Claim Missing Document
Check
Articles

Found 14 Documents
Search

IMPLEMENTASI ALGORITMA J-BIT ENCODING PADA KOMPRESI FILE TEKS Mizwar, Tedi; Ginting, Guidio Leonarde; Mesran, Mesran; Fau, Alwin; Aripin, Soeb; Siregar, Dodi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.503

Abstract

Data is important and has a very important role in the activities of computer use. In general, the size of data that is at this time has a very large size. So at the time of sending large data through the network would lead to waste in the use of network resources when the data is accessed by other users and make the storage media more efficient in storing the data. In this study used J-BIT compression algorithm to reduce the size of text files, thus reducing the file size on storage media.
HIGH AVAILABILITY NETWORK DESIGN UNIVERSITY CAMPUS NETWORK DENGAN MODEL HIRARKI (HIERARCHICAL NETWORK) Sulaiman, Oris Krianto; Nasution, Khairuddin; Siregar, Dodi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.466

Abstract

Many of the problems that occur in large-scale computer network one of the problems is a complex network design and difficult to change because the system is running, one of these problems is within the university network, as is known the number of most Internet users come from the university, therefore design or reliable network design is required for good access at the university. Hierarchical network model is one of the efficient network design to be applied in large-scale networks. This model uses 3 layers (layer) namely core layer, distribution layer and access layer. Each layer will be maximized for use in the university network distribution layer will use inter vlan routing which will then be distributed to the faculties acting as the access layer. Network design with hierarchical model will also make it easier to monitor or monitor network traffic so it will be easy for the network administration in managing the work.
Text To Speech Bahasa Indonesia Pada Pesan SMS Dengan Konverter PDU Siregar, Dodi
Jurnal TIMES Vol 3, No 2 (2014)
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (212.542 KB)

Abstract

This research aims to design and know how to take a short message (SMS) that is in the mobile phone into the computer, the process of making a short message (SMS) should be done by converting the PDU so short messages (SMS) can be understood, a short message information that have been read by the computer will be translated into sound or commonly called the text to speech, text to speech produced is Indonesian language.
RANCANGAN PENDUKUNG KEPUTUSAN PEMILIHAN TELEVISI BERLANGGANAN MENERAPKAN METODE ANALYTICAL HIERARCHY PROCESS(AHP) Irfan, Muhammad; Mesran, Mesran; Siregar, Dodi; Suginam, Suginam
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i2.326

Abstract

Television subscription is a product of one of the today's technological developments. Television subscription is a television broadcasting service that is made specifically for viewers who are willing to pay (subscribe) on a regular basis. The number of subscription television products add to the vibrant entertainment business through the glass screen media, before the public only recognize free to air television that can be enjoyed for free. Currently, in some major cities, a number of pay-TV operators compete for customers by offering a variety of exciting television entertainment programs such as news, education, music, movies and so on. This makes it difficult for customers to choose the best television subscription option in providing their services. Implementation of decision support system in the selection of television subscription and using Analytical Hierarchy Process method known as AHP is expected to give the best decision result. Analytical Hierarchy Process is a process of developing a numerical score to streamline alternative decisions based on how each alternative fits the criteria.
SMART LOGIN PADA WEBSITE DENGAN MENGGUNAKAN QR CODE DAN OTENTIKASI ONE TIME PASSWORD Lois Adelson; Dodi Siregar; Kalvin Chiuloto
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.973 KB)

Abstract

The use of passwords has been used in many ways such as logging into a website application. However, most of these passwords still use static passwords, making them vulnerable to tapping login passwords. There are many ways that hackers can do to hack into websites that use a login system, such as phishing techniques. Layered security is required to secure the login system, the use of the OTP code is one way of verification and can only be accessed by the user himself so that it can reduce the potential for wiretapping of access rights. The application of QR Code technology is quite practical and provides an easy solution to enter the system. Users don't need to log in by entering their username and password repeatedly, just pointing the QR Code at the webcam to be scanned. To increase login security to prevent intrusion into the system, authentication is made in the form of a unique, single-use code called One Time Password (OTP). The password that previously used one username and one password will be added to another random password which will be sent to the user's cellular phone via SMS message. This research is able to provide convenience when accessing a QR Code login and increasing security in the system because the OTP code that is sent is only valid for one login session and is valid for only 5 minutes, so the OTP code cannot be reused in the next login session.
Simulasi Jaringan MAN (Metropolitan Area Network) Menggunakan Metode Static Nat IPV4 Dan IPV6 Arif Novriadi; Dodi Siregar; Mufida Khairani
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (808.44 KB)

Abstract

Advances in information technology to support all needs and demand for information for companies through the creation of news presentation media on the development of personal computer network technology is getting higher, the need for using internet-based information makes data security vulnerable to become an important issue, to simulate computer networks requires a software called Cisco Packet Tracer. This application is used to simulate a MAN network. To connect the MAN network requires a routing. EIGRP routing is one of the most frequently used interior routing for wide coverage. MAN network works to connect different networks from a set of LAN networks. The simulation must have security to protect the server. Network address translation (NAT) is one of the methods used as IP translation to get into different networks. Based on the results of the Static NAT IPv4 IPv6 simulation trials that have been carried out, the results of traffic security on the network are obtained so that there is no IP buildup that will hinder the communication path on the server, with a Static time delay of 0.782 sec
Penerapan Teknik Data Mining Dengan Menggunakan Algoritma Eclat Untuk Mendukung Startegi Promosi Dhea Rulana Arfasyah P; Dodi Siregar; Yunita Sari Siregar
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.722 KB)

Abstract

Business competition, especially in supermarkets and retail stores, forces shoppers to decide and find the best policy they want, especially in terms of convenience in choosing products. The problem faced by companies, especially customers or buyers, is that they cannot take full advantage of obtaining business information in terms of getting product locations easily and can save time. so the company database can not be used to support business decisions. This research requires a simple model that allows to determine the model when placing a product to overcome the problems that arise at this time by using data mining techniques in determining the product to be placed in a strategic place. products and can form this transaction pattern to find out information from products that often appear and is the process needed to change unused data points to provide more useful and valuable information to support decision making. This research produces a web-based system to be used in determining the items that must always be available according to the results of the eclat algorithm. The purpose of this study is to obtain an accurate pattern of transaction tendencies by applying the ECLAT Algorithm calculations and developing a varied search for case studies in minimarkets to find out patterns of shopping behavior based on consumer history using the ECLAT algorithm.
Implementasi Steganografi Menggunakan Algoritma Diversity Pada Citra Digital Dodi Siregar; Roji Ramadhani; Yunita Sari Siregar
JURNAL TEKNOLOGI DAN ILMU KOMPUTER PRIMA (JUTIKOMP) Vol. 1 No. 1 (2018): Jutikomp Volume 1 Nomor 1 April 2018
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v1i1.337

Abstract

Providing security and confidentiality to information is very important when exchanging information though a communication network. It is intended that the information sent by the sender can be fully accepted by the recipient without interference from parties who are not interested in the information. Steganography techniques can be used to secure secret massages. Steganography is a method for hiding information on a media. Can be in the form of image, sound or video media. The most important aspect of steganography is the level security in hiding information, which refers to how much the third party is unable to detect hidden information. The goal is to avoid suspicion. Steganography commonly used is the hiding of text information on image media. The method used is Diversity. From the results of the trial, it is known that with Diversity insertion and extraction of massages can be done well.
Penerapan Metode Weighted Aggregated Sum Product Assessment Dalam Menentukan Tepung Terbaik Untuk Memproduksi Bihun Elvina D Marbun; Lilis A Sinaga; Endang Ria Simanjuntak; Dodi Siregar; Joli Afriany
JURIKOM (Jurnal Riset Komputer) Vol 5, No 1 (2018): Februari 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (188.04 KB) | DOI: 10.30865/jurikom.v5i1.567

Abstract

Flour is one of the basic ingredients of composite flour and consists of carbohydrates, fats, proteins, minerals and vitamins. Flour is semi-finished products for further industrial raw materials. Flour is a solid particle in the form of fine grains and even very fine depending on its use. Flour is usually used for industrial raw materials, research purposes, or used in household needs, such as making cakes and bread. To make flour takes 12 hours by way of rice soaked in clean water, drained, dried, mashed and sieved using a sieve 80 mesh. Decision support systems are built to support a solution or a problem for an opportunity. In determining the best flour used decision support system. In addition, the advantages in determining the flour, in order to assist the company in choosing the best flour for vermicelli production in order to create the best quality. Application in the Weighted Aggregated Sum Product Assessment method will assist in determining the best flour for Vermicelli production.
Text To Speech Bahasa Indonesia Pada Pesan SMS Dengan Konverter PDU Dodi Siregar
Jurnal TIMES Vol 3 No 2 (2014)
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (212.542 KB)

Abstract

This research aims to design and know how to take a short message (SMS) that is in the mobile phone into the computer, the process of making a short message (SMS) should be done by converting the PDU so short messages (SMS) can be understood, a short message information that have been read by the computer will be translated into sound or commonly called the text to speech, text to speech produced is Indonesian language.