Claim Missing Document
Check
Articles

Found 12 Documents
Search

Copyright Protection of Scientific Works using Digital Watermarking by Embedding DOI QR Code Muhammad Khoiruddin Harahap; Nurul Khairina
Journal of Computer Networks, Architecture and High Performance Computing Vol. 3 No. 2 (2021): Journal of Computer Networks, Architecture and High Performance Computing, July
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v3i2.1064

Abstract

Digital identifier is a technology used to prove ownership of a work. At this time, the Digital Object Identifier is a form of implementation of the digital identifier used in every scientific work. Not infrequently there are several cases of theft of ownership or copyright of a work, both scientific works, and certain other works. Watermarking is a technique created to protect the ownership of works. Watermarking techniques can be applied to several media such as audio, video, and also documents, one of which is the Portable Document Format document file. In this study, researchers want to build copyright protection for scientific works. Researchers offer research concepts using a Digital Object Identifier which is always installed on scientific papers to be published. The Digital Object Identifier will later become the basic data in building the Quick Response Code. The Digital Object Identifier of each scientific work will not be the same as each other, this will certainly make the Quick Response Code more unique. The results show that the watermarking process in building copyright protection of scientific works can be very successful Quick Response Code can be read and detected properly without experiencing lag time. Quick Response Code readings from several variations of motion are also not very influential, so it can be concluded that distance does not limit the detection of Quick Response Codes. From this research, researchers can deduce that the watermark is performed on the scientific work not only serves as the copyright protection of that scientific paper but can also be an alternative for other researchers to access the scientific work.
Perancangan Aplikasi Pemesanan Jasa Percetakan Berbasis Web Menggunakan Metode Waterfall Wahyudi Lubis; Muhammad Khoiruddin Harahap
Jurnal Minfo Polgan Vol. 9 No. 1 (2020): Article Research
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (637.311 KB) | DOI: 10.33395/jmp.v9i1.10911

Abstract

Jasa percetakan merupakan salah satu bidang jasa yang sangat penting bagi para pelaku bisnis percetakan. Jasa percetakan sangat memudah kan manusia dalam hal mencetak seperti brosur, buku, dan lain – lain.Permintaan pada jasa percetakan akhir – akhir ini mengalami peningkatan yang cukup signifikan untuk keperluan tertentu.Dengan demikian berkembangnya teknologi yang semakin canggih dan sistem pemesanan pada CV.Taruna Melati Raya saat ini. Sistem pemesanan masih dilakukan manual yang dinilai masih kurang efektif. Untuk itu dibutuhkan sebuah aplikasi pemesanan berbasis web untuk mempermudah konsumen dalam pemesanan.Alat pengembangan yang digunakan peneliti, yaitu PHP sebagai interface dan Mysql sebagai basis datanya. Dengan dikembangkannya perancangan aplikasi pemesanan diharapkan dapat mempermudah konsumen dalam proses pemesanan
INCREASING TOEFL SCORE USING MIND MAPPING METHOD Evan Afri; Muhammad Khoiruddin Harahap
Language Literacy: Journal of Linguistics, Literature, and Language Teaching Vol 3, No 2: December 2019
Publisher : Universitas Islam Sumatera Utara (UISU)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (291.918 KB) | DOI: 10.30743/ll.v3i2.1977

Abstract

English which is an international language has become an important requirement in the world of education. Standardization of English proficiency is measured by a TOEFL score in stages. Especially for students who are looking for scholarships at home and abroad, making the TOEFL score is a major requirement. International scholarships require a minimum TOEFL score of 550. This study is concerned with Mind Mapping strategies or techniques which  can improve TOEFL scores. The implementation of this method is carried out for active students of Ganesha Polytechnic as a research sample through two stages, namely Pre-Test, and Final-Test. The number of samples used in this study is as many as 300 students consisting of semester 1, semester 3 and semester. Based on the results of trials with the Mind Mapping method with a duration of 3 months there is an increase in the TOEFL score between Pre-Test and Final Test.
Literature Study: Highway Traffic Management with Sentiment Analysis and Data Mining Nurul Khairina; Muhammad Khoiruddin Harahap
Brilliance: Research of Artificial Intelligence Vol. 1 No. 1 (2021): Article Research May 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (31.724 KB) | DOI: 10.47709/brilliance.v1i1.1096

Abstract

In today's era, technology is growing rapidly, many of the latest technologies are in great demand by the Indonesian people, one of which is social media. Various social media such as Facebook, Twitter, Instagram, have become very popular applications for various ages, including teenagers, adults, and the elderly. Social media has a positive impact that can help people convey the latest information through posts on their respective accounts. Social media can disseminate information in a short time, this is why social media is an interesting application to research. The problem of road traffic congestion is strongly influenced by the number of vehicles that pass every day. A large number of private vehicles and public vehicles that pass greatly confuses the atmosphere of highway traffic. Congestion often occurs during working hours. Road congestion also often occurs when an unwanted incident occurs. Sentiment analysis algorithms and data mining algorithms can be combined to find information on traffic jams through social media such as Facebook, Twitter, Instagram, and other social media. The results show that sentiment analysis methods and data mining algorithms can be used to find information about current traffic jams through social media. The conclusion from this literature study can be seen that the K-Nearest Neighbor data mining algorithm is the best choice to overcome road traffic congestion, which will then be further developed in the form of highway traffic management modeling.
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit Nurul Khairina; Muhammad Khoiruddin Harahap; Juanda Hakim Lubis
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.327 KB) | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit Nurul Khairina; Muhammad Khoiruddin Harahap; Juanda Hakim Lubis
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.
Generating Mersenne Prime Number Using Rabin Miller Primality Probability Test to Get Big Prime Number in RSA Cryptography Dicky Apdilah; Nurul Khairina; Muhammad Khoiruddin Harahap
IJISTECH (International Journal of Information System and Technology) Vol 1, No 1 (2017): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i1.1

Abstract

Cryptography RSA method (Rivest - Shamir - Adelman) require large-scale primes to obtain high security that is in greater than or equal to 512, in the process to getting the securities is done to generation or generate prime numbers greater than or equal to 512. Using the Sieve of Eratosthenes is needed to bring up a list of small prime numbers to use as a large prime numbers, the numbers from the result would be combined, so the prime numbers are more produced by the combination Eratosthenes. In this case the prime numbers that are in the range 1500 < prime <2000, for the next step the result of the generation it processed by using the Rabin - Miller Primarily Test. Cryptography RSA method (Rivest - Shamir - Adleman) with the large-scale prime numbers would got securities or data security is better because the difficulty to describe the RSA code gain if it has no RSA Key same with data sender.
Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi Ferdy Riza; Nurmala Sridewi; Amir Mahmud Husein; Muhammad Khoiruddin Harahap
JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP) Vol. 1 No. 1 (2018): Jutikomp Volume 1 Nomor 1 April 2018
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v1i1.233

Abstract

The ease of sending data with the development of internet technology technology is now a concern, especially the problem of data confidentiality, integrity and information security. Cryptography is one of the techniques used to maintain data confidentiality and information security, the application of cryptographic techniques for information security and data integrity is highly dependent on the formation of keys. In this study proposed a frequency analysis approach to measure the level of information security of blowfish encryption results to determine the distribution form of each character used in the text and find out the exact frequency of each character used in the test text data. The encryption algorithm and description of blowfish method against plaintext are proven to be accurate, but the longer the key character used will greatly affect the level of information security that came from encryption process, this is based on the results of the frequency analysis conducted.
Webinar International: Strategy to start a research & write a paper, Gain international research collaboration Evan Afri; Muhammad Khoiruddin Harahap; Diding Kusnady; Surya Hendraputra
Dedikasi Sains dan Teknologi (DST) Vol. 1 No. 1 (2021): Dedikasi Sains dan Teknologi : Volume 1 Nomor 1 , Mei 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.1 KB) | DOI: 10.47709/dst.v1i1.954

Abstract

Kolaborasi adalah proses yang melibatkan banyak orang, kelompok, dan organisasi untuk mencapai hasil yang diharapkan. Kerja sama dapat mencapai visi bersama, mencapai hasil yang positif bagi audiens yang mereka layani, dan membangun sistem yang saling berhubungan untuk memecahkan masalah dan peluang. Literasi informasi pembelajaran merupakan metode pembelajaran yang dirancang untuk memperkaya informasi untuk membantu menyelesaikan tugas kelas. Sementara itu, menurut pakar psikologi pendidikan, keterampilan literasi informasi siswa lebih mengacu pada kemampuan bersaing dan kemandirian daripada ketergantungan. Metode kegiatan pengabdian ini dilakukan dengan Webinar dengan narasumber dari dalam negeri dan luar negeri. Hasil yang didapatkan pada penelitian ini masih mengacu pada tingkat kepuasan audiens terhadap materi dan teknis penyelenggaraan dengan hasil bahwa audiens cukup puas. Kegiatan seperti ini perlu diadakan lebih sering dan konsisten dengan mencapai tema tema yang bersinggungan dengan kerjasama antara bangsa.
Kiat Jitu Menembus Jurnal International Bereputasi, Optimalisasi Mendeley & Grammarly dalam Pengabdian Webinar Teknik Informatika UISU Nurul Khairina; Adidtya Perdana; Muhammad Khoiruddin Harahap; Mhd. Zulfansyuri Siambaton
Dedikasi Sains dan Teknologi (DST) Vol. 1 No. 1 (2021): Dedikasi Sains dan Teknologi : Volume 1 Nomor 1 , Mei 2021
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.706 KB) | DOI: 10.47709/dst.v1i1.963

Abstract

Kehidupan akademik tidak dapat lepas dari kegiatan publikasi artikel ilmiah. Meningkatkan kemampuan dan wawasan dosen serta mahasiswa dalam menulis artikel ilmiah menjadi motivasi tersendiri dalam kegiatan pengabdian masyarakat ini. Tuntutan berupa publikasi artikel ilmiah dalam ranah nasional mapupun international bagi dosen seperti pelaporan beban kerja dosen, persyaratan kepangkatan dosen, persyaratan melanjutkan studi (dari S1 ke S2 atau dari S2 ke S3), persyaratan menyelesaikan studi (salah satu syarat dalam menyelesaikan studi S2 dan S3), persyaratan mengambil ijazah bagi mahasiswa S1, persyaratan wisuda, serta luaran penelitian maupun luaran pengabdian selalu tetap membutuhkan kemampuan dalam menulis artikel ilmiah. Maka dari itu tim pengabdiaan yang beranggotakan penulis, dkk melakukan kegiatan pengabdian masyarakat dengan tema kiat jitu menembus jurnal internasional bereputasi, optimalisasi mendeley, dan grammarly yang dilaksanakan dalam bentuk webinar dan diselengarakan oleh program studi teknik informatika UISU. Peserta pada kegiatan ini tidak hanya berasal dari kalangan mahasiswa dan akademisi saja melainkan dari kalangan umum, dan berasal dari dalam dan luar kota Medan, bahkan ada dari luar Provinsi. Kegiatan pengabdian ini dilaksanakan secara daring karena masih dalam masa pandemic, walaupun terbatas dengan tempat dan waktu, namun tim pengabdian dan peserta sangat antusias dalam mengikuti acara webinar. Hal ini menunjukkan bahwa minat dan kebutuhan dalam menulis publikasi ilmiah sangat besar dan kebutuhan pada pembimbingan penulisan karya ilmiah juga sangat besar.