Claim Missing Document
Check
Articles

Copyright Protection of Scientific Works using Digital Watermarking by Embedding DOI QR Code Muhammad Khoiruddin Harahap; Nurul Khairina
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1064

Abstract

Digital identifier is a technology used to prove ownership of a work. At this time, the Digital Object Identifier is a form of implementation of the digital identifier used in every scientific work. Not infrequently there are several cases of theft of ownership or copyright of a work, both scientific works, and certain other works. Watermarking is a technique created to protect the ownership of works. Watermarking techniques can be applied to several media such as audio, video, and also documents, one of which is the Portable Document Format document file. In this study, researchers want to build copyright protection for scientific works. Researchers offer research concepts using a Digital Object Identifier which is always installed on scientific papers to be published. The Digital Object Identifier will later become the basic data in building the Quick Response Code. The Digital Object Identifier of each scientific work will not be the same as each other, this will certainly make the Quick Response Code more unique. The results show that the watermarking process in building copyright protection of scientific works can be very successful Quick Response Code can be read and detected properly without experiencing lag time. Quick Response Code readings from several variations of motion are also not very influential, so it can be concluded that distance does not limit the detection of Quick Response Codes. From this research, researchers can deduce that the watermark is performed on the scientific work not only serves as the copyright protection of that scientific paper but can also be an alternative for other researchers to access the scientific work.
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit Nurul Khairina; Muhammad Khoiruddin Harahap; Juanda Hakim Lubis
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.327 KB) | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.
Generating Mersenne Prime Number Using Rabin Miller Primality Probability Test to Get Big Prime Number in RSA Cryptography Dicky Apdilah; Nurul Khairina; Muhammad Khoiruddin Harahap
IJISTECH (International Journal of Information System and Technology) Vol 1, No 1 (2017): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (234.912 KB) | DOI: 10.30645/ijistech.v1i1.1

Abstract

Cryptography RSA method (Rivest - Shamir - Adelman) require large-scale primes to obtain high security that is in greater than or equal to 512, in the process to getting the securities is done to generation or generate prime numbers greater than or equal to 512. Using the Sieve of Eratosthenes is needed to bring up a list of small prime numbers to use as a large prime numbers, the numbers from the result would be combined, so the prime numbers are more produced by the combination Eratosthenes. In this case the prime numbers that are in the range 1500 < prime <2000, for the next step the result of the generation it processed by using the Rabin - Miller Primarily Test. Cryptography RSA method (Rivest - Shamir - Adleman) with the large-scale prime numbers would got securities or data security is better because the difficulty to describe the RSA code gain if it has no RSA Key same with data sender.
IMPLEMENTASI ALGORITMA KRIPTOGRAFI ONE TIME PAD (OTP) DENGAN DYNAMIC KEY LINEAR CONGRUENTIAL GENERATOR (LCG) Jhessica Clawdia; Nurul Khairina; Muhammad Khoiruddin Harahap
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.465

Abstract

Algorithms have an important role in the era of digitalization, by understanding the concept of algorithms can keep information security protected from third parties. Securing a password can increase the security of the data so that the sender can be more comfortable when sending messages to others. This paper aims to make Keys on OTP dynamically generated using random number generator Linear Congruential Generator (LCG) Method. This discussion provides the benefit of an extension of insight that key modifications to OTP can be made and can be dynamically created. Based on the research done, with the random number generator method Linear congruential generator then the key becomes Unique. So there is no repetition of the same key. This depends on the range of random numbers.
Prototype of IoT-Based Fruit Alcohol Level Measurement Tool Nursila Nursila; Dirja Nur Ilham; Amsar Yunan; Muhammad Khoiruddin Harahap; Rudi Arif Candra
Brilliance: Research of Artificial Intelligence Vol. 1 No. 1 (2021): Brilliance: Research of Artificial Intelligence, Article Research May 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (41.954 KB) | DOI: 10.47709/brilliance.v1i1.1078

Abstract

The effect of alcohol on health is very large if you consume too much, and the fact that excessive alcohol levels can interfere with digestion can cause eye function disorders, decreased brain and nerve function as well as cancer. Knowing the alcohol content in fruits that are suitable for consumption by the body from an early age is very important. Based on this problem, this study aims to create a prototype measuring instrument for the alcohol content of fruits using the Blynk application. This circuit consists of 3 circuits, namely the input part in the form of an Mq3 sensor, the control part in the form of Nodemcu, and the output port in the form of the Blynk application. From the results of testing tools for four samples including durian, grapes, papaya, and apples for 25 times the test of the fruit is peeled for the next 2 hours the average percentage of durian alcohol content is 28.57%, grapes are 12.68%, papaya is 5.79 %, and apples by 18.6%. In this study, there is also the notification facility to the third smartphone that the alcohol content exceeds the alcohol content which is not good from the value set on the device.
Literature Study: Highway Traffic Management with Sentiment Analysis and Data Mining Nurul Khairina; Muhammad Khoiruddin Harahap
Brilliance: Research of Artificial Intelligence Vol. 1 No. 1 (2021): Brilliance: Research of Artificial Intelligence, Article Research May 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (31.724 KB) | DOI: 10.47709/brilliance.v1i1.1096

Abstract

In today's era, technology is growing rapidly, many of the latest technologies are in great demand by the Indonesian people, one of which is social media. Various social media such as Facebook, Twitter, Instagram, have become very popular applications for various ages, including teenagers, adults, and the elderly. Social media has a positive impact that can help people convey the latest information through posts on their respective accounts. Social media can disseminate information in a short time, this is why social media is an interesting application to research. The problem of road traffic congestion is strongly influenced by the number of vehicles that pass every day. A large number of private vehicles and public vehicles that pass greatly confuses the atmosphere of highway traffic. Congestion often occurs during working hours. Road congestion also often occurs when an unwanted incident occurs. Sentiment analysis algorithms and data mining algorithms can be combined to find information on traffic jams through social media such as Facebook, Twitter, Instagram, and other social media. The results show that sentiment analysis methods and data mining algorithms can be used to find information about current traffic jams through social media. The conclusion from this literature study can be seen that the K-Nearest Neighbor data mining algorithm is the best choice to overcome road traffic congestion, which will then be further developed in the form of highway traffic management modeling.
Arduino Based Light Intensity Auto Curtain Mursidah; Herry Setiawan; Muhammad Khoiruddin Harahap; Amsar Yunan; Dirja Nur Ilham
Brilliance: Research of Artificial Intelligence Vol. 2 No. 1 (2022): Brilliance: Research of Artificial Intelligence, Article Research February 2022
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v2i1.1456

Abstract

The rapid advancement of technology has led to significant changes in human life. There are numerous tools available, many of which are intended to make human work easier. Science and technology develop, resulting in improved innovations. Automatic control systems have recently advanced at a dizzying pace in the areas of science and technology. This is shown by the variety of applications, which range from residential to sophisticated equipment. GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Meter GY-49 MAX44009 GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Meter GY-49 MAX44009 Lux Ambient light for Arduino is a concept that arose in response to the demands of home automation systems. It is Arduino-based and has light intensity controls. The house's tenants will profit from the renovation. Simply said, the curtains are open while the light intensity is 271 - 1000 lux, closed when the light intensity is 1001 lux and closed when the light intensity is 270 lux so that the light entering the room is not too bright and does not create The room felt hot from too much exposure to the sun. In the age of modernization, this tool is supposed to boost the mobility of the house's occupants.
PkM Penggunaan Albanto (Alat Bandeng Presto) untuk Meningkatkan Nilai Olahan Ikan Bandeng desa Batang Kilat – Medan Jamaludin Jamaludin; Muhammad Khoiruddin Harahap; Evan Afri
TRIDARMA: Pengabdian Kepada Masyarakat (PkM) Vol. 3 No. 1, Mei (2020): TRIDARMA: Pengabdian Kepada Masyarakat (PkM)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ikan bandeng adalah salah satu jenis komoditas ikan olahan yang membutuhkan keterampilan dan tahapan khusus untuk menghasilkan makanan yang berkualitas. Ikan bandeng memiliki struktur daging, tidak seperti kebanyakan ikan. Kandungan bandeng dengan kombinasi tulang ikan yang sangat banyak membuat ikan ini sulit untuk diproses atau dikonsumsi. Duri ikan sangat banyak, sehingga kurang menarik minat masyarakat sehingga budidaya bandeng kurang berkembang, terutama di Kampung Batang Kilat, Desa Sei Mati, Kecamatan Medan Labuhan, Kota Medan. Albanto (Alat Bandeng Presto) merupakan sebuah alat yang digunakan untuk mengatasi masalah duri ikan bandeng. Albanto berfungsi untuk melunakkan semua bahan makanan hingga sampai duri maupun tulang ikan sehingga dapat dimakan lebih mudah serta citra rasa yang lebih lezat dan enak. Olahan bandeng presto ini menghasilkan cita rasa yang berlipat dengan tekstur daging yang empuk hingga ke bagian tulangnya. Albanto sesuai untuk digunakan oleh Pengusaha Industri Rumah Tangga (PIRT) dalam rangka meningkatkan nilai jual ikan bandeng serta meningkatkan kesejahteraan masyarakat. Target luaran dari kemitraan ini adalah: (1) Mitra dapat menggunakan alat presto untuk mengolah ikan bandeng, (2) Mitra membudidayakan ikan bandeng lebih intensif yang dikembangkan, (3) Menjadikan bandeng presto sebagai ikon kuliner kota Medan khususnya di desa Batang Kilat. Metode pelaksanaannya menggunakan metode “problem based solution”, yaitu berbasis permasalahan yang sedang dihadapi oleh mitra. Hasil yang sudah dicapai saat ini adalah produksi Ikan Bandeng Presto dan penjualan konvensional serta sosial Media.
Academic Writing : Optimalisasi Mendeley, Grammarly dan Google Translate dalam Pengabdian Webinar Series IKAPASTI-USU Nurul Khairina; Adidtya Perdana; Muhammad Khoiruddin Harahap; Mhd. Zulfansyuri Siambaton
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 2 No 02 (2020): EDISI SEPTEMBER 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penggunaan pustaka atau referensi dalam suatu karya ilmiah merupakan salah satu syarat karya tersebut baik. Dan dalam penulisan karya ilmiah berbahasa asing penggunaan tata bahasa yang baik juga merupakan syarat penting agar kerya tersebut dapat diterima dan dipahami oleh pembaca. Untuk memudahkan penulisan karya ilmiah dalam mengatur referensi dan tata bahasa yang baik maka diperlukan tools atau alat yang tepat. Dalam pengabdian masyarakat ini tim memaparkan penggunaan Reference Manager Mendeley untuk membantu pengolahan sumber pustaka suatu karya ilmiah dan pengguaan Google Translate untuk menerjemahkan karya ilmiah dari bahasa Indonesia ke Bahasa Inggris. Namun terjemahan dari Google Translate masih belum sesuai dengan kaedah penulisan karya ilmiah bahasa Inggris. Sehingga diperlukan tools tambahan yaitu Grammarly yang dapat membantu menyusun secara terstruktur terjemahan dari Google Translate. Pengabdian ini diadakan secara online oleh IKAPASTI-USU dalam bentuk Webinar. Dalam kegiatan tersebut peserta sangat antusias dengan materi yang tim sampaikan.
Analisis Prediktif untuk Keputusan Bisnis : Peramalan Penjualan Amir Mahmud Husein; Fachrul Rozi Lubis; Muhammad Khoiruddin Harahap
Data Sciences Indonesia (DSI) Vol. 1 No. 1 (2021): Article Research Volume 1 Issue 1, June 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (921.35 KB) | DOI: 10.47709/dsi.v1i1.1196

Abstract

Peramalan penjualan produk adalah aspek utama dari manajemen pembelian, persediaan yang melebihi permintaan atau kekurangan akan berdampak pada manajemen pelayanan maupun secara ekominis. Makalah ini fokus mencoba menyajikan penerapan analisis prediktif dengan mengadopsi kerangka kerja Data Science (ilmu data) untuk menemukan wawasan yang berguna dalam pengambilan keputusan bisnis khususnya tentang peramalan penjualan produk di masa depan. Kerangka CRISP-DM diusulkan dengan tahapan pemahasan bisnis, pemahaman dan persiapan data, exploratory data analysis (EDA) dan pemodelan. Berdasarkan hasil pengujian data penjualan yang dievaluasi berdasarkan RMSE dan MAE, algoritma XGBoost menghasilkan prediksi berada dalam 1,3% kemudian ARIMA sebesar 1.6%, masih lebih baik dibandingkan LinearRegression, RandomForestdan LSTM dengan tingkat kesalahan sebesar 1.81%, 1.97%, 2.21% pada masing-masing algoritma dari data aktual.
Co-Authors . Zulfan AA Sudharmawan, AA Abdul Samad Adidtya Perdana, Adidtya Aditya, Vikra Afriani, Dina Amir Mahmud Husein Amir Mahmud Husein, Amir Mahmud Amir Mahmud Husein, Mawaddah Harahap, Amir Amsar Yunan Amsar, Amsar Anugreni, Fera Ariany, Vince Arie Budiansyah Aritonang, Romulo P. Atabiq, Fauzun Ayesha Muazzam Candra, Rudi Arif Clawdia, Jhessica Dian Pratiwi, Aulya Dicky Apdilah Diding Kusnady Dimas Sasongko Dina Afriani Eko Pramono Epi, Yus Erwinsyah Sipahutar Evan Afri Evan Afri Fachrul Rozi Lubis Ferdy Riza Firnanda, Ary Ginting, Rico Imanta Handayani, Saskia Hantono Hantono Haris Lubis, Abdul Hariyanti, Irma Herry Setiawan Herry Setiawan Ilham, Dirja Nur Indra Surya, Indra Indra, Jamaludin Intan Maulina, Intan Jannah, Dina Miftahul Jhessica Clawdia Juanda Hakim Lubis Khairuman Khairuman Man Lubis, Fachrul Rozi Maharina, Maharina Maqfirah Mhd. Zulfansyuri Siambaton Miza, Khairul Mohammed Saad Talib Muhammad Hamza Muhammad Rian Almadani Mursidah natasha, Syarifah fadillah Natasya, Syarifah Fadillah Novita, Hilda Yulia Nursila Nursila Nursila, Nursila Nurul Khairina Nurul Khairina Nurul Khairina Pania, Sadri Paryono, Tukino Patel , Hrishitva Permata, Riski Surya Rina Rina Rizki, Lutfi Trisandi Rizky, Muharratul Mina Rosihana, Riscki Elita S.SE,MM, Yanti Salsa Dilah Cicilia Putri Sandi Pratama Saputra, Devi Satria Sepri Kurniadi Sihabudin Sihabudin, Sihabudin Sridewi, Nurmala Surya Hendraputra Syifa Setiawan, Muhammad Afdhalu Talib, Mohammed Saad Urmila, Tasya Wahyudi Lubis Xu, Chlap Min Zhu, Kong Huang Zonyfar, Candra