cover
Contact Name
Rusliadi
Contact Email
garuda@apji.org
Phone
+6282135809779
Journal Mail Official
Febri@apji.org
Editorial Address
Jln. Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
Polygon: Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
ISSN : 30326249     EISSN : 30465419     DOI : 10.62383
Core Subject : Science,
Jurnal ini adalah jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam yang bersifat peer-review dan terbuka. Bidang kajian dalam jurnal ini termasuk sub rumpun Ilmu Komputer, dan Ilmu Pengertahuan Alam.
Articles 101 Documents
Klasifikasi Minat Jamaah terhadap Kajian Islami Roro Fatikhin; Nuari Anisa Sivi; Wafiq Abdulloh
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 2 No. 5 (2024): September : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v2i5.856

Abstract

This study aims to analyze congregants’ interest in Islamic study sessions at Al-Ikhlas Mosque using a descriptive qualitative approach. Islamic study sessions play an essential role in enhancing religious understanding, character development, and social cohesion within the Muslim community. However, attendance levels tend to fluctuate due to various influencing factors. Data were collected through observations, interviews, and documentation to explore the perceptions, motivations, and experiences of the congregants. The findings reveal that congregants’ interest is shaped by several key factors, including the study theme, the lecturer’s delivery method, the timing of the sessions, mosque facilities, spiritual needs, and social encouragement from the surrounding community. Based on field data, congregants’ interest can be categorized into three levels: high, moderate, and low. This research is expected to assist mosque administrators in optimizing the implementation of Islamic study sessions by adjusting themes, selecting appropriate lecturers, and improving facility convenience.
Tinjauan Etika Deontologi terhadap Penerapan Teknologi In Vitro Fertilization (IVF) Ira Rahmawati; Labibah Fatihatu Hanin; Tri Cahyanto
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.886

Abstract

Vitro Fertilization (IVF) technology is a biotechnological innovation that helps infertile couples conceive. However, the application of this technology has raised ethical debates regarding the nature of life, human dignity, and the moral boundaries of artificial reproduction. This article aims to examine the practice of IVF through an ethical deontology perspective, a moral approach that emphasizes obligations, principles, and respect for human beings as ends, not means. The research method used is a literature review with a descriptive-analytical approach to bioethics and moral philosophy literature. The results of the study indicate that based on deontological ethics, the application of IVF can be considered moral if it respects human dignity, does not treat embryos as mere objects, and is carried out with intentions that are in accordance with human moral obligations.
Penerapan Jaringan Saraf Buatan untuk Pengenalan Pola Tanda Tangan dalam Identifikasi Potensial Diri Menggunakan Metode Backpropagation Ferdi Frans Dirga; Lailan Sofinah Harahap; Fiqih Syahputra
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.892

Abstract

This study develops a computational-based system to identify individual potential through the analysis of signature patterns using Artificial Neural Networks (ANN) and the Backpropagation algorithm. The research aims to explore and examine the effectiveness of applying ANN in recognizing and identifying signature patterns that are assumed to be related to an individual’s potential. In the data processing stage, Principal Component Analysis (PCA) is employed as a dimensionality reduction and feature extraction technique to optimally obtain the main characteristics of signature images. The system performance evaluation is conducted using a total of 80 signature images, consisting of 60 training data and 20 testing data. This study analyzes two network architecture configurations, namely a model with one hidden layer and a model with two hidden layers. The experimental results show that both network configurations achieve the same accuracy level of 92.5%. These findings indicate that the use of Artificial Neural Networks with the Backpropagation algorithm is effective in producing high accuracy in the signature pattern recognition process. Furthermore, the developed system has broad potential applications in the field of personal identification, such as employee evaluation, selection systems, and other applications across various organizational and industrial sectors.
Rancang Bangun Sistem Informasi Penyedia Jasa Instalasi Listrik Berbasis Web dengan Metode OOAD : Studi Kasus pada CV Givas Jaya Sentosa Agung Tri Laksono Aji Saputra; Laila Khusnul Afifah; Dinda Ana Pratiwi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.909

Abstract

The development of information technology requires service companies to improve the effectiveness and quality of their services, including in the field of electrical installation services. CV Givas Jaya Sentosa still faces problems in managing orders, customer data, and technician scheduling, which are done manually, resulting in inefficiency. This study aims to design and build a web-based electrical installation service provider information system using the Object Oriented Analysis and Design (OOAD) method. The research method used is qualitative with a research and development (R&D) approach, through data collection techniques such as observation, interviews, and documentation. The system is designed using Unified Modeling Language (UML) modeling and implemented as a web application. The results of the study show that the system is able to simplify the service ordering process, improve service and technician data management, and help monitor work status in an integrated and real-time manner. Thus, this information system can improve operational efficiency and service quality at CV Givas Jaya Sentosa.
Implementasi Algoritma Caesar Cipher untuk Enkripsi dan Dekripsi Pesan Siti Fadiyah Nabila; Maisyarah Maisyarah; Zahara Vonna; Salsabila Arifa Hasibuan; Silfia Rahmadani Sitorus; Aninda Evioni; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.925

Abstract

Information security is an essential aspect of digital communication, particularly in the exchange of text-based messages through open networks. Messages transmitted without protection are vulnerable to interception and unauthorized modification. One classical cryptographic technique that remains relevant as a foundational learning tool is the Caesar Cipher algorithm. This study aims to implement the Caesar Cipher algorithm for message encryption and decryption and to analyze its effectiveness and security level. The research method employed is a descriptive approach through literature review and a case study by applying character-shift techniques to text messages. The results indicate that the Caesar Cipher algorithm successfully transforms plaintext into ciphertext and restores it back to its original form through the decryption process. Although the algorithm is simple and easy to implement, it has significant limitations in terms of security due to its small key space and vulnerability to brute-force attacks. Therefore, Caesar Cipher is not suitable for protecting sensitive data but remains valuable as an introductory model for understanding basic cryptographic concepts.
Perbandingan Waktu Pemecahan Password Menggunakan Algoritma Hash MD5, SHA-256, dan SHA-512 pada Serangan Brute Force Nur Bainatun Nisa; Noni Fauzia Rahmadani; Aulia Kartika Dewi; Luftia Rahma Nasution; Dzilhulaifa Siregara; Rifdah Syahputri; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.926

Abstract

Password security is a critical component in protecting information systems, as passwords are often the primary target of various attacks, particularly brute force attacks. A brute force attack works by systematically attempting all possible character combinations until the correct password corresponding to a stored hash value is found. Therefore, the choice of an appropriate hash algorithm plays a significant role in determining a system’s resistance to such attacks. This study aims to analyze and compare the password cracking time of MD5, SHA-256, and SHA-512 hash algorithms under brute force attack scenarios. The research methodology involves generating hash values from a set of test passwords using each hash algorithm, followed by conducting brute force attacks to recover the original passwords based on the generated hash values. The collected data are analyzed by measuring the time required to crack passwords for each algorithm. The results indicate that MD5 has the fastest cracking time compared to SHA-256 and SHA-512, indicating a lower level of resistance to brute force attacks. SHA-256 demonstrates better security than MD5 but remains less resistant when compared to SHA-512. The SHA-512 algorithm requires the longest cracking time, reflecting the highest level of resistance to brute force attacks among the tested algorithms. In conclusion, hash algorithms with larger bit lengths provide stronger protection against brute force attacks and are more suitable for secure password storage in information systems.
Analisis Kualitas Butir Soal Konsep Sistem Gerak Manusia Kelas VI Sekolah Dasar Berdasarkan Validitas, Reliabilitas, Tingkat Kesukaran dan Daya Beda Ika Isna Umiyati; Fina Fakhriyah; Sumaji Sumaji
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.927

Abstract

The quality of assessment instruments plays an important role in determining the accuracy of measuring student learning outcomes in science learning in elementary schools. A good test instrument must meet certain criteria, such as validity, reliability, difficulty level, and discrimination power. This study aims to analyze the quality of daily science test items in grade VIc elementary schools based on these four criteria. The study used a quantitative. The subjects were 19 sixth-grade students, while the instrument analyzed consisted of 25 multiple-choice questions. Data processing and analysis were carried out using Microsoft Excel to calculate item validity through item correlation with total score, test reliability using internal consistency, difficulty level index, and discrimination index. The analysis results showed that 17 questions (68%) were declared valid, while 8 questions (32%) were invalid and needed to be improved. The results of the reliability test indicated that the test instrument had good reliability and was suitable for use as a measuring tool for student learning outcomes. Judging from the level of difficulty, 20 questions (80%) were moderate and 5 questions (20%) were easy, indicating a relatively balanced level of difficulty. Based on the discrimination power, 16 questions (66%) had very good discrimination power, 4 questions (16%) were good, 4 questions (16%) were sufficient, and 1 question (4%) was poor. Based on these findings, it can be concluded that the quality of the sixth grade science daily test questions is classified as good and the test instrument is suitable for use, but improvements are still needed on invalid questions and those with low discrimination power so that the quality of the assessment is more optimal. This study emphasizes the importance of teachers' abilities in compiling and analyzing test items to ensure that the assessment of science learning is objective, valid, and reliable.
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA Salsabila Putri Hati Siregar; Nur Aisyah Pandia; Putri Ramadani; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.929

Abstract

Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation. The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality. The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key. This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers. The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.
Pembatasan Laju Adaptif Berbasis Verifiable Delay Function untuk Mitigasi Penyalahgunaan API pada Gateway Edge Ringan Diah Putri Kartikasari; Tiara Ayu Triarta Tambak; Agung Nugroho; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.931

Abstract

API abuse on lightweight edge gateways has intensified as microservice-based services expose many REST endpoints to heterogeneous clients. Conventional per-identity rate limiting, such as static token buckets, is frequently bypassed through distributed bots and identity rotation, while legitimate burst traffic may be rejected and degrade user experience. This study proposes Adaptive Rate Limiting with Verifiable Delay Functions (ARL-VDF), which couples a lightweight risk score with selective VDF challenges to impose a tunable sequential-computation cost on suspicious clients without forcing aggressive dropping for low-risk users. The gateway continuously derives a per-identity risk score from short-window request rate, error tendency, and identity freshness, then maps the score to a target delay bounded by  and . Evaluation uses a 600-second discrete-event simulation on a mixed workload consisting of normal clients, legitimate bursts, and distributed attackers. Compared with a static token bucket baseline, ARL-VDF maintains full success for legitimate traffic, reduces attacker throughput that passes the gateway, and keeps verification overhead within a fixed budget on the edge device. The results indicate that combining adaptive control with verifiable sequential cost can improve availability and fairness on resource-constrained edge gateways without resorting to aggressive dropping.
Penerapan Jaringan Saraf Tiruan dengan Metode Backpropagation untuk Memprediksi Curah Hujan di Kota Medan Tiara Bela Harahap; Lailan Sofinah Harahap; Naina Nazwa Hasibuan
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam Vol. 4 No. 1 (2026): Januari : Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62383/polygon.v4i1.934

Abstract

Rainfall is a crucial factor in the stability of the Earth's ecosystem and has a significant impact on agriculture, forestry, energy, and water management. However, increasingly unstable climate change makes rainfall patterns difficult to predict accurately using traditional methods. The city of Medan, the capital of North Sumatra Province, has a tropical rainforest climate with an average annual rainfall of approximately ±2200 mm and an average temperature of 27°C. Significant weather fluctuations in this area can trigger flooding when rainfall increases and cause water shortages when rainfall decreases (BMKG, 2021). Therefore, a prediction approach that can manage non-linear and dynamic data is needed. Artificial Neural Networks (ANN) are one of the reliable machine learning methods for detecting data patterns. By using the backpropagation algorithm, the model can gradually reduce prediction errors, making it widely used in weather forecasting applications. In this regard, this study uses ANN with the backpropagation method to forecast monthly rainfall in Medan City by utilizing data from 2022–2024 as training and testing data.

Page 10 of 11 | Total Record : 101