Claim Missing Document
Check
Articles

Found 25 Documents
Search

GAME EDUKASI PENGENALAN BAHASA INDONESIA BERBASIS ANDROID UNTUK PENCARI SUAKA DI BATAM Nopri Hidayat; Maslan, Andi
Computer Science and Industrial Engineering Vol 7 No 5 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT An asylum seeker is a person who has applied for protection but his application is in the process of being determined. Batam is one of the cities in Indonesia that is home to asylum seekers. Asylum seekers in Batam stay at Hotel Kolekta Batam. Data for May 2022, the total number of asylum seekers staying at the Kolekta Batam hotel is 283 people. Asylum seekers from Afghanistan became the most inhabited with a total of 173 people. While living in Indonesia, the problem is communication with the surrounding community who use Indonesian, especially children. Although there are already Indonesian language learning programs, there is still a need for a more fun learning method, one of which is games. Games are more liked by children in terms of learning than using books. To overcome these problems, an Android-based Indonesian language introduction educational game was built using the MDLC method. The MDLC method is divided into several stages, namely concept, design, collecting material, assembly, testing, and distribution. This educational game has 4 sub-menus, namely: learn, play, about and exit. Educational games are accompanied by attractive designs and animations so that they are interesting to use for children to learn. Keywords: Educational Games, Asylum Seeker, Indonesian Language, Android Based.
ANALISIS KEAMANAN JARINGAN PADA FASILITAS INTERNET TERHADAP SERANGAN SYSTEM FAILURE PADA TOKO SERVICES W-ELEKTRIK BATAM Nofedrinata, Windri; Maslan, Andi
Computer Science and Industrial Engineering Vol 8 No 2 (2023): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The research entitled Analysis of Network Security in Internet Facilities (Wifi) Against System Failure Attacks at the Batam W-Electric Service Shop is expected to help analyze network protocols and review network security. The technique used in this study is a descriptive approach, where this strategy is used to parse information by describing the information that has been collected without making changes when conducting research at the Batam W-Electric Service Store. Based on directed research, this shows how research in the W-Electric Service Store can be intercepted using ettercap and can be easily attacked in the form of a trojan, which is a wiretapping cycle by sending packets. Therefore it is suggested to the W-Elektrik Service Shop to further develop network security so that it is not easily hacked and attacked like a trojan.
IMPLEMENTASI MANAJEMEN BANDWIDTH MENGGUNAKAN METODE PEER CONNECTION QUEUE PADA MIKROTIK Mariyanto, Mariyanto; Maslan, Andi
Computer Science and Industrial Engineering Vol 9 No 3 (2023): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/comasiejournal.v9i3.7697

Abstract

A hotspot consists of one or more WLAN or Wireless LAN Access Points of standard 802.11a/b/g that provide a restricted area in which users can freely join Access Points with WLAN-enabled mobile devices. With advances in technology, a router is a device that is used to perform the routing process. However, since routers are expensive, there are hardware alternatives such as Mikrotik. Mikrotik RouterOS is an operating system that can turn a computer into a router, or often called a PC Router. solutions to take advantage of bandwidth management and use Mikrotik router boards as a tool to divide bandwidth evenly. Because excessive use will cause a long load when accessing the internet or limited bandwidth. To distribute the load and manage the client connection path to a service on the server, the PCQ (Peer Connection Queue) method is used. The way to do PCQ is to upload with type pcq-dpwnload-phd, set the queue size and total queue size, and check the classification list for different addresses. In addition, to implement bandwidth management with PCQ for uploads, you must create the type pcq-upload-pd, set the queue size and total queue size, and check the classifier list for the source address. For setting upload and download targets on the proxy, you must point to the network address 192.168.100.0/24, with a maximum upload speed of 10 MBPS and 30 MBPS download. The results of this study indicate that the use of a PCQ-based proxy network can be applied properly for Pizza Hut delivery in Batam City.
ANALISIS KLASIFIKASI EMAIL SPAM MENGGUNAKAN ALGORITMA NAÏVE BAYES Rahman, Azan; Maslan, Andi
Computer Science and Industrial Engineering Vol 12 No 3 (2025): Comasie Vol 12 No 3
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/comasiejournal.v12i3.9792

Abstract

Spam emails pose a significant challenge in digital communication, requiring effective classification methods to enhance cybersecurity. This study evaluates the performance of the Naïve Bayes algorithm in detecting spam emails, focusing on accuracy, precision, and recall. The dataset consists of pre-labeled emails processed using TF-IDF for feature extraction. The results indicate that the algorithm achieved an accuracy of 90% before addressing class imbalance. After applying SMOTE, the final accuracy improved to 98%. These findings demonstrate that Naïve Bayes is an effective method for spam email classification, with SMOTE enhancing its performance in handling class imbalance.
ANALISIS SERVICE QUALITY BANDARA HANG NADIM BATAM MELALUI MODEL SERVQUAL Ghazali, Ihwan; Maslan, Andi
Computer Science and Industrial Engineering Vol 12 No 3 (2025): Comasie Vol 12 No 3
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/comasiejournal.v12i3.9837

Abstract

Hang Nadim, located in Batam City, Riau Island Regency, is one of Indonesia's international airports. Due to its size and reputation as an international airport, Hang Nadim Airport has a policy that restricts access to each sector. The use and assignment of airport PAS cards are typically subject to restrictions for airport staff. The airport region is off-limits to cargo workers, airline employees, shopkeepers, and renters. The state is in charge of ensuring airport safety and security in order to protect travelers. Without authorization from the airport, it is forbidden for anybody to be in specific areas of the airport, erect impediments, or engage in any other activity that could jeopardize flight security and safety
Analisis Diagnosis Tingkat Kesehatan Mental Dengan Teknik Klasifikasi Algoritma C4.5 Erlin Elisa; Maslan, Andi; Simanjuntak, Pastima
Prosiding Vol 7 No 1 (2025): SNISTEK
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/psnistek.v7i1.10726

Abstract

Mental health has become an increasingly important issue amid the growing pressures of modern life, particularly in the workplace. Job demands, performance targets, and the dynamics of social relationships at work can trigger stress that negatively affects employee productivity and well-being. However, low awareness and social stigma surrounding mental health issues often result in stress going undetected at an early stage. This study aims to identify employee stress levels at a company in Batam City using a data mining approach. Data were collected through the distribution of questionnaires based on the DASS-21 (Depression Anxiety Stress Scales), which measures three main aspects: stress, anxiety, and depression. The data were analyzed using the Python programming language, with stages including preprocessing, transformation of scale values into numerical form, and the construction of a classification model using the C4.5 algorithm (Decision Tree Classifier). The results showed that the classification model was able to identify stress levels with an accuracy of 67%. The best performance was observed in the moderate stress class (class 1), with a precision value of 0.71 and a recall of 0.79. In contrast, the classification performance for minority classes such as no stress (class 0) and severe stress (class 2) was relatively low. These findings suggest that the C4.5 algorithm is reasonably effective in recognizing dominant stress patterns but requires further data processing and class-balancing techniques to improve overall model performance. This study is expected to serve as a foundation for early detection and more accurate handling of workplace stress
Implementasi Tools Aircrack-ng Untuk Menganalisis Keamanan Jaringan Wifi Menggunakan Kali linux Fadzri, Alief Achmad; Maslan, Andi
Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya Lubuklinggau Vol 7 No 2 (2025): Jurnal Ilmiah Binary STMIK Bina Nusantara Jaya
Publisher : STMIK Bina Nusantara Jaya Lubuk Linggau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52303/jb.v7i2.169

Abstract

Kemajuan teknologi informasi dan komunikasi telah mendorong peningkatan penggunaan jaringan nirkabel (Wifi) karena fleksibilitas dan efisiensinya. Wifi banyak digunakan di rumah, kantor, dan institusi publik. Namun, kemudahan ini juga membawa kerentanan tinggi terhadap ancaman keamanan seperti sniffing, spoofing, brute force, dan man-in-the-middle. Ancaman ini diperparah oleh konfigurasi jaringan yang lemah dan rendahnya kesadaran pengguna. Penelitian ini bertujuan mengimplementasikan tool Aircrack-ng untuk menganalisis keamanan Wifi serta mengevaluasi efektivitasnya dalam mengidentifikasi celah keamanan. Pengujian dilakukan melalui tahapan scanning, capturing, deauthentication, dan cracking menggunakan Kali linux. Penelitian diterapkan pada jaringan Wifi di lingkungan PT Evergrown technology. Hasil menunjukkan bahwa Aircrack-ng efektif dalam mengidentifikasi kelemahan, terutama pada jaringan dengan enkripsi lemah dan kata sandi yang mudah ditebak. Data handshake yang diperoleh melalui serangan deauthentication berhasil digunakan dalam proses cracking. Temuan ini membuktikan bahwa jaringan Wifi tetap rentan tanpa pengaturan keamanan yang memadai. Sebagai upaya mitigasi, disarankan penggunaan kata sandi kuat, menonaktifkan WPS, memperbarui firmware secara berkala, dan menerapkan Mac filtering. Aircrack-ng terbukti berguna dalam pengujian penetrasi dan sebagai acuan peningkatan keamanan jaringan nirkabel.
Klasifikasi dan Deteksi Malware Menggunakan Variasi Model Algoritma Machine learning Maslan, Andi; Fajrin, Alfannisa Annurullah; Putri, Anggia Dasa
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 11, No 1 (2025): Volume 11 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/jp.v11i1.87924

Abstract

Serangan Malware merupakan serangan yang dilakukan oleh seorang attacker dengan cara mengirimkan kode-kode berbahaya ke berbagai file atau bahkan banyak paket dan server. Oleh karena itu, operasional jaringan yang handal menjadi faktor yang perlu diperhatikan untuk mencegah terjadinya serangan sedini mungkin agar tidak terjadi kerusakan sistem yang lebih parah. Jenis serangan dapat berupa Ping of Death, flooding, remote-controlled attack, UDP flooding, dan Smurf Attack. Data serangan diperoleh dari dataset ClaMP, selain itu dilakukan penangkapan paket data pada log jaringan dan optimasi ekstraksi fitur yang selanjutnya dianalisa secara statistik dengan algoritma machine learning. Tujuan dari penelitian ini adalah untuk mendeteksi, mengklasifikasi serangan Malware menggunakan berbagai model Algoritma ML seperti SVM, KNN dan Neural Network serta melakukan pengujian kinerja deteksi. Tahapan penelitian dimulai dari proses Pre-Processing, ekstraksi, pemilihan fitur dan klasifikasi serta pengujian kinerja. Data training dan testing pada penelitian ini menggunakan mixed model yaitu data division, split model dan cross validation. Hasil penelitian menyimpulkan bahwa algoritma terbaik untuk mendeteksi paket Malware adalah Neural Network untuk kategori Feature Combination dengan tingkat akurasi sebesar 96,91%, Recall sebesar 97,35% dan Precision sebesar 96,78%. Sehingga penelitian tersebut dapat berimplikasi bagi para ahli siber untuk dapat mencegah serangan Malware sejak dini. Sedangkan penelitian selanjutnya diperlukan algoritma khusus untuk meningkatkan deteksi serangan Malware, selain KNN, SVM dan Neural Network. Penelitian ini dapat dijadikan referensi bagi para peneliti yang sedang melakukan penelitian di bidang yang sama.
Penerapan Model Pembelajaran Mesin Dalam Sistem Cybersecurity Fajrin, Alfannisa Annurrallah; Maslan, Andi
Jurnal Desain Dan Analisis Teknologi Vol. 4 No. 2 (2025): Juli
Publisher : Aptikom Kepri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58520/jddat.v4i2.85

Abstract

Keamanan jaringan atau cybersecurity sangat penting dalam dunia digital,karena seseorang yang melakukan penyerangan bisa megirim kode jahat seperti malware ke berbagai file yang bisa merugikan orang lain. Ada berbagai jenis malware atau program yang cukup berbahaya bisa ditemukan di internet. Banyak hal yang harus diperhatikan dalam perlindungan system, seperti jaringan dan keamanan lainnya yang merupakan fakrot penting karena berkaitan dengan pengoperasian sistem informasi agar bisa mencegah ancaman terhadap kerusakan sistem. Malware merupakan program software yang berbahaya pagi pengguna komputer.Serangan kerusakan yang sering terjadi seperti Ping of Death, UDP Flood, Smurf Attack dan lainnya. Model pembelajaran mesin atau biasnaya disebut dengan Machine Learning akan melakukan pendekatan untuk mendeteksi serangan malware ini yang dianalisis secara statistik menggunakan algoritma genetika. Dari pembelajaran mesin ini akan dilakukan secara kategori untuk serangan malware yang terjadi dengan cara eksplorasi data,training dan testing, maka akan terlihat tingkat akurasi dari neural networknya.
Development of Conventional Lathe Machine Manual User by Using Augmented Reality Frameworks Hamid, Abdul; Puan, Loretta Anak; Tamin, Norfauzi; Maslan, Andi; A.S, Darmawan
JOIV : International Journal on Informatics Visualization Vol 9, No 3 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.3.2712

Abstract

Machining is one of the familiar subjects in the field of Technical and Vocational Education and Training (TVET) and has been offered at several Vocational Colleges and Institutes of Higher Education (IPT) throughout Malaysia. However, the level of dominance is limited to a handful of students in understanding the learning content and achieving learning outcomes at the end of the course's teaching and learning process. Therefore, this research intends to design and develop a machine manual using an interactive multimedia concept characterized by Augmented Reality (AR). The method of creating forms and developing interactive multimedia routinely uses the Analysis, Design, Development, Implementation, and Evaluation (ADDIE) model as a reference model and guideline for implementing learning. The research instruments used were product development expert review forms and student investigation questionnaires. The research respondents consisted of 80 TVET students from Universiti Tun Hussein Onn Malaysia (UTHM) and Tanjung Piai Vocational School. The data obtained is collected and analyzed periodically using statistical-based software. An evaluation is conducted on the product's design, form, content, and functionality. The results of the analysis on the use of interactive multimedia concepts indicate that the average minimum standard for all variables exceeds 3.25, which is interpreted as Highly Acceptable for the Use of Multimedia-Based Learning. Three experts in the field of multimedia and engineering agree that the product developed has a shape that matches the design and can function effectively. Overall, the research found that the design form, content, and functionality of conventional interactive machines can enhance students' visualization abilities in the teaching and learning process, as well as improve their skills when practicing with the devices.