cover
Contact Name
Tengku Mohd Diansyah
Contact Email
unhar.lppm@gmail.com
Phone
+6281361000256
Journal Mail Official
unhar.lppm@gmail.com
Editorial Address
Jl kelapa VII no2
Location
Kota medan,
Sumatera utara
INDONESIA
Prosiding Snastikom
ISSN : -     EISSN : 29641950     DOI : -
Core Subject : Science,
seminar Nasional Teknologi Informasi dan Komunikasi yang diselangarakan oleh Program Studi Teknik Informatika Universitas Harapan Medan merupakan agenda kegiatan tahunan sebagai sarana pengembangan ilmu pengetahuan dibidang teknologi informasi dan komunikasi untuk mahasiswa, akademisi maupun praktisi. Diharapkan dengan adanya penyelenggaraan SNASTIKOM ini dapat membantu dalam perkembangan ilmu pengetahuan di Indonesia.
Articles 143 Documents
Sistem Pendukung Keputusan Untuk Menentukan Stok Kue Menggunakan Forward Chaining Di Toko Cookies YARR Nurul Fajrina; Mufida Khairani; Yessi Fitri Annisah Lubis
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (432.528 KB)

Abstract

Advances in information and communication technology make it easier for humans to manage data and information, so there is no need to waste a lot of time, effort and money. Technology is useful in various fields, one of which is in the field of small business economics, namely sales stock. In order to make it easier for the owner to make incoming and outgoing stock reports, it is necessary to implement computerized sales data in one web application, which includes information on incoming and outgoing stock of cookies that are still available at the YARR Cookies shop. Stages in Decision Support System research using the Forward Chaining method which will collect facts and end with conclusions. And the end result of this web application can be run properly and is also useful for the owner of the YARR cookie shop.
SIMULATOR ALAT MUSIK TRADISIONAL CALEMPONG PADA PLATFORM ANDROID Novi Yanti; Diki Arisandi; Liza Trisnawati; Weli Andrian
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (421.977 KB)

Abstract

Indonesia is the largest archipelago country in the world. The islands are stretching from Sabang to Merauke, which causes Indonesia rich in ethnicity, language, religion, and culture. One of them is a traditional art in the Kampar Regency that will use in every celebration of holidays, namely calempong. Calempong instruments are often seen in performances at weddings. The concept of this research is to create and combine the technology with traditional musical instruments through the hardware or software, and delivering an interesting learning experience of musical instruments. This simulator is presented in 3D by using unity software and Blender 3D, and embedding the Kampar song so that it does not eliminate the local cultural values.
Analisis Kinerja Sistem Kripto kompresi Pada File Dokumen Dengan Algoritma Asimetris RSA dan Even Rodeh Code Imam Prayoghi; Imran Lubis; Haida Dafitri
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (555.316 KB)

Abstract

The document files are electronic data that are often used to store information that is personal or confidential, therefore it is necessary to take action to keep the information accessible only to the owner of the data. In addition to the security aspect, the thing that needs to be considered is also about storage memory. Therefore, additional steps are needed to streamline the storage media and speed up the transmission process by compressing it first so that its size becomes smaller. In this study, will combine cryptography and compression techniques using the RSA algorithm for the purpose of securing data, then compressed using the Even Rodeh Code algorithm to reduce the size of the data. This research produces an application that can be used as an alternative solution in maintaining the confidentiality of document file data so that it can only be accessed by the data owner and can save the need for data storage space to be more efficient. The test results show that different test file sizes produce different Compression Ratio (CR), Space Savings (SS) and RT (Running Time) calculation values as well. The larger the size to be compressed, the larger the size that can be reduced or the greater the storage space that can be saved. While the RT results have increased in value constantly along with changes in the size of the test file used. This means that the larger the size of the test file to be compressed, the longer it will take to compress it
Implementasi Metode SMART Menentukan Penerima Beasiswa Bidikmisi Pada SMA Negri 2 Moro’o Kabupaten Nias Barat Rizkiman Waruru; Ade Zulkarnain Hasibuan; Tommy
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.096 KB)

Abstract

The Bidikmisi Scholarship is an education fee assistance program for prospective students who are economically disadvantaged and have good academic potential to study at university until they graduate on time. SMA Negeri 2 Moro'o West Nias Regency is one of the schools that runs the Bidikmisi scholarship program, the selection process takes three weeks to one month, with the selection process taking up to one month of course this is less efficient. Apart from that, it is feared that the resulting assessment will be subjective, where the assessment is based on personal interests, causing the scholarship to not be on target. The aim of this research is to build a decision support system to determine Bidikmisi scholarship recipients using the Microsoft Visual Basic programming language with the SMART ( Simple Multi Attribute Rating Technique ) method. at SMA Negeri 2 Moro'o, West Nias Regency. The system that has been designed using the Microsoft Visual Basic programming language can provide more precise information, because it uses the SMART ( Simple Multi Attribute Rating Technique ) method, so there is no longer any doubt in making a decision. It is hoped that the designed application will make it easier for SMA Negeri 2 Moro'o West Nias Regency to determine Bidikmisi scholarship acceptance
Analisis Pemanfaatan Teknik Serangan DDOS pada Mikrotik Cloud dan Melakukan upaya penangannya Syahendra Surya; Tengku Mohd Diansyah; Risko liza
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (220.192 KB)

Abstract

Internet services have many benefits and are widely used, but also have disadvantages that can be utilized by hackers to carry out attacks such as DDoS. One solution to manage and control internet networks is to use MikroTik CHR (Cloud Hosted Router), a virtual router solution provided by MikroTik. CHR is designed to run on various virtualization platforms such as VMware, VirtualBox, Hyper-V, and Clouds such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure.This research aims to analyze DDoS attack techniques used and implemented on the MikroTik CHR platform and the security effort strategies that can be used to protect MikroTik CHR from DDoS attacks that can cause service disruptions and financial losses and their handling. This research only focuses on DDoS attacks on MikroTik CHR and security strategies that can protect it from attacks. The results show that some effective security strategies include configuring firewalls, enabling protection features, and performing regular monitoring and software updates. In conclusion, the MikroTik CHR can be protected from DDoS attacks with proper security strategies, and it is necessary to pay attention to strict security monitoring, software updates, and an integrated and comprehensive security strategy to protect the MikroTik CHR from DDoS attacks.
Perancangan Aplikasi Penjadwalan Kuliah Pada Perguruan Tinggi Marliana Sari; Kadri Yusuf
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.795 KB)

Abstract

Scheduling lectures in higher education is a complex task because it involves many factors such as room availability, lecturer teaching time, and student needs. Therefore, effective and efficient optimization techniques are needed to solve this scheduling problem. This research was conducted to design an effective and efficient lecture scheduling application using genetic algorithms at diploma and undergraduate levels. By using a genetic algorithm, it is hoped that it can produce a lecture schedule that meets the given requirements and constraints, such as minimizing schedule conflicts, optimizing room use, and maximizing lecturer teaching time. The problems raised from this research can be solved by determining the parameters of the genetic algorithm used in scheduling lectures, determining the factors that need to be considered in scheduling lectures using genetic algorithms, the design can be tested and evaluated to see the performance of the genetic algorithm. Lecture scheduling application built using a genetic algorithm
Perancangan Aplikasi Arsip dan Surat Menyurat Perguruan Tinggi Meryatul Husna; Andam Lukcyhasnita
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.661 KB)

Abstract

Letters and archiving are complex activities and require a structured mechanism to run well, therefore a webbased archiving and correspondence application was designed to increase the efficiency and effectiveness of archiving and delivering correspondence in the university environment. The method used is the software development method. This research involves collecting data through interviews and observations to understand the process of archiving and sending correspondence on a smart campus. The application developed can help users in archiving and delivering correspondence more efficiently and effectively, with features such as correspondence search, automatic archiving, as well as setting tasks and notifications. The research results show that the use of web-based archive and correspondence applications can increase the efficiency and effectiveness of archiving and delivering correspondence on a smart campus, by reducing time and costs and increasing the accuracy and security of correspondence and archive management
Data Mining Market Basket Analysis Menggunakan Algoritma Hash Based Pada Sistem Penjualan Produk M Fadli Hamdi Lubis
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (528.145 KB)

Abstract

This research aims to determine consumer shopping patterns with Data Mining Market Basket Analysis using the Hash Based Algorithm in the product sales system. The results show that the most purchased item based on the period August 2022 - July 2023 for 1-itemset is Sanger Ice (A) at 42% . For 2-itemset, namely Sanger Ice (A) and Sanger Hot (B), it is 25%. After three iterations, one address remains in the 3-itemset hash table. Frequent itemsets obtained are Sanger Ice (A), Sanger Hot (B), Bird's Nest (AO) with a quantity sold of 42 (Support Count) or 12% and Confidence 49%
PERBAIKAN KUALITAS CITRA DENGAN KOMBINASI METODE CONTRAST STRETCHING DAN METODE KONVOLUSI Dimas Prasetya; Yuyun Dwi Lestari; Arief Budiman
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.583 KB)

Abstract

The use of digital images is increasing because of the advantages possessed by digital images, the lighting quality in digital images that are too dark or too bright. Where this noise is usually obtained from the image digitization process. Noise in digital image processing is a disturbance caused by deviating digital data received by the recipient of image data. The elimination of noise in the image is one of the most important parts in image processing. In the process, the images is on. The input is converted into 3x3 matrix then the process uses the contrast streching method for fix the noise from the image. In this study using the Contrast Stretching method and the Convolution method so that the objects and backgrounds in an image can be recognized more clearly
SMART LOGIN PADA WEBSITE DENGAN MENGGUNAKAN QR CODE DAN OTENTIKASI ONE TIME PASSWORD Lois Adelson; Dodi Siregar; Kalvin Chiuloto
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.973 KB)

Abstract

The use of passwords has been used in many ways such as logging into a website application. However, most of these passwords still use static passwords, making them vulnerable to tapping login passwords. There are many ways that hackers can do to hack into websites that use a login system, such as phishing techniques. Layered security is required to secure the login system, the use of the OTP code is one way of verification and can only be accessed by the user himself so that it can reduce the potential for wiretapping of access rights. The application of QR Code technology is quite practical and provides an easy solution to enter the system. Users don't need to log in by entering their username and password repeatedly, just pointing the QR Code at the webcam to be scanned. To increase login security to prevent intrusion into the system, authentication is made in the form of a unique, single-use code called One Time Password (OTP). The password that previously used one username and one password will be added to another random password which will be sent to the user's cellular phone via SMS message. This research is able to provide convenience when accessing a QR Code login and increasing security in the system because the OTP code that is sent is only valid for one login session and is valid for only 5 minutes, so the OTP code cannot be reused in the next login session.

Page 6 of 15 | Total Record : 143