Claim Missing Document
Check
Articles

Found 16 Documents
Search

Diagnosing MERS-CoV using dempster-shafer method Memen Akbar; Fandy Hidayat; Wenda Novayani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp19-26

Abstract

MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is a respiratory syndrome disease caused by the coronavirus which attacks the respiratory tract from mild to severe. MERS-CoV was first reported in Saudi Arabia; total cases of MERS-CoV have continued to increase. In Indonesia, the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But not many people know about this disease and its symptoms. For this reason, an expert system was developed to diagnose MERS-CoV using the Dempster-Shafer method. The system can detect the disease from the symptoms inputted by user. The output of the system is the value of the probability of the disease, the level of the disease and the suggested. The levels of the disease are Stage 1, Stage 2, and Stage 3 where each has a different treatment based on the level of the disease. The system contains information about MERS-CoV in the form of videos and text. The system was built using the PHP programming language. The testing result shows that all system functionalities have been fulfilled. The expert validation testing had obtained at 76.7%, which prove that the system is good enough in diagnosing MERS-CoV and the results obtained from the questionnaire is at an average of 84.13% which is very good in helping users in diagnosing disease. The expert system that has been developed can help people in diagnosing the disease before consulting with a doctor.MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is arespiratory syndrome disease caused by the coronavirus which attacks therespiratory tract from mild to severe. MERS-CoV was first reported in SaudiArabia; total cases of MERS-CoV have continued to increase. In Indonesia,the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But notmany people know about this disease and its symptoms. For this reason, anexpert system was developed to diagnose MERS-CoV using the DempsterShafer method. The system can detect the disease from the symptomsinputted by user. The output of the system is the value of the probability ofthe disease, the level of the disease and the suggested. The levels of thedisease are Stage 1, Stage 2, and Stage 3 where each has a different treatmentbased on the level of the disease. The system contains information aboutMERS-CoV in the form of videos and text. The system was built using thePHP programming language. The testing result shows that all systemfunctionalities have been fulfilled. The expert validation testing had obtainedat 76.7%, which prove that the system is good enough in diagnosing MERSCoV and the results obtained from the questionnaire is at an average of84.13% which is very good in helping users in diagnosing disease. Theexpert system that has been developed can help people in diagnosing thedisease before consulting with a doctor. 
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall - Robinson; Memen Akbar; Muhammad Arif Fadhly Ridha
JOIV : International Journal on Informatics Visualization Vol 2, No 4 (2018)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1932.485 KB) | DOI: 10.30630/joiv.2.4.107

Abstract

Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers. Its exposure could result in substantial losses for both consumers and companies. SQL Injection and Cross Site Scripting are attacks that aiming web application database vulnerabilities. Its can allow malicious attackers to manipulate web server database that can cause various data lost, information thieving, and inconsistent of data. Therefore, this research propose the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set which can help administrator securing the web servers. OWASP operate by blocking IP Address which try to breaking the security rule, monitoring network traffic and preventing suspicious network requesting from outside.
Rancang Bangun Sensor Node untuk Pemantauan Kualitas Udara Heri Subagiyo; Retno Tri Wahyuni; Memen Akbar; Fella Ulfa
SITEKIN: Jurnal Sains, Teknologi dan Industri Vol 18, No 1 (2020): Desember 2020
Publisher : Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24014/sitekin.v18i1.11461

Abstract

Sensor Node untuk pemantauan kualitas udara merupakan perangkat pengukuran parameter kondisi kualitas udara pada suatu titik lokasi tertentu. Parameter yang diukur berdasarkan ISPU (Indeks Standar Pencemaran Udara) meliputi gas karbon monoksida (CO), nitrogen dioksida (NO2), sulfur dioksida (SO2), ozon (O3), dan partikel debu (PM10). Komponen yang digunakan pada sensor node yaitu mikrokontroler Arduino Uno, sensor MQ-7, sensor MQ-131, sensor MQ-135, sensor MQ-136, sensor GP2Y1010AU0F dan WiFi module. Sistem ini dikendalikan oleh mikrokontroler yang berfungsi untuk mengelola data hasil pengukuran sensor. Data mentah yang dibaca dari sensor dikonversi menjadi konsentrasi gas/partikulat debu dalam satuan ppm. Persamaan konversi diperoleh berdasarkan grafik hubungan keluaran sensor dan ppm yang tercantum pada datasheet sensor. Data tersebut selanjutnya dikirim ke server melalui WiFi module. Pengujian keseluruhan dilakukan dengan melakukan pengukuran kualitas udara pada dua titik secara bersamaan di Kota Pekanbaru. Hasil pengujian menunjukkan bahwa keseluruhan sistem dapat berjalan baik dan data berhasil dikirim ke server. Hasil pengukuran sudah berada pada daerah pengukuran masing-masing parameter kualitas udara.Hasil ini menunjukkan bahwa sistem dapat digunakan sebagai langkah awal pengembangan sistem monitoring kualitas udara.
PENGGUNAAN APLIKASI ZOOM MEETING UNTUK EFEKTIFITAS PEMBELAJARAN DARING PADA MADRASAH IBTIDAIYAH MUHAMMADIYAH 01 PEKANBARU Yuli Fitrisia; Kartina Diah Kusuma Wardhani; Mardhiah Fadhli; Wenda Novayani; Dini Nurmalasari; Sugeng Purwantoro ESGS; Memen Akbar
Jurnal Pengabdian Masyarakat Multidisiplin Vol 5 No 1 (2021): Oktober
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/jpm.v5i1.2126

Abstract

The pandemic that has hit the world has forced us to do learning indirectly or is often referred to as online (Daring). Online teaching and learning process requires some adjustments both on the teacher's side and the student's side. One of the adjustments is the need to seek technology and adaptation using technology. The currently widely used technology is online meeting services, such as the Zoom Meeting application, Google Meet, Video Calling via the Massager application, or other similar applications. To adapt to the technology, teachers at Madrasah Ibtidaiyah Muhammadiyah 01 Pekanbaru strongly desire to deepen ownership of the Zoom application as one of the media used for online learning. This training aims to provide an understanding and hands-on practice of using Zoom Meeting technology to increase learning effectiveness.
Perbaikan Citra RGB dengan Metode Homomorphic Filtering Menggunakan Butterworth Filter Hafidz Hafidz; Ananda Ananda; Memen Akbar
Jurnal Komputer Terapan  Vol. 1 No. 1 (2015): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Gambar terkadang diakuisisi di bawah pencahayaan yang buruk. Pada kondisi ini sebagian area yang memiliki tingkat kecerahan yang sama akan terlihat lebih cerah pada suatu daerah dan terlihat lebih gelap pada daerah lainnya. Situasi ini akan menimbulkan masalah pada sistem yang berbasis computer vision. Untuk itu diperlukan  sebuah perbaikan kualitas citra, agar dapat menghasilkan sebuah citra yang memiliki kualitas warna yang baik dengan menggunakan metode Homomorphic Filtering. Teknik ini menggunakan Illumination-Reflectance model. Model ini membagi gambar menjadi dua komponen utama. Komponen pertama adalah jumlah sumber penerangan yang terlihat. Komponen kedua adalah komponen pantulan dari objek yang ada di sekitar tempat pengambilan gambar. Proses pemisahan ini memungkinkan perbaikan warna  pada citra digital dengan membuang detil illuminasi yang tidak seragam, sehingga citra hasil keluaran menjadi tampak lebih baik. Citra hasil perbaikan memiliki derau atau noise yang lebih sedikit daripada citra asli, dikarenakan filter yang digunakan mengeliminasi frekuensi tinggi, sedangkan noise disebabkan oleh frekuensi tinggi. Penelitian ini menunjukkan bahwa metode Homomorphic Filtering dapat memperbaiki citra dan mempengaruhi tingkat nilai kekaburan citra hasil sebesar 86% yaitu 0.25 dan nilai contrast sebesar 4% atau 1.14.
Rancang Bangun Alat Pendeteksi Sampah Organik dan Anorganik Menggunakan Sensor Proximity dan NodeMCU ESP8266 Memen Akbar; Sri Devi Anjasmara; Kartina Diah K Wardhani
Jurnal Komputer Terapan  Vol. 7 No. 2 (2021): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (245.546 KB) | DOI: 10.35143/jkt.v7i2.5178

Abstract

Waste products are increasing every day in line with the increasing number of products and people's consumption patterns. Many people do not separate organic and inorganic waste during disposal. One of the reasons is that people cannot distinguish between organic and inorganic waste. Based on these problems, an Internet of Things-based tool was designed that uses NodeMCU ESP8266 as its microcontroller. To distinguish organic and inorganic waste, three sensors are used at once, namely proximity infrared, capacitive and inductive sensors. The data read by this tool then turns on the LED according to the type of trash can. In this study, a trash can was also designed that uses an ultrasonic sensor to detect the height of the garbage. This altitude information is then sent to a website-based monitoring application using a Wi-Fi network and the MQTT protocol. This application is used by cleaners to monitor which trash bins have to be transported. From the test results, the three proximity sensors used succeeded in distinguishing organic and inorganic waste. The recommended distance for the sensor to work optimally is 3 mm. The data obtained by the sorting tool has also been successfully sent to the waste height monitoring application. Officers get notifications on the website, which trash bins must be transported.
Penerapan Algoritma “LaGrange Interpolating Polynomial” pada Secret Sharing Lisa Chandra; Yohana Dewi Lulu W; Memen Akbar
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (589.802 KB)

Abstract

PIN (Personal Identification Number) is one of the data that is secrecy and important. Therefore,it is needed technic for keep the secrecy of the data by convert the data from a readable state to apparentnonsense. This technic is called cryptography. One of the cryptography methods is secret sharing. Thispaper will explain how LaGrange Interpolation Polynomial Scheme works on secret sharing. This methodshare a secret data, become some parts that call share (fraction of the secret data) to be shared to peoplethat call participants which being believed to have a right to keep that part of secret. Shares will beingbundle again to create the secret data by using certain methods. By using this application, PIN can beshare securely by an expeditious system. Besides, PIN also more secure in the distribution processbecause the single shares that made by this application does not contain the PIN information itself. Fromthe research and comparable, the application that made is appropriate with the base concept of secretsharing, which there is a threshold that needed to bundle the PIN and if input shares is less than thedefinite threshold, the PIN can’t be decrypted.Keywords: Secret sharing, Shares, LaGrange Interpolation Polynomial, Cryptography.
Development of Color Blindness Test Application Using Ishihara Template at Rumbai Public Health Center Memen Akbar; Warnia Nengsih Sikumbang; Wiwin Styorini
JURNAL TEKNIK INFORMATIKA Vol 15, No 1 (2022): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v15i1.24889

Abstract

This research addresses the problem of color blindness testing at Puskesmas Rumbai which serves color blindness checks using printed books. The colors in the book became less clear as time went on. Therefore, this research makes a digital color blindness examination as part of the application for obtaining a certificate of health. The resulting application is named SIP SEHAT which stands for Aplikasi Pelayanan Surat Keterangan Kesehatan. This application was developed using prototyping method approach.  There are 3 categories of users of this application, namely the registration section, doctor or nurse, and administration section. The registration section inputs the identity of the patient who will perform the examination. Meanwhile, doctors or nurses carry out examinations and medical examinations of patients who come. Color blindness test is one of the features found in doctors or nurses. Patients independently answer 24 Ishihara templates that appear on the application. Based on the answers from the patient, the application will display the color blindness test results, whether including total color blindness, partial color blindness, or not color blindness. The administration section prints a certificate of a patient who has performed an examination and gets a recapitulation of health examination reports per month. The application has been tested with 3 types of testing, namely accuracy testing, correctness testing, and usability testing. Based on these three tests, it can be concluded that this application is ready for use by the Puskesmas Rumbai to serve the processing of certificates of health. Based on service process analysis, this application makes the process of managing a health certificate making more efficient by 42.86%.
Penguatan Komunikasi Efektif Guru dalam Proses Pembelajaran di SMK Taruna Persada Dumai Sugeng Purwantoro E.S.G.S; Memen Akbar; Kartina Diah Kusuma Wardhani; Mardhiah Fadhli; Yuli Fitrisia
Dinamisia : Jurnal Pengabdian Kepada Masyarakat Vol. 6 No. 3 (2022): Dinamisia: Jurnal Pengabdian Kepada Masyarakat
Publisher : Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/dinamisia.v6i3.10006

Abstract

One of the initial approaches to make learning more enjoyable is to know the patterns of social interaction and types of student communication. There are 3 types of social interaction patterns presented in this training, namely interactions between individuals who wish to achieve achievement (Achievement), desire to socialize with their social environment (Affiliation), and desire to power (Power). Teachers can communicate effectively with students if the teacher knows the type of communication used by students. There are 4 types of individual communication types with their environment. Some communicate concretely, spontaneously, intellectually, and sensitively. Community Service activities carried out are training for teachers to recognize the types of student social interactions and types of student communication. The training was carried out by introducing the two instruments that had been made. The training was held for 1 day offline at SMK Taruna Persada Dumai. Based on the feedback provided by the participants, the teacher felt the benefits of the training and was willing to apply the results of the training to students in the classroom.
Implementasi Fun Learning Dengan Hour of Code Untuk Meningkatkan Minat Belajar Coding Pada Siswa Mardhiah Fadhli; Yuli Fitrisia; Dini Nurmalasari; Sugeng Purwantoro; Memen Akbar
Literasi: Jurnal Pengabdian Masyarakat dan Inovasi Vol 3 No 1 (2023)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The importance of studying computer programming for students is that students will gain the ability to think computationally systematically, which includes a more robust way of thinking (robust) in looking at a problem. However, learning computer programming is often considered complicated and requires regular practice. The current condition of the partner, namely SMKN 1 Dumai, is the lack of student interest in learning, curiosity, and the joy of learning coding. This is caused by many factors, one of which is the assumption that students learn coding is something that is complicated and boring. In addition, it is also caused by the learning strategies and methods applied by the teacher are not sufficiently capable of arousing students' curiosity about the lesson. The learning process which is not conducive and the low interest in student learning can be handled by the teacher by providing material in a fun way (fun learning). One way to learn basic coding in a fun way is to learn with hours of code in the game Minecraft. This community service activity was carried out on September 6, 2022, with a total of 22 participants. The results of this activity were in the form of an evaluation of activities through a questionnaire and the result was that 89,90% of the training participants understood the material and were able to practice the Minecraft game project themselves. In addition, the participants were very enthusiastic about participating in the activity because it was presented with fun activities, such as playing games. Based on the results of the questionnaire, training recommendations were also obtained for the next activity in the form of training in implementing the Internet of Things (IoT) project.