Antivirus : Jurnal Ilmiah Teknik Informatika https://ejournal.unisbablitar.ac.id/index.php/antivirus <p>Memuat hasil penelitian dan kajian kritis bidang teknologi informasi, teknlogi informasi elektronik, inovasi dan rekayasa informatika.</p> en-US <div class="page"> <p>Authors who publish with this journal agree to the following terms:</p> <ol> <li>Copyright on any article is retained by the author(s).</li> <li>Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> <li>The article and any associated published material is distributed under the&nbsp;<a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a></li> </ol> </div> jurnal.antivirus@gmail.com (Sri Lestanti) lestanti85@gmail.com (Sri Lestanti) Fri, 15 Nov 2024 08:36:25 +0700 OJS 3.1.2.4 http://blogs.law.harvard.edu/tech/rss 60 DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3369 <p><em>The rapid development of data drives the need for security in the data transmission process, with the aim of preventing access by unwanted parties to view the contents of the data sent. In order to achieve an optimal level of security, one of the strategies used is the application of cryptography. Cryptography using the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) algorithms separately has often been used to protect the security of messages, whether in the form of text or digital images. This research will utilize a combination of the AES and RSA algorithms. This merger aims to ensure that the RSA algorithm can play a role in encrypting secret keys, while the AES algorithm is used to secure the original text (plaintext). The sender will receive the private key, encrypted secret key, and ciphertext. The recipient decrypts the secret key first using the RSA algorithm, and after obtaining the secret key, decrypts the ciphertext using the AES algorithm along with the previously decrypted secret key. It is hoped that this research will provide better security for sending information because the process of reading the contents of a secret message must go through both combination algorithms.</em></p> Hedy Sholihat Ruhaedi, Alam Rahmatulloh Copyright (c) 2024 Antivirus : Jurnal Ilmiah Teknik Informatika https://creativecommons.org/licenses/by-sa/4.0 https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3369 Fri, 15 Nov 2024 00:00:00 +0700 DESIGNING UI/UX DESIGN OF MOBILE APPLICATION AT SOLARIA RESTAURANT USING LEAN UX METHOD https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3777 <p><em>The rapid development of information technology encourages companies in various sectors to adopt mobile applications to improve customer experience and operational efficiency. Solaria, a leading fast food restaurant in Indonesia, needed to design an optimal user interface (UI) and user experience (UX) for its mobile application. This research aims to design the UI/UX of the Solaria app using the Lean UX method. The research method involves several stages: customer interviews and questionnaires to understand user needs, wireframes and initial prototypes, testing and iteration based on user feedback, and final evaluation of the refined prototype. The result of this research is a relevant and user-friendly design. This research is expected to serve as a reference for mobile application developers to be able to make a full application.</em></p> Yoga Setia Putra, Mochzen Gito Resmi, Muhamad Agus Sunandar Copyright (c) 2024 Antivirus : Jurnal Ilmiah Teknik Informatika https://creativecommons.org/licenses/by-sa/4.0 https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3777 Fri, 15 Nov 2024 00:00:00 +0700 APPLICATION OF DIJKSTRA'S ALGORITHM IN DETERMINING THE SHORTEST ROUTE TO MRICAN LANDFILL https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3785 <p><em>This research explores the implementation of Dijkstra's Algorithm to determine the shortest route in waste management, particularly from Temporary Disposal Sites (TPS) to the Mrican Final Processing Site (TPA). With advancements in information technology, determining an efficient waste collection route is crucial for reducing operational costs, travel time, and fuel consumption. This study utilizes historical data and current road conditions to simulate routes, addressing challenges such as traffic congestion and unpredictable road conditions. Dijkstra's Algorithm has been proven effective in previous studies in transportation and logistics contexts, and is thus adopted in this study. The results show that applying this algorithm can enhance waste transportation efficiency, providing practical solutions for TPA Mrican management to optimize collection routes, reduce operational costs, and improve collection time efficiency.</em></p> <p>&nbsp;</p> Fakih Kuncoro, Ismail Abdurrozzaq Zulkarnain, Ghulam Asrofi Buntoro Copyright (c) 2024 Antivirus : Jurnal Ilmiah Teknik Informatika https://creativecommons.org/licenses/by-sa/4.0 https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3785 Fri, 15 Nov 2024 00:00:00 +0700 SENTIMENT ANALYSIS ABOUT UNHAN RI THROUGH TWITTER SOCIAL MEDIA https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3902 <p><em>This study aims to determine public opinion regarding Universitas Pertahanan Republik Indonesia</em><em> (UNHAN RI). As a new university, responses regarding public opinion need to be carried out so that the university can provide better services and educational programs. To see the public response to UNHAN RI, a Machine Learning method is used, namely Naïve Bayes. This Naïve Bayes modeling can help to classify public sentiment analysis towards UNHAN RI. By</em><em> Naïve Bayes modeling, an accuracy value of 60.78% was obtained with three classification results, namely positive, negative, and neutral. The largest classification results were obtained in the positive class of 60.8%, the neutral class of 33.3%, and the negative class of 5.9%..</em></p> Nadiza Lediwara, Sembada Denrineksa Bimorogo, Aulia Khamas Heikmakhtiar, Ido Jaya Gainal, Sufi Naylil Karomah, Khazali Fahmi Copyright (c) 2024 Antivirus : Jurnal Ilmiah Teknik Informatika https://creativecommons.org/licenses/by-sa/4.0 https://ejournal.unisbablitar.ac.id/index.php/antivirus/article/view/3902 Fri, 15 Nov 2024 12:27:14 +0700