PEMODELAN GERAKAN CHESS KNIGHT DALAM MASALAH SISTEM PRODUKSI

  • ari usman universitas harapan medan
  • yuyun dwi Lestari universitas harapan medan
Keywords: Chess Checkers, Artificial Intelligence, Goal

Abstract

Artificial Intelligence is a part of computer science that studies how to make computers able to do work like humans do. The horse checker on a chess board has a movement that resembles the letter L. This chess checker is one of the pieces that is very difficult to move and is often the most dangerous checker if you don't pay close attention to each movement. The simulation of this problem provides an n x n chessboard. The goal of this problem is to move a horse from a certain position on the chess board to the desired goal position by simulating all the shortest possible movement solutions to get to that goal position. This problem is also one of the classic problems in artificial intelligence (AI). Solving this problem can use the help of production systems and tracking trees

Downloads

Download data is not yet available.

References

[1] Adi Nugroho. 2010. Rekayasa Perangkat Lunak Berbasis Objek dengan Metode USDP. Andi. Yogyakarta.
[2] Afyenni, R. 2014. Perancangan Data Flow Diagram Untuk Sistem Informasi Sekolah (Studi Kasus SMA Pembangungn Laboratorium UNP). TEKNOIF , 35-39.
[3] Agarwal, A. 2011. Encrypting Messages using the Merkle-Hellman Knapsack Cryptosystem. International Journal of Computer Science and Network Security , 12-14.
[4] Akik Hidayat, A. R. 2016. Cryptography Asymmetries Merkle-Hellman Knapsack Digunakan Untuk Enkripsi Dan Dekripsi Teks. Seminar Nasional MIPA, (pp. 66-68). Jatinangor.
[5] Chandra. 2016. Keamanan Data Dengen Kriptografi Kunci Publik. times , 11-15.
[6] Dharwiyanti. 2003. Pengantar Unified Modelling Language (UML), www.ilmukomputer.com.
[7] Fresly, I. A. 2015. Implementasi Kriptgrafi Pengamanan Data Pada pesan Teks, Isi File Dokumen dan file Dokumen Menggunakan Algoritma Advanced Encryption Standard. Informatika Mulawarman , 20-31.
[8] Kaluge, G. R. 2013. Penambahan Permutasi Pada Knapsack Chiper. Program Studi Teknik Elektro Dan informatika .
[9] Muslihudin, Muhamad Oktafianto. (2016). Analisis dan Perancangan Sistem Informasi Menggunakan Model Terstruktur dan UML. Yogyakarta.
[10] Muslim, A. 2013. Membangun Aplikasi Autogenerate Scrpt Ke Flowchart Untuk Mendukung Business Process Reengineering. Sarjana Teknik Informatika , 448-456.
[11] Nuraini, Rini. 2015. Desain Algorithma Operasi Perkalian Matriks Menggunakan Metode Flowchart. Februari 2015 Vol. 1 No.1. Jakarta. AMIK BSI.
[12] Opik, A. 2013. Pembuatan Aplikasi Anbiyapedia Ensiklopedi Muslim Anak Berbasis Web. Teknik Informatika . Patricia handoko, A. 2015. Teknik Keamanan Data Menggunakan Kriptografi Dengan Algoritma Vigenere Chiper Dan Steganografi
[13] Dengan Metode End Of File(EOF). Program Studi Teknik Informatika Fakultas Ilmu Komputer Universitas Dian Nuswantoro .
[14] Purwadi, H. j. 2014. Aplikasi Kriptografi Asimetris Dengan Metode Diffie-Hellman Dan Algoritma Elgamal Untuk Keamanan Teks. SAINTIKOM , 183-196.
[15] Sugianto,. 2014. Kriptografi Gabungan Menggunakan Algoritma Mono Alphabetic Dan One Time Pad. Januari 2014 Vol. 4 No.1. Pontianak. Sekolah Tinggi Manajemen Informatika dan Komputer.
Published
2025-01-30
Section
Articles

Most read articles by the same author(s)