Plagiarisme merupakan isu yang santer berkembang khususnya di Perguruan Tinggi. Perpustakaan di Fasilkom UPN “Veteran” Jawa Timur telah memiliki sistem pencatatan skripsi mahasiswa yang bernama E-Read, seringkali mahasiswa yang akan menempuh skripsi akan mencari ide topik dan literatur pada perpustakaan. Untuk meminimalkan kemungkinan terjadinya plagiasi maka sistem E-Read dilengkapi dengan fitur plagiarsm checker yang dibangun pada penelitian ini. Plagiarsm Checker dibuat melalui tahapan pengembangan terstruktur menggunakan metode Waterfall yang terdiri dari analisis kebutuhan, perancangan, implementasi, dan pengujian sistem. Algoritma Jaro Winkler dipilih untuk mendeteksi similaritas dokumen abstrak calon skripsi dengan abstrak-abstrak yang telah tersimpan pada basis data E-Read karena berdasarkan penelitian terdahulu dinyatakan memiliki akurasi yang baik dan waktu komputasi yang cepat. Berdasarkan pengujian terhadap akurasi sistem, maka didapatkan plagiarsm checker yang dibangun memiliki akurasi 40% jika dibandingkan dengan pendapat ahli, nilai presisi 33,3%, recall 100%, dan F-Measure 35%. Selain itu berdasarkan analisis terhadap proses komputasi algoritma Jaro Winkler maka didapatkan bahwa algoritma ini berfokus pada pencarian kesamaan karakter sesuai range uji yang ditentukan, hal ini berarti bahwa algoritma ini belum memiliki mekanisme pengecekan makna kata yang seharusnya diperlukan dalam sistem pengecekan plagiasi dokumen. Melalui penelitian ini, mahasiswa dapat melakukan pengecekan awal abstrak dari calon skripsinya untuk meminimalkan terjadinya plagiasi.
Pattern classification is one of the relevant problems in Artificial Intelligence. Neural networks have been studied as one of the most successful methods for pattern classification. Classical perceptron can only solve linear classification problems. Morphological Neural Networks (MNN) is an alternative way to solve classification problems in the form of linear and nonlinear. Dendrite Morphological Neural Networks (DMNN) is introduced as an improved method of classical MNN. The important problem that occurs in the DMNN training algorithm is to cluster objects with hyper boxes and classify each in the corresponding class. This paper presents the proposed training algorithm using K-medoids clustering algorithm to create the hyper boxes in the dimensional space. Kmedoids is better than other clustering methods in execution time and not sensitive to outliers. The implementation of the proposed algorithm will be involved in various simulations using artificial data sets and compared with other methods to evaluate the performance of this method in future work.
PPTP (Point-to-Point Tunneling Protocol) is a network protocol used in the implementation of Virtual Private Networks (VPN). PPTP uses a client-server design that operates at Layer 2 of the OSI model. Network administrators require the existence of performance testing Point to point protocol and VPN network topology; this can be done with the result of simulation of computer networks. This research will discuss about the level of performance and security of PPTP to sniffing in VPN network. Simulations were performed with an average file packet delivery scenario of 500 MB. Graphical Network Simulator-3 (GNS3) is a network software emulator. This allows a combination of virtual and real devices, used to simulate complex networks. The simulation will be done using a VPN network and not using VPN by using GNS3 network simulation tool. Measurement of performance and security analysis is obtained by using Wireshark. The simulation results of the test will produce data to be used in the analysis process. PPTP performance analysis is performed in testing data transfer using FTP protocol when using the VPN network and not using VPN network. Performance parameters measured using Wireshark include throughput and delay. Testing is done by transferring data from the FTP protocol using a VPN network and not using a VPN network. The data transfer test results will get the parameters of output, delay, and data level of confidentiality. The best throughput values give results, data transfers that not use VPN are higher than using a VPN with an average yield of 153 KB and a delay in the network that does not use a VPN that is 0.0032 MS. Data transmission process from both methods shows the security of the FTP protocol, this concludes the security of the PPTP VPN protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.