Fadhil Hidayat - Academia.edu (original) (raw)

Papers by Fadhil Hidayat

Research paper thumbnail of Design and Implementation of Smart Trip Planner

2019 International Conference on ICT for Smart Society (ICISS)

Utilization of information technology in the tourism has the potency to improve the quality of se... more Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.

Research paper thumbnail of Big Data Implementation of Smart Rapid Transit using CCTV Surveillance

2019 International Conference on ICT for Smart Society (ICISS)

This paper presents the implementation on smart system for rapid transit using CCTV surveillance.... more This paper presents the implementation on smart system for rapid transit using CCTV surveillance. Researchers proposed deep learning algorithms to detect objects with Convolutional Neural Network (CNN) and monitoring passengers’ behavior like flow analytics, avoiding dangerous areas, and preventing intruder visitor[1][2].Research of this paper also implemented in Railway Station in Bandung with multiple CCTV sources. The system aims to make station better and able to improve quality of service in many scope areas (safe, secure and convenient)[3].Objective of this research is to develop smart surveillance with CCTV in smart station. The system consists of deep learning algorithm and big data technologies such as Hadoop, Apache Kafka and Apache Spark.

Research paper thumbnail of Drop shipper Classification in Growing Dataset Using Naïve Bayes for Indonesian Marketplace

Dropshipping is a sales business model in which a seller, called a drop shipper, promotes goods s... more Dropshipping is a sales business model in which a seller, called a drop shipper, promotes goods sold by a supplier. If there is an order, the drop shipper directly orders the supplier. Suppliers will process orders and send orders to buyers on behalf of the drop shipper. Dropshipping is popular among people in the Indonesian marketplace. Some marketplace even supports dropshipping features for their drop shipper. Therefore, this paper proposes Naïve Bayes method predict whether a seller is a drop shipper or not. This research is part of recommendation system research goal. Since there is a drop shipping mechanism in the marketplace, there is a stock problem. This research is essential because by classifying a seller as a drop shipper or not, we can draw a stock of a product that the buyer searches for by eliminating stock of drop shippers and predicting stock from the supplier in the marketplace. By solving stock issues, we can afford better recommendations for a buyer. There are tw...

Research paper thumbnail of Real-time passenger social distance monitoring with video analytics using deep learning in railway station

Indonesian Journal of Electrical Engineering and Computer Science

Recently, at the end of December, the world faced a severe problem which is a pandemic that is ca... more Recently, at the end of December, the world faced a severe problem which is a pandemic that is caused by coronavirus disease. It also must be considered by the railway station's authorities that it must have the capability of reducing the covid transmission risk in the pandemic condition. Like a railway station, public transport plays a vital role in managing the COVID-19 spread because it is a center of public mass transportation that can be associated with the acquisition of infectious diseases. This paper implements social distance monitoring with a YOLOv4 object detection model for crowd monitoring using standard CCTV cameras to track visitors using the DeepSORT algorithm. This paper used CCTV surveillance with the actual implementation in Bandung Railway Station with the accuracy at 96.5 % result on people tracking with tested in real-time processing by using minicomputer Intel(R) Xeon(R) CPU E3-1231 v3 3.40GHz RAM 6 GB around at 18 FPS.

Research paper thumbnail of Control Design of Information Security Related to Privacy in The Smart SIM Business Process

2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT)

Korlantas Polri has a main task as a supervisor and organizer of traffic functions at the central... more Korlantas Polri has a main task as a supervisor and organizer of traffic functions at the central level, currently in the process of increasing its digitization capabilities, one of which is Smart SIM. This card has the advantage of integrating data such as traffic accident data, traffic violation data, police forensic data, and electronic money. Of course, with these advantages there are security holes that might occur if they do not have a standard that fit the needs of the Smart SIM itself. The security that will be discussed in this study is related to the driver’s privacy data security factor which must always be maintained so that all data is not spread and misused by irresponsible parties. In achieving the expected objectives, this research needs to be carried out to implement the appropriate standardization of information systems in its development. These developments and problems create several standards to identify possible data privacy risks that may occur. The standards set in this study use ISO/IEC 27001:2013 and ISO/IEC 27701:2019. ISO/IEC 27701:2019 (Privacy Information Management System) is an extension to privacy from ISO/IEC 27001:2013 (Information Security Management System) that organization can use even without regard to location and measuring and regardless of whether it acts as a Personally Identifiable Information (PII) controller, PII processor or both. By using DRM (Design Research Methodology), the result of this research is an information security control design that is assessed from the results of risk assessment as well as Smart SIM information security policy and procedure documents with the aim of maintaining the privacy of driver data on Smart SIM. The control chosen is based on the results of the risk assessment from Annex An ISO/IEC 27001:2013 and ISO/IEC 27701:2019.

Research paper thumbnail of Aktualisasi Diri Mahasiswa di Dalam Media Sosial Instagram

Research paper thumbnail of Electronic Commerce Product Recommendation using Enhanced Conjoint Analysis

International Journal of Advanced Computer Science and Applications, 2021

While finding any product, there are many identical products sold in the marketplace, so buyers u... more While finding any product, there are many identical products sold in the marketplace, so buyers usually compare the items according to the desired preferences, for example, price, seller reputation, product reviews, and shipping cost. From each preference, buyers count subjectively to make a final decision on which product is should be bought. With hundreds of thousands of products to be compared, the buyer may not get the product that meets his preferences. To that end, we proposed the Enhanced Conjoint Analysis method. Conjoint Analysis is a common method to draw marketing strategy from a product or analyze important factors of a product. From its feature, this method also can be used to analyze important factors from a product in the marketplace based on price. We convert importance factor percentage as a coefficient to calculate weight from every attributes and summarize it. To evaluate this method, we compared the ECA method to another prediction algorithm: generalized linear m...

Research paper thumbnail of Pendidikan Literasi Media Guru Sekolah Mis Al-Hidayah Dalam Menghadapi Pengaruh Negatif Dunia Digital Pada Siswa

In the digital era and current technological developments, there have been changes in human life ... more In the digital era and current technological developments, there have been changes in human life in various ways, such as communication, especially in obtaining information, so that the negative effects of the digital world cannot be avoided. Therefore, someone needs to have media literacy skills, especially for students so that it can be a tool to reduce the negative influence of the presence of the digital world. Before students can have good media literacy skills, of course, this ability must also be possessed by parents and a teacher. Strengthening literacy skills in a teacher is a very important element because a teacher is a person who will provide learning to students in the world of education. Understanding media literacy is the main foundation in forming a smart and cultured generation in the digital era.

Research paper thumbnail of Strategi Komunikasi Organisasi PK IMM FISIP UMSU Dalam Melaksanakan Program Kerja di Masa Pandemi Covid-19

Penelitian ini adalah untuk mengetahui strategi komunikasi organisasi PK IMM FISIP UMSU dalam mel... more Penelitian ini adalah untuk mengetahui strategi komunikasi organisasi PK IMM FISIP UMSU dalam melaksanakan program kerja di masa pandemi covid-19. Pentingnya strategi komunikasi dalam organisasi agar semua rencana kegiatan atau program kerja dapat dilakukan dengan baik guna mencapai kemajuan organisasi. Teori komunikasi organisasi yang digunakan dalam penelitian ini yakni teori mutakhir. Penelitian ini menggunakan metode penelitian kualitatif yang bersifat deskriptif dengan pendekatan studi kasus. Teknik pengumpulan data menggunakan Observasi Partisipan dan wawancara mendalam. Hasil penelitian menunjukkan bahwa Strategi Komunikasi Organisasi PK IMM FISIP UMSU selama masa pandemi covid-19 dalam melaksanakan program kerja dengan menggunkana dua sistem, yakni sistem online dan sistem offline. Perubahan berbagai program kerja dalam sistem online, seperti rapat, seminar, pengrekrutan anggota baru, dan lain sebagainya dengan menggunakan media online atau media sosial. Sedangkan program-...

Research paper thumbnail of Peningkatan Kemampuan Desain Grafis untuk Meningkatkan Kreativitas Dakwah pada PC IPM Medan Area

PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat, 2022

Living in the digital age makes graphic design one of the skills that people, especially teenager... more Living in the digital age makes graphic design one of the skills that people, especially teenagers, must have. Graphic design can be a necessity in various fields, one of which is in the area of da'wah. Graphic design is an art form that has a goal as a form of a solution in solving communication problems by utilizing graphic elements, such as colors, lines, shapes, and others. As a designer, several things need to be prepared, such as insight, skills, sensitivity, and creativity. The areas of graphic design competence that must be mastered are attitudes, knowledge, skills, sensitivity, talent, and creativity to produce various exciting forms of work. Then, someone who has design skills must be strategic and tactical by; having the skills or abilities for graphic design not only can increase creativity or the artistic ability for someone but can also be a way to increase one's creativity in designing messages or content, which is used as da'wah which can broadcast Islami...

Research paper thumbnail of Web Services Security and Threats: A Systematic Literature Review

2020 International Conference on ICT for Smart Society (ICISS), 2020

Privacy and data protection issues are the main problems in using web services to transmit data. ... more Privacy and data protection issues are the main problems in using web services to transmit data. Three aspects of information security that contains confidentiality, integrity, and availability need to be considered in maintaining web service security. Data sent by data providers can be easily attacked, resulting in data leaks when the data traffic process. Privacy data such as personal information and location data providers are sensitive data and need to be protected from unauthorized parties to avoid improper use of data. Also, data sent via the web service must be guaranteed that data is not changed by unauthorized persons in the data transmission process, because attacks that result in data changes can occur when the data has not yet arrived at the data recipient. The web service system must also ensure that data can always be available when needed. However, various attacks can be carried out to inhibit or stop the availability of this data. Therefore, we conducted a systematic literature review which aims to review and present some observation that has been done on existing research on web services security. Based on the results of our literature review, the secure coding method can be an available security solution. However, this method needs further development if it is applied to web services with the REST architecture which is currently being widely used.

Research paper thumbnail of Peranan Perangkat Lunak Komputer Dalam Sistem Informasi Manajemen

Pemrograman PC adalah salah satu perangkat yang diharapkan untuk menjalankan PC. Pemrograman adal... more Pemrograman PC adalah salah satu perangkat yang diharapkan untuk menjalankan PC. Pemrograman adalah gadget yang tidak boleh terlihat dan dihubungi secara langsung, namun harus dimungkinkan oleh klien. PC (pemrograman) adalah bermacam-macam informasi elektronik yang dikumpulkan dan dipesan oleh PC, informasi elektronik yang disimpan oleh PC dapat terdiri dari proyek atau perintah yang akan menjalankan perintah. Pemrograman juga disebut sebagai penerjemah perintah yang dijalankan oleh klien PC untuk dikirim atau ditangani oleh peralatan. Melalui produk atau pemrograman ini, PC dapat menjalankan tuntutan. Sebagai aturan umum, atau pemrograman dapat dikelompokkan menjadi tiga bagian, untuk lebih spesifik, pemrograman kerangka kerja, pemrograman kerangka aplikasi dan dialek pemrograman.

Research paper thumbnail of Deep Learning-Based Complaint Classification for Indonesia Telecommunication Company's Call Center

Proceedings of the Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, 12 October 2019, Bandung, West Java, Indonesia, 2020

The preliminary research was held to utilize the call center conversations records from a broadba... more The preliminary research was held to utilize the call center conversations records from a broadband telecommunications company in Indonesia. There is a need from the company to classify customer's complaints automatically by a system to minimize human errors and at once streamline the business processes and resources. Natural Language Processing (NLP), as an integral part of artificial intelligence (AI), empower machines to understand human languages for performing beneficial tasks. The growth of deep learning is the main driver behind NLP for performing various practical applications and business, therefore deep learning is expected to overcome the problems encountered. This paper explains the methods used in designing the classification systems based on deep learning. A literature review is conducted to find the proper algorithm used in classifying problems. Furthermore, it also explains the stages performed in preparing the data and building the system model. From experiments conducted, it can be stated that the RNN algorithm can be used in the classification of customer complaints with the results shown by the accuracy value of the model.

Research paper thumbnail of Securing an Event-Based Smart Meter System to Prevent Pricing Cyberattack: A Preliminary Research

Proceedings of the Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, 12 October 2019, Bandung, West Java, Indonesia, 2020

Being a part of the smart grid, a smart meter is a device that is widely used nowadays because it... more Being a part of the smart grid, a smart meter is a device that is widely used nowadays because it is expected to improve the efficiency of the current electricity network by using advanced digital information and communication technology. One of the advantages of using the smart meter is it can simplify the billing process. However, because the smart meter system must be connected to intranet and extranet networks, it becomes vulnerable to several security and privacy threats. One of the major concerns is pricing cyber-attack, which happens when energy consumption data becomes the target of an attack because this can affect the amount of billing that must be paid by costumers. There are already several studies that discussed securing the smart grid system using various methods but those are still computationally complex and only implemented on time-based type smart meters. The aim of this paper is to present preliminary research on securing an event-based smart meter system from a pricing cyber-attack.

Research paper thumbnail of Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks

The application of IoT in Vehicular Ad-Hoc Networks (VANET) allows the realization of intelligent... more The application of IoT in Vehicular Ad-Hoc Networks (VANET) allows the realization of intelligent transportation systems to ensure the comfort and safety of road users. However, as an implication, attacks that can interfere with this aim certainly need to be a significant concern. It is because the stakes are not only network security but also the safety of the driver and its passengers. One of the attacks which had a substantial impact on VANET was the Sybil attack. Sybil attackers illegally change into several different identities to carry out malicious activities such as disrupting routing, causing traffic jams, bottlenecks, and even accidents. Various security methods are introduced to VANET to detect Sybil attacks, but there are still several issues that have not been resolved. In this paper, we proposed the design of a defense mechanism against Sybil attacks. This mechanism aims to be suitable for application on IoT networks that have limited resources an also considering accu...

Research paper thumbnail of Decision-Making Framework for Validation of Data Collection Process in a Survey with GPS Data

This study uses Systematic Literature Review (SLR) to understand about research trends, methods, ... more This study uses Systematic Literature Review (SLR) to understand about research trends, methods, and data used in decision-making with GPS data. After reviewing 27 chosen journals and proceedings, this study concludes that there are several methods used to decide with GPS data such as decision tree, random forest, neural network, and support vector machine (SVM). Health, environment, Transportation, and agriculture are several fields of business that used GPS data to make a decision. The data analyzed consist of position, time, speed, track, and distance. Based on SLR result, we propose a method to validate the data collection process of a survey using three methods (SVM, decision tree and random forest) will be used to analyze the position, time, track and personal data of the surveyor.

Research paper thumbnail of An Integration of National Identity towards Single Identity Number with Blockchain

The lack of coordination in the integration of information systems between government agencies th... more The lack of coordination in the integration of information systems between government agencies that issue identity numbers causes replication and redundancy of population information data. Another problem is the emergence of citizens' concerns over data integrity and security due to national identification records is also used by the private sector. In this paper, one of the solutions offered to overcome the above problem is to build an integrated national identification database system between government agencies by applying the concept of Single Identity Number (SIN) using blockchain technology. Blockchain is a secure and robust system for keeping a record of the identities of all citizens and also able to facilitate data integration between institutions. This paper uses the strengths of blockchain to possess characteristics of immutability that it is possible to store national identification records.

Research paper thumbnail of Front-end RF amplifier optimum design for S-band broadband transmission

2017 International Symposium on Electronics and Smart Devices (ISESD), 2017

A broadband front-end rf amplifier has been designed and implemented for 2.4GHz S-band broadband.... more A broadband front-end rf amplifier has been designed and implemented for 2.4GHz S-band broadband. The power and bandwidth of the amplifier are chosen around 17dBm and 20Mhz, respectively with high spectrum linearity and power efficiency. The design process commenced with determining Q-point (Quicent point), and performed Harmonic Balanced simulation to obtain S parameter, and spectrum linearity characteristics of the RF amplifier circuit, both on one and two tone frequencies, then Load Pull and Source Pull are processed to maximize output power and efficiency, after which the impedance adjustment according to the optimization result with load and source pull.

Research paper thumbnail of Penggunaan Facebook Sebagai Media Bisnis Online (Studi Kasus Pada Dapur Luthfiah)

Kemunculan facebook turut menghadirkan peluang-peluang usaha dalam dunia pemasaran (bisnis) onlin... more Kemunculan facebook turut menghadirkan peluang-peluang usaha dalam dunia pemasaran (bisnis) online. Promosi dan iklan tanpa berbayar menjadikan facebook sebagai alternatif untuk memulai bisnis salah satunya digunakan oleh UMKM Dapur Luthfiah. Penggunaan facebook yang dilakukan oleh Dapur Luthfiah membuat konsumen terasa mudah untuk memilih dan mencari informasi mengenai makanan yang akan dijual setiap hari. Metode penelitian yang digunakan dalam penelitian ini adalah metode kualitatif yang bersifat deskriptif dengan pendekatan studi kasus. Dapur Luthfiah terus menggunakan facebook sebagai media promosi dan penjualan. Dengan penggunaan facebook tersebut penjualan serta pendapatan relatif lebih meningkat daripada sebelumnya yang hanya menjual dengan menggunakan metode konvensional atau membuka gerai.

Research paper thumbnail of Community Activities Amid Activity Restrictions during the Coronavirus Disease-19 Pandemic in North Sumatra

Open Access Macedonian Journal of Medical Sciences, 2021

BACKGROUND: The increase in coronavirus disease (COVID)-19 transmission cases in Indonesia has ca... more BACKGROUND: The increase in coronavirus disease (COVID)-19 transmission cases in Indonesia has caused the government to impose restrictions on community activities with emergency PPKM since July 3, 2021. Activity restrictions prevent community from being able to meet, interact, and communicate face-to-face freely even though communication activities are very essential in human life. AIM: This study aimed to explore and analyze the communication activities of community living in Medan City during the implementation of emergency PPKM. METHODS: The research method used was a qualitative approach by conducting open online interviews with 20 Medan people with various backgrounds, ranging from students, traders, and formal workers to housewives. The interview was conducted personally. The data obtained were analyzed qualitatively using Nvivo12 application. To maintain the credibility of the research data, triangulation was conducted by carrying out confirmation of the research results to ...

Research paper thumbnail of Design and Implementation of Smart Trip Planner

2019 International Conference on ICT for Smart Society (ICISS)

Utilization of information technology in the tourism has the potency to improve the quality of se... more Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.

Research paper thumbnail of Big Data Implementation of Smart Rapid Transit using CCTV Surveillance

2019 International Conference on ICT for Smart Society (ICISS)

This paper presents the implementation on smart system for rapid transit using CCTV surveillance.... more This paper presents the implementation on smart system for rapid transit using CCTV surveillance. Researchers proposed deep learning algorithms to detect objects with Convolutional Neural Network (CNN) and monitoring passengers’ behavior like flow analytics, avoiding dangerous areas, and preventing intruder visitor[1][2].Research of this paper also implemented in Railway Station in Bandung with multiple CCTV sources. The system aims to make station better and able to improve quality of service in many scope areas (safe, secure and convenient)[3].Objective of this research is to develop smart surveillance with CCTV in smart station. The system consists of deep learning algorithm and big data technologies such as Hadoop, Apache Kafka and Apache Spark.

Research paper thumbnail of Drop shipper Classification in Growing Dataset Using Naïve Bayes for Indonesian Marketplace

Dropshipping is a sales business model in which a seller, called a drop shipper, promotes goods s... more Dropshipping is a sales business model in which a seller, called a drop shipper, promotes goods sold by a supplier. If there is an order, the drop shipper directly orders the supplier. Suppliers will process orders and send orders to buyers on behalf of the drop shipper. Dropshipping is popular among people in the Indonesian marketplace. Some marketplace even supports dropshipping features for their drop shipper. Therefore, this paper proposes Naïve Bayes method predict whether a seller is a drop shipper or not. This research is part of recommendation system research goal. Since there is a drop shipping mechanism in the marketplace, there is a stock problem. This research is essential because by classifying a seller as a drop shipper or not, we can draw a stock of a product that the buyer searches for by eliminating stock of drop shippers and predicting stock from the supplier in the marketplace. By solving stock issues, we can afford better recommendations for a buyer. There are tw...

Research paper thumbnail of Real-time passenger social distance monitoring with video analytics using deep learning in railway station

Indonesian Journal of Electrical Engineering and Computer Science

Recently, at the end of December, the world faced a severe problem which is a pandemic that is ca... more Recently, at the end of December, the world faced a severe problem which is a pandemic that is caused by coronavirus disease. It also must be considered by the railway station's authorities that it must have the capability of reducing the covid transmission risk in the pandemic condition. Like a railway station, public transport plays a vital role in managing the COVID-19 spread because it is a center of public mass transportation that can be associated with the acquisition of infectious diseases. This paper implements social distance monitoring with a YOLOv4 object detection model for crowd monitoring using standard CCTV cameras to track visitors using the DeepSORT algorithm. This paper used CCTV surveillance with the actual implementation in Bandung Railway Station with the accuracy at 96.5 % result on people tracking with tested in real-time processing by using minicomputer Intel(R) Xeon(R) CPU E3-1231 v3 3.40GHz RAM 6 GB around at 18 FPS.

Research paper thumbnail of Control Design of Information Security Related to Privacy in The Smart SIM Business Process

2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT)

Korlantas Polri has a main task as a supervisor and organizer of traffic functions at the central... more Korlantas Polri has a main task as a supervisor and organizer of traffic functions at the central level, currently in the process of increasing its digitization capabilities, one of which is Smart SIM. This card has the advantage of integrating data such as traffic accident data, traffic violation data, police forensic data, and electronic money. Of course, with these advantages there are security holes that might occur if they do not have a standard that fit the needs of the Smart SIM itself. The security that will be discussed in this study is related to the driver’s privacy data security factor which must always be maintained so that all data is not spread and misused by irresponsible parties. In achieving the expected objectives, this research needs to be carried out to implement the appropriate standardization of information systems in its development. These developments and problems create several standards to identify possible data privacy risks that may occur. The standards set in this study use ISO/IEC 27001:2013 and ISO/IEC 27701:2019. ISO/IEC 27701:2019 (Privacy Information Management System) is an extension to privacy from ISO/IEC 27001:2013 (Information Security Management System) that organization can use even without regard to location and measuring and regardless of whether it acts as a Personally Identifiable Information (PII) controller, PII processor or both. By using DRM (Design Research Methodology), the result of this research is an information security control design that is assessed from the results of risk assessment as well as Smart SIM information security policy and procedure documents with the aim of maintaining the privacy of driver data on Smart SIM. The control chosen is based on the results of the risk assessment from Annex An ISO/IEC 27001:2013 and ISO/IEC 27701:2019.

Research paper thumbnail of Aktualisasi Diri Mahasiswa di Dalam Media Sosial Instagram

Research paper thumbnail of Electronic Commerce Product Recommendation using Enhanced Conjoint Analysis

International Journal of Advanced Computer Science and Applications, 2021

While finding any product, there are many identical products sold in the marketplace, so buyers u... more While finding any product, there are many identical products sold in the marketplace, so buyers usually compare the items according to the desired preferences, for example, price, seller reputation, product reviews, and shipping cost. From each preference, buyers count subjectively to make a final decision on which product is should be bought. With hundreds of thousands of products to be compared, the buyer may not get the product that meets his preferences. To that end, we proposed the Enhanced Conjoint Analysis method. Conjoint Analysis is a common method to draw marketing strategy from a product or analyze important factors of a product. From its feature, this method also can be used to analyze important factors from a product in the marketplace based on price. We convert importance factor percentage as a coefficient to calculate weight from every attributes and summarize it. To evaluate this method, we compared the ECA method to another prediction algorithm: generalized linear m...

Research paper thumbnail of Pendidikan Literasi Media Guru Sekolah Mis Al-Hidayah Dalam Menghadapi Pengaruh Negatif Dunia Digital Pada Siswa

In the digital era and current technological developments, there have been changes in human life ... more In the digital era and current technological developments, there have been changes in human life in various ways, such as communication, especially in obtaining information, so that the negative effects of the digital world cannot be avoided. Therefore, someone needs to have media literacy skills, especially for students so that it can be a tool to reduce the negative influence of the presence of the digital world. Before students can have good media literacy skills, of course, this ability must also be possessed by parents and a teacher. Strengthening literacy skills in a teacher is a very important element because a teacher is a person who will provide learning to students in the world of education. Understanding media literacy is the main foundation in forming a smart and cultured generation in the digital era.

Research paper thumbnail of Strategi Komunikasi Organisasi PK IMM FISIP UMSU Dalam Melaksanakan Program Kerja di Masa Pandemi Covid-19

Penelitian ini adalah untuk mengetahui strategi komunikasi organisasi PK IMM FISIP UMSU dalam mel... more Penelitian ini adalah untuk mengetahui strategi komunikasi organisasi PK IMM FISIP UMSU dalam melaksanakan program kerja di masa pandemi covid-19. Pentingnya strategi komunikasi dalam organisasi agar semua rencana kegiatan atau program kerja dapat dilakukan dengan baik guna mencapai kemajuan organisasi. Teori komunikasi organisasi yang digunakan dalam penelitian ini yakni teori mutakhir. Penelitian ini menggunakan metode penelitian kualitatif yang bersifat deskriptif dengan pendekatan studi kasus. Teknik pengumpulan data menggunakan Observasi Partisipan dan wawancara mendalam. Hasil penelitian menunjukkan bahwa Strategi Komunikasi Organisasi PK IMM FISIP UMSU selama masa pandemi covid-19 dalam melaksanakan program kerja dengan menggunkana dua sistem, yakni sistem online dan sistem offline. Perubahan berbagai program kerja dalam sistem online, seperti rapat, seminar, pengrekrutan anggota baru, dan lain sebagainya dengan menggunakan media online atau media sosial. Sedangkan program-...

Research paper thumbnail of Peningkatan Kemampuan Desain Grafis untuk Meningkatkan Kreativitas Dakwah pada PC IPM Medan Area

PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat, 2022

Living in the digital age makes graphic design one of the skills that people, especially teenager... more Living in the digital age makes graphic design one of the skills that people, especially teenagers, must have. Graphic design can be a necessity in various fields, one of which is in the area of da'wah. Graphic design is an art form that has a goal as a form of a solution in solving communication problems by utilizing graphic elements, such as colors, lines, shapes, and others. As a designer, several things need to be prepared, such as insight, skills, sensitivity, and creativity. The areas of graphic design competence that must be mastered are attitudes, knowledge, skills, sensitivity, talent, and creativity to produce various exciting forms of work. Then, someone who has design skills must be strategic and tactical by; having the skills or abilities for graphic design not only can increase creativity or the artistic ability for someone but can also be a way to increase one's creativity in designing messages or content, which is used as da'wah which can broadcast Islami...

Research paper thumbnail of Web Services Security and Threats: A Systematic Literature Review

2020 International Conference on ICT for Smart Society (ICISS), 2020

Privacy and data protection issues are the main problems in using web services to transmit data. ... more Privacy and data protection issues are the main problems in using web services to transmit data. Three aspects of information security that contains confidentiality, integrity, and availability need to be considered in maintaining web service security. Data sent by data providers can be easily attacked, resulting in data leaks when the data traffic process. Privacy data such as personal information and location data providers are sensitive data and need to be protected from unauthorized parties to avoid improper use of data. Also, data sent via the web service must be guaranteed that data is not changed by unauthorized persons in the data transmission process, because attacks that result in data changes can occur when the data has not yet arrived at the data recipient. The web service system must also ensure that data can always be available when needed. However, various attacks can be carried out to inhibit or stop the availability of this data. Therefore, we conducted a systematic literature review which aims to review and present some observation that has been done on existing research on web services security. Based on the results of our literature review, the secure coding method can be an available security solution. However, this method needs further development if it is applied to web services with the REST architecture which is currently being widely used.

Research paper thumbnail of Peranan Perangkat Lunak Komputer Dalam Sistem Informasi Manajemen

Pemrograman PC adalah salah satu perangkat yang diharapkan untuk menjalankan PC. Pemrograman adal... more Pemrograman PC adalah salah satu perangkat yang diharapkan untuk menjalankan PC. Pemrograman adalah gadget yang tidak boleh terlihat dan dihubungi secara langsung, namun harus dimungkinkan oleh klien. PC (pemrograman) adalah bermacam-macam informasi elektronik yang dikumpulkan dan dipesan oleh PC, informasi elektronik yang disimpan oleh PC dapat terdiri dari proyek atau perintah yang akan menjalankan perintah. Pemrograman juga disebut sebagai penerjemah perintah yang dijalankan oleh klien PC untuk dikirim atau ditangani oleh peralatan. Melalui produk atau pemrograman ini, PC dapat menjalankan tuntutan. Sebagai aturan umum, atau pemrograman dapat dikelompokkan menjadi tiga bagian, untuk lebih spesifik, pemrograman kerangka kerja, pemrograman kerangka aplikasi dan dialek pemrograman.

Research paper thumbnail of Deep Learning-Based Complaint Classification for Indonesia Telecommunication Company's Call Center

Proceedings of the Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, 12 October 2019, Bandung, West Java, Indonesia, 2020

The preliminary research was held to utilize the call center conversations records from a broadba... more The preliminary research was held to utilize the call center conversations records from a broadband telecommunications company in Indonesia. There is a need from the company to classify customer's complaints automatically by a system to minimize human errors and at once streamline the business processes and resources. Natural Language Processing (NLP), as an integral part of artificial intelligence (AI), empower machines to understand human languages for performing beneficial tasks. The growth of deep learning is the main driver behind NLP for performing various practical applications and business, therefore deep learning is expected to overcome the problems encountered. This paper explains the methods used in designing the classification systems based on deep learning. A literature review is conducted to find the proper algorithm used in classifying problems. Furthermore, it also explains the stages performed in preparing the data and building the system model. From experiments conducted, it can be stated that the RNN algorithm can be used in the classification of customer complaints with the results shown by the accuracy value of the model.

Research paper thumbnail of Securing an Event-Based Smart Meter System to Prevent Pricing Cyberattack: A Preliminary Research

Proceedings of the Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, 12 October 2019, Bandung, West Java, Indonesia, 2020

Being a part of the smart grid, a smart meter is a device that is widely used nowadays because it... more Being a part of the smart grid, a smart meter is a device that is widely used nowadays because it is expected to improve the efficiency of the current electricity network by using advanced digital information and communication technology. One of the advantages of using the smart meter is it can simplify the billing process. However, because the smart meter system must be connected to intranet and extranet networks, it becomes vulnerable to several security and privacy threats. One of the major concerns is pricing cyber-attack, which happens when energy consumption data becomes the target of an attack because this can affect the amount of billing that must be paid by costumers. There are already several studies that discussed securing the smart grid system using various methods but those are still computationally complex and only implemented on time-based type smart meters. The aim of this paper is to present preliminary research on securing an event-based smart meter system from a pricing cyber-attack.

Research paper thumbnail of Hybrid Trust-based Defense Mechanisms Against Sybil Attack in Vehicular Ad-hoc Networks

The application of IoT in Vehicular Ad-Hoc Networks (VANET) allows the realization of intelligent... more The application of IoT in Vehicular Ad-Hoc Networks (VANET) allows the realization of intelligent transportation systems to ensure the comfort and safety of road users. However, as an implication, attacks that can interfere with this aim certainly need to be a significant concern. It is because the stakes are not only network security but also the safety of the driver and its passengers. One of the attacks which had a substantial impact on VANET was the Sybil attack. Sybil attackers illegally change into several different identities to carry out malicious activities such as disrupting routing, causing traffic jams, bottlenecks, and even accidents. Various security methods are introduced to VANET to detect Sybil attacks, but there are still several issues that have not been resolved. In this paper, we proposed the design of a defense mechanism against Sybil attacks. This mechanism aims to be suitable for application on IoT networks that have limited resources an also considering accu...

Research paper thumbnail of Decision-Making Framework for Validation of Data Collection Process in a Survey with GPS Data

This study uses Systematic Literature Review (SLR) to understand about research trends, methods, ... more This study uses Systematic Literature Review (SLR) to understand about research trends, methods, and data used in decision-making with GPS data. After reviewing 27 chosen journals and proceedings, this study concludes that there are several methods used to decide with GPS data such as decision tree, random forest, neural network, and support vector machine (SVM). Health, environment, Transportation, and agriculture are several fields of business that used GPS data to make a decision. The data analyzed consist of position, time, speed, track, and distance. Based on SLR result, we propose a method to validate the data collection process of a survey using three methods (SVM, decision tree and random forest) will be used to analyze the position, time, track and personal data of the surveyor.

Research paper thumbnail of An Integration of National Identity towards Single Identity Number with Blockchain

The lack of coordination in the integration of information systems between government agencies th... more The lack of coordination in the integration of information systems between government agencies that issue identity numbers causes replication and redundancy of population information data. Another problem is the emergence of citizens' concerns over data integrity and security due to national identification records is also used by the private sector. In this paper, one of the solutions offered to overcome the above problem is to build an integrated national identification database system between government agencies by applying the concept of Single Identity Number (SIN) using blockchain technology. Blockchain is a secure and robust system for keeping a record of the identities of all citizens and also able to facilitate data integration between institutions. This paper uses the strengths of blockchain to possess characteristics of immutability that it is possible to store national identification records.

Research paper thumbnail of Front-end RF amplifier optimum design for S-band broadband transmission

2017 International Symposium on Electronics and Smart Devices (ISESD), 2017

A broadband front-end rf amplifier has been designed and implemented for 2.4GHz S-band broadband.... more A broadband front-end rf amplifier has been designed and implemented for 2.4GHz S-band broadband. The power and bandwidth of the amplifier are chosen around 17dBm and 20Mhz, respectively with high spectrum linearity and power efficiency. The design process commenced with determining Q-point (Quicent point), and performed Harmonic Balanced simulation to obtain S parameter, and spectrum linearity characteristics of the RF amplifier circuit, both on one and two tone frequencies, then Load Pull and Source Pull are processed to maximize output power and efficiency, after which the impedance adjustment according to the optimization result with load and source pull.

Research paper thumbnail of Penggunaan Facebook Sebagai Media Bisnis Online (Studi Kasus Pada Dapur Luthfiah)

Kemunculan facebook turut menghadirkan peluang-peluang usaha dalam dunia pemasaran (bisnis) onlin... more Kemunculan facebook turut menghadirkan peluang-peluang usaha dalam dunia pemasaran (bisnis) online. Promosi dan iklan tanpa berbayar menjadikan facebook sebagai alternatif untuk memulai bisnis salah satunya digunakan oleh UMKM Dapur Luthfiah. Penggunaan facebook yang dilakukan oleh Dapur Luthfiah membuat konsumen terasa mudah untuk memilih dan mencari informasi mengenai makanan yang akan dijual setiap hari. Metode penelitian yang digunakan dalam penelitian ini adalah metode kualitatif yang bersifat deskriptif dengan pendekatan studi kasus. Dapur Luthfiah terus menggunakan facebook sebagai media promosi dan penjualan. Dengan penggunaan facebook tersebut penjualan serta pendapatan relatif lebih meningkat daripada sebelumnya yang hanya menjual dengan menggunakan metode konvensional atau membuka gerai.

Research paper thumbnail of Community Activities Amid Activity Restrictions during the Coronavirus Disease-19 Pandemic in North Sumatra

Open Access Macedonian Journal of Medical Sciences, 2021

BACKGROUND: The increase in coronavirus disease (COVID)-19 transmission cases in Indonesia has ca... more BACKGROUND: The increase in coronavirus disease (COVID)-19 transmission cases in Indonesia has caused the government to impose restrictions on community activities with emergency PPKM since July 3, 2021. Activity restrictions prevent community from being able to meet, interact, and communicate face-to-face freely even though communication activities are very essential in human life. AIM: This study aimed to explore and analyze the communication activities of community living in Medan City during the implementation of emergency PPKM. METHODS: The research method used was a qualitative approach by conducting open online interviews with 20 Medan people with various backgrounds, ranging from students, traders, and formal workers to housewives. The interview was conducted personally. The data obtained were analyzed qualitatively using Nvivo12 application. To maintain the credibility of the research data, triangulation was conducted by carrying out confirmation of the research results to ...