Claim Missing Document
Check
Articles

Found 12 Documents
Search
Journal : Prosiding Seminar Nasional Sisfotek (Sistem Informasi dan Teknologi Informasi)

Penerapan Algoritma C4.5 , SVM Dan KNN Untuk Menentukan Rata-Rata Kredit Macet Koperasi Siswanto Siswanto; Riefky Sungkar; Basuki Hari Prasetyo; M.Anif; Subandi Subandi; Gunawan Pria Utama; Raden Sutiadi; Buana Suhurdin Putra
Prosiding SISFOTEK Vol 7 No 1 (2023): SISFOTEK VII 2023
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

problem that often occurs is the difficulty in determining the average bad credit spread across 7,823 savings and loan cooperatives in Indonesia. The main problem faced by savings and loan cooperatives is the difficulty in identifying and mitigating credit risks that can cause bad credit. Bad credit not only harms cooperatives, but can also disrupt the financial stability of cooperative members. The lack of effective tools to measure and predict credit risk makes cooperatives potentially face unnecessary losses. The aim of this research is to apply the C4.5, SVM, and KNN algorithms in determining the average non-performing loans of savings and loan cooperatives, comparing the results and performance of the three such algorithms in the context of credit risk management, and improve understanding of the use of machine learning techniques in identifying credit risk patterns that may be difficult to detect manually. The application of the C4.5 Algorithm, SVM (Support Vector Machine), and KNN (K-Nearest Neighbors) models in determining the average bad credit in the context of savings and credit cooperatives is carried out by considering the appropriate configuration. This research first collects and preprocesses data which includes credit history, income, length of membership, and other related factors from savings and loan cooperatives. Next, factor analysis and feature selection are carried out to identify the factors that most influence credit risk. The results of the three models are evaluated using various evaluation metrics, such as accuracy, precision, recall, F1-score, and AUC-ROC. The results of this research The results show that the SVM model has the highest performance in predicting credit risk, followed by the C4.5 and KNN algorithms. Careful feature selection and robust model validation are also key components in accurate credit risk assessment. Thus, the results of this research can help cooperatives better manage credit risk and make more informed decisions regarding loan approvals.
Penerapan Algoritme Kriptografi RC6 Untuk Mengamankan File Penjualan Dan Gambar Produk Alisan Siswanto Siswanto; Basuki Hari Prasetyo; M. Anif; Ari Saputro; Subandi; Djati Kusdiarto; Izzah Fadhilah Akmaliah
Prosiding SISFOTEK Vol 7 No 1 (2023): SISFOTEK VII 2023
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Problems that commonly occurred in this period were that the sales data for Alisan products in several stores was falsified and there were quite large differences that did not match the reported data, as well as the large number of fake product images which could damage the image of the original Alisan products. One of the main problems faced in developing e-commerce web applications is the vulnerability of sales data and product images to security threats, such as hacking and data theft. The aim of this research is to create an application that implements the RC6 encryption algorithm to protect web-based Alisan product sales files and product images. This research aims to fill this gap by focusing on the effectiveness of the Rivest Code 6 (RC6) algorithm in protecting critical transactional and visual data in an e-commerce context. In addition, this research examines the impact of RC6 implementation on system performance and compares it with other encryption methods commonly used in web applications. Therefore, this research is expected to provide valuable insights for stakeholders in developing better data security solutions for web-based businesses. Applications are evaluated and planned with user acceptance testing (UAT). The results of application testing showed that the average size of the encryption process was 146,878.6 bytes and the processing time was 3.576291 MS and the average size of the decryption process was 146,854.6 bytes and the processing time was 2.8220591 MS. Test results from 26 UAT respondents, 89.1% agreed that the entire implementation of the RC6 algorithm can be used by Alisan employees to protect sales report files and Alisan product image files easily and safely.