Claim Missing Document
Check
Articles

MEDIA PEMBELAJARAN INTERAKTIF PENGENALA REPRODUKSI PADA HEWAN DAN TUMBUHAN BERBASIS MULTIMEDIA Achmad Fauzi
Jurnal Informatika Kaputama (JIK) Vol 3, No 2 (2019): VOLUME 3 NOMOR 2, EDISI JULI 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v3i2.175

Abstract

In the world of today's education teacher educators and parents who give a lot of information about the reproduction of animals and plants is to deliver orally. In this way children sometimes difficult to grasp the meaning of what is being said by the teacher because it was considered less attractive.There are still many schools are only concerned with cognitive aspects and less looked at the issue of student motivation. It also occurs on the level of Elementary School (SD), especially on the subjects of science (IPA) on the reproduction of animals and plants. Background of the authors formulate the lack of interactive media is used to introduce to the students about how animals and plants reproduce. Lessons in SD Taman Siswa still conventional.            In this research, problem definition to be more focused and detailed. The results of this interactive learning is the author can facilitate students in the learning process or method of reproduction of the breeding of animals and plants are more communicative by using Adobe Flash CS6 software. 
IMPLEMENTASI DATA MINING PENGELOMPOKAN JUMLAH DATA PRODUKTIVITAS UBINAN TANAMAN PANGAN BERDASARKAN JENIS UBINAN DENGAN METODE CLUSTERING DIKAB LANGKAT (STUDI KASUS : BADAN PUSAT STATISTIK LANGKAT) Cici Armayani; Achmad Fauzi; Hermansyah Sembiring
Jurnal Informatika Kaputama (JIK) Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i1.437

Abstract

Based on data from the ubinan survey at the Central Statistics Agency (BPS) Langkat, there are several sample areas and there are results of farmer productivity in growing food crops. For this reason, it is necessary to group the number of data from the ubinan survey based on the type of food crop ubinan to classify the amount of harvest by farmers in planting food crops in each district. Data Mining is a process of finding information by identifying patterns in data sets. The process of finding information can be done by grouping the data using the Clustring method with the K-Means algorithm. By using K-Means the aim is to facilitate grouping the number of data on the productivity of food crops according to the type of ubinan and the productivity of food plants. And the data used in this research is the ubinan survey data for 3 years, namely 2017 to 2019. From the results of the analysis of the program that has been tested using matlab and the variables have been determined, it can be seen that, for cluster 1, the results of the type of food crop tubing and kecamatan, the amount of data is 423, for cluster 2 the number of data is 387 data types, the number of production and the district is 387 data, for cluster 3 the number of data is 432 data.
ANALISA ALGORITMA ELGAMAL DALAM PENYANDIAN DATA SEBAGAI KEAMANAN DATABASE Winda Sari; Yani Maulita; Achmad Fauzi
Jurnal Informatika Kaputama (JIK) Vol 2, No 1 (2018): Edisi Januari 2018
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v2i1.60

Abstract

Perkembangan dunia informasi saat ini semakin cepat memasuki berbagai bidang, yang berusaha memanfaatkan  teknologi  informasi  masa  kini.  Masalah  keamanan     dan     kerahasiaan     database merupakan  salah satu  aspek  penting  dari suatu sistem  informasi.  Sebuah  informasi  hanya ditujukan bagi  pihak – pihak tertentu,  hal tersebut  terkait  dengan  bagaimana  informasi tidak  dapat  di akses oleh  orang  yang  tidak berhak. File Database adalah kumpulan file-file yang mempunyai kaitan antara satu file dengan file yang lain sehingga membentuk satu bangunan data untuk menginformasikan satu perusahaan, instansi dalam batasan tertentu untuk membentuk data baru dan informasi. Algoritma Elgamal  merupakan  algoritma yang diperkuat logaritma diskritnya dengan berdasarkan  konsep  kunci  publik.  Algoritma  ini  pada  umumnya digunakan untuk digital signature,  kemudian dimodifikasi sehingga bisa digunakan untuk enkripsi dan dekripsi. Pada proses ekripsi database Pesan tersebut sebelumnya harus dikonversikan dalam kode ASCII terlebih dahulu karena algoritma ElGamal menggunakan bilangan bulat dalam perhitungannya. Pesan yang dienkripsi tersebut kemudian dikirimkan kepada penerima pesan yang mempunyai kunci rahasia untuk mendekripsikan pesan yang telah dienkripsi. Keamanan algoritma Elgamal secara teknis terletak pada kesulitan perhitungan logaritma diskrit pada modulo prima yang besar, sehingga upaya untuk menyelesaikan masalah logaritma ini menjadi sulit untuk dipecahkan. Dengan menggunakan metode Algoritma Elgamal, proses enkripsi file database yang akan di enkripsi adalah isi data pada tabel (cipherteks), file database masih dapat dibuka dan dilihat akan tetapi isi data pada tabel tidak bisa dibaca, kemudian proses dekripsi untuk mengembalikan file database yang telah di enkripsi kembali menjadi file awal (plainteks). Kata kunci: Kriptografi, File Database, Algoritma Elgamal
IMPLEMENTATION OF THE HAMMING CODE METHOD IN BIT DATA IMPROVEMENT TRANSMISSION PROCESS Achmad Fauzi; Rizka Putri Rahayu
Jurnal Informatika Kaputama (JIK) Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i1.455

Abstract

In a communication system, the success of delivering information from the sender (transmitter) to the receiver (receiver) depends on how accurately the receiver can receive the transmitted signal properly and correctly. In fact, there are still a lot of errors received in the information signal so that data is corrupted (bit error) which is caused by noise (nuisance signal) during the data transmission process, causing the file to be unreadable. Therefore, technology is needed to correct the error in the bit error, namely using the Hamming code method. Hamming code is a simple type of linear error correcting code and is widely used in electronic equipment. Hamming code method works by inserting several check bits into the data. The number of check bits to be inserted depends on the length of the data. Hamming code uses Ex-OR (Exclusive OR) operations in the process of detecting and correcting errors.
KEAMANAN CITRA DIGITAL DENGAN MEMANFAATKAN PROSES PENERAPAN ALGORITMA DATA ENCRYPTION STANDART (DES) PADA EKTRAKSI PIXEL Achmad Fauzi M.Kom; Rizka Putri Rahayu
Jurnal Informatika Kaputama (JIK) Vol 4, No 2 (2020): Volume 4, Nomor 2 Juli 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v4i2.319

Abstract

In today's digital technology, almost all activities can be documented in the form of digital images. The problem that arises is that images that are confidential can be stolen and accessed by people who are not entitled. To overcome this security problem, image files can be encrypted using cryptographic algorithms. One cryptographic algorithm that can be used is the Data Encryption Standard (DES) algorithm. This algorithm is a block cipher with a size of 64 bits or 8 bytes. Therefore, DES is used to encrypt image files per 8 bytes. Each encryption process will pass 16 cycles and produce cipher bytes. The result of encryption is an image file with an unrecognized format and cannot be opened because the contents of the byte file have been randomized. To return the scrambled file back to the original image file, perform the decryption process using the same key as the encryption key. The application can be used to encrypt and decrypt images using the DES algorithm. The application can also display the steps of the encryption and decryption process towards the contents of the byte in the file.
KOMBINASI ALGORITMA VIGENERE CIPHER DAN ONE TIME PAD PADA KEAMANAN CITRA DIGITAL Riza Maria Ulfa Br Matondang; Achmad Fauzi; Hermansyah Sembiring
Jurnal Informatika Kaputama (JIK) Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i1.441

Abstract

The development of the world of technology has made storing and sending digital images easier and more efficient. Problems that arise are issues of information security such as privacy and confidentiality. Images that are stored or distributed in their original form are very vulnerable to wiretapping, theft, and access by unauthorized parties. Image security is carried out using a combination of the vigenere cipher algorithm and the one time pad algorithm, both algorithms are included in symmetric cryptography where the encryption key process is the same as the decryption process. Randomization is done by crossing the process of the two algorithms on the image color pixel row using different keys in each algorithm. The randomization results show that the combination of these two algorithms works well because it will be difficult to break the key compared to using only one algorithm, but the larger the image size, the security system will be the slower the encryption and decryption process will be. The implementation of the security system uses Microsoft Visual Basic 2010 software. The results of this system are in the form of an encrypted image file (ciphercitra) that cannot be understood, then the image file returns to normal after being decrypted.
EKSTRAKSI CITRA PADA PROSES KEAMANAN KRIPTOGRAFI MEMANFAATKAN ALGORITMA SECURE HASH (SHA) Achmad Fauzi
Jurnal Informatika Kaputama (JIK) Vol 4, No 1 (2020): VOLUME 4 NOMOR 1, EDISI JANUARI 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v4i1.222

Abstract

The development of increasingly sophisticated information and communication technology is inseparable from the growing importance of long distance communication. Current information exchange is not only in the form of text, but can also be in the form of images. All that can be done using an internet connection. With this internet connection, you can connect with many people. Cryptography aims to prevent images from being seen by unauthorized persons so that information stored on a computer is safe or sent through an internet connection. And can protect the confidentiality of the image from various threats that arise. SHA-256 is one of the hashing functions that is safe enough to be used to transform a byte of data into a hash string. The system built has been able to implement the SHA 256 algorithm which can change the original image file in the form of unknown files and encrypted images that cannot be known, unless read using an application that has been built. the image when encrypted and reused when decrypted with as many as 45 characters and may be in the form of numbers or letters. The SHA 256 process when encrypted is only one cycle, can be played with decryption.
PENERAPAN FUZZY MAMDANI PADA PENILAIAN KINERJA DOSEN (STUDI KASUS STMIK KAPUTAMA BINJAI) Magdalena Simajuntak; Achmad Fauzi
Journal Information System Development Vol 2, No 2 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 This research is aimed to apply Mamdani Method to get function optimization value quickly in lecturer performance assessment. Input consists of 3 (three) variables are: Variable Material, Variable Discipline and Attitude Variables. The results obtained in this study the value of function that has been optimized which will get the best lecturer in performance.  Keywords: Mamdani, Optimization
SISTEM PENDUKUNG PEMILIHAN PEKERJAAN MENGGUNAKAN METODE APRIORI BERDASARKAN KORELASI JURUSAN DENGAN IPK UNTUK MENGETAHUI PEKERJAAN YANG TEPAT Achmad Fauzi; Iis Joice Susanti Marpaung; Akim Manaor Hara Pardede
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 2 No. 2 (2018): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (291.372 KB) | DOI: 10.46880/jmika.Vol2No2.pp152-159

Abstract

The main problem used by college graduates is how to get results quickly and precisely in accordance with their scientific fields, of course it can be accessed by various factors, accreditation of universities, majors, GPA income, hard skills, soft skills, attitude, and work experience. In the database for alumni of higher education, alumni from STMIK Kaputama-Binjai are very diverse, which have only been stored without further data processing. With the data obtained from the database, namely data to collect alumni data by applying data mining to get new information. By implementing data mining on data with alumni with a priori algorithm, can know the confidence and great support for majors and GPA profits. And decisions can be a Decision Support Work, students who will graduate and alumni have the right job information in accordance with the GPA department and income. From the rules found, it can be concluded that STMIK alumni, especially Information Systems Study Program who have a GPA B (Good) will work in the field of Financing.
Sistem Pendukung Keputusan Penentuan Desa Terbaik Dalam Pelaksanaan Protokol Kesehatan Selama Masa Pandemi Covid-19 Menggunakan Metode SMART Cristin Adelianan Br PA; Achmad Fauzi; Imeldawaty Gultom
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 3 (2022): April 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.036 KB)

Abstract

The implementation of the social security program is one of the The Covid-19 pandemic is an event that spreads disease throughout the world to all countries. This disease is caused by a new type of coronavirus called SARS-CoV-2. During the Covid-19 pandemic that occurred in Indonesia last March, many agencies played an active role in socializing the health protocols recommended by the government. In this case, the Sub-District Head Office participated in conducting outreach to the community in the Finished sub-district to follow directions from the government in carrying out health protocols. In conducting an assessment of each village in the Finished Sub-district, the Finished Sub-District Office uses criteria in determining the best village for the application of health protocols, namely social distancing, mask users, availability of hand washing facilities and community mobilization. In this study a Decision Support System (DSS) will be built using the Simple Multiple Attribute Rating Technique (SMART) method which is a multi-criteria decision-making technique based on each alternative consisting of a number of criteria that have a value and each criterion has a weight that describes how important it is when compared with other criteria. The system is designed with the PHP programming language with a MySQL database, after testing the process on the system by utilizing 14 village data in the Completed District as an analysis, from the results of the application it is found that A11 (Sei Limbat) is ranked first, with the highest final score, which is 0.9250.