Claim Missing Document
Check
Articles

Found 17 Documents
Search

Implementasi Metode Cosine Similarity Dalam Sistem Profiling Dosen Berbasis Data Bibliometrik Untuk Pemetaan Kompetensi Akademik Jefry Sunupurwa Asri; Firnanda Amalia; Muhammad Thifaal Dzaki; Muhammad Fikri; Ardra Rianisa
Bulletin of Computer Science Research Vol. 5 No. 6 (2025): October 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v5i6.811

Abstract

Lecturer profiling based on scientific publications is a strategic component in managing human resources in higher education institutions. The manual process of identifying lecturer competencies often requires considerable time and may lead to inaccuracies. This study aims to develop an automated application for lecturer profiling and competency mapping to relevant courses using an unsupervised text similarity approach based on the Term Frequency–Inverse Document Frequency (TF-IDF) and Cosine Similarity methods. The application was developed using the Streamlit framework with integrated data from Google Scholar, SINTA, and Scopus. The evaluation involved 50 lecturers and 120 lecturer–course pairs, measured using accuracy, precision, recall, F1-score, response time, and usability metrics. The results show an accuracy of 85.3%, an F1-score of 0.853, an average response time of 2.3 seconds, and a usability score of 86.4, which falls into the excellent category. The system is capable of displaying interactive lecturer profiles, performing competency mapping to relevant courses, and generating automatic reports in PDF format. Therefore, this application effectively supports data-driven academic decision-making processes for assigning lecturers according to their areas of expertise.
Penerapan Clean Arsitektur Menggunakan Mobile Platform Berbasis Flutter Untuk Aplikasi Layanan Kapal Putri, Amanda; Asri, Jefry Sunupurwa; Anwar, Nizirwan; Widiantono, Adi
IKRA-ITH Informatika : Jurnal Komputer dan Informatika Vol. 9 No. 1 (2025): IKRAITH-INFORMATIKA Vol 9 No 1 Maret 2025
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37817/ikraith-informatika.v9i1.4380

Abstract

Indonesia's mobile technology adoption rate of 77.02% provides a great opportunity forcompanies to improve their services through mobile platforms. PT ABC, a ship service providerfor various needs, currently only uses web-based applications and needs a mobile-based shipservice application to increase efficiency and flexibility. This research aims to implement CleanArchitecture on a Flutter-based mobile platform to improve the structure and facilitate codemaintenance in ship service applications. The research method used is the prototyping method,with stages including Communication, Quick Plan, Modelling Quick Design, Prototype Formationand Deployment Delivery & Feedback. This approach enables faster application development,earlier identification of potential changes, and reduced risk of failure or mismatch with user needs.The results showed that the application of Clean Architecture in mobile-based ship service applications was successfully implemented so that it provided ease of maintenance. Blackboxtesting with 10 test cases ensures that the application functions as expected and is ready to be usedby PT ABC. User Acceptance Testing also shows that this application meets the needs of users andincreases the company's responsiveness to market changes, the test results reached 86.83%. Withthe division of business logic into usecases folders, the overall efficiency of development, flexibilityof change, and ease of maintenance of the system is increased. In conclusion, Clean Architectureproved to be the right solution to optimise PT ABC's business operations, facilitate applicationmaintenance and testing, and improve code understanding and readability for developers
DESIGN OF FILE ENCRYPTION AND DECRYPTION APPLICATION USING AES-256 CRYPTOGRAPHY ALGORITHM BASED ON STREAMLIT Rosandi, Arditya Adjie; Supriyono, Dhicky Hariyadi; Aulia, Teguh Tegar; Asri, Jefry Sunupurwa
International Journal of Multidisciplinary Research and Literature Vol. 5 No. 1 (2026): INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND LITERATURE
Publisher : Yayasan Education and Social Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53067/ijomral.v5i1.418

Abstract

The widespread use of personal computing devices has led to an increasing number of sensitive documents, including digital files, lacking adequate cryptographic protection, raising the risk of data leakage and misuse. The Advanced Encryption Standard (AES) with a 256-bit key length is a symmetric-key cryptographic algorithm recommended for protecting data confidentiality due to its strong security and excellent performance. This study designs and implements a simple web-based application for file encryption and decryption using the AES-256 algorithm with a password-based key, built on the Streamlit framework. Key generation uses PBKDF2-HMAC-SHA256 with a random salt and a sufficient number of iterations, while data encryption uses AES-GCM, which provides confidentiality and integrity authentication. The application enables users to upload files, encrypt them into .enc ciphertext files, and restore them to their original form via a web interface, eliminating the need for direct command-line interaction. Experiments using several test files of varying sizes to assess the success of the encryption/decryption processes and estimate processing times. Furthermore, to ensure that data could not be accessed without the correct key, negative tests were conducted using erroneous passwords. All test files can be successfully encrypted and decrypted; encrypted files cannot be read directly; and the overhead of encryption and decryption is manageable for everyday use. The prototype app is a suitable solution to enhance the security of local file storage.
Rancang Bangun Aplikasi Point of Sales (POS) untuk Monitoring Kinerja dan Profitabilitas Salesman OTC dengan Pendekatan Agile Development (Studi Kasus: PT Lapi Laboratories): Rancang Bangun POS dengan Pendekatan Agile Development Asri, Jefry Sunupurwa; Anjeli, Baby; Hermansyah, Hermansyah; Tjahjono, Budi; Setiawati, Popong
Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan Vol. 5 No. 2 (2026): Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan IN PROGRES
Publisher : Utiliti Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/justikpen.v5i2.389

Abstract

PT Lapi Laboratories merupakan perusahaan farmasi yang memasarkan produk Over-The-Counter (OTC) melalui tenaga penjual (salesman) untuk menjangkau pasar retail seperti apotek, warung, dan minimarket. Perusahaan masih menghadapi tantangan dalam pengelolaan target penjualan, pemberian insentif, serta evaluasi kinerja dan profitabilitas salesman yang belum dilakukan secara terintegrasi. Penelitian ini bertujuan untuk merancang dan membangun aplikasi Point of Sales (POS) yang mampu memonitor kinerja dan profitabilitas salesman secara real-time sebagai dasar pengambilan keputusan manajerial.Pengembangan sistem dilakukan menggunakan pendekatan Agile Development yang memungkinkan fleksibilitas terhadap perubahan kebutuhan bisnis. Data kebutuhan sistem diperoleh melalui wawancara dengan pemangku kepentingan dan dimodelkan menggunakan Unified Modeling Language (UML). Implementasi sistem menggunakan bahasa pemrograman PHP. Evaluasi kinerja salesman dihitung berdasarkan pencapaian target dan volume transaksi, sedangkan profitabilitas diukur melalui kontribusi penjualan dikurangi biaya operasional per individu. Hasil penelitian menunjukkan bahwa aplikasi POS yang dikembangkan mampu menyajikan laporan penjualan secara real-time, mempermudah evaluasi pencapaian target, serta memberikan perhitungan profitabilitas secara otomatis dan lebih akurat. Sistem ini diharapkan dapat meningkatkan motivasi dan daya saing salesman, sekaligus meningkatkan efisiensi operasional perusahaan dalam aktivitas pemasaran produk OTC.
Implementasi Algoritma Enkripsi AES-256 Pada Data Penggajian: Studi Kasus PT Matahati Bermakna Indonesia Hillalia, Laylita Nur; Sunupurwa Asri, Jefry
Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan Vol. 5 No. 2 (2026): Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan IN PROGRES
Publisher : Utiliti Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/justikpen.v5i2.425

Abstract

Perkembangan teknologi informasi mendorong transformasi digital, termasuk pada sistem penggajian yang memegang peran penting dalam manajemen sumber daya manusia. Namun, laporan Global Payroll Complexity Index tahun 2021 mencatat 39,6% organisasi global masih menggunakan spreadsheet dan 17,7% bergantung pada proses manual, sehingga berisiko menimbulkan kesalahan operasional dan kebocoran data. Penelitian ini menerapkan algoritma enkripsi Advanced Encryption Standard (AES) 256-bit pada sistem penggajian di PT Matahati Bermakna Indonesia. Setiap karyawan dibekali kunci enkripsi pribadi untuk proses enkripsi dan dekripsi data gaji, sehingga menjaga kerahasiaan dan integritas informasi. Penelitian ini dilakukan menggunakan pendekatan rekayasa perangkat lunak (engineering method) dengan tahapan yang dirancang untuk menyelesaikan permasalahan keamanan dan efisiensi dalam proses penggajian di PT Matahati Bermakna Indonesia. Hasil penelitian menunjukkan nilai indeks persentase sebesar 84,23% yang masuk kategori “Sangat Baik”, mendukung bahwa penggunaan AES-256 efektif, diterima dengan baik oleh pengguna, dan mampu memenuhi kebutuhan keamanan data pada sistem penggajian digital. penerapan AES-256 efektif meningkatkan keamanan data penggajian serta mendukung digitalisasi sistem informasi secara aman dan efisien. Temuan ini diharapkan menjadi referensi bagi organisasi lain dalam mengembangkan sistem penggajian modern yang terpercaya.
Implementation of the Combination of Caesar Cipher, Vigenère Cipher, and Vigenère Autokey in a Diary Web Application to Improve Data Storage Security Muhammad Arifin Sulistiono; Alfin Khalaj Syahruwardi; Fitra Candra Ramadhani; Jefry Sunupurwa Asri
Jurnal Multidisiplin Sahombu Vol. 6 No. 01 (2026): Jurnal Multidisiplin Sahombu, January 2026
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data storage security is a crucial aspect of information systems, as the value and threats to digital data increase. Classical cryptography, such as the Caesar Cipher and the Vigenère Cipher, individually suffer from cryptanalysis attacks, particularly frequency analysis. Therefore, this study aims to analyze the application of the combined Caesar Cipher and Vigenère Cipher algorithms, specifically the Vigenère Autokey variant, as a form of super-encryption to enhance the security of text data storage. The research method used is a literature review with a descriptive-analytical approach, analyzing several relevant previous studies. The analysis results show that the combination of the Caesar Cipher and Vigenère Autokey algorithms can quantitatively improve security, as indicated by the increase in entropy compared to using a single algorithm. Furthermore, this combination remains computationally efficient and does not increase the size of the encrypted data, thus offering potential for application as a lightweight cryptographic solution for securing text data storage. However, previous research still has limitations, particularly in character set support and symmetric key management, which opens up opportunities for further research.
A Comparative Analysis of the Advanced Encryption Standard (AES) 128-, 192-, and 256-Bit Algorithms in Digital Data Security Putra Daffa Dwiyansah; Fiqri Fathurrohman; Nakhwah Alfikry; Jefry Sunupurwa Asri
Jurnal Multidisiplin Sahombu Vol. 6 No. 02 (2026): Jurnal Multidisiplin Sahombu, 2026
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security is a crucial aspect of modern information systems as digital data exchange via the internet increases. One widely used solution to protect data confidentiality and integrity is the Advanced Encryption Standard (AES) cryptographic algorithm, which has three main variants based on key length: AES-128, AES-192, and AES-256. This study aims to analyze and compare the security characteristics and performance of these three AES variants based on a literature review of five relevant national journals. The research method used is a literature review with an analysis and synthesis approach to previous research results. The results show a consistent trade-off between security level and computational efficiency. AES-128 excels in speed and resource efficiency, making it suitable for devices with computing limitations. AES-192 offers a balance between performance and security, while AES-256 provides the highest level of security at the expense of increased processing time and resource usage. The conclusion of this study emphasizes that the selection of an AES variant must be tailored to system requirements and data sensitivity levels, and opens up opportunities for further research related to optimizing AES implementation, particularly in modern web application environments.