
*corresponding author
AbstractThis research was focused on explaining how the concept of simple multi attribute rating technique method in a decision support system based on desktop programming to solve multi-criteria selection problem, especially Scholarship. The Merkle Hellman method is used for securing the results of choices made by the Smart process. The determination of PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma becomes a problem because it takes a long time in determining the decision. By adopting the SMART method, the application can make decisions quickly and precisely. The expected result of this research is the application can facilitate in overcoming the problems that occur concerning the determination of PPA and BBP-PPA scholarship recipients as well as assisting Student Affairs STMIK Triguna Dharma in making decisions quickly and accurately KeywordsDecision Support System, Cryptography, Merkle Hellman, Simple Multi Attribute Rating Technique
|
DOIhttps://doi.org/10.29099/ijair.v1i2.22 |
Article metrics10.29099/ijair.v1i2.22 Abstract views : 1358 | PDF views : 444 |
Cite |
Full Text![]() |
References
D. Nofriansyah, Konsep Data Mining Vs Sistem Pendukung Keputusan. Yogyakarta: CV. Deepublish, 2014.
D. Nofriansyah, "COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY," International Journal of Research In Science & Engineering, vol. 2, 2016.
F. H. Barron and B. E. Barrett, "The efficacy of SMARTER — Simple Multi-Attribute Rating Technique Extended to Ranking," Acta Psychologica, vol. 93, pp. 23-36, 1996/09/01/ 1996.
C. S. Yap, et al., "Methods for information system project selection: an experimental study of AHP and SMART," in Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, 1992, pp. 578-589 vol.3.
A. Sridhar and V. R. Josna, "CASH on Modified ElGamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network," Procedia Technology, vol. 24, pp. 1276-1284, 2016/01/01/ 2016.
S. Yuan, et al., "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Optics Communications, vol. 365, pp. 180-185, 2016/04/15/ 2016.
K. Marisa W. Paryasto, Sarwan et al, "Issues in Elliptic Curve Cryptography implementation," Internetworking Indonesial Journal, vol. 1, 2009.
G. Lokeshwari, Aparna, G., & Dr. Udaya Kumar, S, "A Novel Scheme for Image Encryption using Merkle-Hellman Knapsack Cryptosystem-Approach, Evaluation and Experimentation," International Journal of Computer Science & Technology, vol. 2, 2011.
L. Ogiela, "Cryptographic techniques of strategic data splitting and secure information management," Pervasive and Mobile Computing, vol. 29, pp. 130-141, 2016/07/01/ 2016.
A. S. N. C. A. Rama Krishna, A. S. C. S. Sastry, "A Hybrid Cryptographic System for Secured Device to Device Communication," International Journal of Electrical and Computer Engineering (IJECE), vol. 6, 2016.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
________________________________________________________
The International Journal of Artificial Intelligence Research
Organized by: Departemen Teknik Informatika
Published by: STMIK Dharma Wacana
Jl. Kenanga No.03 Mulyojati 16C Metro Barat Kota Metro Lampung
Email: jurnal.ijair@gmail.com
This work is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.