Claim Missing Document
Check
Articles

Found 12 Documents
Search

ANALISA DAN RANCANGAN SISTEM INFORMASI MANAJEMEN ADMINISTRASI PEMBERDAYAAN KESEJAHTERAAN KELUARGA KOTA SIBOLGA Imran Lubis; Divi Handoko
Jurnal Informatika Kaputama (JIK) Vol 3, No 2 (2019): VOLUME 3 NOMOR 2, EDISI JULI 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v3i2.164

Abstract

Family welfare empowerment (PKK) is a community organization with 10 main programs that empower women to participate in Indonesia's development. The administrative process that has not been properly systemmed causes less optimal and efficient provision of data and information. In this study, the technique of developing the PKK Management Information System applies the Rapid Application Development (RAD) method, where this method has the advantage of being short and fast. The results of the SIM PKK design can provide convenience in providing accurate, fast data for policy making and also able to improve performance and efficiency in KDP organizations.
Penerapan Data Mining K-Means Clustering Untuk Pengelompokan Barang Pada Masa Pandemi Covid-19 Di Rex Indonesia Sisca Dwivayana; T.M Diansyah; Divi Handoko
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.346 KB)

Abstract

Freight forwarding services are very useful and very easy to access, since the implementation of working from home a lot of workers, housewives, or traders, many of whom use delivery services both to meet their needs and for the business of buying and selling goods. Royal Express Indonesia (REX) is a company that focuses on its services as a delivery service company. The cases COVID-19 are increasing and spreading rapidly throughout Indonesia. By grouping the types of packets using the K-Means algorithm. Can assist companies in evaluating the statistics of goods that have increased and decreased. The application of the method K-Means will be carried out using SPSS version 25 software. The results of the K-Means Clustering process can be concluded that cluster 1 has 8,000 (53.33%) data, cluster 2 has 4,000 (26.67%) data and cluster 3 has 3,000 (20.00%) data.
Implementasi Teknologi Asynchronous dengan Menggunakan Squid Untuk Menyimpan Cache Website Ade Subarqah; Tengku M. Diansyah; Divi Handoko
JITEKH Vol 9 No 2 (2021): September 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v9i2.431

Abstract

Information technology, especially the internet, is currently growing very rapidly, due to the increasing number of people who disseminate information through the internet. The development of the number of users of Internet information technology is currently not followed by the addition of appropriate bandwidth, so problems often arise related to the speed of access to get internet services. An easy way to save bandwidth and force authentication on information traffic is to use squid. The use of Squid can be used to increase the need to speed up information retrieval. By using the Squid application, the router can be used as a proxy server for internet web cache. At the time of installing Squid without a proxy, testing was carried out on the https://www.kompas.com url and the results of the first load on a website resulted in a load time of 36 seconds, there was no difference in bandwidth usage and time whether using a proxy server or not, but the second page load on the same site with a faster load time of 30 seconds will save bandwidth. Then the installation of Squid using a proxy was carried out, testing was carried out on the https://www.kompas.com url and the results of the first load on a website resulted in a load time of 34 seconds, there was no difference in bandwidth usage and time, whether using a proxy server or not, but on the second page load on the same site with a faster load time of 16 seconds, it will save bandwidth and be faster by using squid compared to not using squid.
PEMANFAATAN VOIP PHONE SYSTEM SEBAGAI SARANA KOMUNIKASI JARINGAN LOKAL Divi Handoko
JTIK (Jurnal Teknik Informatika Kaputama) Vol 4, No 2 (2020): Edisi Juli Nomor. 4 Volume. 2 Tahun 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Communication is a very important part in conveying information, especially voice information or voice, can be done in various ways, one of them using the telephone. Voice over Internet Protocol (VoIP) is a means of delivering information at a very low cost compared to analog phones and can be applied to existing office equipment, such as a computer, laptop and Android smartphone without the need to buy special devices. VoIP can be implemented using the internet (like WhatsApp) or on a local network (such as LAN or WLAN) which is very suitable to be implemented in companies or offices. VoIP can be implemented in companies in areas that are not affordable by the internet, VoIP is an alternative digital telephone technology in delivering information in the form of voice. The main objective of this research is to discuss the utilization and implementation of VoIP Phone voice communication systems using Local Area Network (LAN) or Wireless Local Area Network (WLAN) as a transmission media. VoIP phone systems require 2 device models, namely devices that serve as servers with the trixbox operating system and softphone on a client computer or laptop. Keywords: VoIP, softphone, Server, Client
Sosialisasi Penggunaan Akun Google Sebagai Media Pembelajaran Digital Bagi Guru SD Negeri 060856 Medan Mufida Khairani; Divi Handoko; Boni Oktaviana Sembiring; Arie Rafika Dewi; Yulia Agustina Dalimunthe
Literasi: Jurnal Pengabdian Masyarakat dan Inovasi Vol 3 No 1 (2023)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58466/literasi.v3i1.968

Abstract

The development of technology today has been widely used by humans. Not only in industry and companies, but has penetrated the world of education, where the use of computer devices and applications is used by teachers and students. In the use of an online-based computer, a google account is needed that can be used to access email and other google media applications such as google classroom, google meet, google drive, google doc, google slides, google calendar, google form and so on. This training was conducted at SD Negeri 060856 Medan by utilizing a Google account as a digital-based learning medium. This training aims to increase teachers' knowledge and insight in making interesting learning and increase the effectiveness of digitalization-based learning. As a result of this activity, teachers can understand the use of media tools such as gmail, google classroom and google meet.
Implementasi Internet Protocol Versi 6 Pada Jaringan VoIP Berbasis Session Initiation Protocol Mhd. Tri Arief; Ilham Faisal; Divi Handoko
JITEKH Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v11i1.705

Abstract

Analyzing the difference in performance values generated by the IPv4 protocol and the IPv6 protocol VoIP services on a WAN network using a bandwidth of 128 Kbps. Session Initiation Protocol (SIP) is one of the protocols commonly used in Voice Over Internet Protocol (VoIP) telecommunications. SIP is a signaling protocol developed by the Internet Engineering Task Force (IETF) under the label RFC3261. In a telephone call using IPv4 and IPv6 with a distance of 3 meters concluded that IPv6 is better with a bandwidth of 55.1 Kb and Packet Traffic of 140 compared to IPv4 with a result of 35.1 Kbps and Packet Traffic of 150. Computer network topology is a network arrangement in which each part is interconnected with each other through physical media such as cables and optical fiber.
ANALISA DAN RANCANGAN SISTEM INFORMASI MANAJEMEN ADMINISTRASI PEMBERDAYAAN KESEJAHTERAAN KELUARGA KOTA SIBOLGA Imran Lubis; Divi Handoko
Jurnal Informatika Kaputama (JIK) Vol 3 No 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jik.v3i2.370

Abstract

Family welfare empowerment (PKK) is a community organization with 10 main programs that empower women to participate in Indonesia's development. The administrative process that has not been properly systemmed causes less optimal and efficient provision of data and information. In this study, the technique of developing the PKK Management Information System applies the Rapid Application Development (RAD) method, where this method has the advantage of being short and fast. The results of the SIM PKK design can provide convenience in providing accurate, fast data for policy making and also able to improve performance and efficiency in KDP organizations.
Sistem Pendukung Keputusan Metode Waspas Dan Topsis Dalam Menentukan Dosen Terbaik Berdasarkan Variabel Bidang Keahlian Mufida Khairani; Yunita Sari Siregar; Divi Handoko; Nenna Irsa Syahputri; Herlina Harahap
Digital Transformation Technology Vol. 3 No. 1 (2023): Artikel Periode Maret Tahun 2023
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v3i1.2761

Abstract

Universitas Harapan Medan adalah satu perguruan tinggi swasta di kota Medan yang mempunyai beberapa fakultas diantaranya Fakultas Ekonomi Bisnis (FEB), Fakultas Teknik dan Komputer (FTK), Fakultas Bahasa dan Komunikasi (FBK), dam Fakultas Hukum. Terdapat beberapa program studi yang berada di bawah naungan Fakultas Teknik dan Komputer, yaitu meliputi : Teknik Industri, Teknik Mesin, Teknik Sipil, Teknik Elektro, Teknik Informatika dan Sistem Informasi.Program Studi Teknik Informatika memiliki jumlah dosen aktif sebanyak 38 orang. Dimana bidang peminatannya adalah jaringan, multimedia dan robotika. Dosen merupakan tenaga pendidik professional yang memberi pengajaran dan mengembangkan ilmu di perguruan tinggi. Sebagai bentuk apresiasi Perguruan Tinggi terhadap dosen dalam kinerja tridarma, maka akan dilakukan pemilihan dosen terbaik untuk meningkatkan kualitas kinerja dengan menggunakan metode sistem pendukung keputusan. Ada 2 metode analisa yang digunakan dalam penelitian ini yaitu metode WASPAS (Weighted Aggregated Sum Product Assesment) dan TOPSIS (Technique For Order Preference by Similarity to Ideal Solution). Tujuan dalam penelitian ini adalah Menganalisis metode sistem pendukung keputusan WASPAS dan TOPSIS dalam menentukan dosen terbaik berdasarkan variabel bidang keahlian di Prodi Teknik Informatika dengan kriteria yang telah ditentukan dan Mengetahui tingkat akurasi dalam pengambilan keputusan dengan sistem pendukung keputusan WASPAS dan TOPSIS dalam menentukan dosen terbaik berdasarkan kriteria yang telah ditentukan.
Penerapan Metode Rule Based Dalam Mendeteksi Serangan Multi Attack Pada Network Attached Storage Ilham Faisal; Divi Handoko; Halimansyah Putra
Jurnal Komputer Teknologi Informasi dan Sistem Informasi (JUKTISI) Vol. 2 No. 3 (2024): Februari 2024
Publisher : LKP KARYA PRIMA KURSUS

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network Attached Storage (NAS) merupakan sebuah server dengan sistem operasi yang dikhususkan untuk melayanikebutuhan berkas data. NAS merupakan solusi terbaik sebagai media penyimpanan dan sharing data. Namun, aspekkeamanan data juga menjadi perhatian utama dalam penggunaan media penyimpanan NAS. Pengelola NAS server tidakdapat menjamin keamanan data pada NAS server yang dikelolanya. Dalam melindungi dan mendeteksi serangan padaNAS, penggunaan firewall sebagai keamanan sangatlah disarankan sebagai benteng awal. Metode Rule Base yangdiimplementasikan dalam firewall untuk menguji seberapa besar akurasi keamanan NAS server, apabila NAS tersebutdiserang dengan serangan multi-attack (serangan ganda). Serangan multi-attack dibagi menjadi dua, yaitu brute-forceattack dan a denial-of-service (DDoS). Analisis forensik juga diperlukan untuk mengetahui apakah ada intruder yangmelakukan penyerangan, diperlukan juga wireshark sebagai paket capturing dan snort sebagai paket sniffing yang berbasisIntrusion Detection System (IDS) dalam pengujian serangan. Pengujian dilakukan menggunakan metode rule basedterhadap firewall iptables pada NAS yang sangat efektif untuk memblokir serangan awal terhadap NAS. Dari 8 kalipengujian, akurasi rule-based terhadap serangan multi-attack pada NAS sebesar 84% berhasil memblokir serangan dan16% gagal memblokir serangan. Waktu yang diberikan berupa pembatasan limit bandwidth masuk dan limit-burst yangditerapkan pada port icmp, udp, tcp ssh dan ftp. Rule-based berhasil memblokir serangan multi-attack yang ditujukan padaNAS. Hasil dari penerapan metode rule-based pada firewall diharapkan dapat memblokir serangan ganda pada NAS. Padaserangan brute-force rule base berhasil melakukan drop koneksi port aktif pada NAS, dan pada serangan DDoS rule basejuga berhasil melakukan drop terhadap socket flooding pada NAS.
Implementasi Data Mining Klasifikasi Algoritma Chaid Dalam Menentukan Pola Penerima Mahasiswa Baru Yunita Sari Siregar; Divi Handoko; Mufida Khairani; Nenna Irsa Syahputri; Herlina Harahap
Digital Transformation Technology Vol. 3 No. 2 (2023): Artikel Periode September 2023
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v3i2.3612

Abstract

Universitas Harapan Medan adalah salah satu Perguruan Tinggi di Sumatera Utara yang memiliki beberapa fakultas, salah satu diantaranya yaitu Fakultas Teknik dan Komputer. Dimana pada fakultas tersebut terdapat 7 program studi yaitu Teknik Elektro, Teknik Sipil, Teknik Mesin, Teknik Informatika Teknik Industri, Sistem Informasi dan Manajemen Informatika. Program studi Teknik Infrmatika merupakan program studi dengan akreditasi B dengan jumlah mahasiswa aktif sampai tahun 2022 yaitu 1.366 orang. Berdasarkan data tersebut dapat dilihat bahwa program studi informatika memiliki jumlah peminat yang sangat banyak bagi mahasiswa. Dalam proses penerimaan mahasiswa baru seringkali membuat susunan berkas yang sangat banyak, sehingga menyulitkan pihak akademik dalam mengelola dan menentukan mahasiswa yang dapat masuk dalam program studi teknik informatika. Oleh sebab itu, diperlukan suatu pola yang dapat menentukan mahasiswa yang lulus dan tidak lulus menggunakan metode klasisfikasi data mining CHAID (Chi Squared Automatic Interaction Detection). Tujuan dalam penelitian ini adalah Merancang model pola karakteristik berdasarkan kriteria dalam seleksi penerimaan mahasiswa baru pada program studi teknik informatikaMenganalisis metode data mining decision tree dengan algoritma CHAID (Chi Squared Automatic Interaction Detection) dalam menentukan siapa yang lulus berdasarkan kriteria-kriteria yang telah ditentukan. Hasil pohon keputusan dalam perancangan pola karakteristik penerimanan calon mahasiswa baru terdapat 43 rule dimana , faktor tertinggi dari ke- 3 faktor yang mempengaruhi pada 75 data testing adalah kriteria Nilai Rapor. Faktor kedua yang juga mempengaruhi hasil keputusan adalah kriteria Ujian CAT (Computer Assisted Test). Dan faktor Nilai Wawancara terakhir yang juga mempengaruhi hasil keputusan adalah kriteria.