Claim Missing Document
Check
Articles

Found 14 Documents
Search

RC4 Cryptography Implementation Analysis on Text Data Irawan, Agung Susilo Yuda; Pratama, Adi Rizky; Antono, Ryan
JURNAL SISFOTEK GLOBAL Vol 11, No 2 (2021): JURNAL SISFOTEK GLOBAL
Publisher : STMIK Bina Sarana Global

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38101/sisfotek.v11i2.408

Abstract

Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of Facebook user account information. This is certainly a significant issue in the world of information technology and even the world of entrepreneurship because it involves one of the young entrepreneurs, Mark Zuckerberg. Main problem in this case is data security. who can know information and who should not know information. To overcome such things, research is made in the field of data and information security by analyzing one of the encryption and decryption techniques, namely RC4 cryptography. This study explains how RC4 cryptography works, the advantages and disadvantages of RC4 cryptography, and the effectiveness of RC4 cryptography. RC4 (River Ciper 4) is a decryption encryption technique that uses a key as a reference. The process consists of KSA, PRGA, and XOR. To find out the usefulness of RC4 cryptography, in this study, encryption and decryption were carried out on text data. There are several advantages and disadvantages to RC4 cryptography from a technical point of view. The advantage that needs to be underlined is that this RC4 cryptography uses a certain key as a reference, things like this can provide convenience to the encryption maker but can also be a threat. as a result RC4 can hide information very well while the secret key is not known by others. In addition to being used in text data, this cryptography may be used for other data such as audio and video.
Komparasi Teknik Load Balancing Menggunakan Algoritma Round Robin Dan Least Connection Pada Container Docker Nugraha, Ramdan; Solehudin, Arip; Irawan, Agung Susilo Yuda
JURNAL LENTERA : Kajian Keagamaan, Keilmuan dan Teknologi Vol 23 No 2 (2024): Juni 2024 (Edisi Teknologi Informasi dan Komunikasi)
Publisher : LP2M STAI Miftahul 'Ula (STAIM) Nganjuk

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Single servers that often go down due to overload or high workload, this can be handled by the Cluster Server Load Balancing scheme, but the performance of this scheme needs to be measured. This research purpose to compare the performance of two algorithms, namely the Round Robin and Least Connection algorithms in implementing the Apache load balancer in Docker container-based virtualization. The performance test used is load testing using the Apache JMeter tool. The parameters measured are throughput and response time. This research uses the SIDLC (System Infrastructure Development Life Cycle) method. The research results show that the Apache load balancer with the least connection algorithm is superior because it can handle 300,000 sample requests with a throughput value of 2120.9 requests/seconds and a response time of 238 milliseconds. The Apache load balancer with least connection can handle http-requests in 141 seconds, this is 9 seconds faster than the round robin algorithm which is able to handle 300,000 sample requests in 150 seconds, then the error value for the least connection algorithm is still below 0.05% during the highest test peak, 300,000 sample requests.
Analisis Sentimen Tournament Bali Major Dengan Metode Long Short Term Memory Alwansyah, Izhari; Garno, Garno; Irawan, Agung Susilo Yuda
JURNAL LENTERA : Kajian Keagamaan, Keilmuan dan Teknologi Vol 23 No 2 (2024): Juni 2024 (Edisi Teknologi Informasi dan Komunikasi)
Publisher : LP2M STAI Miftahul 'Ula (STAIM) Nganjuk

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29138/lentera.v23i2.1404

Abstract

Along with the growth of technological advances and the high availability of electronic devices, the video game industry has increased rapidly because people can play video games on computers, laptops, tablet PCs, consoles or smartphones. One of the popular games that are widely played is Dota 2. The number of players and competition in this game created an electronic sport or what is often called esport. One of the big tournaments that has been held is the Bali Major tournament in Indonesia. However, unfortunately this competition received various criticisms from the public, many felt disappointed because this big tournament was not worth the ticket price set. So this has led to various public sentiments through social media. Analyzing the sentiment of twitter users towards the opinion of the Bali Major tournament itself can be an option. Therefore, this research conducted a sentiment analysis of public opinion on the Bali Major tournament as an evaluation of the next tournament. Based on research that has been conducted using 1257 tweet data as a dataset, the LSTM algorithm can perform sentiment classification with the best model getting an accuracy value of 80% and f1-score 80%. This research proves that by applying sentiment analysis techniques, information about positive and negative public sentiment is obtained as evaluation material that needs to be done to optimize technical constraints and services provided.
PERANCANGAN UI/UX APLIKASI TRANSPORTASI PUBLIK BERBASIS MOBILE DENGAN METODE USER CENTERED DESIGN Karimullah, Alif; Rizal, Adhi; Irawan, Agung Susilo Yuda
Jurnal Informatika dan Teknik Elektro Terapan Vol 12, No 3 (2024)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4855

Abstract

Perkembangan teknologi telah membawa perubahan signifikan pada berbagai aspek kehidupan, termasuk transportasi. Era digital telah mengubah cara masyarakat berinteraksi dengan layanan transportasi. Transportasi publik, seperti angkot, oplet, dan minibus, mulai ditinggalkan karena peningkatan penggunaan kendaraan pribadi, yang menimbulkan masalah kemacetan. Teknologi smartphone mempermudah akses informasi dan meningkatkan produktivitas pengguna. Aplikasi dirancang untuk membantu berbagai bidang, termasuk transportasi publik. Penelitian ini menggunakan metode user centered design (UCD) untuk merancang aplikasi transportasi publik yang sesuai dengan kebutuhan pengguna dengan dua metode pengujian yaitu System Usability Scale (SUS) dan Single Ease Questions (SEQ). Hasil pengujian menunjukkan aplikasi transportasi publik memiliki tingkat usability dengan skor SUS 86 yang masuk kategori excellent dan dapat diterima dengan baik oleh pengguna. Metode user centered design terbukti efektif untuk merancang user interface dan user experience yang sesuai dengan kebutuhan pengguna sehingga mudah digunakan.
RANCANG BANGUN SISTEM PELAYANAN LAUNDRY BERBASIS WEBSITE MENGGUNAKAN REACTJS Ardiansyah, Dwi Putra; Irawan, Agung Susilo Yuda; Nurkifli, E. Haodudin
Jurnal Informatika dan Teknik Elektro Terapan Vol 12, No 3 (2024)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4812

Abstract

Solusi Laundry merupakan usaha laundry kiloan dan memiliki layanan jasa antar-jemput cucian. Usaha ini belum memiliki sistem informasi pelayanan, sehingga dalam menjalankan kegiatan usaha, solusi laundry masih menggunakan sistem konvensional. Berbagai permasalahan yang muncul akibat dari ketiadaan sistem informasi pelayanan ini menimbulkan kesulitan baik bagi pemilik usaha maupun bagi pelanggan itu sendiri. Penelitian ini menggunakan metode Software Development Life Cycle model waterfall. Terdapat beberapa alur atau fase yang ada pada metode SDLC model waterfall ini, mulai dari fase analisis kebutuhan, desain, impelementasi, melakukan pengujian terhadap sistem yang selesai dibangun dengan menggunakan black box testing, lalu diverifikasi oleh pengguna melalui user acceptance test, lalu yang terakhir yaitu pemeliharaan. Penelitian ini menghasilkan sebuah website yang dibangun menggunakan metode Software Development Life Cycle dengan model waterfall yang terdiri dari beberapa tahap, diantaranya: requirement, design, implementation, verification, dan maintenance.Penulis menggunakan metode pengujian Black Box dan User Acceptance Testing dan dilakukan pengujian sebanyak tujuh belas kali test case dan didapatkan hasil tujuh belas test case diterima, sedangkan pada pengujian User Acceptance Testing dilakukan pengujian kepada 20 responden terdiri dari Pelajar/Mahasiswa 13, Karyawan 7 dan didapatkan hasil penerimaan dari pengguna yaitu sebesar 92,25% pada aspek desain, 90,25% pada aspek usability.
RANCANG BANGUN SISTEM PENDETEKSI LINK PHISHING MENGGUNAKAN ALGORITMA RANDOM FOREST BERBASIS WEB Harahap, Ali Dongan; Juardi, Didi; Irawan, Agung Susilo Yuda
Jurnal Informatika dan Teknik Elektro Terapan Vol 12, No 3 (2024)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4858

Abstract

Phishing merupakan teknik penipuan yang memanfaatkan media internet untuk memperoleh informasi sensitif seperti kata sandi dan nomor kartu kredit dengan menyamar sebagai pihak yang tepercaya. Penelitian ini bertujuan untuk merancang dan membangun sistem pendeteksi link phishing berbasis web menggunakan algoritma Random Forest. Algoritma Random Forest dipilih karena kemampuannya dalam menangani jumlah data yang besar dan variabel yang banyak, serta mampu memberikan akurasi yang tinggi dalam proses klasifikasi. Sistem ini diimplementasikan dalam bentuk aplikasi web yang dapat digunakan oleh pengguna untuk memeriksa keaslian suatu link. Pengembangan sistem ini menggunakan metode SDLC (Software Development Life Cycle) dengan model Waterfall yang terdiri dari tahapan-tahapan: analisis kebutuhan, desain sistem, implementasi, pengujian, dan pemeliharaan. Bahasa pemrograman yang digunakan adalah Python dengan framework Flask untuk pengembangan backend, serta HTML, CSS, dan JavaScript untuk frontend. Basis data yang digunakan adalah MySQL. Hasil pengujian menunjukkan bahwa sistem yang dibangun mampu mendeteksi link phishing dengan tingkat akurasi yang memuaskan. Dengan demikian, diharapkan sistem ini dapat membantu pengguna dalam mengidentifikasi link phishing dan mengurangi risiko penipuan di dunia maya.Keywords: Phishing, Random Forest, Web Application, SDLC, Python, Flask, MySQL
Prediksi Kepribadian Berdasarkan Media Sosial Twitter Menggunakan Metode Naïve Bayes Classifier A, Muhammad Ichsanudin; Irawan, Agung Susilo Yuda; solehudin, Arip
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.394

Abstract

Analysis of a person's personality is very helpful as an assessment in various matters such as recruitment, career, health. The methods commonly used in personality analysis are interviews, observations, and questionnaire surveys. This study tries to provide a solution by simply using social media, namely twitter, by analyzing twitter user information data called tweets, this is to add to the method of personality analysis. The method used in this personality prediction research is to classify a tweet into 5 personality forms. The personality method used by the researcher is the Big Five Personality which consists of openness, conscientiousness, extraversion, agreeableness, and neuroticism with classification calculations using Naive Bayes. The result of this research is an accuracy of 42% with the highest class, namely Agreeableness.
Implementasi Sistem Pendeteksi Asap Kebakaran dengan Mikrokontroler Arduino Dengan Metode Fuzzy Mamdani Alifah, Nurli; Irawan, Agung Susilo Yuda
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 1 (2023): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i1.593

Abstract

Fire disasters often occur due to various factors, one of which is public negligence and lack of anticipation to prevent fires from occurring. In most cases, the fire is often known when it has grown. Based on these problems, we need a system that can detect fires as quickly as possible from the appearance of smoke to prevent the emergence of a fire that is getting bigger. In this study, the author will create a system in the form of a fire smoke detector using an Arduino Uno microcontroller with the fuzzy mamdan method. The author wants to compare the fuzzy mamdani method and the Arduino device to get the most accurate results possible. Fuzzy reasoning was chosen because this method is able to calculate data that is vague to not vague, commonly called a vague analogy, namely the value used is between 0 and 1. In this system there is an MQ-2 sensor module to detect smoke and an LM35 temperature sensor connected to the Arduino Uno microcontroller. as a center for controlling the work of other devices and a data processing center on the system. And the program is made on Arduino IDE. With an LCD output to display information about the presence of smoke and an output in the form of a buzzer to give a warning sound. In this study, the results showed that the Fire Smoke Detection System Using an Arduino Microcontroller with the Fuzzy Mamdani Method could run well and produce state outputs that were in accordance with the fuzzy calculations in Matlab.
Teknologi Augmented Reality Sebagai Media Pembelajaran Dalam Pengenalan Buah-Buahan (Kasus Paud Hidayatul Burhan) Maelani, Yeyen; Irawan, Agung Susilo Yuda; Suharso, Aries
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.387

Abstract

Paud Hidayatul Burhan is an Early Childhood Education which is located in Pasirtanjung Village, Lemahabang District, Karawang Regency. Currently, teachers are demanded to be creative in providing education to their students with various methods such as the rationalization of plant themes for fruits and so on. Due to the lack of educational facilities for this use of media, it is necessary to use technology to attract children's interest and motivation to learn. In this case, the fruit learning media still uses conventional methods such as books to see its shape in 2D. The method used in the application of augmented reality in this study is markerless, so that the black and white square markers are replaced by pictorial markers presented in the Augmented Reality Book (AR Book) containing strawberries, lemons and cherries. From the results of alpha testing, the application made can function properly. From the results of the marker test, the application can display 3D objects at a marker distance of 5 cm - 60 cm, with a marker tilt angle of 30 ° - 60 ° and the marker is blocked by other objects up to 75%. From the results of the questionnaire calculation using the Likert's Sumated Rating (LSR) method, a score of 85 was obtained, so the assessment range was very positive, which means that the application can be implemented properly. And also the calculations carried out by the author in the evaluation of students showed that Ho was rejected because there was no significant effect on children's understanding, while H1 was accepted because of a significant influence on children's understanding.
Analisi Data Transaksi Penjualan Menggunakan Algoritma Apriori Untuk Menentukan Paket Promosi Refarasi Mobil R, Aria Renalda; Irawan, Agung Susilo Yuda; Suharso, Aries
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.388

Abstract

Rizal Motor Workshop is a business in the field of services and sales of auto parts. More and more workshops are growing rapidly at this time, making Rizal Motor Workshop making a better marketing strategy than other workshops. With a promotional package it will attract the attention of consumers who were previously not interested in shopping to become very interested because of the available promotional packages. To determine the promotional package at the Rizal Motor Workshop to be more efficient and on target, the author uses one way to look at the items most frequently purchased by consumers. The purpose of this study is to analyze sales transaction data to be used as a promotional package based on the buying patterns of consumers. The method used in this study uses the Knowledge Discovery in Database (KDD) method which consists of stages of data selection, data cleaning, data transformation, data mining, and evaluation. The algorithm in this study uses the Apriori Algorithm which looks at the itemset formed, in this study using 4 itemsets with a minimum support of 60% and a minimum confidence of 90%. For the results obtained are associations between products or connectedness of goods, in this study the confidence value obtained was 98.182% which is the best confidence value contained in the 3 itemse.