Sistem Pengamanan Ponsel melalui Penyaringan Kata dengan Metode Levenshtein Distance
Keywords:
word filter, Levenshtein Distance, smartphoneAbstract
In this digital era, there are a lot of smartphone users, especially children and teenagers. With this smartphone, there are various kinds of information media that can be obtained easily through various online media such as online games, online information media, social media, pornography very easily. The ease of accessing various kinds of online media often occurs in technology such as for violence and for pornography. It is this background that requires a security system on cellphones/smartphones through words that apply the Levenshtein Distance method. The purpose of this study is to provide security for children to avoid accessing links that are not liked by children. The results of the research on testing the word assessment feature for each word typed into the keyboard by applying the Levenshtein Distance method. The filtered words are as expected, which is reaching 100%, which is very effective to use. So that the use of smartphones, especially among children and adolescents, can be more controlled in accessing information.
References
R. S. Rahayu and O. O. Sharif, “Analisis Customer Value Index dalam Memilih Smartphone di Indonesia 2019,” e-Proceeding Manag., vol. 6, no. 1, pp. 31–38, 2019.
S. S. Nasution, “Perilaku Pencarian Informasi Pengguna Dinas Perpustakaan dan Kearsipan Kabupaten Asahan,” 2019.
S. N. R. Ali, “Analisis Pengaruh Konten Negatif Internet Terhadap Fungsi Prefrontal Cortex Pada Usia 18-19 Tahun,” Ina. June, vol. 25, 2019.
T. Wahyudi, “Paradigma Pendidikan Anak dalam Keluarga di Era Digital (Perspektif Pendidikan Islam),” Ri’ayah J. Soc. Relig., vol. 4, no. 01, pp. 31–43, 2019.
A. Irawan, “Aktivitas Anak-Anak Dan Pemuda Dalam Penggunaan Internet,” Cyber Secur. dan Forensik Digit., vol. 1, no. 2, pp. 50–56, 2019.
I. Afrianto and E. B. Setiawan, “Kajian virtual private network (vpn) sebagai sistem pengamanan data pada jaringan komputer (studi kasus jaringan komputer unikom),” Maj. Ilm. UNIKOM, vol. 12, no. 1, pp. 43–52, 2015, doi: 10.34010/miu.v12i1.34.
B. D. Bagus Agung Nugroho, Ryandika Taufik, Tesa Putri Dewi, Della Yudistira, “Penyalahgunaan Aplikasi Broadcast Yang Mengacu Pada Pornografi,” pornografi, pp. 60–69, 2017.
Z. Musliyana, T. Y. Arif, and R. Munadi, “Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia,” J. Rekayasa Elektr., 2016, doi: 10.17529/jre.v12i1.2896.
D. Rosmala and Z. M. Risyad, “Algoritma Levenshtein Distance dalam Aplikasi Pencarian isu di Kota Bandung pada Twitter,” MIND J., vol. 2, no. 2, pp. 1–12, 2018, doi: 10.26760/mindjournal.v2i2.1-12.
A. Isbad, A. Gurning, and A. Adawiyah, “Penerapan Fuzzy String Matching Pada Aplikasi Pencarian Tugas Akhir Mahasiswa Jurusan Sistem Informasi Berbasis Web ( Studi Kasus?: Fakultas Sains dan Teknologi UIN Suska Riau ),” vol. 2, no. 1, pp. 54–59, 2016.
R. M. Abraham, S. N. Nishikant Chakradeo, R. J. Subalakshmi, and N. C. S. N. Iyengar, “Use of Edit Distance Algorithm to Search a Keyword in Cloud Environment,” Int. J. Database Theory Appl., vol. 7, no. 6, pp. 223–232, 2014, doi: 10.14257/ijdta.2014.7.6.20.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Adnan Zulkarnain, Poerbaningtyas E, Dwify O Risqoni

This work is licensed under a Creative Commons Attribution 4.0 International License.
http://creativecommons.org/licenses/by/4.0