p-Index From 2021 - 2026
11.601
P-Index
This Author published in this journals
All Journal Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Prosiding SNATIF JURNAL PASTI (PENELITIAN DAN APLIKASI SISTEM DAN TEKNIK INDUSTRI) Jurnal Edukasi dan Penelitian Informatika (JEPIN) Annual Research Seminar JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab BAREKENG: Jurnal Ilmu Matematika dan Terapan JITTER (Jurnal Ilmiah Teknologi Informasi Terapan) INTECOMS: Journal of Information Technology and Computer Science Jiko (Jurnal Informatika dan komputer) KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Jurnal Kreativitas PKM JUMANJI (Jurnal Masyarakat Informatika Unjani) MIND (Multimedia Artificial Intelligent Networking Database) Journal Jurnal Manajemen Informatika Jurnal ICT : Information Communication & Technology Building of Informatics, Technology and Science JUTIS : Jurnal Teknik Informatika Jurnal Mnemonic JATI (Jurnal Mahasiswa Teknik Informatika) JOINT (Journal of Information Technology jurnal syntax admiration Tematik : Jurnal Teknologi Informasi Komunikasi Innovation in Research of Informatics (INNOVATICS) Informatics and Digital Expert (INDEX) International Journal of Global Operations Research Jurnal Sosial dan Teknologi Jurnal Ilmiah Wahana Pendidikan Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) International Journal of Quantitative Research and Modeling Jurnal Abdimas Kartika Wijayakusuma International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Journal of Informatics and Communication Technology (JICT) Jurnal Informatika Teknologi dan Sains (Jinteks) Prosiding Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika (SNESTIK) Prosiding Seminar Nasional Sisfotek (Sistem Informasi dan Teknologi Informasi) Jurnal Algoritma IJESPG (International Journal of Engineering, Economic, Social Politic and Government) journal Ranah Research : Journal of Multidisciplinary Research and Development Enrichment: Journal of Multidisciplinary Research and Development Journal of Informatics and Communication Technology (JICT) Malahayati International Journal of Nursing and Health Science Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika
Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : International Journal of Quantitative Research and Modeling

Comparative Analysis of K-Means and K-Medoids Clustering in Retail Store Product Grouping Muthmainah, Sekar Ghaida; Hadiana, Asep Id; Melina, Melina
International Journal of Quantitative Research and Modeling Vol 5, No 3 (2024)
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v5i3.753

Abstract

The retail business is growing very rapidly with increasing business competition. The application of information technology is one strategy for understanding consumer product purchasing patterns and grouping sales products. This research aims to analyze and compare the K-Means and K-Medoids Clustering techniques for retail data based on the Davies Bouldin Index value and computing time. K-Means is an algorithm that divides data into k clusters based on centroids, while K-Medoids Clustering uses objects with medoids representing clusters as centroid centers. Clustering in both methods produces an optimal number of clusters of 3 clusters. The results of this research show that K-Means produced 358 data in Cluster 1, 292 data in Cluster 2, and 367 data in Cluster 3 with a DBI of 0.7160. Meanwhile, K-Medoids produced 295 data in Cluster 1, 360 data in Cluster 2, and 362 data in Cluster 3 with a DBI of 0.7153. In addition, this study calculated the average computation from 5 experiments, namely K-Means with an average time of 0.024278/s and K-Medoids of 0.05719/s. Based on the lower DBI, K-Medoids have better results in clustering, but the K-Means method is better in terms of computational efficiency. It is hoped that the results of this research will provide valuable insights for retail business people in analyzing sales data.
Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format Ali, Moch. Dzikri Azhari; Hadiana, Asep Id; Melina, Melina
International Journal of Quantitative Research and Modeling Vol 5, No 3 (2024)
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v5i3.757

Abstract

The rapid advancement of information technology demands enhanced security for data exchange in the digital world. Network security threats can arise from various sources, necessitating techniques to protect information transmitted between interconnected networks. Securing network logs is a critical step in strengthening overall network security. Network logs are records of activities within a computer network, including unauthorized access attempts, user activities, and other key events. This research focuses on developing a network log security system by comparing the performance of the Advanced Encryption Standard (AES) and Twofish algorithms, integrated with the Common Event Format (CEF) for encrypting network logs. Tests were conducted on network log datasets to evaluate system functionality and performance. Results indicate that the AES algorithm performs encryption and decryption faster than Twofish. Across five tests with different file sizes, AES took an average of 2.1386 seconds for encryption, while Twofish required 22.8372 seconds. For decryption, AES averaged 2.451 seconds compared to Twofish’s 26.140 seconds. The file sizes after encryption were similar for both algorithms. Regarding CPU usage, AES demonstrated higher efficiency. The average CPU usage during AES encryption was 0.5558%, whereas Twofish used 23.2904%. For decryption, AES consumed 0.4682% of CPU resources, while Twofish required 13.7598%. These findings confirm that AES is not only faster in both encryption and decryption but also more efficient in terms of CPU usage. This research provides valuable insights for optimizing network log security by integrating standardized log formats, like CEF, with appropriate encryption techniques, helping to safeguard against cyber threats.
Enhancing Email Client Security with HMAC and PGP Integration to Mitigate Cyberattack Risks Oktaviani, Ayu Nur; Hadiana, Asep Id; Melina, Melina
International Journal of Quantitative Research and Modeling Vol 5, No 3 (2024)
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v5i3.758

Abstract

The rapid advancement of technology in the modern era has significantly increased the risk of data breaches and misuse, particularly in email communications. Ensuring data privacy and security is crucial to preventing information theft and mitigating cyberattack risks. This research focuses on enhancing email client security through the integration of Hash-Based Message Authentication Code (HMAC) and Pretty Good Privacy (PGP). HMAC is employed as a message authentication mechanism to ensure the integrity and authenticity of email messages, while PGP is utilized to generate public and private key pairs, enabling secure encryption and decryption processes. By integrating these two security methods into the email client system, we aim to enhance its resilience against cyber threats. The system's effectiveness was evaluated through black-box testing, demonstrating its capability to secure the email delivery process. Additionally, an analysis of key randomness using the entropy method revealed a maximum value of 6 bits, indicating a relatively high level of randomness and further strengthening the encryption process. The results of this study indicate that the combined use of HMAC and PGP provides a robust security solution for enhancing email client security and mitigating potential cyberattack risks.
Cryptographic Security for Double Encryption on Images Using AES and IDEA Algorithms Nizar Septi maulana; Asep Id Hadiana; Melina
International Journal of Quantitative Research and Modeling Vol. 6 No. 3 (2025): International Journal of Quantitative Research and Modeling (IJQRM)
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v6i3.1072

Abstract

Di era digital, keamanan citra rekam medis elektronik telah menjadi perhatian utama karena tingginya risiko kebocoran informasi sensitif. Studi ini menyelidiki dan mengembangkan implementasi enkripsi ganda pada data citra medis dengan menggabungkan Advanced Encryption Standard (AES) dan International Data Encryption Algorithm (IDEA) untuk meningkatkan keamanan citra, khususnya untuk citra rekam medis elektronik yang rentan terhadap pelanggaran informasi. AES digunakan karena efisiensinya dalam mengenkripsi data berukuran besar, sementara IDEA menawarkan struktur kunci yang kompleks yang memberikan perlindungan yang lebih kuat terhadap akses yang tidak sah. Kumpulan data citra Magnetic Resonance Imaging (MRI) yang diperoleh dari platform publik Kaggle digunakan sebagai objek uji untuk proses enkripsi dan dekripsi. Evaluasi dilakukan dengan menggunakan dua pendekatan utama: uji efek avalanche untuk mengukur sensitivitas perubahan input terhadap output ciphertext, dan uji waktu pemrosesan untuk menilai efisiensi kinerja enkripsi dan dekripsi. Hasilnya menunjukkan nilai rata-rata efek avalanche mencapai 49,97%, sangat mendekati nilai ideal 50%, menunjukkan tingkat difusi data yang tinggi dan kekuatan kriptografi yang kuat. Sementara itu, pengujian waktu enkripsi pada lima berkas citra menunjukkan bahwa rata-rata waktu yang dibutuhkan untuk melakukan enkripsi ganda menggunakan AES dan IDEA adalah 52,06 detik, dengan rentang waktu antara 42,0 detik hingga 63,5 detik, tergantung pada ukuran dan kompleksitas citra. Oleh karena itu, kombinasi AES dan IDEA terbukti meningkatkan kekuatan kriptografi tanpa mengurangi efisiensi operasional secara signifikan. Pendekatan enkripsi ganda ini dinilai layak dan efektif untuk diimplementasikan dalam sistem informasi kesehatan, terutama untuk menjaga kerahasiaan, integritas, dan keaslian citra rekam medis elektronik. Kata kunci: Enkripsi ganda, AES, IDEA, efek longsor, keamanan citra medis, efisiensi waktu pemrosesan
Digital Image Security with AES and Blowfish Double Encryption Iqbal Dwi Nulhakim; Asep Id Hadiana; Melina
International Journal of Quantitative Research and Modeling Vol. 6 No. 3 (2025): International Journal of Quantitative Research and Modeling (IJQRM)
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v6i3.1073

Abstract

Protection of digital images is becoming increasingly important with the growing use of images as a medium of information in various fields, particularly in the healthcare sector. Medical images such as Magnetic Resonance Imaging (MRI) contain sensitive information that requires extra security against unauthorized access and data manipulation. This study aims to design and build a digital image security system using a dual encryption approach and authenticity verification based on watermarking. The security process is carried out in two main stages. First, images with text-based watermarks are encrypted using the Advanced Encryption Standard (AES) algorithm to protect their visual content. Second, the AES key is re-encrypted using the Blowfish algorithm to prevent the key from being stored in plaintext, thereby creating an additional layer of protection. The watermark is embedded into the image using the Singular Value Decomposition (SVD) method and is first converted into a hash value using the SHA-256 algorithm, which serves to verify the integrity of the image after decryption. The testing was conducted using the public dataset “Brain Tumor Image Dataset (Semantic Segmentation)” from Kaggle, which consists of brain MRI images in .jpg and .png formats. The system evaluation encompassed functionality, data security, and process efficiency through system function testing, measurement of encrypted data randomness (entropy test), file penetration using OpenSSL, and performance analysis in terms of processing time and file size. The research results show that the system successfully implemented double encryption with a high entropy level (approaching 8.00) and resistance to penetration attacks. In terms of efficiency, the system achieved an average encryption time of 81.35 ms and decryption time of 13.68 ms with minimal file size increase. Integrity testing confirmed that the SVD-SHA256-based watermark remained intact after the encryption-decryption process, enabling verification of image authenticity. The developed system efficiently maintains the confidentiality and authenticity of digital images and can be applied in electronic medical record systems or sensitive digital archives. Keywords: Digital images, double encryption, AES, Blowfish, SVD
Co-Authors Abdillah, Fajrul Abidillah, Gunawan Adelia Siti Rukoyah Adriansyah Pramana Agri Yodi Prayoga Agus Komarudin Agus Komarudin Agus Komarudin Alawiah, Siti Nurbayanti Alda Amorita Azza Ali, Moch. Dzikri Azhari Ananta Firdaus, Ahnaf Anggoro, Sigit Anggun Titah Islamiyyah Anshori, Siddiq Ahmad Anwar Fauzi, Mochammad Ardiansyah, Diki Arthur Oliviana Zabka Ashaury, Herdi Ashaury, Herdy Azhari, Moch Dzikri Azy Mushofy Anwary Badrujamaludin, Asep Chrisnanto, Yulison H. Dava Maulana, Muhammad Destiyanti, Fitri Dewi Marini Umi Atmaja Dewi Ratnasari DEWI RATNASARI Diah Tri Wahyuni Eddie Khrisna Putra Edvin Ramadhan Edvin Ramadhan Eka Purnama Rijaludin, Muhamad Engko M, Galih Yuga Pangestu Eriyadi, Maulidina Norick Fadilah, Vira Hasna Fahrezi, Rizal Febrian Faiza Renaldi Faiza Renaldi Fajar Firdaus, Fajar Fajri Rakhmat Umbara Febriansyah Istianto, Andrian Ferdiansyah Ferdian Ferina Nur Maulidya Firdaus, Syahrul Firman Alamsyah Galih Jatnika Galih Yuga Pangestu Engko M Gestavito, Rio Grace Christian M. Purba Gunawan Abdillah Gunawan Abdillah Gunawan Abdillah, Gunawan Gunawan Abidillah Hadi Apryana Hadimas Aprilian, Doni Haikal Muhammad, Husein Hanief Kuswanto, Muhammad Rafi Helsa Hawariyah Herdi Ashaury Herlina Napitupulu Hidayatulah Himawan Hovi Sohibul Wafa Hovi Hovi, Hovi Sohibul Wafa Humaira, Hana Nazla Idham Pratama Putra Illawati, Adinda Rahma Indah Putriani Fajar Sidik Insan Kamil Nurhikmat Ipan Sugiana Iqbal Dwi Nulhakim Iqbal Prayoga Willyana Irma Santikarama Irma Setiawati Ismafiaty, Ismafiaty Julianthy, Denissya Kafi, Moch. Nurul Kania Ningsih, Ade Kasyidi, Fatan Kharisma S, Moh Iqbal Komarudin, Agus Krishna Putra, Eddie Lestari, Abdila Lugina Masri M. Purba, Grace Christian Melina Melina Melina Monica, Taris Muhammad Akmal Ramadhan Muhammad Hasan Thoriq Almuwaffaq Thoriq Muhammad Sukma, Rifaz Muhammad, Azri Mulyasari, Cicik Rafka Mushofy Anwary, Azy Muthmainah, Sekar Ghaida Nabilla, Ulya Nizar Septi maulana Norizan Mohamed Nurrokhimah, Siti Nurul Sabrina, Puspita Oktaviani, Ayu Nur Oliviana Zabka, Arthur Prasetyo, Nur Faid Pryma Saputra Ginting Puspita Nurul Sabrina Puspita Nurul Sabrina Puspita Nurul Sabrina Puspita Putra, Eddie Krishna Putri Eka Prakasawati R Ramadhan Destyanto Rafli Firdaus Raflialdy Raksanagara Rahmawati, A Lusi Fitri Raihan Martin Permana Ramdani, Maullidan Alfa Rizki Fikri Rezki Yuniarti Rezky Yuniarti Ria Amelia Junandes Ridwan Ilyas Rifaldi Elpry Rizal Rizal Dwiwahyu Pribadi Rizky Bayu Oktavian Rizky Fauzi Achman Rukoyah, Adelia Siti Salsabila Fajriati Romli Salsabila Salsabila, Mira Salsabila, Salsabila Fajriati Romli Santikarama, Irma Sapari, Albi Mulyadi SETIAWAN, YOSEP Sevty Nourmantana Shisi Prayesti Singgih, Dimas Siti Rohaeni Siti Widiani Sopian, Annisa Mufidah Sudrajat, Risqi Sukono Sukono Susanti, Adisti Dwi Syamsi, Salsa Safira Nur Syechru Denny Irja Gotama Szalfa Saadiatus Sakinah Tacbir Hendro P Tacbir Hendro P Tacbir Hendro P Tacbir Hendro Pudjiantoro Tacbir Hendro Pudjiantoro Tacbir Hendro Pudjiantoro Tacbir Hendro Pudjiantoro Tacbir Pudjiantoro Hendro Tachbir Hendro Taufiq Akbar Herawan Thomas Adi Nugroho Tulus Harry Lamramot Tulus Tulus, Tulus Harry Lamramot Valentina Adimurti Kusumaningtyas Wahyuni Rodiyah Risfianti Widiyantoro, Widiyantoro Wina Witanti Wina Witanti Wina Witanti Wina Witanti Wina Witanti Wina Witanti Wina Witanti Winalia Winalia Winta Witanti Yasmina Azzahra Yudi Setiadi Permana Yulianto Dwi Saptohadi Yulison Herry Chrisnanto Yulita, Rita Fitri Yuswandi Yuswandi, Yuswandi