Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Komputer

Pembuatan Aplikasi Sistem Pencatatan Transaksi Penjualan Pulsa Alfatah, Dhika; Sukindro , Afif; Rahayu , Novi
Jurnal Komputer Vol 1 No 2 (2023): Januari-Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v1i2.58

Abstract

Many new operators have sprung up offering such cheap tariffs with better quality and confidently stating that it is their products that are felt to be most needed by the public. The recording of each transaction is done manually, which records every transaction made on a piece of paper, and the calculation is still done manually. manually by using this calculator which causes the old system to become less effective and efficient.It can be concluded from the formulation of the problem in this system is how to complete credit sales transactions manually. The purpose of making this thesis is to create a system program to calculate credit sales for purchases of goods and sales and purchase transactions, these transactions will automatically be recorded in the database.The data collection method used in conducting this research is through primary data (interviews, observations) and secondary data (documents). From the results of the design and manufacture of the application, it can be interpreted that the application for recording DAPT pulse sales transactions is implemented in a system with the availability of a computerized database.
Penerapan Model Transformer Untuk Deteksi Sentimen Pada Data Twitter Berbahasa Indonesia Alfatah, Dhika
Jurnal Komputer Vol 2 No 2 (2024): Januari-Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i2.99

Abstract

Social media has become an important platform for people to voice their opinions, aspirations and feelings on various social, economic and political issues. Twitter, as one of the most popular social media platforms, presents a wealth of data for research, especially in the field of sentiment analysis. This research explores the application of the Transformer model, specifically IndoBERT, in detecting sentiment from Indonesian tweets. The dataset used was collected from the Twitter API, processed, and manually labelled into three categories: positive, negative, and neutral. Model evaluation was conducted by comparing IndoBERT's performance with traditional classification methods such as Naïve Bayes and Support Vector Machine (SVM). The results show that IndoBERT significantly outperforms conventional models in terms of accuracy, recall, precision, and F1-score, signalling that the Transformer model is highly effective for sentiment analysis in Indonesian.
Penggunaan Kriptografi Asimetris dalam Pengamanan Komunikasi IoT Alfatah, Dhika
Jurnal Komputer Vol 3 No 1 (2024): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i1.101

Abstract

The Internet of Things (IoT) has grown rapidly and become an important part of many sectors, from industry to healthcare to households. However, this growth also increases security risks, especially regarding data communication between devices. One promising solution is the implementation of asymmetric cryptography, which offers encryption and decryption mechanisms using public and private key pairs. This article discusses how asymmetric cryptography can be applied in IoT systems to maintain data confidentiality, integrity, and authentication. In addition, implementation challenges such as limited computing power and energy consumption in IoT devices are analysed, as well as solutions that can be applied to overcome them. This study shows that despite technical barriers, the use of asymmetric cryptography remains relevant and effective as a layer of protection in an increasingly complex IoT ecosystem.
Analisis Forensik Digital pada Perangkat Android: Studi Kasus Serangan Malware Alfatah, Dhika
Jurnal Komputer Vol 3 No 2 (2025): Januari- Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i2.102

Abstract

Until recently, the growth of the Android operating system on smartphone devices was popular. However, behind this popularity, the Android platform is also a target of opportunity for cybercrime against cybersecurity threats such as malware. Identifying this malware is very important to maintain user security and privacy. Due to the increasingly complicated process of malware identification, it is necessary to use machine learning for malware classification. This research collects static analysis features of safe and malicious applications. (malware). The dataset used in the research is the DREBIN malware dataset which is a publicly available malware dataset. The dataset consists of API CALL, system command, manifest permission, and Intent features. The data is then processed using various supervised machine learning algorithms including Support Vector Machine (SVM), Naive Bayes, Decision Tree and KNearest Neighbors. We also concentrate on maximising the achievement by evaluating various algorithms and adjusting some configurations to get the best combination of hyper-parameters. The experimental results show that SVM model classification gets the best result by achieving 96.94% accuracy and 95% AUC (Area Under Curve) value.