Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–10 dari 150 artikel
Klasifikasi Berita Hoaks Menggunakan Algoritma Support Vector Machine
Prosiding Seminar Nasional Ilmu Teknik
Vol 2
, No 2
(2026)
The spread of hoax news in digital media is a serious problem because it can affect public opinion and social stability. This study aims to classify hoax news using the Support Vector Machine (SVM) algorithm. The dataset used is a hoax clarification dataset from the Ministry of Communication and Digital (Komdigi) of the Republic of Indonesia, totaling 1,872 data. The research process includes data collection, text pre-processing, feature extraction using TF-IDF, and classification using the SVM...
Sumber Asli
Google Scholar
DOI
Sistem Informasi Sederhana untuk Identifikasi Gen Penyebab Penyakit
Saturnus: Jurnal Teknologi dan Sistem Informasi
Vol 4
, No 1
(2026)
The development of bioinformatics has led to the availability of large amounts of genetic data through public databases such as NCBI Gene, OMIM, and Ensembl. However, the complexity of data presentation and the dominance of English language hinder students, novice researchers, and the general public in understanding the relationship between genes and disease. This research aims to develop a simple web-based information system to identify disease-causing genes with concise, Indonesian-language, a...
Sumber Asli
Google Scholar
DOI
“Sailing Beyond Limit” sebagai Analogi Latihan Keterampilan Manajemen Mahasiswa dalam Upaya Implementasi Peran Agent of Change
Trisnapradika, Gustina Alfa
; Juhara, Kanahaya Putri
; Bahri, Alfino Kautsar
; Ananta, Putri Rossa
; Siregar, Nadia Itona
; Ningrum, Novita Kurnia
Bumi: Jurnal Hasil Kegiatan Sosialisasi Pengabdian kepada Masyarakat
Vol 4
, No 1
(2026)
Students have a strategic role as agents of change that requires adequate leadership and managerial skills. Formal learning in the classroom has not been able to fully develop these practical skills. This community service activity aims to improve the basic management skills of students at the Faculty of Computer Science, Universitas Dian Nuswantoro through Basic Student Management Skills Training (LKMM TD) with the theme Sailing Beyond Limits. The implementation method uses a Participatory Lear...
Sumber Asli
Google Scholar
DOI
Implementasi Metode Fuzzy Mamdani pada Sistem Penentuan Kelayakan Beasiswa
Repeater : Publikasi Teknik Informatika dan Jaringan
Vol 4
, No 1
(2026)
The process of determining scholarship eligibility often faces challenges related to subjectivity and uncertainty in assessment criteria, which can result in inaccurate and unfair decisions. Scholarship selection generally involves multiple criteria, such as academic achievement, family economic conditions, and supporting factors that are difficult to evaluate using conventional decision-making methods. Therefore, an appropriate decision support approach is required to handle such uncertainty ef...
Sumber Asli
Google Scholar
DOI
Perbandingan Waktu Pemecahan Password Menggunakan Algoritma Hash MD5, SHA-256, dan SHA-512 pada Serangan Brute Force
Nur Bainatun Nisa
; Noni Fauzia Rahmadani
; Aulia Kartika Dewi
; Luftia Rahma Nasution
; Dzilhulaifa Siregara
; Rifdah Syahputri
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Password security is a critical component in protecting information systems, as passwords are often the primary target of various attacks, particularly brute force attacks. A brute force attack works by systematically attempting all possible character combinations until the correct password corresponding to a stored hash value is found. Therefore, the choice of an appropriate hash algorithm plays a significant role in determining a system’s resistance to such attacks. This study aims to analyze...
Sumber Asli
Google Scholar
DOI
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA...
Sumber Asli
Google Scholar
DOI
Analisis Pengalaman Mahasiswa terhadap Efektivitas Aplikasi Gojek dalam Layanan Transportasi Online
Saturnus: Jurnal Teknologi dan Sistem Informasi
Vol 4
, No 1
(2026)
Online transportation services have become an important part of student life because they provide ease of access, time efficiency, and mobility flexibility. The Gojek application is one of the most frequently used services by students in Medan City to support academic and non-academic activities. This study aims to analyze students' experience in using the Gojek application and its effect on the effectiveness of the application in online transportation services. The research method used was a qu...
Sumber Asli
Google Scholar
DOI
Design and Evaluation of an Adaptive Intrusion Detection Framework for IoT Edge Networks Using Hybrid Machine Learning and Deep Reinforcement Learning Techniques
Cyber Security and Network Management
Vol 1
, No 1
(2026)
The rapid proliferation of Internet of Things (IoT) devices across diverse industries has significantly increased the vulnerability of IoT edge networks to sophisticated cyber threats. Traditional intrusion detection systems (IDS), such as signature-based and anomaly-based approaches, are often insufficient in addressing the dynamic and evolving nature of these threats. This study proposes a hybrid intrusion detection system (IDS) framework that combines supervised machine learning (ML) techniqu...
Sumber Asli
Google Scholar
Pengaruh Parenting Islami terhadap Karakter Disiplin Anak Usia Dini
Inovasi Pendidikan dan Anak Usia Dini
Vol 3
, No 1
(2026)
This study aims to explore in depth the impact of Islamic parenting on the development of disciplinary character in early childhood. Conceptually, parenting in Islam is understood as a child-rearing method based on Islamic principles, emphasizing values of role modeling, love, responsibility, and moral development from an early age. Through this approach, parents serve as the first and foremost educators in instilling the values of discipline reflected in children’s daily behavior, both within t...
Sumber Asli
Google Scholar
DOI
Pemanfaatan Minyak Jelantah sebagai Bahan Dasar Pembuatan Sabun Ramah Lingkungan dengan Penambahan Essential Oil di Desa Pasar Rawa
Sabrina Aisha Putri Lubis
; Apriani Syahputri
; Roslina Sahara
; Rasyid Ridho Siregar
; Dwi Ardy Dermawan
Kolaborasi : Jurnal Hasil Kegiatan Kolaborasi Pengabdian Masyarakat
Vol 3
, No 4
(2025)
Cooking oil is a staple food widely used in daily cooking. However, repeated use of cooking oil, resulting in its conversion into used cooking oil, can have negative impacts on both health and the environment. Used cooking oil that has changed color and quality is carcinogenic and has the potential to increase the risk of cardiovascular disease if consumed again. Furthermore, improper disposal of used cooking oil can cause environmental pollution because it is difficult to decompose. This study...
Sumber Asli
Google Scholar
DOI