Nur Aisyah Pandia
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis Sentimen Masyarakat terhadap Penggunaan Teknologi AI dengan Metode Machine Learning Nur Aisyah Pandia; Putri Ramadani; Saprina Putri Utama Ritonga; Fatwa Aulia; Mhd.Furqan
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 5 No. 2 (2025): Juli : Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v5i2.1198

Abstract

This study discusses public perceptions of the increasingly widespread use of machine-based technology in everyday life. One approach to understanding this perception is through sentiment analysis conducted on public opinion on social media. Using machine learning methods, this study classifies public sentiment into three categories: positive, negative, and neutral. Data was collected through the Twitter social media stage and processed using the CRISP-DM approach. Three algorithms were used in the classification, namely Bolster Vector Machine (SVM), Credulous Bayes, and Choice Tree. The evaluation results showed that SVM provided the highest accuracy in classifying sentiment data. The majority of public opinion was neutral, but there were concerns regarding social and ethical impacts. This study contributes to a general understanding of public perceptions of machine-based technology that are increasingly dominating various sectors.
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA Salsabila Putri Hati Siregar; Nur Aisyah Pandia; Putri Ramadani; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.929

Abstract

Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation. The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality. The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key. This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers. The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.