p-Index From 2021 - 2026
7.603
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics CESS (Journal of Computer Engineering, System and Science) Jurnal Teknologi Informasi dan Komunikasi InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Sinkron : Jurnal dan Penelitian Teknik Informatika JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING JURNAL MEDIA INFORMATIKA BUDIDARMA Abdimas Talenta : Jurnal Pengabdian Kepada Masyarakat Juripol Jurnal Teknovasi : Jurnal Teknik dan Inovasi Mesin Otomotif, Komputer, Industri dan Elektronika MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Query : Jurnal Sistem Informasi Zero : Jurnal Sains, Matematika, dan Terapan JURIKOM (Jurnal Riset Komputer) Data Science: Journal of Computing and Applied Informatics ComTech: Computer, Mathematics and Engineering Applications Building of Informatics, Technology and Science Jurnal Mantik Indonesian Journal of Education and Mathematical Science International Journal of Advances in Data and Information Systems Randwick International of Social Science Journal Jurnal Scientia Budapest International Research and Critics Institute-Journal (BIRCI-Journal): Humanities and Social Sciences Journal of Applied Data Sciences TECHSI - Jurnal Teknik Informatika Prisma Sains: Jurnal Pengkajian Ilmu dan Pembelajaran Matematika dan IPA IKIP Mataram Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat Proceeding of International Conference on Information Science and Technology Innovation (ICoSTEC) The Indonesian Journal of Computer Science Journal of Digital Market and Digital Currency
Claim Missing Document
Check
Articles

Measurement by applying internet financial reporting on the level of information presentation in the competitive FinTech peer-to-peer lending industry Al-Khowarizmi, Al-Khowarizmi; Efendi, Syahril; Nasution, Mahyuddin Khairuddin Matyuso; Mawengkang, Herman
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp66-73

Abstract

Technological advances in the financial sector can certainly support the business decision-making process. Moreover, digital financial technology such as FinTech is a competitive industry that has both peer-to-peer (P2P) and merchant pillars. The industry must update its business activities through its information media. One of them is internet-based financial reporting or better known as internet financial reporting (IFR). IFR itself is a delivery of financial information that is carried out in real time and can be easily seen by the wider community by using the website as a medium. This study aims to determine whether the application of IFR to FinTech P2P Lending companies in Indonesia has been widely implemented or not. Later the variables used in this study are content, appearance, and timing with a total of 20 indicator variable items to be tested. The results of this paper show that 30 P2P lending FinTech Industries in Indonesia have been able to implement IFR with an average score of 80%. IFR scores obtained by each industry have almost the same value ranging from 65% to 95% with the highest total score of 95% and the lowest score of 65%.
A novel approach to optimizing customer profiles in relation to business metrics Elveny, Marischa; Nasution, Mahyuddin K. M.; Zarlis, Muhammad; Efendi, Syahril; Syah, Rahmad B. Y.
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp440-450

Abstract

Business is very closely related to customers. Each user owns the data, and the data is used to identify cross-selling opportunities for each customer. For example, the type of product or service purchased, the frequency of purchases, geographic location, and so on. By doing so, you can gain the ability to manage and analyze customer data, allowing you to create new opportunities in industries that were previously difficult to enter. The purpose of optimizing user profiles is to determine minimum or maximum business value and improve efficiency by determining user needs. In this study, multivariate adaptive regression spline (MARS) is a statistical model used to explain the relationship between the response variable and the predictor variable. Robust is used to find variable relationships to make predictions. To improve classification performance, the model is validated using a confusion matrix. The results show an accuracy value of 84.5%, with better time management (period management) reflected in the number of hours spent by merchants as well as discounts during that time period, which has a significant impact on any business. In addition, the distance between customers and merchants is also important, as customers prefer merchants who are closer to them to save time and transportation costs.
Comparative Analysis of the Performance of Four Symmetric Algorithms on Digital File Security Manurung, Rodiyah Aini; Sutarman, Sutarman; Efendi, Syahril
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol. 8 No. 2 (2025): Issues January 2025
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v8i2.13978

Abstract

Information security is crucial to prevent misuse that could harm others. Information can be accessed through various electronic devices such as mobile phones, computers, and tablets in the form of text, images, audio, and video, whether public or confidential. In the digital era, image files are highly susceptible to authenticity risks as they can be easily shared through various communication media. This facilitates unrestricted digital file exchange, raising concerns about authenticity and the risk of modifications before reaching the recipient. Therefore, digital file exchanges require a security system to ensure that transmitted data remains original and intact. Cryptography is a field of study that protects data security in communication. It consists of algorithms and keys, where algorithms perform encryption and decryption, while keys enhance security levels. This study examines image encryption by using different key lengths with the same image, as well as encrypting images of varying sizes using the same key length, employing AES, DES, 3DES, and RC6 algorithms. The results show that the DES algorithm is the fastest in encryption and decryption compared to the other three algorithms. DES is 13.3% faster than 3DES and 10.2% faster than RC6. Additionally, the key length used does not significantly impact processing time, but image size greatly affects encryption and decryption speed. These findings indicate that in cryptographic implementations for digital images, file size is a critical factor to consider to maintain efficiency without compromising encryption and decryption speed
Target image validation modeling using deep neural network algorithm Mubarakah, Naemah; Sihombing, Poltak; Efendi, Syahril; Fahmi, Fahmi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2042-2054

Abstract

Research on image validation models is an interesting topic. The application of deep learning (DL) for object detection has been demonstrated to effectively and efficiently address the challenges in this field. Deep neural networks (DNN) are deep learning algorithms capable of handling large datasets and effectively solving complex problems due to their robust learning capacity. Despite their ability to address complex problems, DNN encounter challenges related to the necessity for intricate architectures and a large number of hidden layers. The objective of this research is to identify the most effective model for achieving optimal performance in image validation. This study investigates target image validation using DNN algorithms, examining architectures with 3, 4, 5, and 6 hidden layers. This study also evaluates the performance of image validation across various activation functions, batch sizes, and numbers of neurons. The results of the study show that the best performance for image validation is achieved using the Leaky-ReLU and Sigmoid activation functions, with a batch size of 64, and an architecture consisting of 3 hidden layers with neuron sizes of 256, 128, and 64. This model is capable of providing real-time target image validation with an accuracy of up to 94.31%.
Reduksi Dimensi pada Klasifikasi Data Microarray Menggunakan Minimum Redundancy Maximum Relevance dan Random Forest : The Dimensional Reduction in Microarray Data Classification Using Minimum Redundancy Maximum Relevance and Random Forest Harahap, Lailan; Nababan, Erna Budhiarti; Efendi, Syahril
The Indonesian Journal of Computer Science Vol. 12 No. 1 (2023): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v12i1.3133

Abstract

Di Indonesia prevalensi kanker pada data Riskesdes tahun 2018 terdapat 1,79 per 1.000 penduduk mengidap penyakit kanker. Akibat tingginya prevalensi kanker maka diperlukan pendeteksian kanker sejak dini. Salah satu cara mendeteksi kanker yaitu dengan teknologi microarray dimana teknologi ini dapat memantau ribuan ekpresi gen secara bersamaan dalam satu percobaan. Namun, data microarray memiliki dimensi yang besar sehingga diperlukan proses reduksi dimensi data microarray pada penyakit prostate cancer da gastric cancer agar dapat menghilangkan atribut yang redundansi dan meningkatkan akurasi pada klasifikasi. Reduksi dilakukan menggunakan MRMR (FCQ dan FCD) dengan k 10,20,30,40,50,60,70,80,90 dan 100. Klasifikasi dilakukan menggunakan RF dengan membentuk 100 tree. Hasil akurasi terbaik pada klasifikasi data prostate cancer yaitu dengan FCQ 100% pada k=10, tanpa reduksi 95% dan akurasi terendah dengan FCD 52% pada k=90. Sedangkan hasil akurasi terbaik klasifikasi data gastric cancer yaitu dengan FCQ dan FCD 100% pada semua k dan akurasi terendah yaitu tanpa reduksi 83%.
A Hybrid Cryptosystem Using Rprime RSA And Extended Tiny Encryption (XTEA) For Securing Message Santoso, Zikri Akmal; Budiman, Mohammad Andri; Efendi, Syahril
Data Science: Journal of Computing and Applied Informatics Vol. 9 No. 1 (2025): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v9.i1-16574

Abstract

Abstract. Ensuring the security of messages in sending message publicly is very important, we must ensure the security of messages with one of security method called cryptography. Focusing solely on security can affect the speed of message delivery processes. Therefore, this research is conducted to provide solutions to both of these issues. Thus, this research will discuss the Analysis of Hybrid Cryptography Scheme in the combination of RPrime RSA and XTEA (Extended Tiny Encryption) in securing instant messages. Hybrid cryptography is one of the methods in cryptography that allows to enhance speed of message delivery with messages encrypted by symmetric algorithms and the symmetric algorithm keys will be encrypted using asymmetric algorithms, public keys. RPrime RSA is an asymmetric public key algorithm and one variant of RSA, which is a combination of Rebalanced RSA and MPrime RSA algorithms. XTEA is a symmetric key algorithm and improved version of the TEA algorithm. This research tested by using strings with uppercase letter, numeric, and punctuation characters with the value of k in RPrime RSA from 2 to 6 with unconstrained modulus digits. The result of the test indicate that the required time for encryption and decryption is proportional, the time processing for factorization to get d is proportional to the value of k.
Mathematical Modeling of Water Quality Dynamics in Aquaculture: A Foundation for IoT Integration and Machine Learning-Driven Predictive Analytics Sarif, Muhammad Irfan; Efendi, Syahril; Sihombing, Poltak; Mawengkang, Herman
Journal of Applied Data Sciences Vol 6, No 3: September 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i3.819

Abstract

Effective water quality management is paramount for sustainable aquaculture, yet conventional methods often fall short in providing timely and predictive insights. This paper details the development and analysis of a comprehensive suite of mathematical models designed to simulate key water quality dynamics in aquaculture systems. These models encompass critical biogeochemical processes, including the nitrogen cycle (ammonia, nitrite, nitrate, organic nitrogen), phosphorus cycle, Dissolved Oxygen (DO) balance, and Biochemical Oxygen Demand (BOD). Simulation results derived from these models illustrate the temporal evolution of these critical parameters, demonstrating their capability to capture complex interactions and provide a mechanistic understanding of the aquatic environment. This foundational modeling approach offers a robust tool for quantitative analysis and prediction of system responses under various conditions. The core contribution of this work is the articulation of these mathematical models, which serve as a crucial foundation for advanced, data-driven aquaculture management. To enhance their practical utility, we propose a conceptual framework for integrating these models with Internet of Things (IoT) sensor networks. Real-time data acquisition via IoT can be essential for model parameterization, continuous calibration, and validation against operational conditions. Furthermore, this paper discusses how outputs from these validated mechanistic models can serve as robust inputs for Machine Learning (ML) algorithms. This synergy enables the development of sophisticated predictive analytics for critical events, such as forecasting water quality deterioration, and supports optimized, proactive management strategies. This research lays the theoretical and methodological groundwork for developing more precise and resilient decision support systems in aquaculture. By emphasizing the synergistic potential of combining foundational mathematical modeling with data science techniques like IoT and ML, this work aims to contribute to transforming aquaculture into a more productive, sustainable, and environmentally responsible industry. Future efforts should focus on empirical validation and the practical implementation of the proposed integrated framework.
An IoT-Enabled Smart System Utilizing Linear Regression for Sheep Growth and Health Monitoring Efendi, Syahril; Sihombing, Poltak; Mawengkang, Herman; Turnip, Arjon; Weber, Gerhard Wilhelm
Journal of Applied Data Sciences Vol 6, No 3: September 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i3.901

Abstract

The global livestock industry faces significant pressures from climate change, land constraints, and rising consumer demand, necessitating greater efficiency and sustainability in production. To address these challenges, there is a critical need for accessible, data-driven tools; however, accessible and individualized tools for monitoring the growth and health of livestock like sheep remain underdeveloped, limiting farmers' ability to transition from reactive to proactive management. This study developed and validated an Internet of Things (IoT) smart system for monitoring sheep using an Arduino and ESP32 platform equipped with a DHT22 sensor for temperature and humidity and a load cell for weight. Weekly weight data from 15 sheep were collected over a six-month period. Simple linear regression was then applied to model the individual growth trajectory of each animal. The IoT system was successfully implemented and deployed in a farm setting. The primary finding was that individualized linear regression models provided a highly accurate method for tracking sheep growth, with R² values consistently exceeding 99% for most animals. The system effectively delivered real-time reports on growth trajectories and health-relevant environmental conditions (e.g., temperature and humidity) to a smartphone interface, confirming its practical utility. The primary implication of this research is a validated framework for practical and interpretable precision livestock farming. The system empowers farmers to shift from reactive to proactive management by using individualized growth curves as baselines for early problem detection. This dual-function system enhances productivity through precise growth tracking while supporting animal welfare via environmental monitoring, offering a valuable tool for modern, sustainable sheep farming.
Comparative Analysis of Ciphertext Enlargement on Generalization of the ElGamal and Multi-factor RSA Zega, Imanuel; Mohammad Andri Budiman; Syahril Efendi
Data Science: Journal of Computing and Applied Informatics Vol. 7 No. 1 (2023): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v7.i1-10360

Abstract

Information and communication security has become more crucial and has become a new problem in relation to security, accessibility, data management, and other information policy challenges as a result of how easy it is for all users to use communication media. One of the fields of science that has a technique or art for disguising the data sent by the sender to the recipient with the aim of maintaining the confidentiality of the data is called cryptography. In determining better cryptographic algorithms for data security systems, in addition to considering strength, key length and ciphertext enlargement are also important factors to consider. Therefore, in this study, we attempted to compare the ciphertext magnification of the generalization of the ElGamal and multi-factor RSA algorithms by utilizing the same key length. Generalization of the ElGamal and Multi-factor RSA are both asymmetric algorithms that have public and private key pairs for encryption and decryption. However, at the level of security, the RSA algorithm is based on the difficulty of finding large integer factors into two prime factors. In contrast to the ElGamal algorithm, security is based on the difficulty of calculating the discrete logarithm of a large prime modulus. The results of the comparison algorithm carried out are represented in the form of a table containing the plaintext, key length, and size of the data.
SAGOMECON: An Adaptive ε-Constraint-Based Optimization Method for Multi-Criteria Decision-Making in Collaborative Industrial Networks Mesran, M; Sihombing, Poltak; Efendi, Syahril; Zarlis, Muhammad
Journal of Applied Data Sciences Vol 6, No 4: December 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i4.941

Abstract

In collaborative industrial networks, decision-making processes often involve conflicting objectives such as minimizing operational costs and risks, while simultaneously maximizing efficiency and inter-organizational collaboration. Existing multi-objective optimization methods, including the ε-constraint and its variants, face significant challenges in handling dynamic constraints and achieving computational efficiency in real-world scenarios. To address these limitations, this study introduces SAGOMECON (Simplified Adaptive Optimization with Modified ε-Constraint), an enhanced optimization approach designed to support adaptive and efficient multi-criteria decision-making in dynamic environments. SAGOMECON extends the conventional SAUGMECON framework by incorporating real-time constraint updates, adaptive slack handling, and iterative refinement mechanisms, enabling it to maintain solution feasibility under shifting priorities and evolving operational conditions. The proposed method was evaluated using simulated datasets representing partner selection scenarios in collaborative networked organizations (CNOs). Comparative analysis against the traditional ε-constraint and SAUGMECON methods demonstrates that SAGOMECON consistently delivers Pareto-optimal solutions with reduced computational time and superior adaptability to dynamic changes. The findings suggest that SAGOMECON offers a practical and scalable solution for decision-makers in collaborative industrial settings, particularly where trade-offs between competing objectives must be navigated under uncertainty. This contribution is significant for industries seeking intelligent optimization strategies that align with agile and data-driven decision-making frameworks.
Co-Authors Abdulbasah Kamil, Anton Abi Rafdi Ahmad Rozy Ahmadi, Fauzan Nur Al Khowarizmi Aminuyati Andysah Putera Utama Siahaan Arjon Turnip Asrizal Asrizal Badawi, Afif Br Bangun, Desy Milbina Br Ginting, Dewi Sartika Budi K. Hutasuhut Chairil Umri Dadang Priyanto Devi Maiya Sari Nasution Erna Budhiarti Erna Budhiarti Nababan Erna Budhiarti Nababan Fahmi Fahmi Fajar Muhajir Fatma Sari Hutagalung Fauzan Nurahmadi Fauzi Amri Fuzy Yustika Manik, Fuzy Yustika Ginting, Dewi Sartika Br Halim Maulana Hamzani, Fitri Rezky Harahap, Lailan Hariyati Lubis, Hariyati Harumy, T. Henny Febriana Hasibuan, Nisma Novita Hasugian , Paska Marto Hengki Tamando Sihotang Hengki Tamando Sihotang Herianto, Tulus Joseph Herimanto Herimanto Herman Mawengkang herman mawengkang Hotmaida Lestari Siregar Ichsanuddin Hakim Ignazio Ahmad Pasadana Iin Parlina Imanuel Zega Indah Purnama Sari Indra Edy Syahputra Irzal Sofyan Jaya, Ivan Khowarizmi, Al- Lailan Harahap Lidya Rosnita lili Tanti Lubis, Fahrurrozi M Safii M. Isa Indrawan Mahyuddin K. M Nasution Manurung, Rodiyah Aini Mardiansyah, Heru Marischa Elveny, Marischa Maya Silvi Lydia Mesran, Mesran Mochamad Wahyudi Mohammad Andri Budiman Muhammad Iqbal Muhammad Iqbal Muhammad Riki Atsauri Muhammad Rusdi dan Afritha Amelia - Muhammad Zarlis Muhammad Zarlis Muhammad Zarlis Muhammad Zarlis Muhammad Zarlis Muhammad Zarlis Muhammad Zarlis, Muhammad Muliawan Firdaus Mulkan Azhari Naemah Mubarakah Nainggolan, Pauzi Ibrahim Nugroho Syahputra Oktaviana Bangun Pahala Sirait Poltak Sihombing Poltak Sihombing Poltak Sihombing Poltak Sihombing Poltak Sihombing Poltak Sihombing Prayoga, Nanda Dimas Purwanto Purwanto Rahmad Syah Riah Ukur Ginting Rika Permata Sari Siregar Rizki Suwanda Saib Suwilo Santoso, Zikri Akmal Saraswati Yoga Andriyani Sarif, Muhammad Irfan Sawaluddin Sawaluddin Sembiring, Rahmat W Seniman Seniman Seniman Seniman, Seniman Siagian, Deliyana Simamora, Windi Saputri Solly Aryza Sri Dwi Hastuti Sri Melvani Hardi Suherman Suherman Suherman, Suherman Sutarman Sutarman Sutarman Sutarman Syah, Rahmad B. Y. Syahputra, Indra Edy Syahputra, Muhammad Romi Syahraini, Syahraini Syahriol Sitorus Taufiqurrahman Taufiqurrahman Tulus Tulus Tulus Tulus Vinsensia, Desi Watts, Michael J. Weber, Gerhard Wilhelm yeni absah Yudhistira Yudhistira Yudhistira Zakarias Situmorang Zuhri Ramadhan Zulkarnain Lubis