Claim Missing Document
Check
Articles

Found 40 Documents
Search

Pengembangan Sistem Keamanan Pusat Data dengan Memanfaatkan Group Policy Management Harahap, Herlina; Handoko, Divi
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 6 No 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1075

Abstract

The increasing development of data communications makes the aspect of data security and confidentiality increasingly important. Information technology is developing very rapidly in human life today, making the need for a centralized data storage system important for storing digital archives and documents. Along with this progress, the need for security on storage media is very necessary because technological progress is directly proportional to the crimes that exist on the internet itself. Therefore, how to build a Data Center security system on a LAN network using Group Policy Management on Windows Server 2012 with the aim of providing Data Center security based on user actions in moving data from client computers to other storage locations. By building this system, users will be able to prevent theft of data on clinet computers. To secure data, it is necessary to have tools that can be used to manage security and several other policies in the Microsoft Windows program. With Active Directory and Group Policy Management in Window Server 2012 it provides an easy and effective way to manage preferences and settings for computers and users. Group Policy Management provides a very simple way to see what's happening within a particular Group Policy Object (GPO). Based on the testing, it can be concluded that the existence of Group Policy Management can improve the data security system so that the data cannot be copied or duplicated and stored in other storage media.
Eksplorasi Data Sains: Mengubah Data Menjadi Nilai Dalam Dunia Teknologi Lubis, Husni; Lubis, Ihsan; Syahputra, Edy Rahman; Lubis, Imran; Syahputri, Nenna Irsa; Tommy, Tommy; Harahap, Herlina; Elhanafi, Andi Marwan; Siregar, Rosyidah; Khairani, Mufida
Jurnal Pengabdian Masyarakat Bangsa Vol. 2 No. 12 (2025): Februari
Publisher : Amirul Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v2i12.2058

Abstract

Penguasaan data sains menjadi keterampilan yang semakin dibutuhkan di era digital, termasuk bagi lulusan sekolah menengah kejuruan (SMK) pada bidang Teknologi Komputer dan Jaringan (TKJ) serta Rekayasa Perangkat Lunak (RPL). Namun, pembelajaran mengenai analisis data di tingkat SMK masih terbatas, sehingga siswa kurang memahami bagaimana data dapat dimanfaatkan dalam bidangnya. Pengabdian masyarakat ini bertujuan untuk mengenalkan konsep dasar data sains kepada siswa SMK Nurul Amalia Tanjung Morawa melalui pelatihan berbasis praktik. Kegiatan ini melibatkan beberapa tahap, mulai dari penyusunan materi, pelaksanaan pelatihan, hingga evaluasi. Metode pembelajaran yang digunakan adalah pendekatan teoritis dan hands-on learning melalui studi kasus yang relevan dengan dunia industri. Hasil evaluasi menunjukkan bahwa pelatihan ini meningkatkan pemahaman siswa terhadap konsep dasar data sains serta keterampilan mereka dalam melakukan analisis data sederhana. Siswa juga menunjukkan antusiasme tinggi untuk mendalami lebih lanjut bidang ini. Dari hasil kegiatan ini, disarankan agar materi data sains diintegrasikan ke dalam kurikulum SMK serta dilakukan pelatihan lanjutan untuk memperdalam keterampilan siswa dalam analisis data dan implementasi teknologinya. Selain itu, kolaborasi dengan industri dapat menjadi langkah strategis untuk memperkuat kesiapan siswa dalam menghadapi dunia kerja berbasis data.
Penerapan Algoritma Lempel Ziv-Welch Dan Teknik Steganografik Adaptif Pada Gambar Digital Harahap, Herlina; Budiman, Arief
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Steganografi merupakan seni dan ilmu menyembunyikan pesan rahasia di dalam pesan lain sehingga keberadaan pesan tersebut tidak terdeteksi. Dalam dunia digital, steganografi sering digunakan untuk mengirimkan informasi rahasia serta untuk pengarsipan data digital. Teknik ini berbeda dengan kriptografi yang hanya menyembunyikan makna pesan tanpa menyamarkan keberadaannya. Pada era digital, steganografi telah berkembang dengan berbagai metode, salah satunya adalah Adaptive Steganography yang banyak diterapkan pada berkas multimedia seperti citra digital. Namun, penyembunyian citra digital dalam citra lain membutuhkan citra penampung dengan ukuran besar, yang sering menjadi kendala. Untuk mengatasi hal ini, mekanisme seperti kompresi diperlukan.Kompresi adalah teknik yang bertujuan menghilangkan redundansi atau informasi berlebih pada data digital sehingga ukuran data menjadi lebih kecil tanpa kehilangan esensi informasi. Berbagai metode kompresi telah dikembangkan, termasuk metode Lempel Ziv Welch (LZW). LZW menggunakan teknik dictionary encoding, menggantikan sekumpulan karakter dengan referensi dari pustaka acuan. Metode ini lebih efektif dibandingkan beberapa metode lain, seperti LZ78, yang sering menghasilkan penggantian karakter lebih panjang dari karakter aslinya. Beberapa penelitian, seperti yang dilakukan oleh Musril, Jain, dan Paula Aguilera, telah membahas perbandingan metode kompresi dan peningkatan rasio kompresi dengan algoritma seperti Adaptive Huffman dan LZW. Penelitian ini bertujuan untuk mengimplementasikan metode Lempel Ziv Welch dan Adaptive Steganography pada citra digital. Dengan menggabungkan kedua metode tersebut, penelitian ini diharapkan dapat mengatasi kendala ukuran citra penampung yang besar serta meningkatkan efisiensi dalam penyembunyian data digital. Studi ini juga berpotensi memberikan kontribusi signifikan dalam pengembangan teknik penyembunyian data dan pengelolaan informasi digital secara aman dan efektif.
Perancangan Aplikasi Dashboard untuk Monitoring Pelayanan Kesehatan pada Puskesmas Herlina Harahap; Rismayanti
Journal of Informatics Management and Information Technology Vol. 4 No. 2 (2024): April 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v4i2.397

Abstract

Current technological developments have driven acceleration in various fields, especially in the field of information technology. This has led to many advances in software and is also balanced with advances and sophistication in technology and hardware. Directly or indirectly, information technology has become an important part of various areas of life. Because of the many conveniences offered, information technology can hardly be separated from various aspects of human life. Activities that are usually carried out manually or traditionally will be faster and more precise if carried out with the help of technology. Using information technology can increase efficiency in terms of energy, time and costs. The development of information technology also has an impact on the world of work. With the dashboard application for monitoring public health in the city of Medan, it will simplify patient service and administration at each health center. Specifically registration, type of disease, number of patients, gender and referral hospital.
Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer Pangestu, Raka Nugraha; Yanti, Risma; Harahap, Herlina
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 3 No 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.357

Abstract

Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown IPs from accessing the server and redirecting attacks to virtual IPs provided by the VPN.
Animasi 2D Sebagai Informasi Pelayanan E-KTP Kepada Masyarakat di Kantor Kecamatan Medan Denai Iskandar, Dicky; Harahap, herlina; Khairani, Sumi
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 3 No 2 (2021): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i2.436

Abstract

This animation design is an information about the process of making KTP in Medan Denai District Office. Many residents do not know the process of making a KTP. For this reason, a method of delivering a KTP information is needed. The solution is to make 2D animation using adobe animation CC 2018. The process of making animation itself requires a story idea, scenario, story dialogue and storyboard. This animation provides information about an information process for making a KTP and explains the requirements for making a KTP. And there is a new policy from the government regarding the child identity card process. With this 2D animation, it is easier for the public to know the process of making a KTP so that there are no misunderstandings for officers, so that officers can provide the best service for the community
Aplikasi Pengenalan Bibit Sayuran Organik Dan Bibit Sayuran Hidroponik Dengan Adobe Flash Annisa, Syara; Harahap, Herlina; Asih, Munjiat Setiani
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 4 No 2 (2022): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v4i2.625

Abstract

Vegetables have many kinds that are consumed by the community, ranging from organic vegetables and hydroponic vegetables. Organic and hydroponic vegetables have significant differences in cultivation as well as different planting media so that the vegetables produced by organic and hydroponic seeds are also different, namely organic vegetable seeds with soil media and hydroponic vegetables with growing media that contain more nutrients. Therefore, an introduction application design for organic vegetable seeds and hydroponic vegetable seeds was designed using Adobe Flash CS6. The application aims to help the community to distinguish between organic vegetable seeds and hydroponic vegetables that they want to grow so that the vegetables planted have treatment according to the procedure and the media. There is material about the definition, planting media, shape & structure, types of vegetables, the benefits of vegetables and the advantages & disadvantages of organic vegetables and hydroponic vegetables. This research method uses a qualitative method which is carried out by observing organic and hydroponic seeds, as well as collecting data in the cultivation of organic vegetables and hydroponic vegetables.
Aplikasi Inverse Backpropagation Pada Penskalaan Citra Menggunakan Bilinear Interpolation Siregar, Rosyidah; Syahputri, Nenna Irsa; Harahap, Herlina
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 5 No 1 (2023): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v5i1.756

Abstract

Bilinear interpolation is a method that is widely used in image scaling where bilinear interpolation can be applied to upscaling and downscaling processes. Several previous researches have shown that bilinear interpolation provides low quality reconstruction results compared to other scaling methods but is still a good alternative considering the lower process complexity compared to other scaling methods. For this reason, a mechanism or model is needed that can be juxtaposed with bilinear interpolation scaling so that the reconstruction results have better quality. Referring to previous research, neural networks can be used in the reconstruction process where artificial neural networks are used to learn features or information that is lost during the downscaling process so that it can be reused during the reconstruction or upscaling process. This research applies inverse backpropagation to help improve the quality of image reconstruction results on bilinear interpolation. The test results show a much better MSE value of up to 40.25% compared to reconstruction using ordinary bilinear interpolation. Meanwhile, the increase in PSNR obtained ranged from 0.4% - 9.7%.
Application Optimazion Of Fidelity Watermarking Digital Imegery Discrete Fourier Transform Method And Rivest Shamir Adleman Algorithm Wulan, Nur; Harahap, Herlina; Sari Siregar, Yunita
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.5126

Abstract

As the field of information and communication technology continues to evolve, the potential for digital crimes increases significantly. Information technology plays a key role in facilitating various human activities in the fields of communication and data exchange. The use of digital data, such as documents, photos, videos, and audio, still creates many challenges in proving ownership.. The proliferation of social media platforms like Facebook, Instagram, and TikTok has made it easier for individuals to duplicate, damage, or even steal content, often for malicious purposes related to copyright infringement.To secure digital image data, the technique of fidelity watermarking using Discrete Fourier Transform (DFT) and cryptographic authentication with the Rivest-Shamir-Adleman (RSA) algorithm can be utilized. Watermarking is a technique that embeds information into an image, serving to provide identification marks and secure copyright information. This process does not damage the original image quality. DFT is a watermarking technique that has the capability to convert the image back to the spatial domain after embedding the watermark. On the other hand, RSA is a cryptographic technique that enables data encryption using a public key and decryption with a private key. In the context of image watermarking, RSA is used to secure the watermark information embedded within the image. Watermark information that is encrypted using the public key can only be accessed or decrypted by the party possessing the private key. This enhances the security of the watermark and ensures that the information embedded within the image remains safe, even if the image is shared.
Media Pembelajaran Interaktif Mata Pelajaran Matematika Berbasis Articulate Storyline 3 untuk Meningkatkan Minat dan Motivasi Belajar Murid Sekolah Dasar Sirait, Joni Putra Jhonhenri; Harahap, Herlina; Lestari, Yuyun Dwi
JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Vol 4 No 1 (2024): JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen
Publisher : Universitas Muhammadiyah Enrekang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Di zaman sekarang ini teknologi komputer berkembang sangat pesat, dan dapat dijadikan sebagai solusi untuk menyampaikan atau memberikan informasi tentang media pembelajaran. Salah satunya adalah media pembelajaran interaktif Articulate Storyline 3. Tujuan dari media pembelajaran interaktif Articulate Storyline 3 adalah untuk mengetahui kemampuan pemahaman matematika dan motivasi belajar siswa sekolah dasar yang nantinya berguna dan memotivasi mereka dalam proses pembelajaran