Claim Missing Document
Check
Articles

Pengukuran Kesiapan Implementasi Knowledge Management System Sebagai Media Berbagi Pengetahuan pada Program Studi Rakhmat Sani, Ramadhan; S. Sukamto, Titien; Rohmani, Asih
Prosiding TAU SNARS-TEK Seminar Nasional Rekayasa dan Teknologi Vol. 5 No. 1 (2025): Prosiding TAU SNARS-TEK Seminar Nasional Rekayasa dan Teknologi 2024
Publisher : Fakultas Teknik dan Teknologi - TANRI ABENG UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47970/snarstek.v2i1.767

Abstract

Dalam membantu menerapkan visi dan misi Program Studi, knowledge manajemen (KM) sangat diperlukan untuk diadopsi. KM dapat berdampak kepada peningkatan inovasi dan pengetahuan di kalangan civitas akademik. Knowledge managemen system (KMS) juga diterapkan untuk mengelola pengetahuan dengan mendukung dan meningkatkan proses penciptaan pengetahuan, penyimpanan / pengambilan, transfer dan aplikasi dalam organisasi. Penelitian ini bertujuan untuk mengukur kesiapan yang disesuaikan dengan KMS Enabler yang ada pada organisasi seperti dimensi proses organisasi, orang, dan teknologi informasi. Kesiapan dihitung dengan menggunakan kuisioner yang disebarkan kepada stakeholder Program Studi Sistem Informasi Universitas Dian Nuswantoro. skala kesiapan mengadopsi skala aydin & Tasci yang dicerminkan pada skor sangat tidak setuju hingga sangat setuju. Hasil pengukuran dari sisi struktur organisasi, struktur pengambilan keputusan, evaluasi proses menajemen pengetahuan berada dalam kondisi rata-rata 3,68. Dari sisi People (SDM). Hasil perhitungan rata-rata yaitu diangka 3,9. Dan pada hasil pengukuran dari domain Teknologi menunjukkan angka rata-rata 2,4. Hal ini akan menjadi dasar yang baik bagi pengembangan dan implementasi KMS pada Program Studi.
Integrating Ensemble Learning and Information Gain for Malware Detection based on Static and Dynamic Features Sani, Ramadhan Rakhmat; Rafrastara, Fauzi Adi; Ghozi, Wildanil
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 1, February 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i1.2051

Abstract

The rapid advancement of malware poses a significant threat to devices, like personal computers and mobile phones. One of the most serious threats commonly faced is malicious software, including viruses, worms, trojan horses, and ransomware. Conventional antivirus software is becoming ineffective against the ever-evolving nature of malware, which can now take on various forms like polymorphic, metamorphic, and oligomorphic variants. These advanced malware types can not only replicate and distribute themselves, but also create unique fingerprints for each offspring. To address this challenge, a new generation of antivirus software based on machine learning is needed. This intelligent approach can detect malware based on its behavior, rather than relying on outdated fingerprint-based methods. This study explored the integration of machine learning models for malware detection using various ensemble algorithms and feature selection techniques. The study compared three ensemble algorithms: Gradient Boosting, Random Forest, and AdaBoost. It used Information Gain for feature selection, analyzing 21 features. Additionally, the study employed a public dataset called ‘Malware Static and Dynamic Features VxHeaven and VirusTotal Data Set’, which encompasses both static and dynamic malware features. The results demonstrate that the Gradient Boosting algorithm combined with Information Gain feature selection achieved the highest performance, reaching an accuracy and F1-Score of 99.2%.
Model Hybrid Random Forest dan Information Gain untuk meningkatkan Performa Algoritma Machine Learning pada Deteksi Malicious Software Rafrastara, Fauzi Adi; Ghozi, Wildanil; Sani, Ramadhan Rakhmat; Handoko, L. Budi
Jurnal Informatika dan Rekayasa Perangkat Lunak Vol. 6 No. 2 (2024): September
Publisher : Universitas Wahid Hasyim

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The evolution of malware, or malicious software, has raised increasing concerns, targeting not only computers but also other devices like smartphones. Malware is no longer just monomorphic but has evolved into polymorphic, metamorphic, and oligomorphic forms. With this massive development, conventional antivirus software is becoming less effective at countering it. This is due to malware's ability to propagate itself using different fingerprint and behavioral patterns. Therefore, an intelligent machine learning-based antivirus is needed, capable of detecting malware based on behavior rather than fingerprints. This research focuses on the implementation of a machine learning model for malware detection using ensemble algorithms and feature selection to achieve optimal performance. The ensemble algorithm used is Random Forest, evaluated and compared with k-Nearest Neighbor and Decision Tree as state-of-the-art methods. To enhance classification performance in terms of processing speed, the feature selection method applied is Information Gain, with 22 features. The highest results were achieved using the Random Forest algorithm and Information Gain feature selection method, reaching a score of 99.0% for accuracy and F1-Score. By reducing the number of features, processing speed can be increased by almost fivefold.
Deteksi Serangan Denial of Service (DoS) dan Spoofing pada Internet of Vehicles menggunakan Algoritma K-Nearest Neighbor (KNN) Ghozi, Wildanil; Rafrastara, Fauzi Adi; Sani, Ramadhan Rakhmat; Abdussalam, Abdussalam
Jurnal Informatika dan Rekayasa Perangkat Lunak Vol. 6 No. 2 (2024): September
Publisher : Universitas Wahid Hasyim

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The implementation of Internet of Things (IoT) technology in motor vehicles has been increasing over time and is known as the Internet of Vehicles (IoV). IoV is becoming more essential to society as it provides comfort, safety, and efficiency in driving. Unfortunately, the use of internet technology in IoV brings the potential for cyber-attacks, such as Denial of Service (DoS) and Spoofing. Intrusion Detection Systems in IoV have not yet fully matured, as this technology is still relatively new. Therefore, the potential threats and their significant impact make research on this topic urgently needed. This study aims to evaluate the performance of the k-Nearest Neighbor (kNN) classification algorithm in detecting cyber-attacks on IoV. The predicted classes in this study consist of six categories: Benign, DoS, Gas-Spoofing, Steering Wheel-Spoofing, Speed-Spoofing, and RPM-Spoofing. These two types of attacks on IoV (DoS and Spoofing) pose risks to the operational safety of vehicles, which can endanger drivers and other road users. The dataset used is a public dataset called CIC IoV2024. The performance of the kNN algorithm is also compared to three other state-of-the-art algorithms, including Naïve Bayes, Deep Neural Network, and Random Forest. The results show that k-Nearest Neighbor (kNN) achieved the best performance with a score of 98.7% for both accuracy and F1-Score metrics. kNN outperformed Naïve Bayes, which ranked second with a score of 98.1% accuracy and 98.0% F1-Score. Thus, the kNN algorithm can be recommended as a classifier in the development of an intrusion detection system for IoV
Improved imperceptible engagement-based 2D sigmoid logistic maps, Hill cipher, and Kronecker XOR product Lestiawan, Heru; Sani, Ramadhan Rakhmat; Abdussalam, Abdussalam; Rachmawanto, Eko Hari; Purwanto, Purwanto; Sari, Christy Atika; Doheir, Mohamed
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8331

Abstract

Image encryption is a crucial facet of secure data transmission and storage, and this study explores the efficacy of combining sigmoid logistic maps (SLM), Hill cipher, and Kronecker's product method in enhancing image encryption processes. The evaluation, conducted on diverse images such as Lena, Rice, Peppers, Cameraman, and Baboon, unveils noteworthy findings. The Lena image emerges as the most successfully encrypted, as evidenced by the lowest mean squared error (MSE) at 92.81 and the highest peak signal-to-noise ratio (PSNR) at 19.43, reflecting superior fidelity and quality preservation. Additionally, the encryption of 64×64 pixels images consistently demonstrate robustness, with a high number of pixels change rate (NPCR) and unified average change intensity (UACI) values, particularly notable for the Cameraman image. Even for 128×128 pixels images, commendable encryption performance persists across the tested images. The amalgamation of SLM, Hill cipher, and Kronecker's product emerges as an effective strategy for balancing security and perceptual quality in image encryption, with the Lena image consistently outperforming others based on comprehensive metrics. This research provides valuable insights for future studies in the dynamic domain of image encryption, emphasizing the potential of advanced cryptographic techniques in ensuring secure multimedia communication.
Fairer Public Complaint Classification on LaporGub: Integrating XLM-RoBERTa with Focal Loss for Imbalance Data Zahro, Azzula Cerliana; Alzami, Farrikh; Sani, Ramadhan Rakhmat; Fahmi, Amiq; Megantara, Rama Aria; Naufal, Muhammad; Azies, Harun Al; Iswahyudi, Iswahyudi
Sinkron : jurnal dan penelitian teknik informatika Vol. 9 No. 4 (2025): Articles Research October 2025
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i4.15260

Abstract

The advancement of digital technology has provided opportunities for governments to improve the quality of public services through citizen complaint channels. One example of this implementation in Indonesia is Lapor Gub, managed by the Dinas Komunikasi dan Informasi Provinsi Jawa Tengah (Communication and Information Agency of Central Java Province). This platform receives thousands of complaints daily, ranging from infrastructure, social issues, to illegal levies. However, the large volume of data and the imbalanced distribution of categories pose significant challenges for both manual and automated processing. This study aims to classify citizen complaint texts using XLM-RoBERTa combined with Focal Loss as an approach to handle data imbalance. The dataset consists of 53,774 complaints after data cleaning and text preprocessing. The training process applied a stratified split (78% training, 18% validation, 10% testing) and fine-tuning for 10 epochs. Model performance was evaluated using accuracy, precision, recall, and macro F1-score. The results show that the model without Focal Loss achieved 78.1% accuracy with a macro F1-score of 0.606, while the model with Focal Loss improved the macro F1-score to 0.625 with 78.5% accuracy. These findings demonstrate that the application of Focal Loss enhances the model’s ability to recognize minority categories without reducing performance on majority classes. Therefore, the combination of RoBERTa and Focal Loss offers an effective solution to support faster, fairer, and more transparent public complaint management.
Enhancing Entity Extraction in E-Government Complaint Data using LDA-Assisted NER Umam, Ahmad Khotibul; Alzami, Farrikh; Sani, Ramadhan Rakhmat; Rohmani, Asih; Prabowo, Dwi Puji; Pergiwati, Dewi; Megantara, Rama Aria; Iswahyudi, Iswahyudi
Sinkron : jurnal dan penelitian teknik informatika Vol. 9 No. 4 (2025): Articles Research October 2025
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i4.15292

Abstract

With the rapid development of information technology, governments are increasingly challenged to provide digital channels that enhance public participation in governance. LaporGub, an official platform managed by the Central Java Provincial Government, accommodates citizens' aspirations and complaints, but faces challenges in processing large amounts of unstructured text. Manual analysis is time-consuming and error-prone, resulting in delayed responses and decreased service quality. Conventional Named Entity Recognition (NER) models struggle to handle informal Indonesian-language text, while transformer-based approaches require substantial computing resources that are not widely available in local government environments. Therefore, this study aims to develop a lightweight NER approach by integrating Latent Dirichlet Allocation (LDA) as a semantic pre-annotation tool to improve the accuracy of entity extraction in Indonesian e-government complaint data. To achieve this goal, a dataset of 53,858 complaint reports from the LaporGub platform (2022–2025) was processed using LDA topic modeling (k=10) to provide semantic context during annotation. Next, the enriched dataset was used to train a spaCy-based NER model targeting three entity types: LOCATION, ORGANIZATION, and PERSON, with a training-validation-test split ratio of 70:15:15 using stratified sampling. The evaluation showed that the proposed NER+LDA model achieved a precision of 90.03%, a recall of 81.86%, and an F1-score of 85.75%, representing improvements of +5.78, +2.55, and +4.04, respectively, compared to the baseline NER model (F1-score: 81.71%). Furthermore, the most significant improvements occurred in the detection of ORGANIZATION and PERSON entities. These findings confirm that the integration of LDA as a pre-annotation strategy effectively improves NER performance on informal complaint texts in Indonesia, thus offering a practical and resource-efficient alternative to transformer-based methods for e-government applications.
Perancangan Aplikasi E-Commerce Top-Up Game Online Berbasis Website dengan Integrasi Payment Gateway Ramadhani, Dwi Arya; Nugraha, Purwa Esti; Syahrizal, Muhammad Iqbal; Rakhmat Sani, Ramadhan
Jurnal Teknologi dan Informasi (JATI) Vol 15 No 2 (2025): Jurnal Teknologi dan Informasi (JATI)
Publisher : Program Studi Sistem Informasi, Fakultas Teknik dan Ilmu Komputer, Universitas Komputer Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/jati.v15i2.17055

Abstract

Pada era digital yang terus berkembang, transaksi top-up game online menjadi kebutuhan penting di kalangan gamer. Namun maraknya kasus penipuan dan lemahnya sistem keamanan dalam proses transaksi online menimbulkan kekhawatiran terutama ketika pengguna diminta memberikan data sensitif. Untuk mengatasi permasalahan tersebut, penelitian ini bertujuan merancang dan mengimplementasikan aplikasi top-up game online berbasis web bernama DartGameCorner dengan mengintegrasikan payment gateway sebagai solusi transaksi yang aman dan efisien. Metodologi yang digunakan adalah model Waterfall dimulai dari analisis kebutuhan, desain sistem, implementasi, pengujian menggunakan metode Blackbox hingga tahap pemeliharaan. Hasil implementasi menunjukkan bahwa aplikasi mampu memberikan pengalaman transaksi yang lebih terstruktur, aman, dan cepat, dengan fitur utama seperti autentikasi pengguna, validasi data, manajemen transaksi, dan opsi pembayaran digital melalui MidTrans. Pengujian sistem juga menunjukkan bahwa fungsi-fungsi utama berjalan sesuai kebutuhan meskipun tahap pengujian lanjutan masih diperlukan. Aplikasi ini diharapkan dapat meningkatkan kepercayaan pengguna dalam bertransaksi serta menjadi alternatif terpercaya bagi layanan top-up game online.
Pelatihan Desain Poster Promosi untuk UMKM Binaan Dinsospermasdes Kabupaten Jepara Ghozi, Wildanil; Prabowo, Dwi Puji; Rafrastara, Fauzi Adi; Pramunendar, Ricardus Anggi; Sani, Ramadhan Rakhmat
Jurnal Pengabdian Masyarakat Progresif Humanis Brainstorming Vol 8, No 3 (2025): Jurnal Abdimas PHB : Jurnal Pengabdian Masyarakat Progresif Humanis Brainstormin
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/japhb.v8i3.8379

Abstract

Internet sebagai salah satu dorongan utama dalam perkembangan teknologi memungkinkan setiap manusia untuk menjangakau informasi tanpa batasan ruang dan waktu. Saat ini di Indonesia, lebih dari 196,7 juta penduduk memanfaatkan internet dalam aktivitasnya sehari-hari. Pada provinsi Jawa Tengah terdapat 25,6 juta pengguna internet aktif. Tingginya pengguna internet menjadi peluang untuk memperluas target pemasaran produk UMKM. Pemerintah Kabupaten Jepara, melalui Dinas Sosial, Pemberdayaan Masyarakat dan Desa (Dinsospermasdes) Kabupaten Jepara memiliki tanggung jawab dalam program rehabilitasi Penyandang Masalah Kesejahteraan Sosial (PMKS) dimana salah satu programnya adalah pembinaan UMKM. Saat ini, UMKM binaan Dinsospermasdes belum mampu membuat desain poster promosi yang baik dan menarik pembeli. Penulis memberikan pelatihan desain poster dengan menggunakan aplikasi canva kepada para pelaku UMKM binaan. Pelatihan tersebut telah berhasil meningkatkan pemahaman konsep desain, kemampuan pengambilan foto produk, dan kemampuan membuat desain poster promosi para pelaku UMKM. Poster-poster baru yang dihasilkan pada kegiatan pelatihan menjadi indikator keberhasilan para peserta mengikuti pelatihan. Dengan demikian, diharapkan kemampuan yang telah dimiliki dapat membantu meningkatkan penjualan produk UMKM binaan.
XGBoost-Powered Ransomware Detection: A Gradient-Based Machine Learning Approach for Robust Performance Ghozi, Wildanil; Lestiawan, Heru; Sani, Ramadhan Rakhmat; Hussein, Jassim Nadheer; Rafrastara, Fauzi Adi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 4, November 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i4.2405

Abstract

Ransomware remains a rapidly evolving cyber threat, causing substantial financial and operational disruptions globally. Traditional signature-based detection systems are ineffective against sophisticated, zero-day attacks due to their static nature. Consequently, machine learning-based approaches offer a more effective and adaptive alternative. This study proposes an approach utilizing XGBoost for highly effective ransomware detection. We conducted a rigorous comparative analysis of prominent ensemble learning algorithms—XGBoost, Random Forest, Gradient Boosting, and AdaBoost—on the RISS Ransomware Dataset, comprising 1,524 instances. Our experimental results unequivocally demonstrate XGBoost as the superior ensemble model, achieving an impressive 97.60% accuracy and F1-Score. This performance surpassed Gradient Boosting (97.20%), Random Forest (96.94%), and AdaBoost (96.50%). Furthermore, this study benchmarked XGBoost against established state-of-the-art (SOTA) methods, including Support Vector Machine (SVM) and the SA-CNN-IS deep learning approach. The comprehensive results underscore the core contribution of this study: by applying XGBoost with a carefully structured machine learning pipeline, our approach consistently outperforms two state-of-the-art methods (SVM and SA-CNN-IS) as well as other ensemble algorithms. This highlights the critical role of methodological precision in maximizing detection performance against evolving ransomware threats.
Co-Authors ., Junta Zeniarza ., Junta Zeniarza Abdussalam Abdussalam, Abdussalam Abu Salam Ade Nurul Aisyah Agung Priyo Utomo, Rino Ahmad Khotibul Umam, Ahmad Khotibul Al zami, Farrikh Alzami, Farrikh Ardytha Luthfiarta ARIYANTO, MUHAMMAD Arta Moro Sundjaja, Arta Moro Arunia, Aurelya Prameswari Asih Rohmani Asih Rohmani Asih Rohmani, Asih Atha Rohmatullah, Fawwaz Bernadette Chayeenee Norman , Maria Budi Harjo Budi, Setyo Candra Irawan Catur Supriyanto Christy Atika Sari Darnell Ignasius Defri Kurniawan Defri Kurniawan Diana Aqmala Doheir, Mohamed Dwi Puji Prabowo, Dwi Puji Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erika Devi Udayanti Fahmi Amiq Farah Syadza Mufidah Farrikh Al Zami Farrikh Al Zami Fauzi Adi Rafrastara Fauzi Adi Rafrastara Florentina Esti Nilasari Florentina Esti Nilawati Guruh Fajar Shidik Hanny Haryanto Harun Al Azies Hercio Venceslau Silla Heru Lestiawan Hussein, Jasim Nadheer Hussein, Jassim Nadheer Ifan Rizqa Ignasius, Darnell Ika Novita Dewi Ikhwansyah Kurniawan Indra Gamayanto Iswahyudi ISWAHYUDI ISWAHYUDI Ivan Bayu Fachreza Junta Zeniarja Karin, Tan Regina Kiki Widia Kurniawan, Defri L. Budi Handoko Lekso Budi Handoko Maszuda, Akbar Alvian Megantara, Rama Aria Melati Anggreni Sitorus Muhammad Fais Ramadhani Muhammad Nabhan Rifa’i Muhammad Naufal MY. Teguh Sulistyono Nadya Azizah Nida Aulia Karima Novita Dewi , Ika Nugraha, Purwa Esti Pangesti, Galih Mentari Paramita, Cinantya Pergiwati, Dewi Priyo Utomo, Rino Agung Pulung Nurtantio Andono Purwanto Purwanto Ramadhani, Dwi Arya Resha Meiranadi Caturkusuma Rhyan David Levandra Ricardus Anggi Pramunendar Richard Emmerig S. Sukamto, Titien Salsabilla, Annisa Ratna Sarker, Md. Kamruzzaman Sasono Wibowo Sendi Novianto Sendi Novianto Sendi Novianto Setyo Budi Setyo Budi Sirait, Tamsir Hasudungan Soares, Gilardinho Javiere Oscoraldo Pedrosa Sri Winarno Sri Winarno Suharnawi Suharnawi Suharnawi Suharnawi Suharnawi Sukamto, Titien S. Sukamto, Titien Suhartini Sulistyono, Teguh Syahrizal, Muhammad Iqbal Titien Suhartini Sukamto Titien Suhartini Sukamto Utomo, Danang Wahyu Wibowo, Isro' Rizky Wildanil Ghozi Wulan Puspita Loka Yani Parti Astuti Yanuaresta, Dianna Yunita Ayu Pratiwi Yupie Kusumawati Zahro, Azzula Cerliana Zami, Farrikh Al