Claim Missing Document
Check
Articles

Found 17 Documents
Search

PELATIHAN PENGUTIPAN DAN CARA MENGHINDARI TINDAKAN PLAGIAT BAGI GURU SMK MUHAMMADIYAH 3 PEKANBARU Januar Al Amien; Sunanto Sunanto; Desti Mualfah; Baidarus Baidarus; Evans Fuad; Febby Apri Wenando; Soni Soni
Jurnal Pengabdian UntukMu NegeRI Vol 2 No 2 (2018): Pengabdian Untuk Mu negeRI
Publisher : LPPM UMRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3335.441 KB) | DOI: 10.37859/jpumri.v2i2.878

Abstract

Nowadays there are many cases of plagiarism that are becoming our concern. Therefore, the writings on plagiarism are one of the things that is important to be understood by the world of education, to avoid plagiarism. Respect, acknowledge and give credit for the work of others is a necessity in producing writing. We all know that science is developed based on pre-existing science. So that there is no need to hesitate for anyone among Educators when composing scientific papers / written works, mentioning the reference sources. This must be understood as intellectual honesty that will not reduce the weight of our writing. Mention honestly, the source of reference that we use, or quote, so that it will be seen clearly, which parts of our work are ideas or taken from dictionaries, encyclopedias, articles, reports, books, magazines, internet, and others.
Recent systematic review on student performance prediction using backpropagation algorithms Edi Ismanto; Hadhrami Ab Ghani; Nurul Izrin Md Saleh; Januar Al Amien; Rahmad Gunawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 3: June 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i3.21963

Abstract

A comprehensive systematic study was carried out in order to identify various deep learning methods developed and used for predicting student academic performance. Predicting academic performance allows for the implementation of various preventive and supportive measures earlier in order to improve academic performance and reduce failure and dropout rates. Although machine learning schemes were once popular, deep learning algorithms are now being investigated to solve difficult predictions of student performance in larger datasets with more data attributes. Deep neural network prediction methods with clear modelling and parameter measurements formulated on publicly available and recognised datasets are the focus of the research. Widely used for academic performance prediction, backpropagation algorithms have been trained and tested with various datasets, especially those related to learning management systems (LMS) and massive open online courses (MOOC). The most widely used prediction method appears to be the standard artificial neural network approach. The long-short-term memory (LSTM) approach has been reported to achieve an accuracy of around 87 percent for temporal student performance data. The number of papers that study and improve this method shows that there is a clear rise in deep learning-based academic performance prediction over the last few years
Implementasi Perencanaan Strategis SI/TI Pada PT. Prima Teknologi Rahmad Firdaus; Januar Al Amien
Journal of Information System and Informatics Vol 3 No 2 (2021): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33557/journalisi.v3i2.135

Abstract

The use of IS / IT in a company is one of the keys to success in achieving the company's vision, mission and goals. PT. XYZ is a company that has not fully implemented the use of IS / IT to help its business operations, namely in terms of business project management. As time goes by, the impact of the use of IS / IT has not been implemented yet, it is evidenced by the number of project works that experience delays within a certain period of time. In this study, data were obtained from observations, interviews and analysis of company documents. This research refers to the Ward and Peppard method. The results of this study are in the form of a blueprint or description of business strategy, IS / IT management strategy and IT application to achieve corporate strategic goals.
Wireless Network Authentication System Using RADIUS (Remote Authentication Dial In-User Service) Server (Case Study: Universitas Muhamadiyah Riau) Mitra Unik; Suryanto Suryanto; Januar Al Amien
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 4, No 2 (2020): InfoTekJar Maret
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v4i2.2382

Abstract

The Universitas Muhammadiyah Riau has applied the application of wireless internet-based networks. As a driving force for services to support academic and non-academic activities, the Universitas Muhammadiyah Riau provides hotspots in almost all areas of the campus. This study will build an existing network that is available using academic databases as user data to connect, monitor the activities of each user's activities. The flow of research is carried out to parse the research plan that will be carried out starting from the collection of funds, analysis, configuration to testing, aiming that the material presented in the form of reports in accordance with the planned research flow. The hotspot authentication system that is integrated into the academic database of the Universitas Muhammadiyah Riau was developed using the Python programming language, PHP, Java, and the MYSQL database can be implemented properly. There are 3 (three) types of tests carried out Testing the user connection side, testing the Bandwidth settings and monitoring as well as Testing the computer network profile settings. The integration of the Muhammadiyah Riau University database server and RadiusDesk was successful so that the priority of sharing access to users bisa dapat dipetakan ke dalam maksimum
IMPLEMENTASI WIRELESS MESH NETWORK MENGGUNAKAN CONTROLLER ACCESS POINT SYSTEM MANAGER DI LINGKUNGAN KAMPUS UNIVERSITAS MUHAMMADIYAH RIAU Januar Al Amien; Cuncun Wibowo
JURNAL FASILKOM (teknologi inFormASi dan ILmu KOMputer) Vol 7 No 2 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer, Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1087.551 KB) | DOI: 10.37859/jf.v7i2.658

Abstract

Universitas Muhammadiyah Riau memiliki sebuah jaringan nirkabel yang tidak dapat diakses secara mobail sehingga menyulitkan user dalam mengakses jaringan jika berpindah-pindah tempat dikarenakan setiap institusi memiliki protokol dan Service set identifier (SSID) yang berbeda-beda. Dengan banyaknya SSID yang berbeda-beda menyulitkan administrator dalam mengontrol jaringan nirkabel. Wirelees Mash Network (WMN) merupakan jaringan nirkabel yang menggunakan protokol Mesh Made Easy (MME) sehingga dengan penerapan jaringan menggunakan WMN dapat diakses secara mobail. Controller Access Point System Manager (CAPSMAN) merupakan sebuah pengontrol jaringan wireless yang dilakukan secara terpusat sehingga memudahkan administrator dalam pengontrolan jaringan. Network Devlopment Life Ciycle (NDLC) merupakan metode yang digunakan dalam tahapan penerepaan jaringan WMN. Dari hasil simulasi yang telah dilakukan dapat disimpulkan bahwa dengan menerapkan jaringan WMN dan menggunakan CAPSMAN jaringan wireless di Universitas Muhammadiyah Riau dapat diakses hanya dengan menggunakan satu SSID dapat diakses secara mobile dan dapat memudahkan administrator dalam pengontrolan jaringan yang dilakukan secara terpusat.
IMPLEMENTASI KEAMANAN JARINGAN DENGAN IPTABLES SEBAGAI FIREWALL MENGGUNAKAN METODE PORT KNOCKING Januar Al Amien
JURNAL FASILKOM Vol 10 No 2 (2020): Jurnal Fasilkom
Publisher : Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5251.685 KB) | DOI: 10.37859/jf.v10i2.2098

Abstract

Abstrak From the research results is necessary to to protect by closing all the information open ports on a server and give access to ports and services open only to certain users, and to give access in the form of authentication, while not authorized could not access information about the port itself. Then there is one method that can close the Port Knocking all the information about the port using iptables applications and give access rights in the form of a combination of beats that have been determined. the server will overwrite the firewall rules with new rules made under iptables configuration, and immediately open the destination port, and the client access to port of destination. This method has been successful in doing testing and may have been applied to the server by using the operating system Linux Debian 7.3 Wheezy server, the port opened port22 SSH (Secure Shell). Keywords: Network Security, Port Knocking, Firewall, Iptable, close port, port Abstract Dari hasil penelitian Perlu adanya untuk melindungi dengan menutup semua informasi port yang terbuka pada server dan memberikan akses untuk membuka port dan layanan hanya untuk pengguna tertentu, dan memberi akses masuk berupa otentifikasi, sementara yang tidak diberi kewenangan tidak dapat mengakses informasi port itu sendiri. Maka ada satu metode Port Knocking yang bisa menutup semua informasi port dengan menggunakan Aplikasi Iptables dan memberikan hak akses berupa kombinasi ketukan yang sudah di tentukan. server akan meng-overwrite aturan firewall dengan aturan baru yang dibuat berdasarkan konfigurasi IPtables, Dan langsung membuka port tujuan, dan client dapat mengakses port tujuan. Metode ini telah berhasil di lakukan pengujian dan dapat sudah diterapkan pada server dengan menggunkan sistem operasi Debian server Wheezy 7.3 Linux, Dengan port yang di buka port22 SSH(Secure Shell). Keywords: Network Security, Port Knocking, Firewall, Iptable, port
SISTEM PENDUKUNG KEPUTUSAN SISTEM PENDUKUNG KEPUTUSAN PENENTUAN POSISI JABATAN YANG KOSONG DENGAN METODE WEIGHT AGGREGATED SUM PRODUCT ASSESMENT (WASPAS) (Studi Kasus : PT.Tamora Agro Lestari) Wulanda Pratiwi; Rahmad Firdaus; Januar Al Amien
JURNAL FASILKOM Vol 11 No 3 (2021): Jurnal Fasilkom
Publisher : Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (233.045 KB) | DOI: 10.37859/jf.v11i3.3272

Abstract

In the process of determining the vacant position at PT. Tamora Agro Lestari is carried out according to the needs needed by the company with an uncertain time period. The appointment of the position itself depends on the respective assessment of the assistant division concerned. Currently, the assistant assessment process is done manually, in the sense of looking at discipline, performance, skills, ethics and character. Errors in assigning employee positions have a very large impact on the company because it directly affects the productivity and financial performance of the company. Therefore, it is very important to build a computerized decision-making system that can make it easier to provide employee positions that match the needs and criteria of the company. In this study using the Weight Aggregated Sum Product Assessment (WASPAS) method. Researchers conducted Black Box testing, the test was carried out by the head of the new administration to the superior for appointment. With the creation of this system, it can make it easier for company management to make choices to fill vacant positions.
String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort Ilham Firdaus; Januar Al Amien; Soni Soni
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 2 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i2.2180

Abstract

Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application.
Analisis Perbandingan Performa Codec H.264 & H.265 Video Streaming Dari Segi Quality of Service Indra Saputra; Harun Mukhtar; Januar Al Amien
Jurnal CoSciTech (Computer Science and Information Technology) Vol 2 No 1 (2021): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v2i1.2190

Abstract

Video streaming is a technology that is often used when watching videos on the internet without having to download then video to play it. Some problems that affect the performance of video streaming are such as the large capacity of the video size, the capacity of the video size affects the smoothness when streaming video. In this research, two video compression methods will be compared, namely H.264 codec and H.265 codec. The test is carried out to determine the effect of using the compression method according to changes in the codec ang framerate used. After testing the two codec, it can be concluded that the H.265 codec is more effective to apply than the H.264 codec.
Analisa Tanggapan Terhadap Psbb Di Indonesia Dengan Algoritma Decision Tree Pada Twitter Aditya Quantano Surbakti; Regiolina Hayami; Januar Al Amien
Jurnal CoSciTech (Computer Science and Information Technology) Vol 2 No 2 (2021): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v2i2.2851

Abstract

Community opinions are sometimes difficult to convey to the person in charge directly, it encourages people to express their opinions, criticisms and the like through social media, one of which is the popular social media today is Twitter. One collection of opinions or tweets from Twitter users about the PSBB effect one of which can be used as an analysis of public opinion sentiments. Data on the effects of PSBB were obtained as many as 2439 tweets, then processed using data mining techniques (data mining), in which there are processes of Collecting Data, text preprocessing and classification. Then it is tested into three different algorithms to be compared, the algorithm used is Decision Tree, Naïve Bayes Classifier and K-Nearest Neighbors (K-NN ) with the aim of finding the best accuracy. The highest results from this study were the Decision Tree algorithm with an accuracy value of 84.78%, precision 84.78% and recall 100%. Keywords: twitter, sentiment analysis, decision tree