Articles
Implementasi Algoritma Rabin Karp Pada Aplikasi Muroja’ah Hafalan Al-Qur’an Menggunakan Google Speech API Berbasis Android
Muhammad Khoir Al Alim Manurung;
Samsudin Samsudin;
Ali Ikhwan
Journal Cerita: Creative Education of Research in Information Technology and Artificial Informatics Vol 8 No 2 (2022): Journal CERITA : Creative Education of Research in Information Technology and Art
Publisher : UNIVERSITAS RAHARJA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (560.594 KB)
|
DOI: 10.33050/cerita.v8i2.2461
The muroja'ah application in Al-Qur'an memorizing is an android-based application that is used to help memorizers of the Al-Qur’an in doing muroja'ah memorization. The application is built using Speech Recognition in Artificial Intelligence (AI) technology by implementing the Google Speech API and the Rabin Karp Algorithm to convert the user's speech into a string which is then compared with the correct verse string. As for data collection methods, the author uses qualitative research methods, by conducting observations, interviews, and literature research. The application that was built successfully implemented the Google Speech API feature along with the Rabin Karp Algorithm with the output displaying information about the correct status or not along with the percentage accuracy of the similarity between the correct verse data and the voice spoken by the user.
ANALISIS KEAMANAN WEBSITE PRODI SISTEM INFORMASI UINSU MENGGUNAKAN METODE APPLICATION SCANNING
Pria Mitra Purba;
Azrah Cipta Amandha;
Riyan Hidayah Purnama;
Ali Ikhwan
Jurnal Informatika Teknologi dan Sains Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (293.203 KB)
|
DOI: 10.51401/jinteks.v4i4.2065
The current technological developments on security in every agency or agency website will certainly provide the best security, especially in terms of interfaces and data security. The website is an information page that is available through the internet so that it can be accessed throughout the world as long as it is connected to the internet network. The website itself is a component or collection of components consisting of text, images, sound, and animation so that it is interesting to visit. The Information Systems Study Program website is one of the websites that is able to provide academic information and the needs of UINSU Information Systems Study Program students. Therefore, of course, this website has its own security for processing existing data and information. Web security refers to protocol protection measures adopted by web managers to protect and secure data on websites and servers so that they are not exposed to cybercriminals or to prevent exploitation of the website in any way.
Implementation of Single Linked on Machine Learning for Clustering Student Scientific Fields
Saiful Nur Arif;
Muhammad Dahria;
Sarjon Defit;
Dicky Novriansyah;
Ali Ikhwan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 1 (2022)
Publisher : LPPM Universitas Bumigora
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30812/matrik.v22i1.2337
Machine Learning in classifying scientific fields according to the competence of students. Currently STMIK Triguna Dharma is quite difficult to map the scientific fields that will be used by students in submitting titles, so that the results of the thesis made are less than optimal. For this reason, it is necessary to map this concentration to assist students in completing theses through specialization classes. The Mechanical Learning technique used in solving this problem is to use the Single Linkage Technique. The process of testing the method begins with determining the standard data used and then looking for the proximity value using Euclidean so that later cluster results will be obtained from mapping scientific fields. From the Single Linkage Technique process that has been carried out, several cluster results will be obtained, namely clusters that map groups of STMIK Triguna Dharma students who have competence and clusters that map groups of STMIK Triguna Dharma students who lack competence. From the results of this grouping, the institution will make specialization classes according to the resulting cluster. Thus creating a specialization class that is in accordance with the competencies possessed by STMIK Triguna Dharma students
Pengamanan Pesan Menggunakan Metode Hill Chiper Dalam Keamanan Informasi
Indah Saputri;
Pauji Wibowo;
Putri Ratricia;
Ali Ikhwan
Bulletin of Information Technology (BIT) Vol 3 No 4: Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/bit.v3i4.415
Informasi atau data pribadi seseorang merupakan salah satu aspek terpenting dalam kehidupan seseorang karena dapat dibagikan kepada orang lain yang dapat mengakses informasi tersebut. Salah satu hal yang paling penting untuk diingat adalah orang yang memiliki pesan rahasia karena jika tersebar, kemungkinan besar akan berdampak sangat fatal terhadap orang tersebut. Salah satu cara yang paling umum adalah melalui enkripsi. Enkripsi adalah proses untuk menyamarkan atau menyandikan pesan sehingga orang yang tidak berkepentingan tidak bisa mengetahui makna dari pesan tersebut. Enkripsi dapat dilakukan dengan mengalihkan invers matriks kunci dengan matriks chiperteks sedang deskripsi dilakukan dengan menggabungkan ciphertext dengan data matriks terbalik. Kriptografi adalah ilustrasi yang menggambarkan proses pengumpulan informasi atau data dari pihak yang berusaha memahaminya dengan menggunakan kode dan data. Algoritma yang dikenal dengan nama hill cipher merupakan salah satu contoh algoritma kriptografi yang sangat cocok untuk analisis. Algoritma yang dikenal sebagai Hill Cipher adalah salah satu contoh algoritma kriptografi yang paling terkenal karena menggunakan operasi matematika dan moduli. Proses algoritma hill cipher dapat dibandingkan dengan plaintext atau ciphertext dalam segala arah baik positif maupun negatif.
Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp
Kiki Andrea;
Aji Wardana;
Bagus Sopian Wanandi;
Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jppie.v2i1.660
At this time chat has been considered as a facility that can be used to communicate directly both remotely and at close range. Those who must be connected online with internet users around the world. In this case, this research will be applied to the WhatsApp text messaging application using the method applied, namely Caesar cipher cryptography. The system development method that will be used for this research is the prototype method. The results obtained from this research method are chat messages on the WhatsApp application encrypted using Caesar cipher cryptography with message encryption using end-to-end processing techniques where encryption and message descriptions can be done while chatting.
Implementasi Keamanan Database menggunakan Metode Kriptografi pada Puskesmas Karang Rejo Poli TB Paru
fahreza shiddiq siregar;
muhammad hafi isfahan isnan;
muhammad rizky ramadhan;
ali ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jppie.v2i1.661
Perkembangan teknologi informasi saat ini berkembang dengan cepat terutama dalam teknologi internet. Banyak data yang telah dikirim dan diterima dari lalu lintas internet. Pada sebuah instansi atau lemabaga pasti memiliki data-data pribadi yang mungkin saja bisa dibobol oleh pihak tertentu. Karena sudah banyak kasus yang mengakibatkan hilangnya data-data pribadi kita. Maka dari itu banyak perusahaan yang menggunakan metode keamanan untuk melindungi data perusahaan dan data karyawannya. Untuk itu diperlukannya Enkripsi sebagai metode mengamankan data. Pada Puskesmas Karang Rejo masih kurangnya keamanan pada data karyawan sehingga rentan terhadap pencurian data. Dengan adanya keamanan data enkripsi ini, Puskesmas Karang Rejo dapat meminimalisir kebocoran atau kebobolan data karyawan atau pegawainya.Karena dengan adanya pengamanan enkripsi ini bisa melindungi dokumen penting yang termasuk data pribadi. Penelitian ini menggunakan metode Kualitatif yang dimana metode tersebut bertujuan untuk membuat sebuah aplikasi yang dapat membantu untuk melakukan Enkripsi pada database karyawan Puskesmas Karang Rejo. Hasil penelitian berfokus pada hasil rancangan aplikasi untuk Enkripsi dan Dekripsi. Aplikasi sudah diuji coba melalui prototype. Sehingga aplikasi dapat digunakan dalam membantu keamanan data karyawan Puskesmas Karang rejo.
Analysis Of Information Security It Governance With Cobit 5 Framework At PT. Indonesia Comnets Plus (ICON+) SUMBAGUT
Ananda Salsabila Khairi;
Putrawan Putrawan;
Rafli Khalis Nugraha;
Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jppie.v2i1.672
Currently, information technology is an important part for companies to meet their needs and support the achievement of corporate strategy. Providing a competitive advantage, increasing effectiveness, time and reducing costs is the role of information technology in today's business area. As well as information is an important asset for the company that helps in the development of the company. Information really needs to be guarded and managed securely. PT. ICON+ prioritizes information technology in daily activities, so PT. ICON+ also needs to secure the information assets that exist in the company. Information security must be maintained because it is an important asset owned by the company. Therefore, examining information technology governance and information security using COBIT 5 in a company is really needed. This research can find out whether the company has fulfilled the indicator requirements or not otherwise. The framework and maintenance governance audit was carried out at PT. ICON+ is used to find out indicators of ability. The results were obtained using a questionnaire distributed to companies. In this study, it was found that PT. ICON+ achieved the expected result.
Media Pembelajaran Multimedia Interaktif Menggunakan Metode MDLC Pada Zoom Meetings
Aji Wardana;
Muhammad Rizky Ramadhan;
Mahzura Aznur;
Rizka Annisa Putri;
Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jppie.v2i1.677
Multimedia is a means of disseminating information so that multimedia can be used as an interactive learning medium. This research is based on the results of previously written studies which aim to create a learning media from the discussion results of previous people. Data collection uses the MDLC (Multimedia Development Life Circle) method. The results of this research are to successfully create interactive multimedia learning media using the MDLC (Multimedia Development Life Circle) method as an interactive learning media facility using Zoom Meeting as the meeting medium. This learning media has been tested. Tests in research use tests that focus on the results of visualization displays and effectiveness in conveying information.
Sistem Informasi Pengolahan Data Rekomendasi Teknis Berbasis Web
Ali Ikhwan;
Zakiyah Khalilah
sudo Jurnal Teknik Informatika Vol. 2 No. 1 (2023): Edisi Maret
Publisher : Ilmu Bersama Center
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.56211/sudo.v2i1.192
Dinas Energi dan Sumber Daya Mineral (ESDM) khususnya dibidang geologi tidak terlepas dari Rekomendasi Teknis izin pengeboran dan izin pengusahaan air tanah, banyaknya jumlah data yang masuk menyebabkan sulitnya proses pencarian data yang telah tersimpan karena harus membuka data-data lama dan mencari satu persatu, maka akan memakan waktu yang lama, dan menyebabkan pegawai mengalami kesulitan dalam membuat rekapan akhir pada periode yang dibutuhkan, hal ini disebabkan karena pengolahan data dilakukan secara manual di buku besar, lalu akan direkap menggunakan Microsoft Excel. Oleh sebab itu diperlukannya perancangan sistem informasi yang merupakan salah satu langkah yang efektif dalam pengolahan data. Dalam perancangan sistem informasi yang akan dibuat nantinya berbasis website dengan metode Rapid Application Develo (RAD) karena hanya membutuhkan waktu yang singkat pada tahapan pembuatan sistem informasi, dalam membangun sistem digunakan alat bantu pengembangan sistem yaitu Use Case Diagram, Flowmap, dan Sequence Diagram serta dengan menggunakan bahasa pemrograman PHP dan HTML dan MYSQL sebagai databasenya. Hasil dari penelitian ini adalah terciptanya sistem informasi pengolahan data rekomendasi teknis izin pengeboran dan izin pengusahaan air tanah berbasis Web pada bidang geologi.
PENERAPAN KRIPTOGRAFI VIGENERE CIPHER PADA KEAMANAN DATA PESAN TEKS BERBASIS WEBSITE
Suwinda Aulansari;
Diah Sawitri;
Ali Ikhwan
Jurnal Informatika Teknologi dan Sains Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (248.272 KB)
|
DOI: 10.51401/jinteks.v4i4.2155
Security is an urgent component of an information system. However, this is still very rarely realized by the owner or manager of the information system. That results in information being exchanged or compromised by parties who are not supposed to receive the message. Therefore, a data security system is needed so that information doesn’t crash into the wrong hands. To control data security, you can use cryptography, one of which is the vigenere cipher algorithm. This research uses a literature study research method sourced from various journals and experiments by designing and implementing systems. The final result of the application implementing the vigenere cipher algorithm is expected to help maintain the security of information.