In the text mining there are stages that must be passed namely the text preprocessing stage. Text preprocessing is the stage to do the data selection process in each document, including case folding, tokenizing, filtering, and stemming. The results of the preprocessing process can affect the accuracy of document classification. In documents Bahasa Indonesia, there are still often over-stemming and under-stemming, so improvements are needed in the stemming process. In this study, it is proposed to use sastrawi libraries to improve the results of previous studies that are still not optimal in the results of preprocessing, especially in the filtering and stemming process. From the results of the study, the sastrawi library is able to reduce over stemming and under stemming and a faster processing time compared to using a Tala stemmer.
Dalam mendesain template aplikasi berbasis web, programmer web menggunakan sintaks-sintaks CSS untuk membuat tampilan menjadi lebih menarik. Dalam perkembangannya banyak tool-tool atau framework CSS yang dapat dimanfaatkan untuk mempercepat pengerjaan desain template web, diantaranya Gumby, Foundation, Less Framework, Blueprint CSS dan Twitter Bootstrap. Dari beberapa framework CSS tersebut, Twitter Bootstrap hadir dengan tutorial dan dokumentasi yang berlimpah serta memiliki fitur responsive. Pada penelitian ini penulis megimplementasikan framework Twitter Bootstrap pada perancangan aplikasi penerimaan mahasiswa baru berbasis web. Tahapan yang diambil dalam perancangan Aplikasi Penerimaan Mahasiswa Baru ini diawali dengan mendownload Twitter Bootstrap dari website resminya dan melakukan ekstraksi ke folder project setelah itu baru class-class yang disediakan oleh Twitter Bootstrap dapat dipanggil dalam pengerjaan desain aplikasi. Dengan penerapan framework twitter bootstrap ini pengerjaan desain aplikasi lebih cepat karena tidak perlu lagi memikirkan sintaks-sintaks css dan menghasilkan template yang responsive, ringan dan simple.
Dengue Hemorrhagic Fever (DHF) is a disease caused by the dengue virus which is transmitted by Aedes Aegypty, and Aedes Albopictus (DHF) mosquitoes is a disease caused by the dengue virus transmitted by mosquitoes Aedes Aegypty and Aedes Albopictus. There are three categories of DHF with different symptoms; the first category is called Dengue Fever (DF), the symptoms of DF are characterized by fever, these symptoms are almost the same as symptoms of typhoid or Typhoid Fever (TF). The second category is Dengue Hemorrhagic Fever (DHF) symptoms of DHF characterized by fever, nausea, vomiting, red spots, and nosebleeds. The last category is dengue shock syndrome (DSS) the advanced category of DHF. To determine the level of DHF disease experienced by patients with a background of various symptoms, the DHF disease classification study was conducted using the ID3 algorithm. It is hoped that this study can help doctors diagnose DHF disease. The achievement of predictions from research using the ID3 algorithm can produce an approach in the form of symptoms that affect the level of DHF disease with an accuracy rate of 82%.
Key-based security is still the most widely used form of security today with a key distribution process between senders and receivers that is commonly perform and also it is a classic problem in cryptography where key must be share to other parties (sender or receiver) and its maybe known when third parties do sniffing process or man in the middle attack. Three-Pass Protocol is one solution that can be used to overcome the problem of key distribution, because the sender and receiver can encrypt and decrypt without need to exchange keys. Security in Three-Pass Protocol uses XOR logic so that the resulting ciphertext will be very easy to decrypt by those who are not responsible, to improve data security in the Three-Pass Protocol process which is use Caesar Cipher and Vigenere Cipher algorithms in the encryption and decryption process in the Pass Protocol scheme, and ciphertext encryption results are quite difficult to read and require a long time to decrypt them.
The Bangil District Court is an IB class court that handles a large number of case cases. Every year more and more case cases are included in the Bangil District Court, but not all case cases are in a mutation status. By using classification techniques that can process large amounts of data to find patterns that occur in case data. Data processing is used to predict case minutation with the decision tree method using ID3 algorithm. Case data has 8 attributes and has been classified into 6 parts, namely division based on Case Type, Register, Case Classification, Length of Process, Public Prosecutor and Decision with a goal of Mutation Status. Weka 3.6 is an API that is used to build rules / rule bases. The rule that was formed was then implemented in the making of a case status prediction application in the web-based Bangil District Court.
Puji syukur kepada Tuhan Yang Maha Esa, sehingga Usulan Buku Text Mining ini dapat disusun dengan baik dan selesai pada waktu yang telah ditentukan oleh Universitas Muhammadiyah Sidoarjo khususnya Direktorat Akademik yang bersedia untuk mengeluarkan dana dalam penulisan buku ajar ini. Penulisan buku ajar ini ditulis dalam 8 BAB secara garis besar, berdasarkan pengalaman penulis didunia kerja serta diambil dari hasil penelitian baik dari hasil penelitian mandiri maupun dari pendanaan Kemenristekdikti yang penulis dapatkan. Tak lupa kami juga mengucapkan terima kasih kepada: 1. Dr. Hidayatulloh, M.Si selaku Rektor Universitas Muhammadiyah Sidoarjo yang telah memberikan dan memfasilitasi dalam penulisan buku ajar ini. 2. Direktorat Akademik Universitas Muhammadiyah Sidoarjo yang telah memfasilitasi dan mengkoordinasi dalam penulisan buku ajar ini. 3. Dr. Hindarto, S.Kom, MT. selaku Dekan Fakultas Teknik, Universitas Universitas Muhammadiyah Sidoarjo yang telah memberikan dukungan untuk mengikuti penulisan buku ajar ini. 4. Dosen-dosen Teknik Informatika Universitas Universitas Muhammadiyah Sidoarjo yang telah memberikan dukungan untuk mengikuti penulisan buku ajar ini. 5. Para narasumber yang penulis tidak dapat sebutkan satu persatu yang telah banyak membantu, atas pengetahuan dan keterampilan yang diberikan dalam penyusunan penulisan buku ajar ini. 6. Aslab Teknik Informatika dan mahasiswa Teknik Informatika yang penulis tidak dapat sebutkan satu persatu yang telah banyak membantu, atas pengetahuan dan keterampilan yang diberikan dalam penyusunan penulisan buku ajar ini.
This research is purpose to design a virtual machine to simulate cyber attacks and find out how to design and build a virtual machine with a security gap that has been designed, so that it is used as education for web and server developers. The method used in building this system is the waterfall method which starts from designing a system to make it easier to build a system and then collecting data using observations to students of informatics engineering and computer engineering. The results of this system show that the system is able to run well, the guide for working on questions can be understood by the player, the player can inputs flags without problems, the clues provided are understandable and the educational videos provided are easy to understand. From the explanation aboce, the researchers concluded that this system can provide questions and education well
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.