbers then the division of classification is very difficult to do. If the classification of data is so many variables then the branch on the decision tree is also very much and result in less accurate results of rules or knowledge generated. MD Heuristic method can be used to classify numerical data or numbers that have a large range of data. By implementing the MD Heuristic Method in classifying the data in numerical form it can easily classify the data to make the data classification more precise and accurate, by calculating and averaging between the upper and lower bounds of the large data set. The use of MD Heuristic can facilitate preprocessing data with decision tree algorithm C4.5. The result of this research is detainee data at Labuhan Deli Detention Center, that is the data of age of detainee can be classified with more accurate to facilitate in process of data and more shorten rule or knowledge in result of decision tree image.

012061
The following article is Open access

, , , and

The value of concrete compressive strength based on several methods of acceptance requirements of concrete in Indonesia to obtain a more economical concrete quality is recommended using SNI 03-2847-2002 rules as a reference in the evaluation and quality control of concrete. Fuzzy logic is different from ordinary digital logic, where the usual digital logic only recognizes two condition that is "yes" or "no". While Fuzzy logic imitate the way of human thinking by using the concept of the pseudonym of a value. the Mamdani type and Sugeno type is resulted in the same decision, although there was a difference in the calculation of the final result but still within the same range of manual calculations with the calculation with the help of MATLAB. Both fuzzy can be applied in determining the quality of concrete because it produces the same decision. Although both fuzzy method can be used in determining the quality but the more recommended is the Mamdani type because Mamdani type result of calculation is closer to the actual result, and while there is input change is entered then the end result will change but Sugeno type while input change value is not too big the change then the end result also there will be no change.

012062
The following article is Open access

and

Forest management planning is placed not only on managing timber production but also on maintaining forest ecosystem values, such as water preservation. Thus, the meaning of sustainable forest management has broadened from sustainable timber management to ecosystem-based multipurpose forest management. This paper discusses the need to preserve water by forest in such a way the water will flow to rivers to be used as a resource to generate hydroelectric power plant. The problem is then modeled as a multi-objective integer programs.

012063
The following article is Open access

, , and

Recently, knowledge, as a strategic resource, has become an essential driving forces for business success, in particular in competitive situation. Accordingly, the existence of knowledge management (KM) is to support the business firm to locate, select, organize, distribute, and transfer vital information within the firm. One of the method to increasing effectiveness of knowledge management is to optimize its processes. However, during the process in order to increase the firm performance some disruption may occur. This paper describes a stochastic programming model to optimize the knowledge management processes problem within a firm, considering uncertainty disruption. We adopt scenario generation approach for tackling the stochastic problem.

012064
The following article is Open access

, , , , and

The rapid development of technology has made the game as one of the popular entertainment media ranging from children to adults. Endless Runner games can be interpreted into two things, namely player characters that cannot stop or the game track that continues to run. The Perlin Noise algorithm will generate a Track Generator that continues to run randomly. Procedurally track generators can produce Pseudo-endless tracks, which are commonly used in Endless Runner games. Each track is generated by combining a series of blocks installed with each other, where each block experiences a deformation change in front of it. So that the next block that will be made in accordance with the one behind it thus repeating the process will result in unlimited tracks. Making this Track Generator uses C Sharp programming language (C #) using the Unity 5.5 game engine.

012065
The following article is Open access

, , , , , , , , and

PC computer is a flexible electronic device and can receive and process data quickly and accurately, and can also store data for a long time. There is a time when the PC hardware is damaged. So that it annoys the user. In connection with the problems that occur, the researchers aim to build an Expert System application to diagnose damage to PC computers using the Certainty Factor method by using Visual Studio 2010 applications and using Microsoft Access 2013 as a database. Applications that are built can be an alternative in knowing the type of damage and provide alternative solutions in handling damage to PC computer hardware.

012066
The following article is Open access

, and

Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating system, so the real-time system can be done on Raspberry Pi. The real-time applied in the application needs to be tested with the Nyquist theory. The purpose of this study was to get real-time system measurements available on Windows 10 IoT. This test is done using the Nyquist theory by calculating the results of measurements on mp3 streaming performed on Windows 10 IoT.

012067
The following article is Open access

, , , and

This research is about smooth support vector machine (SSVM) and Decision Tree in data mining. Many researchers conduct and develop methods to improve the accuracy and classification of data on good results. This research was conducted by conducting an experiment on STMIK Neumann Medan student data. In this study, it was concluded that Decision Tree performance is better than SSVM, Decision Tree gets very good results that promise to help find the best students to get scholarships. This study is better than SSVM. The training process has a difference of 11.04% and the testing process is 10.08% with each Accuracy.

012068
The following article is Open access

, , , and

In Indonesia rice is a staple food as a major source of carbohydrates. Rice is also a staple food of the people of most countries in Asia and even most of the population in the world. Food security for Indonesia is closely linked to the adequacy of rice provision. The indicators of national food security are (1) the availability of food every time; (2) the ability or purchasing power of the people towards food; (3) guarantee of distribution and supply of food; and (4) the ability to import in urgent conditions. Rice as a rice-producing crop is a very important commodity for Indonesia, besides being the main food producer, rice commodity is also the main source of income from millions of farmers. The availability of rice at affordable prices to communities is an important factor for national security, security and stability. Indonesia has a large population, the fourth largest in the world after China, America and India. Dependence on rice imports has a high risk not only of food dependency on other countries, but also limited availability of rice in the international market. In 1977 Indonesia imported 2 million tons of rice and accounted for one third of the rice available on the international market, affecting the price of rice. Increased rice production can be achieved through increased productivity with the application of technology varieties and better cultivation and expansion of planting areas with increased intensity of planting and printing or opening of new rice cultivation area. Based on the above explanation, the researcher uses Data Mining Clustering with K-Means to get the assessment result of all rice production provinces. With this method the results of the research can be used as a model of decision makers for the government to give priority attention to areas that have the potential to increase rice production.

012069
The following article is Open access

, , , , and

The electric is one of the needs for human, the growth of the electric power in Indonesia is very increased. There are 13 types of power plants in Indonesia, including to require the fuel in its operational. Fuel consumption needs to be recorded at regular intervals so that the needs of fuel for the power plant remain fulfilled. This research discusses about the predictions fuel consumption based on the type of power plants. The method used is the Artificial Neural Network with the back propagation algorithm. This method is good enough to use in predicting the data. The data used is fuel consumption data based on the type of power plant of the year 2014-2016. The best architecture is 8-23-1 that gets results accuracy of 88%, epoch 6016 iteration and MSE 0.0005509801. From these results then predict using the 8-23-1 architecture is the best architecture.

012070
The following article is Open access

, , , and

The problem of meeting the needs of business and industry towards vocational higher education graduates is a discrepancy between the desired skills and the availability of labor. To meet the needs of competent Human Resources (HR) in business and industry, the implementation of Vocational Education (VE) must be quality or smart. This study formulates the factors that influence the implementation of quality VE, the entities contained in the VE system, building framework of VE system base on dynamic system.

012071
The following article is Open access

, and

A proper strategies in designing and optimizing supply chains can help enterprises to stay competitive in this volatile economy. Identifying various type of products that run through the supply chain and aligning several parts of the supply chain to these product types are considered to be effective strategies adapted by successful companies. In this paper we address an optimal design of a multi-echelon supply chain problem with various commodity that is of significance to the business enterprise, along with the associated inventory systems. By using the guaranteed service approach to model the multi-echelon inventory system, we develop an MINLP model to simultaneously optimize the transportation, inventory and network structure of a multi-echelon supply chain which involve multi commodity. The optimization model is then solved using a strategy of releasing nonbasic variables from their bounds, combined with the "active constraint" method.

012072
The following article is Open access

, , and

In logistic system, a Vehicle Routing Problem with time windows (VRPTW) is defined as a problem to decide the optimal set of logistic routes used by homogeny vehicles to deliver customers' demand within scheduled service time. The objective is to minimize the total travel cost (related to the travel times or distances) and operational cost (related to the number of vehicles used). In this paper we address a variant of the VRPTW in which the time to deliver and the time departing from a customer are restricted. The problem also include service disruption. We use integer programming model to describe the problem. A feasible neighbourhood approach is proposed to solve the model.

012073
The following article is Open access

, , , , and

Measurement error in the data sample human voice from the data 1 to 17 obtain measurement results with the algorithm Advanced Chaos Control and Stabilization through several stages of delivery of the process control and and stabilizing the data to find the value of noise and bias in the initial process control and find the value of precision and accuracy in both the stabilization process. Stable value which must be controlled ranging 58,9922dB and 60,47059dB with a standard value of 60dB.

012074
The following article is Open access

, , and

It is widely acknowledged that energy plays central role to achieving goals of modern society. Many developing countries face population growth that far exceeds planned rates of grid connection, so that many will either remain without energy, or be forced to migrate to urban areas where the infrastructure is already over burdened. However, nowadays the world is plaque with global warming problem due to the energy inefficiencies. This paper describes a plan about how to get renewable energy from the processed whole waste of oil palm. As there are three objectives should be fulfilled, we model the plan using multi-objective programs. The result shows that it is possible to get optimal energy while minimizing the waste created from oil palm.

012075
The following article is Open access

, , and

Micro, Small and Medium Enterprises (MSME) are one of the drivers of Indonesian economy but have problems in introducing their products to the public. In addition, public ignorance of MSME and their products is another problem experienced by MSME. Therefore, a system is needed that can become a forum for MSME to introduce their businesses and display complete information about the MSME business in Medan City, such as a geographical information system that contains a mapping of the shortest MSME routes, estimated distances and travel time to these MSME. This study uses Bellman-Ford algorithm and Euclidean Distance method to map the shortest route to MSME. Based on the testing, a system is obtained that allows administrators to input MSME data and allows users to search for information about a MSME and its address along with mapping the shortest route.

012076
The following article is Open access

, , , and

The need for internet availability today is very important and greatly improved, people are now so dependent on the role of information technology that it has a very important impact. For that purpose there must be a good and efficient internet service provider system that should be economical. The Internet has had a huge effect on the dissemination of information, so that more and more people are accessing data over the Internet. These problems can be solved using MikroTik as a regulator of Internet data bandwidth and filtering sites that can interfere with computer network connectivity and interfere with job performance in accordance with established rules. This research was conducted using several steps, among others: process analysis to determine the traffic flow through the filtering process using Layer 7 Protocols, design to get the most effective and efficient way to implement router, implementation and testing by direct test to the web page or website with web browser. Based on research that has been done using MikroTik Routerboard whose result can fulfill system requirement specially in doing application filtering according to user requirement.

012077
The following article is Open access

, , , , and

At this time, the advancement technology of computer science and telecommunications are developed highly and progressing rapidly. Data security is very important to maintain the important data content of the parties that can harm by destroying important data from the data owner. By improving data security, using a combination of algorithms, it can keep data security more secure than attacks that can harm the content of stored data, especially data in the form of document files and text messaging. The combination of algorithms used for data security used is caesare cipher algorithm and RSA algorithm. So by using a combination of caesar cipher algotitm and RSA algorithm, the security level of document files and text messages can be more awake the authenticity of the data.

012078
The following article is Open access

, , , and

A tour of human activities to relieve fatigue after a week or a month in carrying out daily activities both as a worker or employee. This activity is carried out to entertain every human being and relax the mind. Besides that, tourism can also help people around the location of tourism objects as a livelihood to meet the needs of life. Simalungun Regency has several natural attractions scattered in several sub-districts which can attract the attention of visitors to travel, but there are still many that have not been well managed by the government or the private sector. To develop the tourism industry in Simalungun Regency, many obstacles faced by the management start from the location, transportation, costs and facilities available and this is also faced by visitors to visit a tourist attraction. In this study, we will choose a location that can be developed based on a questionnaire from several communities / tourists to assess a tourist site that is more supportive to develop. From the results of the election using the C4.5 Algorithm. Then it has been found that the Nature Tourism object can be developed with a level of accuracy that reaches 90% and a recall of 83.33%.

012079
The following article is Open access

, , , , , and

Foundation scholarship is scholarship whose fund comes from AMIK Tunas Bangsa Foundation and given for student achievement and poor, which aims to prevent collage drop outs for students. Foundation scholarship are given to students achievement and poor, but they dont get scholarship from any source. The criteria used in determining the foundation scholarship recipients are GPA, parents income and the number of dependents. The method applied in determining the foundation scholarship recipients is the MOORA (multi objective optimization on the basis of ratio analysis) method. The MOORA method will produce the exact ranked in determining the foundation scholarship recipients, simple calculation so it is easier to understand and use.

012080
The following article is Open access

, and

For example G(V,E) becomes graph on p nodes and q sides and B'(G) called being side-node incidence matrix from G. Every side e of G can be labeled using a binary digit string of length n from the row of B'(G) which corresponds to the side e, denoted by s(e). The Hamming distance between the strings s(e) and s(f) of length n is defined to be the number of positions of s(e) and s(f) with different digit. Hamming index from a graph is the number of Hamming distances between all pairs of strings. In this research, author discuss the Hamming index of graphs produced by an side-node incidence matrix, particularly windmill graph and snake graphs.

012081
The following article is Open access

, , and

Aceh is one of the provinces in Indonesia that is rich in the potential of marine and fisheries resources. Many fish resources become superior commodities, therefore good planning and management needs to be done. Fish resource data that will be used in this research is large-scale data from the district and city in Aceh province, then a data driven optimization approach is needed. Optimization has become one of the high technology in planning and management in the supply chain. Supply chain networks as logistics and production process from network that is connected between organizational units that operate from suppliers to the community. The supply chain of fish resources is very complex because it is caused by number of factors, such as the diversity of products from fish resources and short expiration periods. In this paper proposes that the supply chain network built consists of suppliers, distribution centers and consumers. The location of suppliers, distribution centers and consumers comes from 10 regions in the province of Aceh, for fish resource suppliers taken from Coastal Fishing Ports (CFP) and Fish Landing Base (FLB).

012082
The following article is Open access

, , and

The village needs to develop the independence and welfare of the community by increasing knowledge, attitudes, skills, behaviors, abilities, awareness, and utilizing resources through the establishment of policies, programs, activities and mentoring in accordance with the essence of the problems and priorities of the needs of the village community, related to the implementation of The Village Law Number 6 of 2014, one of which is about an integrated village-based village potential information system to open information on the implementation of village governance to the public, with the opening of public information the citizens can be more active together with the government to build the village. Information that needs to be known, among others:, Village administration potential, population administration, Village profile administration. The object of research was Juli Tambotanjong Village, Alue Buya Term Village, Abeuk Budi Village with different Village characteristics, so that the formation of an integrated Android-based Village Database utilizing Cloud Computing and Mobile Computing, which made it easier for users (communities) to access information in making decisions. -that. And the purpose of the Integrated Rural Decision Support Information System Model Based on Android.

012083
The following article is Open access

, and

The progress and success of the company can be seen from the consumer's response to production from all aspects of each company's activities and is a key success factor. In this case describes the problem of supply chain optimization from the perspective of providing logistics including a mathematical model of cost optimization for supply chains in the form of MILP (Mixed Integer Linear). Production, transportation and distribution costs are chosen as optimization criteria. Time, volume, capacity and mode of transportation are also taken into account. The model was developed based on supply chain management theory to achieve the lowest cost, responsive and to achieve common goals. The results state that product inventories, loading patterns, modes of transportation, and minimum order quantities significantly affect the total logistics costs. Shorter production processing time, and produce optimal solutions. However, the right limits must be carefully defined to get a viable solution.

012084
The following article is Open access

, and

Data Envelopment Analysis (DEA) analysis model can evaluate the relative efficiency of a set of DMU decision-making units with the right values but cannot handle data that is not correct, for example data in the form of intervals. In this paper, the DEA model is able to calculate the data efficiency of interval values. Data Envelopment Analysis interval or DEA interval is an approach that can make input and output data from Data Envelopment Analysis which is used to measure the relative efficiency of Decision Making Unit (DMU) in multi input and multi output processes which will be examined in this study. This model is based on arithmetic operations with interval numbers not the same as the DEA model in general that uses single data. Measurement of the relative efficiency of DMUs with inputs and outputs that have interval data using a constant interval of interval, depending on the application, can also be estimated using statistical techniques or experience. Because in the world most data is interval data, we present a model to calculate the lower and upper limits for each DMU and prove that this model provides higher and lower efficiency limits. In this paper the number of DMUs is increased where if one DMU is added then all highly efficient units will remain.

012085
The following article is Open access

, , , and

A graph is a pair of two sets. A graph is a representation of a system that uses two basic elements of vertices and edges, a node represented by a circle and edge represented by a line connecting two nodes. Graph theory is widely used in every field of engineering. In this paper, an application description of the graph is presented to find the shortest path and circuit network. The purpose of this paper is to connect graphs with engineering and electrical subjects. But beforehand, some fundamental mistakes of thinking in understanding mathematics, also called as fallacies are also introduced.

012086
The following article is Open access

, and

The nonlinear goal programming problem focused in this paper has a special structure characterized by a subset of variables restricted to assume discrete values, which are linear and separable from the continuous variables. The strategy of releasing nonbasic variables from their bounds, as used in linear goal program, combined with the reduced gradient method, has been developed. This strategy is used to force the appropriate non-integer basic variables within a priority level to move to their neighbourhood integer points.

012087
The following article is Open access

, and

The purpose of this study was to analyze the effect of self-efficacy on statistical learning outcomes. The research method by using the survey way. Collecting data by random sampling 50 students' second semester Academic Year 2017/2018 STIKOM Tunas Bangsa. Technique data collection by using questionnaire and tests. The data analysis technique by using a simple linear regression analysis with SPSS 25. Meanwhile, hypothesis testing using t-test to indicate that self-efficacy influences learning outcomes statistics. The results of this study obtained t count value of 7.452 while, t table value with a significance level of 0.05 is 2.011 because the value of tcount > ttable and a significant value of 0.000 <0.05, self-efficacy (X) partially has an effect is significant to the dependent variable namely learning outcomes (Y).

012088
The following article is Open access

, , and

Decision problems of stochastic or probabilistic optimization arise when certain coefficient of an optimization model are not fixed or known but are instead, to some extent, stochastic(or random or probabilistic) quantities. This paper focused on multiobjective stochastic optimization. We propose a method for solving a multiobjective chance constraints integer programming problem based on interactive approach. We assume that there is randomness in the right-hand sides of the constraints only and that the random variables are normally distributed. Some examples are presented.

012089
The following article is Open access

, , and

Open vehicle routing problems, as a variant of vehicle routing problem (VRP), define that the vehicles are not required to return to the depot after completing service. In this paper, we extend the problem to include process control due to the uncertainty of customer demands. Each customer has a demand and each customer must be serviced by a single vehicle and no vehicle may serve a set of customers whose total demand exceeds its capacity. Each vehicle route must start at the depot and end at the last customer it serves. The objective is to define the set of vehicle routes that minimizes the total costs. We solve the stochastic model using a strategy of releasing nonbasic variables from their bounds, combined with the "active constraint" method. This strategy is used to force the appropriate non-integer basic variables to move to their neighborhood integer points.

012090
The following article is Open access

, , and

Two-stage stochastic programming problems arise in many practical sit-uations, such as production and manpower planning, portfolio selections and so on. In general, the deterministic equivalences of these problems can be very large, and may not be solvable directly by general-purpose optimization approaches. Reduced gradient method (RGM) is a well known technique for nonlinear programming problems. After using scenario analysis technique, a direct search approach based on RGM for solving a class of two-stage stochastic nonlinear programs is proposed, which generates the search direction by solving parallelly a set of quadratic programming subproblems with size much less than the original problem at each iteration. By selecting the step-size to reduce an exact penalty function sufficiently, the algorithm terminates at an approximate optimal solution to the problem with any desirable accuracy.

012091
The following article is Open access

, , and

The quadratic assigment problem is a combinatorial problem of deciding the placement of facilities in specified locations in such a way as to minimize a nonconvex objective function expressed in terms of distance between location and flows between facilities. Due to the non-convexity nature of the problem, therefore to get a 'good' starting point is necessary in order to obtain a better optimal solution. In this paper we propose a meta heuristic strategy combined with feasible neighbourhood search to get 'optimal' solution. From computational experience in solving some backboard wiring problems, it turns out that the approach proposed is promising.

012092
The following article is Open access

and

Early research is motivated by demands and developments in the world of education that are so competitive that universities must be able to carry out professional education so that it suits the needs of the labor market. Factors of human resources (HR) that have high competition are necessary for the era of global market competition and national development as a whole. These conditions increasingly encourage the world of education, including universities, to immediately prepare human resources which have high competence, can innovate and be creative. The rapid increase of higher education institutions has increasingly made the conditions of competition in seizing every market share increasingly tight. However, some research results still found some disadvantages including still using the same instrument but the results are different, there is no valid measuring instrument (instrument) to measure students' decision to choose to study in private universities that are influenced by consumer attitudes and word of mouth. The study was conducted in Rokan Hulu Regency by using several respondents in private universities in Rokan Hulu regency including Pasir Pengaraian University, Rokania STKIP, ISQ, STAI Tuanku Tambusai, and Open University. The purpose of this study is to obtain a valid instrument in measuring student decisions in choosing to study at private universities so that these instruments are expected to be valid benchmarks that can be used as a measure of consumer decisions. The population in the study were all students enrolled as active students in private universities in Rokan Hulu district. The research sample was taken using a random sampling technique and used the sample criteria. The research data was processed using the Rash Model with the help of the Rasch Ministep (Winsteps) program.

012093
The following article is Open access

, and

Fuzzy Logic used as an act to describe problem from input into expected output. One part of Fuzzy logic is Fuzzy multiple attribute decision making in deciding weighted alternative Score and importance criteria rating meanwhile Weighted product method is to evaluate so in deciding employee performance by multiplying to correlate with attribute rating, rating for each attribute must be powered by number with related weighted attribute and that process is same with normalization process. The result of implementation of Multiple Attribute Decision Making (FMADM) by using Weighted Product (WP) Algorithm in valuating employee performance which conducted once a year which obtained from performance valuation of system valuation at CV. Mulya Karya Baru. By conducting sample from data which obtained from data. This research can create and develop an application which can help user to rank the employee performance.

012094
The following article is Open access

, , and

The mathematical model of portfolio optimization has been largely written in terms of minimizing the risk, given the return. The difficulty of this model is to deal with the quadratic programming model due to Markowitz. This situation has been overcome by the recent progress in algorithmic research, and the introduction of linear risk function. This paper deals with the portfolio selection problem with minimum transaction lots. A neighbourhood search algorithm based on active constrained strategy is proposed to solve the mixed integer programming model. The algorithm starts from the solution of the relaxed problem to find a solution which is close to the continuous solution.

012095
The following article is Open access

, , , and

In this study using a comparative analysis of SMART and SAW methods. The results of the SAW method calculation analysis have a faster processing time with a time of 0.40 s. While the SMART method calculation analysis has a longer processing time difference of 0.47 s. In this study the authors suggest using the SMART method. Where the process of calculating the SMART method has more varied results, because the criteria value between one candidate and another candidate influences each other. While the calculation of the SAW method results are less varied, because the criteria value between one candidate and another candidate does not affect each other. Weighting is done without an algorithm. In this study the authors suggest using the SMART method because there is a final value of <60 is not feasible given the provision of venture capital.

012096
The following article is Open access

In this paper, a combination of the Local Binary Pattern method with a semantic pixel set of entropy information is used on back propagation networks for face recognition. This method divides the sample data into NxM zones and calculates the feature value of each zone. In this paper the sample data is divided into 6x9 zones, ie 54 zones with the size of each zone is 10x10 pixels. The LBP method is a uniform pattern of each zone and makes comparisons to zones that have the most number of active pixels. Then from the LBP method the semantic method is used to extract the entropy information from each image. From the feature extraction, there are 107 feature values, 54 of LBP and 53 methods of semantic method. The value of the feature is used as input for classification using back propagation networks. 100 sample data were used for training and 60 different sample data were used for recognition level test. From the test conducted got the recognition rate using a combination of two methods of this extraction feature is 98%.