Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Aiti: Jurnal Teknologi Informasi

Sistem Pendukung Keputusan Pemberian Kredit menggunakan ID3 Cahyo Dimas K; Hindriyanto Dwi Purnomo; Teguh Wahyono
AITI Vol 14 No 1 (2017)
Publisher : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (621.902 KB)

Abstract

Kredit koperasi adalah pinjaman dana yang diberikan oleh koperasi kepada nasabahnya berdasarkan kebutuhan maupun kriteria tertentu. Pemberian kredit kepada nasabah harus memenuhi kriteria maupun aturan tertentu. Ada 6 aspek yang harus dipertimbangkan dalam pemberian kredit, yaitu : character, collateral, condition, capacity, capital, dan area. Untuk memutuskan apakah seorang nasabah layak mendapatkan kredit atau tidak, perlu dilakukan evaluasi. Dalam penelitian ini, dirancang sebuah sistem pendukung keputusan menggunakan algoritma Iterative Dichotomizer Three untuk memudahkan koperasi melakukan evaluasi terhadap calon nasabah. Algoritma ID3 digunakan sebagai mesin inferensi untuk membantu pengambil kebijakan dalam menentukan nasabah yang layak mendapatkan kredit dan nasabah yang tidak layak mendapatkan kredit.
Neuroevolution untuk optimalisasi parameter jaringan saraf tiruan Hindriyanto Dwi Purnomo; Tad Gonsalves; Teguh Wahyono; Pratyaksa Ocsa Nugraha Saian
AITI Vol 20 No 2 (2023)
Publisher : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/aiti.v20i2.125-134

Abstract

Artificial Neural Network is a supervised learning method for various classification problems. Artificial Neural Network uses training data to identify patterns in the data; therefore, training phase is crucial. During this stage, the network weight is adjusted so that they can recognize patterns in the data. In this research, a neuroevolution approach is proposed to optimize artificial neural network parameters (weight) Neuroevolution is a combination of evolutionary algorithms, including various metaheuristics algorithms, to optimize neural network parameters and configuration. In particular, this research implemented particle swarm optimization as the artificial neural network optimizer. The performance of the proposed model was compared to backpropagation, which uses gradient information to adjust the neural network parameter. There are five datasets used as the benchmark problems. The datasets are iris, wine, breast cancer, ecoli, and wheat seeds. The experiment results show that the proposed method has better accuracy than the backpropagation in three out of five problems and has the same accuracy in two problems. The proposed method is also faster than the backpropagation method in all problems. These results reveal that neuroevolution is a promising approach to improving the performance of artificial neural networks. Further studies are needed to explore more benefits of this approach.
Uji kerentanan keamanan pada web Sistem Informasi Akademik Satya Wacana menggunakan metode Vulnerability Assessment Efendi, Rissal; Wahyono, Teguh; Widiasari, Indrastanti R.
AITI Vol 21 No 1 (2024)
Publisher : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/aiti.v21i1.44-57

Abstract

Vulnerability assessment is a process to look for system security gaps that can cause information technology process system failure. In carrying out a vulnerability assessment there are three main stages, namely information collection, assessment and exploit using the Greybone Openvas tool with a Full Scan template on the object and several credentials provided by a website. From the vulnerability assessment process, five vulnerabilities were found on assets, namely critical risk with a few 0, high risk with a few 2, medium risk with a few 2, and low risk with a few 1. Based on the conclusions from the vulnerability analysis the website and the results of identity verification, it was concluded that the website had a few weaknesses and vulnerabilities that needed to be fixed to maintain the security and quality of the website. Corrective actions on website configuration need to be taken such as setting cookies, SSL, HTTP headers, and others. SSL/TLS services do not accurately limit the renegotiation stage of the system, making it easier for attackers to carry out Denial of Service attacks by carrying out many renegotiations in one connection.