A deliberate falsehood intentionally fabricated to appear as the truth, or often called as hoax (hocus to trick) has been increasing at an alarming rate. This situation may cause restlessness/anxiety and panic in society. Even though hoaxes have no effect on threats, however, new perceptions can be spread that they can affect both the social and political conditions. Imagery blown from hoaxes can bring negative effects and intervene state policies that may decrease the economy. An early detection on hoaxes helps the Government to reduce and even eliminate the spread. There are some system that filter hoaxes based on title and also from voting processes from searching processes in a search engine. This research develops Indonesian hoax filter based on text vector representation based on Term Frequency and Document Frequency as well as classification techniques. There are several classification techniques and for this research, Support Vector Machine and Stochastic Gradient Descent are chosen. Support Vector Machine divides a word vector using linear function and Stochastic Gradient Descent divides a word vector using nonlinear function. SVM and SGD are chosen because the characteristic of text classification includes multidimensional matrixes. Each word in news articles can be modeled as feature and with Linear SVC and SGD, the feature of word vector can be reduced into two dimensions and can be separated using linear and non-linear lines. The highest accuracy obtained from SGD classifier using modified-huber is 86% over 100 hoax and 100 nonhoax websites which are randomly chosen outside dataset which are used in the training process.
Texture is one of the most important features for image analysis, which provides informations such as the composition of texture on the surface structure, changes of the intensity, or brightness. Gray level co-occurence matrix (GLCM) is a method that can be used for statistical texture analysis. GLCM has proven to be the most powerful texture descriptors used in image analysis. This study uses the four-way GLCM 0o, 45o, 90o, and 135o. Support vector machine (SVM) is a machine learning that can be used for image classification. SVM has a high generalization capability without any requirement of additional knowledge, even with the high dimension of the input space. The data used in this study are the image of goat meat, buffalo meat, horse meat, and beef with shooting distance 20 cm, 30 cm and 40 cm. The result of this study shows that the best recognition rate of 87.5% was taken at a distance of 20 cm with neighboring pixels distance d = 2 in the direction GLCM 135o.
-In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .Key Terms: cryptographic, RSA, encryption, decryption, java I. PENDAHULUAN EJALAN dengan perkembangan teknologi, semakin mengubah cara masyarakat dalam berkomunikasi. Dulu komunikasi jarak jauh masih menggunakan cara yang konvensional, yaitu dengan cara saling mengirim surat, tetapi sekarang komunikasi jarak jauh dapat dilakukan dengan mudah dan cepat yaitu dengan adanya teknologi seperti email, layan pesan singkat (sms), dan Internet yang merupakan salah satu teknologi telekomunikasi yang paling banyak digunakan.Pada proses pengiriman data (pesan) terdapat beberapa hal yang harus diperhatikan, yaitu : kerahasiaan, integritas data, autentikasi dan non repudiasi. Oleh karenanya dibutuhkan suatu proses penyandian atau pengkodean pesan sebelum dilakukan proses pengiriman. Sehingga pesan yang dikirim terjaga kerahasiaannya dan tidak dapat dengan mudah diubah untuk menjaga integritas pesan tersebut. Ilmu yang mempelajari tentang cara-cara pengamanan data dikenal dengan istilah Kriptografi, sedangkan langkah-langkah dalam kriptografi disebut algoritma kriptografi. Berdasarkan dari kunci yang digunakan algoritma kriptografi dapat dibagi menjadi dua, Algoritma Simetrik dan Algoritma Asimetrik. Dimana Algoritma Simetrik menggunakan satu kunci untuk proses enkripsi dan dekripsinya. Sedangkan Algoritma Asimetrik menggunakan dua kunci berbeda untuk proses enkripsi dan dekripsinya, yaitu kunci umum (public key) yang digunakan untuk proses enkripsi yaitu perubahan data teks asli (plain text) menjadi teks rahasia (cipher text) yang sifatnya tidak rahasia, dan kunci pribadi (private key) yang digunakan untuk proses dekripsi yaitu pengembalian data teks rahasia (cipher text) menjadi teks asli (plain text) yang sifatnya rahasia dan masing-masing pihak memiliki kunci pribadi yang berbeda. Penggunaan kunci pribadi dapat digunakan untuk autentikasi (pengenalan identitas pengirim) dan non repudiasi (pencegahan penyangkalan pengiriman data) ...
Resources of humans is one of the assets of the organization that became the backbone of an organization in carrying out its activities and influence on the performance and progress of the organization. Systematic performance assessment and selection of employees with the best performance for the determination of a promotion is very important in strategic human resource management. But in fact the decision objectively, efficiently and effectively perform the selection of human resources is not easy, we need a model of decision-making to help solve that problem. Application of AHP and Fuzzy TOPSIS in the selection of this promotion can be provide alternative recommendations for decision-makers, so that the employee selection process can take place effectively and efficiently and to produce objective decisions. Implementation results of the study for the selection of a promotion with six criteria assessment criteria weighting the results obtained using the AHP Performance Value of 0,3509, Education Level of 0,1605, Class of 0,1005, Work period of 0,0367, The Presence of 0,0637 and the value of the competence of 0.2877. The weighting of the results was continued process of ranking the alternatives by using fuzzy TOPSIS method obtained the best results and the selected preference is for 0.8373
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.