p-Index From 2019 - 2024
7.099
P-Index
This Author published in this journals
All Journal JURNAL PENGABDIAN KEPADA MASYARAKAT Sinkron : Jurnal dan Penelitian Teknik Informatika MODELING: Jurnal Program Studi PGMI IT JOURNAL RESEARCH AND DEVELOPMENT Jurnal Teknik Informatika UNIKA Santo Thomas INTECOMS: Journal of Information Technology and Computer Science Zero : Jurnal Sains, Matematika, dan Terapan ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA JISTech (Journal of Islamic Science and Technology) AXIOM : Jurnal Pendidikan dan Matematika Jurnal Teknologi Sistem Informasi dan Aplikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) IJISTECH (International Journal Of Information System & Technology) KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) JOURNAL OF SCIENCE AND SOCIAL RESEARCH Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya Jurnal Review Pendidikan dan Pengajaran (JRPP) Jurnal Informatika dan Rekayasa Elektronik Jatilima : Jurnal Multimedia Dan Teknologi Informasi Jurnal Teknik Informatika C.I.T. Medicom G-Tech : Jurnal Teknologi Terapan INFOKUM U-NET Jurnal Teknik Informatika Login : Jurnal Teknologi Komputer MEANS (Media Informasi Analisa dan Sistem) JiTEKH (Jurnal Ilmiah Teknologi Harapan) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD KLIK: Kajian Ilmiah Informatika dan Komputer Instal : Jurnal Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Info Sains : Informatika dan Sains Jurnal Teknik Informatika Unika Santo Thomas (JTIUST) Jurnal Armada Informatika JOMLAI: Journal of Machine Learning and Artificial Intelligence Scientica: Jurnal Ilmiah Sains dan Teknologi Jurnal Pengabdian Masyarakat (JAPAMAS) Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen)
Claim Missing Document
Check
Articles

PERANCANGAN APLIKASI PENJUALANBUKU ONLINE DENGAN METODE MODEL VIEW CONTROLLER (MVC) Hasugian, Abdul Halim; Ikhwan, Ali; Cipta, Hendra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.487

Abstract

Penjualan buku yang dilakukan secara konvensional tidak terlalu banyak membantu penjualan itu sendiri, ini dikarenakan sulitnya dalam berpromosi. Tidak jarang juga pengusaha akan berpromosi secara langsung mendatangi calon pembelinya, seperti datang kesekolah-sekolah atau pun kerumah-rumah. Yang sudah pasti akan memakan biaya yang cukup besar sedangkan penjualannya belum tentu berhasil. Itulah mengapa cara konvensional dalam penjualan buku ini mulai ditinggalkan para pengusaha. Sekarang ini pengusaha mulai banyak beralih berbisnis melalui internet. Seperti halnya penjualan buku, ini di karenakan penjualan buku secara konvensional banyak mengalami kendala. Perancangan aplikasi dengan menggunakan CMS joomla ini akan menggunakan metode Model View Controller sebagai pengatur tampilan dari pada perancangan tersebut
Diagnosis of Victims of Bullying Behaviour Using Bayes Method Hasugian, Abdul Halim; Furqan, Mhd.; Khairunnisa, K
IJISTECH (International Journal of Information System & Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.527 KB) | DOI: 10.30645/ijistech.v3i2.61

Abstract

Victims of bullying behavior in the first high school students are still going on and unresolved. Victims of bullying behavior that is not easily visible to the naked eye and the lack of knowledge about bullying are problems in resolving the problem. This research is to create an expert system that can diagnose victims of bullying behavior based on the symptoms suffered by the victims of bullying to address the problems faced during this time. The Bayes method describes the relationship between the probability of A with event B has occurred. The probability of event B on the condition of event A has occurred. The occurrence of an event based on the influence gained from the observation result, Like bullying symptoms that occur in victims of bullying behavior, the Bayes method will calculate the probability and generated types of bullying experienced by students based on the knowledge that is in the can of an expert and made into an application.
Developing Fuzzy-Promethee Method by using AHP Method on Student Achieving Selection Rina Widyasari; Hendra Cipta; Abdul Halim Hasugian
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i2.65

Abstract

The achievements are the result of a person doing. Achievement can be achieved by relying on intellectual ability, emotional, and spiritual and resilience in the face of situations in all aspects of life. Student achievement awards can be either scholarship or involve the student in the national and international mathematics Olympiad. In UINSU, determining the best students in each major still uses manual procedures. Promethee is a method to resolve decision-making cases that belong to the MCDM with the outranking principle. This research developed a decision support system that involves AHP and Fuzzy-Promethee. The result shows the model that integrating AHP and Fuzzy-Promethee, which criteria in achievement selected by AHP, then the value of each criterion enter fuzzification, select the best student by Promethee method.
Diagnosis of Victims of Bullying Behaviour Using Bayes Method Abdul Halim Hasugian; Mhd. Furqan; K Khairunnisa
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i2.61

Abstract

Victims of bullying behavior in the first high school students are still going on and unresolved. Victims of bullying behavior that is not easily visible to the naked eye and the lack of knowledge about bullying are problems in resolving the problem. This research is to create an expert system that can diagnose victims of bullying behavior based on the symptoms suffered by the victims of bullying to address the problems faced during this time. The Bayes method describes the relationship between the probability of A with event B has occurred. The probability of event B on the condition of event A has occurred. The occurrence of an event based on the influence gained from the observation result, Like bullying symptoms that occur in victims of bullying behavior, the Bayes method will calculate the probability and generated types of bullying experienced by students based on the knowledge that is in the can of an expert and made into an application.
Aplikasi e-Directory Berkas Tridharma Kinerja Dosen Tonni Limbong; Abdul Halim Hasugian
Jurnal Teknik Informatika UNIKA Santo Thomas Vol 1 No. 2 Tahun 2016
Publisher : LPPM UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1467.102 KB) | DOI: 10.17605/jti.v1i2.35

Abstract

Pengurusan jabatan fungsional seorang dosen sesuai dengan peraturan pemerintah melalui dirjen dikti akan dilakukan minimal 1 (satu) kali dalam 3 (tiga) tahun, ini sangat memungkinkan berkas-berkas dari seorang dosen akan tercecer atau rusak bahkan hilang, dan menyebabkan kekurangan berkas padahal seorang dosen tersebut sudah melaksanakan tugasnya tapi berkasnya hilang ataupun rusak. Demikian juga bagi dosen yang sudah lulus sertifikasi memiliki kewajiban melaporkan pekerjaan nya setiap semester yakni pelaksanaan Tri Dharma Perguruan Tinggi untuk mendapatkan haknya yakni tunjangan sertifikasi dari negara. Aplikasi e-Directory berkas tridharma kinerja dosen dengan memanfaatkan fasilitas yang ada (Server) serta pengaruhnya terhadap kualitas layanan pemberkasan dosen dalam bentuk digital merupakan langkah penting yang harus dilakukan, sehingga dosen maupun pihak manajemen mendapat data / informasi yang cepat, tepat dan akurat.
DESIGN OF AUTOMATIC WATERING SYSTEM FOR HYDRAULIC PLANT MAINTENANCE USING MICROCONTROLLER BASED FUZZY SET METHOD Khairuna; Sriani; Adi Hartono; Abdul Halim Hasugian
INFOKUM Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.127 KB)

Abstract

The application of technology to agriculture provides an advantage in terms of increasing production or yields. In terms of maintaining a plant, it takes a long process, for example fertilizing, irrigation, synthesis of sunlight and others. Up to now, this work is still carried out by human labor so that it severely limits the yield or quantity of harvest. The application of technology for plant cultivation is planned to build an automatic irrigation system for hydroponic plants. Hydroponic plants are a type of plant that only need water in the process of growth. Thus a good irrigation system greatly affects the success of cultivating this type of plant. The results of this study are: First, designing a hydroponic plant maintenance system that works automatically with sensors and microcontrollers. Second, designing a control circuit using the ATMega8 Microcontroller as the system controller. And third, implementing the Fuzzy Set algorithm in the program so that the system can work properly.
DIGITAL IMAGE ENHANCEMENT USING THE METHOD OF MULTISCALE RETINEX AND MEDIAN FILTER Mhd Furqan; Abdul Halim Hasugian; Rizqi Hidayat Tanjung
INFOKUM Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (858.952 KB)

Abstract

At this time digital image used by a lot of people to capture the moment or other important things, digital image itself is the result of shooting with a digital camera, although today's digital cameras are already equipped with features that support the results of the picture, but not all digital image that is produced in accordance with our wishes, it happens because of a problem on the quality of the image, situation and condition at the time of the shooting process the image will affect on the quality of the image causes the image results to be bright or dark. Then from that needed improvement of the quality of the image so that the image that is produced in accordance with our wishes, in this study, the methods used in improving the quality of image is using the method of Multiscale Retinex and Median Filters. The process of Multiscale Retinex will produce the image of a more bright compared to the original image that minimal light intensity, while the Median filter will produce a clearer image because it can reduce the noise/noise in the image, the parameters used in this study is Histogram of some data that has been researched histogram chart shows the value of the intensity of the pixel average is close to zero (0) after processed by the method of Multiscale Retinex and the Median Fiter value of the intensity of the pixel average show a change of the charts is approaching 250 which indicates an increase in the brightness of the digital image brighter.
APPLICATION OF FUZZY LOGIC IN AUTOMATIC COOLING COMPUTER DESIGN USING PELTIER BASED ON ATMEGA328 MICROCONTROLLER Rakhmat Kurniawan R; Abdul Halim Hasugian; Rizky Pratama Putra
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1495.686 KB)

Abstract

Slow or lag computer problems can be caused by overheating of computer hardware such as the processor, if the computer overheats it will reduce the performance of the processor performance. In general, computers are equipped with coolers such as air cooling to avoid overheating, but for heavy and intensive work, air cooling is still not effective in cooling computer processors, so in this study an automatic computer cooling device was created that was effective in cooling computers. This tool uses a peltier to cool the coolant that flows on the cold side of the peltier. To control the Peltier, fuzzy logic is applied to control the temperature of the computer processor. This fuzzy logic will be embedded into the microcontroller. Cold generated based on the information provided by the computer to the microcontroller via serial communication. Based on the benchmark test, the average Core1 Temperature is 26.75oC, Core2 Temperature is 25.25oC and Package Temperature is 29oC using water cooling Peltier with fuzzy logic, while with water cooling the average Core1 Temperature is 33.5oC, Core2 Temperature is 33oC and Package Temperature is 35.25oC and with The average water cooling radiator has a Core1 temperature of 32.25oC, a Core2 temperature of 31.5oC and a Package Temperature of 34.25oC before performing the benchmark test. When the benchmark test runs, the average Core1 Temperature is 52.25oC, Core2 Temperature is 51oC and Package Temperature is 54.25oC using water cooling Peltier with fuzzy logic, while with water cooling the average TemperatureCore1 is 65oC, Core2Temperature is 64.25oC and PackageTemp is 67.25oC as well as with water The average cooling radiator temperature is Core1 57oC, Core2 Temperature 59oC and Package Temperature 59.25oC with an average room temperature of 30oC during the test. From the test results by comparing the tools in this study, water cooling Peltier with fuzzy logic is better and more effective in cooling computer processors. Keywords: Computer Cooling, Fuzzy Logic, Microcontroller
Application Of Security System Of Motorcycle Used Fingerprint Optical Sensor And Vibration Sensor With Fuzzy Logic Based On Arduino Uno R3 Mhd Furqan; Muhammad Ikhsan; Abdul Halim Hasugian; Muhammad Ridzki Hasibuan
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (675.606 KB)

Abstract

The Increasing case of motorcycle theft in North Sumatera and lack of human control of safety locks is an important factor for every motorcycle owner to ad dual security system. The research aimed to add double protection of the motorcycle by utilizing the advantages of the Fingerprint sensor plus a vibrating sensor SW-420 and IR Proximity sensor which is controlled by a microcontroller with fuzzy logic as process logic. The fuzzy logic used to produce the output of motorcycle condition which is silent, shifted by early is the alarm if there are the other individuals who try ignite or move the motorcycle position. The microcontroller is used to control relay based on verification results from Fingerprint optical sensor FPM10A module as well as do the process of fuzzy logic at vibrating sensor SW-420 module and IR Proximity sensor then it will produce the alarm output is sound. These protection system tools can increase the safety of the motorcycle owner.
Digital Image Security System Using Spritz Algorithm Mhd Furqan; Rakhmat Kurniawan; Abdul Halim Hasugian; Imam Zaki Husein Nst
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.652 KB)

Abstract

Private and confidential digital imagery is particularly vulnerable to eavesdropping by irresponsible parties. Especially when distributed through the internet network such as on facebook chat-based applications, whatsapp and e-mail media. The image sent is sometimes often an image that is confidential and must be maintained security. In order to maintain the security of digital imagery can be done with the use of cryptographic techniques. Cryptographic techniques can secure digital images by changing the pixel values of the digital image so as to produce pixel values that are different from the original image to be secured. The research will use the Spritz algorithm for encryption and decryption of digital images in image security applications. The result of the Spritz Algorithm's encryption results in pixel values that are much different from the original pixel values. So that the image of encryption is more secure to be distributed through intermediary media.
Co-Authors Adam Damiri Manurung Adi Hartono Aidil Halim Lubis Aidil Halim Lubis Ajeng Dwi Pratiwi Ali Darta Ali Ikhwan Alwy Azyari Harahap Amelia Safitri Annisa Shafira Zuhri Armansyah Armansyah Auliana Ulfah Dewi Afrianti Dinda Zukhoiriyah Dzikra Maulida Eferoni Ndururu Elsa Azila Rahman Farah Zaida Febi Solifiah Batubara Furqan, Mhd. Gunawan Gunawan Hanny Puput Eliyarista Saragih Hendra Cipta Heri Santoso Heri Santoso Heri Santoso HERI SUSANTO Ibnu Rusydi Ilham Ilham Ilka Zufria Imam Zaki Husein Nst Irene Sri Morina K Khairunnisa Khairuna Khairunnisa, K M Mahyudi M. Fakhriza Maimunah Rahmadani maya khairani Mhd Furqan Mhd Furqan Mhd Ikhsan Rifki Mhd. Furqan Muhammad Ikhsan Muhammad Ikhsan Muhammad Ridzki Hasibuan Muhammad Sayuthi Muhammad Siddik Hasibuan Mulya Alfan Simatupang Munawir Siddik Hsb Murdani Muthia Ramadhani Nadyah Almirah Simanjuntak Nora Arianti Siregar Nur Jamilah Aruan Pristiwanto Putri Hanifah Rahadian Fatta Batubara Rahmad Prayogi Harahap Rahmawati Rahmawati Raissa Amanda Putri Raissa Amanda Putri Rakhmat Kurniawan R Reza Muhammad Ridha Saryani Sitorus Rina Widyasari Rizki Amalia Daulay Rizky Pratama Putra Rizqi Hidayat Tanjung Salmah Simanjuntak Shania Oktawijaya Sheila Safira Siti Hayatul Fauziah Ritonga Siti Juhroini Ritonga Siti Nurhaliza Sofyan Siti Sumita Harahap Sriani Sriani Suandi Padang Suhardi Suhardi TONNI LIMBONG Tria Elisa Wina Fadia Ardianti Yusuf Karim Rambe Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Yusuf Ramadhan Nasution Ziqra Addilah