Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method

(1) * Dicky Nofriansyah Mail (Department of Information System, STMIK Triguna Dharma, Indonesia)
*corresponding author

Abstract


This research was focused on explaining how the concept of simple multi attribute rating technique method in a decision support system based on desktop programming to solve multi-criteria selection problem, especially Scholarship. The Merkle Hellman method is used for securing the results of choices made by the Smart process. The determination of PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma becomes a problem because it takes a long time in determining the decision. By adopting the SMART method, the application can make decisions quickly and precisely. The expected result of this research is the application can facilitate in overcoming the problems that occur concerning the determination of PPA and BBP-PPA scholarship recipients as well as assisting Student Affairs STMIK Triguna Dharma in making decisions quickly and accurately


Keywords


Decision Support System, Cryptography, Merkle Hellman, Simple Multi Attribute Rating Technique

   

DOI

https://doi.org/10.29099/ijair.v1i2.22
      

Article metrics

10.29099/ijair.v1i2.22 Abstract views : 1358 | PDF views : 444

   

Cite

   

Full Text

Download

References


D. Nofriansyah, Konsep Data Mining Vs Sistem Pendukung Keputusan. Yogyakarta: CV. Deepublish, 2014.

D. Nofriansyah, "COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY," International Journal of Research In Science & Engineering, vol. 2, 2016.

F. H. Barron and B. E. Barrett, "The efficacy of SMARTER — Simple Multi-Attribute Rating Technique Extended to Ranking," Acta Psychologica, vol. 93, pp. 23-36, 1996/09/01/ 1996.

C. S. Yap, et al., "Methods for information system project selection: an experimental study of AHP and SMART," in Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, 1992, pp. 578-589 vol.3.

A. Sridhar and V. R. Josna, "CASH on Modified ElGamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network," Procedia Technology, vol. 24, pp. 1276-1284, 2016/01/01/ 2016.

S. Yuan, et al., "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Optics Communications, vol. 365, pp. 180-185, 2016/04/15/ 2016.

K. Marisa W. Paryasto, Sarwan et al, "Issues in Elliptic Curve Cryptography implementation," Internetworking Indonesial Journal, vol. 1, 2009.

G. Lokeshwari, Aparna, G., & Dr. Udaya Kumar, S, "A Novel Scheme for Image Encryption using Merkle-Hellman Knapsack Cryptosystem-Approach, Evaluation and Experimentation," International Journal of Computer Science & Technology, vol. 2, 2011.

L. Ogiela, "Cryptographic techniques of strategic data splitting and secure information management," Pervasive and Mobile Computing, vol. 29, pp. 130-141, 2016/07/01/ 2016.

A. S. N. C. A. Rama Krishna, A. S. C. S. Sastry, "A Hybrid Cryptographic System for Secured Device to Device Communication," International Journal of Electrical and Computer Engineering (IJECE), vol. 6, 2016.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

________________________________________________________

The International Journal of Artificial Intelligence Research

Organized by: Departemen Teknik Informatika
Published by: STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung

Email: jurnal.ijair@gmail.com

View IJAIR Statcounter

Creative Commons License
This work is licensed under  Creative Commons Attribution-ShareAlike 4.0 International License.