Claim Missing Document
Check
Articles

Found 7 Documents
Search

Perancangan E-Learning pada Pondok Pesantren Imam Muslim Sei Rampah Sovina, Mutiara; Yusfrizal; Harahap, Faisal Amir
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 6 No. 1 (2022): Volume 6, Nomor 1, Januari 2022
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v6i1.185

Abstract

Proses pembelajaran sebagai sistem dipengaruhi oleh berbagai faktor, salah satunya adalah sumber belajar. Dalam rangka mengupayakan peningkatan kualitas program pembelajaran perlu dilandasi dengan pandangan sistematik terhadap kegiatan belajar mengajar yang juga harus didukung dengan upaya pendayagunaan sumber belajar di antaranya adalah bimbingan belajar. Perkembangan teknologi informasi yang sangat pesat dalam dunia pendidikan di tingkat pesantren, membawa banyak perubahan yang sangat signifikan dalam proses belajar mengajar yang telah berlangsung. Salah satu contoh implementasi teknologi tersebut adalah dengan menggunakan media ajar online atau yang sekarang lagi populer dengan sebutan elearning. Dengan sistem e-learning diharapkan siswa atau santri dapat memiliki waktu belajar lebih fleksibel karena materi pelajaran dapat diakses kapan dan dimana saja melalui internet. Semisal ada tugas pun dapat dilakukan tanpa ada kendala jarak. Para pengajar dan santri dapat lebih berinteraksi dan berdiskusi di forum yang sudah disediakan. Aplikasi Elearning ini dirancang menggunakan bahasa pemrograman web dan bersifat online.
Sistem Klasifikasi Kualitas Biji Jagung Berdasarkan Tekstur Berbasis Pengolahan Citra Digital Yusfrizal, Yusfrizal; Sovina, Mutiara; Harahap, Faisal Amir; Lazuly, Ivi; Tanjung, Yahya
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 8 No. 1 (2024): Volume 8, Nomor 1, Januari 2024
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v8i1.497

Abstract

Dalam pertanian jagung, sering ditemukan biji jagung yang rusak, yang kusam, yang kotor, dan yang patah akibat proses pengeringan dan pemipilan. Biji jagung yang berukuran lebih kecil dari semestinya juga dapat memperburuk kualitas. Penentuan kualitas biji jagung biasa dilakukan secara manual dengan pengamatan visual. Pemilihan manual membutuhkan waktu yang lama dan menghasilkan produk dengan mutu yang tidak konsisten karena keterbatasan visual, kelelahan, dan perbedaan persepsi masing-masing pengamat. Pada penelitian ini dirancang sebuah sistem klasifikasi untuk mengetahui kualitas biji jagung dengan menggunakan analisis tekstur berbasis pengolahan citra digital, untuk mendapatkan hasil yang tepat dan objektif. Data citra yang diambil yaitu sampel biji-biji jagung menggunakan kamera digital. Algoritma yang digunakan untuk ekstraksi ciri dan klasifikasi kualitas biji jagung menggunakan K-Nearest Neighbour (K-NN). Berdasarkan simulasi secara keseluruhan, maka dapat disimpulkan bahwa sistem dapat mengklasifikasikan biji jagung berdasarkan tiga tingkat kualitas, yaitu kualitas satu, kualitas dua, dan kualitas tiga. Hasil akurasi tertinggi diperoleh pada saat k=3 yaitu sebesar 91,85%.
Pelatihan Pengamanan Data Pribadi di Dalam Luasnya Teknologi Saat Ini Dengan Menggunakan Metode Ceasar Chiper Sovina, Mutiara; Harahap, Faisal Amir; Syahputra, Eka
Publikasi Pengabdian Masyarakat Vol 2 No 2 (2022): PUBLIDIMAS Vol. 2 No. 2 NOVEMBER 2022
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/publidimas.v2i2.81

Abstract

In the midst of an ever-increasing state of technological development, the development of intranets, servers, websites, browsers, and search engines, which indicate the need for the development of new broad and strong security to accommodate all of our personal data, both large and small scale, in this highly sophisticated era. like this, there are many tools for sending messages including media such as whatsapp and telegram so we can send messages quickly and vice versa we can receive messages quickly, we can easily send messages so we can send news quickly even though we send it to people who are far away . Of all the conveniences it will certainly be very influential when we are going to send messages whose contents are only certain people who are allowed to know the contents, One thing that must be really guarded is a confidential message because if the message is spread it will have a bad impact on us . One way that is commonly used is encryption. Encryption is the process of disguising the meaning of a message so that unauthorized persons cannot know the meaning of the message. Keywords: Data Security, Technology, Kriptografi, Ceasar Chipher,
Optimalisasi Mengamankan Data Pribadi Menggunakan Kombinasi Algoritma ROT13 dan Caesar Chiper: Optimalisasi Mengamankan Data Pribadi Menggunakan Kombinasi Algoritma ROT13 dan Caesar Chiper Harahap, Faisal Amir; Sovina, Mutiara; Lazuly, Ivi; Hanayah, Elen Tania
Publikasi Pengabdian Masyarakat Vol 3 No 1 (2023): PUBLIDIMAS Vol. 3 No. 1 MEI 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/publidimas.v3i1.156

Abstract

In the era of the industrial revolution 4.0, the development of technological advancements is transforming increasingly sophisticated. The involvement of technology is felt from various aspects of activities and services that utilize information systems through the implementation of using a system. It becomes a threat that creates a crime that places a target on the security of personal data. So that provision and a strong foundation are needed to ensure the integration of data security and confidentiality in responding to threats of attacks and exploitation of information system security from irresponsible parties. Cryptography is a science that studies security techniques in information consisting of various algorithms such as ROT13 and Caesar Cipher. This study used the observation method through community service conducted at SMKN 13 Medan, literature study and mixed methods. The results of this study are able to provide an understanding regarding the security of students' personal data by optimizing the use of the ROT13 and Caesar Ciper algorithms. Through this research, it is hoped that it can become a source of reference on the importance of understanding personal data security so as to increase anticipation of information system security concerning personal data
Pelatihan Edukasi Macam-Macam Tindak Kejahatan Teknologi Informasi (Cyber Crime) Dunia Maya dan Penanganannya Sovina, Mutiara; Harahap, Faisal Amir; Lazuly, Ivi; Khalid, Mhd. Azmi
Publikasi Pengabdian Masyarakat Vol 4 No 1 (2024): PUBLIDIMAS Vol. 4 No. 1 MEI 2024
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/publidimas.v4i1.361

Abstract

Educational training regarding information technology crime (cyber crime) and its handling is an important step in facing increasingly complex cyber threats. This article discusses the types of cyber crime, its impact, as well as effective handling strategies and methods. This research uses observation methods through community service carried out at SMKS Bina Satria Medan, literature studies and mixed methods. This research uses a qualitative approach with case study methods at several institutions that have implemented this training. The results of this research show an increase in participants' awareness and ability to identify and deal with cyber crime.
Pelatihan Pentingnya Pemahaman Informasi Penggalian Data (Data Mining) Di Era Digitalisasi Saat Ini Sovina, Mutiara; Harahap, Faisal Amir; Lazuly, Ivi; Akbar, Muhammad
Publikasi Pengabdian Masyarakat Vol 5 No 1 (2025): PUBLIDIMAS Vol. 5 No. 1 MEI 2025
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The digitalization era has brought significant changes in how information is collected, processed, and utilized. One of the key fields in managing this information is data mining. However, many individuals, particularly in educational environments and the general public, still lack a proper understanding of the concepts and practical applications of data mining. This community service activity aims to provide training and basic knowledge about data mining and its benefits in data-driven decision-making. The training targeted teachers and high school students, using a combination of lectures, interactive discussions, and hands-on practice with simple data mining tools. The results showed an increased understanding among participants regarding data mining concepts, workflows, and real-world applications, particularly in education and social contexts. This training is expected to serve as an initial step in building strong data literacy within the community to face the challenges of the digital era intelligently and productively.
Temperature Measurement System Using Arduino Yusfrizal, Yusfrizal; Mutiara Sovina; Harahap, Faisal Amir; Ivi Lazuly
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.203

Abstract

Living things need the right temperature to meet their life needs. It is necessary to do the measurement process. One process formeasuring room temperature that is widely used at this time is the automatic temperature measurement and air conditioning system. The temperature measurement system and air conditioning automation is a system that is very useful for human life. With this system is expected to make it easier to know the room temperature. LM35 is a sensor used in this study as a sensor that is very sensitive to temperature. The sensor results are processed by Arduino Uno which is then displayed in a desktop application using C# .Net and stored in the database. The room temperature measurement system, especially the one made in this project, can measure room temperature with an unstored data tolerance value ± 4 times in one minute. When the temperature exceeds the set temperature, the fan will rotate automatically as an air conditioner. This system works every second and displays the results on the desktop application and stores them in the database as the final storage place which can be developed or made a decision in the future.