p-Index From 2021 - 2026
13.95
P-Index
This Author published in this journals
All Journal Techno.Com: Jurnal Teknologi Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Sistemasi: Jurnal Sistem Informasi Sinkron : Jurnal dan Penelitian Teknik Informatika MODELING: Jurnal Program Studi PGMI IT JOURNAL RESEARCH AND DEVELOPMENT PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Jurnal Teknik Informatika UNIKA Santo Thomas INTECOMS: Journal of Information Technology and Computer Science Zero : Jurnal Sains, Matematika, dan Terapan ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA JISTech (Journal of Islamic Science and Technology) AXIOM : Jurnal Pendidikan dan Matematika Jurnal Teknologi Sistem Informasi dan Aplikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) IJISTECH (International Journal Of Information System & Technology) KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) The IJICS (International Journal of Informatics and Computer Science) JURIKOM (Jurnal Riset Komputer) JOURNAL OF SCIENCE AND SOCIAL RESEARCH Kurawal - Jurnal Teknologi, Informasi dan Industri Jurnal Riset Informatika AL-ULUM: JURNAL SAINS DAN TEKNOLOGI Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya Jurnal Review Pendidikan dan Pengajaran (JRPP) Progresif: Jurnal Ilmiah Komputer Jurnal Informatika dan Rekayasa Elektronik JSR : Jaringan Sistem Informasi Robotik Jatilima : Jurnal Multimedia Dan Teknologi Informasi Jurnal Teknik Informatika C.I.T. Medicom G-Tech : Jurnal Teknologi Terapan Science Midwifery JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) JIKA (Jurnal Informatika) INFOKUM Community Development Journal: Jurnal Pengabdian Masyarakat U-NET Jurnal Teknik Informatika Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) MEANS (Media Informasi Analisa dan Sistem) Journal of Computer Networks, Architecture and High Performance Computing JiTEKH (Jurnal Ilmiah Teknologi Harapan) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Pendidikan dan Teknologi Indonesia Journal La Multiapp Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Bulletin of Computer Science Research KLIK: Kajian Ilmiah Informatika dan Komputer Instal : Jurnal Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Info Sains : Informatika dan Sains Jurnal Mandiri IT Jurnal Teknik Informatika Unika Santo Thomas (JTIUST) Jurnal Armada Informatika Journal of Information Systems and Technology Research Jurnal Sains dan Teknologi JOMLAI: Journal of Machine Learning and Artificial Intelligence Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat Innovative: Journal Of Social Science Research Jurnal Komputer Antartika Scientica: Jurnal Ilmiah Sains dan Teknologi Jurnal Pengabdian Masyarakat Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Jurnal Ilmiah Nusantara Modem : Jurnal Informatika dan Sains Teknologi Polygon: Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Teknologi : Jurnal Ilmiah Sistem Informasi
Claim Missing Document
Check
Articles

Implementasi Algoritma Vigenere Cipher Untuk Keamanan Data Bantuan Sosial Di Desa Pazri; Abdul Halim Hasugian
Bulletin of Computer Science Research Vol. 5 No. 4 (2025): June 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v5i4.544

Abstract

Data security in the digital era is very important. Village governments often manage sensitive data related to social assistance, such as recipient names, ID numbers, types of assistance, and other details. This data is very vulnerable to leaks or misuse, especially if there is no strong security system in place. This highlights the importance of implementing technology that supports data security. By implementing cryptographic algorithms such as the Vigenere Cipher, the village government can protect its community's data from potential threats. This algorithm uses a flexible secret key, making it ideal for securing small to medium-scale data, such as social assistance data. The Vigenere Cipher algorithm is applied to secure social assistance data in Lawe Sempilang Village, such as recipient names, ID numbers, and the types of assistance provided. This research aims to develop an application for the Implementation of the Vigenere Cipher Algorithm for Social Assistance Data Security in Lawe Sempilang Village. This application is designed to enhance the security of social assistance data by encrypting the data so that it can only be accessed by authorized parties, thereby preventing data leaks or misuse of information. The research method used is the Research and Development (R&D) method. This research successfully implemented the Vigenere Cipher algorithm in the data management system for social assistance recipients in Lawe Sempilang Village. With the presence of encryption, sensitive information such as Name, NIK, Phone Number, Email, Address, Dependents, and Income remains secure throughout the application process until approval by the Admin Department. The developed system is capable of maintaining data confidentiality and enhancing security in the distribution of social assistance. The results also show that the Vigenere Cipher algorithm succeeded in carrying out the encryption and decryption process correctly, so that only authorized parties can access the information in its original form.
The Arithmetic Game Application Category for Children Using General Basic Knowledge Based Methods Hasugian, Abdul Halim; Sriani
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i02.101

Abstract

A computer is a series of electronic machines consisting of thousands or even millions of components that can work together and form a neat and thorough system. Technological developments in the computer sector have progressed rapidly. Many new software have been created to help make human work easier and more practical. Almost every field has been touched by computer technology, including education. The teaching system implemented by the school does not yet have complete facilities to help students learn. Students often find it difficult because they have to study certain subjects that require a lot of study and practice, such as mathematics at elementary school level. Due to the lack of complete learning facilities at school, parents can provide interesting learning facilities by using an application at home so that their children are interested in studying at home. Creating this application goes through several stages such as: problem analysis, creating a database structure, creating a menu design, creating an application and conclusions and suggestions so that you get an application that suits your wishes and is structured. The aim of creating this application is so that elementary school age children can practice answering arithmetic questions more easily and with fun.
A Analysis of Public Sentiment towards Beverage Franchise Reviews Using the Naïve Bayes Algorithm khairani, maya; Hasugian, Abdul Halim; Putri, Raissa Amanda
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i01.102

Abstract

A franchise is an individual or business that is licensed to use the intellectual property or business characteristics of the franchisor. Currently, the food and beverage business is very familiar because of its rapid development, one of which is boba drinks. In the food business, customer ratings and reviews are very important because they can provide suggestions and input to improve the quality of the products sold. This study analyzes drink reviews by differentiating positive and negative reviews in the text mining process using Naïve Bayes. Data was taken from Google reviews with a total of 132 data consisting of 81 positive reviews, 38 neutral and 13 negative. The accuracy of positive reviews is 70% and for all reviews it reaches 81%.
Maintain Files Confidential By Using Rail Fence Cipher And Rot13 Method Situmorang, Rantouli; Ikhsan, Muhammad; Hasugian, Abdul Halim
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i02.113

Abstract

Transmission of information over long distances using internet media is faced with the problem of data security and confidentiality which is one of the important aspects of data communication, both for the purpose of data security and for individual privacy. One of the communication media is to use written text because a lot of information can be conveyed through writing (text) and sometimes in the text there is confidential information. Those who want their data not to be known by unauthorized parties always try to find ways to secure the information to be communicated. The Rail Fence Cipher algorithm has an advantage over other algorithms because in the process of writing plaintext into ciphertext it can be done on any line so that it adds to the complexity of the encryption and decryption process. The Rotate13 algorithm is a development of the Caesar cipher algorithm where this algorithm changes each letter character with 13 characters in front and one behind it according to the alphabet where the 13th character shift is carried out, namely the letter A is replaced with N. So that the data is disguised and cannot be read at a glance then shift the character in the ASCII table by shifting back as much as 13 characters. In this study, encryption and decryption were carried out by combining the Rail Fence Cipher algorithm with ROT13, where the encryption and decryption process is done 2 times. Based on the experimental results, the relationship between the encryption process time and the plaintext size shows that there is an effect of processing time speed based on the number of plaintext lengths in each algorithm and based on the relationship between the encryption process time and the decryption process time, it shows that the time used does not have a significant difference.
The Application of Image Sharpening and Wiener Methods to Improve the Quality of Lung X-ray Images: Application of Image Sharpening and Wiener Methods to Improve the Quality of Lung X-ray Images Sriani; Hasugian, Abdul Halim; Nasution, Yurika
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i02.123

Abstract

Medical imaging is a process of visual representation of several functions of human organs whichs used for clinical diagnosis, medical treatment, suchs x-rays which are a form of electromagnetic radiation that penetrates the human body and has the result of images of human organs like shadows on special black x-ray paper with the aim of knowing the condition human organs, suchs healthy or unhealthy lung conditions. However, lung x-ray results can provide different results from the original because they have poor quality caused by noise, blurred colors and so on, making them difficult for humans to interpret. Therefore, it’s necessary to carry out an image processing process in order to improve image quality using sharpening or getting an image display with a better form of visualization. One of the techniques used in sharpening is the Wiener filter whichs a process of improving image restoration from blurry effects based on least squares. The average percentage results that occur after applying the sharpening and Wiener methods to blurred images are 67.30%, with an average difference of 32.69%.
Analysis of the Advanced Encryption Standard (AES) Method in Securing Web-Based Exam Questions Hasugian, Abdul Halim; Darta, Ali; Amalia, Rizki
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i02.127

Abstract

Data protection is a critical issue in the world Information volume technology, Most important in web-based systems that store sensitive information such as exam question data. This research aims to analyze AES Advanced Encryption Standard method as a tool to improve the security of web-based exam question data. This research utilizing a qualitative benchmark while carrying out a review library to understand the concepts and principles of AES, and analyzing the implementation and integration of AES in web-based systems. This research will also involve experiments by implementing a web-based exam question data security system using the AES method. Tests will be conducted by measuring system performance in terms of speed, reliability, and efficiency. In addition, a penetration test will also be conducted to evaluate the system's resistance to potential attacks from unauthorized parties. This research Hopefully we can provide more detailed information about data management web-based Questioning exam by applying approach AES. This research can also provide recommendations for the application of the AES method in other data security scenarios and contribute to facing data security challenges in the future. Thus, This argument can make a constructive contribution to building construction of secure and reliable web-based systems in storing and managing sensitive data.
Text Data Security Application Using a Mobile-Based Base64 Algorithm Rifki, Mhd Ikhsan; Muhammad Ezar Raditya; Abdul Halim Hasugian
Bahasa Indonesia Vol 15 No 02 (2023): Instal : Jurnal Komputer Periode (Juli-Desember)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v15i02.146

Abstract

During the process of sending data or information on a communications network, various types of data and important information related to personal data and identity are often transacted on the network. This can be exploited by irresponsible parties to gain personal gain by duplicating personal data or information. So, protection is needed for data sent via communication networks. According to Law No. 27 of 2022, personal data protection includes all efforts to protect personal data and guarantee the constitutional rights of personal data subjects. Based on this, the research objective is to provide users with options to provide additional security for text data in the form of personal data. The base64 application provides data security by changing plaintext into ciphertext, which has an information structure that is very different from the original form of information. The text data security application using the base64 algorithm was designed using the Unified Modeling Language (UML) system development method. Regarding application development, the framework used is modular. So, with this application, text data has additional data security options to avoid behavior that could be detrimental.
Perancangan Aplikasi Absensi Karyawan Berbasis Web pada Perusahaan PDAM Tirtanadi Sumatera Utara Khaidir Hanafi; Abdul Halim Hasugian
Modem : Jurnal Informatika dan Sains Teknologi. Vol. 3 No. 3 (2025): Juli : Modem : Jurnal Informatika dan Sains Teknologi
Publisher : Asosiasi Profesi Telekomunikasi Dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/modem.v3i3.412

Abstract

The employee attendance system is a crucial component of human resource management, particularly for performance evaluation, salary calculation, and discipline monitoring. PDAM Tirtanadi North Sumatra still employs a manual attendance system, which is considered inefficient, prone to errors, and slows down administrative processes. This study aims to develop a web-based attendance application to improve the accuracy and efficiency of employee attendance data management. The research method uses software engineering with the System Development Life Cycle (SDLC) model based on the waterfall approach. Data collection was conducted through observation, interviews with relevant stakeholders, and literature review. The application is designed with several key features, including user authentication, digital attendance recording, employee data management, attendance recap, and report generation in PDF formats. Testing results show that the application operates according to system requirements and positively impacts the efficiency of the attendance process. The implementation of this application is expected to accelerate administrative procedures, enhance accountability, and provide a more accurate data foundation for analysis and managerial decision-making.
Analisis Sentimen Masyarakat Kota Medan Terhadap Persiapan PON XXI Sumut-Aceh 2024 Menggunakan Metode Naive Bayes Muhammad Suhery; Gema Ramadhan; Abdul Halim Hasugian
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 2 No. 5 (2024): September : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v2i5.207

Abstract

The North Sumatra Aceh National Sports Week (PON) which will be held in September 2024 in Papu, North Sumatra has drawn many pros and cons from the public. This topic allows the public to provide criticism, suggestions and opinions regarding the 2024 North Sumatra Aceh PON. Instagram is a popular social media for conveying public opinion. The sentiment analysis process can find and resolve problems based on public opinion on social media such as Instagram. The classification method used in this research is the Naïve Bayes Classifier. Datasets can be obtained from the data crawling process using the Google Chrome extension: IGCommentExport. The data is labeled positive, neutral, or negative. The results of the labeling process showed 770 negative data, 256 neutral data and 920 positive data. Then pre-processing is carried out on the data that has been previously labeled, and a word weighting process is also carried out using TF-IDF. After that, modeling was carried out using the Naïve Bayes Classifier and the final process was evaluation-testing. The high accuracy results from the fourth experiment which compared 90% of the training data with 10% of the testing data resulted in an accuracy of 75%. Meanwhile, the sentiment test results show that positive sentiment is more numerous than negative sentiment and neutral sentiment.
Aplikasi e-Directory Berkas Tridharma Kinerja Dosen Limbong, Tonni; Hasugian, Abdul Halim
Jurnal Teknik Informatika UNIKA Santo Thomas Vol 1 No. 2 Tahun 2016
Publisher : LPPM UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1467.102 KB) | DOI: 10.17605/jti.v1i2.35

Abstract

Pengurusan jabatan fungsional seorang dosen sesuai dengan peraturan pemerintah melalui dirjen dikti akan dilakukan minimal 1 (satu) kali dalam 3 (tiga) tahun, ini sangat memungkinkan berkas-berkas dari seorang dosen akan tercecer atau rusak bahkan hilang, dan menyebabkan kekurangan berkas padahal seorang dosen tersebut sudah melaksanakan tugasnya tapi berkasnya hilang ataupun rusak. Demikian juga bagi dosen yang sudah lulus sertifikasi memiliki kewajiban melaporkan pekerjaan nya setiap semester yakni pelaksanaan Tri Dharma Perguruan Tinggi untuk mendapatkan haknya yakni tunjangan sertifikasi dari negara. Aplikasi e-Directory berkas tridharma kinerja dosen dengan memanfaatkan fasilitas yang ada (Server) serta pengaruhnya terhadap kualitas layanan pemberkasan dosen dalam bentuk digital merupakan langkah penting yang harus dilakukan, sehingga dosen maupun pihak manajemen mendapat data / informasi yang cepat, tepat dan akurat.
Co-Authors Abdillah, Ibnu Faiz Adam Damiri Manurung Adi Hartono Aditya Maulana Azanzi Girsang Afandi Sahputra Afiksih, Mufliha Afriani, Dina Aidil Halim Lubis Aidil Halim Lubis Ajeng Dwi Pratiwi Alfarizi, Muhammad Alhabib, Muhammad Farhan Ali Darta Ali Ikhwan Alwy Azyari Harahap Amalia Daulay, Rizki Amelia Anggraini, Arizka Anggraini, Sindi Annisa Shafira Zuhri Apriani, Puja Arif, Mhd. Fakhrozi Armansyah Armansyah Armansyah Aruan, Nur Jamilah Asrul Suwondo AULIA, RIZKA Auliani, Wirna Rizka Azhar, Joehari Azhari, Wahyu Bandaharo, Bandaharo Bermiko Kasah Padang Bunga Nurul Manisa Dalimunthe, Ayu Sahriani Dea Amallia Deni Fahrizal Dewi Afrianti Dharma, Fahri Dinda Zukhoiriyah Eferoni Ndururu Elsa Azila Rahman Fakhriza, M. Farah Zaida Gema Ramadhan Gilang Armawan Saka Ginting, Masitha Putri Ardhana Girsang, Aditya Maulana Azanzi Gunawan, Gunawan Gunawan, Helmi Hanny Puput Eliyarista Saragih Harahap, Muhammad Fitrah Affandi Harahap, Nasywa Al Afif Hasibuan, Ardina Khoirunnisa Hendra Cipta Heni Pujiastuti Heri Santoso Heri Santoso Heri Santoso HERI SUSANTO Hidayah, Adinda Fita Hidayati, Risma Hsb, Munawir Siddik Ibnu Rusydi Ikhsan, Muhammad Ilham Ilham Ilka Zufria Imam Zaki Husein Nst Irawan, Muhammad Arief Irene Sri Morina Januar, Bagus K Khairunnisa Khaidir Hanafi Khairuna Khairuna Khairunnisa, K Kusuma, Sintiawati Lubis, Akbar Maulana Lubis, Desy Ramadhani Lubis, Indah Alfitri M Mahyudi M. Fakhriza M. Khalil Gibran M. RIZKY RAMADHAN M.Alif Fahrezy Mahara, Elvida Futri Maimunah Rahmadani Marpaung, Rizq Alwi Marwah, Khoirul Wijak Alfaizh Maulida, Dzikra Maya Khairani Mhd Furqan Mhd Ikhsan Rifki Mhd Rafly Syah Pahlevi Miftahul Jannah Muhammad Ezar Raditya Muhammad Ikhsan Muhammad Ikhsan Muhammad Ridzki Hasibuan Muhammad Sayuthi Muhammad Siddik Hasibuan Muhammad Suhery Mulya Alfan Simatupang Murdani Nadyah Almirah Simanjuntak Nasution, Yurika Nst, Fakhrurrozi Nurmaiyah Nurmaiyah Ong, Russell Pazri Prasetio, Muhammad Aditya Prayoga, M. Irsan Pristiwanto, Pristiwanto Putra, Donny Dwi Putri Hanifah Putri, Cindy Ananda Putri, Pebriani Rahadian Fatta Batubara Rahmad Prayogi Harahap Rahmawati Rahmawati Raissa Amanda Putri Rajani, Attila Rakhmat Kurniawan R Ramadhani, Muthia Ramadhani, Silvia Rano, Rano Irawan Reza Muhammad Rijal, Mhd. Nanda Khairul Rina Anggraini, Rina Rina Widyasari Rizki Amalia Rizky Pratama Putra Rizky Ramadhan Rizqi Hidayat Tanjung RR. Ella Evrita Hestiandari Ryo Vikri Alif S, Amri Yuda Sabuki, Robi Saefuddin, Anan Saka, Gilang Armawan Sela, Dhea Shania Oktawijaya Sheila Safira Siahaan, Ahmad Taufik Al Afkari Simanjuntak, Salmah Simatupang, Aidil Akbar Siregar, Muhammad Faisal Siregar, Nora Arianti Siti Hayatul Fauziah Ritonga Siti Juhroini Ritonga Siti Nurhaliza Sofyan Siti Sumita Harahap Sitorus, Ridha Saryani Situmorang, Rantouli Solifiah Batubara, Febi Sri Wulan, Sri Sriani Sriani Sriani Sriani, S Suandi Padang Suendri Suendri, Suendri Suhardi Suhardi Suhardi, Suhardi Sulindawaty T. Raihan Yudisthira TONNI LIMBONG Tria Elisa Ulfah, Auliana Wahyudi, Zul Attoriq Farhan Wina Fadia Ardianti Windary, Wanda Yani, Sri Suci Yazid Hulaini Habbani Nasution Yusuf Karim Rambe Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution, Yusuf Ramadhan Zaidan, Muhammad Zidanul Akbar Ziqra Addilah