Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Computer Science (CO-SCIENCE)

Implementasi Data Mining Pada Klasifikasi Ketidakhadiran Pegawai Menggunakan Metode C4.5 Nandang Iriadi; Lutfi Setioningtias; Priatno Priatno
Computer Science (CO-SCIENCE) Vol. 1 No. 1 (2021): Januari 2021
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/coscience.v1i1.198

Abstract

Not all employee absences have reasons that are always labeled as bad. There is also an absence that can be tolerated by an agency or company, where these reasons are acceptable reasons, for example, due to illness, or certain permits that are considered reasonable and of course have a certain period so that it is not too difficult for the party where he works. The research objective is to determine the extent to which the C4.5 algorithm can help the classification calculation to find solutions so that employee works productivity increases. To find a solution so that employee work productivity increases requires certain techniques and methods, namely by classifying data mining using the C4.5 Algorithm. For data processing to get good results, Rapid Miner 5 Tools are used. The C4.5 algorithm is a type of classification rule in Data Mining. The importance of a classification rule can be determined by two parameters, namely Entropy and the highest Gain. After testing, the results obtained from the C4.5 Algorithm have an accuracy of 81.08%.
Manajemen Keamanan Internet Menggunakan Metode Firewall Filtering Untuk Penyaringan Konten Pada Router Mikrotik RB1100 Sidik Sidik; David Saputra Hasiholan Panjaitan; Priatno Priatno; Esron Rikardo Nainggolan
Computer Science (CO-SCIENCE) Vol. 3 No. 2 (2023): Juli 2023
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/coscience.v3i2.1907

Abstract

The existence of security threats and internet abuse is often a problem for companies. Use of a VPN for access to web pages that contain negative and pornographic content which usually contain malware, viruses, trojans and others. This of course will have a detrimental effect on companies whose internet networks are exposed to attacks by malware, viruses or trojans due to employees' habit of accessing web pages that contain negative and pornographic content. To prevent these threats, a method of regulating access and use of the internet network is needed according to its purpose. Content filtering is used to filter sites or web addresses that are not allowed by the company because they are considered to have no direct connection with their field of work. The firewall filtering content method in the Winbox application is one of the methods to achieve the goal of blocking negative and pornographic content that can be accessed by employees during working hours. This research was implemented at PT. Indonesian Mighty Beasts. The results of this study, after the content filtering firewall is implemented, employees cannot access web pages that contain negative and pornographic content and of course are not work related so that the implications for work are more productive, efficient and optimal.