Articles
Education 4.0 Dari Industry 4.0 dan Adaptasinya di New Normal dalam Webinar Series LPKHA UNHAR Medan
Tommy Tommy;
Imran Lubis;
Rosyidah Siregar;
Ruswan Nurmadi;
Andi Marwan Elhanafi
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 3 No 02 (2021): EDISI SEPTEMBER 2021
Publisher : Universitas Harapan Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35447/prioritas.v3i02.414
The industrial revolution 4.0 is marked by competitive competition and rapid information in all sectors, including human resources. Indonesia is required to have strong competitiveness in order to be able to align itself with other countries. Advances in Information and Communication Technology and the era of the industrial revolution 4.0 must be balanced with a supportive educational curriculum so as to produce Human Resources (HR) who have competence and are able to compete. Curriculum policies must collaborate with students' abilities in the pedagogical dimensions, life skills, the ability to live together (collaboration), critical thinking, and creativity. Students must have soft skills, transversal skills, life skills, and skills that are not directly related to certain work and academic fields.
Soft Skill di Era Digital dalam Webinar Series 2021 LKPKHA UNHAR Medan
Imran Lubis;
Ruswan Nurmadi;
Andi Marwan Elhanafi;
Tommy Tommy;
Rosyidah Siregar
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 4 No 01 (2022): EDISI MARET 2022
Publisher : Universitas Harapan Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35447/prioritas.v4i01.479
Kehadiran teknologi memungkinkan adanya otomasi di berbagai pekerjaan rutin yang menggantikan manusia. Namun, satu hal yang tidak bisa digantikan dengan mesin dan teknologi, yaitu kemampuan individu untuk berhubungan dengan orang lain, memahami, membangun dan membina hubungan. Oleh karena itu pentingnya meningkatkan kompetensi di dalam menghadapi perubahan zaman seperti sekarang ini. Kebutuhan inovasi dalam era digital dan industri 4.0 yang paling dibutuhkan adalah soft skill. Soft skill lebih mengarah kepada emosi serta wawasan dalam memperlakukan orang lain. Kemampuan seperti komunikasi, negosiasi, membina hubungan interpersonal dan pemahaman emotional intelligence yang dimiliki seorang profesional memiliki kesempatan yang jauh lebih besar untuk dipromosikan sebagai pemimpin dibandingkan profesional yang hanya memiliki keterampilan teknis. Kata Kunci : Era Digital, Kompetensi, Soft Skill, Teknologi
Pelatihan Manajemen Bandwith Di SMA Amir Hamzah
Tommy Tommy;
Rosyidah Siregar;
Imran Lubis;
Andi Marwan Elhanafi;
Ruswan Nurmadi
Jurnal Pengabdian Kepada Masyarakat Digital Vol 1, No 3: JUPED - Agustus 2022
Publisher : Insight Power (Kekuatan Wawasan)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (555.836 KB)
The need for Internet access today is very important. The Internet was a good alternative for finding the latest information, articles, and knowledge. Bandwidth sharing or bandwidth management using a mikrotik router on each host/user is an important part for internet service providers to do. Amir Hamzah High School (SMA) is one of the high schools located in the city of Medan. High school in Indonesia today requires skills in the field of networking. Which bandwidth management divides the network quota either at school or in other public places. Bandwidth is the most important part of a network, therefore bandwidth or bandwidth management is very much taken into account in order to create fast and flexible access in order to maximize internet connection according to the needs in each section, it is necessary to have bandwidth management to share the amount of bandwidth needed. bandwidth management is very easy and efficient to be used by every internet service provider because by using bandwidth each host/user will get bandwidth with the same level or size without disturbing the bandwidth of other users/hosts. This activity is an activity that aims to provide basic bandwidth management training to Amir Hamzah High School students where based on the activities that have been carried out, it was found that 44% of students could apply the training material very well while the other 56% could only apply part of the material presented.Keywords: Community Service, Network, Bandwidth, Mikrotik, Highschool
Pengembangan UMKM Melalui Penggunaan Media Informasi Teknologi
Andi Marwan Elhanafi;
Imran Lubis;
Tommy Tommy;
Rosyidah Siregar;
Liza Novietta;
Ruswan Nurmadi
Jurnal Pengabdian Kepada Masyarakat Digital Vol 1, No 1: JUPED - Februari 2022
Publisher : Insight Power (Kekuatan Wawasan)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (221.531 KB)
The benefits of Medium, Small and Micro Enterprises (MSMEs) carried out by the community are often only sufficient for the needs of daily life, have not yet reached the development stage. The community of MSME actors is faced with the problem of how-to-do-good promotion and marketing, thereby increasing consumers. Community Service Activities carried out by universities can provide a solution to this problem. Digital Promotion and Digital Marketing for MSME actors can be carried out through socialization and training. This of course is something that must be done so that MSME actors can adapt to the current digital era. This community service is carried out in Bukit Lawang Village. Business development is the target to be achieved for MSME actors.Keywords: Community Service, MSMEs, Digital Promotion, Digital Marketing, Business Development
Chroma Key untuk Mengubah Warna Pakaian dengan HSV dan Morfologi pada Citra Digital
Sayuti Rahman;
M F Verri Anggriawan;
Rosyidah Siregar;
Siti Sundari;
Kharunnisa Kharunnisa;
Muhammad Zen
JURIKOM (Jurnal Riset Komputer) Vol 9, No 6 (2022): Desember 2022
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/jurikom.v9i6.5164
Currently, Indonesia is still under the influence of the COVID-19 virus. Indonesian people buy necessities of life on the online market. Clothing is a daily necessity that people often buy online. This has an impact on increasing online clothing sales, but not all clothes are according to the tastes of buyers. Therefore we need an application that is used to speed up changing the color of clothes according to the needs of buyers. The chroma key application that is used to change the color of the clothing image uses the HSV and morphology classification methods. Edge detection and median filters are used to improve the quality of color shift results with HSV. This application is built using MatLab 2015a programming. The test results show that the HSV classification method is better at changing the color of the clothing image than the morphological method. The HSV classification method was successful in changing the color of clothes well with a 100% success rate. While the morphological method succeeded in changing the color of the clothes with a success rate of 60%.
Penyuluhan Pentingnya Two Factor Authentication dan Aplikasinya Di Era Keamanan Digital
Nenna Irsa Syahputri;
Herlina Harahap;
Rosyidah Siregar;
Tommy Tommy
Jurnal Pengabdian Masyarakat Bangsa Vol. 1 No. 6 (2023): Agustus
Publisher : Amirul Bangun Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59837/jpmba.v1i6.256
Ancaman keamanan pembobolan dan pembajakan akun menjadi masalah yang serius belakangan ini dimana tingginya tingkat penggunaan layanan di jaringan internet tidak serta merta di-iringi dengan pengetahuan dan wawasan terhadap keamanan yang cukup di kalangan masyarakat. Lemahnya kesadaran akan keamanan seperti penggunaan kata sandi yang lemah dan ekspos informasi diri secara berlebihan di media sosial menjadi pemicu utama banyaknya korban pembobolan dan pembajakan akun digital khususnya pada kalangan remaja. Kegiatan pengabdian kepada masyarakat ini bertujuan untuk memberikan penyuluhan serta praktik sederhana dalam memanfaatkan two factor authentication untuk memberikan lapisan keamanan tambahan terhadap akun digital kepada para pelajar di tingkat SMA yang paling sering menjadi korban dari ancaman keamanan pembajakan akun digital yang dilaksanakan di sekola SMA Nur Azizi Tanjung Morawa. Metode kegiatan penyuluhan dilakukan dengan penyampaian materi – materi dasar mengenani keamanan digital, seluk beluk mengenai two factor authentication dan praktik langkah – langkah aktivasi fitur two factor authentication pada layanan Gmail dan Facebook sebagai contoh kasus. Dari hasil penyuluhan dan praktik yang telah dilakukan, diperoleh informasi bahwa 38% siswa sudah menyadari pentingnya 2FA atau two factor authentication, 40 % siswa berhasil mengaplikasikan 2FA pada akun digitalnya masing- masing dan 22% siswa tidak dapat mengaplikasikan 2FA. Kegiatan ini berjalan dengan baik dan bermanfaat untuk menambah pengetahuan kepada siswa peserta kegiatan
Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES)
Manovri Yeni;
Rosyidah Siregar;
Tommy Tommy
JITEKH Vol 11 No 2 (2023): September 2023
Publisher : Universitas Harapan Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35447/jitekh.v11i2.795
The use of the Linear Congruential Generator (LCG) as a part of the Cipher Block Chaining (CBC) method in the Advanced Encryption Standard (AES) has been a focus of international research to enhance data security. In this experiment, chi-square analysis and entropy analysis are employed to evaluate the effectiveness of applying LCG to CBC-AES compared to conventional CBC-AES. The chi-square analysis indicates the highest improvement of 15.1098 and the lowest decrease of -10.4293. This improvement reflects an enhancement in the probability distribution of encrypted data, approaching a random distribution, and indicates a reduced likelihood of statistical attacks on the encrypted data. Meanwhile, the entropy analysis shows the highest increase of 0.3562 and the lowest decrease of -0.0942. This increase suggests that data encrypted using this method becomes more difficult to predict or analyze by unauthorized parties, increasing the unpredictability of the encrypted data. The research results demonstrate a significant improvement in data security, with a 3.65% increase in chi-square analysis, indicating a more even probability distribution of data, and a 0.066% increase in entropy analysis, indicating higher unpredictability in encrypted data. These findings are promising and indicate the potential of LCG in enhancing cryptographic system security, although further research is needed for validation and optimization of this method in the context of information security.
Running Text Sebagai Media Informasi Bagi Rumah Edukasi Anak Pesisir
Imran Lubis;
Tommy Tommy;
Rosyidah Siregar;
Andi Marwan Elhanafi;
Ruswan Nurmadi
Jurnal Pengabdian Kepada Masyarakat Digital Vol 2, No 3: JUPED - Agustus 2023
Publisher : Insight Power (Kekuatan Wawasan)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Saat ini sudah banyak sekali kemajuan teknologi yang telah memenuhi kebutuhan manusia dalam aktifitas sehari-hari. Salah satu contoh kemajuan teknologi yang digunakan dalam penyampaian informasi dengan tampilan Dot Matriks LED (Light Emitting Diode). Running text merupakan media elektronik digital berbentuk papan informasi yang dirancang dari beberapa LED dan disusun matriks untuk menampilkan teks. Rumah Edukasi Anak Pesisir merupakan sebuah lembaga nirlaba yang berkegiatan dalam bidang pendidikan yang berhubungan dengan masyarakat, namun pada lembaga ini tidak memiliki media informasi untuk menyampaikan pengumuman terkait dengan kegiatan-kegiatan yang akan dilaksanakan. Dengan ditemukannya permasalahan ini, tim pengabdian masyarakat Universitas Harapan Medan memberikan solusi dengan membuatkan running text yang dipasang di depan tempat edukasi Rumah Edukasi Anak Pesisir. Melalui rancang bangun running text ini diharapkan sistem penyampaian informasi oleh Rumah Edukasi Anak Pesisir lebih efektif dan efisien, proses perubahan teksnya dapat dilakukan sewaktu-waktu dan dan proses perubahan data running text menjadi lebih mudah. Running text yang digunakan type LED matrix P10 ukuran 96x32 cm. Kata kunci: Rumah Edukasi Anak Pesisir, Running Text, Media Informasi
Enkripsi Citra Digital dengan IDEA Cipher: Pengacakan Blok Pseudorandom LCG dan Evaluasi Melalui Image Correlation Analysis
Manovri Yeni;
Tommy;
Rosyidah Siregar
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1029.336 KB)
The use of cryptography methods in digital image processing has become a crucial focus of research in safeguarding visual information. This study analyzes the utilization of the Linear Congruential Generator (LCG) as a block scrambling tool in the image encryption process using the International Data Encryption Algorithm (IDEA). The aim of this research is to evaluate the effectiveness of LCG in reducing correlation patterns among pixel blocks in encrypted images. In experiments conducted using image datasets from OpenDataset, the test results indicated a significant difference between encrypting images using regular IDEA and IDEA enhanced with LCG. The block scrambling method using LCG successfully generated encrypted images with correlation coefficient values approaching zero, signifying its effectiveness in obscuring correlation patterns among pixel blocks. Despite a decrease in Mean Squared Error (MSE) and slight degradation in the quality of the encrypted images, the evaluation results affirmed a significant improvement in the average correlation coefficient by 4.57. This indicates an enhanced security level for encrypted images against cryptanalysis leveraging correlation patterns, while considering compromises in image quality. The findings of this research affirm that utilizing LCG in block scrambling during image encryption with IDEA can produce encrypted images with higher security levels by reducing correlation patterns, albeit with a slight sacrifice in image quality. The implications of these findings might contribute to the development of security methods in digital image processing in the future
Base-Delta Dynamic Block Length and Optimization on File Compression
Tommy;
Ferdy Riza;
Rosyidah Siregar;
Manovri Yeni;
Andi Marwan Elhanafi;
Ruswan Nurmadi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47709/cnahpc.v5i1.1993
Delta compression uses the previous block of bytes to be used as a reference in the compression process for the next blocks. This approach is increasingly ineffective due to the duplication of byte sequences in modern files. Another delta compression model uses the numerical difference approach of the sequence of bytes contained in a file. Storing the difference value will require fewer representation bits than the original value. Base + Delta is a compression model that uses delta which is obtained from the numerical differences in blocks of a fixed size. Developed with the aim of compressing memory blocks, this model uses fixed-sized blocks and does not have a special mechanism when applied to file compression in general. This study proposes a compression model by developing the concept of Base+Delta encoding which aims to be applicable to all file types. Modification and development carried out by adopting a dynamic block size using a sliding window and block header optimization on compressed and uncompressed blocks giving promising test results where almost all file formats tested can be compressed with a ratio that is not too large but consistent for all file formats where the ratio compression for all file formats obtained between 0.04 to 12.3. The developed compression model also produces compression failures in files with high uncompressed blocks where the overhead of additional uncompressed blocks of information causes files to become larger with a negative ratio obtained of -0.39 to -0.48 which is still relatively small and acceptable.