Claim Missing Document
Check
Articles

Implementasi Website BumDes Manggala Karsa Desa Karangsari, Kec. Pejawaran, Kab. Banjarnegara Oki Setiono; Abdus Salam; Wildanil Ghozi; L. Budi Handoko
Jurnal Pengabdian kepada Masyarakat Nusantara Vol. 4 No. 4 (2023): Jurnal Pengabdian kepada Masyarakat Nusantara (JPkMN)
Publisher : Cv. Utility Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Desa Karangsari, Pejawaran, Banjarnegara belum memiliki website untuk BUMDes yang digunakan sebagai sarana informasi kegiatan dan promosi hasil produk UMKM desa. Kegiatan BUMDes belum terdokumentasi dengan baik, layanan kepada masyarakat untuk kegiatan BUMDes belum menggunakan teknologi informasi serta informasi produk dan jasa yang dikelola BUMDes belum tersebar dengan maksimal.Tujuan yang hendak dicapai adalah pendampingan pengembangan website BUMDes desa Karangsari, Kec. Pejawaran, Kab. Banjarnegara untuk meningkatkan kinerja dan layanan BUMDes kepada masyarakat. Hasil yang dicapai berupa website BUMDes untuk layanan publik dan mengenalkan unit usaha serta penjualan produk UMKM desa
IMPLEMENTATION OF LSTM (LONG SHORT TERM MEMORY) ALGORITHM TO PREDICT WEATHER IN CENTRAL JAVA Rhedy Irwan; Pulung Nurtantio Andono; Farrikh Al Zami; Filmada Ocky Saputra; Rama Aria Megantara; L. Budi Handoko; Chaerul Umam
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1118

Abstract

Agro-indutrial agricultural production such as red onions in Indonesia has a very important share in driving Indonesia's economic growth, especially in Central Java province which contributed 28.15% of the total national red onion production in 2021. Weather conditions have a major influence on the red onion planting process until the red onions are ready to be harvested. In this study, the objective is to predict various types of weather such as rainfall, air temperature, and air humidity in seven districts in Central Java, namely Brebes, Temanggung, Demak, Boyolali, Kendal, Pati, and Tegal. To do this, the use of the LSTM (Long Short Term Memory) algorithm with its ability to store memory longer than RNN will be reliable for predicting various types of weather in the future. This research was developed with the CRISP-DM (Cross Industry Process Model for Data Mining) method which has a goal-oriented approach, this method is a mature and widely accepted method in Data Mining with various applications in Machine Learning. With the final results from 39 models by using the evaluation of the average value of train MSE 0.013, test RMSE 0.11, test MSE of 0.02, test RMSE 0.12 and succeed to predict 5 days or months ahead from the last data that is provided.
Performance Analysis of Support Vector Classification and Random Forest in Phishing Email Classification Chaerul Umam; Lekso Budi Handoko; Folasade Olubusola Isinkaye
Scientific Journal of Informatics Vol. 11 No. 2: May 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i2.3301

Abstract

Purpose: This study aims to conduct a performance analysis of phishing email classification system using machine learning algorithms, specifically Random Forest and Support Vector Classification (SVC). Methods/Study design/approach: The study employed a systematic approach to develop a phishing email classification system utilizing machine learning algorithms. Implementation of the system was conducted within the Jupyter Notebook IDE using the Python programming language. The dataset, sourced from kaggle.com, comprised 18,650 email samples categorized into secure and phishing emails. Prior to model training, the dataset was divided into training and testing sets using three distinct split percentages: 60:40, 70:30, and 80:20. Subsequently, parameters for both the Random Forest and Support Vector Classification models were carefully selected to optimize performance. The TF-IDF Vectorizer method was employed to convert text data into vector form, facilitating structured data processing. Result/Findings: The study's findings reveal notable performance accuracies for both the Random Forest model and Support Vector Classification across varying data split percentages. Specifically, the Support Vector Classification consistently outperforms the Random Forest model, achieving higher accuracy rates. At a 70:30 split percentage, the Support Vector Classification attains the highest accuracy of 97.52%, followed closely by 97.37% at a 60:40 split percentage. Novelty/Originality/Value: Comparisons with previous studies underscored the superiority of the Support Vector Classification model. Therefore, this research contributes novel insights into the effectiveness of this machine learning algorithms in phishing email classification, emphasizing its potential in enhancing cybersecurity measures.
Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB) Handoko, Lekso Budi; Umam, Chaerul
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.7863

Abstract

One of cryptography algorithm which used is beaufort cipher. Beaufort cipher has simple encryption procedure, but this algorithm has good enough endurance to attack. Unauthorized people cannot break up decrypt without know matrix key used. This algorithm used to encrypt data in the form of text called plaintext. The result of this algorithm is string called ciphertext which difficult to understood that can causing suspicious by other people. Beaufort cipher encryption tested with avalanche effect algorithm with modified one, two, three and all key matrix which resulting maximum 31.25% with all key modification so another algorithm is needed to get more secure. Least Significant Bit (LSB) used to insert ciphertext created to form of image. LSB chosen because easy to use and simple, just alter one of last bit image with bit from message. LSB tested with RGB, CMYK, CMY and YUV color modes inserted 6142 characters resulting highest PSNR value 51.2546 on YUV color mode. Applying steganography technique has much advantage in imperceptibility, for example the image product very similar with original cover image so the difference can not differentiate image with human eye vision. Image that tested as much ten images, that consist of five 512 x 512 and five 16 x 16 image. While string message that used is 240, 480 and 960 character to test 512 x 512 image and 24, 48 and 88 character to test 16 x 16 image. The result of experiment measured with Mean Square Error (MSE) and Peak Signal Ratio (PSNR) which has minimum PSNR 51.2907 dB it means stego image that produced hood enough. Computation time calculation using tic toc in matlab resulting fastest value 0.041636 to encrypt 2000 character and the longest time is 4.10699 second to encrypt 6000 character and inserting to image. Amount of character and amount of multi algorithm can affecting computation time calculation.
File Cryptography Optimization Based on Vigenere Cipher and Advanced Encryption Standard (AES) Muslih, Muslih; Handoko, L. Budi; Rizqy, Aditya
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.7899

Abstract

The rapid The main problem in the misuse of data used in crime is the result of a lack of file security. This study proposes a data security method to protect document files using the Advanced Encryption Standard (AES) algorithm combined with the Vigenere Cipher. This research carried out 2 processes, namely the encryption process and the decryption process. The encryption process will be carried out by the AES algorithm and then encrypted again with the Vigenere Cipher algorithm. The experiments show that the proposed method can encrypt files properly, where there are changes in the value of the document file and the encrypted file cannot be opened and the description results do not cause changes to the original file. The results of this study are that the system is able to work properly so as to produce file encryption and decryption using the AES method combined with the Vigenere Cipher. In document files, the largest difference in encryption and decryption time is 8 seconds, while in image files the difference in encryption and decryption time is 17 seconds. This longest time difference is generated by large files.
Purwarupa Sistem Pemilihan Umum Elektronik dengan Pemanfaatan Protokol Ethereum pada Teknologi Blockchain Arianto, Eko; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 19 No. 1 (2021): July 2021
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v19i1.2746

Abstract

The development of information technology has penetrated various areas. This is driven by improved service, rapid increase in information needs and decision making. General elections that are held every time always leave problems about securities and speed of recapitulation. This is because the process is done in the traditional way. This research tries to apply blockchain technology to the e-Voting system security engineering process so that it creates a votes recapitulation process that is fast, accurate and accompanied by transparency values to maintain the reliability of the existing vote and maintain the confidentiality of the vote data being transacted. Transparency and confidentiality of voter data is a fundamental value in general elections or voting that must exist. Seeing this, blockchain technology deserves to be applied because the principles that needed can be met by applying this technology to the e-Voting system.
Analisa Forensik Kontainer Podman Terhadap Backdoor Metasploit Menggunakan Checkpointctl Sya'bani, Hafiidh Akbar; Umam, Chaerul; Handoko, L Budi
Jurnal Transformatika Vol. 21 No. 2 (2024): Januari 2024
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v21i2.8109

Abstract

Container systems are type of virtualization technology with isolated environment. The isolated environment in container system does not make cyber attacks impossible to occur. In this research, containers in which a cyber incident occurred were forensically tested on the container's memory to obtain digital evidence. The forensic process is carried out using standards from NIST framework with the stages of collection, examination, analysis and reporting. The forensic process begins by performing a checkpoint on the container to obtain information from the container's memory. In Podman the checkpoint process is carried out on one of the containers and will produce a file in .tar.gz form, where this file contains the information contained in the container. After the checkpoint process is complete, forensics is then carried out by reading the checkpoint file using a tool called checkpointctl. Forensic results showed that the container was running a malicious program in the form of a backdoor with a PHP extension.
Kriptografi Teks Berbasis Algoritma Substitusi Vigenere Cipher 8 Bit Karima, Nida Aulia; Aisyah, Ade Nurul; Silla, Hercio Venceslau; Handoko, Lekso Budi; Sani, Ramadhan Rakhmat
Jurnal Masyarakat Informatika Vol 15, No 1 (2024): May 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.1.60836

Abstract

Vigenere Cipher merupakan salah satu algoritma kriptografi klasik dalam dunia kriptografi. Penelitian ini berfokus pada penggunaan metode Vigenere Cipher dan implementasinya dalam mengamankan sebuah teks pesan berbentuk ASCII. Penelitian ini menggunakan empat metode pengujian yaitu, Avalanche Effect, Character Error Rate (CER), Bit Error Rate (BER), dan Entropi. Hasil pengujian mendapatkan bahwa nilai Avalanche Effect yang dihasilkan rata-rata berada pada angka 50% ke atas, artinya diperoleh nilai Avalanche Effect yang baik. Selain itu, CER dan BER yang dihasilkan bernilai 0, artinya tidak terjadi kesalahan selama proses enkripsi. Nilai Entropi yang dihasilkan juga meningkat seiring dengan panjang plaintext yang digunakan dan juga dipengaruhi penggunaan ASCII 256 berupa huruf, angka, dan simbol.
A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection Handoko, Lekso Budi; Umam, Chaerul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1984

Abstract

Image encryption is an indispensable technique in the realm of information security, serving as a pivotal mechanism to safeguard visual data against unauthorized access and potential breaches. This study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher methodologies, unveiling specific metrics from a curated set of sample images. Notably, employing column transposition with the key "JAYA" and the Hill Cipher with the key "UDINUSSMG," the encrypted images underwent rigorous evaluation. 'Lena.png' demonstrated an MSE of 513.32 with a PSNR of 7.89 dB, while 'Peppers.png' and 'Baboon.png' recorded MSE values of 466.67 and 423.92, respectively, with corresponding PSNR figures of 7.12 dB and 7.31 dB. Across all samples, a consistent BER of 50.00% indicated uniform error propagation, while entropy values settled uniformly at 7.9999, highlighting consistent data complexity. While the findings underscore a consistent error rate and complexity, there's a compelling need for further refinement to enhance image quality and security. Moreover, the study proposes future research avenues exploring a three-layer super encryption paradigm, amalgamating columnar transposition, Hill Cipher, and other robust algorithms. This approach aims to fortify encryption methodologies against evolving threats and challenges in data protection, offering heightened resilience and efficacy in safeguarding sensitive information.
Analisis Performa Model Random Forest dan CatBoost dengan Teknik SMOTE dalam Prediksi Risiko Diabetes Irfannandhy, Rony; Handoko, Lekso Budi; Ariyanto, Noval
Jurnal Pendidikan Informatika (EDUMATIC) Vol 8 No 2 (2024): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v8i2.27990

Abstract

Diabetes mellitus (DM) is increasing in prevalence globally and is becoming a serious health problem. Early detection reduces long-term complications. The purpose of our research is to evaluate and compare the effectiveness of Random Forest (RF) and CatBoost models with SMOTE technique in predicting DM risk based on test data processed to produce comparative analysis performance of both models in the form of precission, recall, F1-Score and accuracy. Our research type is quantitative using methods that include EDA, transformation, dividing test and training data, implementation of RF and CatBoost methods with SMOTE and evaluation of model performance. The dataset from the platform (Kaggle) includes 768 individual health data consisting of eight independent variables of pregnancy, glucose, blood pressure, skin thickness, insulin, Body Mass Index (BMI), DM history, age as well as one target (outcome) variable of DM status. The SMOTE analysis technique was applied to balance the class distribution and improve the representation of the minority class, making the prediction model more accurate and stable. The findings of the SMOTE-RF model were 82% accuracy and SMOTE CatBoost 81% accuracy. Based on the feature importances analysis, the main variables affecting DM risk prediction of both models are glucose, BMI and age. Glucose variable is the main DM risk indicator used for prediction to be more efficient. The practical implication of improved machine learning early detection has the potential to support doctors' decision making more accurately to prevent more serious complications in diabetes mellitus.