Claim Missing Document
Check
Articles

Found 3 Documents
Search

Griya Kecantikan di Kota Semarang Azkiya, Azkal
Jurnal Poster Pirata Syandana PERIODE 160
Publisher : Architecture Department, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Padatnya aktivitas dan gaya hidup serba cepat di kota metropolitan sering kali membuat masyarakat merasa jenuh dan kesulitan untuk menyeimbangkan waktu antara pekerjaan, istirahat, dan kebutuhan perawatan diri. Fasilitas perawatan kecantikan, seperti klinik kecantikan, salon, spa, dan toko retail kosmetik telah banyak tersebar di Kota Semarang, tetapi mayoritas layanan kecantikan yang ada hanya menyediakan satu jenis pelayanan. Oleh karena itu, perencanaan dan perancangan Griya Kecantikan di Kota Semarang menjadi solusi untuk menyediakan berbagai layanan kecantikan, termasuk klinik kecantikan, salon kecantikan, spa, dan toko retail kosmetik, serta fasilitas pendukung seperti restoran dan kafe dalam satu bangunan sehingga mempermudah masyarakat untuk memenuhi kebutuhan perawatan diri. Griya Kecantikan ini akan menerapkan aspek-aspek desain Arsitektur Biofilik yang dapat memenuhi kebutuhan manusia akan lingkungan alami. Hal ini dikarenakan alam mampu merangsang panca indra manusia sehingga dapat memantu proses relaksasi.
Performance evaluation of clustering algorithms for protein sequence data Ardaneswari, Gianinna; Aminah, Siti; Awang, Mohd Khalid; Laksmitara, Anindya; Azkiya, Azkal; Razi, Fakhrur; Joshua Situmeang, Jason Nimrod
Desimal: Jurnal Matematika Vol. 8 No. 3 (2025): Desimal: Jurnal Matematika
Publisher : Universitas Islam Negeri Raden Intan Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/djm.v8i3.202528462

Abstract

Protein sequence data analysis is a fundamental task in bioinformatics, supporting the exploration of biological variations and the identification of functional relationships among proteins. This study presents a performance analysis of four clustering algorithms, which include Balanced Iterative Reducing and Clustering using Hierarchies (BIRCH), Density-Based Spatial Clustering of Applications with Noise (DBSCAN), Agglomerative Hierarchical Clustering, and Spectral Clustering, applied to protein sequence datasets. Feature extraction was conducted using the Discere package in Python, generating 27 numerical attributes from protein sequences. The optimal number of clusters for BIRCH, Agglomerative, and Spectral Clustering was determined using the Elbow method, while DBSCAN parameters (MinPts, Eps) were tuned using the sorted k-distance plot. Clustering performance was assessed using the Silhouette Score. Among the algorithms, DBSCAN produced the highest silhouette score of 0.8105, whereas BIRCH achieved a strong balance between clustering quality, with a score of 0.7405, and computational efficiency. Agglomerative clustering provided moderate results with a score of 0.6779, while Spectral clustering yielded the lowest score of 0.6310 but demonstrated flexibility in capturing complex structures. These findings provide a benchmark comparison of clustering methods for protein sequence data, offering practical insights into algorithm selection based on data characteristics and performance trade-offs.
Analisis Sistem Autentikasi Dua Faktor (2FA) Dan Efektivitasnya Dalam Meningkatkan Keamanan Akses Azkiya, Azkal; Ichsan, Muhammad Budi Prayoga; Hasibuan, Nabil Azhari Putra Finula; Andrianti, Reva; Maulana, Intan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.175

Abstract

The rapid development of information technology has led to an increase in security threats to digital systems, particularly in user authentication mechanisms. Single-factor authentication based solely on passwords is no longer sufficient to protect system access from attacks such as phishing, brute force, and credential stuffing. Therefore, two-factor authentication (2fa) has emerged as a solution by adding an additional layer of security. This study aims to analyze the concept of 2fa and evaluate its effectiveness in improving system access security. The research method used is a literature study of various studies and implementations of 2fa in modern information systems. The results indicate that the implementation of 2fa significantly reduces the risk of unauthorized access and increases user trust in system security, despite challenges related to usability and technical implementation.