cover
Contact Name
Muhammad Khoiruddin Harahap
Contact Email
choir.harahap@yahoo.com
Phone
+6282251583783
Journal Mail Official
publikasi@itscience.org
Editorial Address
Medan
Location
Unknown,
Unknown
INDONESIA
Brilliance: Research of Artificial Intelligence
ISSN : -     EISSN : 28079035     DOI : https://doi.org/10.47709
Core Subject : Science, Education,
Brilliance: Research of Artificial Intelligence is The Scientific Journal. Brilliance is published twice in one year, namely in February, May and November. Brilliance aims to promote research in the field of Informatics Engineering which focuses on publishing quality papers about the latest information about Artificial Intelligence. Submitted papers will be reviewed by the Journal and Association technical committee. All articles submitted must be original reports, previously published research results, experimental or theoretical, and colleagues will review. Articles sent to the Brilliance may not be published elsewhere. The manuscript must follow the author guidelines provided by Brilliance and must be reviewed and edited. Brilliance is published by Information Technology and Science (ITScience), a Research Institute in Medan, North Sumatra, Indonesia.
Articles 544 Documents
Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method sudjayanti, shafa alya; Hamdani, Dani
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3800

Abstract

Cybercrime targeting Android devices through phishing methods, especially through the WhatsApp messaging app, has emerged as a critical issue in cybersecurity. It requires comprehensive investigation and analysis. This research attempts to address this critical issue by conducting a comprehensive digital forensic investigation using the National Institute of Standards and Technology (NIST) framework methodology. Using advanced reverse engineering techniques and Vscode's APKTool extension tool, called APKLab, the research carefully examines the structure and mechanism of hidden encoded APK files that aim to steal sensitive information, such as SMS messages containing one-time passwords (OTPs), and send them via the Telegram app to attackers who can use them to access personal and banking data. As a result, this research provides a deeper understanding of the cybersecurity threats to Android devices and suggestions for mitigation measures for users and organizations. The recommendations are consistent with NIST principles. They emphasize the importance of user education, application source code reviews, system updates, and considering the use of additional security software. By filling an important gap in digital forensics, this research aims to provide insight into preventing and mitigating phishing scams via APK files on WhatsApp Android. It also highlights the importance of strong cybersecurity measures and encourages continued research efforts to effectively counter emerging cyber threats.
Fiber to the home (FTTH) activation system and analysis of dropcore cable connection losses on optical network performance Asril, Aprinal Adila; Maria, Popy; Yustini, Yustini; setiawan, Herry; Nasrul, Nasrul
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3815

Abstract

The FTTH network is currently a reliable network concept used in an era where very fast access to information is needed as it is today, but several problems arise in the FTTH network, for example, reduced data transmission speed due to losses in the transmission cable connection or drop core. In this study, activation of the FTTH network will be carried out so that it can function for internet data transmission and observations will also be made of the connection losses on the 10-meter dropcore cable with the number of connections respectively, namely no connection, 1 connection, and 2 connections, where each connection obtains connection losses from 0.00 to 0.02 dB which will affect the total attenuation obtained in the activated FTTH network. Standard attenuation for fiber optic network activation starting from OLT to ONT according to IEEE Std 802.3ah states that the permissible attenuation / loss tolerance is between 20-24 to 29 dB. Splicing losses are caused by errors in the process of joining the fiber optic cable cores. The number of connections in a fiber optic cable can affect the attenuation value in the fiber optic cable. The more connections, the higher the attenuation in the fiber optic cable.
Design of a Web-Based Lecturer Attendance Information System Using QR Codes at Muhammadiyah University of Jambi Ikhsan, Muhammad; Helmina, Helmina
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3838

Abstract

Information technology in the world today is developing very rapidly. This development has resulted in an information and communication system that has given birth to new innovations, one of which is online attendance using QR Code. Currently, lecturers' attendance control in teaching courses is still done manually, that is, lecturers sign absences according to the lecture schedule and courses given at the academy. Where there is a problem in this case, namely that they often forget to sign the lecturer's absence which has an impact on the lecturer's teaching honorarium. Because teaching honorarium is calculated based on the absence of control. Therefore, it is hoped that the implementation of web-based attendance using QR Code will make it easier for lecturers to take absences and help academics in recording lecturers' controlled absences which will be handed over to the finance department, thereby reducing the occurrence of errors in paying lecturers' teaching honorariums. The data collection method in this research is observation, interviews, documentation and questionnaires. System design uses DFD (Data Flow Diagram), as well as system design using HTML and PHP, while for databases using MySQL.
Design and build multiple input multiple output (MIMO) wideband element microstrip antennas for WiFi access-point applications Maria, Popy; Asril, Aprinal Adila; Nasrul, Nasrul; Nita, Sri; Yuhanef, Afrizal
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3839

Abstract

Technology in the telecommunications sector continues to develop. One of them is the Multiple Input Multiple Output (MIMO) antenna used in WIFI access oint application using MIMO technique in enhancement the need to transfer large amounts of data. In the design and manufacture of MIMO antennas for WIFI access applications point with dimensions of 110 mm x 112 mm using FR-4 substrate specifications with a thickness of 1.6 mm. The antenna consists of four ports and is at each corner The groundplane has four slots to achieve good isolation and produces good bandwidth. The antenna simulation produces a bandwidth of 1.0516 GHz with frequency 2.4 GHz, return loss -12.78 dB, isolation -16.08 dB, and VSWR 1.53 dB. Meanwhile, manufactured antennas produce a bandwidth of more than 100 MHz with frequency 2.4 GHz, return loss -13.5 dB, isolation -18.8 dB, and VSWR 1.29 dB. Antenna simulation using the CST Studio Suite 2019 software application. In the application of the antenna used for Wi-Fi as a transmitter By comparing distances, different results are obtained where the power value is Each distance is different because the farther the distance, the greater the power value produced or emitted will be smaller or less optimal  network.
Implementation of Kanban Method in Transactional System Design in the “Mr. Sneakers” Shoe Laundry Business Puspitarani, Yan; Violina, Sriyani; Rumaisa, Fitrah; Sulianta, Feri
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3859

Abstract

Laundry information system design using Kanban method is a strategic step to improve operational efficiency and responsiveness to customer needs in the laundry business. The study aims to design an information system that is integrated with the Kanban method to optimize the transaction process from receiving orders to returning to customers. The study outlines the process of designing a laundry information system using Kanban principles, including workflow mapping, suitable Kanban board design and integration with existing information systems. The results of this information system design show that the application of Kanban can provide a clear visualization of the workflow in the process, improve operational efficiency by speeding up the order cycle time, reducing waiting times, and minimizing errors in the transactions process. Good integration between the information system and the Kanban board allows managers to monitor order status in real time and respond quickly to changing customer requests. In conclusion, designing a laundry information system using the Kanban method can improve business performance, strengthen customer relationships, and create significant added value.
Analysis of Factors Affecting the Use of ChatGPT at Mikroskil University: A Study Based on the Extended UTAUT2 Model Sinaga, Joy Nasten; Panjaitan, Erwin Setiawan; Nurjanah, Sofinana
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3862

Abstract

This study aims to identify factors that influence students' intention and behavior in using ChatGPT at Mikroskil University. The method used in this study is the Unified Theory of Acceptance and Use of Technology (UTAUT2), with the addition of the curiosity variable. Other variables analyzed included Performance Expectations, Effort Expectations, Social Influence, Facilitating Conditions, Hedonic Motivation, Price Value, and Habit. To collect data, the research team conducted a survey of active students of the Faculty of Informatics at the university. Data analysis was conducted using Structural Equation Modeling (SEM), a method that allows researchers to understand complex relationships between variables. The results showed that several factors had a significant influence on the intention and behavior of using ChatGPT. Hedonic Motivation, Habit, and Curiosity were found to be the main factors driving the intention to use ChatGPT. Facilitating Conditions also contributed to the use of the technology. On the other hand, some variables did not show a significant impact on usage intention. Performance Expectancy, Effort Expectancy, Social Influence, and Price Value fall into this category. These findings suggest that the factors that drive technology use may vary, and highlight the importance of curiosity and personal motivation in the adoption of new technologies in higher education settings.
The Implementation of Gated Recurrent Unit (GRU) for Gold Price Prediction Using Yahoo Finance Data: A Case Study and Analysis Sudiatmika, I Putu Gede Abdi; Putra , I Made Agus Widiana; Artana, Wayan Widya
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3865

Abstract

Gold is a precious metal resistant to corrosion and oxidation, highly valued in investment and trade. Currently, the demand for gold is increasing as it is considered a safe haven. This is evidenced by 48% of respondents out of 2,333 respondents choosing gold as the most preferred investment, based on a survey conducted by Jakpat. However, gold actually has a fluctuating price. The fluctuating price of gold worldwide is influenced by many factors such as economic conditions, inflation rate, supply and demand of gold, and the US dollar exchange rate. Therefore, there is a need for a prediction that can estimate the price of gold based on the movement of gold prices in previous periods. In this study, an evaluation of the performance of GRU for predicting the price of gold will be conducted.. The research methodology includes data collection and processing of gold prices, application of the GRU model, and evaluation of model performance with evaluation metrics such as Mean Squared Error (MSE) and Mean Absolute Error (MAE). Gold price data is taken from Yahoo Finance from December 14, 2017, to March 14, 2024, and processed through normalization and data splitting into training and testing sets. The results of the study show that the GRU model is able to predict gold prices with an adequate level of accuracy. Based on the MSE and MAE values, the combination that provides the best performance is a batch size of 64 with 100 epochs, as it yields the lowest MSE and MAE.
Detection of Malware Threats in Internet of Things Using Deep Learning Nashrullah, Naufal; Wahyu, Ari Purno
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3869

Abstract

This paper examines the potential risks associated with the Internet of Things (IoT) as a new gateway for cyberattacks. The continuous access it provides to systems, applications, and services within organizations increases the likelihood of serious threats, such as software piracy and malware attacks, which can result in the theft of sensitive information and significant economic losses. To address these concerns, researchers have proposed the use of Deep Convolutional Neural Network (DCNN) to detect malware infections in IoT networks by analyzing color image visualization. The malware samples were obtained from the Android Malware dataset on Kaggle. The proposed deep learning method, namely the Deep Convolutional Neural Network, was employed to detect malware infections in IoT networks.
Analysis of 2G and 4G Network Quality in Solok City Septima, Uzma; Candra, Dikky; Vitria, Rikki; Alfarezi, Muhammad; Yolanda, Amelia
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3870

Abstract

Gunung Talang, Twin Lake, Gumanti Valley, Hiliran Gumanti and Pantai Cermin sub-districts in Solok Regency, which are dominated by hills and trees, are the cause of unstable signal quality, causing complaints from the public regarding this. So this study is to determine the network quality in Gunung Talang District, Twin Lakes, Gumanti Valley, Hiliran Gumanti, and Pantai Cermin on Telkomsel, XL and Indosat Operators. Checking is carried out using the drive test method  using TEMS Pocket on 2G and 4G networks. The quality of the 2G network from the measurement results was obtained for RxLevel all operators was bad and for RxQual was good except for Telkomsel operators.Meanwhile,on the 4G network, measurement results for RSRP and SINR for all operators are bad. Some areas that have problems are recommended for optimization, site passenger  and site addition. All of this happens because  of obstacles in the form of hills, cliffs, and tall trees at some point. From the results of the study, the quality of the Telkomsel operator's 4G network has an RSRP value of 46.16% and SINR of 61.06%. XL operators have an RSRP value of 42.7% and SINR which is 60.74%.Meanwhile, Indosat Ooredoo has an RSRP value of 43.2% and SINR of 74.6%. As for the 2G network, the quality of Telkomsel's 2G network operator has an RxLevel value of 47.8% and RxQual of 89.49%. XL operators have an RxLevel value of 58.34% and RxQual of 77.62%.Meanwhile,Indosat Ooredoo has an RxLevel value of 46.16% and RxQual is 80.56%.
Implementation of KNN and AHP-TOPSIS as Recommendation System for Mustahik Selection Aprianti, Winda; Permadi, Jaka; Rhomadhona, Herfia; Amelia, Noor
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3883

Abstract

The National Amil Zakat Agency (BAZNAS) has the task of managing zakat on a national scale, including zakat. The number of prospective zakat recipients is greater than the availability of zakat funds distributed, which has an impact on the need for a selection process for mustahik. In this research, to assist the mustahik selection process, KNN will be used to classify mustahik candidates who meet the requirements, AHP to obtain consistent weights, and TOPSIS to provide recommendations for the order of mustahik whose zakat will be distributed. The dataset used in the research consisted of 77 data consisting of the criteria for number of dependents, husband's job, wife's job, total income, total expenses, and acceptance status of mustahik candidates. The application of KNN produced 15 data that were declared worthy of being considered mustahik. In the next stage, using AHP, the weights for each criterion were obtained at 12.66%, 9.23%, 10.10%, 45.96% and 22.04%. These weights were used in the TOPSIS decision support system and the results obtained were that the 76th mustahik candidate was the first ranked candidate to be proposed as a mustahik. In this research, a system was also built using KNN and AHP-TOPSIS using the PHP programming language as a recommendation system tool.