Articles
Efektivitas Sosialisasi Listrik Aman dan Hemat pada Mahasiswa melalui Pretest dan Posttest Menggunakan Google Form
Tri Wahono;
Ismanto, Edi;
Nuraeni, Eneng;
Yudhana, Anton;
Herman
Jurnal Pengabdian Kepada Masyarakat MEMBANGUN NEGERI Vol. 8 No. 2 (2024): Jurnal Pengabdian Kepada Masyarakat MEMBANGUN NEGERI
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35326/pkm.v8i2.6394
Sosialisasi mengenai penggunaan listrik yang aman dan hemat menjadi semakin penting dalam konteks modern, mengingat berbagai tantangan dan kebutuhan yang dihadapi masyarakat saat ini. Beberapa faktor utama yang melatarbelakangi upaya sosialisasi ini meliputi kebutuhan akan keselamatan, efisiensi energi, penghematan biaya. Kurangnya pengetahuan tentang pengetahuan mengenai penggunaan listrik yang benar mengakibatkan insiden kecelakaan listrik. Sosialisasi ini bertujuan untuk menganalisis efektivitas sosialisasi tentang listrik yang aman dan hemat pada mahasiswa pendidikan Universitas Muhammadiyah Riau. Sosialisasi dilakukan untuk meningkatkan pemahaman dan kesadaran mahasiswa terhadap penggunaan listrik yang lebih bijaksana dan aman. Metode penelitian yang digunakan adalah pemberian materi secara langsung kemudian untuk mengukur pemahaman mahasiswa menggunakan pre-test dan post-test. Alat pengumpulan data berupa kuesioner yang disebarkan melalui Google form, yang mencakup pertanyaan terkait pengetahuan dan perilaku dalam penggunaan listrik sebelum dan sesudah sosialisasi. Hasil dari 49 responden yang mengisi kuesioner dengan 15 pertanyaan, analisis statistik mengungkapkan bahwa intervensi yang diberikan memiliki efek positif yang signifikan terhadap pengetahuan atau keterampilan responden. Hal ini dibuktikan dengan nilai p yang lebih kecil dari 0,05. Dapat disimpulksn bahwa kegiataan sosialisasi terbukti efektif dalam meningkatkan pemahaman atau kemampuan responden secara cepat.
Sniffing Pada Jaringan WiFi Berbasis Protokol 802.1x Menggunakan Aplikasi Wireshark
Abdillah, Muhamad Aznar;
Yudhana, Anton;
Fadil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (955.396 KB)
|
DOI: 10.30645/j-sakti.v4i1.181
Nowadays WiFi technology is increasing with the people's need for internet access. WiFi is an abbreviation of Wireless Fidelity. WiFi can be said to be a technology for exchanging data by utilizing radio waves (wireless) that can be used by several electronic devices such as computers, smartphones, tablets, and so on. This research tries sniffing method on WiFi-based 802.1X protocol to get the client authentication code. The conclusion obtained from this study is the Sniifing Process using the Wireshark application managed to get the station authentication code on an 802.1X-based WiFi network. The authentication code can be used when the station is no longer connected to a WiFi network. This can be used by other people or stations that are actually not entitled / illegitimate.
Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra
H, Hermansa;
Umar, Rusydi;
Yudhana, Anton
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1145.597 KB)
|
DOI: 10.30645/j-sakti.v4i1.195
Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.
Implementasi GPS (Global Positioning System) Pada Presensi Berbasis Android DI BMT Insan Mandiri
Khoir, Syaiful Amrial;
Yudhana, Anton;
S, Sunardi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (608.395 KB)
|
DOI: 10.30645/j-sakti.v4i1.182
Attendance is a document that represents each employee at the company or representative. Some of the challenges experienced by KSPPS BMT INSAN MANDIRI are marketing that is difficult to carry out attendance when coming out of the office because of increased marketing activities that are directly related to members / out-of-office expenses. Therefore the researcher got findings to solve the problem that occurred by making an Android-based online attendance application that can be connected directly with the sarver provided by the office. This application is equipped with the introduction of security and the use of manipulations made by employees, and this application is equipped with monitoring features so that marketing managers and managers can set marketing positions in realtime. In this study, researchers used HTML and PHP programming languages for web applications that use presence servers / data centers, webside uses Google map APIs to obtain marketing positions, and presence reports can be purchased from the webside. The hope of this research is that the online android mobile attendance application with face recognition security can run well and meet the needs of the KSPPS BMT INSAN MANDIRI.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp
Prasongko, Riski Yudhi;
Yudhana, Anton;
Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v6i2.520
The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
Pre-Processing Pada Klasifikasi Citra Medis Pneumonia
Rio Subandi;
Herman;
Anton Yudhana
Decode: Jurnal Pendidikan Teknologi Informasi Vol. 4 No. 1: MARET 2024
Publisher : Program Studi Pendidikan Teknologi Infromasi UMK
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.51454/decode.v4i1.198
Pemrosesan citra merupakan teknik pengolahan citra yang mengubah suatu citra input menjadi citra yang berbeda sehingga keluarannya memiliki keunggulan lebih tinggi daripada citra input. Pemrosesan citra berguna untuk tingkat mutu citra, membuang cacat citra, mengenali objek, dan menggabungkannya dengan bagian lain dari suatu citra. Kemajuan teknologi pengolahan citra digital (digital image processing) yang semakin pesat, dapat mempermudah kehidupan manusia. Salah satu contoh penerapan dalam bidang kesehatan yaitu klasifikasi penyakit pneumonia, klasifikasi data penyakit pneumonia berbentuk dataset citra yang akan diklasifikasikan menggunakan sebuah metode. Saat ini banyak aplikasi yang dapat diterapkan dalam melakukan pre-processing terhadap berbagai citra baik citra medis maupun non medis. Tujuan penelitian ini untuk mempersiapkan data citra sebelum diproses dan untuk memudahkan dalam analisis pada model klasifikasi CNN, data yang di pre-processing berupa data ctscan image. Tujuan dilakukan pre-processing pada citra untuk menghasilkan dimensions dan pixel yang sama agar memudahkan dalam klasifikasi CNN. Citra yang digunakan berwarna grayscale, agar memudahkan dalam klasifikasi pada tahapan selanjutnya. Hasil dari penelitian ini berjalan dengan baik karena dapat mengubah 5.196 citra grayscale menjadi citra yang lebih jelas, bersih, dan siap untuk diklasifikasikan dengan metode klasifikasi selanjutnya.
Sniffing Pada Jaringan WiFi Berbasis Protokol 802.1x Menggunakan Aplikasi Wireshark
Abdillah, Muhamad Aznar;
Yudhana, Anton;
Fadil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (955.396 KB)
|
DOI: 10.30645/j-sakti.v4i1.181
Nowadays WiFi technology is increasing with the people's need for internet access. WiFi is an abbreviation of Wireless Fidelity. WiFi can be said to be a technology for exchanging data by utilizing radio waves (wireless) that can be used by several electronic devices such as computers, smartphones, tablets, and so on. This research tries sniffing method on WiFi-based 802.1X protocol to get the client authentication code. The conclusion obtained from this study is the Sniifing Process using the Wireshark application managed to get the station authentication code on an 802.1X-based WiFi network. The authentication code can be used when the station is no longer connected to a WiFi network. This can be used by other people or stations that are actually not entitled / illegitimate.
Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra
H, Hermansa;
Umar, Rusydi;
Yudhana, Anton
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1145.597 KB)
|
DOI: 10.30645/j-sakti.v4i1.195
Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.
Implementasi GPS (Global Positioning System) Pada Presensi Berbasis Android DI BMT Insan Mandiri
Khoir, Syaiful Amrial;
Yudhana, Anton;
S, Sunardi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (608.395 KB)
|
DOI: 10.30645/j-sakti.v4i1.182
Attendance is a document that represents each employee at the company or representative. Some of the challenges experienced by KSPPS BMT INSAN MANDIRI are marketing that is difficult to carry out attendance when coming out of the office because of increased marketing activities that are directly related to members / out-of-office expenses. Therefore the researcher got findings to solve the problem that occurred by making an Android-based online attendance application that can be connected directly with the sarver provided by the office. This application is equipped with the introduction of security and the use of manipulations made by employees, and this application is equipped with monitoring features so that marketing managers and managers can set marketing positions in realtime. In this study, researchers used HTML and PHP programming languages for web applications that use presence servers / data centers, webside uses Google map APIs to obtain marketing positions, and presence reports can be purchased from the webside. The hope of this research is that the online android mobile attendance application with face recognition security can run well and meet the needs of the KSPPS BMT INSAN MANDIRI.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp
Prasongko, Riski Yudhi;
Yudhana, Anton;
Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v6i2.520
The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.