Claim Missing Document
Check
Articles

Found 16 Documents
Search

Pengenalan Tentang Otomasi Sistem Kerja Komputer di Lembaga Pendidikan Ernala Sinaga, Sony Bahagia; Nadeak, Berto; Siagian, Edward Robinson
ULEAD : Jurnal E-Pengabdian Volume 1 No. 1 Juli 2021
Publisher : Fakultas Ilmu Komputer, Universitas Katolik Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.795 KB) | DOI: 10.54367/ulead.v1i1.1305

Abstract

Seiring dengan perkembangan teknologi, sistem otomasi telah mengambil alih sistem manual dan semi manual. sistem otomasi  sangat mendukung atas terlaksananya suatu proses kerja dari objek. Sistem otomasi ini dikembangkan untuk menghindari efek terjadinya pergeseran posisi sampel-referensi. Tujuan dari kegiatan ini adalah untuk memberi pemahaman dan membuka pola pikir peserta pelatihan. Tujuan dalam pengabdian ini adalah untuk menambah pengetahuan dan diharapkan bermanfaat bagi kita semua terutama bagi siswa Lembaga Pendidikan Ernala. Serta dengan ini kita dapat mengetahui fungsi dari teknologi komputer untuk segala aspek kehidupan khususnya dibidang Otomasi industri. Guna membuka pola pikir Siswa di Lembaga Pendidikan Ernala tentang pemahaman Otomasi Kerja Komputer.
Analysis and Implementation of Similarity Measurement in Documents Using Semantic Methods Prayogi, Satria Yudha; Sinaga, Sony Bahagia
Pascal: Journal of Computer Science and Informatics Vol. 1 No. 02 (2024): Pascal: Journal of Computer Science and Informatics
Publisher : Devitara Innovations

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The number of documents available in digital form is increasing. Meanwhile, one document and another document may be related to each other, but they must not be plagiarized without including the reference source. For this reason, a mechanism for detecting similarities is needed. This research only discusses similarity in documents. In this research, the technique used to solve the above problem is to use text mining techniques to categorize the documents searched according to keywords. Meanwhile, to search for documents according to keywords, the indexing process is used to display documents that are searched for according to keywords. Semantics is a technique used by search engines to match key words on one page with another page. This method has been used very often before, because it is very precise and easy. The weight values (W) of D1 and D2 are the same. If the document weight sorting results cannot be sorted quickly, because both W values are the same, then a calculation process using the vector-space model algorithm is needed. The idea of this method is to calculate the cosine value of the angle of two vectors, namely W from each document and W from keywords. From the research results, it can be seen that document 3 (D3) has the highest level of similarity to keywords, followed by D2 and D1.
Designing Fan Speed Regulation Software Using Backpropagation Method Prayogi, Satria Yudha; Sinaga, Sony Bahagia
Pascal: Journal of Computer Science and Informatics Vol. 2 No. 01 (2024): Pascal: Journal of Computer Science and Informatics
Publisher : Devitara Innovations

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fans have the main function of air conditioning, room fresheners, and dryers which are usually equipped with heating components. In addition, fans are also used in vacuum cleaners and various decorative elements in the room, which play a role in keeping the air temperature within the specified limits. Advances in the field of computer programming provide many benefits, especially in terms of ease and efficiency in the use of devices connected to computers. With control through a computer, the device can be operated more optimally and responsively according to the needs of the user.  
Design of Indonesian Sentence Grammar Checking Software Using Left Corner Parser Nadeak, Berto; Sinaga, Sony Bahagia
Pascal: Journal of Computer Science and Informatics Vol. 2 No. 02 (2025): Pascal: Journal of Computer Science and Informatics
Publisher : Devitara Innovations

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Grammar checking is an important component of Natural Language Processing (NLP), particularly for improving the quality of written communication. This article discusses the design of grammar-checking software for Indonesian sentences using the Left Corner Parser method. The Left Corner Parser is a syntactic parsing method that combines the advantages of top-down and bottom-up parsing, making it efficient in recognizing sentence structures. This study includes the stages of data collection, the design of Indonesian grammatical rules, the implementation of the parser, and the evaluation of checking accuracy. The results show that the software can effectively detect sentence structure errors in various types of sentences, from simple to complex. With further development, this tool has the potential to be applied in educational tools and automatic text editing applications.
Pemasangan Dan Pemeliharaan Jaringan Komputer Pada Sekolah Menengah Kejuruan Parulian 1 Medan Sinaga, Sony Bahagia; Nadeak, Berto
Marsipature Hutanabe: Jurnal Pengabdian Kepada Masyarakat Vol. 1 No. 02 (2024): Marsipature Hutanabe: Jurnal Pengabdian Kepada Masyarakat
Publisher : CV. Devi Tara Innovations

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of computer technology is increasing rapidly, this can be seen in the era of the 80s computer networks are still a puzzle that academics want to answer, and in 1988 computer networks began to be used in universities, companies, now entering this millennium era, especially the world wide internet has become the daily reality of millions of people on this earth. In addition, network hardware and software have completely changed, at the beginning of its development almost all networks were built from coaxial cables, now many of them have been built from fiber optics or wireless communication. Computer network technology is already used in various fields including education. Some schools have computers to speed up the work process, and some even use computer network technology to support the learning process. Currently, many schools have computer networks that integrate local networks into intranet and internet networks. Given the need for computer-based education delivery, computer networks in schools are very helpful in the teaching and learning process and make it easier for students and teachers to access information through the internet. In this training, participants will be taught and accompanied to learn to install computer networks. The purpose of this activity is to provide basic computer network training to students, starting from the introduction of computer networks, the practice of making network cables to the configuration of LAN computer networks. The results obtained in general students quickly mastered the material in the installation of computer networks, this is shown by the results of the pre-test. The importance of the results of this service is used to find out how much ability to absorb/capture the material provided by the instructor.
IMPLEMENTASI ALGORITMA TRANSPOSISI RAIL FENCE CIPHER UNTUK PENGAMANAN VIRTUAL ACCOUNT Siagian, Widyanti Masintan; Sinurat, Sinar; Sinaga, Sony Bahagia
Pendas : Jurnal Ilmiah Pendidikan Dasar Vol. 9 No. 04 (2024): Volume 09, Nomor 04, Desember 2024
Publisher : Program Studi Pendidikan Guru Sekolah Dasar FKIP Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/jp.v9i04.18129

Abstract

The rapid advancement of information technology has made information a fundamental need for everyone. With the progression of technology, the security of data and information exchanged is increasingly important. To manage virtual accounts, especially regarding security, a password is essential. Passwords are required for transactions, accessing account information, or making changes to virtual account settings. The security procedures for virtual account passwords can vary depending on the service provider or financial institution managing the virtual account. This research aims to investigate the use of one cryptographic algorithm, Rail Fence transposition, in securing supplier data. The study employs an experimental approach using supplier data to simulate the application of Rail Fence transposition. This research contributes to the application of encryption to protect supplier databases. Overall, the results indicate that the Rail Fence method can be effectively implemented to enhance the security of supplier data within a company.