Claim Missing Document
Check
Articles

Found 31 Documents
Search

Klasifikasi Sentimen Ulasan Pengguna MyPertamina Menggunakan Algoritma Naive Bayes dan TF-IDF: Klasifikasi Sentimen Ulasan Pengguna MyPertamina Menggunakan Algoritma Naive Bayes dan TF-IDF Zulkarnaini, Zulkarnaini; Purnomo, Hendri; Firdhayanti, Ayu
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 17 No 2 (2025): Jurnal Penelitian Ilmu dan Teknologi Komputer (JUPITER)
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analisis sentimen merupakan cabang dari pemrosesan bahasa alami (Natural Language Processing) yang berfungsi untuk mengevaluasi opini atau emosi pengguna terhadap suatu objek berdasarkan teks. Penelitian ini bertujuan untuk mengklasifikasikan sentimen ulasan pengguna terhadap aplikasi MyPertamina ke dalam tiga kategori, yaitu positif, netral, dan negatif. Data diperoleh dari ulasan pengguna aplikasi yang kemudian diolah melalui tahapan praproses teks dan vektorisasi menggunakan metode Term Frequency-Inverse Document Frequency (TF-IDF). Model klasifikasi yang digunakan dalam penelitian ini adalah Multinomial Naive Bayes karena kemampuannya dalam mengelola data teks yang bersifat multinomial. Hasil evaluasi menunjukkan bahwa algoritma Naive Bayes memberikan performa yang cukup baik dengan tingkat akurasi sebesar 84%. Selain itu, visualisasi WordCloud digunakan untuk menampilkan kata-kata yang paling sering muncul dalam tiap kategori sentimen, yang memberikan gambaran lebih mendalam mengenai persepsi pengguna. Penelitian ini menunjukkan bahwa analisis sentimen dapat menjadi alat bantu yang efektif dalam mengukur kepuasan pengguna serta dalam merumuskan strategi peningkatan kualitas layanan digital berbasis data.
Implementasi Pemasaran Digitalisasi Jasa Fotografi Berbasis Web Linda, Deppi; Nurlistiani, Rini; Nursiyanto, Nursiyanto; Zulkarnaini, Zulkarnaini; Purnomo, Hendri
Jurnal Informatika Vol 24 No 2 (2024): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v24i2.746

Abstract

As the digital era develops, the need for photography services is increasing. To meet their needs, many individuals and organizations seek photography services for various purposes, such as personal photo shoots, weddings, and other photography packages. When booking a photography studio, we often encounter obstacles such as the difficulty of finding a suitable studio, determining the price and package, and the slow booking process. By digitalization web-based photography service booking market, we have found a solution that allows customers to easily search for photography studios, view portfolios, and compare prices and packages offered. This allows the photography studio to expand its market reach, faster reservations, and improve the quality of its services. They used PHP programming language and Extreme Programming (XP) method to create a web-based information system to design a photo booking marketplace. The system aims to simplify the process of online photo booking in the region
Pengembangan Media Pembelajaran Berbasis Augmented Reality Habibti, Hedis Wahda; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.2

Abstract

Proses pembelajaran yang baik haruslah memuat aspek interaktif, menyenangkan, menantang, memotivasi dan memberikan ruang yang lebih bagi siswa untuk dapat mengembangkan kreativitas dan kemandirian, sesuai dengan bakat dan minat siswa. Media pembelajaran yang menarik juga sangat diperlukan bagi siswa SMK, dikarenakan dalam pembelajaran SMK lebih mengutamakan praktikum dari pada teori. Perlu dipertimbangkan dalam pemilihan media yaitu tujuan pembelajaran, efektif, mudah diperoleh, peserta didik, penggunaan, tidak kaku, biaya, dan kualitas. Salah satu perkembangan media pembelajaran yang saat ini masih baru adalah media pembelajaran dengan menggunakan Augmented Reality. Augmented Reality merupakan aplikasi penggabungan dunia nyata dengan dunia maya dalam bentuk dua dimensi maupun tiga dimensi yang diproyeksikan dalam sebuah lingkungan nyata dalam waktu yang bersamaan. Augmented Reality dapat digunakan dalam hiburan, kedokteran, mekanik, dan media pembelajaran. Augmented Reality dapat dibangun dengan menggunakan bantuan software Vuforia dan Unity 3D. Hasil akhir berupa media pembelajaran interaktif dengan Augmented Reality
Arsitektur Dan Organisasi Komputer Hariati, Veni Virda; Purnomo, Hendri; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.5

Abstract

Artikel ini membahas tentang konsep dasar arsitektur dan organisasi komputer, jenis-jenis arsitektur komputer yang umum digunakan, serta pentingnya pengetahuan tentang arsitektur dan organisasi komputer dalam pengembangan sistem komputer. Konsep dasar meliputi struktur fisik sistem komputer dan cara sumber daya sistem digunakan untuk menyelesaikan tugas tertentu. Jenis-jenis arsitektur komputer yang dibahas meliputi arsitektur Von Neumann, arsitektur Harvard, arsitektur RISC, dan arsitektur CISC. Arsitektur RISC dan CISC adalah dua pendekatan yang berbeda dalam merancang instruksi dan set instruksi dalam arsitektur komputer. Arsitektur RISC juga cenderung menggunakan register-register yang lebih banyak, sehingga mengurangi ketergantungan pada akses ke memori utama.Di sisi lain, arsitektur CISC menggunakan set instruksi yang lebih kompleks dan beragam. Instruksi-instruksi dalam arsitektur CISC dapat melakukan tugas yang lebih kompleks dalam satu instruksi, seperti operasi aritmatika yang kompleks atau akses langsung ke memori. Set instruksi CISC biasanya lebih besar dan beragam, termasuk instruksi-instruksi yang jarang digunakan. Meskipun instruksi-instruksi dalam arsitektur CISC dapat lebih kompleks, eksekusi instruksi biasanya membutuhkan lebih banyak siklus dan waktu.Kelebihan arsitektur RISC termasuk eksekusi instruksi yang lebih cepat dan efisien, konsistensi dalam ukuran dan format instruksi, serta ketergantungan yang lebih rendah pada memori utama. Arsitektur RISC juga cenderung lebih mudah diimplementasikan dalam perangkat keras dan memungkinkan pipelining yang efisien. Namun, kelemahan arsitektur RISC adalah jumlah instruksi yang terbatas, yang mungkin memerlukan lebih banyak instruksi untuk melakukan tugas yang kompleks.Sementara itu, kelebihan arsitektur CISC termasuk kemampuan untuk melakukan tugas yang kompleks dalam satu instruksi, dukungan untuk instruksi-instruksi yang jarang digunakan, dan ukuran kode yang lebih kecil. Arsitektur CISC juga dapat mengurangi jumlah instruksi yang diperlukan untuk melakukan tugas yang kompleks. Namun, kelemahan arsitekturCISC adalah kompleksitas eksekusi instruksi yang dapat mempengaruhi kinerja, serta ketergantungan yang lebih besar pada memori utama.Dalam praktiknya, kedua arsitektur ini memiliki aplikasi yang berbeda dalam sistem komputer modern. Arsitektur RISC cenderung digunakan dalam perangkat berperforma tinggi yang membutuhkan eksekusi instruksi yang cepat, seperti dalam superkomputer, server, atau mikrokontroler. 
Pemanfaatan Digital Marketing Bagi Universitas Islam Al-Azhar (Unizar) Jatmiko, Danang Priyo; Purnomo, Hendri; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.6

Abstract

Digitalization an important role as a marketing media and transmission of academic/non-academic information. Therefore, analysis related to optimizing the use of digital marketing for Unizar. The hope, using digital marketing to expand the range of Unizar promotions to remote areas. Al-Azhar Islamic University (UNIZAR) is one of the oldest and well-known campus on Lombok Island, starting to develop digital systems in various aspects that support campus activities. UNIZAR realizes that digital marketing can reach all people wherever they are without any geographical or time boundaries. The digital system that UNIZAR has begun to use includes in the academic field using the Academic System called SIAKAD UNIZAR, as well as in utilizing social media as a means of massive promotion and publication. Even though Unizar has used digitization, its utilization is considered not optimal. This is of particular concern, because digitization plays an important role as a marketing medium or delivery of academic and non-academic information. Therefore, it is necessary to carry out an analysis related to optimizing the use of digital marketing for Unizar.. Digital marketing to promote Unizar using social media such as Facebook, Instagram and YouTube. The use of Instagram, and Youtube are social media with the most users, so it's more efficient to promote Unizar. And now time to change to use digital marketing in order to increase the number of prospective new students Unizar
Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.9

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Implementation of Virtual Routers for Network Simulation Purposes in Simulated Internet Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.10

Abstract

This research aims to implement a virtual router as a network simulation solution in an artificial internet environment. Artificial internets have become important in developing and testing applications and network protocols without the need for expensive physical infrastructure. In this study, researchers used virtual router software to create a network environment that can be customized according to user needs. Researchers evaluated the performance of virtual routers in simulating various network scenarios, including reliability, scalability, and security testing. The methods used include installing and configuring virtual routers, as well as using network simulation tools to build complex topologies. Researchers also carried out performance measurements to evaluate the latency, throughput and stability of the virtual router. The research results show that the virtual router is able to simulate the network environment well, providing complete flexibility and control to the user. Although there are some limitations, such as high resource consumption in some configurations, the advantages in terms of efficiency and ease of use make virtual routers an attractive option for network simulation on artificial internet. This research is expected to contribute to the development of more effective and efficient network simulation environments, as well as assist researchers and developers in testing and developing network technology without having to rely on expensive physical infrastructure
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri; Pratama, Yusuf Hendra
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.31

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4
Building a Road Intersection Information System Based on Adobe Flash CS6 for Early Childhood Education izmu, adam; Ari, Setiawan; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i1.34

Abstract

In the current era of advanced and developing technology, the road crossing system is the most important part of city infrastructure whose aim is to ensure the safety of other road users. In recent years, technological developments have provided opportunities to increase efficiency so that road crossing system safety can be achieved. One of the technologies that can be utilized is Adobe Flash CS6 which is used by researchers to create interactive and attractive user interfaces. This research aims to develop a road crossing system based on Adobe Flash CS6. The research steps used the MDLC (Multimedia Development Life Cycle) method, including analyzing user needs, designing an intuitive user interface, implementing interactive features using Adobe Flash CS6, as well as testing and evaluating system performance. The main goal of this research is to create a more interactive and intuitive road crossing system using Adobe Flash CS6 technology. This information system is expected to increase road use awareness of traffic rules, thereby reducing the risk of accidents. By implementing a road crossing system based on Adobe Flash CS6, several good results can be achieved. Increased user awareness of traffic safety through an interactive user interface. Increased efficiency of the road crossing system through features designed to optimize pedestrian traffic flow. Reducing the risk of accidents at road crossings through the use of more sophisticated and intuitive technology. It is hoped that the results of this research can make a positive contribution to the safety and efficiency of road crossing systems in urban areas. This information system can be updated according to the wishes and needs of the responsible local government.
The Digital Era and Teens: Analyzing the Influence of Multimedia on Social Media Maulidina, Alisia; Maulani , Widya; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 2 (2024): Optimizing Multimedia for Education, Design, and Tourism in the Digital Era
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i2.21

Abstract

In this era of globalization technology is more advanced, it can’t be denied the presence of the internet more needed in everyday life, both in socialization, education, business, etc. We can’t be denied that social media have a big influence in our life. Someone who initially small can be great with social media, or otherwise. For the community particularly among teenagers, social media have to make opium user gone days without opening a social media. While in a fact, teenagers in school trying to find his identity with his feers hang out together with friends .This research aims to understand the influence of social media explained about what course the influence of social media for teenagers in century it has since then to know what course the influence on teen behavior caused by the current social media During the research, researchers used a method of the qualitative study because want to learn about a fact; symptoms and events the influence of social media against teen behavior in the field just as there are in the context of space and time as well as environmental situation teenagers naturally. Researchers wanting the results of research in the form of the data that is even more complex on the phenomena that is difficult expressed by a method of quantitative and do not need processing data is statistics. The result of the qualitative study required researchers is in the form of deep information about the influence of social media for teenagers itself.