Claim Missing Document
Check
Articles

Found 30 Documents
Search

Development of E-Commerce for Selling Honey Bees in the COVID-19 Era Indriani; Dar, Muhammad Halmi; Irmayanti, Irmayanti
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11263

Abstract

During the Covid-19 pandemic, which has not yet ended, the business of selling honey is a type of business that is able to survive and even increase its market. The trend of selling honey in the era of the Covid-19 pandemic is quite stable and has the potential to be a good source of income because honey can be used as medicine and can increase the body's immunity. Fitorajo Bee Farm is a UMKM engaged in bee cultivation which is located in Pinang City, South Labuhanbatu Regency, North Sumatra Province with original honey bee products packaged in plastic bottle containers. The marketing system carried out by Fitorajo Bee Farm is carried out through word of mouth, Facebook social media, or through the WhatsApp application. Seeing the promising potential of the honey business in the Covid-19 pandemic era, and in order to reach a wider market, Fitorajo Bee Farm should improve and innovate by adopting e-commerce technology. Conventional marketing, which so far only reaches consumers on a limited scale, must be changed with a marketing system that can reach consumers from any corner. The purpose of this research is to build a marketing media for Fitorajo Bee Farm honey bees by implementing web-based e-commerce. The system development method used is the waterfall model, while the programming language used is PHP framework codeigniter with MySQL DBMS. The results showed that the codeigniter framework and MySQL DBMS can be applied to build e-commerce web-based honey bee marketing media.
IMPLEMENTASI SNORT INTRUSION DETECTION SYSTEM (IDS) PADA SISTEM JARINGAN KOMPUTER Muhammad Halmi Dar; Syaiful Zuhri Harahap
Jurnal Informatika Vol 6, No 3 (2018): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36987/informatika.v6i3.1619

Abstract

Penelitian ini bertujuan untuk merancang sebuah sistem keamanan jaringan komputer dengan menerapkan Snort Intrusion Detection System (IDS). Sistem keamanan jaringan yang dibangunmengintegrasikan antara Intrusion Detection System (IDS), Database System, dan Monitoring System. Dalam skema pengujian, sistem terdiri dari dua jenis, yaitu server dan client. Server berfungsi sebagai target serangan dan sekaligus digunakan untuk melakukan pemantauan terhadap jaringan. Sedangkan client berfungsi sebagai intruder (penyusup). Metode seranganyang diterapkan pada lingkup pengujian adalah Port Scanning dan Denial of Service (DoS). Dari hasil pengujian yang telah dilakukan, Snort-IDS mampu menganalisis paket-paket yang melewati jaringan dan berusaha menentukan apakah terdapat paket-paket data yang berisi aktivitas mencurigakan atau tidak. Dari data hasil pengujian yang diperlihatkan oleh Basic Analysis and Security Engine (BASE), didapatkan bahwa intruder melakukan port scanningsebanyak 28%, TCP attack 62%, UDP attack sebanyak 1%, dan ICMP attack sebanyak 9%. Unique Alerts yang dihasilkan terbagi kepada dua kategori yaitu, unclassified sebanyak 28%dengan jumlah 74, dan attempted-dos sebanyak 72% dengan jumlah 189.Kata kunci: Jaringan Komputer, Keamanan Jaringan, Sistem Deteksi Penyusupan, NIDS,Snort, Denial of Service (DoS).This study aims to design a computer network security system by applying the Snort Intrusion Detection System (IDS). Network security system that is built integrates the Intrusion Detection System (IDS), Database System, and Monitoring System. In the test scheme, the system consists of two types, namely server and client. The server functions as a target of attack and is simultaneously used to monitor the network. While the client functions as an intruder. The attack methods applied in the test scope are Port Scanning and Denial of Service (DoS). From the results of tests that have been done, Snort-IDS is able to analyze packets that pass through the network and try to determine whether thereare data packets that contain suspicious activity or not. From the test data shown by the Basic Analysis and Security Engine (BASE), it is found that intruders do port scanning as much as 28%, TCP attacks 62%, UDP attacks as much as 1%, and ICMP attacks as  much as 9%. The resulting Unique Alerts are divided into two categories, 28% unclassified with 74, and 72% attempted dosage with 189.Keywords: Computer Network, Network Security, Intrusion Detection System, NIDS,Snort, Denial of Service (DoS)
APLIKASI DAN PERANCANGAN SISTEM INFORMASI PEMESANAN PADA UPI CONVENTION CENTER DENGAN MENGGUNAKAN BAHASA PEMROGRAMAN PHP DAN MYSQL Syaiful Zuhri Harahap; Muhammad Halmi Dar
Jurnal Informatika Vol 6, No 3 (2018): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36987/informatika.v6i3.1620

Abstract

Pada teknologi informasi yang semakin cepat seperti saat ini perkembangan ilmu pengetahuan dan teknologi terus maju dengan pesatnya. Hal ini menuntut setip usaha menajual jasa atau barang harus berpikir lebih untuk dapat bersaing dalam merebut para konsumen, dengan layanan yang baik untuk dapat memenangkan persaingan pasar. Hal ini telah mendorong berbagai perubahan–perubahan yang selalu sesuai dengan teknologi informasi, perubahan-perubahan tersebut perlu dikaji dan dianalisa oleh perusahaan–perusahaan supaya dapat menjalankan roda usahanya. Salah satunya pemanfaatan kemajuan teknologi komputer yang pada masa sekarang maupun yang masa akan datang sangat dibutuhkan, karena disadari bahwa komputer merupakan alat bantu dalam menyelesaikan pekerjaan manusia secara cepat dan akurat. Suatu pekerjaan yang memakan waktu berhari-hari atau pekerjaan yang berulang-ulang dengan jumlah yang cukup besar dan menyita waktu dan biaya, oleh komputer dapat dilaksanakan beberapa menit saja. Disamping itu komputer juga dapat menyimpan data, memperbaiki data dan mengambil informasi yang dibutuhkan, data atau informasi tersebut disimpan dalam bentuk file, adanya alat bantu komputer tersebut maka pemecahan masalah akan dapat diatasi.Kata kunci : Aplikasi, Sistem Informasi, Pemesanan, UPI Convention Center, PHP, MySqlIn the increasingly fast information technology as it is today the development of science and technology continues to advance rapidly. This requires every business selling goods or services must think more to be able to compete in seizing consumers, with good service to be able to win market competition. This has led to various changes that are always in accordance with information technology, these changes need to be reviewed and analyzed by companies so that they can run their business. One of them is the utilization of computer technology advances, which are now and in the future are very much needed, because it is realized that computers are a tool in completing human work quickly and accurately. A job that takes days or repetitive jobs with a large enough amount and takes up time and money, by the computer can be done in just a few minutes. Besides that the computer can also store data, improve data and retrieve the information needed, the data or information is stored in the form of files, the existence of these computer aids will solve the problem can be overcome.Keywords: Application, Information System, Ordering, UPI Convention Center, PHP, MySql 
SISTEM INFORMASI PENJUALAN PADA TOKO R2 COLLECTION DI RANTAUPRAPAT BERBASIS WEB Rosnah Ritonga; Muhammad Halmi Dar; Iwan Purnama
Jurnal Informatika Vol 7, No 3 (2019): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36987/informatika.v7i3.1382

Abstract

IMPLEMENTATION OF EXPERT SYSTEM TO IDENTIFY FORMALIN AND BORAX CONTENT IN FOOD USING THE CERTAINTY FACTOR METHOD Lisa Pristiwani Hasibuan; Volvo Sihombing; Muhammad Halmi Dar
INFOKUM Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.028 KB)

Abstract

Today, along with the times that are supported by the rapid development of technology, all aspects of life cannot be separated from the influence of technology. In terms of food, it is also supported by the role of women, nowadays women are born not only to take care of the household, but also to become women who earn big or often called career women, so that there is almost no time to prepare food for the family, so it is not surprising that food Fast food is preferred as one of the main alternatives to filling the stomach considering the taste of the food served and the serving time is only a matter of minutes so it doesn't waste a lot of time. However, without realizing it, some types of fast food that are often consumed contain several types of harmful ingredients that trigger the onset of chronic diseases, such as: heart attack, insulin resistance, diabetes, and several other dangerous diseases. Seeing this impact, so the author is interested in making an expert system application to identify the content of formalin and borax in food. In drawing conclusions in expert systems, Forward Chaining and Backward Chaining are generally used. However, with the use of these two reasons, it is not possible to determine the value of confidence in the hypothesis. So that the expert system can do reasoning like an expert even in conditions of data uncertainty and to get a confidence value in this case the author uses a method to solve the data using the Certainty Factor (CF) method. The Certainty Factor method is a method that defines a measure of certainty against a fact or rule, to describe the level of expert confidence in the problem at hand,
IMPLEMENTATION OF THE RUP METHOD ON THE LABUHAN BATU UNIVERSITY STUDENT ACTIVITY UNIT INFORMATION SYSTEM Siti Aisah Siregar; Deci Irmayani; Muhammad Halmi Dar
INFOKUM Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.083 KB)

Abstract

The Student Activity Unit (UKM) is a place where students who have the same interests and hobbies gather in a university. Univ. Labuhan Batu is a private university in Rantau Prapat which has 5 SMEs, at the time of registration, prospective SME members visit the UKM booths that have been opened by UKM management, besides that there are several other obstacles such as UKM Univ. Labuhan Batu is recorded manually only from the Student side of the Univ. Labuhan Batu, which contains the name of the PIC, date of activity, number, name of SME, place, start, finish, a number of attendance, meeting to, information, also material data that is not neatly arranged, as well as monthly report collection. In order to support the recording of activities in terms of attendance, members, and materials taught to the registration of SME members, the researchers created a web-based SME information system using the Rational Unified Process method, in this study using black-box testing. RUP is a method that uses the concept of object-oriented and has activities that focus on model development using the Unified Modeling Language (UML). The result of this research is an information system that can be used by SMEs, SME members, and the student body of Univ. Labuhan Batu makes it easy to collect attendance information, member data, activity data, materials, and announcements. and has activities that focus on model development using the Unified Modeling Language (UML). The result of this research is an information system that can be used by SMEs, SME members, and the student body of Univ. Labuhan Batu makes it easy to collect attendance information, member data, activity data, materials, and announcements. and has activities that focus on model development using the Unified Modeling Language (UML). The result of this research is an information system that can be used by SMEs, SME members, and the student body of Univ. Labuhan Batu makes it easy to collect attendance information, member data, activity data, materials, and announcements.
Inventory Control Information Systems With EOQ AND ROP Methods In Sales Of Building Materials In UD. Diqy Pasaman Barat By Applying To The VB Net Programming Language And Mysql Database: Inventory Control Information Systems With EOQ AND ROP Methods In Sales Of Building Materials In UD. Diqy Pasaman Barat By Applying To The VB Net Programming Language And Mysql Database Nursaka Putra; Ali Akbar Ritonga; Ibnu Rasyid Munthe; Masrizal Masrizal; Muhammad Halmi Dar
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.860.pp1041-1046

Abstract

Research that has been done at UD. DIQY Pasaman Barat by using field research methodology, library research. analyzing problems in the data processing system inventory products or goods that are running in the UD building shop. DIQY then designed a better system that is expected to improve the efficiency and effectiveness of the work of employees and to design information systems that can produce detailed reports and make it easier to find information when there is the correction of certain data. The design of the Information System for Selling Goods using the VB NET Programming Language will provide a better solution to the problems encountered. The level of error in processing data items and sales transactions can be minimized because the new system can speed up and simplify the administration in making reports, to produce accurate information.
Design a Web-Based Covid 19 Assistance Information System Rudi Ardiansyah Siregar; Muhammad Halmidar; Rohani
Jurnal Mantik Vol. 5 No. 1 (2021): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol5.2021.1267.pp70-77

Abstract

Covid-19 assistance is a difficult challenge to solve since it is affected by various intertwined variables, including income status, health, education, and living conditions. Beneficiary data collection must be performed correctly. As a result, the Labuhanbatu Regency Social Service should have a computerized system to monitor Covid-19 recipients based on income and living conditions. Waterfall models are used in the development of Information Systems to help the study, and the UML used is PHP programming language, MySql Database, Boostrap, and Sublime Document. As a consequence of the study's findings, Covid-19 Beneficiary Community Data Collection Based on Income and Home Conditions was implemented. This method will provide complete and correct information based on the covid-19 beneficiary community's requirements, presented in pdf format.
SISTEM PELACAKAN KONTAK COVID-19 MENGGUNAKAN TEKNOLOGI QR CODE BERBASIS WEB Nurjannah Nurjannah; Muhammad Halmi Dar; Budianto Bangun
JURTEKSI (Jurnal Teknologi dan Sistem Informasi) Vol 7, No 3 (2021): Agustus 2021
Publisher : STMIK Royal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33330/jurteksi.v7i3.1180

Abstract

Abstract: In an effort to control the rate of the spread of Covid-19, the Governor of Sumatera Utara detailed-right of instructions written to perform the extension of PPKM Mikro. One of the scenarios control that is used to perform the contact tracing. Many countries have managed to implement technology-based applications as a tool to do contact tracing to the victims who are exposed. On the one hand, the use of application is very helpful in reducing the rate of transmission of Covid-19. But on the other hand, concerns against the use of user data that is secret to be its own obstacles. This study aims to create a tracing system contact Covid-19 using the QR Code. QR Code technology is selected because it can be used as a tracing tool contact without need to take the user's location data confidential. This system developed by applying the waterfall model. The results of the research show that the tracing system contact Covid-19 without using the privacy data of the user is successfully created with the use of QR Code technology is web-based. Using the method of blackbox testing, the results of the test the functionality of the system running well.            Keywords: Contact Tracing, Covid-19; QR Code; Waterfall; Web  Abstrak: Dalam upaya mengendalikan laju penyebaran Covid-19, Gubernur Sumatera Utara mengeluarkan instruksi tertulis untuk melakukan perpanjangan PPKM Mikro. Salah satu skenario pengendalian yang digunakan adalah dengan melakukan pelacakan kontak (contact tracing). Beberapa negara telah berhasil mengimplementasikan teknologi berbasis aplikasi sebagai alat untuk melakukan pelacakan kontak terhadap korban yang terpapar. Disatu sisi, penggunaan aplikasi sangat membantu dalam menekan laju penularan Covid-19. Namun disisi lain, kekhawatiran terhadap penggunaan data pengguna yang bersifat rahasia menjadi hambatan tersendiri. Penelitian ini bertujuan untuk membuat sebuah sistem pelacakan kontak Covid-19 menggunakan QR Code. Teknologi QR Code dipilih karena dapat digunakan sebagai alat pelacakan kontak tanpa perlu mengambil data lokasi pengguna yang bersifat rahasia. Sistem ini dikembangkan dengan menerapkan model waterfall. Hasil peneltian menunjukkan bahwa sistem pelacakan kontak Covid-19 tanpa menggunkan data privasi pengguna berhasil dibuat dengan menggunkan teknologi QR Code yang berbasis web. Dengan mengguna metode blackbox testing, hasil dari uji fungsionalitas sistem berjalan dengan baik.    Kata kunci: Covid-19; Pelacakan Kontak; QR Code, Waterfall, Web
Implementation of Decision Tree Method to Predict Customer Interest in Internet Data Packages Surya, Rezki; Dar, Muhammad Halmi; Aini Nasution, Fitri
International Journal of Science, Technology & Management Vol. 5 No. 4 (2024): July 2024
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v5i4.1155

Abstract

The use of smartphones is on the rise, making internet packages vital in everyday life. In Indonesia, mobile operators offer a variety of data packages to meet customer needs. Understanding preferences is important to making the right decisions when providing products that meet customer needs. However, not all packages are suitable for all customers. Telkomsel is one of the providers that can deliver consistent signals and a wide range of data packages, but it still has a relatively high price. The study uses decision tree methodology to analyze citizens' preferences about Telkomsel services, comparing the relative cost of data packages with other services. This research will use surveys with samples from different communities to determine the representativeness of the results and provide strategic recommendations for Telkomsel to improve customer satisfaction. The research methods employed in this study included data collection, preprocessing, data division, model design, prediction results, and result evaluation. The results showed accuracy levels of 98.7%, precision of 100%, recall of 98.7%, specificity of 100%, and an F1-score of 99.3%. This study demonstrates the effectiveness of the decision tree model in predicting customer interest in Telkomsel services. Despite some limitations, the findings provide valuable insights that Telkomsel can use to develop more effective marketing strategies.