p-Index From 2021 - 2026
9.552
P-Index
This Author published in this journals
All Journal Journal Information System Development METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Jurnal Informatika Kaputama (JIK) Jurnal Sistem Informasi Kaputama (JSIK) Jurnal Abdi Ilmu JTIK (Jurnal Teknik Informatika Kaputama) KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer JUKI : Jurnal Komputer dan Informatika JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Bulletin of Multi-Disciplinary Science and Applied Technology Journal of Artificial Intelligence and Engineering Applications (JAIEA) International Journal of Informatics, Economics, Management and Science Journal of Engineering, Technology and Computing (JETCom) Jurnal Pengabdian Pada Masyarakat METHABDI International Journal of Health, Engineering and Technology Indonesian Journal of Education And Computer Science Indonesian Journal of Science, Technology, and Humanities Jurnal Penelitian Teknologi Informasi dan Sains Jurnal ABDIMAS MUTIARA International Journal of Community Service Implementation Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Modem : Jurnal Informatika dan Sains Teknologi Repeater: Publikasi Teknik Informatika dan Jaringan Switch: Jurnal Sains dan Teknologi Informasi Fusion : Journal of Research in Engineering, Technology and Applied Sciences Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Ulil Albab Pascal: Journal of Computer Science and Informatics JURNAL TEKNOLOGI, KESEHATAN DAN ILMU SOSIAL Router : Jurnal Teknik Informatika dan Terapan
Claim Missing Document
Check
Articles

Design of a Safe Security System Based on Internet of Things Using Face and Fingerprint Detection Pitaloka, Nadila; Pardede, A M H; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.636

Abstract

Traditional safe security systems usually use manual keys and a combination of numbers or passwords to open the safe. This system has several disadvantages such as being easy to break into, cumbersome, and the owner easily loses the key, even forgets the password needed to open the safe, which causes the safe to be unable to open. This research develops an Internet of Things (IoT)-based safe security system that uses two security options to open the safe, namely face detection and fingerprint authentication to increase security against unauthorized access with a prototype method. The system uses the ESP32-CAM to capture facial images and send them to the Telegram app for manual verification by the owner, while the fingerprint sensor ensures only registered users can open the safe. Arduino Uno serves as the main microcontroller to manage the integration between components such as ESP32-CAM, fingerprint sensor, relay, solenoid lock, LCD, and buzzer. The test results show that this system is effective in providing security to the safe through notifications, although it still relies on manual verification of faces via Telegram and requires a stable internet connection, and fingerprints that have been registered are successfully implemented. Further development is recommended to automate face recognition and improve the overall performance of the system.
Enhancing AES Key Generation Using Diffie-Hellman Method for Image Security Sinambela, Rifdahtul Ghinaa; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.637

Abstract

The increasing need for secure image transmission has led to the development of cryptographic techniques that combine encryption algorithms and secure key exchange methods. This paper proposes a system for enhancing the security of digital images by using the Advanced Encryption Standard (AES) combined with the Diffie-Hellman method for key generation. AES is applied for encryption and decryption, while Diffie-Hellman ensures the secure exchange and generation of secret keys. The system, developed in Microsoft Visual Basic .NET 2010, was tested on various image formats and demonstrated effective protection against brute force attacks. This approach ensures secure digital image transmission and confidentiality.
Estimation of Bullying Incidence Using Linear Regression Algorithm Sitepu, Cindy Yohana; Pardede, A M H; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.642

Abstract

Bullying is a violent act intended to cause harm or humiliation to another person. Bullying can take many different forms, including verbal and nonverbal, and it frequently targets people who are thought to be weaker or different. Nevertheless, because many bullying incidents go unreported, it is challenging to gather reliable statistics on the prevalence of bullying. In this study, the number of bullying cases in the field of education is estimated using a linear regression approach. This algorithm is used because it may estimate based on pertinent data, like the gender-based type of bullying and data on the quantity of bullying events that occurred in the preceding year. According to the study's findings, 2,250 bullying incidences are predicted for the upcoming year 2024, with a MAPE (Mean Absolute Percentage Error) of 0,07% or an accuracy level of 99,3%, categorized as highly accurate forecasting results.
Application of Cryptography and Steganography Techniques to Improving the Security of Text Messages with RC4 Algorithm and MSB Method Ihsan, Ihsan Muchlis; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.660

Abstract

This study discusses the application of cryptography and steganography techniques to improve the security of text messages using the Rivest Code 4 (RC4) algorithm and the Most Significant Bit (MSB) method. In the ever-growing digital era, data security is a top priority due to the increasing threat of cybercrime that can harm many parties. RC4 is a cryptography algorithm known for its encryption and decryption speed, while the MSB method is an effective steganography technique for hiding information in digital images. This study aims to develop an application that is able to encrypt text messages with the RC4 algorithm and hide them in digital images using the MSB method. With this combination, data is not only encrypted but also hidden, thus providing two layers of security to protect information from unauthorized access. The results of the study show that the combination of RC4 cryptography and MSB steganography techniques successfully improves data security well. The developed application is able to protect sensitive information from the risk of data theft and cyber attacks. In addition, this technique is also easy to implement and can be applied in various sectors, such as banking, health, and business communications, to protect sensitive data from unauthorized access. Keywords: Cryptography, Steganography, Most Significant Bit (MSB)
Design Of Automatic Hand Sanitizer Spray System Based On Arduino Uno Using Fuzzy Logic Method Firhan Ali; Husnul Khair; Imeldawaty Gultom
International Journal of Health Engineering and Technology Vol. 3 No. 4 (2024): IJHESS NOVEMBER 2024
Publisher : CV. AFDIFAL MAJU BERKAH

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.192 KB) | DOI: 10.55227/ijhet.v1i2.32

Abstract

Washing hands is the act of cleaning like fingers to wrists using water or other liquids. Hand sanitizer with a minimum alcohol content of 60% is believed to be effective for killing germs and other harmful microorganisms because hands are one part of the body that often interacts such as touching and can be a medium for the spread of viruses, germs and bacteria. The manufacture of tools is carried out as one of the efforts in advancing technology to provide convenience and comfort through the development of an automatic system for hand sanitizer containers. From the above problems an Arduino based automatic hand sanitizer system was created. This system works directly to be able to spray liquid automatically. This system is expected to make it easier for users to spray liquids without having to do it manually or touching the container directly to maximize time efficiency and keep it clean. By designing a prototype to make this automatic hand sanitizer using an ultrasonic sensor as input, Arduino Uno Atmega328p as a microcontroller, and a servo motor as a driver for the hand sanitizer container. The system on the tool to be made is capable of spraying liquid automatically at a maximum distance of 10 centimeters.
Diagnosa Penyakit Turunan (Heraditas) Imbisil Pada Manusia Dengan Metode Dempster Shafer Nasril Hidayat; Rusmin Saragih; Husnul Khair
ULIL ALBAB : Jurnal Ilmiah Multidisiplin Vol. 1 No. 10: September 2022
Publisher : CV. Ulil Albab Corp

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hereditas pada manusia mempelajari mengenai macam penurunan termasuk sifat dan kelainan pada manusia, penurunan sifat pada manusia dibedakan menjadi dua, yaitu sifat yang terpaut koromosom tubuh (autosomal), dan sifat terpaut kromosom sek (gonosomal), sedangkan imbisil adalah penyakit ganguan mental yang merupakan sikubat dari kelainan fenilketonuria (FKU). Oleh karena itu penulis ingin membuat suatu sistem dimana sistem ini dapat digunakan untuk membantu pasien dalam melakukan konsultasi secara pribadi tanpa harus membuang waktu/menghabiskan banyak biaya. Sistem pakar adalah sistem berbasis komputer yang menggunakan pengetahuan, fakta, dan tehnik penalaran dalam memecahkan masalah yang biasanya hanya dapat dipecahkan oleh seorang pakar dan untuk Dempster Shafer ialah kombinasi dan propogasi ketidakpastian, dimana teori ini memiliki beberapa karakteristik yang secara instutitif sesuai dengan cara berfikir seorang pakar, namun dasar matematika dan delah dilakukan konsultasi dari perhitungan dengan metode Dempster Shafer, gejala tersebut yang telah dihitung untuk gejala yang dialami oleh pasien nilai yang paling tinggi adalah 0.71 adalah (P03) yaitu sebesar 0,71 atau jika dijadikan presentasi adalah sebesar 71%.
Penerapan Logika Fuzzy Logic pada Enemy AI Game Horor 3D The Gate Of Nightmare Menggunakan Aplikasi Unity3d: Array Hafizh, Faisal; Maulita, Yani; Khair, Husnul
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 2 (2020): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i2.255

Abstract

Artificial Intelligence is a part of computer science that is made so that machines (computers) can do work as well as what humans do. The Unity 3D application is a game engine which is a software for processing images, graphics, sound, input, etc. which is intended to create a game, although not always for games. Nowadays, games have developed a lot according to traditions and times. Therefore, there are a lot of unattractive game designs because the AI is not responsive and feels stiff, and requires the Fuzzy Logic Method. Fuzzy Logic is a problemsolving control system methodology that is suitable for implementation in systems, ranging from simple systems, small systems, embedded systems, PC networks, multi-channel or workstation based data acquisition, and control systems.
PELATIHAN PERENCANAAN BERBASIS DATA PADA PENGAWAS SEKOLAH, KEPALA SEKOLAH DAN GURU MENGGUNAKAN METODE INDENTIFIKASI, REFLEKSI DAN BENAHI (IRB) SECARA DARING Fauzi, Achmad; Rahayu, Rizka Putri; Khair, Husnul; Maulita, Yani
Jurnal Pengabdian Pada Masyarakat METHABDI Vol 3 No 2 (2023): Jurnal Pengabdian Pada Masyarakat METHABDI
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/methabdi.Vol3No2.pp170-174

Abstract

Data-based planning training is carried out online based on various sources which can be used to carry out or prepare an agenda for future activities and budgets. The data-based planning training activity was carried out online for two days. This implementation started with the experience of the school principal sharing his experience with the education unit in planning and compiling activities and making budgets at the school, then the facilitator provided reinforcement for data mining from the independent teaching platform (PMM ), Education Report Card Platform as well as through data sourced from the North Sumatra Education Quality Assurance Center (LPMP). Then the facilitator reflects on the training on the material that has been explained. On the second day of implementation, each educational unit grouped to discuss and fill in the evaluation sheet, then carried out identification, reflection and improvement in planning activity plans and preparing budgets for the unit, then apart from that, the educational units held discussions to make follow-up plans starting from the date, unit involved and the media used. Next, reflect on your experience at school, then work on an evaluation worksheet that is synchronized with the Identification worksheet, then a reflection worksheet and a fix worksheet, then the education unit finishes working on an activity plan that comes from several data and can prepare a budget that is planned for the long term.
Penerapan Metode Clustering Kecemasan Anak Terhadap Bullying Setia Ningsih; Yani Maulita; Husnul Khair
Saturnus: Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli: Saturnus: Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.182

Abstract

Bullying is a verbal or non-verbal bullying activity through the media (cyber bullying) or directly, carried out by a child or group of children against other children. Aggressive behavior such as bullying among teenagers results in problems such as anxiety. The problem at SMKN 2 Binjai in 2024 is the difficulty of identifying children's anxiety about bullying disorders because there is no strong reference as evidence for cases of bullying carried out by perpetrators against victims. So research is needed to cluster gender, type of bullying and children's anxiety levels, with many parties still not monitoring children's activities enough to see how big the impact is on children who experience bullying. The aim of this research is to determine gender, type of bullying and different levels of anxiety among children who experience bullying. Based on the results of grouping bullying cases using the K-Means algorithm, 3 clusters and 3 iterations were obtained, where cluster 1 contained 9 data. , cluster 2 has 4 data and cluster 3 has 7 data, so it can be concluded that bullying cases tend to occur in women who experience types of bullying in the form of cyber and psychological with a mild level of anxiety.
Diagnosis Penyakit Dispepsia menggunakan Metode Dempster-Shafer Nurul Syahrani; Relita Buaton; Husnul Khair
Saturnus: Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 4 (2024): Oktober: Saturnus: Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i4.361

Abstract

Dyspepsia is a gastroduodenal disorder that is often characterized by symptoms such as epigastric pain, burning, bloating, and a feeling of fullness after eating. Treatment of dyspepsia often requires examination by a specialist doctor, which may not always be easily accessible due to distance, cost, or time constraints. Therefore, this study aims to diagnose dyspepsia using the Dempster-Shafer method to identify possible dyspeptic diseases such as GERD, gastritis, dyspepsia, and gastric ulcers based on 16 detected symptoms and 4 different treatments. to make it easier for patients to consult and get an initial diagnosis without having to see a specialist doctor directly. From this study, it is expected to help patients get information on the initial diagnosis of the patient.
Co-Authors ., Novriyenni Abdullah Husein ACHMAD FAUZI Achmad Fauzi Adityo Razzaqqi Ambarita, Indah Annatasia, Kristina Arliana, Lina Assya Harnita Lubis Aulia Annisa Br Bangun Bahri, Anggi Adhilah Bayu Juliansyah Br. Ginting, Rosa Lina Buaton, Relita Bustami, Harya Dea, Dea Puspita Deli Alvinda Dimas Aditya Eriska Sitepu Esti Sundari Fadilah, Nurul Elsa Fatmaira, Zira Fauzi Ahmad Muda Fauzi, Achmad Fiqih Dalfin S Meliala Firhan Ali Fresti Anjeli Frisca Prastiwi, Kellyn Gultom, Imeldawati Gultom, Imeldawaty Hafizh, Faisal Herdianta Herdianta I G Prahmana Ihsan, Ihsan Muchlis Ika Indah Rahayu Indakholasy, Barru John Darwis Martuadi Saragih Khadapi, Muammar Lili Musarofah Lili Musarofah Livia Dirma Pr Magdalena Simanjuntak Manik , Yolanda Arta Sabrina Manurung, Immanuel H. G. Melda Pita Uli Sitompul Muammar Khadafi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Roynaldi Nabil Fuadi Nasril Hidayat Nasution, Raja Imanda Hakim Ningsih, Arista Widya Nisrina Naufalia Santoso Novriyenni Novriyenni Novriyenni Novriyenni, Novriyenni Nurhayati Nurhayati Nurul Syahrani Pardede, Akim Manaor Hara Pasaribu, Tioria Paul Saut Marganda L Tobing Pitaloka, Nadila Prahmana, I Gusti Pramana, I Gusti Rahayu, Rizka Putri Rahmadani Rahmadani Ramadani, Suci Ramos Parulian Ambarita Rani Nuraini Rani Nuraini Rani Rianda Br Ginting Ratih Puspadini Rindi Asti Ananda Riska Kurniawati Risna Serviya Rizka Khairani Lubis Roynaldi, Muhammad Rusmin Saragih, Rusmin Ryan Hidayat Saragih, John Darwis Martuadi Selfira, Selfira SELVY ANGGRAINI, SELVY Sembiring, Indri Aurellia Apsari Serviya, Risna Setia Ningsih Sibero, Alexander F.K. Sihombing, Anton Simanjuntak, Magdalena Simanjuntak, Magdalena Sinambela, Rifdahtul Ghinaa Siswan Syahputra Sitanggang, Rianto Sitepu, Cindy Yohana SRI DEVI BANGUN Surbakti, Tania Br Susilawati Susilawati Susilawati Syahputra, Siswan Syari, Milli Alfhi Tami Dayatmi Usman Gumanti Windi Tamara Windi Wiranata, Rio Yani Maulita Yuda Washita Zehy Fadia