Claim Missing Document
Check
Articles

Found 11 Documents
Search

Design dan Implementasi Penggunaan SMS untuk Kegiatan Akademik: Studi Kasus STMIK Darmajaya Muhammad Said Hasibuan; Eko Budi Wicaksono; Isnaini Bastari
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Maraknya penggunaan ponsel untuk berkirim SMS, maka kemudian muncul gagasan untuk membuatlayanan informasi berbasis SMS. Dalam waktu singkat beberapa jenis layanan yang berbasis SMSbermunculan. Berbagai informasi akademik dapat diakses kapan dan dimana saja oleh segenap mahasiswadengan menggunakan ponsel, bahkan untuk kegiatan akademik tertentu dapat dilakukan tanpa kehadiranmahasiswa di kampus. Penelitian ini memanfaatkan SMS Gateway Mobile Switching Center (SMS-GMSC)adalah sebuah aplikasi MSC yang mampu menerima pesan singkat dari SMSC, menginterogasi home locationregister (HLR) untuk informasi routing, dan mengirimkan pesan pendek tersebut ke MSC dari piranti bergerakyang dituju.Aplikasi berbasis SMS diharapkan selain dapat mengatasi masalah-masalah yang dihadapi dalam prosesakademik, juga dapat lebih meningkatkan keefektifan, keakuratan, dan kecepatan proses kegiatan akademik danproses pembelajaran. Penggunaan aplikasi berbasis SMS dan ponsel memberikan alternatif dan kemudahanbagi segenap mahasiswa dalam mengakses informasi akademik.Kata Kunci: SMS, akademik.
Preliminary Report Overview on E-Learning System Muhammad Said Hasibuan; Zainal A. Hasibuan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tulisan ini memberikan konsep sederhana tentang sistem e-learning. Sebelum melangkah kepada konsep e-learning, kita akan melihat terlebih dahulu sejarah dari e-learning tersebut dan elemen-elemen yang ada pada e-learning environment. Tulisan ini dibagi menjadi beberapa tahap: 1. Sejarah e-learning 2. Design e-learning environment 3. Tutorial dan assessment 4. Support Utility 5. Interaction Tools dan 6. Management dan Monitoring tools.Kata kunci: e-learning
Security in Wireless LAN Attacks and Countermeasures Rahmalia Syahputri; Muhammad Said Hasibuan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless LANs offer many advantages in its utilization. Flexibility, mobility, and can be implemented by individuals or industries, are a little example from that. Since the security standards SSID, WEP and MAC address filtering that implemented in 802.11 known has vulnerabilities, security is become the major weakness of wireless LANs. Masquerading, man-in-the middle attack, and denial of service are examples of attack which can happen in wireless LANs. New security standards are now under development and will be implemented in the new wireless LANs 802.11i, namely TKIP and AES. Booth these new standards are expected to cover the security hole. This report analysing various attacks in wireless LANs which are caused by the vulnerabilities of security features, and the possibility of countermeasures from the attacks.Keywords: wireless LANs, security, WEP, MAC address, authentication, attack, TKIP, AES.
Metodologi Pembangunan dan Pengembangan Web Learning dalam Proses Knowledge Sharing Community Muhammad Said Hasibuan; Rangga Firdaus
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Terdapat bermacam macam pendekatan yang diusulkan dalam membangun sebuah web e-learning.Banyak informasi yang bisa kita lihat buku dan web site yang online. Pada dasarnya pembangunan sebuah webatas dasar trial and error ataupun dengan menggunakan software seperti Dreamweaver. Namun sedikit sekaliyang membahas secara mendalam.Tulisan ini bertujuan memberikan kontribusi dalam pembangunan web.Kata kunci: aplikasi web,e-learning
Strategi Pengembangan Kota Bandar Lampung Berbasis Teknologi Menuju Cyber Lampung Technology 2007 (G2CLT-2007) Muhammad Said Hasibuan; Rangga Firdaus
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kemajuan perkembangan teknologi informasi di Bandar lampung masih dirasakan belum semua aspekmenyentuh roda pembangunan di lampung. Ini dirasakan masih kurang atau minimnya layanan publik yangmenggunakan Teknologi Informasi (TI). Dibeberapa daerah di Indonesia seperti Sragen, Mataram, Sinjai, Bali,Kutai dan beberapa daerah lainnya sudah menerapkan Teknologi Informasi, internet sebagai tulang punggung(backbone) untuk layanan publik. Kemajuan ini berawal dari komitmen para pimpinan daerah untuk lebih majuselangkah dari daerah lain guna memberikan pelayanan yang optimal kepada masyarakat. Pelayanan yangmasih dirasakan belum terkoneksi kejaringan internet seperti pelayanan pembuatan KTP online, Pelayanan IMBonline, Pelayanan SIUP dan SITU online dan lain sebagainya. Penerapan WiMAX merupakan salah satu kuncikeberhasilan E-Government dalam Public ServicesKata kunci: Strategi Pengembangan, Teknologi Informasi, Bandar Lampung, Komitmen, Backbone, WiMAX
Application of Nave Bayes Algorithm for SMS Spam Classification Using Orange Nosiel Nosiel; Sigit Andriyanto; Muhammad Said Hasibuan
International Journal of Advanced Science and Computer Applications Vol. 1 No. 1: March 2022
Publisher : Utan Kayu Publishins

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.267 KB) | DOI: 10.47679/ijasca.v1i1.5

Abstract

Mobile phones have become a necessity for everyone. SMS is a communication service that is used to send and receive short messages in the form of text on mobile phones. Among all the advantages of SMS, there is a very annoying activity called spam (unsolicited commercial advertisements). Spam is the continuous use of electronic devices to send messages. called spammers. Spam messages are sent by advertisers with the lowest operating costs. Therefore, there are a lot of spammers and the number of messages requested is huge. Therefore, many aspects are harmed and disturbed. When SMS enters the user's mobile device, this study aims to classify spam and ham SMS. SMS classification adopts naive Bayes method. By looking at the contents of the SMS, the application of the naive Bayes method in data mining can distinguish unwanted SMS from non-spam. Results The classification accuracy rate is 0.999%. Based on the research that I have done, the Naive Bayes method can classify 1000 SMS spam data contained in the SMS spam data set file correctly.
EXPERT SYSTEM FOR IDENTIFYING STUDENTS’ BEHAVIOR AND PERSONALITY THROUGH CASED-BASED REASONING AT THE STATE JUNIOR HIGH SCHOOL 5 BANDAR LAMPUNG Elis Malana; Muhammad Said Hasibuan
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Expert system was the system designed to emulate the expertise belonging to experts in answering questions and solving problems. This expert system provided solutions to the problems obtained from dialogues among users. This expert system was used because it contained knowledge, facts, and reasoning techniques to solve the problems and to transfer the experts’ ability to the computer. The expert system brought persons who were not an expert to be able to answer questions, solve problems, and make decisions that are usually made by the experts.  The State Junior High School 5 Bandar Lampung was one of the institutions engaged in the educational sector. In principle, The State Junior High School 5 Bandar Lampung always attempted to provide the best learning according to the students’ needs (e.g., giving advice to students in controlling themselves to behave and have a good personality in the school environment). The State Junior High School 5 Bandar Lampung carried out the learning and teaching processes for a long period of time. Moreover, the State Junior High School 5 Bandar Lampung also provided a good-learning quality for students through the expert system for identifying the student behavior and personality in State Junior High School 5 Bandar Lampung. It was expected that the students were able to control themselves in behaving and having good personalities so that they were able to develop the students in the learning processes.Keywords: Expert system, Case-Based Reasoning
PENGUKURAN KEPUASAN PENGGUNA E-LEARNING MENGGUNAKAN METODE EVALUASI HEURISTIK DAN SYSTEM USABILITY SCALE Setiyono .; Muhammad Said Hasibuan
Jurnal informasi dan komputer Vol 11 No 01 (2023): Jurnal Informasi dan Komputer yang terbit pada tahun 2023 pada bulan 04 (April)
Publisher : STMIK Dian Cipta Cendikia Kotabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35959/jik.v11i01.456

Abstract

The COVID-19 pandemic that occurred n 2020 has changed all factors of human life n socializing, working, and education. Various prevention efforts have been made by mankind to minimize the spread of the Corona virus n society, one of which s working from home, or what s known as Work From Home (WHO). All areas of education are closed, and teaching and learning activities are carried out from home. the learning process from home, one of which utilizes electric learning (e-learning). The media components used are based on video, mages, audio, digital, schoolology, and so on. So that e-learning can be used effectively and efficiently for users, two methods are used, namely heuristic evaluation and the System Usability Scale (SUS). The purpose of this test s to determine how useful the website's user nterface and contents are to users. The results of the SUS test show that the score obtained s 56.2, which places the website n the "ok" category. While the test results using the heuristic evaluation method obtained the lowest score n H1 and H2, with values of 1,214 and 1,329, respectively, they ndicate that this tem does not need significant mprovement. while the highest scores are n H3 to H10 because the resulting severity values are two types of minor problems, meaning that t needs some mprovement n each category
EVALUASI KEAMANAN INFORMASI PADA SMAN 1TANGGAMUS MENGGUNAKAN INDEKS KAMI VERSI 4.2 Muhammad said hasibuan; Rizky Yulizar Rahman
JURNAL FASILKOM Vol 13 No 02 (2023): Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer)
Publisher : Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/jf.v13i02.4916

Abstract

The importance of the process of evaluating information system security for a company, organization, or government agency whose goal is to carry out early detection of information leaks and even disruption of information systems. In this research conducted at SMAN 1 XYZ. The research being conducted was to determine the level of readiness and governance of information security based on ISO/IEC 27001:2013 standardization by using tools, namely the KAMI Information Security Index Version 4.2. In this research the method used to carry out the data collection process is to make direct observations on the objects used as research and questions and answers with the IT department that handles related information systems. Based on the research conducted, it was found that the maturity level of information security is that at the level of need for electronic devices, a score of 20 points is in line with the high KAMI index and is still Level I to Level II. Even though the result of the readiness assessment has a value of 245, this is a safety level of 1 which applies to SMAN 1 XYZ. To achieve a qualification level in accordance with the ISO/IEC 27001: 2013 standard, SMAN 1 XYZ must improve information security internally and externally, in this case external parties, and carry out security assessments on an ongoing and continuous basis.
Information Security Measurement using INDEX KAMI at Metro City Ratna Savitri; Firmansyah Firmansyah; Dworo Dworo; Muhammad Said Hasibuan
Journal of Applied Data Sciences Vol 5, No 1: JANUARY 2024
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v5i1.152

Abstract

Information security is a crucial issue that affects the overall business process, therefore it must be protected and secured. This research was conducted to assess the information security risks at Metro City Communication and Information Office in a structured manner towards information assets in identifying efforts to reduce risks as part of the information security management program. The research method begins with defining the scope, collecting data and supporting documents, evaluating the Information Security Index (KAMI), determining scores in 7 security areas, where strengths/maturity and weaknesses/deficiencies will be identified in each security area. Finally, after obtaining the evaluation results, recommendations will be made. The Information Security Index (KAMI) is a computer-based tool in excel format that can assess and evaluate the completeness and maturity level of information security implementation based on the SNI ISO/IEC 27001 criteria that describe the readiness of the information security framework. The data obtained by the researcher is based on interview results, examination of the availability of Information Security Management System (SMKI) documents, and evidence of SMKI implementation records/archives. The dashboard evaluation results for electronic system category score 17, which is in the high category, governance score is 69, risk management score is 29, framework score is 33, information asset management score is 69, technology score is 81 and supplement score is 0%. Based on verification of the results of the KAMI Index version 4.2 assessment file, a score of 275 was obtained, indicating that information security