Saat ini Kolestrol dan Asam urat merupakan pernyakit yang tingkat kejadianya cukup tinggi. Berdasarkan ahli dari Clinical Research Support Unit (CRSU) Fakultas Kedokteran Universitas Indonesia, Dr. Nafrialdi, PhD menyatakan bahwa 35% penduduk Indonesia memiliki kadar kolesterol lebih tinggi dari batas normal dan Menurut data WHO 2015, penderita asam urat di Indonesia terjadi pada usia dibawah 34 tahun sebesar 32% dan di atas 34 tahun sebesar 68%. Namun ketidaktahuan masyrakat umum terhadap penyakit yang dialami di karenakan mahalnya biaya yang harus di keluarkan untuk mengetahui penyakit lebih dini tanpa harus berkonsultasi ke dokter. Untuk membantu mengatasi permasalahan tersebut penulis membuat program sistem pakar yang dapat mengidentifikasi penyakit kolestrol dan asam urat masyarakat umum. Namun kemampuan sistem dalam mendiagnosa suatu gejala tidak 100% sama dengan diagnosa seorang dokter, masih banyak hal yang tidak pasti atau sehingga dapat menyebabkan kemungkinan kesalahan dalam diagnosa maka salah satu metode dalam perhitungan ketidakpastian adalah metode certainty factor (CF). Metode Certainty Factor menyatakan kepercayaan dalam sebuah kejadian (fakta atau hipotesis) berdasarkan bukti atau penilaian pakar. Berdasarkan pengujian rekapitulasi sampel data dari 20 orang korespoden didapatkan 50% berpotensi Kolestrol, 35% berpotensi Asam Urat, dan 15% Bukan kedua penyakit. Rekapitulasi Validasi Sistem melalui pakar memberikan keakuratan 80% terhadap sistem pakar tersebut.
Leakage of data or information that is owned by both personal and organizational nature is caused due to negligence of humans or users of the system itself or by hackers who arbitrarily dismantle the system used by users and disseminate data or information. Cryptography is one of the sciences or arts that studies about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using the LSB (Least Significant Bit) and Binary XOR methods to convert messages into binary with XOR keywords and generate message pixel values from 8 image bits with LSB (The least important bit). Data or text that has been inserted in the next image will be sent to the recipient, and to view the original data, the recipient of the message must decrypt the data with the same key as during the encryption process and image insertion and retrieve the LSB (Least Significant Bit) value, from the image encrypted. Based on the results and tests carried out, the process of encrypting data and inserting messages in pictures can minimize data or information that will be delivered or sent to the recipient.
Information technology and information systems are a very fundamental requirement in supporting business functions in an organization or company, whether government or private. Amid the rapid development of information technology, universities are challenged to implement information technology and information systems that can facilitate and accelerate services, both to students, lecturers and the general public in terms of obtaining information. In developing information systems, there needs to be careful planning for the short, medium and long term so that the system that has been built can continue to be developed together with the construction of a new system. Enterprise Architecture Planning is a methodology that can be used to build a structured system architecture starting from planning to the implementation planning stage. In this journal, we will discuss the use of Enterprise Architecture Planning in creating information system architecture to support academic activities in the form of data architecture, applications and technology
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.