p-Index From 2021 - 2026
5.339
P-Index
This Author published in this journals
All Journal International Journal of Advances in Applied Sciences Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Informatika Prosiding Semnastek Sinkron : Jurnal dan Penelitian Teknik Informatika JURNAL MEDIA INFORMATIKA BUDIDARMA INTECOMS: Journal of Information Technology and Computer Science Zero : Jurnal Sains, Matematika, dan Terapan KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) JURIKOM (Jurnal Riset Komputer) JOURNAL OF SCIENCE AND SOCIAL RESEARCH Jurnal Teknik dan Informatika Jurnal Elektro dan Telkomunikasi Journal of Computer System and Informatics (JoSYC) Journal of Computer Networks, Architecture and High Performance Computing RESOLUSI : REKAYASA TEKNIK INFORMATIKA DAN INFORMASI Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) Jurnal Info Sains : Informatika dan Sains Bulletin of Information Technology (BIT) Jurnal Minfo Polgan (JMP) TECHSI - Jurnal Teknik Informatika Jurnal Sistem Informasi Triguna Dharma (JURSI TGD) Jurnal Informatika Teknologi dan Sains (Jinteks) Jurnal Nasional Teknologi Komputer Jurnal Pengabdian Masyarakat Gemilang (JPMG) Jurnal Hasil Pengabdian Masyarakat (JURIBMAS) Jurnal Pengabdian Masyarakat International Journal of Industrial Innovation and Mechanical Engineering International Journal of Computer Technology and Science Bulletin of Engineering Science, Technology and Industry Proceedings of The International Conference on Computer Science, Engineering, Social Sciences, and Multidisciplinary Studies
Claim Missing Document
Check
Articles

IMPLEMENTASI TEKNIK KOMPRESI TEKS HUFFMAN Andysah Putera Utama Siahaan
Jurnal Informatika Vol 10, No 2 (2016): Juli
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (955.285 KB) | DOI: 10.26555/jifo.v10i2.a5070

Abstract

Huffman adalah salah satu algoritma kompresi. Ini adalah algoritma paling terkenal untuk kompres teks. Ada empat fase dalam algoritma Huffman untuk kompres teks. Yang pertama adalah kelompok karakter. Yang kedua adalah untuk membangun pohon Huffman. Yang ketiga adalah encoding, dan yang terakhir adalah pembangunan bit kode. Prinsip algoritma Huffman adalah karakter yang sering muncul di encoding dengan rangkaian bit yang pendek dan karakter yang jarang muncul di bit-encoding dengan seri lagi. teknik kompresi Huffman dapat memberikan penghematan dari 30% dari bit asli. Ia bekerja berdasarkan frekuensi karakter. Semakin banyak karakter yang sama mencapai, semakin tinggi tingkat kompresi yang diperoleh. Kata Kunci — Huffman, Compression, Algorithm, Security
ALGORITMA GENETIKA UNTUK PEMBENTUKAN KUNCI MATRIKS 3 X 3 PADA KRIPTOGRAFI HILL CIPHER Andysah Putera Utama Siahaan
Prosiding Semnastek PROSIDING SEMNASTEK 2016
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kunci  enkripsi Hill  Cipher   dapat menetukan  apakah  enkripsi   dan  dekripsi berhasil  dilakukan. Hal   ini   disebabkan   tidak  sembarang   kunci   yang   dapat   diberikan   pada matriks   yang   digunakan   untuk proses   tersebut.   Kunci   yang   memiliki   determinan   yang   tidak   sesuai   tidak   dapat   dimanfaatkan   dalam proses karena dapat mengakibatkan pesan yang terenkripsi tidak dapat dikembalikan ke pesan aslinya. Algoritma   genetika   dapat   menentukan   kunci   yang   digunakan   untuk   enkripsi   dan   dekripsi   pada  Hill Cipher. Dengan menentukan fungsi evaluasi dalam algoritma genetika, kunci yang memiliki komposisi yang   benar  akan   diperoleh.   Untuk   menerapkan   algoritma   ini, pencarian   kunci pada  Hill   Cipher   akan mudah dilakukan tanpa menghabiskan terlalu banyak waktu. Kata Kunci - Cryptography, Algoritma Genetika, Hill Cipher
Sistem Pendukung Keputusan Pemilihan Peserta Jaminan Kesehatan Masyarakat (Jamkesmas) Menerapkan Metode MOORA Mesran Mesran; Swandi Dedi Arnold Pardede; Arahman Harahap; Andysah Putera Utama Siahaan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 2, No 2 (2018): Apriil 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v2i2.595

Abstract

Decision support system as a computer-based system consisting of components, among other components of the language system (language), components of knowledge systems (knowledge) and components of the problem processing system (problem processing) which interact with each other, which helps decision making through the use of data and decision models to solve problems that are semi-structured and unstructured. This study uses the MOORA Method in determining who is entitled to become participants Jamkesmas based on criteria by using a formula that results more accurate and targeted.
PENYELARASAN PADA MASALAH DINING PHILOSOPHERS MENGGUNAKAN ALGORITMA LOCK & RELEASE Andysah Putera Utama Siahaan
TECHSI - Jurnal Teknik Informatika Vol 7, No 1 (2015)
Publisher : Teknik Informatika Universitas Malikussaleh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29103/techsi.v7i1.177

Abstract

Pembahasan dari makalah bagaimana mencegah deadlock dalam masalah filsuf makan. Deadlock adalah keadaan yang tidak diinginkan dari sistem konkuren, ditandai dengan serangkaian proses dalam keadaan menunggu melingkar, di mana setiap proses diblokir mencoba untuk mendapatkan akses ke sumber daya yang dimiliki oleh yang berikutnya dalam rantai. Pencegahan deadlock umumnya digunakan dalam didistribusikan real-time dan sistem operasi, tetapi, karena konkurensi sangat terbatas, sebuah sistem didistribusikan untuk menghindari deadlock secara efisien. Makalah ini menyajikan sebuah teknik untuk menghindari deadlock menggunakan algoritma lock dan release yang dapat mencegah thread lain dalam rantai untuk membuat race condition.
IMPLEMENTASI ALGORITMA SUPER PLAYFAIR CHIPHER DAN TWO SQUARE CIPHER DALAM PENGAMANAN PESAN TEKS Imam Solihin; Mesran Mesran; Andysah Putera Utama Siahaan
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.497

Abstract

Pesan teks merupakan cara berkomunikasi yang dikirim dalam bentuk tulisan, pesan teks saat ini sangat banyak digunakan dalam media electronik, yang sangat populer yaitu pesan SMS (short message service) yang dikirimkan dengan memanfaatkan jasa operator selular, namun pesan tersebut, terancam tidak aman karna bisa terjadi pencurian data pesan. Untuk itu perlu terdapat pengamanan pada pesan teks yang dikirimkan dengan menggunakan teknik enkripsi dan dekripsi. Banyak algoritma kriptografi yang digunakan untuk pengamanan, diantaranya algoritma super playfair cipher dan two square cipher merupakan perkembangan dari metode playfair cipher. Metode ini cukup rumit cara pemecahannya dibanding metode klasik lainnya. Metode super playfair cipher dan two square cipher  tergolong dalam algoritma kriptografi klasik yang menggunakan teknik penyandian subtitusi dan tranposisi karakter yang memiliki kunci simetri atau kunci yang sama dalam melakukan enkripsi dan dekripsinya.
Perbandingan Algoritma Prim Dengan Algoritma Floyd-Warshall Dalam Menentukan Rute Terpendek (Shortest Path Problem) Zuhri Ramadhan; Muhammad Zarlis; Syahril Efendi; Andysah Putera Utama Siahaan
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (490.326 KB) | DOI: 10.30865/jurikom.v5i2.625

Abstract

Masalah optimasi menjadi hal yang kompleks dalam mencari jalur atau rute optimal, banyak metode yang menjadi indikator rute optimal salah satunya adalah rute terpendek. Pencarian rute terpendek (shortest path) merupakan salah satu metode untuk menyelesaikan masalah rute perjalanan, metode shortest path problem dapat menggunakan berbagai macam algoritma seperti algoritma prim dan algoritma Floyd-warshall, namun algoritma mana diantara keduanya yang paling optimum dalam menentukan masalah rute terpendek. Dengan proses pencarian menggunakan graf dan dianalisa hasil dengan tabel kebenaran maka akan didapat hasil paling optimum diantara kedua algoritma.
Pembangkitan Kunci pada Algoritma Hill Cipher menggunakan Teknik Distribusi Angka Diffie-Hellman Andysah Putera Utama Siahaan
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5775

Abstract

Sending data needs to be done properly and safely because it involves important information owned by a person, company or certain party. Sending messages often uses passwords or keywords so that the sending process goes well. The recipient of the message must have the password to be able to open the message after it is received. The key exchange causes the key to be known by irresponsible parties. The key generation process using the Diffie-Hellman algorithm is a good technique to avoid key exchange between sender and receiver. This study uses the Hill Cipher algorithm to test the generation of four keys which will be placed in a 2 x 2 key matrix. As a result, each key that will be generated will use the Diffie-Hellman technique in determining the value to be entered into the Hill Cipher key matrix. The use of this technique is very well done in providing the Hill Cipher algorithm key to the recipient of the message so that it can open the message sent by the sender.
Pengacakan Posisi Plaintext Menggunakan Kunci Blok Persegi pada Proses Enkripsi dengan Algoritma Arnold’s Cat Map Andysah Putera Utama Siahaan; Melva Sari Panjaitan
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 3 No. 3 (2023): RESOLUSI Januari 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/resolusi.v3i3.650

Abstract

Plaintext is a message or information in the original form that has a text format. Plaintext can be opened using any text editor application because the plaintext information preparation system does not use a security key. In securing the message, the plaintext must be given a series of commands or program code to turn the plaintext into an encrypted message. The technique used in this study uses a transposition scheme, namely by rearranging the location of the characters without replacing the plaintext characters with other characters. The level of difficulty in this process depends on the parameter values ??B and C given and the iteration value used to generate the ciphertext. This study uses character arrangement with a 4 x 4 matrix pattern where each plaintext block will be divided based on 16 characters. Each block will be encrypted using a map that has been generated by Arnold's Cat Map. The results of the study found that the plaintext could be scrambled properly during the encryption process and was successfully returned to the original message at the time of decryption.
Utilization of Data Analytics to Enhance Operational Efficiency in Manufacturing Companies Rendi Aprijal; Iqbal Wiranata Siregar; Andysah Putera Utama Siahaan; Leni Marlina
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 2 (2024): Articles Research Volume 6 Issue 2, April 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i2.3723

Abstract

In the digital era, manufacturing industries confront challenges like heightened global competition and intricate production processes, urging them to boost efficiency and productivity. Amidst these circumstances, Big Data emerges as a pivotal opportunity to enhance manufacturing performance. Big Data, characterized by vast volumes of data, utilizes advanced data mining to machine learning techniques for analysis. Data analytics, an interdisciplinary field, profoundly impacts manufacturing operations, enabling deeper insights into production processes. By analyzing production data, companies identify inefficiencies, streamline workflows, and enhance operational efficiency and productivity. Predictive maintenance through sensor data analysis prevents machine failures, while logistics data analysis optimizes supply chains and inventory management, reducing costs and enhancing competitiveness. However, implementing Big Data analytics presents challenges such as rapid data growth, diverse data sources, real-time insights, skill shortages, and data fragmentation. Overcoming these hurdles requires robust technology, skilled personnel, and effective data management strategies. Examples of Big Data analytics applications include customer behavior analysis by Amazon and Netflix, fraud detection in insurance, and urban mobility optimization. Success factors in data analytics implementation include effective data-driven communication, technology integration, and skill enhancement. In conclusion, implementing Big Data Analytics in manufacturing promises significant benefits in operational efficiency, product quality, and competitiveness. Overcoming challenges necessitates robust strategies and consideration of ethical and security issues, ensuring responsible data usage. With a deep understanding of Big Data Analytics, manufacturing companies can leverage this technology to achieve higher efficiency and competitiveness in the global market.
Strategi Digital Marketing Dengan Metode SEO (Search Engine Optimization) untuk UMKM di Desa Klambir 5 Kebun Zulham, Zulham Sitorus; Andysah, Andysah Putera Utama Siahaan; Ibrahim, Ibrahim; Bambang, Bambang Sugito; Ayu, Ayu Ofta Sari; Anzas, Anzas Ibezato Zalukhu
Jurnal Pengabdian Masyarakat Gemilang (JPMG) Vol. 4 No. 1 (2024): Januari 2024
Publisher : HIMPUNAN DOSEN GEMILANG INDONESIA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58369/jpmg.v4i1.157

Abstract

The digital era has changed the way people carry out daily activities, including shopping. This provides an opportunity for Micro, Small and Medium Enterprises (UMKM ) to expand their market by utilizing digital marketing platforms. One digital marketing method that can be used by UMKM  is Search Engine Optimization (SEO). SEO is a technique for optimizing a website so that it is easier for internet users to find via search engines. This research aims to analyze digital marketing strategies using the SEO method for UMKM in Klambir Lima Kebun Village, Hamparan Perak District, Deli Serdang Regency, North Sumatra. This research uses a qualitative descriptive method with data collection techniques in the form of literature study and in-depth interviews. The research results show that UMKM in Klambir Lima Kebun Village still do not understand the importance of SEO in their digital marketing strategy. Most UMKM only rely on social media to promote their products or services. However, social media cannot provide optimal results if it is not optimized with SEO. Based on the research results, it is recommended that UMKM in Klambir Lima Kebun Village implement a digital marketing strategy using the SEO method. This can be done by optimizing the website, content and social media. Keywords: Digital Marketing, SEO, UMKM, Klambir Lima Kebun Village
Co-Authors A. Khalid, Noor Aldeen Afandi Syahputra Alex Siregar Alfiandi, Alfiandi Andreas Ghanneson Nainggolan Anwar, Dede Utari Anzas, Anzas Ibezato Zalukhu Aprijal, Rendi Arahman Harahap Arif Rahman Asyifa, Nathania Aulia, Popi Aulia, Wina Ayu, Ayu Ofta Sari Azizah Harahap, Nur Bambang, Bambang Sugito beckham pratama, arya Binti Saari, Erni Marlina Chairul Indra Angkat Datin, Maha Valne Dewi Sartika Didi Riswan Dika, Dika Dina Marsauli Sibarani Efendi, Syahril Ehkan, Phaklen Eko Hariyanto Eko Hariyanto EKO WAHYUDI Farta wijaya, Rian Fawaz, Muhammad Ayyas Fawaz, Muhammad Ayyasi Hafizhah Sufina Azzahra Hasibuan, Peronika Br Hassan, Moustafa Hussein Ali Hendra Harnanda Hermansyah Hermansyah Hermawan, Bagus Ibrahim Ibrahim Imam Solihin Iqbal Wiranata Siregar Iqbal Wiranata Siregar, Jimmy Izhari, Fahmi Juliyandri Saragih Kariyani Khairil Putra Khairul Khairul , Khairul Khairul Khairul, Khairul Khairunnisa Kiki Artika Leni Marlina Leni Marlina Leni Marlina Manurung, Monica M Melva Sari Panjaitan Mesran, Mesran Muham, Dinda Novita Sari Muhammad Akbar Syahbana Pane Muhammad Indra Muhammad Iqbal Muhammad Iqbal Muhammad Irsyad Muhammad Syahputra Novelan Muhammad Wahyudi Muhammad Zarlis Nasution, Darmeli Natalia Nahampun Nurwijayanti Rabe, Siska Mayasari Ramatika, Desy Rambe, Rezkinah Rendi Aprijal Rian Farta Wijaya Rizky Rinaldi Simamora, Siska Simorangkir, Elsya Sabrina Asmita Sinyo Andika Nasution, Ahmad Siregar, Iqbal Wiranata Sitepu, Nabila Putri Br Sitorus, Zulham Solihin, Imam Sony Putra Sri Wahyuni Suheri Supiyandi Supiyandi Swandi Dedi Arnold Pardede Syafran Panggabean, Edwin Syahputri, Maulisa Syahri, Rahma Syamsiar, Syamsiar Syamsul Arifin Trisnani, Anis A Ullah, Insaf Utari Wanny, Puspita Wiko Pratama Wina Aulia Wulan Ramadhani Yuni Simanullang, Rahma Zuhri Ramadhan Zulham, Zulham Sitorus