p-Index From 2021 - 2026
9.552
P-Index
This Author published in this journals
All Journal Journal Information System Development METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Jurnal Informatika Kaputama (JIK) Jurnal Sistem Informasi Kaputama (JSIK) Jurnal Abdi Ilmu JTIK (Jurnal Teknik Informatika Kaputama) KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer JUKI : Jurnal Komputer dan Informatika JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Bulletin of Multi-Disciplinary Science and Applied Technology Journal of Artificial Intelligence and Engineering Applications (JAIEA) International Journal of Informatics, Economics, Management and Science Journal of Engineering, Technology and Computing (JETCom) Jurnal Pengabdian Pada Masyarakat METHABDI International Journal of Health, Engineering and Technology Indonesian Journal of Education And Computer Science Indonesian Journal of Science, Technology, and Humanities Jurnal Penelitian Teknologi Informasi dan Sains Jurnal ABDIMAS MUTIARA International Journal of Community Service Implementation Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Modem : Jurnal Informatika dan Sains Teknologi Repeater: Publikasi Teknik Informatika dan Jaringan Switch: Jurnal Sains dan Teknologi Informasi Fusion : Journal of Research in Engineering, Technology and Applied Sciences Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Ulil Albab Pascal: Journal of Computer Science and Informatics JURNAL TEKNOLOGI, KESEHATAN DAN ILMU SOSIAL Router : Jurnal Teknik Informatika dan Terapan
Claim Missing Document
Check
Articles

IMPLEMENTASI ALGORITMA KRIPTOGRAFI MODULAR MULTIPLICATION – BASED BLOCK CIPHER (MMB) PADA KEAMANAN DATA Husnul - Khair; Suci Ramadani
JTIK (Jurnal Teknik Informatika Kaputama) Vol 4, No 2 (2020): Edisi Juli Nomor. 4 Volume. 2 Tahun 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam kehidupan sehari – hari manusia banyak bergantung pada teknologi informasi. Maka mulai bermunculan berbagai media untuk mengakses informasi dan mengelola informasi sehingga banyak kemudahan-kemudahan yang kemudian didapat untuk mengakses suatu informasi. masalah keamanan informasi menjadi hal yang sangat penting dalam suatu sistem informasi untuk keamanan bersama maupun keamanan pribadi. Untuk itu diperlukan suatu sistem keamanan yang dapat melindungi suatu informasi untuk pengamanan data untuk mengantisipasi ancaman tersebut seperti teknik kriptografi. Kriptografi metode Modular Multiplication Based Block Cipher (MMB) dapat digunakan untuk menjaga keamanan pesan saat pesan dikirim dari suatu tempat ke tempat yang lain. Program aplikasi yang telah dibangun hanya mengenkripsi plaintext dengan format doc, txt, xls, ppt. Penelitian ini menghasilkan suatu program untuk mengamankan pesan rahasia berbentuk file. File yang dienkrip dapat diungkapkan kembali sama persis dengan file aslinya dan tidak mengalami perubahan isi file sedikit pun.
RANCANG BANGUN ALAT DETEKSI KETINGGIAN AIR UNTUK JARINGAN IRIGASI PADA DINAS PEKERJAAN UMUM DAN PENATAAN RUANG KAB.LANGKAT DENGAN MENGGUNAKAN METODE FUZZY LOGIC Lili Musarofah; Rusmin Saragih; Husnul Khair
JTIK (Jurnal Teknik Informatika Kaputama) Vol 6, No 2 (2022): Volume 6, Nomor 2 Juli 2022
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Telah dirancang sebuah alat deteksi ketinggian air untuk jaringan irigasi pada dinas pekerjaan umum dan penataan ruang kab. Langkat dengan menggunakan metode fuzzy logic. Sistem alat ini menggunakan mikrokontroller arduino nano yang dimana arduino nano  ini berfungsi sebagai pengolah data, dan pengontrol output berdasarkan input yang diberikan oleh sensor. Pada alat juga menggunkan sensor ultrasonic HC-SR04 yang dimana sensor ini berfungsi untuk membaca input dari nilai ketinggian air pada irigasi sawah, output dari alat ini berupa pompa air yang berfungsi untuk mengisi air pada irigasi sawah yang dimana pompa air pada sistem alat ini dapat mengisi air scara otomatis dan apabila air pada irigasi sawah sudah penuh maka scara otomatis juga pompa air akan berhenti mengisi. Diharapkan dari hasil penelitian ini dapat menjadi salah satu teknologi tepat guna yang dapat membantu kinerja manusia dalam kehidupan sehari-hari khususnya dalam bidang pertanian.
SISTEM PAKAR MENDIAGNOSA PENYAKIT KELAINAN DARAH PADA MANUSIA MENGGUNAKAN METODE BAYES BERBASIS WEB Eriska Sitepu; Magdalena Simanjuntak; Husnul Khair
JTIK (Jurnal Teknik Informatika Kaputama) Vol 6, No 1 (2022): Volume 6, Nomor 1 Januari 2022
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sistem Pakar adalah sistem yang menggunakan pengetahuan manusia, dimana pengetahuan tersebutdimasukkan ke dalam sebuah komputer, dan kemudian digunakan untuk menyelesaikan masalah –masalah yang biasanya membutuhkan kepakaran atau keahlian manusia. Dalam hal ini sistem pakardigunakan untuk mendiagnosa penyakit kelainan darah pada manusia. Penyakit kelainan darahmerupakan suatu kondisi di mana terdapat gangguan pada fungsi darah dalam tubuh. Adapun yangdibahas adalah bagaimana menentukan jenis penyakit kelainan darah menggunakan metode bayes,bagaimana sistem pakar merancang dalam mendiagnosa penyakit kelainan darah menggunakanmetode bayes, dan merancang metode bayes dalam mendiagnosa penyakit kelainan darah denganmenggunakan bahasa pemrograman PHP dan menginput gejala sebagai variabel. Metode bayesadalah salah satu cabang statistik matematika untuk membuat satu model ketidakpastian dari suatukejadian yang terjadi dengan menggabungkan pengetahuan umum dengan fakta. Tujuan yang didapatadalah memberikan informasi untuk membantu masyarakat pada umumnya dalam mendiagnosapenyakit anemia dan mendapatkan hasil diagnosa yang tepat dan akurat.
Sistem Pakar Diagnosa Tingkat Depresi Mahasiswa Tingkat Akhir Dengan Menggunakan Metode Certainty Factor Nisrina Naufalia Santoso; Yani Maulita; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Changes in the learning environment can affect students' mental health so that students adapt forcefully. It is not only intelligence that determines success in learning, but peace of mind which also greatly influences the ability to use this intelligence. Mental health disorders or depression are more difficult to recognize and feel than physical health, resulting in a lack of awareness about mental health. An expert system is a branch of artificial intelligence that tries to imitate the reasoning process of an expert in solving problems. Where the expertise of this expert will make it easier for students to know the level of depression experienced and help find the right solution or treatment. Certainty Factor is one of the methods of an expert system that can see whether a fact is certain or uncertain and can provide accurate results obtained from the calculation of the weight of symptoms selected by experts and is able to provide answers to problems with uncertain results. Based on the results of the CF calculation, the highest value is in the type of major depression with a value of 0.721472 or 72.1472%. From the results obtained, the system identifies that the student has a type of severe depression. And the solution that can be done is to need special treatment for psychiatric problems.
Pengecekan Bit Error Pada Media Transmisi Pengiriman Gambar Menggunakan Metode Hamming Code Deli Alvinda; Achmad Fauzi; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The successful delivery of information from the sender (transmitter) to the receiver (receiver) is one thing that is very important in determining the reliability of a communication system. In the world of communication, both communication using cables or using air as a transmission medium will inevitably experience disturbances in the communication process caused by a disturbance called noise. Noise is an unwanted electrical signal. The addition of this unwanted signal in a communication process is a major limiting factor in data communication systems. In the process of data communication, the possibility of data errors received can occur because the data becomes an error and must be re-sent. Hamming code is an error detection method that is able to detect several errors, but is only able to correct one error (single error correction). This error detection method is very suitable for use in situations where there are several random errors.
Pengembangan Sistem Pengamanan Jaringan Komputer Berdasarkan Analisis Forensik Jaringan (Studi Kasus : SMK Putra Anda Binjai) Yuda Washita; Akim MH Pardede; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The server is something that needs more attention regarding the level of security. Servers that have vulnerabilities can be exploited by irresponsible parties. Data that should be personal can be misused by irresponsible parties. The administrator must ensure that the system is completely secure. One way to maintain server security is by detecting intrusions that are considered dangerous using the Intrusion Detection System (IDS). The intrusion detection system is built based on rules that have been stored in a database (signature-based). Snort is a software that functions to detect intrusions. Data packets passing through network traffic will be analyzed first. Data packets detected as intrusions will trigger an alert which is then stored in a log file. That way, administrators can find out what intrusions occur on the server. However, the administrator needs to analyze on the server computer. The existence of instant messaging applications can help administrators to get notifications in real time. One of them is using Telegram where administrators get brief information and documentation reports of intrusions on the server. Detected intrusions are not only stored in a log file, but can be viewed on the mobile interface via telegram notifications. By implementing IDS, the system can provide real time notifications through instant messaging applications as a solution to facilitate administrators in preventing attacks on the server so that the server remains protected from intrusion by irresponsible parties.
Penerapan Algoritma RSA Dan AES Dalam Pengamanan Data Tunggakan Tagihan PDAM Kota Binjai Rani Rianda Br Ginting; Achmad Fauzi; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

-
Sistem Pakar Mendiagnosa Penyakit Rabies Pada Kucing Dengan Menggunakan Metode Certainty Factor Livia Dirma Pr; Novriyenni Novriyenni; Husnul Khair
JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Vol 2 No 2 (2022): JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen
Publisher : Universitas Muhammadiyah Enrekang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Rabies merupakan infeksi virus pada otak dan sistem saraf. Umumnya, virus penyebab rabies menular ke manusia melalui gigitan hewan. Penularannya melalui air liur anjing yang terkontaminasi masuk ke dalam tubuh melalui luka cakaran atau gigitan pada tubuh. Namun, ternyata, infeksi rabies bisa terjadi pada hewan lain selain anjing, yaitu kucing.Pengetahuan tentang penyakit rabies menjadi salah satu permasalahan, terutama bagi masyarakat atau pencinta kucing. Tentu hal ini perlu untuk diketahui oleh pemilik atau pecinta kucing tentang gejala awal dan cara proses penanganan apabila memiliki ciri-ciri terinfeksi penyakit rabies. Biasanya untuk mengetahui kucing terkena rabies maka diperlukan seorang dokter hewan untuk dilakukan pemeriksaan. Namun masyarakat atau pecinta kucing malas untuk melakukan konsultasi secara langsung dengan dokter hewan dikarenakan tidak memiliki waktu atau karena sibuk akan pekerjaannya. Berdasarkan uraian di atas, maka perlu dibangun sebuah sistem yang dapat mendiagnosa penyakit rabies pada kucing. Sistem yang dibangun yaitu sistem pakar yang memiliki kemampuan seperti selayaknya pakar atau dokter.
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image Nasution, Raja Imanda Hakim; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.201

Abstract

Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security Muhammad Fadillah Azmi; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.204

Abstract

The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
Co-Authors ., Novriyenni Abdullah Husein Achmad Fauzi ACHMAD FAUZI Adityo Razzaqqi Ambarita, Indah Annatasia, Kristina Arliana, Lina Assya Harnita Lubis Aulia Annisa Br Bangun Bahri, Anggi Adhilah Bayu Juliansyah Br. Ginting, Rosa Lina Buaton, Relita Bustami, Harya Dea, Dea Puspita Deli Alvinda Dimas Aditya Eriska Sitepu Esti Sundari Fadilah, Nurul Elsa Fatmaira, Zira Fauzi Ahmad Muda Fauzi, Achmad Fiqih Dalfin S Meliala Firhan Ali Fresti Anjeli Frisca Prastiwi, Kellyn Gultom, Imeldawati Gultom, Imeldawaty Hafizh, Faisal Herdianta Herdianta I G Prahmana Ihsan, Ihsan Muchlis Ika Indah Rahayu Indakholasy, Barru John Darwis Martuadi Saragih Khadapi, Muammar Lili Musarofah Lili Musarofah Livia Dirma Pr Magdalena Simanjuntak Magdalena Simanjuntak Magdalena Simanjuntak Magdalena Simanjuntak Manik , Yolanda Arta Sabrina Manurung, Immanuel H. G. Melda Pita Uli Sitompul Muammar Khadafi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris Muhammad Roynaldi Nabil Fuadi Nasril Hidayat Nasution, Raja Imanda Hakim Ningsih, Arista Widya Nisrina Naufalia Santoso Novriyenni Novriyenni Novriyenni Novriyenni, Novriyenni Nurhayati Nurhayati Nurul Syahrani Pardede, Akim Manaor Hara Pasaribu, Tioria Paul Saut Marganda L Tobing Pitaloka, Nadila Prahmana, I Gusti Pramana, I Gusti Rahayu, Rizka Putri Rahmadani Rahmadani Ramadani, Suci Ramos Parulian Ambarita Rani Nuraini Rani Nuraini Rani Rianda Br Ginting Ratih Puspadini Rindi Asti Ananda Riska Kurniawati Risna Serviya Rizka Khairani Lubis Roynaldi, Muhammad Rusmin Saragih, Rusmin Ryan Hidayat Saragih, John Darwis Martuadi Selfira, Selfira SELVY ANGGRAINI, SELVY Sembiring, Indri Aurellia Apsari Serviya, Risna Setia Ningsih Sibero, Alexander F.K. Sihombing, Anton Simanjuntak, Magdalena Sinambela, Rifdahtul Ghinaa Siswan Syahputra Sitanggang, Rianto Sitepu, Cindy Yohana SRI DEVI BANGUN suci ramadani Surbakti, Tania Br Susilawati Susilawati Susilawati Syahputra, Siswan Syari, Milli Alfhi Tami Dayatmi Usman Gumanti Windi Tamara Windi Wiranata, Rio Yani Maulita Yuda Washita Zehy Fadia