p-Index From 2021 - 2026
22.28
P-Index
This Author published in this journals
All Journal IAES International Journal of Artificial Intelligence (IJ-AI) Jurnal Sains dan Teknologi TELKOMNIKA (Telecommunication Computing Electronics and Control) CESS (Journal of Computer Engineering, System and Science) Proceeding of the Electrical Engineering Computer Science and Informatics JOIN (Jurnal Online Informatika) SISFOTENIKA JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Pilar Nusa Mandiri Jurnal Mantik Penusa JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) JSiI (Jurnal Sistem Informasi) Jurnal Pengembangan Riset dan Observasi Teknik Informatika JURIKOM (Jurnal Riset Komputer) Jurnal Riset Informatika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol Building of Informatics, Technology and Science Jurnal Mantik Aisyah Journal of Informatics and Electrical Engineering INTI Nusa Mandiri Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JATI (Jurnal Mahasiswa Teknik Informatika) Jurnal Teknik Informatika C.I.T. Medicom Journal of Intelligent Decision Support System (IDSS) JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) Jurnal Sistem Komputer dan Informatika (JSON) Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) RESOLUSI : REKAYASA TEKNIK INFORMATIKA DAN INFORMASI JPM: JURNAL PENGABDIAN MASYARAKAT Journal La Multiapp KLIK: Kajian Ilmiah Informatika dan Komputer International Journal of Basic and Applied Science JUSTIN (Jurnal Sistem dan Teknologi Informasi) PROSISKO : Jurnal Pengembangan Riset dan observasi Rekayasa Sistem Komputer SAGA: Journal of Technology and Information Systems Journal International Journal of Teaching and Learning (INJOTEL) INTERNATIONAL JOURNAL OF SOCIETY REVIEWS (INJOSER) Journal of Blockchain, Nfts and Metaverse Technology
Claim Missing Document
Check
Articles

Implementation of Naïve Bayes and K-NN Algorithms in Diagnosing Stunting in Children Wulan Widhari; Agung Triayudi; Ratih Titi Komala Sari
SAGA: Journal of Technology and Information System Vol. 2 No. 1 (2024): February 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i1.242

Abstract

Indonesia faces a huge potential risk of stunting, as revealed in the Indonesian Nutrition Status Analysis according to 2022 data, the stunting rate reached 24.22% in 514 districts / cities throughout Indonesia. To prevent stunting in children, early detection can be done. This research was conducted to compare the performance of two algorithms Naive Bayes and K-NN to predict stunting cases in children, to get a better picture of how classification algorithms predict stunting cases with a better level of accuracy and responsiveness, comparison experiments of several algorithms are needed using specific datasets to develop an optimal classification model. Based on the results of performance testing on the K-Nearest Neighbor and Naive Bayes methods in testing the performance of accuracy, precision, recall, and f1-score, the results of performance testing on the naïve bayes method obtained performance values on 30% testing data are accuracy of 71%, precision 71%, recall 76%, and f1-score 73%. The performance results of the K-NN method using the euclidean distance measurement obtained the best performance value, namely accuracy of 97%, precision of 98%, recall of 96%, f1-score of 97% at a value of k = 3. Based on the performance results of the comparison of the Naive Bayes and K-NN methods, it shows that the best classification method on the stunting dataset is the K-NN method because it gets better performance than the Naive Bayes method.
Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications Rais Rabtsani, Muhamad; Triayudi, Agung; Soepriyono, Gatot
SAGA: Journal of Technology and Information System Vol. 2 No. 1 (2024): February 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i1.250

Abstract

In the era of information technology development, digital payments and e-payments are becoming a dominant trend, supported by the crucial role of payment gateways such as Midtrans. Midtrans uses APIs to facilitate various online transactions, including debit cards. In this research, two cryptographic algorithms will be combined, namely Advance Encryption Standard (AES) with 256 bits and Secure Hash Algorithm (SHA) with 256 bits. The importance of data security in e-payments is recognized, with the application of cryptographic algorithms to protect sensitive transaction information. Yayasan Antero Prosesi Edukasi (YAPE) as an educational marketing consultant faced the challenge of time-consuming and inefficient manual payments. In an effort towards efficiency and security, YAPE plans to develop an online payment application with Midtrans Payment Gateway and the use of AES-256 and SHA-256 cryptographic algorithms. This step is expected to help the foundation keep up with technological developments, provide ease of payment, and achieve computerized efficiency. The results showed that the use of a combination of AES 256 bit and SHA256 encryption significantly increased security, making hacking attempts ineffective because encrypted data could not be accessed, with quite complicated calculation stages.
Inventory Management System for MSMEs Setiawan, Aan; Triayudi, Agung; Agus Iskandar
SAGA: Journal of Technology and Information System Vol. 2 No. 1 (2024): February 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i1.251

Abstract

This inquire about points to create a web-based stock framework that centers on reasonableness, user-friendliness, and usefulness custom-made to desires of Miniaturized scale, Little, and Medium Ventures (MSMEs). Through in-depth analysis of MSMEs' specific inventory management requirements, the system not only provides a comprehensive solution for stock management but also integrates the Apriori algorithm for associative analysis of inventory data. The system's development adopts an Agile approach, allowing flexible adaptation to changing needs throughout the development process. Key features include efficient stock management, intuitive Point of Sales (POS) transaction recording, and customizable inventory reporting. The implementation of this system is expected to enhance MSMEs' efficiency in inventory management, provide insightful data to support more informed decision-making, and positively contribute to strengthening competitiveness and growth in the dynamic and competitive business environment.
Implementation of K-Nearest Neighbour (KNN) Algorithm and Random Forest Algorithm in Identifying Diabetes Diranisha, Virly; Agung Triayudi; Ratih Titi Komalasari
SAGA: Journal of Technology and Information System Vol. 2 No. 2 (2024): May 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i2.253

Abstract

Diabetes, one of the noncommunicable diseases (NCDs), is currently a major health threat worldwide. So far, diabetes symptoms have only been diagnosed by people according to known physical characteristics without the support of factual evidence or other medical considerations. With the advancement of technology, it is possible to use algorithms to solve various kinds of problems. One of artificial intelligence (AI), machine learning, concentrates on creating systems that can learn from data. This research uses the K-Nearest Neighbor (KNN) and Random Forest algorithms that can be utilised as testing algorithms to identify diabetes. Classification is done based on training data that has been provided in the dataset. The purpose of this research is to determine the best classification in identifying diabetes with the K-Nearest Neighbor (KNN) algorithm and the Random Forest algorithm and is expected to provide more understanding of the implementation of machine learning models. comparing the two algorithms between the KNN algorithm and the Random Forest algorithm. By dividing the testing data and training data using a ratio of 20%: 80% randomised data 300 times. The results of the accuracy evaluation obtained from the Confusion Matrix show that the Random Forest Algorithm has the best accuracy value of 77%, Precision 89%, Recall 78% and F1-Score 83% with an estimator of 100 trees. While the KNN algorithm obtained accuracy of 73%, Precision 87%, Recall 73% and F1-Score 79% of the value of K = 7. Based on the comparison results of the two algorithms, it shows that the accuracy value obtained is greater than the Random Forest algorithm even though the value obtained is not much different.
Application of Academic Potential Test for New Student Admission Using Fisher-Yates Shuffle Algorithm Abdul Azis; Agung Triayudi; Endah Tri Esthi Handayani
SAGA: Journal of Technology and Information System Vol. 2 No. 1 (2024): February 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i1.254

Abstract

The selection process of new students in educational institutions, such as in Sekolah Menengah Kejuruan (SMK) Wisata Indonesia which still uses conventional methods using paper, has several challenges. One of the main challenges is test cheating, where prospective students may try to manipulate their test results to increase their chances of being accepted. In addition, another challenge faced by SMK Wisata Indonesia is that when the number of prospective students who register is very large, managing answers and exam results can become more complicated. This research aims to design and build an Android-based Academic Potential Test application by applying the Fisher-Yates Shuffle algorithm to randomize the order of questions. This research also uses the RUP (rational Unified Process) system development technique which has several phases, namely the Inception phase, Elaboration phase, Construction phase and Transition phase. The validation testing carried out obtained overall valid results so that the application that has been designed is in accordance with user needs. Meanwhile, usability testing in the Academic Potential Test Application using the SEQ method resulted in an average Likert score for students of 6.63 with a user-friendliness percentage of around 94%. As for teachers, the Likert average score is 6.53 with a percentage of ease of use of around 93%. This shows that the Academic Potential Test Application that has been built is EASY TO USE
CLASSIFICATION OF HEART DISEASE USING THE K-NEAREST NEIGHBOR ALGORITHM AND LOGISTIC REGRESSION Sugitha, I Kadek Agga; Triayudi, Agung; Handayani, Endah Tri Esti
Jurnal Pilar Nusa Mandiri Vol. 20 No. 2 (2024): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v20i2.5742

Abstract

Heart disease is a major cause of death in the world, including in Indonesia, with increasing rates and death rates that carry a huge burden on health and society. Lack of awareness of early signs contributes significantly to this challenge. This study aims to prevent heart disease through early diagnosis using K-Nearest Neighbor (K-NN) and Logistic Regression algorithms. The database, obtained from Kaggle.com, includes 15 clinical units for cardiac diagnosis. The test shows that the K-NN method with k = 3 achieves the highest performance on the experimental data (30%), with 90% precision, 93% precision, 87% recall, and 90% f1 - score. In comparison, Logistic Regression and sigmoid achieved 86% precision, 83% precision, 90% recall, and 86% f1-score on the same experimental data. These results show that K-Nearest Neighbor is better than Logistic Regression as a classification algorithm for heart disease database. Applying these findings to the web-based Streamlit system is expected to improve the efficiency and timeliness of heart disease screening.
CREATIVE WEB CREATION TRAINING FOR UMKM PARTICIPANTS Agung Triayudi; Imam Rizqi; Agus Iskandar
INTERNATIONAL JOURNAL OF SOCIETY REVIEWS Vol. 2 No. 5 (2024): MAY
Publisher : Adisam Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to evaluate the effectiveness of creative web creation training in improving the performance of Micro, Small and Medium Enterprises (MSMEs) in Indonesia in facing the digital era. Using a quantitative experimental research design with pre-test and post-test, this research involved 20 MSMEs selected through purposive sampling. Training materials cover web design basics, an introduction to CMS, SEO, and content strategy. Evaluation is carried out by measuring knowledge, skills and business performance before and after training using a questionnaire. The research results show a significant increase in online visibility, website traffic, and increased sales, confirming that creative web training is a valuable investment for MSMEs in increasing competitiveness in the digital market. This study provides insight for policy makers and practitioners about the importance of training programs specifically designed to meet the digitalization needs of MSMEs.
Analysis of Blended Learning Development in Distance Learning in Variation of Borg & Gall and Addie Models Untoroseto, Dedi; Triayudi, Agung
Journal La Multiapp Vol. 4 No. 6 (2023): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v4i6.973

Abstract

With the success of blended learning and the use of online media on learning outcomes and from article search results, it shows that there have been many articles that contain blended learning and various media uses, and reviews are needed about it by reviewing existing articles or commonly called literature reviews. Borg & Gall and ADDIE models. The Borg & Gall model and ADDIE are two teaching models used in colleges and universities. ADDIE stands for Analyze, Design, Development, Implementation, and Evaluation. In the Borg & Gall model, the steps taken are research and information. Research and information is used to collect information about the need for learning evaluation instruments for learning media development courses for students. In the ADDIE model the steps taken are the same as the original which includes aspects of Analyze, Design, Development, Implementation, and Evaluation. Thus, what is needed in this development is a reference about the product procedure to be developed. The description of the development model of Borg and Gall, described as follows; Educational research and development (R&D) is the process used to develop and validate educational products. The validity of interactive blended learning is: (1) according to expert reviews the content of metrics shows a good category (92%), (2) according to expert reviews learning design is in the good category (88%), (3) according to expert reviews learning media shows a good category (86%), Thus, this interactive blended eLearning does not need to be revised and can be used for further research.
Clustering of Generation X and Generation Y Communities in Cybersecurity Using the K-Means Algorithm (Case Study of Depok City, West Java) Wibowo, Adhitya Eka; Agung Triayudi
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.357

Abstract

This research aims to explore the differences in understanding and awareness of cybersecurity between Generation X and Generation Y in Depok City, West Java. The K-Means algorithm is used to group communities based on characteristics relevant to cybersecurity. The results of the study show that there are significant differences in understanding and behavior related to cybersecurity between the two generations. Generation X tends to be more cautious in using technology and has a better knowledge of cybersecurity risks, while Generation Y is more proficient in using digital devices and applications but pays less attention to security aspects. Factors that affect the level of cybersecurity awareness in both generation groups include knowledge of cyber threats, education, and demographic factors. The findings of this research can help stakeholders in increasing awareness and knowledge about cybersecurity and developing better solutions to protect users from cyber threats
Comparative Analysis of Performance of the Encryption and Decryption Times of Cryptography Made Yoga Mahardika; Agung Triayudi
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.359

Abstract

 Cryptography is the study of mathematical techniques to maintain information security, including the encryption process to protect data and decryption to return it to a readable form. The Rivest Shamir Adleman (RSA) algorithm and Elliptic Curve Cryptography (ECC) are two asymmetric key algorithms that are often used. RSA relies on large number factorization for security, while ECC uses elliptic curves that require more complex computation but are more efficient in resource usage. This study aims to compare the performance of the two algorithms in terms of encryption and decryption time, and analyze efficiency based on various key sizes and data amounts. The research method includes measuring encryption and decryption time with different data inputs using RSA and ECC at various key sizes. Experiments were conducted with data inputs of 128-bit to 512-bit and testing was conducted to measure the speed of each algorithm in the same situation. The results showed that RSA was faster in the encryption process than decryption, while ECC had a faster decryption time than encryption. However, the overall processing time for ECC is longer than RSA, especially when the key size is increased. These results provide insight into the advantages and disadvantages of each algorithm, which can be used as a basis for consideration in selecting algorithms for security applications that require high efficiency.
Co-Authors ., Hervian AAN SETIAWAN Abdul Azis Abdul Aziz Hasibuan Abdulah, Muhamad Biyan Aceng Supriyadi Achmad Syaifudin Rodhi Achmad Syirod Ade Muhammad Nur Fauzi Adi Firman Ari Saputra Adi Yulianto Aditya lutfi Irawan Afid Rozaqi Afiyan Nur Chafidin Afrasim Yusta Afriany, Joli Agung Rahmad Fadjar Agus Iskandar Agus Iskandar Agus Iskandar Ahmad Arief Fadila Ahmad Avivanto Ahmad Rizki Firdaus Aji Juliana Akhmad Primulyana Albaar Rubhasy Albaar Rubhasy Aldi Andres Ardiansah Aldya Bagas Prahastyo Alfian Muhharam Ali Rahman Alisa Fitriyani Alisya Mutia Mantika Alvian Nur Efendi Ananda Sustantiara Andarweni, Dhea Andreas Gerhard Simorangkir Andrianingsih Andrianingsih Andriansyah Utomo Anggita Putri Maharani Anhar Hawari Anharudin Anharudin apiek maniek Ardinsah Ardinsah Ardiyanto Wantudi Arie Gunawan Ariel Cahyono Arika Zuraidah Aris Gunaryati Artamevia, Zahrach Arya Dimas Setiadi Arya Sastranegara Astri Pertiwi Atikah Suhaimah Baldhan Difa Ben Rahman Benrahman Bernardito Jordan Cahya, Nilam Candra Kurniawan Chafidin, Afiyan Nur Chuy Mandala Putra Cintya Damayanti Dandi Putra Daud Iswandii Della Diniyati Deny Hidayatullah Dewi Janetta Az Zahra Dhea Andarweni Dhieka Avrilia Lantana Dian Yunita Sihombing Dicke Rifki Fajrin Dimas Aryanto Wijaya Diniyati, Della Diranisha, Virly Djamaludin, Muhammad Ariel Dwi Auditira Dwi Ifan Ramadhan Dwi Juliastuti Dwika Assrani Dwina Pri Indini Dwiyatno, Saleh Dzahabi Yunas, Rio Al E, Endah Tri Efendi, Alvian Nur Eka Febriyanto Riski Eka Permana Putra Endah Tri Eshti Handayani Endah Tri Esti Handayani Endah Tri Esti Handayani Eri Mardiani Eri Mardiani Eri Mardiani Fachid, Syakirah Fadhil Muhammad Supriyanto Fadillah, Rizkah Faiq Husain Pratama Faizal Kurniawan Fajar Setiawan Hidayat Fajhar Muhammad Fajrin, Dicke Rifki Faran, Jhiro Fardila Inastiana Fatha Alsidqi Husaini Fathiya Zahra, Hawra Ferina Gunawan Fifto Nugroho Fikar Wahyu Tyas Tono Fikri Fajar Asshiddiqi Fikrianzi Nindyo Kusumo Fildzah Fildzah Firzatullah, Raden Muhamad Flipo Hariski Frankly Sept Genius Zendrato Gatot Soepriyono Genius Zendrato, Frankly Sept Ghulam Prasetyo Utomo Hadi Ansyah Hakam, Muhammad Aulia Haris Triono Sigit Hasibuan, Abdul Aziz Hervian . Heryanto, Yayan Hidayat, Fajar Setiawan Hilman, Hilman Fikri Wijaya Hoga Saragih Ibnu Nur Khawarizmi Ikbal Danu Setiawan Iksal Iksal Iksal Iksal Imam Rizqi Imanuel Sinuraya Inastiana, Fardila indrawan indrawan ingsih, Andrian Ira Diana Sholihati Ira Diana Sholihati Ira Diana Solihati Ira Diana Solihati Iskandar Fitri Ismi Naili Qurrotul Aini Ismia Iwandini Jhiro Faran Juliana, Aji Jumpa Dorisman Rajagukguk Junior, Reza Phahlevi Kabeleke Melanesia L Kartika Salma Nadhiva Karyaningsih, Dentik Kiai Agus Priyaharto Mulia I Kodim Suparman Kusumaningtyas, Grasiella Yustika Rezka Talita Latif Arif Anggoro lia kamelia Lili Dwi Yulianto Listrina Turnip Ma'arif, Ridwan Ahmad Made Yoga Mahardika Mardiani, Eri Mauludani Muhammad Melati Indah Petiwi Melisa Theresia Mesran, Mesran Moh Dani Ariawan Muhamad Biyan Abdulah, Muhammad Andhika Maulana Muhammad Ariel Djamaludin Muhammad Aulia Hakam Muhammad Fadli Muhammad Faisal Abdillah Muhammad Faizal Muhammad Farhan Adistyra Muhammad Ilyas Sahputra Muhammad Jordy Muhammad Prabowo Chaniago Muhammad Rafi Fadhilah Muhammad Rizki Wardhana Muhammad Rizki Zidan Muhammad Rizky Hamdan Mutiara Mala Khairunnisa Nabilah Ananda Pratiwi Nadia Putri Ariyanti Nanda Fathi Rizky Nesha Putri Pratama Nifea Kusumawardhani Nofrisa, Dini Novi Dian Nathasia Novi Dian Nathasia Nur Hayati Nur Hayati Nur Hayati Nur Iskandar Zulkarnaen Nurfatanah Nurfatanah Nurfazriah Attamami Nurhadiyan, Thoha Oktaviani Oktaviani Oktaviani oktaviani Oky Triadi Sampurno Panjaitan, Fricia Oktaviani Penny Hendriyati Putra Dama Ramadhan Raffi Dima Sampurno Rafi Syahputra Rahmat Aji Santoso Raihan Abdi Negoro Rais Rabtsani, Muhamad Raka Alvianda Rama Setiawan Ramadhan, Duta Pramudya Ratih Mardianti Ratih Titi Komala Sari Ratih Titi Komalasari Repi, Viktor Vekky Ronald Resha Anjariansyah Reynaldo, Yohanes Reza Phahlevi Junior Riad Sahara Rian Aditia Rian Rasyidhi Rian Tineges Rian, Rian Hidayat Ricky Andri Widayat Riefand Fadhlurrohman Rifki Nur Apriyono Rima Tamara Aldisa Rima Tamara Aldisa Rima Tamara Aldisa Rio Al Dzahabi Yunas Ripin, Muhamad Riska Setiawati Riska Susilawati Rivaldi Okta Pratama Rizal Bagus Pambudi Rizal Toha, Muhammad Rizki Kurnia Rizky Setiawan Rodhi, Achmad Syaifudin Rosaima Situmorang Rosalina, Vidila Rudi Adityawan Sahputra, Muhammad Ilyas Sampurno, Raffi Dima Saragih, Nova Sari Ningsih Sawindri, Sawindri sawindri Seanand Sonia Shabrilianti Setiawan, Ikbal Danu Setiawati, Riska Setiono, Aji Shafira Shalehanny Shintia Mutiarani Sholihati, Ira Diana Simanjuntak, Handayani Simanungkalit, Racquel Terranova Singgih Yulianto Bastian Siti Nurhalizah Soepriyono, Gatot Solihati, Ira Diana Suginam Sugitha, I Kadek Agga Suhaimah, Atikah Suherman Suherman Sultana Namira Sumiati Sumiati Sumiati Sumiati Sumiati Sumiati Sumiati, Sumiati Suparman, Kodim Susilawati . Susilawati, Riska Sussolaikah, Kelik Syabana, Ulwi Syafrida Hafni Sahir Syavira Cahyaningsih Syirod, Achmad Thoha Nurhadiyan Titih Aji Kurniawan Titik Abdul Rahman Tiyas Asih Qurnia Putri Tobby Wiratama Putra Tyas Tono, Fikar Wahyu Untoroseto, Dedi Utami, Yulianti Pratiwi Vendy Blessing Gulo Vidila Rosalina Vivimaryati Vivimaryati Vivimaryati, Vivimaryati Wahid Al Jufri Wahyu Oktri Widyarto Wardhana, Muhammad Rizki Wibowo, Adhitya Eka WINARSIH Winarsih Winarsih Winarsih Winarsih Winarsih Winda Antika Putri Wiratama Putra, Tobby Wulan Kartika Murti Wulan Widhari Wulandari, Faras Tira Yana Tania Haryanto Yandi Makmur Yani Sugiyani Yanto Murnihati Waruwu Yohanes Reynaldo Yulianti Pratiwi Utami Yunan Fauzi Wijaya Zahrach Artamevia Zuraidah, Arika