Claim Missing Document
Check
Articles

Found 3 Documents
Search

Mapping log data activity using heuristic miner algorithm in manufacture and logistics company Syafrial Fachri Pane; Rolly Maulana Awan; M. Amran Hakim Siregar; Dinda Majesty
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18153

Abstract

Strategies for the procurement of goods and services are essential for companies in Indonesia's manufacturing and logistics sectors. The solution to reducing the existing problem is to make a mapping plan, such as verifying documents from each department, so that it takes a long time, resulting in many issues, such as procedural misuse findings. Heuristics miner algorithms get data to form logs that consist of goods and services procurement activities. Processing log data into XML data (data extraction), which produces a dependency model and business and casual matrix (discovery process), then determines the value of fitness and precision (suitability) called the conformity checking phase process. This phase aims to produce a new business (process enhancement phase), which will create a solution to the risk of delay and procedural abuse. The results of each of these processes rank each stage of the procurement of goods and services sequentially and together to provide time-efficient and accurate decisions, resulting in project implementation comparable to the company's business strategy. Implement the heuristics miner algorithm using the Python programming language.
Optimizing Search Efficiency in Ordered Data: A Hybrid Approach Using Jump Binary Search Gabriella Youzanna Rorong; Syafrial Fachri Pane; M Amran Hakim Siregar
Indonesian Journal of Data Science, IoT, Machine Learning and Informatics Vol 5 No 1 (2025): February
Publisher : Research Group of Data Engineering, Faculty of Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/dinda.v5i1.1764

Abstract

This research presents the development of a hybrid algorithm called Jump Binary Search (JBS), which integrates jump search and binary search techniques to improve search efficiency in sorted data distributions. JBS is designed to accelerate the search process using a jump technique to find the target block, after the block is identified, it is followed by a binary search to narrow down the search space. The results of this study show that the performance of JBS is superior compared to Jump Linear Search (JLS) when applied to non-uniform and ordered categorical data distributions. JBS only requires an execution time ranging from 0-15ms and 0-10ms, demonstrating efficiency and speed on elements consisting of 400 elements. The execution time of JBS demonstrates its efficiency compared to JLS. By minimizing unnecessary data access, JBS becomes the right solution for finding target elements in sorted data distribution.
Security Analysis of Two-Factor Authentication Applications: Vulnerabilities in Data Storage and Management Pane, Syafrial Fachri; Haq, Dzikri Izzatul; Siregar, M. Amran Hakim
Mobile and Forensics Vol. 7 No. 2 (2025)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v7i2.13312

Abstract

In the digital era, two-factor authentication (2FA) is used as an additional security measure to protect user access to digital services. However, the storage methods of authentication data in 2FA applications have potential security vulnerabilities that can be exploited. This study analyzes five popular 2FA applications, namely Google Authenticator, 2FAS, Aegis Authenticator, Okta Verify, and TOTP Authenticator, focusing on how secret keys are stored and the potential exploitation risks. The experiment was conducted in a virtual Android environment using rooted BlueStacks 5. Data acquisition was performed using Media Manager and X-Plore File Manager, followed by data analysis with SQLite Browser and bypass with PyOTP. The results indicate that some applications store secret keys in plaintext or weak encryption, making authentication bypass possible by manually generating OTP codes. This study concludes that strengthening data storage security in 2FA applications is crucial to prevent unauthorized exploitation by malicious actors.