Claim Missing Document
Check
Articles

Found 26 Documents
Search

ALGORITMA C4.5 DALAM PEMETAAN POLA PENERIMAAN MAHASISWA BARU DI TEKNIK KOMPUTER: Data Mining Siregar, Yunita Sari; Sembiring, Boni Oktaviana; Hasdiana, Hasdiana; Dewi, Arie Rafika; Harahap, Herlina
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research October 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v6i1.11154

Abstract

University of Harapan Medan is one of the private universities in North Sumatra which has computer-based study programs such as Informatics Engineering and Information Systems. Every year this college receives many registrations from students who have completed their education at the school stage. The large number of incoming student data makes it difficult for the admin to select new students who will register. In this study using the C4.5 algorithm data mining method to map the pattern of student admissions selection in the field of Engineering and computers. The attributes used are the average value of report cards (high, enough, low), basic academic ability tests (very high, high, medium, low, very low), basic computer knowledge tests (very high, high, enough, low, very low) and interviews (good, bad). Data mining is a mathematical calculation process that uses algorithms and requires large data. While the C4.5 algorithm is an algorithm that processes data by calculating entrophy and information gain, where after the calculation process is carried out, those who get the largest information gain value will become nodes and branches. This C4.5 algorithm will describe a decision tree that will form a pattern in student selection. The results of this study indicate that in mapping the selection pattern of interview attributes into level 1 nodes, the attributes of the basic computer knowledge test become the level 1 branch, the attributes of the basic academic ability test become the level 2 branch and the attribute average value of report cards becomes the level 3 branch.
IMPLEMENTASI METODE DISCRETE COSINE TRANSFORM (DCT) DAN BLOWFISH DALAM KEAMANAN VIDEO DIGITAL Siregar, Yunita Sari; Khairani, Mufida; Harahap , Herlina; Lubis, Yessy Fitri Annisa
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 1 (2022): Article Research Volume 7 Issue 1: January 2022
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11286

Abstract

Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it from the spatial domain to the frequency domain. Blowfish works by dividing the message into 64-bit blocks of equal length with varying aty lengths that encrypt the data in 8 byte blocks. Messages that are not multiples of 8 bytes will be added extra bits (padding), so that the size for each block is the same. After the final result is obtained, the value is inserted into the digital video without destroying the original digital video. From the research that has been done in the implementation of digital video watermarking, it can be concluded that the Blowfish cryptography method and the Discrete Cosine Transform (DCT) watermarking cryptography method can be applied properly. In the watermarking process, digital image insertion does not damage the watermaratd video and at the security level it is provided with blowfish cryptographic encryption, so that it can increase security in copyright protection
Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer Raka Nugraha Pangestu; Risma Yanti; Herlina Harahap
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 3 No 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.357

Abstract

Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown IPs from accessing the server and redirecting attacks to virtual IPs provided by the VPN.
Animasi 2D Sebagai Informasi Pelayanan E-KTP Kepada Masyarakat di Kantor Kecamatan Medan Denai Dicky Iskandar; herlina Harahap; Sumi Khairani
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol 3 No 2 (2021): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i2.436

Abstract

This animation design is an information about the process of making KTP in Medan Denai District Office. Many residents do not know the process of making a KTP. For this reason, a method of delivering a KTP information is needed. The solution is to make 2D animation using adobe animation CC 2018. The process of making animation itself requires a story idea, scenario, story dialogue and storyboard. This animation provides information about an information process for making a KTP and explains the requirements for making a KTP. And there is a new policy from the government regarding the child identity card process. With this 2D animation, it is easier for the public to know the process of making a KTP so that there are no misunderstandings for officers, so that officers can provide the best service for the community
MEDIA PENGENALAN ORGAN TUBUH MANUSIA DALAM BAHASA LATIN UNTUK SISWA SMP BERBASIS ADOBE AFTER EFFECT Bella Puspita; Herlina Harahap; Sumi Khairani
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.261 KB)

Abstract

Making media on the introduction of human body organs in Latin based on Adobe After Effect is aimed at junior high school students with the aim and purpose that junior high school students are more interested getting to know the human organs in Latin with this 2D animated video. Making media introduction to human organs in Latin based on Adobe After Effect through three applications, the Adobe After Effect application is used for making animation, Adobe Illustrator to draw all of characters, background settings or other ambience and Adobe Audition as audio editing manager before being combined into Adobe After Effect. The process of making this animation requires a story idea, scene and storyboard. There are several steps to make an animated object to become a 2D animation video, modeling or depiction of background characters and other ambience, audio editing and animation. The result of this animation research is a learning medium for human body organs in Latin for junior high school students which aims to provide information about animation the body organs in the human body along with an explanation.
Analisa Kombinasi Chain Code Dan Single Linkage Clustering Dalam Mengidentifikasi Karakter Ainun Naimah Pulungan; Herlina Harahap; Rosyidah Siregar
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.373 KB)

Abstract

Character recognition (Optical Character Recognition) is pattern recognition. One method of pattern recognition that is widely used is Single Linkage Clustering and Chain Code whose system works like the human brain which can recognize patterns after training on some of the examples given. The final project prioritizes pattern recognition on characters. To get a pattern on each character, some features of the character itself are needed. The features taken on a character include Perimeter, Area, Shape Factor, Roundness for SLC and Chain Map for Chain Code. Feature retrieval using Single Linkage Clustering and Chain Code methods to be able to distinguish the shapes of the segments according to the given parameters.
Implementasi Sistem Pendukung Keputusan Menggunakan Metode Promethee Dalam Pemilihan Sepeda Motor Terlaris PT. Indako Trading Co Binjai Dinda Cahya Ramadhani; Herlina Harahap; Mufida Khairani
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.555 KB)

Abstract

In building a best-selling motorcycle selection system, a decision support system is needed which is intended to assist decision makers in selecting the best-selling motorcycle at PT. Indako Trading Co Binjai by using data from survey results directly to the location. This system will be designed using the web and perform calculations using the Promethee Method. Where there are already determined criteria and alternatives which will later bring up an output of the best-selling motorcycle type at PT. Indako Trading Co Binjai. Based on the results of the analysis and design that has been carried out in the Promethee stage in calculating the Net Flow value, the first ranking results in the selection of the best-selling motorcycle at PT. Indako Trading Co Binjai is Vario 150.
Implementasi Algoritma CT-PRO Untuk Menentukan Pola Frekuensi Judul Skripsi Teknik Informatika Universitas Harapan Medan Muchriza Akbar Bancin; Herlina Harahap; Rismayanti
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1056.913 KB)

Abstract

The thesis is a term used to describe a scientific book in the form of an explanation of the results studied. In this study there was a problem that every time a student made a thesis title was difficult for students to decide which topic to be discussed. So that the study program was also somewhat overwhelmed to provide input on what title would be appointed for the thesis. With the help of data mining the CT-Pro algorithm is expected to help the study program in determining the frequency pattern of the title of the thesis submitted by students. So that the study program can see students more likely to submit the title of the thesis in which direction, whether it is in accordance with the science they control or not. This research produces a media network in determining specialization in taking thesis titles.
Penerapan Teknologi RFID Untuk Pengendalian Ruang Kelas Berbasis Mikrokontroler Ade Zulkarnain Hasibuan; Herlina Harahap; Zulkardin Sarumaha
JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP) Vol. 1 No. 1 (2018): Jutikomp Volume 1 Nomor 1 April 2018
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v1i1.326

Abstract

Ruangan kelas merupakan salah satu fasilitas yang hamper digunakan setiap hari saat adanya proses perkuliahan. Biasanya ketika kuliah berlangsung didalam kelas ada saja permasalahan kecil yang timbul, hal ini bias menggangu proses perkuliahan. Oleh karena itu penerapan teknologi RFID pada ruangan kelas dapat membantu permasalahan saat akan dilakukannya proses belajar mengajar ataupun ketika proses belajar mengajar selesai. Dengan diterapkannya teknologi RFID pada ruangan kelas, dosen cukup melakukan scan pada tag RFID untuk membuka pintu, menghidupkan lampu, menghidupkan AC, dan menghidupkan infokus. Untuk menerapkan teknologi RFID ini pada ruangan kelas dibutuhkan rangkaian pengendalinya, untuk mengendalikannya dapat menggunakan mikrokontroler yang sudah dibuat dalam bentuk papan pengendali utama yaitu Arduino. Teknologi RFID ini dapat mengurangi permasalahan terutama masalah operasional listrik kammpus, dimana saat proses perkuliahan selesai maka seluruh perangkat yang berhubungan dengan listrik akan dimatikan secara otomatis ketika pintu dikunci.
Penerapan QR Code dan Vigenere Cipher Dalam Sistem Pelaporan Juru Parkir Ilegal Ade Zulkarnain Hasibuan; Munjiat Setiani Asih; Herlina Harahap
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.172 KB)

Abstract

The number of illegal parking attendants creates problems around us, especially the losses received by the regional government. Parking money that should have contributed to regional income, but because of the presence of illegal parking attendants did not make the slightest contribution to the local government. Another problem is that the parking attendant often gives tariffs outside the normal tariff, so that the people are harmed. Therefore, with the development of current technology, it can help the public to report the illegal parking attendants, the system created in this study provides a solution where the parking lot business card will be given a QR Code marker, the public can scan the QR Code on the id card the parking attendant. If the parking attendant is indicated to be illegal, the public can report it directly using the application on their smart phone. In addition, the information contained in the QR Code is encrypted using vigenere cipher cryptography, it is intended that the information is guaranteed authentic and cannot be falsified by certain parties that aim to take advantage.Keywords:  QR Code, Parking Attendant, Smart Phone, Cryptography, Vigenere Cipher