Claim Missing Document
Check
Articles

Found 4 Documents
Search

Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming Siahaan, R. Fanry; Smangunsong, Agustina; Febrian, Ibnu; Putri, Widia
Jurnal Mahajana Informasi Vol 7 No 2 (2022): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51544/jurnalmi.v7i2.3650

Abstract

A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number. In data communication on a computer network, one of the important things that are lacking attention and understanding from users is information security, both in terms of information content and communication lines. So without realizing it that the communication lines used have been infiltrated by other people. Because one of the loopholes that can be exploited in infiltrating other people's networks is a socket on the network. One way or method of securing communication lines on a network is socket programming. Socket Programming is a protocol that makes connections between devices in a network so that one program can interact with other programs in a network.
Implementasi Metode Moora Pada Sistem Pendukung Keputusan Untuk Pemilihan Hotel Terbaik Di Kota Medan Marpaung, Preddy; Siahaan, R. Fanry; Febrian, Ibnu; Putri, Widia
Jurnal Mahajana Informasi Vol 7 No 2 (2022): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51544/jurnalmi.v7i2.3680

Abstract

A hotel is a temporary lodging place intended for the general public, both individually and in groups, who come from different areas as well as for the people in the area. Hotels are often used by the community as a place to rest or stay because they are considered a comfortable place to rest or other things that support the convenience of the community. The development of hotels in various cities can be said to be very rapid, judging by the large number of hotels, both star and jasmine class, which are scattered in various cities in Indonesia, one of which is Medan City. According to the central statistics agency for North Sumatra in 2017 the city of Medan has 11,366 hotels. With the large number of hotels in the city of Medan scattered in several locations with various hotel classes, hotel rates and hotel facilities make it difficult for people to determine which hotel is appropriate according to existing criteria. If you choose the wrong hotel where to stay where there are no guarantees such as comfort, facilities and others as desired, it will not have an impact on people who want to stay overnight. Therefore it is necessary to implement a method to support a decision support system for choosing the best hotel in the city of Medan according to the desired criteria. Researchers implemented the Multi-Objective Optimization by Ratio Analysis method or commonly abbreviated as the MOORA method in a decision support system to choose the best hotel in the city of Medan. The reason researchers use this method is because several previous researchers used a lot of decision support systems using the MOORA method in solving problems in decision makers. With this research, the public will gain new knowledge to choose hospitality in the city of Medan. Where the outcome promised by the researchers in this study is the sinta 5 accredited journal.
KLASIFIKSI DAYA TANGGAP MAHASISWA TERHADAP MATERI PERKULIAHAN DALAM MASA PANDEMI COVID-19 Siahaan, R. Fanry; Febrian, Ibnu; Putri, Widia
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 5 No. 2 (2022): JURNAL SISTEM INFROMASI DAN ILMU KOMPUTER PRIMA (JUSIKOMP)
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jurnalsisteminformasidanilmukomputer.v5i2.2483

Abstract

Salah satu sektor vital yang ditutup karena dianggap rentan untuk penyabaran virus Covid-19 adalah sektor pendidikan. Proses pembelajaran yang awalnya dilakukan di kampus menjadi pembelajaran dari rumah melalui pembelajaran online. Rata-rata kelompok usia mahasiswa prodi Teknologi Rekayasa Komputer Jaringan di STMIK Pelita Nusantara berbeda-beda sebab mahasiswa yang mendaftar sebagai mahasiswa baru berasal dari mereka yang baru lulus dari pendidikan SMA/ SMK sederajat, yang sudah bekerja beberapa tahun di instansi pemerintah atau swasta dan meraka yang sudah lulus dari jenjang D-3 melanjutkan pendidikan ke jenjang S-1. Dengan kelompok usia yang beraneka ragam serta pelaksanaan perkuliahan secara online, tentu daya tanggap mahasiswa dalam memahami setiap materi perkuliahan yang disampaikan oleh dosen akan berbeda-beda hal ini akan berdampak terhadap masa studi dari setiap mahasiswa. Metode yang digunakan dalam penelitian ini adalam metode deskriptif kuantitatif berupa angket dengan jumlah data sampling sebanyak 35 responden yang diolah dengan algoritma Naïve Bayes dalam aplikasi Rapidminer. Tujuan dari penelitian ini adalah untuk mengelompokan mahasiswa yang tanggap dan tidak tanggap terhadap materi perkuliahan online. Hasil uji coba menunjukan bahwa tingkat akurasi sistem sebesar 81.25%, precision 80.00% dan recall 88.89%.
STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN Siahaan, R. Fanry; Sitohang, Amran; Febrian, Ibnu; Putri, Widia
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 6 No. 1 (2022): JURNAL SISTEM INFROMASI DAN ILMU KOMPUTER PRIMA (JUSIKOMP)
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jurnalsisteminformasidanilmukomputer.v6i1.2863

Abstract

Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where confidential data or information is hidden or inserted into other text media so as not to arouse suspicion from other parties. Based on the input data calculated on the number of words, it has a significant influence on the results of the stegotext. This can be seen from the comparison of the length of the input message which is calculated in the number of words with the length of the output message (stegoteks) which is influenced by the length of the style (pattern) of the sentence structure used. For input data with a word length of 1, the average capacity of the stegotext is 8 to 9 words or 12.4%, for input word length 2, the average capacity of the stegotext is 22 words or 8.85% and the input word length is 4 then the capacity of the stegotext is between 30 to 33 words or equivalent to 12.91%. Keywords :Text Steganography; Sentence Pattern; Payload Balancing Capacity