Articles
IMPLEMENTASI ALGORITMA KRIPTOGRAFI MODULAR MULTIPLICATION – BASED BLOCK CIPHER (MMB) PADA KEAMANAN DATA
Husnul - Khair;
Suci Ramadani
JTIK (Jurnal Teknik Informatika Kaputama) Vol 4, No 2 (2020): Edisi Juli Nomor. 4 Volume. 2 Tahun 2020
Publisher : STMIK KAPUTAMA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Dalam kehidupan sehari – hari manusia banyak bergantung pada teknologi informasi. Maka mulai bermunculan berbagai media untuk mengakses informasi dan mengelola informasi sehingga banyak kemudahan-kemudahan yang kemudian didapat untuk mengakses suatu informasi. masalah keamanan informasi menjadi hal yang sangat penting dalam suatu sistem informasi untuk keamanan bersama maupun keamanan pribadi. Untuk itu diperlukan suatu sistem keamanan yang dapat melindungi suatu informasi untuk pengamanan data untuk mengantisipasi ancaman tersebut seperti teknik kriptografi. Kriptografi metode Modular Multiplication Based Block Cipher (MMB) dapat digunakan untuk menjaga keamanan pesan saat pesan dikirim dari suatu tempat ke tempat yang lain. Program aplikasi yang telah dibangun hanya mengenkripsi plaintext dengan format doc, txt, xls, ppt. Penelitian ini menghasilkan suatu program untuk mengamankan pesan rahasia berbentuk file. File yang dienkrip dapat diungkapkan kembali sama persis dengan file aslinya dan tidak mengalami perubahan isi file sedikit pun.
RANCANG BANGUN ALAT DETEKSI KETINGGIAN AIR UNTUK JARINGAN IRIGASI PADA DINAS PEKERJAAN UMUM DAN PENATAAN RUANG KAB.LANGKAT DENGAN MENGGUNAKAN METODE FUZZY LOGIC
Lili Musarofah;
Rusmin Saragih;
Husnul Khair
JTIK (Jurnal Teknik Informatika Kaputama) Vol 6, No 2 (2022): Volume 6, Nomor 2 Juli 2022
Publisher : STMIK KAPUTAMA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Telah dirancang sebuah alat deteksi ketinggian air untuk jaringan irigasi pada dinas pekerjaan umum dan penataan ruang kab. Langkat dengan menggunakan metode fuzzy logic. Sistem alat ini menggunakan mikrokontroller arduino nano yang dimana arduino nano ini berfungsi sebagai pengolah data, dan pengontrol output berdasarkan input yang diberikan oleh sensor. Pada alat juga menggunkan sensor ultrasonic HC-SR04 yang dimana sensor ini berfungsi untuk membaca input dari nilai ketinggian air pada irigasi sawah, output dari alat ini berupa pompa air yang berfungsi untuk mengisi air pada irigasi sawah yang dimana pompa air pada sistem alat ini dapat mengisi air scara otomatis dan apabila air pada irigasi sawah sudah penuh maka scara otomatis juga pompa air akan berhenti mengisi. Diharapkan dari hasil penelitian ini dapat menjadi salah satu teknologi tepat guna yang dapat membantu kinerja manusia dalam kehidupan sehari-hari khususnya dalam bidang pertanian.
SISTEM PAKAR MENDIAGNOSA PENYAKIT KELAINAN DARAH PADA MANUSIA MENGGUNAKAN METODE BAYES BERBASIS WEB
Eriska Sitepu;
Magdalena Simanjuntak;
Husnul Khair
JTIK (Jurnal Teknik Informatika Kaputama) Vol 6, No 1 (2022): Volume 6, Nomor 1 Januari 2022
Publisher : STMIK KAPUTAMA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Sistem Pakar adalah sistem yang menggunakan pengetahuan manusia, dimana pengetahuan tersebutdimasukkan ke dalam sebuah komputer, dan kemudian digunakan untuk menyelesaikan masalah –masalah yang biasanya membutuhkan kepakaran atau keahlian manusia. Dalam hal ini sistem pakardigunakan untuk mendiagnosa penyakit kelainan darah pada manusia. Penyakit kelainan darahmerupakan suatu kondisi di mana terdapat gangguan pada fungsi darah dalam tubuh. Adapun yangdibahas adalah bagaimana menentukan jenis penyakit kelainan darah menggunakan metode bayes,bagaimana sistem pakar merancang dalam mendiagnosa penyakit kelainan darah menggunakanmetode bayes, dan merancang metode bayes dalam mendiagnosa penyakit kelainan darah denganmenggunakan bahasa pemrograman PHP dan menginput gejala sebagai variabel. Metode bayesadalah salah satu cabang statistik matematika untuk membuat satu model ketidakpastian dari suatukejadian yang terjadi dengan menggabungkan pengetahuan umum dengan fakta. Tujuan yang didapatadalah memberikan informasi untuk membantu masyarakat pada umumnya dalam mendiagnosapenyakit anemia dan mendapatkan hasil diagnosa yang tepat dan akurat.
Sistem Pakar Diagnosa Tingkat Depresi Mahasiswa Tingkat Akhir Dengan Menggunakan Metode Certainty Factor
Nisrina Naufalia Santoso;
Yani Maulita;
Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Changes in the learning environment can affect students' mental health so that students adapt forcefully. It is not only intelligence that determines success in learning, but peace of mind which also greatly influences the ability to use this intelligence. Mental health disorders or depression are more difficult to recognize and feel than physical health, resulting in a lack of awareness about mental health. An expert system is a branch of artificial intelligence that tries to imitate the reasoning process of an expert in solving problems. Where the expertise of this expert will make it easier for students to know the level of depression experienced and help find the right solution or treatment. Certainty Factor is one of the methods of an expert system that can see whether a fact is certain or uncertain and can provide accurate results obtained from the calculation of the weight of symptoms selected by experts and is able to provide answers to problems with uncertain results. Based on the results of the CF calculation, the highest value is in the type of major depression with a value of 0.721472 or 72.1472%. From the results obtained, the system identifies that the student has a type of severe depression. And the solution that can be done is to need special treatment for psychiatric problems.
Pengecekan Bit Error Pada Media Transmisi Pengiriman Gambar Menggunakan Metode Hamming Code
Deli Alvinda;
Achmad Fauzi;
Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The successful delivery of information from the sender (transmitter) to the receiver (receiver) is one thing that is very important in determining the reliability of a communication system. In the world of communication, both communication using cables or using air as a transmission medium will inevitably experience disturbances in the communication process caused by a disturbance called noise. Noise is an unwanted electrical signal. The addition of this unwanted signal in a communication process is a major limiting factor in data communication systems. In the process of data communication, the possibility of data errors received can occur because the data becomes an error and must be re-sent. Hamming code is an error detection method that is able to detect several errors, but is only able to correct one error (single error correction). This error detection method is very suitable for use in situations where there are several random errors.
Pengembangan Sistem Pengamanan Jaringan Komputer Berdasarkan Analisis Forensik Jaringan (Studi Kasus : SMK Putra Anda Binjai)
Yuda Washita;
Akim MH Pardede;
Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The server is something that needs more attention regarding the level of security. Servers that have vulnerabilities can be exploited by irresponsible parties. Data that should be personal can be misused by irresponsible parties. The administrator must ensure that the system is completely secure. One way to maintain server security is by detecting intrusions that are considered dangerous using the Intrusion Detection System (IDS). The intrusion detection system is built based on rules that have been stored in a database (signature-based). Snort is a software that functions to detect intrusions. Data packets passing through network traffic will be analyzed first. Data packets detected as intrusions will trigger an alert which is then stored in a log file. That way, administrators can find out what intrusions occur on the server. However, the administrator needs to analyze on the server computer. The existence of instant messaging applications can help administrators to get notifications in real time. One of them is using Telegram where administrators get brief information and documentation reports of intrusions on the server. Detected intrusions are not only stored in a log file, but can be viewed on the mobile interface via telegram notifications. By implementing IDS, the system can provide real time notifications through instant messaging applications as a solution to facilitate administrators in preventing attacks on the server so that the server remains protected from intrusion by irresponsible parties.
Sistem Pakar Mendiagnosa Penyakit Rabies Pada Kucing Dengan Menggunakan Metode Certainty Factor
Livia Dirma Pr;
Novriyenni Novriyenni;
Husnul Khair
JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Vol 2 No 2 (2022): JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen
Publisher : Universitas Muhammadiyah Enrekang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Rabies merupakan infeksi virus pada otak dan sistem saraf. Umumnya, virus penyebab rabies menular ke manusia melalui gigitan hewan. Penularannya melalui air liur anjing yang terkontaminasi masuk ke dalam tubuh melalui luka cakaran atau gigitan pada tubuh. Namun, ternyata, infeksi rabies bisa terjadi pada hewan lain selain anjing, yaitu kucing.Pengetahuan tentang penyakit rabies menjadi salah satu permasalahan, terutama bagi masyarakat atau pencinta kucing. Tentu hal ini perlu untuk diketahui oleh pemilik atau pecinta kucing tentang gejala awal dan cara proses penanganan apabila memiliki ciri-ciri terinfeksi penyakit rabies. Biasanya untuk mengetahui kucing terkena rabies maka diperlukan seorang dokter hewan untuk dilakukan pemeriksaan. Namun masyarakat atau pecinta kucing malas untuk melakukan konsultasi secara langsung dengan dokter hewan dikarenakan tidak memiliki waktu atau karena sibuk akan pekerjaannya. Berdasarkan uraian di atas, maka perlu dibangun sebuah sistem yang dapat mendiagnosa penyakit rabies pada kucing. Sistem yang dibangun yaitu sistem pakar yang memiliki kemampuan seperti selayaknya pakar atau dokter.
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image
Nasution, Raja Imanda Hakim;
Achmad Fauzi;
Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v2i3.201
Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security
Muhammad Fadillah Azmi;
Achmad Fauzi;
Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v2i3.204
The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.