Subowo, Moh Hadi
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Implementation of LSA for Topic Modeling on Tweets with the Keyword ‘Kemenkeu’ Khariroh, Shofiyatul; Alzami, Farrikh; Indrayani, Heni; Dewi, Ika Novita; Marjuni, Aris; Adriani, Mira Riezky; Subowo, Moh Hadi
Sinkron : jurnal dan penelitian teknik informatika Vol. 9 No. 1 (2025): Research Article, January 2025
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.14309

Abstract

This research explores public discourse on financial policies by analyzing tweets mentioning the keyword 'Kemenkeu' (Ministry of Finance). Using Latent Semantic Analysis (LSA), the study examined 10,099 tweets to uncover key topics that reflect public sentiment toward the Ministry’s policies. Preprocessing steps, such as stopword removal and stemming with Sastrawi, were essential to ensure the effectiveness of the analysis. The results revealed three main topics: Finance and Budget, Salaries and Employee Welfare, and Excise and Customs Regulations. These insights provide a better understanding of public opinion on financial issues and highlight the importance of proper text preprocessing in topic modeling. This approach demonstrates how LSA can be used as a tool for analyzing large-scale social media data, offering valuable input for policymakers. Future research could expand on this by using more advanced models or larger datasets to gain deeper insights.
Comparative Analysis of Penetration Testing Frameworks: OWASP, PTES, and NIST SP 800-115 for Detecting Web Application Vulnerabilities Imtias, Muhamad Bunan; Umam, Khothibul; Mustofa, Hery; Subowo, Moh Hadi
Journal of Applied Informatics and Computing Vol. 9 No. 6 (2025): December 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i6.9846

Abstract

Web application security faces increasingly complex challenges as digital architectures evolve, necessitating the selection of appropriate and effective penetration testing methods. This study presents a comparative analysis of the OWASP Testing Guide, PTES, and NIST SP 800-115 frameworks in detecting web application vulnerabilities. Through experiments on DVWA and OWASP Juice Shop, the frameworks were evaluated based on detection speed, vulnerability count, and severity. The results highlight a clear trade-off: OWASP proved the most efficient (85 minutes average, 59 total vulnerabilities), making it ideal for rapid assessments. PTES demonstrated the most comprehensive technical depth (63 vulnerabilities, highest severity) but required the most time, while NIST SP 800-115 (49 vulnerabilities) excelled in compliance and risk management integration. The study recommends selecting OWASP for efficiency, PTES for deep technical audits, and NIST for regulatory alignment.
Implementasi Arsitektur MobileNetV2 Berbasis Citra untuk Deteksi Penyakit Dropsy dan Popeye pada Ikan Cupang Musyaffa, Fadhilah Rafi; Mahfudh, Adzhal Arwani; Subowo, Moh Hadi
Building of Informatics, Technology and Science (BITS) Vol 7 No 4 (2026): March 2026
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v7i4.9379

Abstract

The identification of diseases in betta fish based on visual symptoms remains a challenge, particularly for beginners who lack experience in recognizing disease characteristics. This study aims to implement an image-based MobileNetV2 architecture as a diagnostic support system to detect dropsy and popeye diseases in betta fish that have already exhibited visual symptoms. The dataset used in this study consists of 600 betta fish images divided into three classes: healthy, dropsy, and popeye, with 200 images in each class, collected from the internet. Data preprocessing was conducted through image ratio adjustment, normalization, and data augmentation to increase data variability. A transfer learning approach was applied by freezing most layers of the MobileNetV2 feature extractor and fine-tuning several of the final layers. Model evaluation was performed using 5-Fold Cross Validation to ensure experimental stability and reproducibility. The best model from each fold was then combined using an ensemble method based on average probability to improve prediction performance on the test dataset. Experimental results show that the average 5-Fold Cross Validation accuracy reached 74.71% with a standard deviation of ±4.57%, while the Macro-F1 score achieved ±74.43%. The ensemble approach produced a test accuracy of 85.56% with balanced classification performance across all classes. Grad-CAM visualizations indicate that the model is able to focus on image regions relevant to disease symptoms. These findings demonstrate that the MobileNetV2 architecture is effective as an image-based diagnostic support tool for betta fish diseases.