Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analisis Sentimen Masyarakat terhadap Penggunaan Teknologi AI dengan Metode Machine Learning Nur Aisyah Pandia; Putri Ramadani; Saprina Putri Utama Ritonga; Fatwa Aulia; Mhd.Furqan
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 5 No. 2 (2025): Juli : Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v5i2.1198

Abstract

This study discusses public perceptions of the increasingly widespread use of machine-based technology in everyday life. One approach to understanding this perception is through sentiment analysis conducted on public opinion on social media. Using machine learning methods, this study classifies public sentiment into three categories: positive, negative, and neutral. Data was collected through the Twitter social media stage and processed using the CRISP-DM approach. Three algorithms were used in the classification, namely Bolster Vector Machine (SVM), Credulous Bayes, and Choice Tree. The evaluation results showed that SVM provided the highest accuracy in classifying sentiment data. The majority of public opinion was neutral, but there were concerns regarding social and ethical impacts. This study contributes to a general understanding of public perceptions of machine-based technology that are increasingly dominating various sectors.
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA Salsabila Putri Hati Siregar; Nur Aisyah Pandia; Putri Ramadani; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.929

Abstract

Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation. The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality. The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key. This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers. The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.
Klasifikasi Berita Hoaks Menggunakan Algoritma Support Vector Machine Putri Ramadani; Nur Aisyah Pandia; Salsabila Putri Hati Siregar
Prosiding Seminar Nasional Ilmu Teknik Vol. 2 No. 2 (2025): Desember: Prosiding Seminar Nasional Ilmu Teknik
Publisher : Asosiasi Riset Ilmu Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/prosemnasproit.v2i2.201

Abstract

The spread of hoax news in digital media is a serious problem because it can affect public opinion and social stability. This study aims to classify hoax news using the Support Vector Machine (SVM) algorithm. The dataset used is a hoax clarification dataset from the Ministry of Communication and Digital (Komdigi) of the Republic of Indonesia, totaling 1,872 data. The research process includes data collection, text pre-processing, feature extraction using TF-IDF, and classification using the SVM algorithm. Implementation was carried out using Google Colaboratory (Google Colab). Test results show that the SVM algorithm is able to provide good performance in classifying hoax news based on its topic with satisfactory accuracy, precision, recall, and F1-score values.