28 research outputs found

    ANALISIS SENTIMEN MASYARAKAT INDONESIA TERHADAP PEMBELAJARAN ONLINE DARI DI MEDIA SOSIAL TWITTER MENGGUNAKAN LEXICON DAN K-NEAREST NEIGHBOR

    Get PDF
    Semenjak keputusan pembelajaran secara online oleh mendikbud di masa pandemi covid-19, membuat masyarakat emosi serta meluapkan opini merka ke media sosial. Tujuan penelitian ini untuk mengetahui sentimen positif, negatif ataupun netral terkait kebijakan mendikbud terhadap pembelajaran online yang keberlangsungan.Data yang diperoleh dari media sosial twitter yang berkaitan dengan hastag-hastag pembelajaran online. Di penelitian ini untuk melakukan klasifikasi sentimen menggunakan Lexicon dan K-Nearest Neighbors untuk mengetahui sentimen yang terjadi pada tweet dan pengujian hasil akurasi menggunakan K-Nearest Neighbors dengan validasi Nilai K=3 sampai K=9. Maka dalam pengujian data yang telah dikumpulkan kurang baik untuk dilanjutkan klasifikasi sentimennya, di perlunya preprocessing kata pada kalimat tweet supaya lebih baik serta menghapus kalimat yang kembar, sehingga proses klasifikasi sentimen dengan K-Nearest Neighbors dan Lexicon sangat baik. Hasil dari penelitian ini memperoleh tweet positif sebanyak 1433, tweet negatif sebanyak 461 dan tweet sebanyak netral 71 untuk K-Nearest Neighbors dan Lexicon tweet sebanyak positif 759, tweet negatif sebanyak 653 dan tweet netral sebanyak 553 serta hasil akurasi dari pengujian validasi nilai K yang terbaik pada nilai K=3 dengan data sentimen K-Nearest Neighbors sebesar 80.66% dan data sentimen sebesar Lexicon 80.92%. Maka hasil lebih baik pada data sentimen Lexicon dengan validasi K=3

    Cross-site Scripting Attack Detection Using Machine Learning with Hybrid Features

    Get PDF
    This study aims to measure the classification accuracy of XSS attacks by using a combination of two methods of determining feature characteristics, namely using linguistic computation and feature selection. XSS attacks have a certain pattern in their character arrangement, this can be studied by learners using n-gram modeling, but in certain cases XSS characteristics can contain a certain meta and synthetic this can be learned using feature selection modeling. From the results of this research, hybrid feature modeling gives good accuracy with an accuracy value of 99.87%, it is better than previous studies which the average is still below 99%, this study also tries to analyze the false positive rate considering that the false positive rate in attack detection is very influential for the convenience of the information security team, with the modeling proposed, the false positive rate is very small, namely 0.039%This study aims to measure the classification accuracy of XSS attacks by using a combination of two methods of determining feature characteristics, namely using linguistic computation and feature selection. XSS attacks have a certain pattern in their character arrangement, this can be studied by learners using n-gram modeling, but in certain cases XSS characteristics can contain a certain meta and synthetic this can be learned using feature selection modeling. From the results of this research, hybrid feature modeling gives good accuracy with an accuracy value of 99.87%, it is better than previous studies which the average is still below 99%, this study also tries to analyze the false positive rate considering that the false positive rate in attack detection is very influential for the convenience of the information security team, with the modeling proposed, the false positive rate is very small, namely 0.039

    REDUCING OVERHEAD OF SELF-STABILIZING BYZANTINE AGREEMENT PROTOCOLS FOR BLOCKCHAIN USING HTTP/3 PROTOCOL: A PERSPECTIVE VIEW

    Get PDF
    Today, there is a tendency to reduce the dependence on local computation in favor of cloud computing. However, this inadvertently increases the reliance upon distributed fault-tolerant systems. In a condition that forced to work together, these systems often need to reach an agreement on some state or task, and possibly even in the presence of some misbehaving Byzantine nodes. Although non-trivial, Byzantine Agreement (BA) protocols now exist that are resilient to these types of faults. However, there is still a risk for inconsistencies in the application state in practice, even if a BA protocol is used. A single transient fault may put a node into an illegal state, creating a need for new self-stabilizing BA protocols to recover from illegal states. As self-stabilization often comes with a cost, primarily in the form of communication overhead, a potential lowering of latency - the cost of each message - could significantly impact how fast the protocol behaves overall. Thereby, there is a need for new network protocols such as QUIC, which, among other things, aims to reduce latency. In this paper, we survey current state-of-the-art agreement protocols. Based on previous work, some researchers try to implement pseudocode like QUIC protocol for Ethereum blockchain to have a secure network, resulting in slightly slower performance than the IP-based blockchain. We focus on consensus in the context of blockchain as it has prompted the development and usage of new open-source BA solutions that are related to proof of stake. We also discuss extensions to some of these protocols, specifically the possibility of achieving self-stabilization and the potential integration of the QUIC protocol, such as PoS and PBFT. Finally, further challenges faced in the field and how they might be overcome are discussed

    PENERAPAN ALGORITMA PALGUNADI PADA SPLIT DELIVERY VEHICLE ROUTING PROBLEM UNTUK PENDISTRIBUSIAN MULTI PRODUK

    Get PDF
                         Transportation is one area in the supply chain management that determines how and when to send goods to consumers. Determination of distribution routes has an effect on transportation costs. In delivering goods, the company must be able to determine the configuration of the distribution line appropriately so that shipping becomes fast and does not cost much. This study, we will develop a SDVRP solution method for multiple-products distribution. Solving the SDVRP problem for multiple-products distribution will use the Palgunadi Algorithm with the aim of determining the distribution route so that the minimum total distribution costs are obtained. This study uses data about the distribution of fuel in the NTT region with many agents 8 and many types of products 3. There are 3 types of tankers used. The results of the study produced 3 alternative distributions based on the type of tanker used. The use of type 2 (3,500) tankers results in a minimum total distribution cost with the number of routes and tankers used is 2. Keywords: SDVRP, Palgunadi Algorithm, Multiple Product

    EVALUASI TINGKAT KEMATANGAN TEKNOLOGI INFORMASI MENGGUNAKAN FRAMEWORK COBIT 4.1 PADA INSTANSI PEMERINTAHAN ABC

    Get PDF
    Information technology (IT) now plays an important role in the performance process of an organization or government agency, particularly in improving services that are efficient, effective and transparent. Implementation of good IT governance will guarantee the transparency, efficiency and effectiveness of an organization or government agency. Seeing the benefits of applying IT for the creation of a governance and information system that is in accordance with the standards, an evaluation of the maturity level of information technology governance in government agencies will be used using COBIT 4.1 in the sub-domains that meet the problems and needs of the government agencies. The results of this measurement are a description of the results of IT governance and the current Information System and the results of recommendations that will be a reference for future improvements so that government agencies become more measurable and better. In this study, the conclusion of the level of maturity in the domain Delivery and support (DS ) DS1 = 2.81, DS4 = 2.56, DS5 = 2.67, DS11 = 2.65, so that the level of maturity at ABC company is at level 2.5 (Defined Process). Keywords: Cobit, Maturity Leve

    PENERAPAN ALGORITMA K NEAREST NEIGHBOR UNTUK REKOMENDASI MINAT KONSENTRASI DI PROGRAM STUDI TEKNIK INFORMATIKA UNIVERSITAS PGRI YOGYAKARTA

    Get PDF
    The graduation time of a student is very important because it relates to many parties, in addition to the students concerned, guardian lecturers, and program study programs and related parties in the time of student graduation. one of the factors which is the result of graduation from informatics engineering study program students is that many students are wrong in taking thesis titles that are not in accordance with their interests and concentration. So research needs to be done to solve this problem. One way to solve problems is to make predictions. Selection of interest by using student data using Case Base Reasoning (CBR). In this study applying the K-NN Algorithm in determining recommendations in choosing the concentration. The results obtained from this study are by classification using the K-NN Algorithm obtained concentrations that match their interests.  Keywords : Predictions, Case Base Reasoning, K-NN Algorith

    EVALUASI USER INTERFACE PADA APLIKASI E-COMMERCE (STUDI KASUS INFORMA DAN IKEA)

    Get PDF
    ABSTRACT Increasingly complex human needs cause changes in the community environment. This is indicated by the increasingly rapid development of information technology, especially information technology related to online shopping applications through e-commerce applications. The development of technology that is currently being talked about and is the subject of discussion is to develop technology towards modern business by using mobile-based e-commerce applications. Anywhere and anytime quickly and in real time, people can easily make purchases of any product related to the needs of the house they are looking for. The results of this study were to determine the magnitude of the heuristic value of the quality of the mobile e-commerce application user interface Informa and Ikea according to users using the Nielsen 10 principle method. It is expected that the results of this study can be used as input for e-commerce mobile application developers Informa and Ikea to be better, and can be proposed to improve the user interface for e-commerce applications Informa and Ikea. Keywords:  E-Commerce, User Interface, 10 Nielsen Principles.

    PERENCANAAN RENCANA STRATEGIS SISTEM INFORMASI UNTUK TERCAPAINYA VISI MISI DARI RUMAH SAKIT

    Get PDF
    XXX Regional General Hospital (RSUD XXX) is a Type B Hospital in Yogyakarta. XXX Hospital is the only place of reference for further treatment of patients who feel they need more sophisticated handlers. In 2016 the XXX Hospital was requested by the DIY Health Office to improve facilities and services. In following up on the request of the Yogyakarta Health Office, the RSUD XXX is currently in the process of building a building structure. However, from the increase in infrastructure built it has not been accompanied by the development of adequate technological infrastructure. From the description of the above problems, the purpose of this study is to make a strategic plan to align business objectives with the business process of the RSUD. The limitation of the problem is that in this study the researcher used the Zachman framework with matrix tables 1 to 4 (Scope, Enterprise Model, System Model, Technological Model). The final results of this study are the main activities of the XXX hospital including registration, outpatient care, hospitalization, emergency services, laboratory services, drug services, hospital services, outpatient registration and inpatient registration. Whereas for supporting activities are the procurement of logistics, tools and materials, medical workers requitment, information services. There are 7 applications that are suggested to be developed, namely the Registration application, BPJS, Poly Unit, Laboratory, E-Billing, Medical Support. Keywords: Architecture Enterprise, Informatic System, Hospita

    ANALISIS TATA KELOLA SISTEM INFORMASI AKADEMIK

    Get PDF
    Information technology greatly affects the academic activities in particular and is currently one of the resources at the College to manage data integration, improving the effectiveness, efficiency in the academic process. This study aims to measure the level of maturity (maturity level) of academic information systems governance particularly domain Delivery and Support, and Monitor and Evaluate this measurement Method, using Cobit (Control Obejctive for Information and Related Technology). The calculation of the maturity level of the selected processes based on Renstra Muhammadiyah University of Bengkulu is done by analyzing the berdasrkan importance of akadamik information in data integration for academic reports, identification of the questionnaire is carried out using the Raci Chart. With this research in mind the level of maturity of the academic information system governance is on the level of maturity of 2, for the proposed increase in adjustments to the rekomndasi level 3. Keywords: Governance, Cobit, Maturity Models

    ARSITEKTUR APLIKASI MOBILE COMMERCE UNTUK MICRO ENTERPRISE

    Get PDF
    Abstrak: Mayoritas jenis usaha di indonesia adalah dari golongan usaha mikro yang terlihat dari persentase perkembangan pada tahun 2012 yang mencapai 98,79% dari 99,99% atau 55,9 juta usaha mikro dari 56,5 juta Usaha Mikro, Kecil dan Menengah (UMKM) yang ada di Indonesia. Namun, minimnya dukungan teknologi mobile atau yang dikenal dengan mobile commerce akan menyulitkan perkembangan micro enterprise. Mengingat pentingnya penerapan teknologi mobile commerce pada micro enterprise, maka perlu membuat acuan, panduan dan rencana yang jelas bagi pengembangan aplikasi mobile commerce secara keseluruhan untuk micro enterprise. Pemodelan arsitektur mobile commerce dipetakan menjadi arsitektur data, arsitektur aplikasi dan arsitektur teknologi. Pengujian model arsitektur dilakukan oleh enam responden dengan menggunakan Enterprise Architecture Score Card (EA Score Card) dengan hasil perhitungan 57,56% yang berarti arsitektur tersebut dinyatakan layak.Kata kunci: mobile commerce, arsitektur, micro enterprise, EA Score Car
    corecore