p-Index From 2020 - 2025
9.907
P-Index
This Author published in this journals
All Journal Sistemasi: Jurnal Sistem Informasi RABIT: Jurnal Teknologi dan Sistem Informasi Univrab Jurnal Informatika Universitas Pamulang JurTI (JURNAL TEKNOLOGI INFORMASI) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JISTech (Journal of Islamic Science and Technology) Jurnal Teknologi Sistem Informasi dan Aplikasi JURNAL PENDIDIKAN TAMBUSAI KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) The IJICS (International Journal of Informatics and Computer Science) Journal on Education JOURNAL OF SCIENCE AND SOCIAL RESEARCH Indonesian Journal of Applied Informatics Infoman's: Jurnal Ilmu-Ilmu Manajeman dan Informatika STRING (Satuan Tulisan Riset dan Inovasi Teknologi) Jurnal Mantik Technologia: Jurnal Ilmiah TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer Jurnal Manajemen Informatika dan Sistem Informasi JTIK (Jurnal Teknik Informatika Kaputama) Journal Cerita: Creative Education of Research in Information Technology and Artificial Informatics Indonesian Journal of Electrical Engineering and Computer Science G-Tech : Jurnal Teknologi Terapan JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer Networks, Architecture and High Performance Computing Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Abdi Mas Adzkia Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) AKM: Aksi Kepada Masyarakat Bulletin of Information Technology (BIT) sudo Jurnal Teknik Informatika Hello World Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE Jurnal Informatika Teknologi dan Sains (Jinteks) Jurnal Sains dan Teknologi Jurnal Pendidikan, Sains dan Teknologi Jurnal INFOTEL
Claim Missing Document
Check
Articles

Implementasi Algoritma Rabin Karp Pada Aplikasi Muroja’ah Hafalan Al-Qur’an Menggunakan Google Speech API Berbasis Android Muhammad Khoir Al Alim Manurung; Samsudin Samsudin; Ali Ikhwan
Journal Cerita: Creative Education of Research in Information Technology and Artificial Informatics Vol 8 No 2 (2022): Journal CERITA : Creative Education of Research in Information Technology and Art
Publisher : UNIVERSITAS RAHARJA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.594 KB) | DOI: 10.33050/cerita.v8i2.2461

Abstract

The muroja'ah application in Al-Qur'an memorizing is an android-based application that is used to help memorizers of the Al-Qur’an in doing muroja'ah memorization. The application is built using Speech Recognition in Artificial Intelligence (AI) technology by implementing the Google Speech API and the Rabin Karp Algorithm to convert the user's speech into a string which is then compared with the correct verse string. As for data collection methods, the author uses qualitative research methods, by conducting observations, interviews, and literature research. The application that was built successfully implemented the Google Speech API feature along with the Rabin Karp Algorithm with the output displaying information about the correct status or not along with the percentage accuracy of the similarity between the correct verse data and the voice spoken by the user.
ANALISIS KEAMANAN WEBSITE PRODI SISTEM INFORMASI UINSU MENGGUNAKAN METODE APPLICATION SCANNING Pria Mitra Purba; Azrah Cipta Amandha; Riyan Hidayah Purnama; Ali Ikhwan
Jurnal Informatika Teknologi dan Sains Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.203 KB) | DOI: 10.51401/jinteks.v4i4.2065

Abstract

The current technological developments on security in every agency or agency website will certainly provide the best security, especially in terms of interfaces and data security. The website is an information page that is available through the internet so that it can be accessed throughout the world as long as it is connected to the internet network. The website itself is a component or collection of components consisting of text, images, sound, and animation so that it is interesting to visit. The Information Systems Study Program website is one of the websites that is able to provide academic information and the needs of UINSU Information Systems Study Program students. Therefore, of course, this website has its own security for processing existing data and information. Web security refers to protocol protection measures adopted by web managers to protect and secure data on websites and servers so that they are not exposed to cybercriminals or to prevent exploitation of the website in any way.
Implementation of Single Linked on Machine Learning for Clustering Student Scientific Fields Saiful Nur Arif; Muhammad Dahria; Sarjon Defit; Dicky Novriansyah; Ali Ikhwan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 1 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i1.2337

Abstract

Machine Learning in classifying scientific fields according to the competence of students. Currently STMIK Triguna Dharma is quite difficult to map the scientific fields that will be used by students in submitting titles, so that the results of the thesis made are less than optimal. For this reason, it is necessary to map this concentration to assist students in completing theses through specialization classes. The Mechanical Learning technique used in solving this problem is to use the Single Linkage Technique. The process of testing the method begins with determining the standard data used and then looking for the proximity value using Euclidean so that later cluster results will be obtained from mapping scientific fields. From the Single Linkage Technique process that has been carried out, several cluster results will be obtained, namely clusters that map groups of STMIK Triguna Dharma students who have competence and clusters that map groups of STMIK Triguna Dharma students who lack competence. From the results of this grouping, the institution will make specialization classes according to the resulting cluster. Thus creating a specialization class that is in accordance with the competencies possessed by STMIK Triguna Dharma students
Pengamanan Pesan Menggunakan Metode Hill Chiper Dalam Keamanan Informasi Indah Saputri; Pauji Wibowo; Putri Ratricia; Ali Ikhwan
Bulletin of Information Technology (BIT) Vol 3 No 4: Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v3i4.415

Abstract

Informasi atau data pribadi seseorang merupakan salah satu aspek terpenting dalam kehidupan seseorang karena dapat dibagikan kepada orang lain yang dapat mengakses informasi tersebut. Salah satu hal yang paling penting untuk diingat adalah orang yang memiliki pesan rahasia karena jika tersebar, kemungkinan besar akan berdampak sangat fatal terhadap orang tersebut. Salah satu cara yang paling umum adalah melalui enkripsi. Enkripsi adalah proses untuk menyamarkan atau menyandikan pesan sehingga orang yang tidak berkepentingan tidak bisa mengetahui makna dari pesan tersebut. Enkripsi dapat dilakukan dengan mengalihkan invers matriks kunci dengan matriks chiperteks sedang deskripsi dilakukan dengan menggabungkan ciphertext dengan data matriks terbalik. Kriptografi adalah ilustrasi yang menggambarkan proses pengumpulan informasi atau data dari pihak yang berusaha memahaminya dengan menggunakan kode dan data. Algoritma yang dikenal dengan nama hill cipher merupakan salah satu contoh algoritma kriptografi yang sangat cocok untuk analisis. Algoritma yang dikenal sebagai Hill Cipher adalah salah satu contoh algoritma kriptografi yang paling terkenal karena menggunakan operasi matematika dan moduli. Proses algoritma hill cipher dapat dibandingkan dengan plaintext atau ciphertext dalam segala arah baik positif maupun negatif.
Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp Kiki Andrea; Aji Wardana; Bagus Sopian Wanandi; Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jppie.v2i1.660

Abstract

At this time chat has been considered as a facility that can be used to communicate directly both remotely and at close range. Those who must be connected online with internet users around the world. In this case, this research will be applied to the WhatsApp text messaging application using the method applied, namely Caesar cipher cryptography. The system development method that will be used for this research is the prototype method. The results obtained from this research method are chat messages on the WhatsApp application encrypted using Caesar cipher cryptography with message encryption using end-to-end processing techniques where encryption and message descriptions can be done while chatting.
Implementasi Keamanan Database menggunakan Metode Kriptografi pada Puskesmas Karang Rejo Poli TB Paru fahreza shiddiq siregar; muhammad hafi isfahan isnan; muhammad rizky ramadhan; ali ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jppie.v2i1.661

Abstract

Perkembangan teknologi informasi saat ini berkembang dengan cepat terutama dalam teknologi internet. Banyak data yang telah dikirim dan diterima dari lalu lintas internet. Pada sebuah instansi atau lemabaga pasti memiliki data-data pribadi yang mungkin saja bisa dibobol oleh pihak tertentu. Karena sudah banyak kasus yang mengakibatkan hilangnya data-data pribadi kita. Maka dari itu banyak perusahaan yang menggunakan metode keamanan untuk melindungi data perusahaan dan data karyawannya. Untuk itu diperlukannya Enkripsi sebagai metode mengamankan data. Pada Puskesmas Karang Rejo masih kurangnya keamanan pada data karyawan sehingga rentan terhadap pencurian data. Dengan adanya keamanan data enkripsi ini, Puskesmas Karang Rejo dapat meminimalisir kebocoran atau kebobolan data karyawan atau pegawainya.Karena dengan adanya pengamanan enkripsi ini bisa melindungi dokumen penting yang termasuk data pribadi. Penelitian ini menggunakan metode Kualitatif yang dimana metode tersebut bertujuan untuk membuat sebuah aplikasi yang dapat membantu untuk melakukan Enkripsi pada database karyawan Puskesmas Karang Rejo. Hasil penelitian berfokus pada hasil rancangan aplikasi untuk Enkripsi dan Dekripsi. Aplikasi sudah diuji coba melalui prototype. Sehingga aplikasi dapat digunakan dalam membantu keamanan data karyawan Puskesmas Karang rejo.
Analysis Of Information Security It Governance With Cobit 5 Framework At PT. Indonesia Comnets Plus (ICON+) SUMBAGUT Ananda Salsabila Khairi; Putrawan Putrawan; Rafli Khalis Nugraha; Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jppie.v2i1.672

Abstract

Currently, information technology is an important part for companies to meet their needs and support the achievement of corporate strategy. Providing a competitive advantage, increasing effectiveness, time and reducing costs is the role of information technology in today's business area. As well as information is an important asset for the company that helps in the development of the company. Information really needs to be guarded and managed securely. PT. ICON+ prioritizes information technology in daily activities, so PT. ICON+ also needs to secure the information assets that exist in the company. Information security must be maintained because it is an important asset owned by the company. Therefore, examining information technology governance and information security using COBIT 5 in a company is really needed. This research can find out whether the company has fulfilled the indicator requirements or not otherwise. The framework and maintenance governance audit was carried out at PT. ICON+ is used to find out indicators of ability. The results were obtained using a questionnaire distributed to companies. In this study, it was found that PT. ICON+ achieved the expected result.
Media Pembelajaran Multimedia Interaktif Menggunakan Metode MDLC Pada Zoom Meetings Aji Wardana; Muhammad Rizky Ramadhan; Mahzura Aznur; Rizka Annisa Putri; Ali Ikhwan
Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta Vol 2 No 1 (2023): Jurnal Hasi Penelitian Dan Pengkajian Ilmiah Eksakta - JPPIE
Publisher : LPPM Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jppie.v2i1.677

Abstract

Multimedia is a means of disseminating information so that multimedia can be used as an interactive learning medium. This research is based on the results of previously written studies which aim to create a learning media from the discussion results of previous people. Data collection uses the MDLC (Multimedia Development Life Circle) method. The results of this research are to successfully create interactive multimedia learning media using the MDLC (Multimedia Development Life Circle) method as an interactive learning media facility using Zoom Meeting as the meeting medium. This learning media has been tested. Tests in research use tests that focus on the results of visualization displays and effectiveness in conveying information.
Sistem Informasi Pengolahan Data Rekomendasi Teknis Berbasis Web Ali Ikhwan; Zakiyah Khalilah
sudo Jurnal Teknik Informatika Vol. 2 No. 1 (2023): Edisi Maret
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56211/sudo.v2i1.192

Abstract

Dinas Energi dan Sumber Daya Mineral (ESDM) khususnya dibidang geologi tidak terlepas dari Rekomendasi Teknis izin pengeboran dan izin pengusahaan air tanah, banyaknya jumlah data yang masuk menyebabkan sulitnya proses pencarian data yang telah tersimpan karena harus membuka data-data lama dan mencari satu persatu, maka akan memakan waktu yang lama, dan menyebabkan pegawai mengalami kesulitan dalam membuat rekapan akhir pada periode yang dibutuhkan, hal ini disebabkan karena pengolahan data dilakukan secara manual di buku besar, lalu akan direkap menggunakan Microsoft Excel. Oleh sebab itu diperlukannya perancangan sistem informasi yang merupakan salah satu langkah yang efektif dalam pengolahan data. Dalam perancangan sistem informasi yang akan dibuat nantinya berbasis website dengan metode Rapid Application Develo (RAD) karena hanya membutuhkan waktu yang singkat pada tahapan pembuatan sistem informasi, dalam membangun sistem digunakan alat bantu pengembangan sistem yaitu Use Case Diagram, Flowmap, dan Sequence Diagram serta dengan menggunakan bahasa pemrograman PHP dan HTML dan MYSQL sebagai databasenya. Hasil dari penelitian ini adalah terciptanya sistem informasi pengolahan data rekomendasi teknis izin pengeboran dan izin pengusahaan air tanah berbasis Web pada bidang geologi.
PENERAPAN KRIPTOGRAFI VIGENERE CIPHER PADA KEAMANAN DATA PESAN TEKS BERBASIS WEBSITE Suwinda Aulansari; Diah Sawitri; Ali Ikhwan
Jurnal Informatika Teknologi dan Sains Vol 4 No 4 (2022): EDISI 14
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.272 KB) | DOI: 10.51401/jinteks.v4i4.2155

Abstract

Security is an urgent component of an information system. However, this is still very rarely realized by the owner or manager of the information system. That results in information being exchanged or compromised by parties who are not supposed to receive the message. Therefore, a data security system is needed so that information doesn’t crash into the wrong hands. To control data security, you can use cryptography, one of which is the vigenere cipher algorithm. This research uses a literature study research method sourced from various journals and experiments by designing and implementing systems. The final result of the application implementing the vigenere cipher algorithm is expected to help maintain the security of information.
Co-Authors Abdul Halim Hasugian Adam Malik Siregar Adetya Maharani Marpaung Adhe Eva Yolanda Adhe Eva Yolanda Adi Widarma Adinda Ayu Mega Pramesti Adinda Fitri Adnan Buyung Nasution Adnan Buyung Nasution Agung Ardiyansyah Ahmad Raynaldi Ahmad Rifai Ahyanuardi Ahyanuardi Aji Wardana Aji Wardana Alda Penira aldi gunawan Alfasyahri Zaki alwi awilo haryada Alwi Haryada Ananda Br Barus Ananda Salsabila Khairi Anggi Dessisiliya Anggi Refachriati Nasution Aninda Muliani Annisa Almira Annisa Aprilia Arjuna Sitepu Ary Santri Yuanda Arya Dwi Utama ARYA PRATAMA DAMANIK Asyahri Hadi Nasyuha Atika Sari br pa Atikah Zulfi Ayuni Ayu Azzahra Batubara Azi Asnawi Azrah Cipta Amandha Bagus Rizki Lubis Bagus Sopian Wanandi Bagus Sopian Wanandi Cahaya Muzaddidah Chairul Azhar Cholil Bisri Cindy Cintya Cindy Sintya Daffa Al Hafizd Deli Kartika Abrianisyah Dewi Putri Ayu Andira Dewi Diah Sawitri Dicky Novriansyah Dimas Krisna Maulana Dina Amalia Putri Lubis Dita Sucinta Sembiring Elfany Rizqi Syaputri Euis Desy Khairiyati Evan Alfian Syahnur Evi Kurniawati fahreza shiddiq siregar Fajira Mahmudah Fauziatun Husna Firda Aulia Fitri Annisa Purba Frihartini Ayu Salsabilah Gadiel Naufa Akila Gilang Ramadhan hairul amri Hairul Amri Harun Yahya Harun Yahya haryanzelina bancin Hasypa Aulia Hazizah W.S Manik Heni Pujiastuti Heru Irfansyah Huzaefah Utama Ilka Zufria Indah Saputri Indah Syafitri Mulya Ira Murni Jaka Gunawan Jihan Ula Usla Kairul Abdi Aceh Khairul Khairul Abdi Khofifah Fauzani Kiki Andrea Kiki Andrea Laila Turrubiah Ila Laura Melsya Lili Saputri Liza Alzahra Manurung Mahzura Aznur Maulana Ikhsan Mega Andriani Mega Lestari Mhd. Aria Agung Widodo Mhd. Aria Agung Widodoa Miana Sweety Miftahul Jannah Miftahul Jannah Miftahul Jannah Toar mira aripin panjaitan Mohammad Badri Mohammad Badri Moustafa H. Aly Muhammad Abdurrahman Hafizh Muhammad Arif Suhada Muhammad Dahria Muhammad Dedi Irawan Muhammad Dimas Abdillah Muhammad Faiz Muhammad Faris Adira Muhammad Fikri Assidiqie muhammad hafi isfahan isnan Muhammad Isnan Muhammad Jaffar Rayhannur Muhammad Khoir Al Alim Manurung Muhammad Naufal Fathin Hibrizi Muhammad Oemar Abdillah Muhammad Rizki Ramadhan muhammad rizky ramadhan Muhammad Rizky Ramadhan Muhammad Syafiq Raihan Myra Thasandra Nadila Agnestesia Nadila Agnestesia Suyadi Naila Umniati Nasution, Muhammad Irwan Padli Novika Wulandari Nurhadizah Saragih Nurhayati Nurhayati Nurhayati, Nurhayati Nuri Aslami Nurul Afriani Tanjung Ogie Ariansah Pane Oris Krianto Sulaiman Pasaribu, Hamidah Pauji Wibowo Phaklen Ehkan Pria Mitra Purba Putra Wan Putrawan Putrawan Putri Natasya Adelia Putri Ratricia Qurani Awaliyana Rafikha Aliana A. Raof Rafli Khalis Nugraha Raflikha Aliana A. Raof Raissa Amanda Putri Randa Syuhada Rasyid Ridho Rayhan Alfatih Atsil Reni Septiani Ritonga Reza Kurnia Lesmana Riyan Hidayah Purnama Riyan Hidayat Riyan Hidayat Rizka Annisa Putri Rizki Prasetya Nasution Saiful Nurarif Salwa Alipia Fadillah Tambunan Samsudin, Samsudin Sarjon Defit Satria Habibi Ritonga Sefian Habil Hafidz Septia Ona Sutra Sinta Dara Efita Siti Mawaddah Sri Hartati Suci Syah Putri Suendri Suendri Suendri, Suendri Sunilfa Maharani Sunilfa Maharani Tanjung Surganda Sitompul Suwinda Aulansari Syaidah Fiddarain T Sabrina Tasya Maulariqa Insani Taufiqurrahman . Tri Ulandari Tursina Juliani Dlt Umi Kalsum Siregar Uswatun Hasanah Wahyu Sofianda Wanda Audiansyah Wiranda Wiranda Yasmin Yacob Yulia Imanita Yunita Dwi Cahaya Yustria Handika Siregar Zahra Azura Zakiyah Khalilah