Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method

Dicky Nofriansyah(1*),

(1) Department of Information System, STMIK Triguna Dharma
(*) Corresponding Author


This research was focused on explaining how the concept of simple multi attribute rating technique method in a decision support system based on desktop programming to solve multi-criteria selection problem, especially Scholarship. The Merkle Hellman method is used for securing the results of choices made by the Smart process. The determination of PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma becomes a problem because it takes a long time in determining the decision. By adopting the SMART method, the application can make decisions quickly and precisely. The expected result of this research is the application can facilitate in overcoming the problems that occur concerning the determination of PPA and BBP-PPA scholarship recipients as well as assisting Student Affairs STMIK Triguna Dharma in making decisions quickly and accurately


Decision Support System, Cryptography, Merkle Hellman, Simple Multi Attribute Rating Technique

Full Text:


Article Metrics

Abstract view : 217 times
PDF - 92 times


D. Nofriansyah, Konsep Data Mining Vs Sistem Pendukung Keputusan. Yogyakarta: CV. Deepublish, 2014.

D. Nofriansyah, "COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY," International Journal of Research In Science & Engineering, vol. 2, 2016.

F. H. Barron and B. E. Barrett, "The efficacy of SMARTER — Simple Multi-Attribute Rating Technique Extended to Ranking," Acta Psychologica, vol. 93, pp. 23-36, 1996/09/01/ 1996.

C. S. Yap, et al., "Methods for information system project selection: an experimental study of AHP and SMART," in Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, 1992, pp. 578-589 vol.3.

A. Sridhar and V. R. Josna, "CASH on Modified ElGamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network," Procedia Technology, vol. 24, pp. 1276-1284, 2016/01/01/ 2016.

S. Yuan, et al., "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Optics Communications, vol. 365, pp. 180-185, 2016/04/15/ 2016.

K. Marisa W. Paryasto, Sarwan et al, "Issues in Elliptic Curve Cryptography implementation," Internetworking Indonesial Journal, vol. 1, 2009.

G. Lokeshwari, Aparna, G., & Dr. Udaya Kumar, S, "A Novel Scheme for Image Encryption using Merkle-Hellman Knapsack Cryptosystem-Approach, Evaluation and Experimentation," International Journal of Computer Science & Technology, vol. 2, 2011.

L. Ogiela, "Cryptographic techniques of strategic data splitting and secure information management," Pervasive and Mobile Computing, vol. 29, pp. 130-141, 2016/07/01/ 2016.

A. S. N. C. A. Rama Krishna , A. S. C. S. Sastry, "A Hybrid Cryptographic System for Secured Device to Device Communication," International Journal of Electrical and Computer Engineering (IJECE), vol. 6, 2016.

Heri Nurdiyanto, Hermanto Hermanto, “Signature Recognition using Neural Network Probablisitc”, International Journal of Advances in Intelligent Informatics, Vol. 2, Issue 1, pp. 46-53, 2016

Heri Nurdiyanto, Putut Hasto Kuncoro, “Expert System for Measuring the Sugar-content in Sugarcane Using Forward Chaining Method”, ASEAN/Asian Academic Society International Conference Proceeding Series, Vol. 1, Issue 1, pp 79, 2016

Heri Nurdiyanto, Robbi Rahim, “Decision Support System for Electrical Power Selection to Household Users”, International Confrence of Science Infrastructure Technology and Regional Development, Vol.1, issue 1, pp 23, 2017

Solikhun Solikhun,” Decision support system in Predicting the Best teacher with Multi Atribute Decesion Making Weighted Product (MADMWP) Method”, International Journal of artificial intelligence research, Vol.1, Issue 1, pp 1,2017

Mufadhol Mufadhol, Siswanto Siswanto, Djarot Dian Susatyono, Maya Utami Dewi,” The Phenomenon of Research and Development Method in Research of Software Engineering”, International Journal of artificial intelligence research, Vol.1, Issue 1, pp 6,2017

Poningsih Poningsih,” Design of the expert system to analyze disease in Plant Teak using Forward Chaining”, International Journal of artificial intelligence research, Vol.1, Issue 1, pp 13, 2017

Febri Haswan,” Decision Support System For Election Of Members Unit Patients Pamong Praja”, International Journal of artificial intelligence research, Vol.1, Issue 1, pp 19, 2017

Muhammad Ardiansyah Sembiring, Zulfi Azhar,” Factors Analysis And Profit Achievement For Trading Company By Using Rough Set Method”, International Journal of artificial intelligence research, Vol.1, Issue 1, pp 24, 2017

Heri Nurdiyanto, Robbi Rahim, and Nur Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 12005, Dec. 2017.



Copyright (c) 2017 International Journal of artificial intelligence research


Organized by : Departemen Teknik Informatika STMIK Dharma Wacana
Published by : STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung
phone. +62725-7850671
Fax. +62725-7850671
Email: |

International Journal of artificial intelligence research

Creative Commons License
IJAIR is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.