Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : INFORMAL: Informatics Journal

Penanganan Data Tidak Seimbang Menggunakan Hybrid Method Resampling Pada Algoritma Naive Bayes Untuk Software Defect Prediction Moch Lutfi; Arief Tri Arsanto; Muhammad Faishol Amrulloh; Ummi Kulsum
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.41090

Abstract

Software defect prediction is software data that is used to identify a software module and can also be used to predict software defects. Before carrying out further trials, it is necessary to carry out special handling, especially by using algorithm models as predictions of software defects with the aim of obtaining information from the device being developed. Therefore, it is necessary to predict software defects using appropriate classification and prediction methods, so that the resulting accuracy results are better. In this study, the naïve Bayes algorithm was used as a classification with a resampling technique approach to handle unbalanced data, including SMOTEENN and SMOTETomek. The best accuracy results in the research conducted were 92.5% on the Nasa Repository PC4 dataset
Perancangan Keamanan Menggunakan Mikrotik Dengan Metode Layer 7 Protocol Dan Proxy Server Qoyyimah, Diajeng Pipit Nurul; Amrulloh, Faishol
INFORMAL: Informatics Journal Vol 9 No 2 (2024): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i2.41882

Abstract

Security Design using Mikrotik with Layer 7 protocol and Proxy Server methods aims to enhance network security. In this design, Mikrotik will be configured as a firewall to filter and block unwanted internet traffic. Additionally, Mikrotik will also function as a router to manage internet traffic between the local network and the internet. In its implementation, the Layer 7 protocol method will be used to filter and restrict access to specific websites or applications, while the proxy server will be utilized to accelerate response times for repeated access requests and block access to undesirable websites or applications. The implementation of this design at SMK Darut Taqwa successfully blocked desired sites such as Facebook, TikTok, and Instagram, with the addition of filter rules to prevent any future site leakage. Furthermore, network administrators are able to control access to specific content.