Claim Missing Document
Check
Articles

Found 28 Documents
Search

Implementation of Data Layer In Blockchain Network Using SHA256 Hashing Algorithm Sondakh, Clivent Gerhard; Ardiansyah, Rizka; Joefrie, Yuri Yudhaswana; Angreni, Dwi Shinta; Pusadan, Mohammad Yazdi
Advance Sustainable Science, Engineering and Technology Vol 6, No 2 (2024): February - April
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i2.18103

Abstract

The escalating demand for secure data management in blockchain systems has prompted the exploration of advanced cryptographic techniques. Leveraging the SHA256 hashing algorithm, this implementation aims to fortify data integrity, confidentiality, and authentication within the blockchain network. By meticulously examining the algorithm's application, the research demonstrates its efficacy in ensuring tamper-resistant data storage and retrieval, quantifying improvements in security percentages and specific metrics. The integration of SHA256 within the data layer is explored in technical detail, highlighting the concrete benefits of heightened security and immutability. The analysis discusses practical implications and delves into potential advancements in blockchain technology, offering valuable insights for researchers, developers, and practitioners seeking to bolster the robustness of data layers in blockchain networks.
Implementing Blockchain For Publishing and Verifying Digital Certificates On EduTech Maroso, Akwan; Angreni, Dwi Shinta; Ardiansyah, Rizka; Dwiwijaya, Kadek Agus
Advance Sustainable Science, Engineering and Technology Vol 6, No 2 (2024): February - April
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i2.18262

Abstract

This study investigates the application of blockchain technology in enhancing the security and authenticity of digital certificates. Addressing key challenges such as fraud and the lack of a standardized verification process, the paper proposes a comprehensive framework aimed at fortifying the integrity of digital credentials. This framework is the utilization of blockchain as a distributed ledger, serving as a tamper-proof repository for recording certification transactions. Through this decentralized ledger, each certification issuance and verification action is securely recorded, enhancing trust and transparency in the certification process. The methodology includes the integration of a decentralized ledger for immutable record-keeping  and implementation of smart contracts for automated authenticity checks, and the use of cryptographic measures to ensure data security. This approach promises significant implications for various sectors reliant on credential verification, advocating for a broader adoption of blockchain in digital certificates systems.
Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration Putra, Ryan Adi; Ardiansyah, Rizka; Pusadan, Mohammad Yazdi; Kasim, Anita Ahmad; Joefrie, Yuri Yudhaswana
Advance Sustainable Science, Engineering and Technology Vol 6, No 1 (2024): November-January
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i1.17772

Abstract

In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providing heightened resilience against unauthorized alterations and malicious attacks that compromise digital information integrity. Moreover, the decentralized model holds significant promise for securing public data. By leveraging the transparency and immutability of blockchain ledgers, this approach not only safeguards against unauthorized access but also actively fosters transparency and accountability in data management. This makes it particularly well-suited for ensuring the security and integrity of public data, addressing concerns related to trust and reliability in the ever-evolving landscape of information exchange.
IMPLEMENTASI ALGORITMA FORWARD CHAINRING DAN CERTAINTY FACTOR PADA SISTEM PAKAR DIAGNOSA EFEK SAMPING BAHAN PEMUTIH KOSMETIK PADA KULIT Ardiansyah, Rizka; Indrajaya, Muhammad Aristo; Joefrie, Yuri Yudhaswana; Pratiwi, Inten Sakti
Foristek Vol. 13 No. 1 (2023): Foristek
Publisher : Foristek

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54757/fs.v14i1.253

Abstract

Most people, especially women, are generally not educated about what ingredients are contained in a cosmetic and only rely on social media as a reference by looking at influencers who advertise a beauty product. To consult with a dermatologist also requires a lot of money, so they choose not to care about it, this causes many cases handled by dermatologists are cases that are too severe. Therefore, there is a need for awareness and education for women, especially teenagers regarding the use of illegal cosmetics, so through this research, the authors try to propose a free, expert-based platform that can be accessed in general by people from anywhere and anytime to carry out self- assessments or self-examinations. or education that makes it easier for the public to get easy and detailed information access regarding the hazardous ingredients contained in cosmetics. So in this study, we propose an educational media and expert-based assessment of the symptoms of the disease suffered in the form of developing an expert system based on the forward chaining algorithm and certainty factor, which involves a dermatologist. based on the results of testing the accuracy of 20 data samples, 18 data were appropriate and 2 data were not appropriate so that the accuracy obtained was 90%, and from user satisfaction testing it was found that 80% were satisfied with the system created and 20% were not satisfied.
MONITORING PARAMETER AIR BERBASIS IOT (INTERNET OF THINGS) Anshori, Yusuf; Parenrengi, Andi Fathur Alamsyah A.; Angreni, Dwi Shinta; Ardiansyah, Rizka; Joefrie, Yuri Yudhaswana
Foristek Vol. 13 No. 2 (2023): Foristek
Publisher : Foristek

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54757/fs.v14i2.322

Abstract

Water is a necessity for living things that have certain parameters to be consumed. This tool is made to measure the parameters of pH, temperature and turbidity of water quality and this tool is integrated with Internet of Things (IoT) technology so that sensor measurement data can be accessed anywhere and anytime. This tool implements Fuzzy Logic to generate “clean” and “unclean” values for water and uses the NodeMCU-ESP32s Module as the main controller, the PH-4502c sensor measures pH, the SKUSEN0189 sensor measures turbidity, and the DS18B20 sensor measures temperature. The results show that all sensors work well with an average error value of 2.95% for pH, 0.80% for temperature, and 21.32% for turbidity.
TWITTER (X) SENTIMENT ANALYSIS OF KAMPUS MERDEKA PROGRAM USING SUPPORT VECTOR MACHINE ALGORITHM AND SELECTION FEATURE CHI-SQUARE Sari, Mutiara; Syahrullah, Syahrullah; Lapatta, Nouval Trezandy; Ardiansyah, Rizka
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 5 (2024): JUTIF Volume 5, Number 5, Oktober 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.5.2037

Abstract

Ministry of Education, Culture, Research and Technology (Kemendikbudristek) has implemented numerous policies aimed at enhancing the quality of education in the country. One of these policies is Kampus Merdeka program. The program includes various initiatives such as Teaching Campus, the Merdeka Student Exchange program, and Internship and Independent Study programs, which have gained significant popularity among students across Indonesia. However, the Kampus Merdeka program has drawn many pros and cons, with some parties supporting the initiative, but also many criticisms related to its implementation, which is considered not optimal in some educational institutions. Social media is where many of these opinions are voiced, one of the most widely used of which is twitter. In light of these circumstances, this study conducted a sentiment analysis of the independent campus program to assess public sentiment towards it. The dataset used in this research consisted of 500 tweets containing the keyword "kampus merdeka" with 250 tweets reflecting positive sentiment and 250 tweets reflecting negative sentiment. The results of the tests carried out obtained the highest increase in results in the 10:90 ratio, namely with an accuracy that increased by 14% from the previous 66% to 80%, precision also increased by 22% from the previous 67% to 89%, recall increased by 16% from the previous 58% to 79%, and the f1-score value which was previously 62% turned into 79% because it also increased by 17%.
Evaluasi Performa Proof of Work dan Proof of Stake melalui Uji Stres Beban Tinggi Blockchain Yulianti, Indira; Ardiansyah, Rizka; Yazdi Pusadan, Mohammad; Amriana; Lamasitudju, Chairunnisa
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2500

Abstract

Consensus mechanisms play a crucial role in determining the efficiency and scalability of blockchain systems. The two most commonly used algorithms are Proof of Work and Proof of Stake, each exhibiting distinct performance characteristics under high transaction loads. This study aims to evaluate and compare the performance of both consensus mechanisms through a simulation-based experimental approach. Testing was conducted using the Hardhat framework in a local environment under two primary scenarios: transaction scaling and burst transaction.Four evaluation metrics were employed: throughput, transaction latency, finality time, and mempool congestion. The results indicate that Proof of Stake consistently outperforms across all four metrics, demonstrating high throughput, stable latency and finality time, and controlled mempool congestion. In contrast, Proof of Work shows a significant decline in performance under heavy load due to its static and non-adaptive mining process.The Mann-Whitney U statistical test confirms that the performance differences are statistically significant across nearly all metrics. This research provides deeper insights into the strengths and limitations of each consensus mechanism under high-load conditions using Hardhat, and contributes to a broader understanding of blockchain scalability in real-world applications. The findings suggest that Proof of Stake is more suitable for large-scale blockchain implementations that demand high efficiency and speed.
Recency, Frequency, and Monetary-Based Customer Segmentation Using K-Means for Analysing Transactional Behaviour in a Service-Based Micro, Small, and Medium Enterprises Ardiansyah, Rizka; Trezandy, Nouval; skandar, Iskandar; Ilman, Meilani; Sahril, Sahril
Green Intelligent Systems and Applications Volume 6 - Issue 1 - 2026
Publisher : Tecno Scientifica Publishing

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53623/gisa.v6i1.919

Abstract

Micro, Small, and Medium Enterprises (MSMEs) often faced challenges in designing effective promotional initiatives due to the limited use of systematic customer behavior analysis. This study examined the application of (Recency, Frequency, Monetary) RFM analysis combined with K-Means clustering to explore customer segmentation in a service-based MSME context. Transaction data from a local laundry service operating in Palu, Indonesia, consisting of 2,220 digital transaction records collected between 2022 and 2025, were processed and transformed into RFM variables using min–max normalization. The optimal number of clusters was determined using the Elbow method, resulting in four customer segments. Cluster quality was evaluated using internal validation metrics, yielding a Davies–Bouldin Index (DBI) of 0.61 and a Sum of Squared Errors (SSE) value of 1.73, indicating reasonably compact and well-separated clusters. The resulting segments exhibited distinct transactional profiles across recency, transaction frequency, and monetary contribution, reflecting heterogeneity in customer engagement within the studied MSME. Rather than prescribing specific marketing actions, the findings provided an interpretable analytical basis for considering differentiated promotional strategies aligned with observed customer behavior patterns. Overall, this study demonstrated that RFM-based segmentation offered a feasible and data-driven approach to supporting evidence-informed promotional planning in service-oriented MSMEs operating under data and resource constraints.