Claim Missing Document
Check
Articles

Found 6 Documents
Search

Optimasi Algoritma C4.5 Menggunakan Metode Adaboost Classification Pada Klasifikasi Nilai Mahasiswa Studi Kasus: Universitas Muhammadiyah Kalimantan Timur Mawaddah, Suci; Pranoto, Wawan Joko; Faldi, Faldi
Jurnal Sains Komputer dan Teknologi Informasi Vol. 6 No. 1 (2023): Jurnal Sains Komputer dan Teknologi Informasi
Publisher : Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/jsakti.v6i1.5458

Abstract

Penelitian ini membahas tentang klasifikasi nilai mahasiswa dengan menggunakan optimasi algoritma C4.5 menggunakan Adaboost Classification. Dengan adanya permasalahan yang dihadapi yaitu, penurunan nilai mahasiswa yang drastis, maka tujuan penelitian ini untuk mengetahui indikator yang mempengaruhi penurunan nilai mahasiswa dan meningkatkan persentase akurasi pada algoritma C4.5 menggunakan metode Adaboost Classification. Hasil pengujian awal dengan algoritma C4.5 menunjukkan akurasi sebesar 81% dalam klasifikasi nilai mahasiswa. Namun, akurasi tersebut perlu ditingkatkan. Oleh karena itu, penelitian ini menerapkan metode seleksi fitur dengan menambahkan metode Adaboost Classification untuk mengoptimalkan akurasi algoritma C4.5. hasil pengujian menunjukkan bahwa dengan metode Adaboost Classification, akurasi dapat meningkat menjadi 85% dengan indikator yang berpengaruh antara lain progress, course completed, tugas 1, tugas 2 dan simbol sebagai kelas targetnya. Penelitian ini memberikan kontribusi dalam meningkatkan akurasi dengan mengoptimalkan algoritma C4.5 melalui metode Adaboost Classification serta dapat digunakan untuk meningkatkan system evaluasi nilai mahasiswa untuk meningkatkan kualitas pendidikan.
Recommendation mobile antivirus for Android smartphones based on malware detection Saputra, Hendra; Zahra, Amalia; Faldi, Faldi; Fadzlul Rahman, Ferry; Harits, Sayekti; Joko Pranoto, Wawan; Rahman, Fathur
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i3.pp3559-3566

Abstract

The proliferation of smartphone malware attacks due to a lack of vigilance in app selection raises serious concerns. Built-in smartphone security features often must be improved to protect devices from these threats. Although numerous articles recommend top-tier antivirus solutions, there need to be more reliable data sources that raise suspicions about undisclosed promotional motives. This research endeavors to establish a ranking of antivirus efficacy to provide optimal recommendations for Android smartphone users. The research methodology entails a meticulous comparison of malware detection and labeling outcomes between various antivirus programs within Virustotal and the labeling system employed by the Euphony application. The comparative results are categorized into three groups: antivirus solutions proficient in identifying specific malware types, those detecting malware presence without categorization, and antivirus software failing to detect malware effectively. The experimental findings present the five leading antivirus solutions, ranked from the highest to lowest scores, as Ikarus, Fortinet, ESET-NOD32, Avast-Mobile, and SymantecMobileInsight. Based on the comprehensive assessment conducted in this study, these solutions are recommended as the top antivirus choices. These recommendations are poised to significantly aid users in selecting the most suitable antivirus protection for their Android smartphones.
SECURE AUDIO FILES USING VIGENERE CIPHER AND PLAYFAIR CIPHER Sumadi, Muhammad Taufiq; Zahir S, Achmad Nur; Faldi, Faldi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.6.1624

Abstract

This study aims to maintain the confidentiality of audio files sent using a combination of the Playfair cipher and Vigenere cipher methods. In this research, the object of research is an audio file with the extension wave or *.wav. This research requires several stages, including Audio Data Analysis, Determination of System Architecture, Implementation, Testing, and Results Analysis. The results of this study indicate that in the Vigenere Cipher 256 Encryption in audio wave files, the audio messages conveyed sound unclear or have no meaning. From the 6 trial datasets based on analysis of MAE and PSNR, the average value of the encryption process at PSNR was 28.345, and MAE was 97.0625. The average value of the decryption process on PSNR and MAE is 0.0, indicating that the decryption process is successful. The speed of the encryption and decryption process is affected by the audio file's size, which means that the larger the file size, the longer the encryption and decryption time.
IMPLEMENTATION OF LSB AND PLAYFAIR METHODS TO SECURE TEXT FILES INTO WAV AUDIO FILES Al Akbar, Arief; Sumadi, Muhammad Taufiq; Faldi, Faldi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.6.1793

Abstract

In the rapidly evolving digital communication era, the demand for information security is escalating. Three main security techniques are required: cryptography, watermarking, and steganography. Despite cryptography and watermarking having detectability weaknesses, steganography emerges as a more reliable choice as it can conceal messages across various media without arousing suspicion. This article discusses the utilization of steganography, particularly the Least Significant Bit (LSB) technique, for embedding messages within audio wave files as the medium. In this research, the author combines steganography with encryption using the Playfair Cipher algorithm to enhance overall data confidentiality. Implementation results demonstrate that the combination of LSB and Playfair methods effectively conceals messages without compromising audio quality. Evaluation of stego quality using PSNR indicates that audio quality remains high after embedding secret messages, with PSNR exceeding 40 dB. Despite successful message extraction during decoding, the message content remains protected and requires decryption to be read. In conclusion, the use of steganography in audio wave files with a combination of Playfair Cipher encryption and LSB methods proves to be an effective approach in preserving privacy and data confidentiality during transmission.
Pemberdayaan Masyarakat Melalui Inovasi Pembuatan Sabun Padat Bajakah Tampala (Spatholobus littoralis Hassk) pada Masyarakat Kampung Ketupat Samarinda: Community Empowerment Through Innovation in Making Bajakah Tampala Solid Soap (Patholobus littoralis Hassk) in the Community of Ketupat Village, Samarinda Hamzah, Hasyrul; Luthfi M, Chaerul Fadly Mochtar; Faldi, Faldi; Pradana, Anugrah Riska; Febriani, Riska; Aris, Risna; Mardatilah, Suci; Rani, Frederika Erwina
PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat Vol. 9 No. 6 (2024): PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat
Publisher : Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/pengabdianmu.v9i6.6323

Abstract

Bajakah tampala is a plant native to Kalimantan that can be found in forests in the interior of Kalimantan. The use of Bajakah Tampala wood is not widely known by most people. One of the uses of Bajakah Tampala wood is that it can be used as an economically valuable product. This community service takes the form of an empowerment program for PKK and Dasawisma women to provide training in making bajakah solid soap. However, before that, education or outreach was carried out regarding solid soap. Of all participants, 22.2% answered that they knew the process of making solid soap, 44.4% knew about solid soap which has a steel composition, and 20% had an understanding of making solid soap. The results of community service activities showed an increase in the total understanding of participants to 100% answered that they knew the process of making solid soap, 100% answered that they knew about solid soap which has a steel composition, and 100% answered that they understood the process of making solid soap. This activity concludes that all participants can better understand the process of making solid soap products and can feel the benefits of Bajakah solid soap.
Steganography for Data Hiding in Digital Audio Data Using Combined Least Significant Bit and Blowfish Method Pradana, Rizal; Hallim, Abd; Faldi, Faldi
JSE Journal of Science and Engineering Vol. 3 No. 2 (2025): Journal of Science and Engineering
Publisher : LPPI Universitas Muhammadiyah Kalimantan Timur (UMKT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30650/jse.v3i2.3924

Abstract

Abstract – The purpose of this research is to examine the utilization of steganography and Blowfish encryption to maintain message confidentiality in digital audio files. This research combines LSB encryption and Blowfish algorithm, focusing on embedding text into audio, with PSNR analysis. Results show the effectiveness of the method without significantly affecting audio quality, with PSNR values above 50dB. The application of Blowfish and LSB to audio files successfully secures the message, and the use of base64 increases the security level.