Claim Missing Document
Check
Articles

Found 3 Documents
Search

Detecting Fake Reviews Using BERT and Sublinear_TF Methods on Hotel Reviews in the Lombok Tourism Area Hadi, Zulpan; Zulpahmi, M.; ., Zaenudin; Asrory, Akmaludin
Journal of Applied Informatics and Computing Vol. 8 No. 2 (2024): December 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i2.8721

Abstract

The number of visitors to Lombok, one of the famous tourist destinations in Indonesia, increased from 400,595 in 2020 to 1,376,295 in 2022. Although the government supports the hotel industry, fake reviews are a significant problem that can damage hotel reputations and mislead tourists. This study uses BERT and Sublinear_TF feature extraction techniques to analyze fake reviews from three main areas: Gili Trawangan, Senggigi, and Kuta. BERT detects fake reviews by understanding the context of words, while Sublinear_TF emphasizes more informative words by reducing the weight of irrelevant common words. The results showed that the more extensive and diverse dataset from Gili Trawangan had the best classification results. The combination of BERT and Random Forest achieved the highest accuracy of 0.84. Overall, BERT excels in Gili Trawangan with an accuracy of 0.79 for SVM and 0.84 for Random Forest. In contrast, smaller and more homogeneous datasets such as Senggigi and Kuta have lower accuracy. In addition, Sublinear_TF performed well on Gili Trawangan with an accuracy of 0.82 using SVM and 0.83 using Random Forest; however, its performance declined in Senggigi and Kuta. BERT and Sublinear_TF techniques are more effective on large and diverse datasets such as Gili Trawangan. Sublinear_TF is better for varied data but less effective on more homogeneous datasets, while BERT with Random Forest showed the highest accuracy due to its ability to capture broader language context. This suggests that the size and variety of the dataset highly influence the success of fake review classification techniques.
SemetonBug: A Machine Learning Model for Automatic Bug Detection in Python Code Based on Syntactic Analysis Imran, Bahtiar; Riadi, Selamet; Suryadi, Emi; Zulpahmi, M.; Zaeniah, Zaeniah; Wahyudi, Erfan
Jurnal Informatika Vol 12, No 2 (2025): October
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/inf.v12i2.25340

Abstract

Bug detection in Python programming is a crucial aspect of software development. This study develops an automated bug detection system using feature extraction based on Abstract Syntax Tree (AST) and a Random Forest Classifier model. The dataset consists of 100 manually classified bugged files and 100 non-bugged files. The model is trained using structural code features such as the number of functions, classes, variables, conditions, and exception handling. Evaluation results indicate an accuracy of 86.67%, with balanced precision and recall across both classes. Confusion matrix analysis identifies the presence of false positives and false negatives, albeit in relatively low numbers. The accuracy curve suggests a potential overfitting issue, as training accuracy is higher than testing accuracy. This study demonstrates that the combination of AST-based feature extraction and Random Forest can be an effective approach for automated bug detection, with potential improvements through model optimization and a larger dataset.
ANALISIS KEAMANAN JARINGAN WIRELESS PADA SMK ISLAM MANBA’UL ULUM MENGGUNAKAN PENDEKATAN PENETRATION TESTING Sari, Ika Mayang; Samsumar, Lalu Delsi; Zulpahmi, M.
Jurnal Rekayasa Sistem Informasi dan Teknologi Vol. 3 No. 2 (2025): November
Publisher : Yayasan Nuraini Ibrahim Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70248/jrsit.v3i2.3068

Abstract

Perkembangan teknologi informasi mendorong pemanfaatan jaringan nirkabel dalam kegiatan pendidikan. Penelitian ini bertujuan menganalisis keamanan jaringan wireless di SMK Islam Manba’ul Ulum yang menggunakan protokol WPA2. Metode yang digunakan adalah penetration testing berbasis Kali Linux melalui simulasi serangan Handshake Capture dan WPA2 Cracking untuk menguji autentikasi, Deauthentication Attack untuk menguji kestabilan koneksi, serta Man-in-the-Middle (MiTM) Attack untuk menguji kerahasiaan data, dengan bantuan tools Aircrack-ng, Aireplay-ng, Airodump-ng, Bettercap, dan Wireshark. Hasil penelitian menunjukkan seluruh simulasi serangan berhasil dilakukan, meliputi peretasan kata sandi Wi-Fi, pemutusan koneksi pengguna, dan penyadapan data komunikasi, sehingga membuktikan jaringan masih rentan terhadap ancaman keamanan.