Claim Missing Document
Check
Articles

Found 18 Documents
Search

Pengembangan UMKM Melalui Penggunaan Media Informasi Teknologi Andi Marwan Elhanafi; Imran Lubis; Tommy Tommy; Rosyidah Siregar; Liza Novietta; Ruswan Nurmadi
Jurnal Pengabdian Kepada Masyarakat Digital Vol 1, No 1: JUPED - Februari 2022
Publisher : Insight Power (Kekuatan Wawasan)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (221.531 KB)

Abstract

The benefits of Medium, Small and Micro Enterprises (MSMEs) carried out by the community are often only sufficient for the needs of daily life, have not yet reached the development stage. The community of MSME actors is faced with the problem of how-to-do-good promotion and marketing, thereby increasing consumers. Community Service Activities carried out by universities can provide a solution to this problem. Digital Promotion and Digital Marketing for MSME actors can be carried out through socialization and training. This of course is something that must be done so that MSME actors can adapt to the current digital era. This community service is carried out in Bukit Lawang Village. Business development is the target to be achieved for MSME actors.Keywords: Community Service, MSMEs, Digital Promotion, Digital Marketing, Business Development
Implementasi Algoritma Best First Search Untuk Melakukan Penyelesaian Game Sudoku Dwi Resty Ananda; Tommy Tommy; Kalvin Chiuloto
Query: Journal of Information Systems VOLUME: 06, NUMBER: 02, OCTOBER 2022
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem in this research is that the Sudoku puzzle game is difficult to solve because it is included in the NP-complete problem, so it cannot be solved at the same time. Until now, many programmers are looking for the right algorithm to solve this puzzle. One way to solve this game is to use the best first search algorithm. This algorithm is an improvement of the Brute Force algorithm, where solutions can be found with fewer searches and can find solutions to problems more efficiently because there is no need to check all possible solutions. Only searches that lead to solutions need to be considered. The results of this study are the application of the best first search method in the sudoku game and determine the performance of the best first search method in the sudoku game. This research was built using Unity 3D software with the C# programming language and then using the unified modeling language as the flow of the diagram in the Sudoku game.Keywords: Sudoku, algorithm, BFS 
Penyuluhan Pentingnya Two Factor Authentication dan Aplikasinya Di Era Keamanan Digital Nenna Irsa Syahputri; Herlina Harahap; Rosyidah Siregar; Tommy Tommy
Jurnal Pengabdian Masyarakat Bangsa Vol. 1 No. 6 (2023): Agustus
Publisher : Amirul Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/jpmba.v1i6.256

Abstract

Ancaman keamanan pembobolan dan pembajakan akun menjadi masalah yang serius belakangan ini dimana tingginya tingkat penggunaan layanan di jaringan internet tidak serta merta di-iringi dengan pengetahuan dan wawasan terhadap keamanan yang cukup di kalangan masyarakat. Lemahnya kesadaran akan keamanan seperti penggunaan kata sandi yang lemah dan ekspos informasi diri secara berlebihan di media sosial menjadi pemicu utama banyaknya korban pembobolan dan pembajakan akun digital khususnya pada kalangan remaja. Kegiatan pengabdian kepada masyarakat ini bertujuan untuk memberikan penyuluhan serta praktik sederhana dalam memanfaatkan two factor authentication untuk memberikan lapisan keamanan tambahan terhadap akun digital kepada para pelajar di tingkat SMA yang paling sering menjadi korban dari ancaman keamanan pembajakan akun digital yang dilaksanakan di sekola SMA Nur Azizi Tanjung Morawa. Metode kegiatan penyuluhan dilakukan dengan penyampaian materi – materi dasar mengenani keamanan digital, seluk beluk mengenai two factor authentication dan praktik langkah – langkah aktivasi fitur two factor authentication pada layanan Gmail dan Facebook sebagai contoh kasus. Dari hasil penyuluhan dan praktik yang telah dilakukan, diperoleh informasi bahwa 38% siswa sudah menyadari pentingnya 2FA atau two factor authentication, 40 % siswa berhasil mengaplikasikan 2FA pada akun digitalnya masing- masing dan 22% siswa tidak dapat mengaplikasikan 2FA. Kegiatan ini berjalan dengan baik dan bermanfaat untuk menambah pengetahuan kepada siswa peserta kegiatan
Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES) Manovri Yeni; Rosyidah Siregar; Tommy Tommy
JITEKH Vol 11 No 2 (2023): September 2023
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v11i2.795

Abstract

The use of the Linear Congruential Generator (LCG) as a part of the Cipher Block Chaining (CBC) method in the Advanced Encryption Standard (AES) has been a focus of international research to enhance data security. In this experiment, chi-square analysis and entropy analysis are employed to evaluate the effectiveness of applying LCG to CBC-AES compared to conventional CBC-AES. The chi-square analysis indicates the highest improvement of 15.1098 and the lowest decrease of -10.4293. This improvement reflects an enhancement in the probability distribution of encrypted data, approaching a random distribution, and indicates a reduced likelihood of statistical attacks on the encrypted data. Meanwhile, the entropy analysis shows the highest increase of 0.3562 and the lowest decrease of -0.0942. This increase suggests that data encrypted using this method becomes more difficult to predict or analyze by unauthorized parties, increasing the unpredictability of the encrypted data. The research results demonstrate a significant improvement in data security, with a 3.65% increase in chi-square analysis, indicating a more even probability distribution of data, and a 0.066% increase in entropy analysis, indicating higher unpredictability in encrypted data. These findings are promising and indicate the potential of LCG in enhancing cryptographic system security, although further research is needed for validation and optimization of this method in the context of information security.
Running Text Sebagai Media Informasi Bagi Rumah Edukasi Anak Pesisir Imran Lubis; Tommy Tommy; Rosyidah Siregar; Andi Marwan Elhanafi; Ruswan Nurmadi
Jurnal Pengabdian Kepada Masyarakat Digital Vol 2, No 3: JUPED - Agustus 2023
Publisher : Insight Power (Kekuatan Wawasan)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Saat ini sudah banyak sekali kemajuan teknologi yang telah memenuhi kebutuhan manusia dalam aktifitas sehari-hari. Salah satu contoh kemajuan teknologi yang digunakan  dalam penyampaian informasi dengan tampilan Dot Matriks LED (Light Emitting Diode). Running text merupakan media elektronik digital berbentuk papan informasi yang dirancang dari beberapa LED dan disusun matriks untuk menampilkan teks. Rumah Edukasi Anak Pesisir merupakan sebuah lembaga nirlaba yang berkegiatan dalam bidang pendidikan yang berhubungan dengan masyarakat, namun pada lembaga ini tidak memiliki media informasi untuk menyampaikan pengumuman terkait dengan kegiatan-kegiatan yang akan dilaksanakan. Dengan ditemukannya permasalahan ini, tim pengabdian masyarakat Universitas Harapan Medan memberikan solusi dengan membuatkan running text yang dipasang di depan tempat edukasi Rumah Edukasi Anak Pesisir. Melalui rancang bangun running text ini diharapkan sistem penyampaian informasi oleh Rumah Edukasi Anak Pesisir lebih efektif dan efisien, proses perubahan teksnya dapat dilakukan sewaktu-waktu dan dan proses perubahan data running text menjadi lebih mudah. Running text yang digunakan type LED matrix P10 ukuran 96x32 cm. Kata kunci: Rumah Edukasi Anak Pesisir, Running Text, Media Informasi
Enkripsi Citra Digital dengan IDEA Cipher: Pengacakan Blok Pseudorandom LCG dan Evaluasi Melalui Image Correlation Analysis Manovri Yeni; Tommy; Rosyidah Siregar
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1029.336 KB)

Abstract

The use of cryptography methods in digital image processing has become a crucial focus of research in safeguarding visual information. This study analyzes the utilization of the Linear Congruential Generator (LCG) as a block scrambling tool in the image encryption process using the International Data Encryption Algorithm (IDEA). The aim of this research is to evaluate the effectiveness of LCG in reducing correlation patterns among pixel blocks in encrypted images. In experiments conducted using image datasets from OpenDataset, the test results indicated a significant difference between encrypting images using regular IDEA and IDEA enhanced with LCG. The block scrambling method using LCG successfully generated encrypted images with correlation coefficient values approaching zero, signifying its effectiveness in obscuring correlation patterns among pixel blocks. Despite a decrease in Mean Squared Error (MSE) and slight degradation in the quality of the encrypted images, the evaluation results affirmed a significant improvement in the average correlation coefficient by 4.57. This indicates an enhanced security level for encrypted images against cryptanalysis leveraging correlation patterns, while considering compromises in image quality. The findings of this research affirm that utilizing LCG in block scrambling during image encryption with IDEA can produce encrypted images with higher security levels by reducing correlation patterns, albeit with a slight sacrifice in image quality. The implications of these findings might contribute to the development of security methods in digital image processing in the future
Implementasi Metode SMART Menentukan Penerima Beasiswa Bidikmisi Pada SMA Negri 2 Moro’o Kabupaten Nias Barat Rizkiman Waruru; Ade Zulkarnain Hasibuan; Tommy
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.096 KB)

Abstract

The Bidikmisi Scholarship is an education fee assistance program for prospective students who are economically disadvantaged and have good academic potential to study at university until they graduate on time. SMA Negeri 2 Moro'o West Nias Regency is one of the schools that runs the Bidikmisi scholarship program, the selection process takes three weeks to one month, with the selection process taking up to one month of course this is less efficient. Apart from that, it is feared that the resulting assessment will be subjective, where the assessment is based on personal interests, causing the scholarship to not be on target. The aim of this research is to build a decision support system to determine Bidikmisi scholarship recipients using the Microsoft Visual Basic programming language with the SMART ( Simple Multi Attribute Rating Technique ) method. at SMA Negeri 2 Moro'o, West Nias Regency. The system that has been designed using the Microsoft Visual Basic programming language can provide more precise information, because it uses the SMART ( Simple Multi Attribute Rating Technique ) method, so there is no longer any doubt in making a decision. It is hoped that the designed application will make it easier for SMA Negeri 2 Moro'o West Nias Regency to determine Bidikmisi scholarship acceptance
Base-Delta Dynamic Block Length and Optimization on File Compression Tommy; Ferdy Riza; Rosyidah Siregar; Manovri Yeni; Andi Marwan Elhanafi; Ruswan Nurmadi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.1993

Abstract

Delta compression uses the previous block of bytes to be used as a reference in the compression process for the next blocks. This approach is increasingly ineffective due to the duplication of byte sequences in modern files. Another delta compression model uses the numerical difference approach of the sequence of bytes contained in a file. Storing the difference value will require fewer representation bits than the original value. Base + Delta is a compression model that uses delta which is obtained from the numerical differences in blocks of a fixed size. Developed with the aim of compressing memory blocks, this model uses fixed-sized blocks and does not have a special mechanism when applied to file compression in general. This study proposes a compression model by developing the concept of Base+Delta encoding which aims to be applicable to all file types. Modification and development carried out by adopting a dynamic block size using a sliding window and block header optimization on compressed and uncompressed blocks giving promising test results where almost all file formats tested can be compressed with a ratio that is not too large but consistent for all file formats where the ratio compression for all file formats obtained between 0.04 to 12.3. The developed compression model also produces compression failures in files with high uncompressed blocks where the overhead of additional uncompressed blocks of information causes files to become larger with a negative ratio obtained of -0.39 to -0.48 which is still relatively small and acceptable.