Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method

Dicky Nofriansyah*, Ganefri, Sarjon Defit, Ridwan, Azanuddin, Haryo S Kuncoro 1,4,5 Departement of Information System, STMIK Triguna Dharma 1 Student Doctoral, Padang State University 2 Rector of Padang State University, West Sumatera 4 Lecturer of Padang State University, West Sumatera 3 Rector of Universitas Putra Indonesia YPTK Padang, West Sumatera Email: dicknofriansyah@ymail.com, ganefri_ft@yahoo.com , sarjond@yahoo.co.uk , azdin.bpc@gmail.com


I. INTRODUCTION
Decision Support System is an auxiliary tool for making decisions appropriately, and quickly.In Decision Support System can be applied several methods such as SMART Method (Simple Multi Attribute Rating Technique).The SMART method is a multi-criteria decisionmaking technique based on the theory.It has a weight that describes how important it is related to other criteria [1] [2] [3] [4] .This weighting is used to assess each alternative to obtain the best choice.In the problem discussed in this research, we will design a software using Desktop Programming which is expected to be a problem-solving solution and adopt Merkle Hellman Method as its data security.[2] [5] [6] STMIK Triguna Dharma is one of the universities that receive the scholarship.The types of awards that are always accepted are classified as PPA Scholarships (Academic Achievement Improvement) and BBP-PPA (Educational Cost Assistance-Academic Achievement).Scholarship recipients must be following the criteria determined and selected in the selection process.During this selection process determination of scholarship recipients is still done conventionally, so that takes a long time.The problem of this selection process can be overcome by several ways one of them by using Decision Support System.
Desktop Programming is the software used to design a desktop-based system.The system will be designed to adopt the SMART Method and Merkle Hellman Method.In the concept of design is done by analysing the problems and needs in the issues discussed than done a rating of the causes of the reasons of the problem and in the final phase will be done a system design so that it can solve the problem as expected.

II. THEORY a. Scholarship
The scholarship is a grant fee given to a person who is expected to help him finish his education to completion.For university students, Scholarship is divided into two, namely Academic Achievement Improvement Scholarship (PPA) and Tuition Fee Scholarship for Academic Achievement Improvement (BBP-PPA).

Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle
Hellman Method (Dicky Nofriansyah) Awards for Academic Achievement Achievement and Educational Cost Assistance Improvement of Academic Achievement for Private Higher Education students is an effort of the government to provide encouragement and assistance to the students to follow their study smoothly and is expected to keep improving their academic achievement and to finish their education on time.
To provide Scholarship for Academic Achievement Improvement and Educational Cost Assistance, Academic Achievement Improvement can be made well following 3T principles, that is Right at Target, Exactly Amount, and Punctual.It

c. Merkle Hellman
Cryptography is divided into two main processes namely the process of encryption and decryption; each process has a different algorithm [7].Merkle Hellman method has several different calculations on the process of encryption and decryption [8].At the time of the encryption process, the Merkle Hellman method uses the following model: a. Encryption Process Phase 1: Create a Private Key (S, A and P) The S, A, and P values are the variables for the private key.The integer numbers are arranged with linear superincreasing algorithms.S consists of several numbers depending on the number of binner digits used.A is a free value (figure) that must be greater than the total value of S with a maximum value of 999.While P is a free (number) value that can be taken starting from 1 to A. For the process of calculating the data of the Cipher text, must first do the plaintext division into blocks based on the number of elements T. Known the number of elements of T as many as 8 elements.Furthermore, each block will be associated with each element of T.

b. Decryption Process
During the decryption process, Merkle Hellman method uses the following model.
The steps in the decryption process using the Merkle Hellman method is as follows: In doing the decryption process, there must first be a complete data from the encryption process.It is necessary also a private key as a key to the process of data decryption.

Phase 2: Modular Invers
The process for finding the inverse modulo value of (p-1) using the extended eucledian method, ie (P * M mod A = 1).In this decryption process will be used p-1 value of 77.Value 77 obtained from the calculation using the method of extended eucledian.

Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle
Hellman Method (Dicky Nofriansyah) Phase 3: Cipher Data Mod A The next process is the modif process, which is for the data Ciphertext with the inverse value obtained previously Phase 4: Reduce Data with Value S The data reduction process (K) with the values of the S. The elements of decline continue from the largest to the smallest detail.The final result of the deduction must be a value of 0. The final result where the reduction is nonzero, the decryption process is declared to fail.The cause of failure can occur if the S key is not made by the linear superincreasing method.

Phase 5: Return to Original Data
Reverting to original data is the last step to convert to decryption process.The binary code is compiled and converted to decimal code then to char code

III. ANALYSIS AND DESIGN 3.1 Concept of Simple Multi Attribute Rating Technique
After conducting interviews with parties involved in the process of determining the PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma, there are some important things that can be taken as material criteria for the development of Decision Support System, i.e., data in the form of measures needed during the process of awarding the scholarship recipient.The criteria for the PPA and BBP-PPA scholarship are different, and the difference lies in the weight and number of measures required.
In the PPA award, the necessary criteria are GPA, Certificate -SK and Achievement.While on BBP-PPA scholarship, the required standards are Parent Income, Certificate -SK and Achievement.The weight of each criterion is determined by the Head of Student Affairs of STMIK Triguna Dharma, where the weight is determined based on the importance level as the reference of the students' worthiness assessment.Range assessment criteria between 0 -100.Students will be sorted based on the highest to lowest score and will be passed from the highest to the lowest to meet the number of quotas that has been determined by Kopertis Region 1 The data of the enrolled students are separated by their respective groups, namely the PPA scholarship group and the BBP-PPA scholarship group.Student data can be seen in the table below.Utility values are obtained by using a predetermined formula.The minimum value of criteria for each alternative is 0 (zero) and a maximum of 4 (four).Here is the process of calculating utility values: a. Encryption Process The final calculation is the calculation of the utility value with the criterion weight.After the calculation results obtained for each criterion, then add the total value of each criterion to get the total.The total value becomes the final value for each alternative, and this value will be sorted by the highest value.

Concept of Merkle Hellman
Securing scholarship data recipients is considered important so that data is encrypted and can not be manipulated by people who intend badly.The data of the scholarship recipient is only visible to the person who has the authority.In this case, the person is the Head of Student Affairs STMIK Triguna Dharma.Merkle Hellman's security measures are as follows.The steps of the encryption process are as follows: Phase 1: Create a Private Key (S, A, and P) The S, A, and P values are the variables for the private key.The integer numbers are arranged with linear superincreasing algorithms.S consists of several numbers depending on the number of binner digits used.A is a free value (figure) that must be greater than the total value of S with a maximum value of 999.While P is a free (number) value that can be taken starting from 1 to A. In this process, the data needs to be converted into binner form because Merkle Hellman calculation uses a binary technique as encryption and decryption process.To convert data to binary 8 digits, then previous data is changed to ASCII code.The next step is to convert the ASCII code into an 8-digit binary code like below: For the process of calculating the data of the ciphertext, must first do the plaintext division into blocks based on the number of elements T. Known the number of elements of T as many as 8 elements.Next, each block will be associated with each element T, so the ciphertext obtained as follows: Table 5: Result The above process shows that the data encryption process is done.The last thing to do is to present the Ciphertext data by saving it back into text form.So the result of Encryption process of message 2013020231 is C {1172, 270, 1123, 2025, 270, 1172, 270, 1172, 2025, 1123}. International Journal Of Artificial Intelegence Research Vol 1, No 2, December 2017, pp.40 -49 Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method (Dicky Nofriansyah)

b. Decryption Proces
Steps in the decryption process using Merkle Hellman method are as follows: Phase 1: Ciphertext Data (O) In doing the decryption process, there must first be a complete data from the encryption process.In addition it is necessary also a private key as a key to the process of data decryption.The Ciphertext code is as follows: C {1172, 270, 1123, 2025, 270, 1172, 270, 1172, 2025, 1123}.Phase 2. Modular Invers The process for finding the inverse modulo value of (p-1) using the extended eucledian method, ie (P * M mod A = 1).In this decryption process will be used p-1 value of 77.Value 77 obtained from the calculation using the method of extended eucledian, as the table below: The data reduction process (K) with the values of the S. elements The reduction continues from the largest to the smallest element.The final result of the deduction must be a value of 0. The final result where the reduction is nonzero, the decryption process is declared to fail.The cause of failure can occur if the S key is not made by the linear siperincreasing method.S = {2, 4, 7, 14, 28, 112, 224, 407}, K = {245, 21, 428, 652, 21, 245, 21, 245, 652, 428}  The calculation process in the above table starts from right to left, the column that is marked false means that on the element S column the data can not be subtracted and will be false or 0. While the column that contains the data true, means the data can be subtracted and true or 1 If the result of the data is taken entirely it will generate value "00110010" which if returned to the decimal code to "50" and to char to "2".The next process, the values V1 to V10 will decomposition use each value on S.This decomposition is done by The report of the scholarship recipients is used to display the data of the students who are selected to be the recipients of the award using Simple Multi Attribute Rating Technique.

SMART
The following is the result of system testing that has been made based on the results of the analysis manually: Result of Determination Test of Scholarship Recipient.Below is the data of PPA and BBP-PPA scholarship recipients are stored in the database.
takes technical means in assessing and selecting students who are entitled to get it.(BBP-PPA Scholarship Technical Guidelines: 2016) b.Simple Multi Attribute Rating Technique The techniques and steps in the SMART [3] [4] process, among others: -Phase 1: Specify the number of criteria.-Phase 2: Determine the criteria weights with the range of values 1-100 based on the importance of the criteria.-Phase 3: Normalize the weighted value of the criteria by the formula (  / ∑   ), -Phase 4: Provide a criteria value for each alternative.-Phase 5: Calculate the utility value for each criterion by using the following formula:   (  ) =    −     −   … … … … … … … … . .(1) No 2, December 2017, pp.40 -49    Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and MerkleHellman Method (Dicky Nofriansyah)

Phase 3 :
Result of Final Counting and Ranking Students who are graduated are students who have final grade results starting from the highest to the lowest based on the number of quota of scholarship recipients that have been determined.The number of PPA scholarship recipients is 7 (seven) people, and BBP-PPA scholarship recipients are 5 (five) persons.Vol 1, No 2, December 2017, pp.40 -49 Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method (Dicky Nofriansyah) Figure 1: Learning Data

Figure 2 :
Application of Scholarship Using To convert data to binary 8 digits, then previous data is changed to ASCII code.The next step is to convert the ASCII code into an 8-digit binary code like below[8]:

Table 1 .
Quota of Scholarship

Table 2 :
Private Key S

{2, 4, 7, 14, 28, 112, 224, 407} = ∑s = 798 A 989 P 578 Phase
2: Create a Public Key A public key is used to calculate the result of Cipher data.The public key has the same character as the private key S. If the private key is denoted by S, then the public key can be denoted by T. Therefore the public key has a row of numbers as the key to finding the Cipher.Calculation of public key as the table below:

Table 4 :
Data Binary

Table 8 .
Data Reduction Process