Claim Missing Document
Check
Articles

Found 14 Documents
Search

Sistem Rekomendasi Pada Tokopedia Menggunakan Algoritma K-Nearest Neighbor Rubangi Rubangi; Rianto Rianto
Jurnal Teknik Komputer AMIK BSI Vol 8, No 1 (2022): JTK Periode Januari 2022
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (253.952 KB) | DOI: 10.31294/jtk.v8i1.11823

Abstract

Tokopedia merupakan salah satu perusahaan perdagangan elektronik yang memiliki data pertumbuhan yang sangat pesat dengan seiring berjalannya waktu. Adanya data terus menerus bertambah besar sehingga dapat terjadinya masalah bagi user. User sering mengalami kendala dalam promosi produk yang sering dikunjungi pembeli. Selain itu pembeli sering mengalami kesulitan untuk menemukan kebutuhan produk terbaik yang sesuai kebutuhan pembeli. Dengan adanya masalah tersebut yang terjadi maka dapat diatasi dengan adanya sistem rekomendasi produk tertentu untuk ditawarkan kepada pembeli. Sistem rekomendasi penelitian ini mengimplementasikan dengan Algoritma K-Nearest Neighbor pada Rating Product Reviews Tokopedia. Algoritma K-Nearest Neighbor yang digunakan untuk menentukan top-n rekomendasi produk tertentu untuk ditawarkan kepada pembeli. Hasil dari penelitian yang dilakukan pada data 2040 rating produk dengan menggunakan algoritma K-Nearest Neighbors yaitu nilai Accuracy sebesar 73.53%, Precision sebesar 73.64%, Recall sebesar 99.62%.
Sistem Rekomendasi Jurusan pada Sekolah Menengah Kejuruan (SMK) dengan Algoritma K-Means Siska Howay; Rianto Rianto
Syntax Idea Vol 3 No 10 (2021): Syntax Idea
Publisher : Ridwan Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46799/syntax-idea.v3i10.1443

Abstract

Sistem Penentuan jurusan di SMK Negeri 02 Moswaren Kabupaten sorong selatan, merupakan hal yang sangat penting, karena di SMK belum ada sistem penetuan jurusan yang baik sehingga siswa seringkali salah dalam memilih jurusan berdasarkan kemampuan yang dimiliki. Oleh karena itu sistem ini dibuat untuk membantu pihak sekolah dalam menentukan jurusan yang sesuai berdasarkan data nilai rapot, minat, dan bakat. data di ambil dari beberapa angkatan mulai dari angkatan 2019 sampai dengan 2021. Atribut yang dipakai meliputi pemilihan jurusan SMK TKJ, TBSM, TPMG, ATPH, APAT nilai mata pelajaran Penddidikan Agama, PPKN, Bahasa Indonesia, Matematika, IPA, IPS, Penjas, Prakarya, Mulok, Kewira dengan menggunakan dataset 23 data siswa baru. hasil dari pola klasifikasi penentuan jurusan ini dapat digunakan pihak sekolah dalam menentukan kebijakan dalam penentuan jurusan calon siswa pada proses penerimaan peserta didik baru.
IMPLEMENTASI WEBSITE UNTUK MENINGKATKAN OMSET PENJUALAN BATIK BERKAH LESTARI Radjaban Radjaban; Septi Riana Dewi; Rianto Rianto
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 4, No 1 (2021): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v4i1.832

Abstract

Marketing is one of the determinant factors on business success, even though there are still many negligent companies and still use conventional systems so that their sales turnover is low. The COVID-19 pandemic also creates problems on sales turnover. Micro, Small, and Medium Enterprises of Batik Berkah Lestari Imogiri are among those affected by the pandemic. This is related to the conventional marketing system that has been implemented up to this time. In addition, government policies related to pandemics also limit life activities. People are no longer free to visit shopping centers, so they need to make transaction media without leaving their homes. The development of internet technology has presented a medium called a website. Its flexibility, convenience, and simplicity make webiste to be widely used. Moreover,  the existence of website will be used for Batik Berkah Lestari in marketing its products during the pandemic. This study aims to implement the website as an online transaction medium for Batik Berkah Letasri. By utilizing the website as a medium for electronic transaction, the market reach will be even wider so that transaction opportunities at Batik Berkah Lestari will be even greater.
BRAND TRUST AND CUSTOMER LOYALITY IN SERVICE COMPANIES HEALTH Emi Munawaroh; Rianto
Jurnal Ekonomi dan Bisnis Airlangga Vol. 32 No. 1 (2022): JURNAL EKONOMI DAN BISNIS AIRLANGGA
Publisher : Fakultas Ekonomi dan Bisnis, Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jeba.V32I12022.93-102

Abstract

Introduction: This study was conducted to examine the effect of trust in brand (brand characteristic, company characteristic, and customer - brand characteristic) on brand loyalty in hospital patients. Methods: The method used in this study is a quantitative descriptive research method with a multiple linear regression analysis approach using 100 respondents who have used the services of RSUD Dr. Sudirman Kebumen. Results: The results of this study indicate that trust in brand has a positive effect on brand loyalty, either partially for each dimension of brand characteristic, company characteristic, and customer-brand characteristic or simultaneously. Furthermore, customer-brand characteristic is the dominant variable even though the difference is not great. Therefore, it can be concluded that, in building brand loyalty, it requires building trust from the brand with characteristics starting from the brand itself, and how the patient's relationship with the brand is established. Conclusion and suggestion The author finds that building brand loyalty in service companies, especially health services at regional companies, requires good brand trust management. This is a new finding because previous research has focused on goods industry. Brand loyalty is focused not only on a tangible product industry, but even health service companies need good brand awareness, especially trust, to be able to maintain customer loyalty to the brand.
Efektifitas Penggunaan Association Rules Mining dalam Personalisasi Website Edi Priyanto; Arief Hermawan; Rianto Rianto; Donny Avianto
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 1 (2021): Januari 2021
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (360.156 KB) | DOI: 10.14421/jiska.2021.61-07

Abstract

As the usage of the internet grows, more and more information is obtained, thus presenting challenges, especially for users and website owners. Website users often have difficulty finding products or services that are relevant to their needs caused by abundant amounts of products and services delivered on a website. Website owners often find it difficult to convey information about the right products and services to certain target users. Based on the problem given above, we can conclude that a recommendation system approach that can improve personalization on their website is needed. The recommendation system approach must be able to provide navigation on the website to make it more adaptive towards the interests and information needed by the user. This study uses Association Rules formed from Microsoft web access log data by finding visitor patterns based on frequently visited web site pages. From the results of the research conducted, the performance of the method used has a precision value of 0.896, 0.058 recall, and F-measure 0.104. Whereas the measurement of the accuracy value resulted in a performance recommendation of exactly 3%, an acceptable rate of 87%, and 10% incorrect. This research shows that the Association Rules method can increase the effectiveness of website personalization to provide relevant information recommendations for visitors. For further research, it can concentrate on improving existing methods thus website personalization becomes more adaptive.
Teknik produksi dan pemasaran Batik Parang Kaliurang Rianto Rianto; Endang Setyawati; Ratika Tulus Wahyuhana; Widya Setiafindari
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 6, No 1 (2023): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v6i1.1218

Abstract

Batik Parang Kaliurang is a women's business group located in South Kaliurang, Sleman,Yogyakarta. Batik Parang Kaliurang existed until 2020, marked by many orders from within and outside the country. Several marketing support activities have also been followed, such as participating in exhibitions, competitions, training, and other activities. Conditions changed when the COVID-19 pandemic occurred with several government regulations to break the chain of virus spread, one of which was social distancing. The impact of this regulation is the lack of visitors to the showroom so that from 2020 to 2021, Parang Kaliurang batik will almost not produce. This is partly because Parang Kaliurang batik does not have media for product marketing or digital exhibitions. This community service aims to regenerate transactions in Parang Kaliurang batik by expanding the marketing network through cyberspace. However, this facility is also not accessible because of several obstacles such as production space and the ability of human resources to operate technology.
Decentralized Finance (DeFi), Strengths Become Weaknesses: a Literature Survey Aziz Perdana; Erik Iman HU; Rianto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 2 (2023): April 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i2.4806

Abstract

The use of blockchain technology in Decentralized Finance (DeFi) has gained popularity, with 23 public companies and one country holding bitcoin. DeFi aims to create an open and decentralized financial ecosystem that is accessible to everyone, eliminates intermediaries like financial institutions, and is verifiable, immutable, globally accepted, fast, low-cost, anonymous, and non-custodial. Despite its benefits, the rapid growth of DeFi has led to increased security risks. This study assesses the validity of DeFi's superiority claims in light of security incidents and events in 2022 and Twitter trends. This study used a Systematic Literature Review from various research articles and news from 2022. This research found that DeFi's superiority claims seem to be inconsistent with what is being advertised. It also found that if DeFi is not properly prepared and audited, its strength (Anonymous, open-source, decentralized, non-custodial, eliminates third parties and regulation) may become its weakness. Despite this, users still exhibit high levels of trust and optimism, as seen in the most popular terms shared by user tweets during significant losses, with 301,654 unique tweets between April 30 and May 31, 2022 and 344,519 unique tweets between October 3 and December 3, 2022, that are crypto, nft, and blockchain.
Kombinasi Algoritma Kriptografi Vigenere Cipher dan SHA256 untuk Keamanan Basis Data Rian Oktafiani; Erik Iman Heri Ujianto; Rianto Rianto
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 3 (2023): Maret 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i3.5583

Abstract

An organization must consider and manage the security of data storage in databases or databases, and special procedures are needed to protect data from various security risks. The problem in this study is that the population data contained in the Girisuko village administrative service information system has not been encrypted or secured. This can pose a risk that the data stored in the database can be intercepted and misused. In this study, the cryptographic technique used was a combination of the Vigenere Cipher and SHA 256 algorithms to secure or encrypt databases, especially population data in the Girisuko village administrative service information system. The text in the database is encrypted using the Vigenere Cipher, and SHA-256 is used to generate a hash value or a random value that is different from the text in the database. Messages will be encrypted using the Vigenere Cipher and then hashed with SHA-256 simultaneously. As a result, it will be difficult for an attacker to decrypt the text stored in the database because they have to break the Vigenere Cipher encryption, and also have to solve the hash value generated using SHA-256. This combination aims to increase security and maintain the confidentiality of messages from attackers. The application of the Vigenere Cipher and SHA to the village administration service information system application with a real-time database works well, as evidenced by the fast running-time of 0.39 seconds the data encryption process uses the Vigenere Cipher with 894,968 keys/second and an analyzed key length of 7 characters then text on population database successfully secured. By conducting this research, it is hoped that it can contribute to improving database system security.
PENGGUNAAN WIRESHARK DAN NESSUS UNTUK ANALISIS SSL/TLS PADA KEAMANAN DATA PENGGUNA WEBSITE Alfin Syarifuddin Syahab; Erik Iman Heri Ujianto; Rianto Rianto
Jurnal Informatika Vol 7, No 2 (2023): JIKA (Jurnal Informatika)
Publisher : University of Muhammadiyah Tangerang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31000/jika.v7i2.7566

Abstract

Perkembangan website di Indonesia meningkat signifikan dikarenakan bertambahnya pengguna layanan internet. Di sisi lain website yang memiliki data pengguna memiliki kerentanan. Serangan pada website dapat mengekploitasi sistem. Serangan tersebut dilakukan untuk mengetahui username, password, dan file sensitif. Protokol SSL/TLS merupakan bentuk keamanan pada web untuk komunikasi jaringan aman antara client dan server melalui koneksi terproteksi. Penelitian ini bertujuan untuk menganalisis SSL/TLS pada data pengguna website Badan Meteorologi Klimatologi dan Geofisika (BMKG) daerah X yang memberikan informasi cuaca dan iklim kepada masyarakat. Pengujian dilakukan menggunakan metode penelusuran paket data dengan aplikasi Wireshark dan menggunakan metode pemindaian website berupa vulnerability assessment dengan aplikasi Nessus. Hasil penelusuran paket data menunjukkan web server sudah diverifikasi sertifikat SSL/TLS dan server public key dengan protokol TLS 1.2 sehingga mampu melindungi data pengguna menggunakan enkripsi client dan server menggunakan algoritma hash SHA256. Hasil analisis pemindaian berupa vulnerability assessment menunjukkan level resiko keseluruhan adalah medium. Vulnerability priority rating (VPR) score menemukan tiga informasi kerentanan SSL/TLS yang membutuhkan tindakan evaluasi dan tindak lanjut dalam mengurangi resiko kerentanan website. Hasil penelusuran paket data dan vulnerability assessment pada SSL/TLS dapat membantu mengidentifikasi kelemahan sistem informasi website sehingga dapat menentukan langkah dalam penguatan performa keamanan website untuk melindungi dari serangan siber.
Convolutional Neural Network for Identifying Tree Species Using Stem Images Nadia Pramesti; Rianto Rianto
Telematika Vol 20, No 2 (2023): Edisi Juni 2023
Publisher : Jurusan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31315/telematika.v20i2.8774

Abstract

Purpose: Identification of tree species based on stem images using programming assistance to design an automation tool to be able to distinguish tree species directly based on stem images from the new data entered.Design/methodology/approach: Identifying tree species is usually done using leaf images, in previous studies related to identifying tree species based on leaf images this resulted in quite high accuracy but was felt to be not optimal. In this study, we used a convolutional neural network to compare the accuracy of bar images.Findings/result: from 1000 tree trunk image data, identification was carried out using the help of python with the CNN method it can be concluded that the test results used the best acuration at epoch 25 with a value reaching 96.80%Originality/value/state of the art: Research with theme identification of tree species based on stem images using the CNN method has never been done by previous researchers.