Claim Missing Document
Check
Articles

Found 17 Documents
Search

Analisis Pengembangan Dalam Penerapan Recommender System Menggunakan Metode Algoritma Apriori Dan K-Means Clustering Pada Aplikasi E- Commerce. (Studi Kasus Di Big Sport Tangerang) Sukanda, Ahmad; Achmad Hindasyah; Taswanda Taryo
Jurnal Ilmu Komputer Vol 2 No 2 (2024): Jurnal Ilmu Komputer (Edisi Desember 2024)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The sales and marketing system in Big Sport is still carried out conventionally, causing the problem of sales transactions which causes a decrease in turnover. The solution to this problem is an e-commerce application for Big Sport and implementing a strategy recommendation system. By implementing the a priori algorithm method used to find out product recommendations on Big Sport to look for products that frequently appear (frequent itemset) with a minimum support calculation of 3 and a minimum Confidence of 50% from sales transaction data in June 2023 from 18 product data to determine the Association Rule for a combination of itemsets that gets an average lift ratio test value of 1.67 with a maximum Confidence value of 100% which forms 22 Association Rule results to provide good and accurate product recommendations for e-commerce applications based on sales transaction history data . The K-Means Clustering method was implemented using tolls rapidminer using transaction data for 6 months from 18 products. From the rapidminer run, the results from cluster 0 contain 8 items, cluster 1 has 7 items, and cluster 2 has 3 items with an average value. within a centroid distance of 2381.332, where cluster 0 has a value of 1975.234, cluster 1 has a value of 2995.918 and cluster 2 has a value of 2030.222. It can be concluded that items in cluster 0 are products with low sales levels, items in cluster 2 with medium sales levels, and items in cluster 1 with high sales levels. And the Davies Bouldin Index value is 0.462 which shows the fact that the centroid distance assessment results are almost close to 0 which can be concluded to have satisfactory results because the lower the DBI value, the better the cluster value so that it can be used as a reference in product procurement.
Analis Perancangan Dan Penerapan Keamanan Jaringan Menggunakan Metode Intrusion Detection System (IDS), Intrusion Prevention System (IPS) Dan Demilitarized Zone (DMZ) Pada PT. Maha Digital Indonesia (Mahapay) Trijanitra, Evan; Arya Adhyaksa Waskita; Taswanda Taryo
Jurnal Ilmu Komputer Vol 2 No 2 (2024): Jurnal Ilmu Komputer (Edisi Desember 2024)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security systems, in recent years have become the main focus in the world of securing other important data, this is due to the high number of suspicious threats (Suspicious Threats) and attacks from the Internet. Network security involves efforts to protect data and computer systems from detrimental threats, such as cyberattacks, malware, and data theft. The existence of increasingly complex and evolving threats has increased awareness of the need for strong network security. PT. Maha Digital Indonesia (Mahapay) is a company operating in the field of EDC Field Service where it is very important that client data is kept confidential. This requires good network security to maintain the confidentiality of the data. So the aim of this research is to implement network security using the Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Demilitarized Zone (DMZ) methods as network security at PT . Maha Digital Indonesia (Mahapay). The results of this research are the formation of connections between networks in the topology along with the successful functioning of the Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) detecting and preventing suspicious activities carried out by attackers and the operation of rules for the DMZ area. Success in the application is tested again by carrying out several attack methods that will be analyzed such as Syn Flood Attack, Ping Of Death and Port Scanning which will be handled by the configuration that has been applied to the network and server.
Klasifikasi Berita Bahasa Indonesia Dengan Menggunakan Metode K-Nearest Neighbor Dan Naive Bayes Komariah Kukum Manieh Nuryasin; Taswanda Taryo; Sudarno
Jurnal Ilmu Komputer Vol 3 No 1 (2025): Jurnal Ilmu Komputer (Edisi Juli 2025)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the era of rapid development of information technology, the need for a news classification system is crucial to manage the increasing volume of information. This study aims to develop a news classification system in Indonesian into five main categories: Politics, Economy, Health, Security, and Poverty. The methods used include the K-Nearest Neighbor (KNN) algorithm and Naïve Bayes. The dataset consists of 2,000 news items obtained from Kaggle, with preprocessing stages including cleaning, tokenizing, normalization, and TF-IDF weighting. The evaluation was carried out through three data sharing scenarios: 70%-30%, 80%-20%, and 90%-10%. The results showed that the KNN algorithm achieved the highest accuracy of 89% in the 80%-20% and 90%-10% scenarios, while Naïve Bayes produced the best accuracy of 78.66% in the 70%-30% scenario. KNN proved to be more reliable for data with balanced category distribution, while Naïve Bayes required further adjustment, especially for underrepresented data categories. This research provides significant contributions to the development of an automatic news classification system, which can be implemented to improve user experience in accessing information.
KLASIFIKASI PHISHING URL PADA WEBSITE BERBASIS METODE ENSEMBLE Bahrul Ulum; Taswanda Taryo; Sudarno
Jurnal Ilmu Komputer Vol 3 No 1 (2025): Jurnal Ilmu Komputer (Edisi Juli 2025)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study analyzes the performance of ensemble learning algorithms in detecting phishing URLs using the PhiUSIIL Phishing URL dataset. The three algorithms compared are CatBoost, XGBoost, and LightGBM. The research stages include data preprocessing, data division into an 80:20 train-test split, and performance evaluation based on accuracy, precision, recall, and F1-score metrics. The results show that XGBoost has the best performance with an accuracy of 97.54% and an ROC AUC of 93.05%, followed by CatBoost with an accuracy of 97.46% and an ROC AUC of 92.94%. LightGBM, although it has lower performance, still shows good results with an accuracy of 96.99% and an ROC AUC of 91.85%. The data cleaning process successfully improves efficiency by eliminating irrelevant attribute analysis. This study confirms that ensemble algorithms can be implemented for the development of more effective and accurate phishing detection systems. XGBoost is recommended as the primary algorithm in detecting phishing threats in cybersecurity applications, thanks to its ability to handle large and complex data.
Analisis Prediksi Penerima Bantuan Bea Study Menggunakan Algoritma Id3, Naïve Bayes Dan K-Nearest Neighbor (Studi Kasus Pada Lembaga Amil Zakat Rydha) Muhamad Sibli; Taswanda Taryo; Murni Handayani
Jurnal Ilmu Komputer Vol 3 No 1 (2025): Jurnal Ilmu Komputer (Edisi Juli 2025)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The RYDHA Amil Zakat Institution has not yet implemented a data-driven predictive system to objectively determine B-Best scholarship recipients, leaving the selection process manual and prone to bias. This study aims to compare the performance of ID3, Naïve Bayes, and K-Nearest Neighbors (KNN) algorithms in classifying scholarship eligibility. Primary data were obtained from the 2024 B-Best applicants’ records, including demographic, socio-economic, academic, and supporting documents, while secondary data consisted of selection guidelines and internal reports, collected through interviews, documentation, and observation. Data analysis employed the three algorithms with evaluation using the Confusion Matrix and ROC Curve. The results show that KNN achieved the best performance with 96.3% accuracy, 0.958 AUC, 0.944 F1-score, 0.944 precision, and 0.944 recall, thus recommended as the predictive model to support a more objective and accurate scholarship selection system.
Analisis Tipe Kecerdasan Majemuk Siswa Sekolah Dasar Berbasis Catatan Perilaku Menggunakan Algoritma Naive Bayes, K-Nearest Neighbors, dan Support Vector Machine Nursalam, Asep Herman; Agung Budi Susanto; Taswanda Taryo
Jurnal Ilmu Komputer Vol 3 No 1 (2025): Jurnal Ilmu Komputer (Edisi Juli 2025)
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to identify the types of multiple intelligences of elementary school students based on Howard Gardner's theory by utilizing machine learning algorithms, namely Naive Bayes, K-Nearest Neighbors (KNN), and Support Vector Machine (SVM). The data used comes from student behavior records and intelligence type questionnaires obtained from students or parents. The SEMMA method (Sample, Explore, Modify, Model, Assess) is used, including text preprocessing and TF-IDF feature extraction. The classification process is carried out using Orange Data Mining software and evaluated using accuracy, precision, recall, F1-score, and AUC metrics. The evaluation results show that the SVM algorithm provides the best performance with an accuracy of 93.30% and AUC of 0.997. Naive Bayes follows with 90.50% accuracy and 0.994 AUC, while KNN reaches 89.50% accuracy and 0.941 AUC. The study also results in a web-based application prototype that classifies students' intelligence types and provides personalized learning recommendations. This confirms the effectiveness of machine learning in supporting personalized learning and student potential development.
PENGENALAN KEAMANAN DIGITAL DAN PEMANFAATAN AI SECARA BIJAK BAGI SISWA-SISWI Taswanda Taryo; Achmad Hindasyah; Nilovar Asyiah
Abdi Jurnal Publikasi Vol. 4 No. 3 (2026): Januari
Publisher : Abdi Jurnal Publikasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of digital technology and Artificial Intelligence (AI) has had a significant impact on daily life, including in the field of education. Students are now able to utilize various AI-based applications to support learning processes, access information quickly, and enhance creativity. However, alongside these positive opportunities, there are risks that cannot be ignored, such as low levels of digital security literacy, vulnerability to cybercrime, and the potential misuse of AI technology. In response to these conditions, this Community Service Program (Pengabdian kepada Masyarakat/PKM) is designed to provide an introduction to digital security and the wise use of AI for students. The activities focus on increasing awareness of the importance of protecting personal data, promoting ethical behavior in digital media usage, and improving understanding of responsible AI utilization. In addition, the program introduces various examples of AI applications that support learning, enabling students to understand both the benefits and risks of AI technology. The implementation methods include interactive material presentations, group discussions, case studies related to digital security, and hands-on practice using simple AI applications. Through this approach, students are expected to more easily understand the concepts presented and apply them in their daily lives.With the implementation of this PKM program, students are expected to develop better digital security literacy as well as the skills to utilize AI wisely, ethically, and productively, thereby becoming better prepared to face the challenges of the digital era.