Claim Missing Document
Check
Articles

Found 37 Documents
Search

EFEKTIVITAS MODEL PEMBELAJARAN GROUP INVESTIGATION TERHADAP HASIL BELAJAR MATEMATIKA KELAS 5 SEKOLAH DASAR Nur Syifa’ul Alyah; Bilal Abdul Aziz; Imam Saputra
Tunas Nusantara Vol 2, No 1 (2020)
Publisher : Universitas Islam Nahdlatul Ulama Jepara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (122.778 KB) | DOI: 10.34001/jtn.v2i1.1494

Abstract

This research is motivated by the fact that the mathematics learning process is less than optimal, seen from the incomplete learning outcomes of the students. The purpose of this study was to determine the effectiveness of using the group investigation learning model in improving mathematics student learning outcomes in the material. The approach used in this research is a quantitative approach with the experimental method nonequivalent control group design. Sampling using nonprobability sampling. The data collection technique was obtained from a multiple choice written test. The data analysis technique used descriptive and statistical analysis with the help of the SPSS version 21 application. The results showed that data processing using the independent sample test data posttest experimental class and control, showed the sig value. (2-tailed) of 0.042, which means that it is smaller than 0.05. According to the basis of decision making in the independent sample t test, if the sig. (2-tailed) value <0.05 then Ha is accepted and H0 is rejected, or in other words there is a significant difference between the experimental and control classes in improving student learning outcomes in the material Build a 5th grade Mathematics subject room. Thus, the group investigation learning model was effective in improving mathematics learning outcomes for grade 5 SD at SDIT Ali Bin Abi Thalib, Sendang Village, Kalinyamatan District. Keywords: Learning Outcomes, Learning Models, Group Investigation
PERBANDINGAN METODE MD4 DAN SHA 384 UNTUK MENDETEKSI ORISINALITAS CITRA DIGITAL Lemcia Hutajulu; Hery Sunandar; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1598

Abstract

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384
PENGAMANAN DATA NILAI PADA APLIKASI E-RAPORT BERDASARKAN ALGORITMA 2DES Indra Williamsyah Sinaga; Imam Saputra; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1604

Abstract

E-Raport application is an effort to control the quality of assessment, given the limitations of existing resources and qualifications. Value data in E-Raport is a matter of confidentiality that is very guarded to avoid irresponsible parties. One solution to the problem above is to encode the e-raport database record so that the value data can be maintained and confidentiality protected. One of the algorithms that can be applied is the Double Data Encryption standard (2DES). By applying the 2DES algorithm the value data in the E-Raport application is protected from other irresponsible parties and the assessment system can run well and the value data can only be accessed by users who are has access rights to process the data value.Keywords: Value Data, E-Raport, Cryptography, 2DES algorithm
PENERAPAN METODE MODULUS FUNCTION (MF) UNTUK PENYISIPAN PESAN PADA CITRA DIGITAL Raimah Handayani Harahap; Nelly Astuti Hasibuan; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1695

Abstract

Steganography is the science and art of hiding (embedded) information by inserting secret messages in other messages. Steganography in the field of information technology is highly developed, namely for digital devices. Information or messages that can be hidden varies, as can messages that are embedded objects. Variations of messages that are normally subject to insertion objects are text messages, picture messages, audio messages, and video messages. The steganography method used is the Modulus Function (MF) method. This method can insert more messages into pixels that have high contrast values. The research conducted is applying the Modulus Function (MF) method for inserting messages into image files. Based on the test results, it can be concluded that by using the Modulus Function (MF) method, the capacity of the image to insert a message is smaller than the image size, the processing time in this method is quite fast, the image quality after inserting a message has good quality, but this method is also still good. has disadvantages, because it is not resistant to manipulation and in some images are still detected by the matlab application.Keywords: Steganography, Implementation, Modulus Function (MF), Image file.
PENERAPAN ALGORITMA INTERPOLATIVE CODING PADA APLIKASI KOMPRESI FILE GAMBAR Agung Dwi Pradana; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1592

Abstract

The large amount of data that has been stored in memory or hard disk will result in increasing the amount of usage capacity on the storage media. Large file sizes can also affect the time of sending or transferring data between storage media. Therefore humans conduct a study in order to have alternative ways to overcome these problems, one of them is by means of compression techniques. In this research, an image file compression application program was built using the interpolative coding method. In building applications using Visual Basic.Net software. The construction of this application is expected to reduce storage media capacity usage. In this testing phase is done with an image file type that is a test file with RGB color type.Keywords: Compression, Image file, Interpolative Coding Algorithm
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN TINTER KACA FILM TERBAIK MENGGUNAKAN METODE ARAS (STUDI KASUS: PT. DEGREE THE AMBASSADOR) Ayulia Sari; Nelly Astuti Hasibuan; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1606

Abstract

Tinter is the person in charge of installing window film on building windows or car windows. A tinter must have some specific criteria set by the company. To increase motivation and quality of a tinter's work, the company routinely holds the selection of the best tinter each year. However, the selection of the best tinter made at this time is still not completely in accordance with the specified criteria and in the end the selection is based on the assessment of the company's leadership. It is feared that it will cause divisions between tinter who feel that the selection is unfair or not objective and does not conform to procedures. For this reason, a decision support system is needed for the selection of the best tinter. Decision support system used is to use the Additive Ratio Assessment (ARAS) method because this method is a multi criteria decision making method based on the ranking concept.Keywords : Tinter, System, Decision, SPK, Additive Ratio Assessment, ARAS
PERBANDINGAN METODE MD2 DAN MD4 UNTUK MENDETEKSI KEASLIAN CITRA DIGITAL Gokma Lumbantoruan; Hery Sunandar; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1617

Abstract

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others.The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD2 and MD4 methods to detect the originality of digital images, by using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake. Keywords: Authenticity, Image, MD2 and MD4
APLIKASI PENAJAMAN CITRAA STREET VIEW MENGGUNAKAN METODE GRAMD SCHMIDT SPECTRAL SHARPENING DAN HIGH PASS FILTERING Erna Verawati; Surya Darma Nasution; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1584

Abstract

Sharpening the image of the road display requies a degree of brightness in the process of sharpening the image from the original image result of the improved image. One of the sharpening of the street view image is image processing. Image processing is one of the multimedia components that plays an important role as a form of visual information. There are many image processing methods that are used in sharpening the image of street views, one of them is the gram schmidt spectral sharpening method and high pass filtering. Gram schmidt spectral sharpening method is method that has another name for intensity modulation based on a refinement fillter. While the high pass filtering method is a filter process that btakes image with high intensity gradients and low intensity difference that will be reduced or discarded. Researce result show that the gram schmidt spectral sharpening method and high pass filtering can be implemented properly so that the sharpening of the street view image can be guaranteed sharpening by making changes frome the original image to the image using the gram schmidt spectral sharpening method and high pass filtering.Keywords: Image processing, gram schmidt spectral sharpening and high pass filtering.
RANCANGAN KONTROL DAYA RESISTIF BERDASARKAN MIKROKONTROLER DENGAN TRIAC -, Aripriharta; Saputra, Imam; Adiguna, Satria; Habibi, Muhammad Afnan; Afandi, Arif Nur; Setiawan, Aditya Wahyu; Bagaskoro, Muhammad Cahyo
-
Publisher : RELE (Rekayasa Elektrikal dan Energi) : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/rele.v7i1.18958

Abstract

Desain pengontrolan daya resistif menggunakan mikrokontroler dengan TRIAC adalah topik utama penelitian ini. Sakelar TRIAC dihubungkan antara sumber AC dan beban, sehingga aliran daya dapat dikontrol dengan memvariasikan tegangan efektif yang diberikan ke beban. Pengontrol kecepatan motor induksi tiga fase, kontrol pencahayaan, dan pemanas industri sering menggunakan teknik ini, yang disebut sebagai regulasi tegangan AC. Untuk memahami prinsip kerja sistem ini, diperlukan eksperimen dengan modul kontrol Daya. Penggunaan TRIAC berbasis mikrokontroler sebagai objek penelitian untuk desain pengontrolan daya resistif melibatkan simulasi rangkaian pemicu TRIAC dengan mikrokontroler AT89S51. Prinsip kontrol daya resistif dengan TRIAC adalah mengatur aliran daya ke beban dengan menunda sudut pemutusan thyristor. Mikrokontroler AT89S51 berperan sebagai pengontrol utama, mengambil keputusan berdasarkan informasi dari sensor zero-crossing detector. Pengujian dilakukan dengan menambahkan lampu sebagai beban. Temuan percobaan menunjukkan bahwa mengubah tegangan pemicu berdampak pada tegangan output, yang pada akhirnya mempengaruhi variasi kecerahan lampu dan peningkatan arus output. Berdasarkan analisis, sudut pemutusan menurun seiring dengan naiknya tegangan output thyristor. Hubungan antara perubahan tegangan output dan penyesuaian sudut pemutusan thyristor sangat penting untuk aplikasi kontrol daya. Untuk mencapai pengaturan daya resistif yang efisien dengan menggunakan TRIAC, pembahasan ini juga menekankan pentingnya komponen seperti mikrokontroler dan sensor zero-crossing detector.
Implementasi Metode OCRA Penentuan Dosen Terbaik Dimasa Pandemi Covid-19 Tanjung, Dewi Maulida Sari; Al-Adawiyah, Robiah; Saputra, Imam
Journal of Informatics, Electrical and Electronics Engineering Vol. 3 No. 1 (2023): September 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jieee.v3i1.1607

Abstract

Each lecturer has a different way of teaching, some are preferred by students and some are not liked by students. A lecturer is required to improve his performance in teaching and imparting the knowledge he has to his students, so there are several requirements that are used as criteria in determining the best lecturers including Doc Scopus, Position, Competence, Age, and Warning Letters. So that in this study a money system was made using a decision support system that could determine the best lecturers during the covid-19 pandemic. In its determination, data such as criteria, weights and alternatives are needed. So, in this study using the OCRA (Optional Competitiveness Rating Analysis) method to determine the Best Lecturer through data such as alternatives and criteria, it can be concluded that the second alternative (A2) is Kennedi as the best Lecturer with the best preference value of 3,837.
Co-Authors A.A. Ketut Agung Cahyawan W A.N. Afandi Abdul Karim Adiguna, Satria Afriansyah, Muhammad Agung Dwi Pradana Aguswinaya, Agung Rake Ahmad Tamrin Sikumbang Al-Adawiyah, Robiah Alfarisi Pasaribu, Ahmad Amalia, Dira Amelia Ramadhani, Amelia Annisa Fadillah Siregar Anugrah, Elfira Aripriharta - Ariska, Melinda Aryadito, Rehan Ayulia Sari Azlan Azlan, Azlan Bagaskoro, Muhammad Cahyo Bilal Abdul Aziz Darma Taksiah Sihombing, Darma Taksiah Dina Octavia Erna Verawati Fadlina Ginting, Suranta Bill Fatric Gokma Lumbantoruan Guidio Leonarde Ginting Gultom, Istanto Hery Sunandar Hetty Rohayani Indra Williamsyah Sinaga Jariah, Nur Ainun Kolopaking, Sania Lemcia Hutajulu Lole, Marsya Reskiani Lubis, Adi Mora Mariansari, Mariansari Marliana Marliana, Marliana Matondang, Firman MAURITZ PANDAPOTAN MARPAUNG Mesran, Mesran Muhammad Afnan Habibi Mutiara, Berkah Nasib Marbun Ndruru, Eferoni Nelly Astuti Hasibuan Nur Afifah Siregar, Rizka Nur Syifa’ul Alyah Oktarina, Dian Permata, Shely Junian Pohan, Ferdi Rahmawaty Rahmawaty Rahmawaty Raimah Handayani Harahap Ritonga, Fitri Aisyah Rivalri Kristianto Hondro Robinson Siagian, Edward Rohmat Indra Borman Sagita, Ira Sahrul Saputra Saputra, Dendi Bianda Saputra, Febrian Eko Sari, Juwita Indah Sari, Sri Indah Setiawan, Aditya Wahyu Sheva, Putri Picaso Azury Simanullang, Putri M Sinurat, Sinar Suginam Sultan Rexy Adji Suparwatini, Suparwatini Surya Darma Nasution Syafruddin Syafruddin Tanjung, Dewi Maulida Sari Taronisokhi Zebua Tatang Permana, Tatang Tua, Rahmat Utami, Nur Indah Yanti, Martina Vevi Yusufa, Ilham Zainun, Zainun