Hilda Yulia Novita
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Perbandingan Algoritma Logistic Regression dan K-Nearest Neighbor Dalam Klasifikasi Kematangan Buah Pepaya Wildan Amin Wiharja; Tohirin Al Mudzakir; Hilda Yulia Novita; Jamaludin Indra
Bulletin of Computer Science Research Vol. 5 No. 4 (2025): June 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v5i4.550

Abstract

Visual assessment of papaya ripeness often leads to inconsistent and low accuracy results. To address this, the study applies Logistic Regression and K-Nearest Neighbor (K-NN) algorithms for automatic classification using digital image processing. The initial dataset consisted of 300 images, which were expanded to 1,200 through preprocessing and augmentation. Features were extracted using the Gray Level Co-occurrence Matrix (GLCM) method, and the data was split into 80% for training and 20% for testing. The study aims to compare the performance of both algorithms and understand their classification mechanisms. Results show that K-NN with k=1 achieved an accuracy of 87%, while Logistic Regression with L2 regularization reached 73%, indicating that K-NN outperforms Logistic Regression in classifying papaya ripeness levels.
ANALYSIS AND IMPLEMENTATION OF AES-128 ALGORITHM IN SUKAHARJA KARAWANG VILLAGE SERVICE SYSTEM Fariz Duta Nugraha; Kiki Ahmad Baihaqi; Hilda Yulia Novita; Siregar, Amril Mutoi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.3.2038

Abstract

Data security in databases is needed in the industrial era 4.0 to prevent attacks and unwanted things from happening, one of the biggest cases that has been widely reported is data leakage, in this study aims to implement and analyze the Advanced Encryption Standard Algorithm, one of the data security algorithms with a block chiper type that has 4 transformations (SubByte, ShiftColumn, MixColumn, AddRoundKey), or what we usually call the Cryptography method. Cryptography is a method that is often used to secure important data in databases, in this article the Advanced Encryption Standard Algorithm is used to secure citizen data and family card data in the Sukaharja Karawang Village service system. The method in this research is the observation method, the data is obtained from each head of the neighborhood in Sukaharja Karawang Village with the permission of the head of Sukaharja Karawang Village. Citizen data and family cards were encrypted and analyzed for resource requirements in storing encryption results and time in returning and displaying original data. The results of the analysis obtained the amount of resources required 1.5MB to store family card data, which before encryption required 352KB. Citizen data requires a resource of 6.5MB, before encryption it takes 1.5MB. As for the AES resilience test stage using the Bruteforce attack method with the help of Hashcat software version 6.2.5 with 4 trial processes, One encrypted address data was taken for this test, but out of 4 attempts none of them showed that the data could be cracked.