Claim Missing Document
Check
Articles

Found 31 Documents
Search

PERANCANGAN DAN IMPLEMENTASI APLIKASI SISTEM INFORMASI DOKUMENTASI DAN PELAPORAN DOKUMEN BORANG AKREDITASI PROGRAM STUDI PADA UNIVERSITAS MEDAN AREA PROGRAM PKM DIYA 2019 Juanda Hakim Lubis; Rizki Muliono; Nurul Khairina
Jurnal Informatika Kaputama (JIK) Vol 4, No 1 (2020): VOLUME 4 NOMOR 1, EDISI JANUARI 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v4i1.230

Abstract

Medan Area University (UMA) is one of the oldest private universities in northern Sumatra, which was founded by Haji Agus Salim Siregar in 1983. Especially at Medan Area University the document collection processing model for LKPS-APS is currently still not organized with neat and there is still a loss of LKPS-APS documents, especially when the deadline for LKPS-APS preparation is nearing the upload period. To improve performance in document processing, a system will be built to facilitate lecturers and staff in managing LKPS-APS documents properly and in detail, and reduce the reason lecturers or staff cannot attend meetings in the processing and collection of LKPS-APS document forms that can be submitted into the online system and online discussion per document in the LKPS-APS information system according to 9 standard criteria according to the Instrument Akreditasi Program Studi 4.0 (IAPS 4.0) for Study Program Accreditation.
Identification of Pneumonia using The K-Nearest Neighbors Method using HOG Fitur Feature Extraction Nurul Khairina; Theofil Tri Saputra Sibarani; Rizki Muliono; Zulfikar Sembiring; Muhathir Muhathir
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 5, No 2 (2022): Issues January 2022
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v5i2.6216

Abstract

Pneumonia is a wet lung disease. Pneumonia is generally caused by viruses, bacteria or fungi. Not infrequently Pneumonia can cause death. The K-Nearest Neighbors method is a classification method that uses the majority value from the closest k value category. At this time people are not too worried about pneumonia because this pneumonia has symptoms like a normal cough. However, fast and accurate information from health experts is also very necessary so that pneumonia symptoms can be recognized early and how to deal with them can also be done faster. In this study, researchers will diagnose pneumonia to obtain information quickly about the symptoms of pneumonia. This information will adopt human knowledge into computers designed to solve the problem of identifying pneumonia. In this study, the K-Nearest Neighbors method will be combined with the HOG Extraction Feature to identify pneumonia more accurately. The KNN classification used is Fine KNN, Cosine KNN, and Cubic KNN. Where will be seen how the value of accuracy, precision, recall, and fi-score. The results showed that the classification could run well on the Fine KKN, Cosine KNN, and Cubic KNN methods. Fine KNN has an accuracy rate of 80.67, Cosine KNN has an accuracy rate of 84,93333, and Cubic KNN has an accuracy rate of 83,13333. Fine KNN has precision, recall and f1-score values of 0.794842, 0.923706, and 0.854442. Cosine KNN has precision, recall and f1-score values of 0.803048, 0.954039, and 0.872056. Cubic KNN has precision, recall and f1-score values of 0.73388, 0.964561, and 0.833555. From the test results, positive and negative identification of pneumonia was found to be more accurate with the Cosine KNN classification which reached 84,93333.
Dynamic Steganography Least Significant Bit with Stretch on Pixels Neighborhood Muhammad Khoiruddin Harahap; Nurul Khairina
Journal of Information Systems Engineering and Business Intelligence Vol. 6 No. 2 (2020): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.6.2.151-158

Abstract

Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as digital images have many pixels that can accommodate secret messages. However, the length of secret messages may not match with the number of image pixels so the messages cannot be inserted into the digital images.Objective: This research aims to see the dynamics between an image size and a secret message’s length in order to prevent out of range messages entered in an image.Methods: This research will combine the Least Significant Bit (LSB) method and the Stretch technique in hiding secret messages. The LSB method uses the 8th bit to hide secret messages. The Stretch technique dynamically enlarges the image size according to the length of the secret messages. Images will be enlarged horizontally on the rightmost image pixel block until n blocks of image pixels.Results: This study compares an original image size and a stego image size and examines a secret message’s length that can be accommodated by the stego image, as well as the Mean Square Error and Structure Similarity Index. The test is done by comparing the size change of the original image with the stego image from the Stretch results, where each original image tested always changes dynamically according to the increasing number of secret message characters. From the MSE and SSIM test results, the success was only with the first image, while the second image to the fourth image remained erroneous because they also did not have the same resolution.Conclusion:The combination of LSB steganography and the Stretch technique can enlarge an image automatically according to the number of secret messages to be inserted. For further research development, image stretch must not only be done horizontally but also vertically. 
Kiat Jitu Menembus Jurnal International Bereputasi, Optimalisasi Mendeley & Grammarly dalam Pengabdian Webinar Teknik Informatika UISU Nurul Khairina; Adidtya Perdana; Muhammad Khoiruddin Harahap; Mhd. Zulfansyuri Siambaton
Dedikasi Sains dan Teknologi (DST) Vol. 1 No. 1 (2021): Dedikasi Sains dan Teknologi : Volume 1 Nomor 1, Mei 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.706 KB) | DOI: 10.47709/dst.v1i1.963

Abstract

Kehidupan akademik tidak dapat lepas dari kegiatan publikasi artikel ilmiah. Meningkatkan kemampuan dan wawasan dosen serta mahasiswa dalam menulis artikel ilmiah menjadi motivasi tersendiri dalam kegiatan pengabdian masyarakat ini. Tuntutan berupa publikasi artikel ilmiah dalam ranah nasional mapupun international bagi dosen seperti pelaporan beban kerja dosen, persyaratan kepangkatan dosen, persyaratan melanjutkan studi (dari S1 ke S2 atau dari S2 ke S3), persyaratan menyelesaikan studi (salah satu syarat dalam menyelesaikan studi S2 dan S3), persyaratan mengambil ijazah bagi mahasiswa S1, persyaratan wisuda, serta luaran penelitian maupun luaran pengabdian selalu tetap membutuhkan kemampuan dalam menulis artikel ilmiah. Maka dari itu tim pengabdiaan yang beranggotakan penulis, dkk melakukan kegiatan pengabdian masyarakat dengan tema kiat jitu menembus jurnal internasional bereputasi, optimalisasi mendeley, dan grammarly yang dilaksanakan dalam bentuk webinar dan diselengarakan oleh program studi teknik informatika UISU. Peserta pada kegiatan ini tidak hanya berasal dari kalangan mahasiswa dan akademisi saja melainkan dari kalangan umum, dan berasal dari dalam dan luar kota Medan, bahkan ada dari luar Provinsi. Kegiatan pengabdian ini dilaksanakan secara daring karena masih dalam masa pandemic, walaupun terbatas dengan tempat dan waktu, namun tim pengabdian dan peserta sangat antusias dalam mengikuti acara webinar. Hal ini menunjukkan bahwa minat dan kebutuhan dalam menulis publikasi ilmiah sangat besar dan kebutuhan pada pembimbingan penulisan karya ilmiah juga sangat besar.
Copyright Protection of Scientific Works using Digital Watermarking by Embedding DOI QR Code Muhammad Khoiruddin Harahap; Nurul Khairina
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1064

Abstract

Digital identifier is a technology used to prove ownership of a work. At this time, the Digital Object Identifier is a form of implementation of the digital identifier used in every scientific work. Not infrequently there are several cases of theft of ownership or copyright of a work, both scientific works, and certain other works. Watermarking is a technique created to protect the ownership of works. Watermarking techniques can be applied to several media such as audio, video, and also documents, one of which is the Portable Document Format document file. In this study, researchers want to build copyright protection for scientific works. Researchers offer research concepts using a Digital Object Identifier which is always installed on scientific papers to be published. The Digital Object Identifier will later become the basic data in building the Quick Response Code. The Digital Object Identifier of each scientific work will not be the same as each other, this will certainly make the Quick Response Code more unique. The results show that the watermarking process in building copyright protection of scientific works can be very successful Quick Response Code can be read and detected properly without experiencing lag time. Quick Response Code readings from several variations of motion are also not very influential, so it can be concluded that distance does not limit the detection of Quick Response Codes. From this research, researchers can deduce that the watermark is performed on the scientific work not only serves as the copyright protection of that scientific paper but can also be an alternative for other researchers to access the scientific work.
The Development of HOTS-Based Physics Learning Media Application for Junior School Saut Dohot Siregar; Nurul Khairina; Robin Robin
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.979.pp1690-1694

Abstract

Learning outcomes can be influenced by learning models, learning styles, and learning media. The accuracy of the learning media used can increase students' thinking abilities even to higher levels of thinking. High-level thinking students can be trained through learning in classrooms. Suitable learning media for teaching material can help students in thinking at a high level or HOTS so learning media are needed in the teaching and learning process. This study aims to create learning media and try out these media. Learning media developed using the Borland Delphi application. The learning media developed were tested in junior high school grade 8 in Medan. The research sample was taken by cluster random sampling where each school had the same opportunity to become a research sample. Samples were divided into categories group A and group B. Group A and group B were subjected to the normality and homogeneity tests. This study uses research instruments in the form of multiple-choice questions as many as 15 questions and questionnaires on students' opinions on the learning media used. The results showed that the learning process by using instructional media produces better or higher learning outcomes than the learning process without the use of instructional media. The average posttest students in the class using media developed higher than the average posttest students in the class who do not use instructional media. The results of the student questionnaire argue that the media need to be designed to be more interesting so that students are happier to use it.
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit Nurul Khairina; Muhammad Khoiruddin Harahap; Juanda Hakim Lubis
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.327 KB) | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.
Literature Study: Highway Traffic Management with Sentiment Analysis and Data Mining Nurul Khairina; Muhammad Khoiruddin Harahap
Brilliance: Research of Artificial Intelligence Vol. 1 No. 1 (2021): Brilliance: Research of Artificial Intelligence, Article Research May 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (31.724 KB) | DOI: 10.47709/brilliance.v1i1.1096

Abstract

In today's era, technology is growing rapidly, many of the latest technologies are in great demand by the Indonesian people, one of which is social media. Various social media such as Facebook, Twitter, Instagram, have become very popular applications for various ages, including teenagers, adults, and the elderly. Social media has a positive impact that can help people convey the latest information through posts on their respective accounts. Social media can disseminate information in a short time, this is why social media is an interesting application to research. The problem of road traffic congestion is strongly influenced by the number of vehicles that pass every day. A large number of private vehicles and public vehicles that pass greatly confuses the atmosphere of highway traffic. Congestion often occurs during working hours. Road congestion also often occurs when an unwanted incident occurs. Sentiment analysis algorithms and data mining algorithms can be combined to find information on traffic jams through social media such as Facebook, Twitter, Instagram, and other social media. The results show that sentiment analysis methods and data mining algorithms can be used to find information about current traffic jams through social media. The conclusion from this literature study can be seen that the K-Nearest Neighbor data mining algorithm is the best choice to overcome road traffic congestion, which will then be further developed in the form of highway traffic management modeling.
Academic Writing : Optimalisasi Mendeley, Grammarly dan Google Translate dalam Pengabdian Webinar Series IKAPASTI-USU Nurul Khairina; Adidtya Perdana; Muhammad Khoiruddin Harahap; Mhd. Zulfansyuri Siambaton
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 2 No 02 (2020): EDISI SEPTEMBER 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penggunaan pustaka atau referensi dalam suatu karya ilmiah merupakan salah satu syarat karya tersebut baik. Dan dalam penulisan karya ilmiah berbahasa asing penggunaan tata bahasa yang baik juga merupakan syarat penting agar kerya tersebut dapat diterima dan dipahami oleh pembaca. Untuk memudahkan penulisan karya ilmiah dalam mengatur referensi dan tata bahasa yang baik maka diperlukan tools atau alat yang tepat. Dalam pengabdian masyarakat ini tim memaparkan penggunaan Reference Manager Mendeley untuk membantu pengolahan sumber pustaka suatu karya ilmiah dan pengguaan Google Translate untuk menerjemahkan karya ilmiah dari bahasa Indonesia ke Bahasa Inggris. Namun terjemahan dari Google Translate masih belum sesuai dengan kaedah penulisan karya ilmiah bahasa Inggris. Sehingga diperlukan tools tambahan yaitu Grammarly yang dapat membantu menyusun secara terstruktur terjemahan dari Google Translate. Pengabdian ini diadakan secara online oleh IKAPASTI-USU dalam bentuk Webinar. Dalam kegiatan tersebut peserta sangat antusias dengan materi yang tim sampaikan.
PERANCANGAN DAN IMPLEMENTASI APLIKASI SISTEM INFORMASI DOKUMENTASI DAN PELAPORAN DOKUMEN BORANG AKREDITASI PROGRAM STUDI PADA UNIVERSITAS MEDAN AREA PROGRAM PKM DIYA 2019 Juanda Hakim Lubis; Rizki Muliono; Nurul Khairina
Jurnal Informatika Kaputama (JIK) Vol 4 No 1 (2020): Volume 4, Nomor 1, Januari 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jik.v4i1.353

Abstract

Medan Area University (UMA) is one of the oldest private universities in northern Sumatra, which was founded by Haji Agus Salim Siregar in 1983. Especially at Medan Area University the document collection processing model for LKPS-APS is currently still not organized with neat and there is still a loss of LKPS-APS documents, especially when the deadline for LKPS-APS preparation is nearing the upload period. To improve performance in document processing, a system will be built to facilitate lecturers and staff in managing LKPS-APS documents properly and in detail, and reduce the reason lecturers or staff cannot attend meetings in the processing and collection of LKPS-APS document forms that can be submitted into the online system and online discussion per document in the LKPS-APS information system according to 9 standard criteria according to the Instrument Akreditasi Program Studi 4.0 (IAPS 4.0) for Study Program Accreditation.