Claim Missing Document
Check
Articles

Found 6 Documents
Search

Penerapan Konsep Finite State Automata Dalam Proses Pendaftaran Kelas Kursus Bahasa Inggris Pada Tempat Kursus Aziz, Faruq; Said, Fadillah; Sudrajat, Adjat
MATICS Vol 12, No 2 (2020): MATICS
Publisher : Department of Informatics Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/mat.v12i2.9330

Abstract

Research on website-based test applications for digital course registration in order to make it easier for course institutions to determine classes that are consistent and effective and efficient. This research provides alternative solutions for course institutions for class selection or course program that is suitable for users who will study at the place of the course which is cost-effective and time-consuming too. In this study a course registration application is designed by integrating a website and database to retrieve data after the user has tested. It is intended that users who want to learn English can receive a choice of classes or programs in accordance with their abilities and initial knowledge. This minimizing test instructor errors in determining class and program choices that will be obtained by the user. In this study using the Finite State Automata (FSA) method to discuss the NFA type FSA model can be implemented in the registration process to the user (member) where the course is expected as needed and can better understand how the process of class or program selection is effective and right on target
Implementasi Algoritma C4.5 dan Naive Bayes untuk Analisis Sentimen Publik terhadap Platform Live Streaming Dukov di Indonesia Nugraha, Denny; Said, Fadillah
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.1011

Abstract

The rise of online live streaming application platforms in Indonesia has led to various public opinions. As technology advances, live streaming applications not only provide live features, but also have many other features such as games, voice calls, video calls and many more. In this paper, it aims to analyze public sentiment towards the Dukov live streaming platform in Indonesia. In this study, the C4.5 and Naïve Bayes algorithms are used to analyze ratings and comments given by the public on the Google Play Store. In this study, the Naïve Bayes algorithm and the C4.5 algorithm are used to obtain results from user reviews into the appropriate sentiment category. By comparing the Naïve Bayes and C4.5 algorithms, this study aims to improve the accuracy and usefulness of sentiment analysis of Dukov live streaming application reviews. Based on 1000 review data divided into two categories, namely 300 training data and 700 testing data, then testing was carried out using 2 algorithms at once, namely C4.5 with the acquisition of 549 positive sentiments, 148 negative sentiments, and 3 neutral sentiments while the Naïve Bayes Classifier algorithm with the acquisition of 407 negative sentiments, 293 positive sentiments, and 0 neutral sentiments. The results of this sentiment analysis provide deeper insight into user views and assessments of the Dukov live streaming application.
Sipkumhamai Application Success Analysis Using the Delone And Mclean Model Said, Fadillah; Octenta, Chintia; Octaviantara, Adi
Paradigma - Jurnal Komputer dan Informatika Vol. 26 No. 2 (2024): September 2024 Period
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v26i2.4608

Abstract

Evidence-based policy aims to increase the efficiency and effectiveness of policy settings and increase alternative opportunities. The Legal and Human Rights Policy Strategy Agency created the SIPKUMHAMAI application to support evidence-based legal and human rights policies, support legal and human rights research with better data, and provide information to the public about legal and human rights issues. It is very important to make efforts to provide comprehensive and systematic data and information on legal and human rights issues originating from real situations on the ground. In addition to overall legal and human rights issues, this data and information can be used to find out more about the causes of legal and human rights problems, identify deficiencies in law enforcement and human rights protection, and carry out analyzes and provide various recommendations to strengthen systems and mechanisms for enforcing law and human rights in Indonesia. To achieve this goal, a system evaluation must be carried out to determine which components need to be improved. This is necessary to determine whether the system used provides significant benefits for users and the organization. Using the Delone and McLean model, from the six relationships of Information System Success Model, it was obtained that only Hypothesis 7, Hypothesis 8, and Hypothesis 9 were significantly supported and accepted by the data. These findings provide several implications for eGovernment research and practice, especially regarding how to maximize applications. This paper concludes by discussing the limitations that the proposed hypotheses are not fully supported by the research results.
Otomasi Pembayaran Siswa API Notifikasi pada Sekolah SMP Imtaq Darurrahim Kholili, Akbar; Said, Fadillah
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 6 No. 3 (2025): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63447/jimik.v6i3.1633

Abstract

The student payment process at SMP Imtaq Darurrahim still employs manual methods that cause transaction recording delays and lack of automatic notification systems. The research aims to design and develop a web-based student payment information system integrated with WhatsApp API to enable parents to receive real-time payment and outstanding fee information. The methodology employs the System Development Life Cycle (SDLC) waterfall model through requirement analysis, design, implementation, and testing phases. Research instruments include PHP, MySQL, and WhatsApp API integration for notifications. Results demonstrate that the system successfully records payment transactions accurately, generates monthly financial reports, and automatically sends notifications to parents. System implementation proves to enhance efficiency and accuracy in payment processes while strengthening communication between schools and parents.
IoT-Based Integrated Monitoring System for Household Water Level and Usage Tracking Rivaldi, Muhammad Rizki; Said, Fadillah
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.317

Abstract

Conventional household water management often results in inefficiencies, including tank overflow, unexpected shortages, and a lack of awareness about daily consumption. Most existing solutions address these issues only partially—either by monitoring water levels, automating pump control, or recording usage data—without integrating the three into a unified system. To address this gap, this research developed and validated a low-cost Internet of Things (IoT) prototype that combines real-time water-level monitoring, daily consumption measurement, and automatic pump control within a smartphone-connected platform. The system is built on a NodeMCU ESP8266 microcontroller equipped with an HC-SR04 ultrasonic sensor, a YF-S201 flow sensor, and a relay-controlled pump, with data transmitted via Wi-Fi to the Blynk application. Using a Research and Development (R&D) methodology with a prototyping model, the study conducted functional, accuracy, and usability testing. Results show that the prototype achieved reliable performance, with an average error below 2% for both sensors and stable operation during 24-hour trials. Beyond technical validation, the system demonstrated its potential as an eco-feedback tool by providing clear consumption data that can encourage more sustainable water use at the household level.
Implementation of Defense In Depth and IAM Best Practices Based on Segmented VPC Architecture Using Amazon Web Services (AWS) for Small Business Network Security Asrori, Muhamad Umar Hassan; Said, Fadillah
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.318

Abstract

This study presents the design, implementation, and validation of a cloud security architecture on Amazon Web Services (AWS) that integrates Defense in Depth strategies with Identity and Access Management (IAM) Best Practices, tailored for small and medium-sized enterprises (SMEs). Using the AWS Free Tier, an experimental cloud infrastructure was constructed to evaluate the effectiveness of multi-layered protection encompassing network segmentation, least-privilege access control, and real-time monitoring. The architecture employed a segmented Virtual Private Cloud (VPC) with public and private subnets, controlled by Security Groups (SGs) and Network Access Control Lists (NACLs), while IAM policies and Multi-Factor Authentication (MFA) enforced identity-level security. Centralized monitoring through CloudTrail and CloudWatch enabled anomaly detection and event logging with high accuracy. Test results showed that unauthorized access was effectively blocked, suspicious activities were detected promptly, and all administrative actions were recorded reliably. The findings indicate that combining layered network defenses and IAM governance significantly enhances the resilience, visibility, and security posture of SMEs adopting AWS environments. Beyond its technical effectiveness, the model offers scalability, auditability, and cost-efficiency—demonstrating that enterprise-grade protection can be achieved even within the resource constraints of SMEs. Future work is encouraged to integrate automation and advanced AWS tools such as GuardDuty and Config to strengthen real-world adaptability and compliance.