p-Index From 2021 - 2026
9.552
P-Index
This Author published in this journals
All Journal Journal Information System Development METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Jurnal Informatika Kaputama (JIK) Jurnal Sistem Informasi Kaputama (JSIK) Jurnal Abdi Ilmu JTIK (Jurnal Teknik Informatika Kaputama) KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer JUKI : Jurnal Komputer dan Informatika JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Bulletin of Multi-Disciplinary Science and Applied Technology Journal of Artificial Intelligence and Engineering Applications (JAIEA) International Journal of Informatics, Economics, Management and Science Journal of Engineering, Technology and Computing (JETCom) Jurnal Pengabdian Pada Masyarakat METHABDI International Journal of Health, Engineering and Technology Indonesian Journal of Education And Computer Science Indonesian Journal of Science, Technology, and Humanities Jurnal Penelitian Teknologi Informasi dan Sains Jurnal ABDIMAS MUTIARA International Journal of Community Service Implementation Router : Jurnal Teknik Informatika dan Terapan Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Modem : Jurnal Informatika dan Sains Teknologi Repeater: Publikasi Teknik Informatika dan Jaringan Switch: Jurnal Sains dan Teknologi Informasi Fusion : Journal of Research in Engineering, Technology and Applied Sciences Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Saturnus: Jurnal Teknologi dan Sistem Informasi Ulil Albab Pascal: Journal of Computer Science and Informatics JURNAL TEKNOLOGI, KESEHATAN DAN ILMU SOSIAL Router : Jurnal Teknik Informatika dan Terapan
Claim Missing Document
Check
Articles

Pemilihan Tempat Penyuluhan Berdasarkan Tingkat Kerawanan dengan Menggunakan Metode SMART Susilawati; Fauzi, Achmad; Khair, Husnul
KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer Volume 4 Nomor 1
Publisher : UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54367/kakifikom.v4i1.1875

Abstract

Badan Narkotika Nasional adalah sebuah lembaga nonstruktural yang bertugas untuk mengkoordinasi instansi pemerintah terkait dalam penyusunan kebijakan dan pelaksanaanya dibidang ketersediaan, pencegahan, pemberantasan, penyalahgunaan dan peredaran gelap narkotika (P4GN). Upaya untuk menahan laju peningkatan angka prevalensi penyalahgunaan dan peredaran gelap narkoba di Kota Binjai, Badan Narkotika Nasional Kota Binjai melakukan kegiatan penyuluhan anti narkobakepada seluruh masyarakat. Pada penelitian ini diterapkan metode SMART (Simple Multi Atribute Rating Technique)digunakan untuk membangun sistem berbasis web yang bertujuan untuk mempermudah dalam menentukan tempat yang tepat untuk dilakukannya penyuluhan anti narkoba. Hasil dari penelitian ini menunjukan bahwa dengan menerapkan metode (Simple Multi Atribute Rating Technique) maka dapat di peroleh Alternatif terbaik yaitu A5 (Kelurahan Tunggorono) dengan nilai kriteria : C1 (Jumlah Kasus Kejahatan Narkoba) = 0,3; C2 (Angka Kriminalitas) = 0,25; C3 (Angka Penggunaan Narkoba)= 0,20; C4 (Lokasi Narkoba) = 0,15; C5 (Rendahnya Interaksi Sosial) = 0,1 dengan total hasil akhir 1.
Decision Support System for Choosing the Best Mechanic Using the Smart Method at Cv. Garuda Mas Motor Binjai Manik , Yolanda Arta Sabrina; Fauzi, Achmad; Khair, Husnul
Pascal: Journal of Computer Science and Informatics Vol. 1 No. 02 (2024): Pascal: Journal of Computer Science and Informatics
Publisher : Devitara Innovations

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mechanics are the most important asset in an automotive company, workshop mechanics are responsible for the maintenance and repair of motor vehicles when damage occurs. However, not only dealing with damage, mechanics also conduct thorough checks before damage to customers' vehicles occurs. To be able to provide satisfaction with vehicle maintenance services or motorcycle services, of course CV. Garuda Mas Motor Binjai must have good and reliable mechanics. So that customers will feel satisfied with the service provided by the Dealer. To obtain the best mechanic, of course, an assessment must be carried out on the mechanics who will work. Usually this assessment is carried out by the Dealer only by conducting direct testing on a case of damage problems without considering anything else. So that in some cases there are mechanics that are not in accordance with the qualifications desired by the Dealer. For this reason, it is necessary to build a decision support system that can help the Dealer in selecting the best mechanic on the CV. Garuda Mas Motor Binjai. From the data on the criteria for selecting the best mechanic, the results of the analysis of the SMART method from the 20 alternative data above, it can be seen that the one who obtained the best score or ranking is the mechanic on behalf of Suriono with the results of the analysis using the SMART method 0.85.
Pendeteksian Kebocoran pada Jaringan Pipa Berbasis Internet of Things (IoT) dengan Notifikasi dan Lokalisasi Sumber Kebocoran Adityo Razzaqqi; Husnul Khair; Milli Alfhi Syari
Router : Jurnal Teknik Informatika dan Terapan Vol. 3 No. 2 (2025): Juni: Router : Jurnal Teknik Informatika dan Terapan 
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v3i2.609

Abstract

This study aims to design and develop a pipeline leakage detection system based on the Internet of Things (IoT) that provides real-time notifications and determines the location of leaks with high accuracy. Pipeline leakage is a serious issue, as it can lead to water wastage, environmental damage, and high maintenance costs. Therefore, a system that can detect leaks quickly and accurately is crucial for improving the efficiency of pipeline infrastructure management. The system developed in this study uses an ESP32 microcontroller, Waterflow sensor, and GPS module. The ESP32 microcontroller serves as the central processing unit that processes the data received from the Waterflow sensor and the GPS module. The Waterflow sensor detects changes in water flow that indicate a leak in the pipeline. When an abnormal reduction in flow is detected, the sensor sends a signal to the microcontroller. The GPS module then provides location coordinates, pinpointing the exact location of the leak, allowing the maintenance team to quickly address the issue. Additionally, the system is integrated with the Blynk application, which enables remote monitoring through a mobile device. The Blynk application provides a user interface that facilitates the monitoring of pipeline status and delivers notifications whenever a leak is detected. Testing results show that the IoT-based leakage detection system is capable of identifying leaks and sending real-time information with good accuracy. With this system, the process of identifying and addressing pipeline leaks can be done faster and more efficiently, ultimately reducing the losses caused by leakage. The system also offers a more effective solution for pipeline maintenance, improving the reliability of water distribution systems and reducing water resource wastage.
Penerapan Metode Fuzzy untuk Mengetahui Penyakit Radang Kelopak Mata (Blepharitis) Bayu Juliansyah; Akim Manaor Hara Pardede; Husnul Khair
Router : Jurnal Teknik Informatika dan Terapan Vol. 3 No. 2 (2025): Juni: Router : Jurnal Teknik Informatika dan Terapan 
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v3i2.614

Abstract

Blepharitis or inflammation of the eyelids is one of the common eye diseases, characterized by inflammation of the edges of the eyelids that can cause discomfort, irritation, and even visual disturbances. This disease can be chronic with recurrent symptoms such as red eyes, itching, watering, and the appearance of crust on the eyelashes. Proper and prompt diagnosis is necessary so that medical treatment can be carried out effectively and further complications can be prevented. This study aims to design and build an expert system based on the Fuzzy Logic method in helping diagnose blepharitis. The fuzzy method was chosen because it is able to handle the uncertainty of symptom data that often arises in the medical diagnosis process. This system is developed through the identification of the common symptoms of blepharitis, then processed using the fuzzy membership function to determine the type of disease based on the degree of symptom onset. The output of the system is in the form of the results of the diagnosis of blepharitis along with initial treatment recommendations that can be used as a reference for users. The results of the system test show that the application of fuzzy logic is able to provide diagnosis results that are quite accurate, fast, and easy to understand both medical personnel and the general public. This system is expected to help increase public awareness about the importance of early detection of blepharitis, as well as being a tool in the initial medical decision-making process. However, the limitations of this study lie in the limited amount of data and coverage of the type of blepharitis, so further development is needed, both in expanding the knowledge base, increasing the variety of symptoms, and improving system interaction with users.
Rancang Bangun Peminjaman Buku pada Perpustakaan STMIK Kaputama Menggunakan RFID Berbasis IoT Assya Harnita Lubis; Husnul Khair; Muammar Khadapi
Repeater : Publikasi Teknik Informatika dan Jaringan Vol. 3 No. 3 (2025): Juli : Repeater : Publikasi Teknik Informatika dan Jaringan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/repeater.v3i3.615

Abstract

The rapid advancement of information technology has brought significant transformation across multiple sectors, including library management systems. One of the pressing needs in higher education libraries is the development of an efficient, accurate, and secure borrowing system that reduces human error and improves service quality. This study aims to design and implement a book borrowing system for the STMIK Kaputama library by utilizing Radio Frequency Identification (RFID) technology integrated with the Internet of Things (IoT). The proposed system employs the ESP32 microcontroller as the core controller, supported by the RFID RC522 module and buzzer as primary devices to facilitate the automatic identification of library members and borrowed books. The borrowing and returning process is executed through RFID card scanning, with all transaction data transmitted via WiFi and stored in a MySQL database, which is managed through a PHP-based web platform. The development process follows the Agile methodology, enabling iterative improvement and adaptability to user requirements. System testing demonstrates that the integration of RFID and IoT technology significantly enhances the efficiency, accuracy, and speed of library operations compared to the previous manual system. Furthermore, the system allows real-time recording of borrowing transactions, monitoring of user activities, and centralized data management. These features not only streamline library services but also improve data security and reduce the risk of loss or duplication of records. Overall, the implementation of this RFID-IoT-based system provides an innovative solution for modernizing library management, particularly in higher education institutions. The system ensures faster services, minimizes errors, and creates a structured and reliable digital infrastructure to support academic information services. This study highlights the potential of combining RFID and IoT technologies to improve the quality and effectiveness of library systems in the digital era.
Pengelompokkan Pendonor Darah Berdasarkan Golongan Darah Di PMI Kabupaten Langkat Menggunakan Metode Clustering K-Means Ningsih, Arista Widya; Novriyenni, Novriyenni; Khair, Husnul
Fusion : Journal of Research in Engineering, Technology and Applied Sciences Vol. 2 No. 1 (2025): Fusion - April
Publisher : PT. Faaslib Serambi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk mengelompokkan data pendonor darah berdasarkan golongan darah, tempat domisili, dan usia menggunakan metode Clustering K-Means. Palang Merah Indonesia (PMI) Kabupaten Langkat menghadapi tantangan dalam pengelolaan data pendonor yang masih bersifat konvensional, sehingga diperlukan pendekatan berbasis data mining untuk meningkatkan efisiensi dan akurasi pengelompokan data. Data sebanyak 2000 pendonor diolah menggunakan algoritma K-Means melalui perangkat lunak MATLAB R2014b dengan konfigurasi 3, 4, dan 5 cluster. Hasil pengujian menunjukkan bahwa konfigurasi 5 cluster memiliki nilai rata-rata variance terendah sebesar 2,2048, yang menandakan bahwa pengelompokan lebih kompak dan stabil dibandingkan konfigurasi lainnya. Mayoritas pendonor darah berasal dari golongan darah A, domisili Kecamatan Stabat, dan berusia 25–44 tahun (dewasa). Pengelompokan ini diharapkan dapat membantu PMI Kabupaten Langkat dalam menyusun strategi pelayanan donor darah secara lebih tepat sasaran dan efisien.
Rancang Bangun Tong Sampah Pintar dengan Penerapan Sampah Metal dan Non Metal Menggunakan IoT pada STMIK Kaputama Dimas Aditya; husnul khair; Milli Alfhi Syari
Repeater : Publikasi Teknik Informatika dan Jaringan Vol. 3 No. 3 (2025): Juli : Repeater : Publikasi Teknik Informatika dan Jaringan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/repeater.v3i3.618

Abstract

Waste management remains a major challenge, particularly due to the lack of public awareness and habits in sorting waste from its source. Innovative technology-based solutions are needed to support more effective waste management systems. This study aims to design and develop an Internet of Things (IoT)-based smart trash bin capable of automatically sorting metal and non-metal waste. The system utilizes an ESP32 microcontroller as the main controller, an LJ12A3-4-Z/BY sensor to detect metal materials, an E18 sensor to detect non-metal materials, and an ultrasonic sensor to monitor bin capacity. The waste separation mechanism is operated by a servo motor controlled by the system, while the Blynk application is integrated for real-time monitoring and full-capacity notifications sent directly to the user’s smartphone. The research stages included hardware design, microcontroller programming, IoT platform integration, and functionality testing to ensure system performance and reliability. The results showed that the smart trash bin operated as expected, successfully identifying and separating metal and non-metal waste automatically, while also sending real-time notifications to the user when the bin approached full capacity. The implementation of this technology has the potential to modernize waste management processes, improve the efficiency of waste sorting, and reduce dependency on manual labor. Furthermore, this research opens opportunities for future development by integrating additional sensors and cloud-based data management systems to support smart city initiatives and sustainable waste management practices.
Penerapan Metode K-Nearest Neighbor untuk Mengetahui Tipe Gangguan Kecemasan Berdasarkan Faktor yang Mempengaruhi Zehy Fadia; Yani Maulita; Husnul Khair
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 6 (2025): November: Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i6.1137

Abstract

Anxiety disorders are common mental health problems in society, often unrecognized by the sufferer. Identifying the type of anxiety disorder and its influencing factors is crucial for proper treatment. This research aims to apply the K-Nearest Neighbor (K-NN) method in identifying types of anxiety disorders based on influencing factors, focusing on patient data from Sylvani Hospital, Binjai. The K-NN method was chosen because of its ability to classify based on data proximity. This study used medical record data of patients with anxiety disorders, which were processed using MATLAB and Microsoft Excel software. The results show that the K-NN method is effective in identifying types of anxiety disorders, with a high level of accuracy, especially in the identification of Panic Disorder (K05) and Social Anxiety Disorder (K03). The use of MATLAB simplified the identification process by automating results, while data processing in Excel improved classification accuracy. This study concludes that the K-NN method can be an effective alternative in identifying anxiety disorder types based on the factors that influence them. It is recommended for future research to involve more variables and mental health experts for a more comprehensive validation of the results.
PELATIHAN PERENCANAAN BERBASIS DATA PADA PENGAWAS SEKOLAH, KEPALA SEKOLAH DAN GURU MENGGUNAKAN METODE INDENTIFIKASI, REFLEKSI DAN BENAHI (IRB) SECARA DARING Fauzi, Achmad; Rahayu, Rizka Putri; Khair, Husnul; Maulita, Yani
Jurnal Pengabdian Pada Masyarakat METHABDI Vol 3 No 2 (2023): Jurnal Pengabdian Pada Masyarakat METHABDI
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/methabdi.Vol3No2.pp170-174

Abstract

Data-based planning training is carried out online based on various sources which can be used to carry out or prepare an agenda for future activities and budgets. The data-based planning training activity was carried out online for two days. This implementation started with the experience of the school principal sharing his experience with the education unit in planning and compiling activities and making budgets at the school, then the facilitator provided reinforcement for data mining from the independent teaching platform (PMM ), Education Report Card Platform as well as through data sourced from the North Sumatra Education Quality Assurance Center (LPMP). Then the facilitator reflects on the training on the material that has been explained. On the second day of implementation, each educational unit grouped to discuss and fill in the evaluation sheet, then carried out identification, reflection and improvement in planning activity plans and preparing budgets for the unit, then apart from that, the educational units held discussions to make follow-up plans starting from the date, unit involved and the media used. Next, reflect on your experience at school, then work on an evaluation worksheet that is synchronized with the Identification worksheet, then a reflection worksheet and a fix worksheet, then the education unit finishes working on an activity plan that comes from several data and can prepare a budget that is planned for the long term.
Superencryption of BASE 64 Algorithm and ELGAMAL Algorithm on Android Based Image Security Usman Gumanti; A M H Pardede; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.211

Abstract

In the current era of globalization, the development of information technology is growing rapidly, there is a possibility that there will be data leaks when the process of exchanging information is carried out, then security becomes a very important aspect which will cause unwanted things, for example manipulation of images in the form of information systems. If this important information falls into the hands of the wrong person, it can be negative and can be detrimental to the image owner. So a security system is designed that functions to protect the data that is sent while maintaining its authenticity and authenticity. Various ways have been developed for data security, one of which is by using cryptography. Cryptography is the science of securing data by using data transformation so that the resulting data cannot be understood by other parties. This transformation can provide a solution to two data security problems, namely the problem of privacy and data authentication. Cryptographic techniques can be used to ensure data security, one of which can be utilized is encryption and description of data or in other words encoding data so that only the person concerned can understand the contents of the data. The proper use of information technology is very important to send private and confidential images to certain parties. These images are still in the form of PNG and JPG extensions, for this reason a security system is needed that can protect images that are transmitted through a communication network, one way that can be done to secure images is using the BASE 64 algorithm and the ELGAMAL algorithm.
Co-Authors ., Novriyenni Abdullah Husein ACHMAD FAUZI Achmad Fauzi Adityo Razzaqqi Ambarita, Indah Annatasia, Kristina Arliana, Lina Assya Harnita Lubis Aulia Annisa Br Bangun Bahri, Anggi Adhilah Bayu Juliansyah Br. Ginting, Rosa Lina Buaton, Relita Bustami, Harya Dea, Dea Puspita Deli Alvinda Dimas Aditya Eriska Sitepu Esti Sundari Fadilah, Nurul Elsa Fatmaira, Zira Fauzi Ahmad Muda Fauzi, Achmad Fiqih Dalfin S Meliala Firhan Ali Fresti Anjeli Frisca Prastiwi, Kellyn Gultom, Imeldawati Gultom, Imeldawaty Hafizh, Faisal Herdianta Herdianta I G Prahmana Ihsan, Ihsan Muchlis Ika Indah Rahayu Indakholasy, Barru John Darwis Martuadi Saragih Khadapi, Muammar Lili Musarofah Lili Musarofah Livia Dirma Pr Magdalena Simanjuntak Magdalena Simanjuntak Magdalena Simanjuntak Magdalena Simanjuntak Manik , Yolanda Arta Sabrina Manurung, Immanuel H. G. Melda Pita Uli Sitompul Muammar Khadafi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris Muhammad Roynaldi Nabil Fuadi Nasril Hidayat Nasution, Raja Imanda Hakim Ningsih, Arista Widya Nisrina Naufalia Santoso Novriyenni Novriyenni Novriyenni Novriyenni, Novriyenni Nurhayati Nurhayati Nurul Syahrani Pardede, Akim Manaor Hara Pasaribu, Tioria Paul Saut Marganda L Tobing Pitaloka, Nadila Prahmana, I Gusti Pramana, I Gusti Rahayu, Rizka Putri Rahmadani Rahmadani Ramadani, Suci Ramos Parulian Ambarita Rani Nuraini Rani Nuraini Rani Rianda Br Ginting Ratih Puspadini Rindi Asti Ananda Riska Kurniawati Risna Serviya Rizka Khairani Lubis Roynaldi, Muhammad Rusmin Saragih, Rusmin Ryan Hidayat Saragih, John Darwis Martuadi Selfira, Selfira SELVY ANGGRAINI, SELVY Sembiring, Indri Aurellia Apsari Serviya, Risna Setia Ningsih Sibero, Alexander F.K. Sihombing, Anton Simanjuntak, Magdalena Sinambela, Rifdahtul Ghinaa Siswan Syahputra Sitanggang, Rianto Sitepu, Cindy Yohana SRI DEVI BANGUN suci ramadani Surbakti, Tania Br Susilawati Susilawati Susilawati Syahputra, Siswan Syari, Milli Alfhi Tami Dayatmi Usman Gumanti Windi Tamara Windi Wiranata, Rio Yani Maulita Yuda Washita Zehy Fadia