Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Computer Networks, Architecture and High Performance Computing

Implementation of the Naïve Bayes Algorithm in the SMS Spam Filtering System Diah Ayu Anggraini; Muhammad Ikhsan; Suhardi Suhardi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 2 (2024): Articles Research Volume 6 Issue 2, April 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i2.3875

Abstract

In the context of the escalating global spam activity, supported by data from CNN Indonesia in 2021, this research aimed to investigate the root causes and characteristics of this phenomenon. The approach employed in this study involved a series of exploration and classification stages of text messages with the clear objective: to determine whether each message fell into the spam category or not, utilizing the Naïve Bayes method. Additionally, the research aimed to identify the factors influencing the status of text messages, whether they were considered as spam or not. The Naïve Bayes classification method was chosen to facilitate the process of identifying spam-related messages. The dataset used in this research had an 80:20 ratio and was obtained from the Department of Communication and Informatics of Asahan Regency. This data was used to train and test the developed classification model. Data labeling processes were conducted to uncover the factors influencing the status of text messages as spam or non-spam. The research findings indicated that issues related to spam and non-spam messages remained a serious concern. The high accuracy rate, reaching 92%, achieved by the Naïve Bayes method in classifying messages, demonstrated the effectiveness of the method in detecting spam messages.
Use of QRCode and Digital Signature Using The DSA Method to Authenticate Student Academic Documents Suhardi, Suhardi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 4 (2024): Articles Research October 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i4.4765

Abstract

Verification of digital documents is no longer done conventionally but is also done digitally, such as signatures on documents. A signature is a means of authentic evidence as well as proving a person's identity, is a means of proving the authenticity or validity of an agreement or approval for something in a document issued by two or more parties so that it can be used as a solution to verify the integrity of valid data in a document. Application of signatures Digital is also commonly used at the North Sumatra Islamic University (UINSU) Medan, especially in student study documents. Even though UINSU Medan has implemented digital signatures, this application is still a signature image obtained through scanning or photos and manually inserted into a document so that other people can easily reuse the signature image and it can even be misused. To facilitate the digital signature process, the code generated from the signature formation process is entered into a QR code so that it is easy to use to carry out the electronic document authentication process. Researchers will use QR codes and digital signatures to authenticate student documents using the DSA method. This research will be implemented into an application model with PHP and MySQL programming. The student document authentication application model using the DSA method works well as evidenced by the QRCode which contains document token information which is different for each document so that it cannot be duplicated by non-owners of the document.