Claim Missing Document
Check
Articles

Found 33 Documents
Search

PERANCANGAN KLASIFIKASI ALGORITMA NAIVE BAYES PADA DATA PEMILIHAN JURUSAN SISWA Juan Fakhri; Aswan Supriyadi Sunge; Ahmad Turmudi zy
Jurnal Teknologi Terpadu Vol 11, No 2 (2023): JTT (Jurnal Teknologi Terpadu)
Publisher : Pusat Penelitian dan Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32487/jtt.v11i2.1823

Abstract

Penelitian yang berjudul "Perancangan Algoritma Naive Bayes Dalam Klasifikasi Pemilihan Jurusan Siswa". Penelitian ini bertujuan untuk pembuatan suatu prediski dan impelemtasi metode dalam kalsifikasi Naive Bayes, serta untuk mengevaluasi dampak ketidak seimbangan kelas terhadap kinerja model klasifikasi. Penelitian ini juga menemukan adanya kelebihan sampel data secara tidak sengaja, dan eksperimen dengan menggunakan teknik SMOTE dilakukan untuk mengatasi ketidak seimbangan kelas tersebut. Data pemilihan jurusan siswa dari SMA Negeri 2 Cikarang Selatan digunakan untuk mengidentifikasi ketidak seimbangan kelas. Eksperimen ini membandingkan hasil klasifikasi sebelum dan setelah penerapan teknik SMOTE. Hasil analisis menunjukkan bahwa sebelum menggunakan teknik SMOTE, terdapat ketidak seimbangan kelas yang signifikan dalam data pemilihan jurusan siswa. Ketidak seimbangan ini memiliki dampak negatif terhadap kinerja model klasifikasi, terutama dalam mengenali kelas minoritas. Namun, setelah penerapan teknik SMOTE, ketidak seimbangan kelas berhasil dikurangi dan kinerja model klasifikasi mengalami peningkatan yang signifikan. Recall untuk kelas IPS meningkat menjadi 0,76, sementara recall untuk kelas MIPA tetap tinggi dengan nilai 0,92. Precision untuk kelas IPS meningkat menjadi 0,87, sedangkan precision untuk kelas MIPA tetap stabil di 0,85. Dengan menggunakan precision dan recall, skor F1 mencapai 0,8846. Berdasarkan temuan penelitian ini, dapat disimpulkan bahwa kinerja model klasifikasi dalam memilih jurusan siswa dapat dipengaruhi oleh kelebihan sampel data. Metode SMOTE efektif dalam mengurangi ketidak seimbangan kelas dan meningkatkan kinerja model klasifikasi. Metode Naive Bayes dapat digunakan sebagai alternatif yang efektif dalam memprediksi penjurusan siswa di SMA Negeri 2 Cikarang Selatan setelah menerapkan teknik SMOTE.
Pengebangan Media Pembelajaran Berbasis Android Untuk Pengenalan Huruf Hijaiyah di TK Islam Pelita Insan Agung Nugroho; Wiyanto Wiyanto; Ahmad Turmudi Zy
VIDHEAS: Jurnal Abdimas Multidisiplin Vol. 1 No. 1 (2023): Juni 2023
Publisher : VINICHO MEDIA PUBLISINDO

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Teknologi makin berkembang seiring dengan perkembangan jaman, begitu juga dalam bidang Pendidikan. Pemanfaatan teknologi menjadi hal yang penting diterapkan dalam bidang pembelajaran. Kegiatan pengabdian ini dalam rangka meningkatkan kualitas pembelajaran dengan memanfaatkan teknologi informasi sebagai sarana mendukung proses pembelajaran yang interaktif melalu penerapan game edukasi dalam mengenal huruf hijaiyah.
Dampak Game Terhadap Anak Usia Dini Edora Edora; Ahmad Turmudi Zy
Prosiding Sains dan Teknologi Vol. 1 No. 1 (2022): Seminar Nasional Sains dan Teknologi (SAINTEK) ke 1 - Juli 2022
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/SAINTEK0101.9195

Abstract

Digital technology changes many aspects of the daily life of Indonesian people, from socializing to education, from formal and informal matters to all involving digital technology, and this also involves all age groups, from early childhood to the elderly. There are also many digital games that are loved by all ages. The problem is the impact of digital-based games using mobile phones or tablets. Here the author focuses on research on the impact of digital games on an early age in terms of benefits on the growth and development of early childhood, in this paper some research from various parties who are competent in this research will be presented. those it can be concluded that there are positive and negative impacts of digital games (games) in early childhood. Keywords: Digital Technology, Game, Childhood, Impact.
Web-Based Grape Seed Information System Using the Agile Methodology for the Cikarang Grape Community Ahmad Turmudi Zy; Bagas Pamungkas; Sunita Dasman; M.Makmun Effendi; Rosa Noviyanti
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2149

Abstract

This research applies the Agile methodology to develop a web-based grape seed information system for the Cikarang Grape Community. This method was chosen to enhance flexibility and responsiveness in development, with active involvement from community members at every stage. The process begins with a needs analysis through surveys and interviews, followed by an iterative user-focused solution design. Development is conducted in sprints, allowing features to be tested and evaluated regularly. The implementation results show that the system not only improves efficiency in managing and distributing grape seeds but also strengthens cooperation among community members. With transparent and real-time data access, the community is better equipped to make informed decisions regarding production and marketing. This research is expected to serve as a model for future similar information system development.
Implementasi Algoritma K-Nearest Neighbors Untuk Klasifikasi Spam Email Diani Putri Kusumaningrum; Ahmad Turmudi Zy; Suprapto
JSAI (Journal Scientific and Applied Informatics) Vol 8 No 1 (2025): Januari
Publisher : Fakultas Teknik Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36085/jsai.v8i1.7531

Abstract

In modern life, internet access has become essential for communication. Email is one of many communication tools. Cyberattacks such as ransomware, phishing, and cryptojacking continue to evolve and are difficult to detect by security systems as technology rapidly advances. Therefore, this study uses email spam as the subject of research. The aim of this study is to implement and calculate the accuracy of the K-Nearest Neighbors (KNN) algorithm in classifying spam emails with ham and spam labels. An accuracy of 85%, precision of 87%, recall of 93%, and F1-score of 90% were obtained from tests conducted with an 80% training data and 20% testing data ratio. The results show that the K-Nearest Neighbors algorithm can effectively classify spam emails.
MEDIA PEMBELAJARAN HURUF HIJAIYAH UNTUK ANAK USIA DINI BERBASIS GAME ANDROID Ahmad Turmudi Zy; Edora Edora
Akademika Vol 11 No 02 (2022): Akademika : Jurnal Teknologi Pendidikan
Publisher : Akademika : Jurnal Teknologi Pendidikan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34005/akademika.v11i02.2019

Abstract

As religious people we must fortify ourselves as early as possible with the provision of religious knowledge. One of them is in reading the Koran. For early childhood, the initial stage of reading the Koran is being able to master the hijaiyah letters. The problem in this research is the lack of interest in children's learning and the lack of media that is applied in the process of learning hijaiyah letters. The media used is still conventional so that the learning objectives are not achieved optimally. Therefore, a learning media for early childhood was made in the form of an Android-based educational game. This research applies the MDLC (Multimedia Development Life Cyrcle) method. Testing the functional requirements in this application through the stages of black box testing. The black box test results are 100%, meaning that this application is in line with user needs and all functions run according to functional requirements. Therefore, it can be concluded that this educational game is attractive and effective in increasing hijaiyah letter learning skills
Implementasi Retrieval Augmented Generation (RAG) Dalam Perancangan Chatbot Kesehatan Pencernaan Gufranaka Samudra; Ahmad Turmudi Zy; Ermanto
JSAI (Journal Scientific and Applied Informatics) Vol 8 No 1 (2025): Januari
Publisher : Fakultas Teknik Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36085/jsai.v8i1.7678

Abstract

The development of artificial intelligence technology, especially in the development of chatbots, has brought significant progress, especially in the health sector. However, the main challenge in using large language models (LLM) is the potential for bias and lack of accuracy in providing information, especially on critical topics such as digestive health. This study aims to implement Retrieval-Augmented Generation (RAG) in designing a digestive health chatbot to improve the accuracy and relevance of the information delivered. The RAG method integrates a generative model with a document-based retrieval system to provide more reliable and evidence-based answers. The research process involves collecting digestive health datasets through data scraping from Alodokter, as well as data processing through the preprocessing stage, embedding using the Indonesian language model (firqaaa/indo-sentence-bert-base), and data processing using a vector database with the HNSW index. The Llama 3.1:8b model is used to generate generative responses. The results of the study show that the application of RAG can reduce model bias and improve the quality of chatbot responses. Evaluation using metrics such as Mean Reciprocal Rank (MRR) 93%, Faithfullness 62%, Answer Relevancy 57%, and Semantic Similarity 81% showed good performance in providing accurate and relevant answers according to context. With this approach, chatbots are able to provide more accurate and contextual information according to user needs, and can reduce the risk of hallucinations in the information provided. This research contributes to the development of more reliable health chatbot technology, especially in the digestive health domain, and opens up opportunities for further application in other health fields
Sentiment Analysis on Canva Reviews Using Naive Bayes Method Faiza Muhammad Julianto; Ahmad Turmudi Zy; Elkin Rilvani
International Journal of Informatics and Computation Vol. 7 No. 1 (2025): International Journal of Informatics and Computation
Publisher : University of Respati Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/ijicom.v7i1.107

Abstract

Sentiment analysis for user review is a growing research topic in digital applications. In this study, we analyze user reviews from the Google Play Store to classify sentiments as positive or negative. The primary objective of this research is to evaluate the performance of the Naive Bayes classifier in sentiment classification. The methodology involves comprehensive data preprocessing, model training, and evaluation using performance metrics such as accuracy, precision, recall, and F1-score. The results indicate that the proposed model achieves an accuracy = 92%, precision = 85%, recall = 88%, and F1-score= 86%, respectively. These findings show the effectiveness of the proposed method that can extract valuable insights from user reviews to increase user satisfaction.
Strengthening Web-Based Login Security Using Vigenère Cipher and AES ENCRYPT() Method in MySQL Rhendy Diki Nugraha; Muhamad David Ali; Nadya Khairunnisa; Danang Nurcahyo; Ahmad Turmudi Zy
Journal of Technology and Informatics (JoTI) Vol. 7 No. 1 (2025): Vol. 7 No.1 (2025)
Publisher : Universitas Dinamika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37802/joti.v7i1.954

Abstract

As technology advances further, more crimes are being committed on social media. These days, people can connect to the internet using technological devices like PCs (Personal Computers) or portable electronic devices like smartphones or tablets. This study presents a dual-layer encryption system combining the Vigenère Cipher and MySQL’s AES_ENCRYPT() to enhance the security of web-based login systems. The system encrypts user credentials on the client side using the Vigenère Cipher and applies additional encryption on the server side with AES_ENCRYPT(). This approach ensures secure data transmission and storage, reducing risks of plaintext exposure and unauthorized access. Comparative testing demonstrated that the dual-layer encryption method significantly improves resistance to brute-force attacks and database breaches compared to conventional techniques like SHA-256. Encrypted credentials remain secure even in the event of a database compromise, as decryption requires the correct secret keys. The system’s design also highlights the importance of robust key management to maintain data confidentiality and integrity. While this method introduces minor performance overhead and requires careful implementation, its advantages in safeguarding sensitive user information outweigh these limitations. This dual-layer approach is particularly suited for applications demanding high-security standards, making it a viable solution for mitigating contemporary cyber threats effectively.
Enhancing Network Security: Evaluating SDN-Enabled Firewall Solutions and Clustering Analysis Using K-Means through Data-Driven Insights Ahmad Turmudi Zy; Isarianto; Rifa’i, Anggi Muhammad; Nugroho, Agung; Ghofir, Abdul
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 9 No 1 (2025): February 2025
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v9i1.6056

Abstract

In the face of escalating and increasingly complex cyber threats, enhancing network security has become a critical challenge. This study addresses this issue by investigating the optimization of SDN-enabled firewall solutions using a data-driven approach. The research employs K-Means clustering to analyze attack patterns, aiming to identify and understand distinct patterns for improved firewall effectiveness. Through the clustering process, attack data was classified into three clusters: Cluster 0, indicating concentrated attack sources likely tied to high-activity regions or networks; Cluster 1, representing a dispersed distribution of attacks, pointing to diverse origins; and Cluster 2, linked to specific geographic regions or unique attack behaviors. The clustering efficacy was evaluated using the Silhouette Score (0.606) and the Davies-Bouldin Index (0.614), indicating meaningful and reliable clustering outcomes. These findings provide actionable insights into network threat patterns, enabling the refinement and enhancement of SDN-enabled firewalls. The study contributes to the field by demonstrating the potential of clustering techniques in uncovering patterns overlooked by traditional methods and paving the way for further research into alternative clustering algorithms and broader applications in network security.