Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : The IJICS (International Journal of Informatics and Computer Science)

Implementation of K-Nearest Neighbor Algorithm for Scientific Determination of Aid Recipients at STM Agape Sinaga, Dedi Candro Parulian; Siahaan, R. Fanry; Tarigan, Nera Mayana Br; Lubis, Rodiah Hannum; Amallia, Dwi Novia
The IJICS (International Journal of Informatics and Computer Science) Vol. 9 No. 3 (2025): November
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v9i3.9484

Abstract

Providing assistance to underprivileged families is an important social effort to enhance community welfare; however, the selection of aid recipients often encounters problems such as subjectivity, unstructured data, and time inefficiency when conducted manually. This study aims to develop and evaluate a decision support system for determining aid recipients at STM Agape using the K-Nearest Neighbor (KNN) algorithm to improve accuracy and objectivity in the selection process. The research methodology employed a quantitative classification approach, where data were collected from families based on predefined criteria, including family income, number of dependents, housing conditions, and the occupation of the head of the household. The dataset was divided into training and testing data, and all attributes were normalized prior to processing. The KNN algorithm was applied using Euclidean distance to measure similarity between data instances, classifying each family into “eligible” or “ineligible” categories. The results indicate that the proposed system achieved higher classification accuracy and more consistent decision outcomes compared to manual selection methods. Additionally, the implementation of KNN reduced processing time and minimized subjective bias in determining aid recipients. These findings demonstrate that the KNN-based system is effective as a decision support tool, enabling STM Agape to distribute social assistance in a more targeted, objective, transparent, and efficient manner.
Analysis of Data Security Resilience in Text Steganography on Indonesian Language Structure R. Fanry Siahaan; Dedi Candro P. Sinaga; Zanziqbar Alaydrus; Ikhwan Rafif Fadhil
The IJICS (International Journal of Informatics and Computer Science) Vol. 9 No. 3 (2025): November
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v9i3.9487

Abstract

An in depth analysis of data security in text-based steganography is necessary to ensure the sustainability and security of the methodology used. The purpose of this study is to analyze the resilience of data security in text-based steganography. The analytical approach used involves identifying and assessing the vulnerabilities of text steganography methods using Indonesian sentence patterns. The initial stage of the research was to analyze previous works related to this field to understand previously identified vulnerabilities. The applied text embedding model is based on a dictionary consisting of 1,929 words grouped into seven word categories that correspond to sentence patterns in Indonesian, namely adj (adjective), adv (adverb), nom (noun), num (numeral), par (particle), pro (pronoun), and ver (verb). Each word class is arranged into a sentence structure and each has the same bit length, namely eight bits. The robustness analysis results show that single-word input data is still vulnerable to brute-force attacks or pattern analysis if the message embedding process uses a simple sentence structure. This is due to the relatively small search space, which makes it easier for attackers to guess the embedding pattern. Conversely, using sentence patterns consisting of more than two words significantly increases combinatorial complexity and expands the possibility space, making hacking attempts much more computationally difficult. Thus, the robustness of a steganographic system increases as the number of words in the sentence pattern increases, as the time and resources required to perform the attack become practically inefficient.