Claim Missing Document
Check
Articles

Found 20 Documents
Search

Implementasi Metode Cosine Similarity Dalam Sistem Profiling Dosen Berbasis Data Bibliometrik Untuk Pemetaan Kompetensi Akademik Jefry Sunupurwa Asri; Firnanda Amalia; Muhammad Thifaal Dzaki; Muhammad Fikri; Ardra Rianisa
Bulletin of Computer Science Research Vol. 5 No. 6 (2025): October 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v5i6.811

Abstract

Lecturer profiling based on scientific publications is a strategic component in managing human resources in higher education institutions. The manual process of identifying lecturer competencies often requires considerable time and may lead to inaccuracies. This study aims to develop an automated application for lecturer profiling and competency mapping to relevant courses using an unsupervised text similarity approach based on the Term Frequency–Inverse Document Frequency (TF-IDF) and Cosine Similarity methods. The application was developed using the Streamlit framework with integrated data from Google Scholar, SINTA, and Scopus. The evaluation involved 50 lecturers and 120 lecturer–course pairs, measured using accuracy, precision, recall, F1-score, response time, and usability metrics. The results show an accuracy of 85.3%, an F1-score of 0.853, an average response time of 2.3 seconds, and a usability score of 86.4, which falls into the excellent category. The system is capable of displaying interactive lecturer profiles, performing competency mapping to relevant courses, and generating automatic reports in PDF format. Therefore, this application effectively supports data-driven academic decision-making processes for assigning lecturers according to their areas of expertise.
Penerapan Clean Arsitektur Menggunakan Mobile Platform Berbasis Flutter Untuk Aplikasi Layanan Kapal Putri, Amanda; Asri, Jefry Sunupurwa; Anwar, Nizirwan; Widiantono, Adi
IKRA-ITH Informatika : Jurnal Komputer dan Informatika Vol. 9 No. 1 (2025): IKRAITH-INFORMATIKA Vol 9 No 1 Maret 2025
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37817/ikraith-informatika.v9i1.4380

Abstract

Indonesia's mobile technology adoption rate of 77.02% provides a great opportunity forcompanies to improve their services through mobile platforms. PT ABC, a ship service providerfor various needs, currently only uses web-based applications and needs a mobile-based shipservice application to increase efficiency and flexibility. This research aims to implement CleanArchitecture on a Flutter-based mobile platform to improve the structure and facilitate codemaintenance in ship service applications. The research method used is the prototyping method,with stages including Communication, Quick Plan, Modelling Quick Design, Prototype Formationand Deployment Delivery & Feedback. This approach enables faster application development,earlier identification of potential changes, and reduced risk of failure or mismatch with user needs.The results showed that the application of Clean Architecture in mobile-based ship service applications was successfully implemented so that it provided ease of maintenance. Blackboxtesting with 10 test cases ensures that the application functions as expected and is ready to be usedby PT ABC. User Acceptance Testing also shows that this application meets the needs of users andincreases the company's responsiveness to market changes, the test results reached 86.83%. Withthe division of business logic into usecases folders, the overall efficiency of development, flexibilityof change, and ease of maintenance of the system is increased. In conclusion, Clean Architectureproved to be the right solution to optimise PT ABC's business operations, facilitate applicationmaintenance and testing, and improve code understanding and readability for developers
DESIGN OF FILE ENCRYPTION AND DECRYPTION APPLICATION USING AES-256 CRYPTOGRAPHY ALGORITHM BASED ON STREAMLIT Rosandi, Arditya Adjie; Supriyono, Dhicky Hariyadi; Aulia, Teguh Tegar; Asri, Jefry Sunupurwa
International Journal of Multidisciplinary Research and Literature Vol. 5 No. 1 (2026): INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND LITERATURE
Publisher : Yayasan Education and Social Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53067/ijomral.v5i1.418

Abstract

The widespread use of personal computing devices has led to an increasing number of sensitive documents, including digital files, lacking adequate cryptographic protection, raising the risk of data leakage and misuse. The Advanced Encryption Standard (AES) with a 256-bit key length is a symmetric-key cryptographic algorithm recommended for protecting data confidentiality due to its strong security and excellent performance. This study designs and implements a simple web-based application for file encryption and decryption using the AES-256 algorithm with a password-based key, built on the Streamlit framework. Key generation uses PBKDF2-HMAC-SHA256 with a random salt and a sufficient number of iterations, while data encryption uses AES-GCM, which provides confidentiality and integrity authentication. The application enables users to upload files, encrypt them into .enc ciphertext files, and restore them to their original form via a web interface, eliminating the need for direct command-line interaction. Experiments using several test files of varying sizes to assess the success of the encryption/decryption processes and estimate processing times. Furthermore, to ensure that data could not be accessed without the correct key, negative tests were conducted using erroneous passwords. All test files can be successfully encrypted and decrypted; encrypted files cannot be read directly; and the overhead of encryption and decryption is manageable for everyday use. The prototype app is a suitable solution to enhance the security of local file storage.
Rancang Bangun Aplikasi Point of Sales (POS) untuk Monitoring Kinerja dan Profitabilitas Salesman OTC dengan Pendekatan Agile Development (Studi Kasus: PT Lapi Laboratories): Rancang Bangun POS dengan Pendekatan Agile Development Asri, Jefry Sunupurwa; Anjeli, Baby; Hermansyah, Hermansyah; Tjahjono, Budi; Setiawati, Popong
Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan Vol. 5 No. 2 (2026): Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan
Publisher : Utiliti Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/justikpen.v5i2.389

Abstract

PT Lapi Laboratories merupakan perusahaan farmasi yang memasarkan produk Over-The-Counter (OTC) melalui tenaga penjual (salesman) untuk menjangkau pasar retail seperti apotek, warung, dan minimarket. Perusahaan masih menghadapi tantangan dalam pengelolaan target penjualan, pemberian insentif, serta evaluasi kinerja dan profitabilitas salesman yang belum dilakukan secara terintegrasi. Penelitian ini bertujuan untuk merancang dan membangun aplikasi Point of Sales (POS) yang mampu memonitor kinerja dan profitabilitas salesman secara real-time sebagai dasar pengambilan keputusan manajerial.Pengembangan sistem dilakukan menggunakan pendekatan Agile Development yang memungkinkan fleksibilitas terhadap perubahan kebutuhan bisnis. Data kebutuhan sistem diperoleh melalui wawancara dengan pemangku kepentingan dan dimodelkan menggunakan Unified Modeling Language (UML). Implementasi sistem menggunakan bahasa pemrograman PHP. Evaluasi kinerja salesman dihitung berdasarkan pencapaian target dan volume transaksi, sedangkan profitabilitas diukur melalui kontribusi penjualan dikurangi biaya operasional per individu. Hasil penelitian menunjukkan bahwa aplikasi POS yang dikembangkan mampu menyajikan laporan penjualan secara real-time, mempermudah evaluasi pencapaian target, serta memberikan perhitungan profitabilitas secara otomatis dan lebih akurat. Sistem ini diharapkan dapat meningkatkan motivasi dan daya saing salesman, sekaligus meningkatkan efisiensi operasional perusahaan dalam aktivitas pemasaran produk OTC.
Implementasi Algoritma Enkripsi AES-256 Pada Data Penggajian: Studi Kasus PT Matahati Bermakna Indonesia Hillalia, Laylita Nur; Sunupurwa Asri, Jefry
Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan Vol. 5 No. 2 (2026): Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan
Publisher : Utiliti Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/justikpen.v5i2.425

Abstract

Perkembangan teknologi informasi mendorong transformasi digital, termasuk pada sistem penggajian yang memegang peran penting dalam manajemen sumber daya manusia. Namun, laporan Global Payroll Complexity Index tahun 2021 mencatat 39,6% organisasi global masih menggunakan spreadsheet dan 17,7% bergantung pada proses manual, sehingga berisiko menimbulkan kesalahan operasional dan kebocoran data. Penelitian ini menerapkan algoritma enkripsi Advanced Encryption Standard (AES) 256-bit pada sistem penggajian di PT Matahati Bermakna Indonesia. Setiap karyawan dibekali kunci enkripsi pribadi untuk proses enkripsi dan dekripsi data gaji, sehingga menjaga kerahasiaan dan integritas informasi. Penelitian ini dilakukan menggunakan pendekatan rekayasa perangkat lunak (engineering method) dengan tahapan yang dirancang untuk menyelesaikan permasalahan keamanan dan efisiensi dalam proses penggajian di PT Matahati Bermakna Indonesia. Hasil penelitian menunjukkan nilai indeks persentase sebesar 84,23% yang masuk kategori “Sangat Baik”, mendukung bahwa penggunaan AES-256 efektif, diterima dengan baik oleh pengguna, dan mampu memenuhi kebutuhan keamanan data pada sistem penggajian digital. penerapan AES-256 efektif meningkatkan keamanan data penggajian serta mendukung digitalisasi sistem informasi secara aman dan efisien. Temuan ini diharapkan menjadi referensi bagi organisasi lain dalam mengembangkan sistem penggajian modern yang terpercaya.
Implementation of the Combination of Caesar Cipher, Vigenère Cipher, and Vigenère Autokey in a Diary Web Application to Improve Data Storage Security Muhammad Arifin Sulistiono; Alfin Khalaj Syahruwardi; Fitra Candra Ramadhani; Jefry Sunupurwa Asri
Jurnal Multidisiplin Sahombu Vol. 6 No. 01 (2026): Jurnal Multidisiplin Sahombu, January 2026
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data storage security is a crucial aspect of information systems, as the value and threats to digital data increase. Classical cryptography, such as the Caesar Cipher and the Vigenère Cipher, individually suffer from cryptanalysis attacks, particularly frequency analysis. Therefore, this study aims to analyze the application of the combined Caesar Cipher and Vigenère Cipher algorithms, specifically the Vigenère Autokey variant, as a form of super-encryption to enhance the security of text data storage. The research method used is a literature review with a descriptive-analytical approach, analyzing several relevant previous studies. The analysis results show that the combination of the Caesar Cipher and Vigenère Autokey algorithms can quantitatively improve security, as indicated by the increase in entropy compared to using a single algorithm. Furthermore, this combination remains computationally efficient and does not increase the size of the encrypted data, thus offering potential for application as a lightweight cryptographic solution for securing text data storage. However, previous research still has limitations, particularly in character set support and symmetric key management, which opens up opportunities for further research.
A Comparative Analysis of the Advanced Encryption Standard (AES) 128-, 192-, and 256-Bit Algorithms in Digital Data Security Putra Daffa Dwiyansah; Fiqri Fathurrohman; Nakhwah Alfikry; Jefry Sunupurwa Asri
Jurnal Multidisiplin Sahombu Vol. 6 No. 02 (2026): Jurnal Multidisiplin Sahombu, 2026
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security is a crucial aspect of modern information systems as digital data exchange via the internet increases. One widely used solution to protect data confidentiality and integrity is the Advanced Encryption Standard (AES) cryptographic algorithm, which has three main variants based on key length: AES-128, AES-192, and AES-256. This study aims to analyze and compare the security characteristics and performance of these three AES variants based on a literature review of five relevant national journals. The research method used is a literature review with an analysis and synthesis approach to previous research results. The results show a consistent trade-off between security level and computational efficiency. AES-128 excels in speed and resource efficiency, making it suitable for devices with computing limitations. AES-192 offers a balance between performance and security, while AES-256 provides the highest level of security at the expense of increased processing time and resource usage. The conclusion of this study emphasizes that the selection of an AES variant must be tailored to system requirements and data sensitivity levels, and opens up opportunities for further research related to optimizing AES implementation, particularly in modern web application environments.
Analisis Komparasi Algoritma Hash (Md5, SHA-2, SHA-3, SHA-512) Dan Teknik Salting Untuk Peningkatan Keamanan Data Dini Febryana Sari; Athirah Media Sari; Inayatul Janah; Jefry Sunupurwa Asri
Journal of Innovative and Creativity Vol. 6 No. 1 (2026)
Publisher : Fakultas Ilmu Pendidikan Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security has become a top priority with the increasing threat of cybercrime, such as password hacking and identity theft. One of the main ways to protect an information security data system is by using hash function-based cryptography. However, legacy hash algorithms such as MD5 and SHA-1 have proven vulnerable to various types of attacks. This study focuses on comparing the performance and security of MD5, SHA-2, SHA-3, and SHA-512 algorithms, as well as the effectiveness of using salting techniques. The method used is a comparative literature study of relevant previous research. The results of thekred analysis show that although MD5 excels in speed, this algorithm has a high vulnerability rate with an attack success rate of up to 35% on strong passwords. The SHA-3 algorithm shows the highest level of security with the lowest attack success rate of 20%, but has the slowest computation time. In contrast, with an average computation time of 512.8 ms, SHA-512 balances performance and security very well, especially when using JSON Web Tokens (JWT). This study concluded that the use of modern hash algorithms, such as SHA-512 or SHA-3, combined with salting techniques can significantly increase the resilience of a security system by up to 97.6%.
Penerapan Random Forest dan Content-Based Filtering pada Alokasi Tenaga Kesehatan Hipertensi Asri, Jefry Sunupurwa; Aryani, Diah; Fannya, Puteri; Dewi, Ratna
Journal of Information System Research (JOSH) Vol 7 No 2 (2026): January 2026
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v7i2.9251

Abstract

Hypertension is a major health issue in DKI Jakarta requiring efficient resource distribution to overcome inter-regional access inequalities. This research aims to design and implement a web-based decision support system (DSS) integrating Geographic Information System (GIS) to optimize health worker allocation and determine hypertension priority areas precisely. The novelty lies in integrating a Random Forest machine learning model to predict service coverage until 2030 with Content-Based Filtering (CBF). The CBF method utilizes intrinsic regional features, including service percentages, geographical locations, and prediction trends, to generate objective health worker quota recommendations. The Random Forest model was validated using 5-Fold Cross Validation with excellent performance, showing an average R² value of 0.86 and an accurate Mean Absolute Error (MAE) of 6.7%. The system is implemented using Streamlit and Folium frameworks for geographical visualization. Research results provide contributions through priority area maps, adaptive health worker quota recommendations, and Mobile Health Clinic route simulations supporting data-driven decision-making. Through this system, policymakers can perform strategic planning to improve hypertension intervention effectiveness in Jakarta. With an integrated predictive and recommendation approach, this study is expected to become a reference in the digital transformation of public health resource allocation more equitably and accurately.
Design of Personal Data Security Scheme in Digital Public Service System Using AES-128 Cryptographic Algorithm Fandi Fajar Maulana; Eka Jiparolim; Eko Nurcahyo; Jefry Sunupurwa Asri
Jurnal Multidisiplin Sahombu Vol. 6 No. 03 (2026): Jurnal Multidisiplin Sahombu, 2026
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Digital transformation in the public service sector has significantly accelerated the efficiency of government administration. However, this digitalization presents significant challenges related to cybersecurity, where the risk of personal data (Personally Identifiable Information) leakage poses a threat that could undermine public trust. This research aims to design a data security scheme in a public service system using the Advanced Encryption Standard (AES) cryptographic algorithm with a 128-bit key length. The research method used is conceptual design with a system development life cycle approach. The analysis results indicate that the AES-128 algorithm was selected due to its proven high performance and adequate level of security for public service needs. This design is recommended for implementation in public service databases to ensure the confidentiality of sensitive citizen data without overloading server performance.