Claim Missing Document
Check
Articles

Found 32 Documents
Search

Implementation of the Turbo Boyer Moore Method in Searching Thesis Titles at the Website-Based Faculty of Economics Gustian Febri Syah Putra; Juju Jumadi; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4377

Abstract

Every year, students are required to complete a final project in the form of a thesis as one of the graduation requirements. However, in determining a thesis title that is relevant to the chosen scientific field, students often experience difficulties. The number of thesis titles available in libraries and websites can confuse students in choosing the right title. One method that can be used to achieve this goal is the Turbo Boyer-Moore pattern search method. Turbo Boyer-Moore is one of the efficient pattern matching algorithms to search for certain words or phrases in text. From the results of the tests carried out, it can be concluded that the implementation of the designed program in searching and detecting the same title with a similarity percentage.
Android-Based Cryptography Applications Using The Rail Fence Cipher Algorithm Raden Diky Zailani; Khairil Khairil; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4569

Abstract

Android-based cryptographic applications using the rail fence cipher algorithm are made using the Java programming language (AndroidStudio), the PHP programming language (JSON File Web Service) and the MySQL database. This application has a url link for storing PHP files and message data in the database, while the url link is http://railfencecipher.my.id/. An Android-based cryptographic application using the rail fence cipher algorithm has been uploaded to Google Playstore by entering the rail keyword fence cipher. An android-based cryptographic application using the rail fence cipher algorithm can be used to assist communication between the two parties, both the sender and the recipient of the message. In addition, this application has implemented a rail fence cipher algorithm that is used to maintain the confidentiality of the message stored in the application's database. The records in the message body column in the database are in random form, therefore they cannot be read. This of course makes the application maintain the confidentiality of the messages sent, because there is a process of scrambling (encryption) of the message. Based on the results of the tests that have been carried out, the functionality of the android-based cryptographic application using the rail fence cipher algorithm runs well as expected and the message sent between the recipient and the sender is kept confidential because the message is encrypted.
The Design And Implementation Of Computer Network Monitoring And Security System Using Linux Ubuntu Server Anisa Dewi Sahara; Sapri Sapri; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 3 No 1 (2024): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i1.5328

Abstract

One system that can carry out network monitoring is using ntopng tool or application. Linux Ubuntu Server is an open source operating system, this operating system is very good for use as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. Ntopng in carrying out network monitoring is very well applied at SMK S 1 Pembangunan of Bengkulu City, this is because at SMK S 1 Pembangunan of Bengkulu City, the computer network in the computer and visual laboratory is used by students, both for learning and teaching activities as well as the media used by students to fill their free time. When monitoring the network, Ntopng can do this based on the IP address of the device connected to the network
The Design And Implementation Of Backup Server Using The Failover Method Karneli, Septi; Sapri, Sapri; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6086

Abstract

One of the most widely used data storage in databases today is using MySQL. MySQL is able to store many data items in it, even up to millions of items. So with so much data in this database, it is very necessary to replicate data to maintain data safety and security. Linux ubuntu server 18.04 is an open source operating system, this operating system is very well used as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. The replication technique is very well applied to the Bengkulu Province Communication and Information Service, this is because the Bengkulu Province Communication and Information Service holds a lot of data. Both internal data and external data. In communicating data to the database using the replication technique, it is very fast with a time of +/- 3 seconds of data communication, this time will also be affected by the condition of the computer network and the device used. The replication technique is very good for agencies that have a very large database and require a long storage time.
Implementation Of Security Information And Event Management (Siem) In Monitoring Networks At SMA 1 Muhammadiyah Boarding School Paw, M. Reyza Putra; Aspriyono, Hari; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6591

Abstract

Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School can help network administrators know the activity and status of devices connected to the network whether UP or Down, can help provide information in the form of logs of services that run and log security events on each device connected to the network. This of course can make it easier for network administrators to deal with problems found on network devices connected to OSSIM AlienVault. In OSSIM AlienVault there is a web UI platform that can make it easier for network administrators to monitor the network at SMA Muhammadiyah Boarding School. Where the OSSIM AlienVault Web UI can be accessed via the IP Address Server in the browser. Based on the tests carried out, the results show that the Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School runs well and can help network administrators in network monitoring and can provide information in the form of event logs on each device connected to the network.
Application Of Wazuh To Conduct Monitoring Network Security System (Case Study Of SMK N 1 Bengkulu City) Aripilahi, Edwin; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6592

Abstract

The application of Wazuh to monitor network security systems at SMK Negeri 1 Bengkulu City can help network operators monitor security systems, computers and make it easier to control the devices being monitored, so that they can take action as soon as possible if there is a disruption to the system and network based on the monitoring results. Wazuh can monitor files in the directory folder. The information provided is in the form of adding, modifying and deleting files contained in the directory folder. Based on the tests carried out, the results showed that the application of Wazuh to monitor the network security system at SMK Negeri 1 Bengkulu City was running well and could help network administrators by providing information related to the agent device being monitored.
Qos Analysis In The Application Of HTB At Computer Laboratory Of Engineering Faculty Of Universitas Muhammadiyah Bengkulu Rahmadhan, Ihsan; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6595

Abstract

Bandwidth management is needed therefore the existing bandwidth is divided according to the needs of each connected connection. One method that can stabilize the distribution of bandwidth is the Hierarchical Token Bucket (HTB) method. This study aims to adjust the amount of bandwidth to suit the needs of internet usage for each user without making one user dominate the use of bandwidth on the internet network. The research was conducted in 5 stages, namely: problem analysis, data collection, HTB design and implementation, HTB implementation and analysis of the final results of the system with HTB. Problem analysis and data collection are obtained through direct observation and observation. Design and implementation are done with the HTB method on the proxy router. The HTB method allows us to make the queue more structured, by doing multilevel groupings. The test results show that the HTB method can manage bandwidth usage for each user when using the internet simultaneously. From the analysis of the application of the HTB method in the computer laboratory of engineering faculty in Universitas Muhammadiyah Bengkulu, it shows that loyal users get bandwidth based on their limit-at and priority, which is equal to
PENGEMBANGAN SISTEM JARINGAN CLIENT SERVER DALAM MEMBANTU PROSES PENGOLAHAN DATA OBAT DI PONDOK PENGOBATAN ALTERNATIF MIFTAHUSSYIFA Tarsani, Tarsani; Khairil, Khairil; Akbar, Abdussalam Al
JOURNAL OF SCIENCE AND SOCIAL RESEARCH Vol 7, No 4 (2024): November 2024
Publisher : Smart Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54314/jssr.v7i4.2189

Abstract

Saat ini proses pengolahan data persediaan dan penjualan obat-obatan di Pondok Pengobatan Alternatif Miftahussyifa masih menggunakan pembukuan yang ditulis di double polio, baik untuk menginputkan data persediaan dan data penjualan obat. Data yang telah ditulis di pembukuan tersebut dimasukkan ke dalam excel untuk dibuatkan laporan setiap bulannya dan hal ini membutuhkan waktu yang cukup lama, selain itu sering terjadi kesalahan dalam menghitung jumlah stok akhir setiap obat di Pondok Pengobatan Alternatif Miftahussyifa Bengkulu. Aplikasi pengolahan data obat di Pondok Pengobatan Alternatif Miftahussyfa Bengkulu merupakan suatu aplikasi yang dapat digunakan untuk membantu mengelola data obat, penjualan, serta pembelian obat. Selain itu juga terdapat output yang dapat digunakan untuk mengetahui laporan persediaan, laporan penjualan, laporan pembelian, serta nota penjualan konsumen di Pondok Pengobatan Alternatif Miftahussyfa Bengkulu. Aplikasi pengolahan data obat di Pondok Pengobatan Alternatif Miftahussyfa Bengkulu dibuat menggunakan bahasa pemrograman Visual Basic .Net dan Database SQL Server. Aplikasi pengolahan data obat di Pondok Pengobatan Alternatif Miftahussyfa Bengkulu terdiri dari 2 hak akses yaitu Administrator dan Kasir.Berdasarkan pengujian yang telah dilakukan, fungsionalitas dari aplikasi pengolahan data obat di Pondok Pengobatan Alternatif Miftahussyfa Bengkulu telah berjalan sesuai harapan.
IMPLEMENTASI KEAMANAN PADA CITRA DIGITAL MENGGUNAKAN ALGORITMA LEAST CONGRUENTIAL GENERATOR DAN LEAST SIGNIFICANT BIT Deaz, Natali Mevian; Jumadi, Juju; Akbar, Abdussalam Al
JOURNAL OF SCIENCE AND SOCIAL RESEARCH Vol 8, No 1 (2025): February 2025
Publisher : Smart Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54314/jssr.v8i1.2600

Abstract

Abstrak: Steganografi LSB memanfaatkan Least Significant Bit dari data media penampung yang akan disubstitusikan dengan bit dari data pesan yang akan disembunyikan. Konsep LSB yang melakukan substitusi secara linear menyebabkan pesan yang disembunyikan dapat dibaca dengan mudah oleh pihak lain yang tidak berhak. Pengacakan dianggap perlu agar proses substitusi pada media penampung tidak dilakukan secara linear. LCG merupakan metode pembangkit bilangan acak semu yang mana akan menghasilkan bilangan acak menggunakan parameter a, b dan M. Bilangan acak yang dihasilkan relatif baik dengan penggunaan parameter yang tepat. Implementasi LCG dalam membangkitkan lokasi penyisipan secara acak memberikan keamanan tambahan terhadap pesan yang disembunyikan sehingga dapat menutupi kekurangan dari steganografi LSBDari hasil pengujian yang dilakukan dapat disimpulkan bahwa keamanan pesan pada citra digital menggunakan algoritma LCG dan LSB terbukti dapat memberikan keamanan tambahan yang cukup baik dan kualitas dari citra digital tidak berbeda antara menggunakan LCG dan tidak menggunakan LCG karena pada dasarnya penyisipan dilakukan oleh metode LSB sedangkan LCG hanya menentukan posisi pikselnya saja. Kata kunci : Least Significant Bit, Linear Congruential Generator, Citra Digital
Perancangan sistem informasi sekolah berbasis web pada TK Aisyiyah Bustanul Athfal 1 Bengkulu Farhan, Farhan Suryadicka; Aspriyono, Hari; Al Akbar , Abdussalam
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 4 No 1 (2025): IT-Explore Februari 2025
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/itexplore.v4i1.2025.pp65-81

Abstract

TK Aisyiyah Bustanul Athfal 1 Bengkulu is an early childhood education institution that still manages administrative and academic processes manually, such as recording student data, admitting new learners, and assessing learning outcomes. This has the potential to cause recording errors, data loss, and delays in information processing. This research aims to design a web-based school information system that can help manage school data and information in a computerized manner. The system includes student management, payment, assessment, and school profile modules. The methods used in designing this system include observation, interview, and literature study. System requirements analysis was conducted to identify the needs of users, both school managers and the community. The system was developed using Codeigniter 3 framework and MySQL database. It is expected that this system can improve the efficiency and accuracy of data management and accelerate the delivery of real-time information.