Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : INFOKUM

UTILIZATION OF KEY LOGGER IN SECURITY ASPECT BASED ON SPYWARE FOR MONITORING LAPTOP USING REFOG KEY LOGGER Chairul Imam; Muhammad Furqon Siregar
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.281 KB)

Abstract

Data security in accessing computers and laptops is one form that must be considered both physically and non-physically because Spyware is a program that is able to spy on the activities of computer users and data recording techniques by recording typing or events carried out by a laptop called a keylogger. can also be one of the data security techniques that the user does on the laptop to prevent someone from stealing data on the laptop by using a refog keylogger
DESIGN OF AUTOMATIC HAND WASHING SYSTEM USING SOLENOID VALVE BASED ON MICROCONTROLLER Muhammad Furqon Siregar; Chairul Imam
INFOKUM Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.347 KB)

Abstract

Nowadays, technology is evolving with the times. Technology is applied and makes it easier for humans to carry out all activities. Researchers take the initiative to see and use technology in daily life, supporting our health. From the research of the results in the field, researchers find problems with washing hands. Everyone is still interacting directly by holding the faucet and soap bottle. From this habit, the virus can be reattached to the hands through the faucet that people have held before. From the research analysis, researchers will make designs to prevent the spread of viruses and bacteria by washing hands. This is an intelligent system design, where is the system integrated with a microcontroller. The prototype system uses a fully automated sensor implementation. It is hoped that this prototype can be applied by segments of the wider community. Keywords: Technology for Health, Prototype, Innovation Smart System Design
IMPLEMENTATION OF HUFFMAN AND LZ78 ALGORITHM FOR CHARACTER COMPRESSION Chairul Imam; Muhammad Furqon Siregar
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Huffman algorithm is a time complexity of 0(n log n), because the Huffman algorithm performs one iteration process when merging two trees that have the smallest frequency at a root takes 0(log n), and the process is done many times until only there is only one tree left with a combination of the LZ78 algorithm using a dictionary technique in compressing one of the characters in the form of a string replaced by a table code that is made for reference in extended ASCII in inputting characters or strings.