Articles
Classification of the IDR-USD Exchange Rate with Multilayer Perceptron Based on Detection Rate
Al-Khowarizmi Al-Khowarizmi;
Fanny Ramadhani;
Fatma Sari Hutagalung
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 5, No 1 (2021): EDISI JULY 2021
Publisher : Universitas Medan Area
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31289/jite.v5i1.5252
Artificial neural network (ANN) is a set of units in processing a model based on the habits of human neural networks. ANN has one of its duties, namely classification with the concept of supervised learning. ANN also has various methods in performing its duties such as Multilayer perceptron (MLP). Where MLP is one of the ANN methods that can classify based on data as conceptualized in data mining. Very useful classifications and trends in the field of research because of the review of data that will generate knowledge. Nominal Exchange Rate is one of the datasets tested in this study. The exchange rate of the Indonesian Rupiah (IDR) against the United States Dollar (USD) is very necessary both in terms of stock movements and other businesses. So that, it is necessary to use classification to predict future exchange rates. In this study, the MLP method was carried out by obtaining a validation test using MAPE based on the detection rate of sebesar 0.500079879%.
Impelentasi Stronge Cloud menggunakan Teknologi Open Source OwnClod Untuk Penyimpanan Materi Kuliah
Fatma Hutagalung;
Indah Purnama Sari;
Fanny Ramadhani
SITEKIN: Jurnal Sains, Teknologi dan Industri Vol 19, No 1 (2021): Desember 2021
Publisher : Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24014/sitekin.v19i1.14145
Teknologi informasi dan komunikasi pada dasarnya memanfaatkan alat TIK untuk menyimpan dan mengambil informasi. Ini memainkan peran penting dalam menumbuhkan dan mempertahankan pertumbuhan ekonomi negara. Dalam beberapa tahun terakhir, topik ini telah menjadi salah satu yang paling populer di bidang TI, banyak artikel telah ditulis tentang itu, bahkan lebih banyak konferensi telah diadakan, dan berapa banyak solusi yang sudah ada di pasar tidak dapat dihitung sama sekali. Ketersedian ruang penyimpanan sangat dibutuhkan pada sistem akademik perkuliahan. Materi yang diberikan akan dikontribusikan kepada mahasiswa secara cepat, apalagi dimasa pandemic saat ini, penggunaan Teknologi dan Informasi sangat dibutuhkan untuk memperlancar porses belajang mengajar. OwnCloud adalah salah satu teknologi Open Source yang dapat dignakan untuk manajemen storage. Dengan menggunakan OwnCoud materi akan tersimpan dan tidak terjadi penumpukan.
Implementasi Metode Topsis Dalam Menangani Masalah Pengalokasian Dosen Pembimbing Skripsi Dilingkungan Fakultas Ilmu Komputer Dan Teknologi Informasi Universitas Muhammadiyah Sumatera Utara
Fanny Ramadhani;
Al-Khowarizmi Al-Khowarizmi;
Indah Purnama Sari
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 6, No 1 (2021): InfoTekJar September
Publisher : Universitas Islam Sumatera Utara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30743/infotekjar.v6i1.4363
Decision Support System (DSS) is a computerized system used to help policy makers to make a decision. This system is used as a second opinion to assist decision making by combining complex data, models and analytical tools. There are various algorithms or methods applied in this system, one of which is the Technique For Order Preference by Similarity to Ideal Solution (TOPSIS). This method focuses on calculating the smallest distance to the positive ideal solution and the largest distance from the negative ideal solution from a geometric point of view using Euclidean distance. The TOPSIS method will use several criteria such as the competence of the lecturer, the final education of the lecturer, functional position of the lecturer and the quota of students who are being trained. So that it will be more effective in selecting the thesis supervisor according to the field of knowledge controlled by the supervisor. The leader of the Faculty of Computer Science and Information Technology are facilitated by the support of a decision-making support system to allocate thesis supervisors for students by using the TOPSIS method. Sistem pendukung pembuat keputusan (SPPK) atau dalam referensi lain juga disebut dengan Decision Support System (DSS) adalah sebuah sistem yang dikomputerisasi digunakan untuk membantu pemangku kebijakan untuk membuat sebuah keputusan. Sistem ini digunakan sebagai second opinion untuk membantu pengambilan keputusan dengan menggabungkan data, model-model dan alat-alat analisis yang kompleks. Ada berbagai algoritma atau metode yang diterapkan dalam sistem ini, salah satunya adalah Technique For Order Preference by Similarity to Ideal Solution (TOPSIS). Metode ini menitik beratkan pada perhitungan jarak terkecil pada solusi ideal positif dan jarak terbesar dari solusi ideal negative dari sudut pandang geometris dengan menggunakan jarak Euclidean. Metode TOPSIS akan menggunakan beberapa kriteria seperti kompetensi dosen, pendidikan akhir dosen jabatan fungsional dosen dan kuota mahasiswa yang sedang diampuh. Sehingga akan lebih efektif dalam melakukan pemilihan dosen pembimbing skripsi sesuai bidang ilmu yang dikuasai dosen pembimbing. Pembuat kebijakan di lingkungan Fakultasi Ilmu Komputer dan Teknologi Informasi dimudahkan dengan adanya dukungan dari sistem pendukung pembuatan keputusan untuk mengalokasikan dosen pembimbing skripsi bagi mahasiswa dan mahasiswi dengan memanfaatkan metode TOPSIS.
Combination of Hybrid Cryptography In One Time Pad (OTP) Algorithm And Keyed-Hash Message Authentication Code (HMAC) In Securing The Whatsapp Communication Application
Fanny Ramadhani;
Umaya Ramadhani;
Lutfi Basit
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 1, No 1 (2020)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (356.559 KB)
|
DOI: 10.30596/jcositte.v1i1.4359
Whatsapp is a cross-platform messaging application that allows us to exchange messages without SMS fees, because WhatsApp uses the same internet data package for email, web browsing, and more. The WhatsApp application reportedly has improved the security system of applications that are end to end encryption (E2EE). This proves that the WhatsApp manager paid considerable attention to privacy and security issues for its users. In addition, it also implies an important matter where business actors have begun to realize that the application of cryptographic services is part of a very promising business strategy or even determines the present and future consequences. The consequence of implementing E2EE is the description encryption process that takes place at the application layer (OSI layer). Cryptography is a study that studies methods to send messages in secret (that is, encrypted or disguised) so that only the intended recipient of the message can decode and read the message. For this reason, cirptography is one method that can implement E2EE on whatsapp. One Time Pad (OTP) is a type of symmetry algorithm, each key is only used for one message. If the key is random (cannot be reproduced) and only used once, then the algorithm is perfectly safe. The MAC (Message Authentication Code) is an identifier to prove the authenticity of a document obtained by using meaningless messages obtained from processing some of the contents of the document using a private key.
Implementation of Mail Server Based Of Squirrelmail Using Virtualization Technology at Universitas Muhammadiyah Sumatera Utara
Fanny Ramadhani;
Rangga Mahara Miko;
Nurul Sasti Diningsih;
Muhammad Habib
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 2, No 2 (2021)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30596/jcositte.v2i2.7841
Server virtualization technology is the use of one physical machine by several server operating systems. The design and implementation of this mail server was built using Debian.5 as the base operating system server. The design and implementation of mail servers is built using the dns server, web server and mail server / squirrelmail, configured using the help of the virtualbox application as a server. DNS (Domain Name System) is a system that stores information about host names and domain names in the form of scattered databases (distributed databases) on a computer network, for example the Internet. The application used to handle the delivery of mail messages is the mail server. This mail server always receives messages from e-mail clients that the user uses, or maybe from other e-mail servers. Web mail functions to send and view e-mail messages through a web browser. The squirrelmail configuration is done by running the conf.pl: $ / var / www / wemail / config / conf.pl script. Exchange Server services include: Directory Service, Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3), IMAP (Internet Message Access Protocol), Complementary Services, System Attendants. For Mail Server Delivery Process can be seen in number5.2.
Implementation Of Combinatorial in Determining Password Technology
Fanny Ramadhani;
Elza Ahmad;
M. Fahri Fahroza;
Ayu Syahfitri;
Dimas Fadhlurohhman
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 2, No 1 (2021)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30596/jcositte.v2i1.6526
In the era of the Industrial Revolution 4.0, the use of technology has increased rapidly in less than 1 century, so that the use of technology has become a common need of society today. At this time, Users who use this technology even store personal or digitally important things such as storing important documents, personal information, even storing digital wallets or other things that are related to the user's confidentiality. so that to maintain the confidentiality of these things from other users, security is needed that can protect all the contents of the data that we have in this technology so that not just anyone can access things that are important in using this technology.
The Application of Informatics Logic in The Importation of Goods From Outside to Indonesia
Dian Damayanti;
Muhammad Ridho;
Zaki Zain;
Jailani Arsad;
Fanny Ramadhani
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 2, No 1 (2021)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30596/jcositte.v2i1.6527
Logic is a method or technique that was created to examine the accuracy of reasoning and study the principles of correct reasoning and conclusion. Logic is also called "the calculus of computer science" because logic plays an important role in the field of computer science. Not only that, the role of calculus. (mathematics) is equally important for the sciences in the fields of science, economics and also in everyday life. In this study is to provide rules for making decisions on the problem of the number of imported goods entering Indonesia. The method used by the author to complete the research This is using the truth table of the problems to be solved, calculus of propositions, problems to be solved, Studying things from research in general and various methods of solving, the writer also looks for written sources. The definition of a proposition or statement is a declarative sentence that has exactly one truth value. namely: "True" (T) or u "False" (F). Proposition calculus is a method for calculating using propositions / sentences. In proposition calculus reviewed is the value of a declarative sentence (TRUE / FALSE). Logical operations contain a collection of operations that include negation, conjunction disjunction, implication, and bi implication.
Application Design to Calculate Employee Salary In Truth And Calculus Table Learning
Fanny Ramadhani;
Dimas Prayoga;
Ravindra Singh;
Dina Aulia;
Ayu Sekar
Indonesian Journal of Education, Social Sciences and Research (IJESSR) Vol 2, No 2 (2021)
Publisher : Indonesian Journal of Education, Social Sciences and Research (IJESSR)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30596/ijessr.v2i1.6595
Informatics logic is a compulsory subject students especially in propositional calculus material. Proposition calculus is generally studied by various groups of students, from high school to college level. Proposition calculus studies the true (True / False) value of a proposition. Truth table is a tool or table used to provide values with certain rules. The truth table is a table used to see the truth value of a premise / statement. To complete a proposition truth table, we must first find out how many different statements the table contains. This step is absolutely necessary so that there are no errors in solving the problem. Therefore, the authors are interested in making an application for calculating employee salaries with the culpulus proposition method and truth tables that can be used to solve the problem of working on propositions manually, so as to produce accurate truth values. , which at the same time can be used as a medium for student learning
Implementation of the Selection Sort Algorithm to Sort Data in PHP Programming Language
Indah Purnama Sari;
Al-Khowarizmi Al-Khowarizmi;
Fanny Ramadhani;
Oris Krianto Sulaiman
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 1 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30596/jcositte.v4i1.14362
The role of algorithms in software or programming is very important, so it is necessary to understand the basic concept of the algorithm. The sorting algorithm is, selection sort (sorting by selecting) is the process of sorting data according to certain rules so that they are ordered regularly. Sorting data consisting of some criteria have priority where the data is sorted by language PHP programming that provides the sort function to sort array datain ascending or descending order from smallest to largest. The sort function is sort data from smallest to largest digit or last letter of letters first each word prioritizes letters then numbers if the data is in that table data consists of a mixture of numbers and letters. The method used is searching the smallest element of the array and swaps it with the element in the first position, then this algorithm repeats the same thing again, namely looking for elements in second position, The process that will result from this system continues until all array elements successfully sorted.
Penerapan Palang Pintu Otomatis Jarak Jauh Berbasis RFID di Perumahan
Indah Purnama Sari;
Al Hamidy Hazidar;
Mhd Basri;
Fanny Ramadhani;
Asrar Aspia Manurung
Blend Sains Jurnal Teknik Vol. 2 No. 1 (2023): Edisi Juli
Publisher : Ilmu Bersama Center
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.56211/blendsains.v2i1.246
Keamanan suatu ruangan tempat menyimpan barang/aset berharga merupakan salah satu hal yang penting untuk di perhatikan agar pemilik dapat merasa tenang dan nyaman pada saat ruangan tersebut ditinggalkan. Pintu merupakan akses utama orang-orang untuk keluar masuk pada suatu ruangan, rendahnya pengamanan pintu ruangan yang digunakan pada masa kini memberikan rasa khawatir bagi orang yang mendiami ruangan tersebut. Berbagai cara dilakukan untuk meningkatkan keamanan pintu ruangan yang merupakan akses keluar masuknya seseorang, pintu ruangan yang digunakan pada saat ini keamanannya masih menggunakan penguncian konvensional. Penggunaan kunci konvensional banyak digunakan oleh masyarakat akan tetapi keamanannya mudah untuk dilumpuhkan oleh pelaku tindak kejahatan. Otomatis sistem palang pintu berbasis Long Range RFID merupakan penerapan sistem otomatis yang menggunakan Long Range RFID sebagai media aktivasi. Sistem otomasi ini menggunakan mikrokontroler dengan tipe esp-32 sebagai sistemnya pengontrol dan menggunakan motor servo sebagai penggerak utama palang pintu. Sistem palang pintu RFID Long Range memiliki rentang frekuensi yang lebar sehingga dapat mengoptimalkan kinerja komunikasi dari sirkuit yang ditemukan di sistem masuk dan keluar. RFID Jarak Jauh sistem palang pintu dapat digunakan untuk area perumahan yang luas sehingga komunikasi jarak jauh antara perangkat dapat berjalan dengan lancar tanpa menyebabkan terlalu banyak penundaan. Diharapkan penelitian ini sistem masuk perumahan Martubung akan membantu masyarakat komplek dalam hal konfirmasi masuk dan keluar. Selain menjaga keamanan yang kompleks, sistem palang pintu ini diharapkan bisa dipercepat pemantauan informasi dalam kompleks. Metode penelitian yang digunakan adalah metode penelitian dan pengembangan (Research and Development atau R&D). Metode penelitian Research and Development yang disingkat R&D adalah metode penelitian yang digunakan untuk menghasilkan produk tertentu, dan menguji keefektifan produk tersebut.