Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method

Dicky Nofriansyah(1*),


(1) Department of Information System, STMIK Triguna Dharma
(*) Corresponding Author

Abstract


This research was focused on explaining how the concept of simple multi attribute rating technique method in a decision support system based on desktop programming to solve multi-criteria selection problem, especially Scholarship. The Merkle Hellman method is used for securing the results of choices made by the Smart process. The determination of PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma becomes a problem because it takes a long time in determining the decision. By adopting the SMART method, the application can make decisions quickly and precisely. The expected result of this research is the application can facilitate in overcoming the problems that occur concerning the determination of PPA and BBP-PPA scholarship recipients as well as assisting Student Affairs STMIK Triguna Dharma in making decisions quickly and accurately


Keywords


Decision Support System, Cryptography, Merkle Hellman, Simple Multi Attribute Rating Technique

Full Text:

PDF

Article Metrics

Abstract view : 367 times
PDF - 146 times

References


D. Nofriansyah, Konsep Data Mining Vs Sistem Pendukung Keputusan. Yogyakarta: CV. Deepublish, 2014.

D. Nofriansyah, "COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY," International Journal of Research In Science & Engineering, vol. 2, 2016.

F. H. Barron and B. E. Barrett, "The efficacy of SMARTER — Simple Multi-Attribute Rating Technique Extended to Ranking," Acta Psychologica, vol. 93, pp. 23-36, 1996/09/01/ 1996.

C. S. Yap, et al., "Methods for information system project selection: an experimental study of AHP and SMART," in Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, 1992, pp. 578-589 vol.3.

A. Sridhar and V. R. Josna, "CASH on Modified ElGamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network," Procedia Technology, vol. 24, pp. 1276-1284, 2016/01/01/ 2016.

S. Yuan, et al., "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Optics Communications, vol. 365, pp. 180-185, 2016/04/15/ 2016.

K. Marisa W. Paryasto, Sarwan et al, "Issues in Elliptic Curve Cryptography implementation," Internetworking Indonesial Journal, vol. 1, 2009.

G. Lokeshwari, Aparna, G., & Dr. Udaya Kumar, S, "A Novel Scheme for Image Encryption using Merkle-Hellman Knapsack Cryptosystem-Approach, Evaluation and Experimentation," International Journal of Computer Science & Technology, vol. 2, 2011.

L. Ogiela, "Cryptographic techniques of strategic data splitting and secure information management," Pervasive and Mobile Computing, vol. 29, pp. 130-141, 2016/07/01/ 2016.

A. S. N. C. A. Rama Krishna, A. S. C. S. Sastry, "A Hybrid Cryptographic System for Secured Device to Device Communication," International Journal of Electrical and Computer Engineering (IJECE), vol. 6, 2016.




DOI: https://doi.org/10.29099/ijair.v1i2.22

Copyright (c) 2017 International Journal of artificial intelligence research

________________________________________________________

Organized by : Departemen Teknik Informatika STMIK Dharma Wacana
Published by : STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung
phone. +62725-7850671
Fax. +62725-7850671
Email: internationaljournalair@gmail.com

statcounter International Journal of artificial intelligence research

Creative Commons License
IJAIR is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.