Muhammad Azmi
STMIK Syaikh Zainuddin NW Anjani

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Implementasi Kombinasi Caesar Cipher dan Hill Cipher Menggunakan Modifikasi Sandi Morse Untuk Pengamanan Pesan Berbasis Teks Muhammad Azmi; Zulkarnaen Zulkarnaen
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol 3 No 1 (2021): May
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v3i1.124

Abstract

The security and confidentiality of a message or document sent to other people must be guaranteed its confidentiality and security, so that the message or document is not misused by parties who do not have an interest in the message. Security and confidentiality of messages or documents can be kept confidential and secure by using cryptography. data security and confidentiality issues are very important from an information. Because of the importance of this information, the person concerned will question whether the authenticity of the information is still maintained or whether the information has been hijacked. So in the process of securing data and information with cryptography, of course it requires a qualified algorithm to maintain the confidentiality of the information, so that the purpose of this research is how to maintain the confidentiality of information by converting information into codes known only to the sender and receiver by using cryptographic techniques and steganography. Then the process of securing the data or information the researcher uses a combination of Caesar Chiper and Hill Chiper which is modified into Morse code then the resulting CipherText results will be saved into a JPEG file using the LSB (Least Significant Bit) Steganography method. The process of storing messages or ciphertext into image files will make it difficult for irresponsible people or cryptoanalysts to solve messages sent in the form of images.
PEMANFAATAN DATA INSTAGRAM UNTUK MENGETAHUI REPUTASI TEMPAT WISATA DI LOMBOK Muhammad Azmi; Amiruddin Khairul Huda; Arief Setyanto
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 1 No. 1 (2020): Mei 2020
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.872 KB) | DOI: 10.46764/teknimedia.v1i1.13

Abstract

Social media currently has an extraordinary influence in decision making, including in the tourism industry to find out the reputation and popularity of a tourist destination. At present the use and use of social media is not only limited to entertainment media but also as a medium or a place to share information both information that is considered important or not important and neglected. In this study, we utilize data scattered through Instagram posts related to tourist destinations to be used as references to find out the reputation of tourist destinations on the island of Lombok. The data used comes from Instagram with a total of 600 datasets, using three keywords namely beach, dyke and hill. The method used is the Naive Bayes Classifier which will be used to classify postings and Instagram comments by classifying into positive, negative and neutral posts to tourist destinations. The results of this study can show that the accuracy of naive bayes is 59%, while tourist attractions or tourist destinations which are categorized as popular for the beach are Kuta Beach with 85% percentage and for the Gili category that is 47% Gili Air namely, mountain Mount Rinjani with a percentage of 60%.
IMPLEMENTASI ALGORITMA I-SOS DALAM PENYELESAIAN TRAVELING SALESMAN PROBLEM (TSP) Zulkarnaen Zulkarnaen; Muhammad Azmi
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 2 No. 1 (2021): Mei 2021
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1403.431 KB) | DOI: 10.46764/teknimedia.v2i1.29

Abstract

The problem with TSP is an attempt to find the shortest distance traveled by a salesman in visiting each city without having to visit the same city more than once. The purpose of implementing the I-SOS algorithm in this case is to find the minimum distance traveled, a solution can be obtained after going through the calculation of the mutualism phase, commensalism phase, parasitism phase and predation phase. The resolution of TSP problems in the study begins with the process of identifying each city by providing a random value to represent each destination city. The random value used is between 0 and 1, the random results obtained will then be sorted with the provision that the smallest random value will be used as the initial for city A while the largest random value is used as the initial for city D. In the first random, the random value | 0.5 | 0.27 | 0.75 | 0.25 | the city representation of the random number is | C | B | D | A | or if the values are sorted, the city order will be obtained, namely A = 0.25, B = 0.27, C = 0.5 and D = 0.75, this process will continue until all the organisms defined in the ecosystem are formed
LAYANAN INFORMASI PEMBAYARAN BIAYA KULIAH BERBASIS SMS GATEWAY Siti Hijratul Jihadah Marzuki; Muhammad Azmi
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 2 No. 1 (2021): Mei 2021
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2332.997 KB) | DOI: 10.46764/teknimedia.v2i1.32

Abstract

SMS (Short Message Service) Gateway is an SMS-based system that can be developed in various fields and utilizes a web-based programming language. At STMIK XYZ, the delivery of information about the schedule for tuition payments is still by placing announcements / banners in the campus environment and sending letters to parents / guardians. These methods are not optimal because of the limitations of delivery to students and sometimes students do not pay attention to them. This is evident from the many students who are late in making tuition payments. Therefore, a system / application is needed that can provide services that can be accessed by students and parents / guardians to find out the status of their son / daughter's college payment. The design and manufacture of the SMS gateway-based tuition payment service system uses the Waterfall methodology, which is a software development method that begins with analyzing company needs, designing, building applications, to conducting trials. This tuition payment service system sends SMS to students and parents about the schedule of tuition payments and the status of payments that have been made. Information and payment status is sent to the cellphone number of each student and parent / guardian and provides warning information 7 (seven) days before the payment deadline. This application can also generate various types of reports regarding the status of student tuition payments to management. With this application / system, it is hoped that it can assist the management in accelerating the delivery of information about the schedule and status of student tuition payments.
ANALISIS TINGKAT PLAGIASI DOKUMEN SKRIPSI DENGAN METODE COSINE SIMILARITY DAN PEMBOBOTAN TF-IDF Muhammad Azmi
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 2 No. 2 (2021): Desember 2021
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.028 KB) | DOI: 10.46764/teknimedia.v2i2.51

Abstract

Plagiarism is the activity of duplicating or imitating the work of others then recognized as his own work without the author's permission or listing the source. Plagiarism or plagiarism is not something that is difficult to do because by using a copy-paste-modify technique in part or all of the document, the document can be said to be the result of plagiarism or duplication. The practice of plagiarism occurs because students are accustomed to taking the writings of others without including the source of origin, even copying in its entirety and exactly the same. Plagiarism practices are mostly carried out by students, especially when completing the final project or thesis One way that can be used to prevent the practice of plagiarism is by doing prevention and detecting. Plagiarism detection uses the concept of similarity or document similarity is one way to detect copy & paste plagiarism and disguised plagiarism. one of the right methods that can be done to detect plagiarism by analyzing the level of document plagiarism using the Cosine Similarity method and the TF-IDF weighting. This research produces an application that is able to process the similarity value of the document to be tested. Hasik testing shows that it is appropriate between manual calculations and implementation of algorithms in the application made. Use of the Literature Library is quite effective in the Stemming process. Calculations that use stemming will have a higher similarity value compared to calculations without stemming methods.