Claim Missing Document
Check
Articles

Found 38 Documents
Search

The Implementation and Analysis of The Proof of Work Consensus in Blockchain Therry, Alvin Christian Davidson; Ardiansyah, Rizka; Pusadan, Mohammad Yazdi; Joefrie, Yuri Yudhaswana; Kasim, Anita Ahmad
Advance Sustainable Science, Engineering and Technology Vol 6, No 1 (2024): November-January
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i1.17878

Abstract

Communication in peer-to-peer (P2P) networks presents challenges in maintaining security, data integrity, and decentralization. Consensus mechanisms play a crucial role in addressing these challenges by validating data and ensuring that each entity has synchronized data without intermediaries. This research focuses on the implementation and analysis of the Proof of Work (PoW) consensus mechanism, widely used in blockchain, to enhance understanding of its functions, benefits, and workings or flow. This research, conducted using the Go programming language, successfully implements Proof of Work (PoW) as a security measure, ensuring data integrity, and preventing manipulation. Through black-box testing, this research confirms the functionality and reliability of the implemented Proof of Work (PoW) consensus. These findings contribute to a deeper understanding of consensus mechanisms, offering insights to optimize blockchain protocols and foster trust among entities. This research highlights the relevance of sustainable Proof of Work (PoW) in blockchain technology, emphasizing its role in enhancing security and ensuring data integrity in decentralized networks.
Implementation of Data Layer In Blockchain Network Using SHA256 Hashing Algorithm Sondakh, Clivent Gerhard; Ardiansyah, Rizka; Joefrie, Yuri Yudhaswana; Angreni, Dwi Shinta; Pusadan, Mohammad Yazdi
Advance Sustainable Science, Engineering and Technology Vol 6, No 2 (2024): February - April
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i2.18103

Abstract

The escalating demand for secure data management in blockchain systems has prompted the exploration of advanced cryptographic techniques. Leveraging the SHA256 hashing algorithm, this implementation aims to fortify data integrity, confidentiality, and authentication within the blockchain network. By meticulously examining the algorithm's application, the research demonstrates its efficacy in ensuring tamper-resistant data storage and retrieval, quantifying improvements in security percentages and specific metrics. The integration of SHA256 within the data layer is explored in technical detail, highlighting the concrete benefits of heightened security and immutability. The analysis discusses practical implications and delves into potential advancements in blockchain technology, offering valuable insights for researchers, developers, and practitioners seeking to bolster the robustness of data layers in blockchain networks.
Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration Putra, Ryan Adi; Ardiansyah, Rizka; Pusadan, Mohammad Yazdi; Kasim, Anita Ahmad; Joefrie, Yuri Yudhaswana
Advance Sustainable Science, Engineering and Technology Vol 6, No 1 (2024): November-January
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i1.17772

Abstract

In the face of escalating global data exchange, the pronounced vulnerability oftraditional centralized storage networks to manipulation and attacks poses a pressing challenge. Digital service providers, entrusted with vast datasets, grapple with the formidable task of ensuring the security, integrity, and continuous availability of their stored information. This paper tackles these multifaceted issues by proposing a decentralized data storage network empowered by blockchain technology. This approach systematically mitigates the inherent susceptibilities of centralized systems, thereby providing heightened resilience against unauthorized alterations and malicious attacks that compromise digital information integrity. Moreover, the decentralized model holds significant promise for securing public data. By leveraging the transparency and immutability of blockchain ledgers, this approach not only safeguards against unauthorized access but also actively fosters transparency and accountability in data management. This makes it particularly well-suited for ensuring the security and integrity of public data, addressing concerns related to trust and reliability in the ever-evolving landscape of information exchange.
Evaluasi Performa Proof of Work dan Proof of Stake melalui Uji Stres Beban Tinggi Blockchain Yulianti, Indira; Ardiansyah, Rizka; Yazdi Pusadan, Mohammad; Amriana; Lamasitudju, Chairunnisa
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2500

Abstract

Consensus mechanisms play a crucial role in determining the efficiency and scalability of blockchain systems. The two most commonly used algorithms are Proof of Work and Proof of Stake, each exhibiting distinct performance characteristics under high transaction loads. This study aims to evaluate and compare the performance of both consensus mechanisms through a simulation-based experimental approach. Testing was conducted using the Hardhat framework in a local environment under two primary scenarios: transaction scaling and burst transaction.Four evaluation metrics were employed: throughput, transaction latency, finality time, and mempool congestion. The results indicate that Proof of Stake consistently outperforms across all four metrics, demonstrating high throughput, stable latency and finality time, and controlled mempool congestion. In contrast, Proof of Work shows a significant decline in performance under heavy load due to its static and non-adaptive mining process.The Mann-Whitney U statistical test confirms that the performance differences are statistically significant across nearly all metrics. This research provides deeper insights into the strengths and limitations of each consensus mechanism under high-load conditions using Hardhat, and contributes to a broader understanding of blockchain scalability in real-world applications. The findings suggest that Proof of Stake is more suitable for large-scale blockchain implementations that demand high efficiency and speed.
Pattern recognition for facial expression detection using convolution neural networks Pusadan, Mohammad Yazdi; Sasuwuk, James Rio; Pratama, Septiano Anggun; Laila, Rahma
International Journal of Advances in Intelligent Informatics Vol 11, No 4 (2025): November 2025
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v11i1.1602

Abstract

The COVID-19 pandemic was a devastating disaster for humanity worldwide. All aspects of life were disrupted, including daily activities and education. The education sector faced significant challenges at all levels, from kindergarten to elementary, junior high, and high school, as well as in higher education, where learning had to be online. Human emotions are primarily conveyed through facial expressions resulting from facial muscle movements. Facial expressions serve as a form of nonverbal communication, reflecting a person’s thoughts and emotions. This research aims to classify emotions based on facial expressions using the Convolutional Neural Network (CNN) and detect faces using the Viola-Jones method in video recordings of online meetings. We utilize the VGG-16 architecture, which consists of 16 layers, including convolutional layers with the ReLU activation function and pooling layers, specifically max pooling. The fully connected layer also employs the ReLU activation function, while the output layer uses the Softmax. The Viola-Jones method is used for facial detection in images, achieving an accuracy of 87.6% in locating faces. Meanwhile, the CNN method is applied for facial expression recognition, with an accuracy of 59.8% in classifying emotions.
Artificial Intelligence Untuk Identifikasi Motif Tenun Tradisional Sulawesi Tengah Pusadan, Mohammad Yazdi; Laila, Rahma; Pratama, Septiano Anggun
Bomba: Jurnal Pembangunan Daerah Vol 5 No 1 (2025)
Publisher : Badan Riset dan Inovasi Daerah Sulawesi Tengah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.65123/bomba.v5i1.93

Abstract

Traditional weaving from Central Sulawesi, such as the motifs of Magau, Banua Oge/Souraja, and Tadulako, reflects deep cultural and historical values. However, the complexity of the patterns and motifs often makes manual identification challenging. This research employs an Artificial Intelligence (AI) approach using Convolutional Neural Networks (CNN) to automate the identification of these motifs. The AI model is trained using a diverse dataset of woven motif images and shows significant accuracy in classifying Magau, Banua Oge/Souraja, and Tadulako motifs. This research opens up cultural preservation and innovation opportunities in woven products with modern technology. The achieved result is the evaluation of the AI model using the following metrics: accuracy, precision, recall, and the confusion matrix. The accuracy obtained for each motif reaches 90%.
Implementation of Long Short-Term Memory Algorithms on Cryptocurrency Price Prediction with High Accuracy on Volatile Assets Nursiana Zasqia, Andi Nirina; Laila, Rahmah; Trezandy Lapatta, Nouval; Yazdi Pusadan, Mohammad; Santi, Dessy; Wirdayanti
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2422

Abstract

Cryptocurrencies have emerged as one of the most popular digital assets, characterized by high volatility, which presents a significant challenge in forecasting their price movements accurately. This study aims to implement the Long Short-Term Memory (LSTM) algorithm to predict the prices of selected cryptocurrencies, including Bitcoin (BTC), Binance Coin (BNB), Ethereum (ETH), Dogecoin (DOGE), Solana (SOL), and Shiba Inu (SHIB). The LSTM model is trained using the Adam optimizer and employs early stopping to mitigate overfitting. Model performance is evaluated using Mean Absolute Error (MAE), Mean Squared Error (MSE), Root Mean Squared Error (RMSE), and the coefficient of determination (R²). The results indicate that the LSTM model achieves strong predictive accuracy for relatively low-volatility assets such as Dogecoin and Solana, with R² scores of 0.9795 and 0.9523, respectively. In contrast, its performance declines when applied to highly volatile assets like Bitcoin and Binance Coin. The findings also suggest that LSTM performs best in short-to-medium-term forecasts (7 to 30 days), but shows limitations in long-term predictions. This study contributes to the field by demonstrating the applicability of LSTM in financial forecasting and highlighting its strengths and constraints across different volatility profiles. Practically, the findings can assist traders and financial analysts in making data-driven decisions by applying LSTM models for more reliable short-term predictions, while emphasizing the need to integrate external market factors to enhance long-term forecast accuracy.
Pengenalan Pola pada Batik Lontara berbasis Kecerdasan Buatan Mohammad Yazdi Pusadan; Fuad Mahfud; Anisa Yulandari; Sabarudin Saputra
Prosiding SISFOTEK Vol 9 No 1 (2025): SISFOTEK IX 2025
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Batik is an Indonesian cultural heritage in which almost every region has its own distinctive batik with diverse motifs. UNESCO designated batik as a world cultural heritage created by the Indonesian people in 2009. In South Sulawesi, there is also batik called Batik Lontara. Batik Lontara itself is a type of Bugis-Makassar batik unique to South Sulawesi that features motifs of the Lontara script. The purpose of this research is to implement the extraction of woven Batik Lontara and stamped Batik Lontara using the GLCM (Gray Level Co-occurrence Matrix) method and the KNN (K-Nearest Neighbor) algorithm to recognize the types of Batik Lontara. The Gray Level Co-occurrence Matrix (GLCM) is a feature extraction method that uses second-order texture calculations, considering pairs of two pixels from the original image. This research employs the K-Nearest Neighbor (KNN) algorithm, which is a method for classifying objects based on training data with the closest distance to the test data. The research material used is images of Batik Lontara with various motifs, namely woven Batik Lontara and non-woven Batik Lontara. Based on the Batik Lontara images, a process of converting the images from RGB to Grayscale will be carried out. The expected output of this research is a reputable international journal publication.