Claim Missing Document
Check
Articles

Pengelolaan Perencanaan Keuangan Keluarga Nelayan di Desa Perlis Kabupaten Langkat Mesran; Surya Darma Nasution; Suginam
JPM: Jurnal Pengabdian Masyarakat Vol. 3 No. 1 (2022): Juli 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jpm.v3i1.658

Abstract

Perlis Village used to be a mangrove forest, founded by fishermen from Perlis Country, Malaysia. At first they were looking for fish, then they were stranded on the island of Sumatra. Gradually, due to the occurrence of small-scale migration, many residents of Perlis Malaysia also stopped by this Perlis Village. In accordance with the title of community service, managing the financial planning of fishing families in the village of Perlis Langkat, the objectives of this activity are: Provide training on preparing family finances to increase the knowledge of family heads and housewives in managing family finances so they can set aside income for family savings. Provide training on preparing family finances to increase the knowledge of family heads and housewives in managing family finances so they can set aside income for zakat.
Pembuatan dan Pembangunan Website di Desa Dagang Kerawan kec. Tanjung Morawa, Kab. Deli Serdang, Sumatera Utara - Indonesia Surya Darma Nasution; Muhammad Syahrizal; Dito Putro Utomo
Journal of Social Responsibility Projects by Higher Education Forum Vol 4 No 1 (2023): Juli 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jrespro.v4i1.3994

Abstract

Seeing the rapid development of science and technology in today's world requires us to keep up with the development of science and technology. Especially in the field of informatics technology such as computers and websites, computers are the most advanced technological development media that are widely used by the general public for processing data with supporting software contained in the computer itself. In this era of globalization, the progress of information technology is very rapid, we can find information easily by utilizing internet facilities. The website is one of the clear evidence of the development of computer technology, where the website is a service that can be accessed by any media. Kerawan Trade Village is a village located in Tanjung Morawa sub-district, Deli Serdang district, North Sumatra province, where in the Kerawan trade village there are several hamlets in it. Many activities are carried out by the people who live in the Kerawan trade village such as youth organizations, UKM activities or products and handicrafts produced by the local community. Every activity, product or handicraft produced should be published to the general public in order to increase the selling value of the Kerawan Trading Village or the sale of products or crafts. Kerawan trading village apparatus has planned the development of rural areas as one of the foundations for village economic growth in the long term by relying on the resources available in the village, one of which is the existence of Village Owned Enterprises (BUMDes). So we need a media called the village website as a place or promotional media about all forms of activities carried out by people who live in the Kerawan trade village. The village website is an online-based portal or site in which there is public information about village activities, both in terms of administrative, social, cultural, institutional and other information related to the village. The implementation team has succeeded in creating and also building a Website for Desa Dagang Kerawan. Village officials and also the people of Dagang Kerawan Village have a website as a medium for promoting activities, products and also crafts produced by the local community. Village officials and also the people of Dagang Kerawan Village can manage and understand the benefits of the website.
Penerapan Algoritma Elias Delta Codes Dalam Kompresi File Teks Rizky, Nadia Fariza; Nasution, Surya Darma; Fadlina, Fadlina
Building of Informatics, Technology and Science (BITS) Vol 2 No 2 (2020): December 2020
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (342.547 KB) | DOI: 10.47065/bits.v2i2.138

Abstract

File size or large files are not only a problem in terms of storage, but also another problem when communication between computers. Data usage with a larger size will take longer transfer times compared to data that has a smaller size. Therefore to overcome this problem you can use data compression. Seeing the compression of data compression, data compression is needed that can reduce the size of the data, so that it gains the advantage of reducing the use of external storage media space, accelerating the process of transferring data between storage media, data utilization used in this study is the elias delta codes algorithm. Compression is a method used to reduce the bit or data from the original result to a new result. Where this compression will be applied into the algorithm, the elias delta codes algorithm. After getting the results of the compression it will be designed into Microsoft Visual Studio 2008
Penerapan Algoritma Punctured Elias Codes Dalam Kompresi Citra Depika, Dwi Ayu; Nasution, Surya Darma
Building of Informatics, Technology and Science (BITS) Vol 2 No 2 (2020): December 2020
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (587.152 KB) | DOI: 10.47065/bits.v2i2.301

Abstract

In the process of managing multiple images or images, with larger image sizes or images that can hold longer storage and larger storage, it is needed more often as it cannot be contained on storage media and is not conveyed, thus opening up free space in memory storage media. So to make a lot of free space and have a data size that is not large on the storage media, a compression method is needed which means to shorten the required bit size. Punctured Elias Algorithm Code can be used to obtain information about the compression performed by compressing images to provide benefits in storage and requires more memory space compared to uncompressed images.
Pemanfaatan Dan Penggunaan Aplikasi E-Cash Waqf Dalam Mempermudah Proses Wakaf Uang Surya Darma Nasution; Sri Wanti Nasution
JPM: Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2024): Juli 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jpm.v5i1.2054

Abstract

Yayasan Darul Waqaf Al Hadiy, yang berfokus pada pengelolaan wakaf, menghadapi tantangan dalam proses wakaf uang yang masih konvensional dan kompleks. Donatur sering mengalami kesulitan dan keterbatasan akses, membatasi potensi penuh wakaf uang untuk memberikan dampak positif pada pembangunan sosial dan ekonomi. Untuk mengatasi kendala tersebut, kegiatan pengabdian masyarakat diusulkan untuk mengembangkan aplikasi e-cash waqf. Aplikasi ini tidak hanya akan meningkatkan efisiensi proses wakaf uang, tetapi juga memberikan tingkat transparansi yang lebih baik kepada donatur mengenai penggunaan dana wakaf. Edukasi masyarakat tentang manfaat dan prosedur wakaf uang, terutama melalui aplikasi e-cash waqf, diharapkan akan merangsang minat dan partisipasi dalam kegiatan wakaf uang yang lebih mudah dan transparan. Melalui kegiatan ini, diharapkan tercipta kemudahan dalam proses wakaf uang, peningkatan partisipasi masyarakat, dan pemanfaatan teknologi untuk kegiatan amal yang lebih efisien dan transparan. Seiring dengan itu, proyek ini juga dapat meningkatkan kesadaran masyarakat tentang nilai dan manfaat wakaf uang sebagai kontribusi mereka untuk kebajikan umat Islam dan kepentingan agama secara lebih luas.anggota komunitas akan mampu mengatasi hambatan dalam memanfaatkan media sosial, meningkatkan penjualan produk, serta berkontribusi pada pengembangan dan pelestarian produk lokal.
Pengamanan Perintah Koneksi ke Database MySQL Menggunakan Algoritma Caesar Cipher dan Algoritma Stout Codes Nasution, Surya Darma
Bulletin of Information Technology (BIT) Vol 5 No 1: Maret 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v5i1.1149

Abstract

The MySQL database system is one of the database systems that is widely used in the world, both for personal and corporate purposes. However, the increasing number of cyber attacks occurring on database systems makes it increasingly important to secure data security in database systems. Cyber attacks can be via SQL Injection or hacking via connection commands to the database using the application whose database you want to hack. This is the focus of the problem, so it is necessary to secure connections to the database using cryptographic algorithms. This research aims to improve the security of the MySQL database system by implementing the Caesar Cipher cryptography technique and the Stout Codes compression technique in connection commands to the database via a client application built using the Visual Basic programming language. The testing method used in this research is experimental, where the MySQL database system is tested using ordinary connection commands and connection commands that have been encrypted with the Caesar Cipher algorithm and the Stout Sodes algorithm. The test results show that the use of the Caesar Cipher and Stout Codes crypto-compression systems can increase the security of the MySQL database system by making access difficult for unauthorized parties with a success percentage of 100%. Thus, it is hoped that this research can contribute to improving the security of the MySQL database system which is currently increasingly vulnerable to cyber attacks
Perbandingan Performa Algoritma Md5 Dan Sha-256 Dalam Membangkitkan Identitas File Saputra, Imam; Nasution, Surya Darma
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.435

Abstract

The ease of accessing the internet makes it very easy for humans to share various kinds of files. These files are very easy to download, so it is not uncommon for these files to become duplicates or the same files are stored on personal storage media. This of course will take up personal storage space owned. To avoid this, the steps that can be taken are to provide the identity of each file that represents the contents of the file. So that it can be known whether the contents of the file are the same or not. To generate the identity of a file, a special algorithm is needed that can represent the contents of the file. Algorithms that can be used to generate file identities are algorithms that fall into the hash function category. But in its development there are many algorithms in hash functions that can be used to generate file identities. The algorithms that are often used are the MD5 algorithm and the SHA-256 algorithm. The MD5 and SHA-256 algorithms have different algorithm structures so they have different performance when generating the identity of a file. By comparing the performance between the MD5 and SHA-256 algorithms, we will get an algorithm that has better performance when used to generate file identities.
Perbandingan Performa Algoritma Md5 Dan Sha-256 Dalam Membangkitkan Identitas File Saputra, Imam; Nasution, Surya Darma
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.435

Abstract

The ease of accessing the internet makes it very easy for humans to share various kinds of files. These files are very easy to download, so it is not uncommon for these files to become duplicates or the same files are stored on personal storage media. This of course will take up personal storage space owned. To avoid this, the steps that can be taken are to provide the identity of each file that represents the contents of the file. So that it can be known whether the contents of the file are the same or not. To generate the identity of a file, a special algorithm is needed that can represent the contents of the file. Algorithms that can be used to generate file identities are algorithms that fall into the hash function category. But in its development there are many algorithms in hash functions that can be used to generate file identities. The algorithms that are often used are the MD5 algorithm and the SHA-256 algorithm. The MD5 and SHA-256 algorithms have different algorithm structures so they have different performance when generating the identity of a file. By comparing the performance between the MD5 and SHA-256 algorithms, we will get an algorithm that has better performance when used to generate file identities.
Modifikasi Algoritma Caesar Cipher Menggunakan Linear Congruent Method Untuk Mengamankan Data Nasution, Surya Darma
KETIK : Jurnal Informatika Vol. 1 No. 03 (2024): Januari
Publisher : Faatuatua Media Karya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70404/ketik.v1i03.53

Abstract

Perkembangan teknologi digital meningkatkan kebutuhan untuk melindungi data. Algoritma kriptografi seperti Caesar Cipher menjadi solusi, namun Caesar Cipher klasik rentan terhadap serangan brute force. Penelitian ini memodifikasi Caesar Cipher dengan menggabungkannya dengan algoritma pembangkit bilangan acak Linear Congruent Method (LCM). Modifikasi ini meningkatkan keamanan dengan menambahkan proses enkripsi Caesar Cipher dua lapis. Lapis pertama menggunakan Caesar Cipher konvensional dan lapis kedua menggunakan Caesar Cipher dengan kunci yang dihasilkan oleh LCM. Hasil penelitian menunjukkan bahwa Caesar Cipher yang dimodifikasi dengan LCM lebih aman dibandingkan Caesar Cipher konvensional. Modifikasi ini meningkatkan kompleksitas proses dekripsi dan membuat serangan brute force menjadi lebih sulit.
Pelatihan Desain Grafis Menggunakan Canva Untuk UMKM di Era Digital 4.0 Nasution, Surya Darma; Ginting, Guidio Leonarde
ORAHUA : Jurnal Pengabdian Kepada Masyarakat Vol. 2 No. 02 (2025): Januari
Publisher : Faatuatua Media Karya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70404/orahua.v2i02.127

Abstract

Desa Tumpatan Nibung, yang terletak di Kecamatan Batang Kuis, Kabupaten Deli Serdang, memiliki potensi besar dalam pengembangan Usaha Mikro, Kecil, dan Menengah (UMKM) berkat lokasinya yang strategis dekat Bandara Kualanamu. Namun, mayoritas pelaku UMKM di desa ini menghadapi kendala dalam memanfaatkan teknologi digital, khususnya di bidang pemasaran dan branding produk, yang menjadi kebutuhan mendesak di era digital 4.0. Salah satu tantangan utama adalah kurangnya pemahaman dan keterampilan dalam desain grafis, yang penting untuk menarik perhatian konsumen melalui kemasan produk dan materi promosi yang profesional. Pengabdian masyarakat ini bertujuan untuk meningkatkan keterampilan desain grafis pelaku UMKM di Desa Tumpatan Nibung melalui pelatihan menggunakan aplikasi Canva. Mitra kegiatan adalah 25 pelaku UMKM setempat. Metode pelaksanaan melibatkan analisis kebutuhan melalui wawancara dan observasi, penyusunan modul pelatihan, dan pelaksanaan pelatihan langsung di Aula Kantor Desa Tumpatan Nibung. Kegiatan ini mencakup pengenalan dasar desain grafis, praktik langsung membuat kemasan produk, daftar menu, dan poster menggunakan Canva.  Hasil pelatihan menunjukkan peningkatan signifikan dalam pemahaman peserta terhadap desain grafis, yang tercermin dari kemampuan mereka menghasilkan desain yang menarik dan sesuai kebutuhan. Hambatan berupa perbedaan perangkat yang digunakan (laptop dan handphone) dapat diatasi melalui penyesuaian arahan. Penggunaan Canva terbukti efektif bagi pemula, mendukung kreativitas peserta dalam membuat desain yang kompetitif untuk pasar digital. Pelatihan ini diharapkan mendorong keberlanjutan promosi digital UMKM di Desa Tumpatan Nibung.
Co-Authors Abdul Halim Lubis Abdul Halim Lubis Abdul Karim Abdul Khair Tarigan Abu Sani Tanjung Afriany, Joli Ahmad Qorib Alwin Fau Amir Maniur Silitonga Andsyah Putera Utama Siahaan Bister Purba Cici Mulya Sari Daulay, Nur Hasanah Depika, Dwi Ayu Dikki Handoko Dito Putro Utomo Efori Buulolo Ega Yuliani Elvia Hariska Erna Verawati Ervina, Nina Fadlina Fince Tinus Waruwu Fitri Ruth Diani Br Simangunsong Fitri, Juli Guidio Leonarde Ginting Halimah Ani Harika Fitri Sinurat Hasibuan, Nelly Agustina Hikma Widayu Hotmoko Tumanggor Hutabarat, Sumiaty Imam Saputra Imam Saputra Imam Saputra Irliansyah, Muhammad Rio Joshua Feliex D. Sirait Kurnia Ulfa Maharani Maharani, Maharani Mardiana Haloho Mesran, Mesran Muhammad Syahrizal Muhammad Wirza Pratama Agatmadja Murdani Murdani, Murdani Natalia Silalahi Natalia Silalahi Natalia Silalahi, Natalia Nelly Astuti Hasibuan Nilmah Nilmah Nurdiyanto, Heri Nurma Ningsih Pane, Latifah Hanum Pane, Latifah Hanum Pramadi, Agus Adi Pratiwi, Rizka Dwi Puji Lestari Purba, Bister Putri Ramadhani Putri Ramadhani Rian Syahputra Rivalri Kristianto Hondro Rizky, Nadia Fariza Ronda Deli Sianturi S Sunaryo Saidi Ramadan Siregar Saparuddin Siregar Sari, Tetti Purnama Sari, Tetti Purnama Sianipar, Fitri Nur Indah Sari Sinta M. Panjaitan Sirait, Joshua Feliex D. Siti Nurhabibah Hutagalung Sri Wahyuni Sri Wanti Nasution Suginam Suginam Sukma Hakiki Silitonga Sunaryo, S Sutiksno, Dian Utami Syukur Novertiani Gulo Tari, Ratiya Taronisokhi Zebua Tri Handa Mirza Ulfa, Kurnia Vify Ernanda William Ramdhan Yuhandri Yuhandri, Yuhandri