Erna Nababan

Erna Nababan
  • PhD
  • Lecturer at University of North Sumatra

About

153
Publications
54,858
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
980
Citations
Introduction
Erna Nababan currently works at the Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Indonesia. Erna does research in Artificial Intelligence and Machine Learning. Their most recent publication is 'Template-Based Natural Language Generation in Interpreting Laboratory Blood Test '
Current institution
University of North Sumatra
Current position
  • Lecturer
Additional affiliations
September 2002 - August 2010
National University of Malaysia
Position
  • Research Assistant

Publications

Publications (153)
Article
Full-text available
An influencer is someone who has the ability to persuade a large number of people to take specific actions, regardless of space or time. The role of influencers, especially on social media platforms, has grown significantly. One common feature utilized by businesses today is follower grouping. However, this feature is limited to identifying influen...
Article
Full-text available
Logistic Regression merupakan metode pengklasifikasi yang sangat populer dan digunakan secara luas pada berbagai penelitian. Logistic Regression dapat memberikan hasil yang baik pada masalah klasifikasi maupun prediksi. Fitur dataset yang besar mengakibatkan beban komputasi, dan menurunkan kinerja klasifikasi. Terdapat tiga dataset yang digunakan p...
Article
Full-text available
The main weakness of complex and sizeable fuzzy rule systems is the complexity of data interpretation in terms of classification. Classification interpretation can be affected by reducing rules and removing important rules for several reasons. Based on the results of experiments using the fuzzy grid partition (FGP) approach for high-dimensional dat...
Preprint
Full-text available
Preserving cultural heritage, such as old manuscripts as expressions of human communities is one of sustainable development goals (SDGs) targets. In Indonesia, old manuscripts written in Batak language include many valuable insights for new generation. The manuscripts recorded variety of contents from folklore to medicinal prescriptions. Neverthele...
Article
Full-text available
span lang="EN-US">Clustering is a technique in data mining capable of grouping very large amounts of data to gain new knowledge based on unsupervised learning. Clustering is capable of grouping various types of data and fields. The process that requires this technique is in the business sector, especially banking. In the transaction business proces...
Article
Full-text available
This research aims to enhance message security in the RC5 algorithm by integrating it with the Blum Blum Shub (BBS) algorithm. The rapid growth in data and information exchange, driven by advancements in information and communication technology, demands robust security against attacks such as eavesdropping, interruption, and data modification. Cryp...
Article
Full-text available
Deep Learning is a sub-set of Machine learning, Deep Learning is widely used to solve problems in various fields. One of the popular deep learning architectures is The Convolutional Neural Network (CNN), CNN has a layer that transforms feature extraction automatically so it is widely used in image recognition. However, CNN's performance using the t...
Article
Full-text available
Conventional methods are still used in selecting the best students in the various institutions depending on the subjectivity of each member of the assigned committee. In order to make an objective decision, it is necessary to have a method that can consider the criteria used to select the candidates to be elected. The decision-making method used in...
Article
Full-text available
In Classification using Support Vector Machine (SVM), each kernel has parameters that affect the classification accuracy results. This study examines the improvement of SVM performance by selecting parameters using Particle Swarm Optimization (PSO) on credit risk classification, the results of which are compared with SVM with random parameter selec...
Article
Full-text available
Abstrak: Pertambahan kunjungan wisatawan pariwisata samosir adalah tolak ukur usaha tim promosi Dinas Pariwisata Samosir yaitu melalui media website visitsamosir. Permasalahan (1) mitra kapasitas website semakin hari semakin besar sehingga tidak lagi dapat menampung data yang nantinya dimasukan kedalam website; dan (2) website visitsamosir.com meng...
Article
Full-text available
In the effort to hold up the case spread of COVID-19’s growth rate by implementing health protocols such as the use of masks, supervision is needed especially for the people who have not or still have problems to wearing masks. In this research, the system utilizes the robotic power to identify visitors whether they are wearing masks or not, and au...
Article
Full-text available
Teacher is a profession that has important role for the progress of education literacy, primarily in this current digitalization era that implements the online learning system. Therefore, the assesment of teacher’s performance during online learning is needed to find the advantages and disadvantages of each teacher, with an aim to get an evaluation...
Article
Full-text available
Word embedding is an efficient feature representation that carries semantic and syntactic information. Word embedding works as a word level that treats words as minor independent entity units and cannot handle words that are not in the training corpus. One solution is to generate embedding from more minor parts of words such as morphemes. Morphemes...
Article
Full-text available
The ant colony algorithm is an algorithm adopted from the behavior of ants which naturally ants are able to find the shortest route on the way from the nest to places of food sources based on footprints on the track that has been passed. The ant colony algorithm helps a lot in solving several problems such as scheduling, traveling salesman problems...
Article
Full-text available
Words embedding or distributed representations is a popular method for representing words. In this method, the resulting vector value is a set of real values with specific dimensions that are more effective than the Bag of Word (BoW) method. Also, the advantages of distributed representations can produce word vectors that contain semantic and synta...
Article
Full-text available
Handwritten character recognition is considered a complex problem since one’s handwritten character has its characteristics. Data used for this research was a photo of handwritten or scanned handwritten. In this research, Backpropagation Neural Network (BPNN) was used to recognize handwritten Batak Toba character, wherein preprocessing stage featur...
Article
Full-text available
Humans naturally and intuitively use important and powerful facial expressions to communicate and show their emotions during social interactions. In that interaction, the effort to interpret someone’s emotional condition is important in good communication. A person’s emotional condition is reflected in the form of words, gestures, and especially fa...
Article
Full-text available
Online news portals are one of the main sources of information currently most accessed by the public. With the number of Internet users increasing day by day, online news portal business entrepreneurs must find ways to remain able to compete to attract netizens’ attention to open their news portals. One of the techniques used is to implement clickb...
Article
Full-text available
A person’s self-development is influenced by his ability in solving problems and adapting to his environment. This ability is commonly known as intelligence. Every person has a different dominant intelligence. Honed intelligence can result in managed self-development and self-mastery. A person can discover his talent and expertise to be more advanc...
Article
Full-text available
Fuzzy logic is an extension of traditional reasoning, where x is a member of set A or not, or an x can be a member of set A with a certain degree of membership . The ability of fuzzy models to map fuzzy values is the reason for using fuzzy inference models in various cases that use fuzzy values to produce a clear or definite output. In this researc...
Conference Paper
Abstract— In data security, a technique is needed to secure data from experiments and attacks carried out by cryptanalysts. The technique of securing data is also known as cryptography. In this research, it has been done to improve data security by combining the Hill Cipher Algorithm with the Caesar Cipher Algorithm. This can be seen from the tests...
Article
Full-text available
Results of blood test examination from medical test institutions are represented in medical abbreviation term-value pairs. The medical abbreviation terms are components of the blood examination being tested while the values are results of laboratory examination obtained. For experienced doctors, these terms and values are very familiar, by which th...
Article
Full-text available
Currently, the implementation of teaching and learning at SMP Negeri 1 Binjai Kwala Begumit was done in the classroom alternately. However, with the current condition of pandemic covid-19, the learning process no longer carried out fully in schools. The school has not been using information technology in the form of e-learning applications in the t...
Article
Full-text available
The Bcrypt algorithm is a hashing function created from the Blowfish Algorithm by two computer security researchers, Niels Provos and David Mazieres. This hashing function has several advantages, using the original random salt (the salt is the order in which it is added to the password to make it harder to bruteforce). Random salts also prevent loo...
Conference Paper
Full-text available
Bandwidth management on commercial local area network should be maintain as efficient as possible so that users connections experience best performances and are treated equally and fairly to support business activities. Unsuitable bandwidth management may cause unstructured user management and lead to bandwidth degradation during busy hours. Some u...
Chapter
Full-text available
Conceptually, data science burdened with many other terms that refer to various interests about data. The terms calls the subject of learning and study as scientific fields that categorized as the basis of science, implications, and various applications about concepts, theories, or technologies related to data science. The term has a broad impact a...
Article
Full-text available
Numerous methods can be used to secure important information from potential misuses. Generally, there are two methods of data security, namely steganography and cryptography. Least significant bit (LSB) is a method that is often used in steganography, whereas the Vernam cipher is a popular cryptographic algorithm used for encryption. However, the s...
Article
Business metrics or non-business firms are asked to expand nimbleness and supported. intensity in the event that they wish to work on the worldwide market and take part in collusions. achievement factor for these organizations is the inclusion of information the board (KM) process. An important point of research is that business actors in the field...
Article
Uncertainty of diverse merchant business actors is very much characteristic nowadays; its variants very much depend on the type of business actors, especially digital businesses. In this study we refer to E-Metrics, where every merchant and biller are netted in user behavior activities under the term Financial Technology “acquisition.” Business act...
Article
Full-text available
Abstrak Pengembangan aplikasi sistem menggunakan bahasa pemrograman C dalam mikrokontroler merupakan suatu cara untuk memudahkan dalam mengendalikan gerbang pintu, sehingga para pengguna dapat membuka gerbang pintu secara otomatis dengan menggunakan sistem pengendalian mikrokontroler berbasis bel listrik. Dalam mengembangkan sistem ini, menggunakan...
Article
Full-text available
Distribution is the activity of allocating goods from producers to customers within allocated time. Managing product distribution is very important for the survival of a company, yet improper planning and management will cause the production is stacked in the warehouse thus this will cause unhealthy financial cycles and turnover to the company itse...
Article
Full-text available
In this paper, we propose a method to represent a new method to represent large-scale 3D terrain efficiently to be used in a client-server collaborative terrain editor. The objective is to design a terrain representation that allows changes to be distributed between connected clients without throttling the bandwidth. The method divides the terrain...
Article
Full-text available
At this time the development of technology that forces everything must move fast, the efficiency of time becomes a measure of the success of a distribution or production. the continuity of production and the success of production itself is related to distribution. When the distribution fails, production will fail. Indonesian people especially in No...
Article
Full-text available
This study discusses effect of tournament selection on the way individuals compete on the performance of Genetic Algorithms so which one tournament selection is most suitable for the Traveling Salesman Problem (TSP). One algorithm in solving TSP is Genetic Algorithm, which has 3 (three) main operators, namely selection, crossover, and mutation. Sel...
Article
Full-text available
The presence of new science does not necessarily occur just like that. Every science starts from interests, discussion, and looks for a basic foundation, but in general the main foundation of science is mathematics. Data science includes structured and systematic knowledge about data. However, many other sciences that has a relationship with the da...
Article
Full-text available
Leukocytes are blood cells that contain nuclei, also called white blood cells. Leukocytes have a role in the cellular and humoral defiance of organisms against foreign substances. Laboratory tests of blood samples greatly influence the diagnosis of a disease. Manual blood tests do have a low price but still have some weaknesses such as the length o...
Article
Full-text available
This research conducted to simplify and eliminate attributes or features that are less relevant without reducing the intent and purpose of the original data using Principal Component Analysis (PCA) to improve the performance (accuracy) of the K-NN (K-Nearest Neighbour) classification method. Modifying the method yields an average accuracy of 88%, w...
Article
Full-text available
Single Nucleotide Polymorphism (SNP) is a form of Deoxyribonucleic Acid (DNA) variation that can be used in predicting phenotypes. Data quality control is a crucial stage in the process of detecting phenotypes using SNP data. In this study, we built a web-based application to carry out the SNP data quality control function. Raw SNP data in string t...
Article
Full-text available
Digitalization of the Batak manuscript itself is still done manually. [2][4] Dr. Uli Kozok has made a Batak script font that can run on Windows, Linux, and Apple OSX but there is no system that can digitize Batak manuscripts properly. There is no system that can digitize the Batak manuscript itself automatically. Therefore, we need a system that ca...
Article
Full-text available
Perform predictive data in the form of time series required a correct method, one method is now often used is the propagation of this method is a method that is able to minimize the error value of the output of the predicted number of people, but still generate quite a lot of iteration that needs to be optimized by minimize iterations and use of ti...
Article
Business Metrics in Financial Technology 1500 clients spread across North Sumatera Province. The effect of business advanced (business enterprise and social business) is enormous on clients who are as of now expanding in number. To create Knowledge Acceleration (KAE) Model utilizing Business Metrics on the effect of Commercial Entrepreneurship and...
Article
Full-text available
Stemming is the process of separating essential words from an affixed word. Stemming works by eliminating morphological variations which attached to a word by removing affixes in a word with a dictionary as a reference to the stemming process. One effective algorithm for resolving stemming in Indonesian is an Enhanced Confix Stripping Stemmer algor...
Article
Full-text available
Stemming is the process of deciphering words by carrying out affixes to words to get the right base words. In its development stemming has been developed for various languages, including Porter Stemmer. In this study, the stem was used to add Toba Batak language. Decapitation of affixes in the Toba Batak language is difficult because there are esse...
Preprint
Full-text available
Technology plays an important role so that the education system continues to move dynamically and innovatively. In this research, Fintech uses personal financial management (PFM) which can provide analysis of personal financial analysis, personal financial health assessment, and financial product recommendation services consisting of investment pro...
Article
Full-text available
From the performance measurement of the two algorithms that have been done based on the amount of data, it can be concluded that ID3 algorithm has better performance (precision, recall, and accuracy) than C4.5 algorithm. The performance measurement of the two algorithms based on the number of attributes indicates that the ID3 algorithm has better p...
Article
Full-text available
Backpropagation method is an artificial neural network method that is often used for prediction. However, the use of activation functions and training functions greatly affects the accuracy of a prediction. In this study will discuss the backpropagation method by applying the activation function of Sigmoid bipolar and linear to predict population g...
Article
Full-text available
Tuition Single (UKT in Indonesia) is an operational cost measurement standard for universities in Indonesia which is applied by the government since 2013. This standard is enforced for every public university students who pass entrance university test. The problem with this standard is still found that there are students with tuition single categor...
Article
Full-text available
Data security is one of the most important aspects of today's information era. Some methods are used to secure important data from hackers. The LSB is a steganographic algorithm that is often used to store data in the last bit. In order to improve the security, we combine steganography with cryptography enables. In this research LSB is modified usi...
Article
Full-text available
In high-dimensional data, the classifying process of datasets using the K-Nearest Neighbor algorithm can cause the curse of dimensionality in the form of a decrease in accuracy and long computing time. Dimension reduction is one solution to enhance the performance of the K-Nearest Neighbor algorithm. Feature Selection is one method that can be used...
Article
Full-text available
Server grows as client increases. If single server hardware up scaling has reached the limit, then multiple servers become solution. For local server requirement, the aforementioned solution has been sufficient. Load balancer distributes tasks to participating servers through designated algorithm. This paper assesses some load balancer algorithms f...
Article
Full-text available
Main factors in feature selection is dimensionality in data and decision making on partial information handling as precision classification errors. This study will demonstrate the feature selection using the rough set method, especially in handling missing information along with an ambiguous decision system with a precision variable-based approach...
Article
Full-text available
A process that explains and differentiates the data class is called Classification. The nearest neighbor is calculated based on the distance of each data, especially to determine the k value in the data. To fix K-Nearest Neighbor, it is necessary to test data class and train with Local Mean Based K-Nearest Neighbor using the closest distance measur...
Article
Full-text available
Kuaci is a game property made of plastic and has various unique shapes. Two to ten people usually play Kuaci game in turn. The game starts with determining how many Kuaci will be at stake, and then each player puts the Kuaci into a box. At a distance of one foot from the box, a first straight line is made, and at a distance of two meters from the f...
Article
Full-text available
Initial centroid in K-Means Clustering greatly affects the results of the K-Means algorithm. This research discusses the results of K-Means Clustering with initial centroid determination with a random and Purity method. The initial of random centroid on the data set of 440 data with 6 attributes to analyze the average iterations for the dataset abo...
Article
Computer supported cooperative work (CSCW) is one of the key factors to increase company's productivity. Hence, there are numerous researches trying to increase the efficiency of CSCW implementation to achieve a better collaboration between employees. The recent trend of using 3D content demand industry to develop an efficient and effective workflo...
Article
Full-text available
A range of theories and methods were developed for improving productivity in every industrial activity without damaging the quality of the environment. Each industrial activity must be carried out within the stable region of ecological carrying capacity. A quality of the environment can be achieved by maintaining the ecological stability of the env...
Article
Full-text available
Management of nitrogen fertilizers in rice plants plays an important role in the productivity of rice plants. Excessive use of fertilizers may result in rice leaves becoming pale, yellowish that can lead to its death. Fertilizer should be given based on the content of nitrogen in rice leaves which is indicated by the color of rice leaf. The color o...
Article
Full-text available
Pengelolaan perkebunan kelapa sawit sering mengalami kendala, antara lain masalah organisme pengganggu tumbuhan (OPT) terutama masalah penyakit. Oleh karena itu, dibuatlah pendekatan untuk mengenali penyakit pada daun kelapa sawit agar dapat membantu kinerja dari para petani kelapa sawit dalam menentukan jenis penyakit pada daun sehingga mendapatka...

Network

Cited By