Claim Missing Document
Check
Articles

Found 38 Documents
Search

Combined Performance of Hill Cipher and Rivest Code 6 (Rc6) Algorithms in Image Security Santoso, Heri; Rambe, Nia Sabrina; Suhardi, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 6 (2024): The April edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i6.337

Abstract

Digital image files are a form of information that is accurate and reliable enough to describe something, so the level of authenticity of this information needs to be maintained. Especially when sent via the internet as in chat-based applications such as Facebook, WhatsApp, Instagram and other social media. To maintain the security and confidentiality of digital image/image information, it is necessary to have a technique called cryptography. Cryptography is a technique or algorithm for changing data or information to be different from the original information. For example, in everyday life, there is a result of a design order that is still in the development stage that needs to be shown to prospective buyers, a drawing file or documentation image file that is private and confidential, so it is important to pay attention to its security. This research will use the combined performance of the Hill Cipher and Rivest Code 6 cryptographic algorithms in securing image files. The results of the Hill Cipher and Rivest Code 6 cryptographic algorithm encryption are able to disguise the image during the encryption process. And can restore to the original image in the decryption process. So that the encrypted image is safer to send via the internet or social media.
Decision Support System for Selection of Scholarship Recipient Students Using Tsukamoto Method Fuzzy Logic Anwar, Mufti Husain; Furqan, Mhd.; Suhardi, S
IJISTECH (International Journal of Information System and Technology) Vol 8, No 1 (2024): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i1.341

Abstract

Scholarship selection is an important process in determining the acceptance of educational assistance based on established criteria. Decision Support Systems (DSS) have proven their value in assisting complex decision making. In the context of scholarship selection, Tsukamoto's fuzzy approach in decision support systems is an effective tool for modeling the complexity and uncertainty of selection criteria. This system utilizes fuzzy logic to connect variable inputs such as academic achievement, financial condition, and other factors to output in the form of membership values in the scholarship acceptance category. The fuzzy rules defined by educational experts and practitioners enable the system to interpret conditions that are closer to human thinking. Thus, Tsukamoto's fuzzy approach in decision support systems becomes an effective tool in simplifying the complexity of scholarship selection, while providing data-based solutions. More objective and comprehensive.
Literasi Digital : Pemanfaatan dan Penggunaan E-Library Menggunakan Software SLiMS" di Desa Denai Lama, Pantai Labu-Deli Serdang Zufria, Ilka; Hasugian, Abdul Halim; Suhardi; Hasibuan, Muhammad Siddik; Lubis, Aidil Halim; Armansyah
Jurnal Pengabdian Masyarakat Vol. 1 No. 1 (2022): Juni 2022
Publisher : Unity Academy

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70340/japamas.v1i1.7

Abstract

Information technology has developed very rapidly and covers various fields. The field of education is one area that is influenced by information technology. Both in the formal learning process at school and non-formal in the form of training outside of school. The form of participation from universities, especially the Computer Science study program, FST UIN North Sumatra Medan, in this community service activity is to provide skills training in the field of information technology in the form of digital literacy and the use of SLiMS software to the Circle Community Reading Park (TBM), Denai Lama Village, Labu Beach. Deli Serdang, North Sumatra which was held with the theme "Digital Literacy: Utilization and Use of E-Library Using SLiMS Software".
Data security using low bit encoding algorithm and rsa algorithm Ramadhan, Yusuf; Suhardi, Suhardi; Aditama, Yuda
Jurnal Mantik Vol. 8 No. 1 (2024): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.v8i1.4945

Abstract

Ensuring the security of messages and information is paramount in today's digital era. This study proposes a combined approach using the RSA algorithm for cryptography and the Low Bit Encoding (LBE) algorithm for steganography to enhance security measures. The security process involves encrypting plaintext messages into ciphertext, which are then embedded into MP3 audio files as cover objects. Evaluation is conducted by measuring the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) of the stego audio. Research findings indicate an MSE value of approximately 0.6 and a PSNR of 62.2 dB, indicating high-quality audio files. The integration of these algorithms offers a robust security level, ensuring effective message confidentiality. This research contributes to a deeper understanding of cryptography and steganography techniques in safeguarding sensitive information during digital communication
Analisis sentimen pengguna aplikasi BSI mobile akibat ransomware menggunakan algoritma support vector machine Nela Meilani; Mhd. Furqan; Suhardi
INFOTECH : Jurnal Informatika & Teknologi Vol 5 No 1 (2024): INFOTECH: Jurnal Informatika & Teknologi
Publisher : LPPMPK - Sekolah Tinggi Teknologi Muhammadiyah Cileungsi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37373/infotech.v5i1.1102

Abstract

Perbankan Syariah, dikenal sebagai Islamic Banking, mengalami perkembangan signifikan sejak revisi UU No. 10 Tahun 1998 tentang perbankan, memberikan peluang bagi pengembangan perbankan syariah. Bank Syariah Indonesia (BSI), hasil merger tiga bank syariah besar, didirikan untuk menerapkan prinsip-prinsip syariah dalam transaksi. Namun, pada 08 Mei 2023, BSI mengalami kebocoran data melalui serangan ransomware, menyebabkan kerugian nasabah. Respons nasabah terungkap melalui media sosial, terutama Twitter, memunculkan hashtag dan analisis sentimen menggunakan algoritma Support Vector Machine untuk mengeksplorasi opini pengguna terhadap BSI Mobile pasca-serangan ransomware. Oleh sebab itu, dilakukan penelitian terhadap tanggapan pengguna aplikasi BSI Mobile dengan melakukan analisis sentimen menggunakan metode Support Vector Machine dengan fitur kernel linear dan dirancang dengan bahasa pemrograman python. Pada analisis yang dilakukan, perbandingan antara data latih dan data uji adalah 8:2. Dengan dataset setelah preprocessing yang berjumlah 700 data, 560 diantaranya akan dijadikan sebagai data latih sedangkan 140 sebagai data uji, diperoleh nilai accuracy sebesar 77%, precision sebesar 72%, recall sebesar 83%, dan f1-score sebesar 77%.
IMPLEMENTASI FINITE STATE AUTOMATA PADA APLIKASI PEMBELAJARAN MENGASAH OTAK ANAK MENGGUNAKAN DFA DAN NFA BERBASIS ANDROID Endah Avilia Chandra; Muhammad Ikhsan; Suhardi Suhardi
JOURNAL OF SCIENCE AND SOCIAL RESEARCH Vol 7, No 3 (2024): August 2024
Publisher : Smart Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54314/jssr.v7i3.2117

Abstract

 Abstract: Technological advances change very rapidly from year to year, one of which is mobile devices, the fastest growing technology in its development, with the development of mobile technology today, bringing many changes, including in the world of education. Using a mobile app as a learning tool can also take the form of a game or games. The problem that arises is the lack of child interaction and interest in learning, so it is necessary to design an educational game so that the learning process is more interesting. Therefore, researchers developed a game learning application to sharpen the brain type Virtual pet based on Android. By using the Finite State Automata method, it can be determined that the input string is accepted or rejected. The software used in the form of Adobe Animate CC is used for the development of Virtual pet game learning applications. This application is intended as an alternative to children's learning in recognizing letters, training the brain, and improving their social and psychological reactions. Keywords: finite state automata, dfa and nfa, virtual pet game, android Abstrak: Kemajuan teknologi berubah sangat pesat dari tahun ke tahun, salah satunya perangkat mobile, teknologi yang paling cepat berkembang dalam perkembangannya, dengan perkembangan teknologi mobile saat ini, membawa banyak perubahan, termasuk dalam dunia pendidikan. Menggunakan aplikasi seluler sebagai alat pembelajaran juga dapat berbentuk game atau permainan. Masalah yang muncul adalah kurangnya interaksi anak dan ketertarikan dalam belajar sehingga perlu dirancang sebuah permainan yang mengedukasi agar proses belajar semakin menarik. Oleh karena itu, peneliti mengembangkan sebuah aplikasi pembelajaran game mengasah otak berjenis Virtual pet berbasis Android. Dengan menggunakan metode Finite State Automata maka dapat ditentukan string yang diinputkan diterima atau ditolak. Perangkat lunak yang digunakan berupa Adobe Animate CC digunakan untuk pengembangan aplikasi pembelajaran game Virtual pet. Aplikasi ini dimaksudkan sebagai alternatif pembelajaran anak dalam mengenali huruf, melatih otak, serta meningkatkan reaksi sosial dan psikologis mereka. Kata kunci: finite state automata, dfa dan nfa, game virtual pet, android 
Sistem Penjadwalan Mata Pelajaran Memakai Algoritma Genetika Berbasis Web Siagian, Qori Azmi Ayasy; Hasibuan, Muhammad Siddik; Suhardi, Suhardi
INFOMATEK Vol 26 No 2 (2024): Desember 2024
Publisher : Fakultas Teknik, Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/infomatek.v26i2.19378

Abstract

Penjadwalan adalah proses mengatur urutan atau jadwal kegiatan atau peristiwa dalam waktu yang telah ditentukan. Proses ini melibatkan pengaturan waktu, sumber daya, dan prioritas guna mencapai tujuan tertentu secara efisien. Saat ini, penjadwalan mata pelajaran di sekolah MAS Islamiyah Gajing masih dilakukan secara manual menggunakan Ms. Word, di mana operator memasukkan mata pelajaran ke dalam tabel yang telah ditentukan. Metode ini memiliki kelemahan karena rawan terjadi human error, terutama dalam penginputan jadwal yang dapat menyebabkan bentrok antara mata pelajaran di waktu yang sama. Penelitian ini bertujuan untuk mengembangkan dan mengimplementasikan sistem penjadwalan mata pelajaran berbasis komputer yang lebih efisien dan terkomputerisasi. Sistem ini dirancang untuk memanfaatkan teknologi database guna menyimpan data seperti guru, kelas, mata pelajaran, ruang, jam, hari, serta hasil penjadwalan. Dengan sistem ini, proses penjadwalan dapat dilakukan secara otomatis, mengurangi risiko kesalahan, dan meningkatkan efisiensi. Untuk mencapai tujuan tersebut, digunakan algoritma genetika sebagai metode utama dalam penjadwalan mata pelajaran. Algoritma ini dipilih karena mampu mengatasi masalah dengan kriteria dan objektif yang beragam melalui prinsip biologi dan evolusi, sehingga memungkinkan pencarian solusi yang optimal. Sistem ini dikembangkan menggunakan bahasa pemrograman PHP dengan MySQL sebagai database, sementara pengujian sistem dilakukan dengan metode blackbox testing. Hasil dari kajian ini akan diimplementasikan di MAS Islamiyah Gajing untuk mempermudah operator sekolah dalam proses penginputan dan pengelolaan jadwal mata pelajaran, sehingga mendukung kelancaran kegiatan belajar mengajar.
Use of QRCode and Digital Signature Using The DSA Method to Authenticate Student Academic Documents Suhardi, Suhardi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 4 (2024): Articles Research October 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i4.4765

Abstract

Verification of digital documents is no longer done conventionally but is also done digitally, such as signatures on documents. A signature is a means of authentic evidence as well as proving a person's identity, is a means of proving the authenticity or validity of an agreement or approval for something in a document issued by two or more parties so that it can be used as a solution to verify the integrity of valid data in a document. Application of signatures Digital is also commonly used at the North Sumatra Islamic University (UINSU) Medan, especially in student study documents. Even though UINSU Medan has implemented digital signatures, this application is still a signature image obtained through scanning or photos and manually inserted into a document so that other people can easily reuse the signature image and it can even be misused. To facilitate the digital signature process, the code generated from the signature formation process is entered into a QR code so that it is easy to use to carry out the electronic document authentication process. Researchers will use QR codes and digital signatures to authenticate student documents using the DSA method. This research will be implemented into an application model with PHP and MySQL programming. The student document authentication application model using the DSA method works well as evidenced by the QRCode which contains document token information which is different for each document so that it cannot be duplicated by non-owners of the document.
IMPLEMENTASI NAIVE BAYES CLASSIFIER DALAM MENENTUKAN KEAKTIFAN REMAJA Surbakti, Miftah Hadi; Zufria, Ilka; Suhardi, Suhardi
JOURNAL OF SCIENCE AND SOCIAL RESEARCH Vol 7, No 4 (2024): November 2024
Publisher : Smart Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54314/jssr.v7i4.2361

Abstract

Abstract: This research aims to implement the Naive Bayes Classifier method to determine the activity level of adolescents, a group that tends to be active in various activities. This method is chosen due to its ability to classify complex data. The data is obtained through surveys involving adolescents from different social environments, covering activities such as sports, academics, social engagements, and others. The implementation process includes data preprocessing, model training with training data, and model testing using test data. The results show that the Naive Bayes Classifier can accurately classify adolescents into active or inactive categories based on the given data. These findings can serve as a reference for educational institutions, youth organizations, and government bodies in developing programs to enhance adolescent activity levels and as a basis for further research in classifying adolescent data using more advanced methods. Keywords: Data Mining, Youth Activeness, Mosque Youth, Naïve Bayes Classifier,                  Medan City Abstrak: Penelitian ini bertujuan untuk mengimplementasikan metode Naive Bayes Classifier dalam menentukan keaktifan remaja, yang merupakan kelompok usia aktif dalam berbagai kegiatan. Metode ini dipilih karena kemampuannya dalam klasifikasi data kompleks. Data diperoleh melalui survei terhadap remaja di berbagai lingkungan sosial, mencakup kegiatan olahraga, akademik, sosial, dan lainnya. Proses implementasi meliputi preprocessing data, pelatihan model dengan data latih, dan pengujian model menggunakan data uji. Hasil penelitian menunjukkan bahwa Naive Bayes Classifier mampu secara akurat mengklasifikasikan keaktifan remaja menjadi kategori aktif atau tidak aktif berdasarkan data yang ada. Hasil ini dapat menjadi acuan bagi lembaga pendidikan, organisasi pemuda, dan pemerintah dalam menyusun program untuk meningkatkan keaktifan remaja serta menjadi dasar untuk penelitian lanjutan dalam pengklasifikasian data remaja menggunakan metode lebih canggih. Kata kunci: Data Mining, Keaktifan Remaja, Remaja Masjid, Naïve Bayes Classifier, Kota Medan  
IMPLEMENTASI KRIPTOGRAFI KOMBINASI ALGORITMA VIGENERE CIPHER DAN REVERSE CIPHER UNTUK KEAMANAN TEKS PADA APLIKASI CATATAN PRIBADI BERBASIS ANDROID Siregar, Muhammad Faisal; Hasugian, Abdul Halim; Suhardi, Suhardi
JOURNAL OF SCIENCE AND SOCIAL RESEARCH Vol 7, No 4 (2024): November 2024
Publisher : Smart Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54314/jssr.v7i4.2359

Abstract

Abstract: Cryptography (Cryptography) is the science and art of keeping messages safe. (Cryptography is the art and science of keeping messages secure) "Crypto" means "secret" and "graphy" means "writing". The perpetrators or practitioners of cryptography are called cryptographers. A cryptographic algorithm, called a cipher, is a mathematical equation used for the encryption and decryption processes. Usually the two mathematical equations (for encryption and description) have a fairly close mathematical relationship. In cryptography, text messages can be disguised with various methods so that the message can only be understood by certain people. These methods have their own techniques and solutions. Several methods of securing text messages are by using the Reverse Cipher and Vigenere Cipher algorithms. In today's modern era, the development of technology is increasing rapidly, especially in terms of communication. Due to the rapid development of technology, there are currently many cases related to the misuse of technology in criminal acts. One of the most frequent cases is the theft of personal information, up to confidential documents. Computers as a means of storing and sending important and confidential data, information and documents can often be easily accessed by irresponsible people. Several cases involving computer security are currently a job that requires such a large amount of handling and security costs. Keywords: Cryptography, Reverse Cipher, Vigenere Cipher, Description, Encryption Abstrak: Kriptografi (Cryptography) merupakan ilmu dan seni untuk menjaga pesan agar aman. (Cryptography is the art and science of keeping messages secure) “Crypto” berarti “secret” (rahasia) dan “graphy” berarti “writing” (tulisan). Para pelaku atau praktisi kriptografi disebut cryptographers. Sebuah algoritma kriptografik (cryptographic algorithm), disebut cipher, merupakan persamaan matematik yang digunakan untuk proses enkripsi dan deskripsi. Biasanya kedua persamaan matematik (untuk enkripsi dan deskripsi) tersebut memiliki hubungan matematis yang cukup erat. Pada kriptografi, pesan teks dapat disamarkan dengan berbagai macam metode agar pesan tersebut hanya bisa dimengerti oleh orang-orang tertentu. Metode-metode tersebut memiliki teknik dan cara penyelesaiannya tersendiri. Beberapa metode pengamanan pesan teks tersebut adalah dengan menggunakan algoritma Reverse Cipher dan Vigenere Cipher. Di era modern saat ini, perkembangan teknologi semakin pesat terutama dalam hal berkomunikasi. Karena pesatnya perkembangan teknologi, saat ini telah banyak kasus yang berkaitan dengan penyalahgunaan teknologi dalam tindakan kriminal. Salah satu yang paling sering terjadi adalah pencurian informasi pribadi, hingga dokumen-dokumen rahasia. Komputer sebagai sarana penyimpanan dan pengiriman data, informasi, dan dokumen yang penting dan rahasia sering dapat dengan mudah diakses oleh orang yang tidak bertanggungjawab. Beberapa kasus menyangkut keamanan komputer saat ini menjadi suatu pekerjaan yang membutuhkan biaya penanganan dan pengamanan yang sedemikian besar. Kata kunci: Kriptografi, Reverse Cipher, Vigenere Cipher, Deskripsi, Enkripsi