Claim Missing Document
Check
Articles

Found 39 Documents
Search

Sosialisasi Blog Sebagai Media Mengasah Kemampuan Menulis Dan Sarana Berbagi Ilmu Bagi Siswa SMA Siregar, Yunita Sari; Mufida Khairani; Nurjamiyah
Jurnal Pengabdian Masyarakat Vol. 2 No. 2 (2023): Desember 2023
Publisher : Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/japamas.v2i2.113

Abstract

In the era of increasingly sophisticated and developing technology, the use of computer-based technology is not only used in the world of education and offices, but is widely used as a medium of learning and digitalization for students. There are many applications and software that can be used to support digital-based learning for students at school such as blog media. Blog is a form of web application that can contain writing that can be accessed by anyone who wants to get information. Where this student blog will contain various student experiences in learning at school. Peng activities. This community service activity was carried out at Nur Azizi Tanjung Morawa High School, Deli Serdang Regency by utilizing Blogs as a medium to hone writing, where the participants of this activity were 30 high school students. The purpose of this activity is to increase insight, knowledge and experience for high school students in web writing learning activities and sharing information and learning experiences for others. The results of this training activity are expected by high school students to increase the use and use of digitalization-based information technology as a medium to hone writing and a means of sharing learning knowledge through Blog media.
Aplikasi media pembelajaran interaktif berbasis augmented reality pada pengenalan calistung untuk rumah edukasi anak pesisir Desa Percut Harliana, Putri; Farhana, Nurul Ain; Siregar, Yunita Sari; Ramadhan, Rizki Agung; Ardiantito, Wahyu
TEKMULOGI: Jurnal Pengabdian Masyarakat Vol 4, No 1 (2024): Mei 2024
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/tmg.v4i1.63149

Abstract

Nowadays, increasingly rapid technological developments encourage learning progress. However, the method still used remains the same, namely using textbooks and modules. Actually, this method is quite good because the learning system is more technical and structured. In reality, what happens is the opposite, because the increasingly rapid development of technology makes children lazy to read books and more interested in playing games on smartphones. So there is no interest in children learning. Therefore, the author took the initiative to create an interactive and efficient learning media application that can be accessed from a smartphone. It is hoped that this application can increase children's desire to learn starting from an early age, especially at the Coastal Children's Education Center (REDAKSI). The application created is a Reading, Writing and Counting (calistung) learning application aimed at children under the age of ten. This application was created using Unity and contains several learning menus in the application.
Sistem Pendukung Keputusan Dalam Pemilihan Alat Kontrasepsi Dengan Metode Profile Matching Harahap, Ferdy Ramadhan; Siregar, Yunita Sari; Wulan, Nur
Digital Transformation Technology Vol. 4 No. 1 (2024): Periode Maret 2024
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v4i1.3872

Abstract

Abstrak Alat kontrasepsi adalah suatu cara atau metode yang bertujuan untuk mencegah pembuahan sehingga tidak terjadi kehamilan. Permasalahan yang terjadi pada pasangan usia subur saat ini cukup banyak, sementara pertumbuhan penduduk tidak seimbang dengan pertumbuhan lapangan kerja, maka seharusnya pasangan usia subur tersebut mengenal alat kontrasepsi untuk tindakan atau usaha mencegah terjadinya kehamilan dan jarak antara anak yang pertama dengan yang berikutnya. Saat ini ada banyak alat, metode dan jenis alat kontrasepsi. Berdasarkan masalah tersebut, perlu dicarikan upaya untuk memecahkan masalah tersebut. Sehingga penulis ingin memecahkan permasalahan yang terjadi, yaitu membangun sistem pendukung keputusan untuk membantu peserta program keluarga berencana dalam memilih alat kontrasepsi. Dalam perancangan sistem penulis menerapkan metode untuk mendapatkan hasil output atau keluaran yang maksimal. Metode yang digunakan oleh penulis adalah metode Profile Matching (PM) adalah adalah sebuah mekanisme pengambilan keputusan dengan mengasumsikan bahwa terdapat tingkat minimal yang harus dipenuhi atau dilewati. Hasil penelitian ini mencapai beberapa temuan penting dalam pengembangan sistem pendukung keputusan untuk memilih alat kontrasepsi dalam konteks program keluarga berencana. Diharapkan hasil penelitian ini dapat berkontribusi pada pengurangan angka kehamilan yang tidak diinginkan, peningkatan pemahaman masyarakat tentang metode kontrasepsi, serta memberikan kendali lebih besar kepada individu dalam perencanaan keluarga mereka, mendukung tujuan program keluarga berencana secara efektif.
Penerapan Animasi 2D pada Edukasi Safety terhadap Gunung Berapi dengan Metode 2D Hybrid Animation Indah Paramita; Yunita Sari Siregar; Yessi Fitri Annisah Lubis
Jurnal Pendidikan Tambusai Vol. 8 No. 1 (2024): April 2024
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai, Riau, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jptam.v8i1.14094

Abstract

Perancangan animasi 2D bertujuan untuk mengedukasi siswa-siswa berumur sampai 18 tahun yang masih minim pengetahuan tentang bahaya erupsi gunung berapi. Gunung berapi merupakan salah satu bencana berbahaya yang ditakuti banyak orang, maka dari itu perlunya edukasi untuk penyelamatan diri apabila terjadinya bencana. Penelitian ini dibuat dengan tujuan mengedukasi yang mampu diterima siswa-siswa dengan lebih menarik, edukasi ini berguna untuk kesiapsiagaan akan terjadinya erupsi gunung berapi. Animasi 2D ini dibuat dengan teknik 2D Hybrid Animation, teknik ini merupakan teknik yang mengkombinasikan dari gambar yang digambar tangan di atas kertas, yang dipindai dan ditransfer ke komputer, kemudian diubah menjadi gambar digital. Dengan menggunakan teknik 2D hybrid animation dapat membantu menganimasikan grafis, sekaligus dalam ukuran besar, dengan cepat dan mampu mengerjakan sejumlah frame dengan urutan. Animasi ini dibuat dengan kemenarikan, sehingga animasi ini dapat lebih mudah dipahami siswa. Video animasi 2D yang dihasilkan ini dapat mengedukasi siswa berumur sampai 18 tahun yang masih sedikit pengetahuannya tentang bahayanya gunung berapi yang masih aktif di Indonesia ini, Animasi ini dapat memberikan pengalaman belajar yang lebih mudah dipahami.
Application Optimazion Of Fidelity Watermarking Digital Imegery Discrete Fourier Transform Method And Rivest Shamir Adleman Algorithm Wulan, Nur; Harahap, Herlina; Sari Siregar, Yunita
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.5126

Abstract

As the field of information and communication technology continues to evolve, the potential for digital crimes increases significantly. Information technology plays a key role in facilitating various human activities in the fields of communication and data exchange. The use of digital data, such as documents, photos, videos, and audio, still creates many challenges in proving ownership.. The proliferation of social media platforms like Facebook, Instagram, and TikTok has made it easier for individuals to duplicate, damage, or even steal content, often for malicious purposes related to copyright infringement.To secure digital image data, the technique of fidelity watermarking using Discrete Fourier Transform (DFT) and cryptographic authentication with the Rivest-Shamir-Adleman (RSA) algorithm can be utilized. Watermarking is a technique that embeds information into an image, serving to provide identification marks and secure copyright information. This process does not damage the original image quality. DFT is a watermarking technique that has the capability to convert the image back to the spatial domain after embedding the watermark. On the other hand, RSA is a cryptographic technique that enables data encryption using a public key and decryption with a private key. In the context of image watermarking, RSA is used to secure the watermark information embedded within the image. Watermark information that is encrypted using the public key can only be accessed or decrypted by the party possessing the private key. This enhances the security of the watermark and ensures that the information embedded within the image remains safe, even if the image is shared.
Pemanfaatan Aplikasi MySQL untuk Membantu Siswa SMK Swasta Nur Azizi dalam Pengolahan Data Siregar, Yunita Sari; Oktaviana Sembiring, Boni; Rahayu, Eka; Hasdiana, Hasdiana; Franchitika, Rizky
Jurnal Pengabdian Masyarakat Vol. 3 No. 2 (2024): Desember 2024
Publisher : Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/japamas.v3i2.185

Abstract

The rapid development of technology has influenced various aspects of education, including data management in schools. One of the key aspects of vocational education is efficient data processing to support administrative and academic activities. This community service program was conducted to provide students of SMK Swasta Nur Azizi with knowledge and skills in utilizing MySQL as a database management system for data processing. MySQL was chosen for its capability to efficiently manage and process data, making it highly relevant to industry needs. This program employed a qualitative approach with a case study method, focusing on the implementation of MySQL in student data processing. Data were collected through interviews, observations, and documentation to analyze the effectiveness of MySQL in school operations. The activities included socialization sessions covering theoretical explanations of MySQL fundamentals, software installation, and hands-on practice in database creation and SQL queries. The results of this program indicate that students were able to understand the basic concepts of MySQL, create databases and tables, and process data using fundamental SQL commands such as SELECT, INSERT, UPDATE, and DELETE. Thus, this initiative is expected to enhance students' data processing skills, enabling them to apply these competencies in various fields and strengthen their qualifications in the job market.
Analysis of Most Significant Bit (MSB) Steganography Method in an IoT-Based Keyboard Learning System Darinda Sofia Tanjung; Sari Siregar, Yunita; Juliana, Juliana
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.5179

Abstract

The advancement of digital technology has driven the development of Internet of Things (IoT)-based learning systems to enhance efficiency and interactivity in the teaching and learning process.  IoT implementations is the development of a sensor-based keyboard learning system. This system is designed to help users improve their typing skills through monitoring parameters such as typing speed, keypress patterns, and usage duration. This data becomes an important asset that requires protection due to its connection to user privacy and personal performance evaluation. In IoT-based systems, data is typically transmitted through networks that are potentially vulnerable to security threats, such as eavesdropping, modification, or theft of data or information. The development of this system is carried out in a sensor-based keyboard learning application with IoT integration, which is equipped with data security features using steganography techniques. Steganography is a technique used to hide data or information within a digital medium so that it cannot be accessed by others. The method used is the  Most Significant Bit (MSB), a simple steganography algorithm that utilizes significant bits from image files to embed secret messages. This research aims to analyze the effectiveness of the MSB method in protecting user data stored and transmitted through IoT system. The implementation is carried out on a sensor-based keyboard learning system, where the data collected from the sensors is used to track typing speed, keypress patterns, and typing duration. This data is encrypted using MSB steganography and embedded into a cover image before being transmitted through the IoT network.
Pelatihan Microsoft Office Dalam Pembuatan Modul Ajar Bagi Guru SD Swasta Bani Adam AS Siregar, Yunita Sari; Sembiring, Boni Oktaviana; Damanik, Almerinda Regina Puspa Sari
Jurnal Pengabdian Masyarakat Vol. 4 No. 1 (2025): Juni 2025
Publisher : Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/japamas.v4i1.208

Abstract

This Microsoft Office training program aims to enhance the ability of teachers at Bani Adam AS Private Elementary School in developing effective and engaging digital teaching modules. The training was conducted through a hands-on approach, covering material on text processing using Microsoft Word and the use of PowerPoint as the primary medium for preparing instructional content. Evaluation was carried out through pre-tests and post-tests, as well as observation of participants’ work. The results of the training showed a significant improvement in teachers’ understanding and skills in designing teaching modules that are more interactive, well-structured, and aligned with the curriculum. Furthermore, the training encouraged teachers to be more creative in presenting technology-based learning materials, thereby improving the quality of classroom instruction.  The positive impact of this activity serves as a strong foundation for organizing follow-up training programs to further expand teachers’ proficiency in using digital technologies in education.
Application Optimazion Of Fidelity Watermarking Digital Imegery Discrete Fourier Transform Method And Rivest Shamir Adleman Algorithm Wulan, Nur; Harahap, Herlina; Sari Siregar, Yunita
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.5126

Abstract

As the field of information and communication technology continues to evolve, the potential for digital crimes increases significantly. Information technology plays a key role in facilitating various human activities in the fields of communication and data exchange. The use of digital data, such as documents, photos, videos, and audio, still creates many challenges in proving ownership.. The proliferation of social media platforms like Facebook, Instagram, and TikTok has made it easier for individuals to duplicate, damage, or even steal content, often for malicious purposes related to copyright infringement.To secure digital image data, the technique of fidelity watermarking using Discrete Fourier Transform (DFT) and cryptographic authentication with the Rivest-Shamir-Adleman (RSA) algorithm can be utilized. Watermarking is a technique that embeds information into an image, serving to provide identification marks and secure copyright information. This process does not damage the original image quality. DFT is a watermarking technique that has the capability to convert the image back to the spatial domain after embedding the watermark. On the other hand, RSA is a cryptographic technique that enables data encryption using a public key and decryption with a private key. In the context of image watermarking, RSA is used to secure the watermark information embedded within the image. Watermark information that is encrypted using the public key can only be accessed or decrypted by the party possessing the private key. This enhances the security of the watermark and ensures that the information embedded within the image remains safe, even if the image is shared.