cover
Contact Name
Heskyel Pranata Tarigan
Contact Email
gein.rafflesia@gmail.com
Phone
+6287823714414
Journal Mail Official
gein.rafflesia@gmail.com
Editorial Address
JL. Zainal Arifin No. 081. Padang Nangka, Singaran Pati, Kota
Location
Kota bengkulu,
Bengkulu
INDONESIA
Jurnal Komputer
Published by Gein Rafflesia
ISSN : -     EISSN : 29620651     DOI : -
Core Subject : Science,
Domain Specific Frameworks and Applications IT Management dan IT Governance e-Government e-Healthcare, e-Learning, e-Manufacturing, e-Commerce ERP dan Supply Chain Management Business Process Management Smart Systems Smart City Smart Cloud Technology Smart Appliances & Wearable Computing Devices Robotic Systems Smart Sensor Networks Information Infrastructure for Smart Living Spaces Intelligent Transportation Systems Models, Methods and Techniques Conceptual Modeling, Languages and design Software Engineering Information-centric Networking Human Computer Interaction Media, Game and Mobile Technologies Data Mining Information Retrievel Information Security Image Processing and Pattern Recognition Remote Sensing Natural Language Processing
Articles 36 Documents
Implementasi Metode Vector Space Modelling Untuk Pencarian Buku Pada Perpustakaan Hartono, Rudi; Siswanto; Kanedi , Indra
Jurnal Komputer Vol 2 No 1 (2023): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i1.68

Abstract

Search Engine is a system that can be used to automatically find relevant information to the needs of its users from a book collection. This system will receive input in the form of keywords for the information to be searched. In a relatively shorter time, it will provide relevant information for the keywords entered by the user. In the search system, one method is needed, one of which is VSM (Vector Space Modeling) method. VSM method was chosen because the way this model works is efficient, easy to represent, and can be implemented in library systems. The system implementation uses the Visual Basic 2010 programming language and the method used in this research is the System Development Life Cycle (SDLC). This SDLC functions to describe the main stages and steps of each stage which are broadly divided into 3 (three) activities, namely analysis, design and implementation. By developing a library system using the VSM method, it is hoped that it will make it easier for officers to provide services and can help with work in the library through library automation functions, so that the library management process is more effective and efficient.
Penerapan Model Transformer Untuk Deteksi Sentimen Pada Data Twitter Berbahasa Indonesia Alfatah, Dhika
Jurnal Komputer Vol 2 No 2 (2024): Januari-Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i2.99

Abstract

Social media has become an important platform for people to voice their opinions, aspirations and feelings on various social, economic and political issues. Twitter, as one of the most popular social media platforms, presents a wealth of data for research, especially in the field of sentiment analysis. This research explores the application of the Transformer model, specifically IndoBERT, in detecting sentiment from Indonesian tweets. The dataset used was collected from the Twitter API, processed, and manually labelled into three categories: positive, negative, and neutral. Model evaluation was conducted by comparing IndoBERT's performance with traditional classification methods such as Naïve Bayes and Support Vector Machine (SVM). The results show that IndoBERT significantly outperforms conventional models in terms of accuracy, recall, precision, and F1-score, signalling that the Transformer model is highly effective for sentiment analysis in Indonesian.
Hybrid Learning Approach For Intrusion Detection In Network Security Using Ensemble Methods Tarigan, Heskyel Pranata
Jurnal Komputer Vol 2 No 2 (2024): Januari-Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v2i2.100

Abstract

The increasing frequency and sophistication of cyberattacks have led to a pressing need for advanced network security systems, particularly Intrusion Detection Systems (IDS). While traditional IDS models provide a baseline of protection, they often fall short in detecting novel and complex threats. This research proposes a hybrid learning approach for IDS, leveraging the strengths of ensemble machine learning methods such as Random Forest, Gradient Boosting, and Voting Classifier. The proposed system aims to enhance detection accuracy and reduce false positives by combining multiple classifiers into a cohesive model. Using the NSL-KDD dataset, the model was trained and tested, showing superior performance compared to individual learning algorithms. This paper discusses the design, implementation, and performance evaluation of the hybrid IDS model.
Penggunaan Kriptografi Asimetris dalam Pengamanan Komunikasi IoT Alfatah, Dhika
Jurnal Komputer Vol 3 No 1 (2024): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i1.101

Abstract

The Internet of Things (IoT) has grown rapidly and become an important part of many sectors, from industry to healthcare to households. However, this growth also increases security risks, especially regarding data communication between devices. One promising solution is the implementation of asymmetric cryptography, which offers encryption and decryption mechanisms using public and private key pairs. This article discusses how asymmetric cryptography can be applied in IoT systems to maintain data confidentiality, integrity, and authentication. In addition, implementation challenges such as limited computing power and energy consumption in IoT devices are analysed, as well as solutions that can be applied to overcome them. This study shows that despite technical barriers, the use of asymmetric cryptography remains relevant and effective as a layer of protection in an increasingly complex IoT ecosystem.
Analisis Forensik Digital pada Perangkat Android: Studi Kasus Serangan Malware Alfatah, Dhika
Jurnal Komputer Vol 3 No 2 (2025): Januari- Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i2.102

Abstract

Until recently, the growth of the Android operating system on smartphone devices was popular. However, behind this popularity, the Android platform is also a target of opportunity for cybercrime against cybersecurity threats such as malware. Identifying this malware is very important to maintain user security and privacy. Due to the increasingly complicated process of malware identification, it is necessary to use machine learning for malware classification. This research collects static analysis features of safe and malicious applications. (malware). The dataset used in the research is the DREBIN malware dataset which is a publicly available malware dataset. The dataset consists of API CALL, system command, manifest permission, and Intent features. The data is then processed using various supervised machine learning algorithms including Support Vector Machine (SVM), Naive Bayes, Decision Tree and KNearest Neighbors. We also concentrate on maximising the achievement by evaluating various algorithms and adjusting some configurations to get the best combination of hyper-parameters. The experimental results show that SVM model classification gets the best result by achieving 96.94% accuracy and 95% AUC (Area Under Curve) value.
Blockchain-based Identity Management System: Desain dan studi Kemanan Rahayu, Novi
Jurnal Komputer Vol 3 No 1 (2024): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i1.103

Abstract

The Internet of Things (IoT) is a number of devices that can collect and transmit data between sensors without the need for human assistance. However, the security of IoT can be threatened due to its nature that can be accessed from anywhere and at any time. Security gaps have the possibility of being difficult to detect, because they have a variety of patterns. Therefore, a secure model for sending data between sensors is needed. Blockchain is a technology that can answer the three necessary security requirements, namely availability, confidentiality, and integrity. In this research, we try to build an IoT security simulation using blockchain technology, where the security system uses the publicblockchain pattern. The method used in this research is a publicblockchain model that allows users to control applications connected to the emulator pin through smart contracts. This research uses the Ethereum network which is included in the testing network that can be used without any transaction fees that need to be paid. With this research, it is hoped that it can provide solutions to security problems and challenges faced in IoT networks.
Pengembangan Aplikasi Mobile Untuk Pemantauan Kesehatan Mental Menggunakan Flutter Rahayu, Novi
Jurnal Komputer Vol 3 No 1 (2024): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i1.104

Abstract

Healthy living is the desire of every human being. Maintaining health involves disease prevention and continuous physical and mental care. Health parameters such as heart rate, blood oxygen saturation, and body temperature are important indicators of a person's physical and mental condition. Normal heart rate and oxygen levels are essential for efficient heart function, while body temperature can indicate various health conditions. Currently, health checks are usually carried out by visiting health facilities such as hospitals, health centers, and so on, which are considered less effective because they take a lot of time. Although health check tools such as pulse oximeters and digital thermometers are currently available, these tools can only display health information when used and measurement data cannot be saved to a database for long-term monitoring. Therefore, a health monitoring tool is needed that can be used personally to monitor the user's health periodically. In this study, the author developed a mobile health monitoring application using the Dart programming language and the Flutter framework. This application is integrated with the MAX30102 oximeter sensor and the MLX90614 temperature sensor via the Esp32 microcontroller with the Bluetooth Low Energy (BLE) communication protocol. This system allows users to perform personal health checks without disturbing their daily routines, measurement data is displayed in real-time on the application and stored on the server for long-term monitoring. This study successfully developed an IoT mobile application with Esp32 to monitor heart rate, blood oxygen saturation, and body temperature. The blackbox test showed 100% success with a measurement accuracy value of 95.55% for heart rate, 99.01% for oxygen saturation, and 99.269% for body temperature.
Analisis UX pada Aplikasi E-Learning menggunakan Metode SUS (System Usability Scale) Rahayu, Novi
Jurnal Komputer Vol 3 No 2 (2025): Januari- Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i2.105

Abstract

E-learning has become an essential need in education, especially accelerated by the COVID-19 pandemic. The implementation of online learning systems using Moodle-based Learning Management System (LMS), which requires evaluation to ensure its effectiveness and usability. This study aims to implement the System Usability Scale (SUS) method to measure the level of usability. This evaluation is expected to provide recommendations for improvements to improve the quality of online learning. Based on the existing problems, it explains how to implement the SUS method to measure usability in the e-learning system at UMM. The study was limited to usability evaluation using the SUS method without discussing other aspects such as learning content or other supporting technology infrastructure. The study used the SUS method which involved a questionnaire with 10 questions to assess usability aspects such as learning ability, efficiency, error rate, and user satisfaction. The analysis showed a fairly good level of usability but still needed some technical improvements such as system stability and ease of use. The implementation of the SUS method was effective, providing valuable insights for system improvements to improve the learning experience.
Progressive Web App (PWA) Sebagai Solusi Aksesibilitas Sistem Informasi Akademik Olivia, Melvina
Jurnal Komputer Vol 3 No 1 (2024): Juli-Desember
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i1.106

Abstract

The academic information system is a system built to facilitate academic administration activities in educational institutions and is carried out online. Academic data processing still uses sheets of paper and archives (manual), causing existing data to be easily lost or damaged and searching for data takes a long time. The purpose of this research is to design a web-based academic information system to support operational activities and make it easier for schools to deliver information by applying Progressive Web Apps (PWA) to make easy access for student teachers when entering applications with mobile web displays on smartphone devices. The testing method used is the black-box testing method, namely the system is executed through trials and checks the functionality of the web application. The results of testing this application students, teachers, principals login to enter the main display. The main menu has student data, teacher data, assessments, assessments, lesson schedules and profile pages. The conclusion of testing the information system is as desired by the school in providing convenience in conveying information and the application can run well and no bugs are found.
Desain Responsif dan Dampaknya terhadap Pengalaman pengguna di Situs E-Commerce Olivia, Melvina
Jurnal Komputer Vol 3 No 2 (2025): Januari- Juni
Publisher : CV. Generasi Insan Rafflesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70963/jk.v3i2.107

Abstract

The development of information technology today has significantly changed the view of business, especially in e-commerce. Companies engaged in the food sales industry such as a shop are urgently needed to increase the effectiveness of online promotion and sales through redesigning e-commerce websites. This research aims to design an e-commerce website that combines attractive design elements, functionality, and effective promotional strategies to improve branding and marketing. The methodology used in this research includes surveys, interviews, and competitor analysis to understand user needs and current industry trends. The results show that increasing the effectiveness of online promotion and sales requires strategic integration between three main elements, namely attractive and responsive design, intuitive and user-friendly functionality, and targeted and effective promotional strategies. Based on the research results, an e-commerce website design, which combines several elements, with a focus on an attractive user experience and an easy purchasing process. The implementation of this design in the future can increase branding visibility, optimise user experience.

Page 3 of 4 | Total Record : 36