Claim Missing Document
Check
Articles

Found 7 Documents
Search

Comparing Neural Networks, Support Vector Machines, and Naïve Bayes Algorhythms for Classifying Banana Types Jinan, Abwabul; Siregar, Manutur; Rolanda, Vicky; Suryani, Dede Fika; Muis, Abdul
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 1 (2024): Article Research Volume 6 Issue 1, January 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i1.3381

Abstract

One of the most significant fruits for human consumption is the banana. Fruit consumption not only promotes health but also lowers the risk of heart disease, stroke, digestive issues, hypertension, some cancers, cataracts in the eyes, skin ailments, cholesterol reduction, and, perhaps most importantly, boosts immunity.The study included secondary data, which is information gathered from online resources like Kaggle. Ten categories of bananas will be identified from the 531 total varieties of bananas used as a train dataset: Ambon bananas, Stone bananas, Cavendish bananas, Kepok bananas, Mas bananas, Red bananas, plantains, Milk bananas, Horn bananas, and Varigata bananas. The development of information technology for image object recognition has become a very intriguing topic along with the rapid advancement of society, and it is undoubtedly directly tied to information data. In order to examine Naive Bayes, Support Vector Machine, and Neural Network techniques for classifying banana types, researchers will use the SqueezeNet Deep Learning model to extract features from photos. The study's findings will provide empirical evidence for the distinctions between each algorithm's accuracy, recall, and precision. Based on the collected results, the Neural Network (NN) method is the best in terms of classification, with accuracy of 72.3%, precision of 72.1%, and recall of 72.3%.
Desain dan Rancang Bangun Sistem E-Learning Menggunakan Framework Laravel Berbasis WEB Jinan, Abwabul; Siregar, Manutur Pandapotan; Suryani, Dede Fika; Rolanda, Vicky; Muis, Abdul
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 2, Juli 2025 (In Progress)
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i2.4182

Abstract

The design and development of a web-based E-Learning system using the Laravel framework aims to provide an effective and structured digital learning solution. This system is developed to address the limitations of face-to-face learning time in traditional classrooms and to leverage technological advancements in order to enhance educational quality. Utilizing Laravel as the primary development framework, the system is built with PHP, HTML, CSS, and JavaScript technologies, and MySQL as the database engine. The E-Learning platform features core functionalities such as instructional material management, class administration, structured user accounts (admin, teacher, and student roles), as well as support for material download and task submission. Testing results indicate that the system performs effectively and supports flexible and efficient teaching and learning processes. It is expected that this system will serve as a reliable and sustainable learning medium to support technology-based academic activities.
Penerapan Decision Tree Algoritma C4.5 Dalam Penentuan Izin Pembongkaran Muatan Kapal Kusuma, Jaka; Jinan, Abwabul; Situmorang, Zakarias
MEANS (Media Informasi Analisa dan Sistem) Volume 7 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.022 KB) | DOI: 10.54367/means.v7i1.1632

Abstract

Along with the increasing number of bulk cargoes that are dismantled every year at belawan port and for the creation of services in accordance with expectations, it is necessary to develop services in support of indonesia's logistics improvement readiness, especially in terms of demolition. Utilization of machine learning using the C4.5 algorithm can make it easier to conduct selection and classification of the feasibility of ships that get permission for demolition activities. The use of the C4.5 algorithm will produce a decision tree that can equalize the results of data mining, so that the information obtained from the data will be easier to identify in testing methods using the Orange Data Mining tool. The results obtained by the C4.5 algorithm in the form of a decision tree with an accuracy value of 84%, 90% precision and 84% recall.
Optimasi Implementasi Kriptografi Kunci Publik dalam Meningkatkan Keamanan dan Otentikasi Data pada Sistem Informasi Kampus Jinan, Abwabul; Siregar, Manutur Pandapotan; Suryani, Dede Fika; Muis, Abdul; Gunung, Tar Muhammad Raja
Digital Transformation Technology Vol. 5 No. 2 (2025): Periode September 2025
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v5i2.6425

Abstract

Perkembangan teknologi digital dan kebutuhan akan keamanan sistem informasi menjadi semakin penting, terutama di lingkungan universitas. Penelitian ini berfokus pada optimalisasi implementasi kriptografi kunci publik untuk meningkatkan keamanan data dan otentikasi dalam sistem informasi kampus. Algoritma yang digunakan antara lain RSA (Rivest-Shamir-Adleman) untuk enkripsi data dan DSA (Digital Signature Algorithm) untuk otentikasi digital. Hasil penelitian menunjukkan bahwa kombinasi RSA dan DSA efektif dalam melindungi kerahasiaan dan integritas data, serta memastikan bahwa informasi tetap otentik selama transmisi. Implementasi sistem diuji berdasarkan kecepatan enkripsi, akurasi otentikasi, dan efektivitas keamanan. Selain itu, analisis pengoptimalan dilakukan untuk menyeimbangkan kinerja dan tingkat keamanan dengan menyesuaikan ukuran kunci dan proses enkripsi selektif. Penelitian ini menyimpulkan bahwa penerapan kriptografi kunci publik di lingkungan universitas tidak hanya meningkatkan keamanan tetapi juga meningkatkan kepercayaan pengguna dalam menggunakan sistem informasi akademik.
Penerapan Algoritma Sorting dalam Penentuan Pekerja Pada Aplikasi Cari Kerja Oleh dan Untuk Warga Satu Kelurahan Dataran Tinggi Binjai Siregar, Manutur Pandapotan; Jinan, Abwabul; Siagian, Akbar Idaman Prince Peter S.
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 8 No. 2 (2024): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/jmika.Vol8No2.pp294-300

Abstract

The current job search process often involves posting an announcement on paper or a banner on a notice board, or in front of the company’s location. Another common method is through job search applications, such as JobStreet and others. The first method has a drawback because people may not know when the job posting is published. Meanwhile, with the second method, many people hesitate to use these applications as they feel their skills may not be sufficient. To address these issues, an Android or web-based job search application is proposed to facilitate job sharing and job seeking within a nearby area, specifically within a single subdistrict. This application is targeted at individuals with a high school education level or lower, and the jobs shared are typically daily work requiring minimal skills, such as construction work, electrical repairs, gardening, cleaning, and similar tasks. A sorting algorithm will be implemented to help select the nearest and most suitable candidate for each job. To access the application, users must first register, enabling employers to post jobs and workers to find suitable positions.
Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video Siregar, Manutur; Jinan, Abwabul; Muhammad Raja Gunung, Tar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4217

Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.
Smart Skincare: Expert System Based on Certainty Factors for Skin Type Identification and Product Selection Raja Gunung, Tar Muhammad; Ningtyas, Alyiza Dwi; Sitepu, Sengli Egani; Rolanda, Vicky; Jinan, Abwabul
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 4 (2025): Desember 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i4.10015

Abstract

This study aims to develop an expert system for selecting skincare products based on skin type using the Certainty Factor method. This method is used to represent the expert's level of confidence in the symptoms that appear on the user's skin, so that the system can provide realistic diagnostic results that are close to human thinking. The research data was obtained through consultations with beauty experts and a review of dermatology literature. The test results show that the system is able to identify the user's skin type with varying degrees of certainty. For example, for patients with combination skin types, the system recommends appropriate skincare products such as Salicylic Acid Serum, Elshe Skin Acne Cleansing Wash, and Azarine Acne Gentle Cleansing Foam. Thus, this Certainty Factor-based expert system is expected to help individuals recognize their skin type and choose facial care products more accurately and effectively. Going forward, this system has the potential to be further developed with the integration of artificial intelligence technology and a broader product database to improve the accuracy and personalization of recommendations.