Claim Missing Document
Check
Articles

Label Propagation Dalam Klasifikasi Kualitas Produk E-Commerce Menggunakan XGBOOST Dengan Random Search Dan BOHB Putra, Dion Revaldy; Umbara, Fajri Rakhmat; Ilyas, Ridwan
Jurnal Locus Penelitian dan Pengabdian Vol. 4 No. 9 (2025): : JURNAL LOCUS: Penelitian dan Pengabdian
Publisher : Riviera Publishing

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58344/locus.v4i9.4718

Abstract

E-commerce telah menjadi salah satu sektor yang berkembang pesat di era digital, didorong oleh perubahan pola konsumsi masyarakat dan inovasi teknologi. Namun, klasifikasi kualitas produk pada platform e-commerce tetap menjadi tantangan yang kompleks, terutama karena adanya volume data besar, ketidakseimbangan data, dan keragaman atribut produk. Penelitian ini bertujuan untuk mengoptimalkan klasifikasi kualitas produk e-commerce dengan menggunakan algoritma Extreme Gradient Boosting (XGBoost) yang telah terbukti andal dalam menangani data besar dan kompleks. Untuk meningkatkan akurasi model, penelitian ini mengintegrasikan optimasi hyperparameter menggunakan random search dan transformasi data dengan standardization. Pendekatan penelitian mencakup pengumpulan data dari platform e-commerce, pemrosesan data, pembentukan fitur, pembangunan model prediktif, serta evaluasi kinerja model. Dengan menerapkan metode ini, penelitian diharapkan mampu menghasilkan model klasifikasi dengan performa optimal, mengidentifikasi variabel-variabel penting yang memengaruhi kualitas produk, serta memberikan rekomendasi strategis bagi pelaku industri e-commerce.
Mosquito Species Classification Using Wingbeat Acoustic Signals Based on Bidirectional Long Short-Term Memory Dwifani, Bella Melati Wiranur; Kasyidi, Fatan; Ilyas, Ridwan
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4922

Abstract

The increasing prevalence of mosquito-borne diseases such as Dengue, chikungunya, and malaria underscores the urgent need for effective mosquito vector monitoring. This study proposes a non-invasive classification system of mosquito species based on wingbeat acoustic signals using a deep learning approach with Bidirectional Long Short-Term Memory (BiLSTM). The audio dataset was collected from the Wingbeats repository, consisting of six major mosquito species. Preprocessing was performed using Discrete Wavelet Transform (DWT) to reduce noise. Feature extraction combined Linear Predictive Coding (LPC) and Mel-Spectrogram to represent spectral and temporal signal characteristics. Each binary model was trained in a one-vs-rest scheme to recognize a target species against others, and a BaggingClassifier was used to fuse predictions from six BiLSTM models. Evaluation showed that the proposed system achieved a final accuracy of 96.85% and F1-score of 95.03%, with confusion matrices showing near-diagonal performance. The results indicate that the hybrid LPC-Mel features and ensemble BiLSTM architecture are effective for mosquito species classification using acoustic signals.
A BiLSTM-Based Approach For Speech Emotion Recognition In Conversational Indonesian Audio using SMOTE Nur Shabrina, Nariswari; Kasyidi, Fatan; Ilyas, Ridwan
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.5183

Abstract

Speech Emotion Recognition (SER) identifies human emotions through voice signal analysis, focusing on pitch, intonation, and tempo. This study determines the optimal sampling rate of 48,000 Hz, following the Nyquist-Shannon theorem, ensuring accurate signal reconstruction. Audio features are extracted using Mel-Frequency Cepstral Coefficients (MFCC) to capture frequency and rhythm changes in temporal signals. To address data imbalance, Synthetic Minority Over-sampling Technique (SMOTE) generates synthetic data for the minority class, enabling more balanced model training. A One-vs-All (OvA) approach is applied in emotion classification, constructing separate models for each emotion to enhance detection. The model is trained using Bidirectional Long Short-Term Memory (BiLSTM), capturing contextual information from both directions, improving understanding of complex speech patterns. To optimize the model, Nadam (Nesterov-accelerated Adaptive Moment Estimation) is used to accelerate convergence and stabilize weight updates. Bagging (Bootstrap Aggregating) techniques are implemented to reduce overfitting and improve prediction accuracy. The results show that this combination of techniques achieves 78% accuracy in classifying voice emotions, contributing significantly to improving emotion detection systems, especially for under-resourced languages.
SAER : Comparison of Rule Prediction Algorithms on Constructing a Corpus for Taxation Related Tweet Aspect-Based Sentiment Analysis Sopian, Annisa Mufidah; Ilyas, Ridwan; Kasyidi, Fatan; Hadiana, Asep Id
JOIN (Jurnal Online Informatika) Vol 9 No 1 (2024)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v9i1.1275

Abstract

Twitter is a popular social media in Indonesia, and sentiment analysis on Twitter has an important role in measuring public trust, especially in taxation issues. Aspect extraction is an important task in sentiment analysis. In this research, we propose SAER, a Syntactic Aspect-opinion Extraction and Rule prediction, that used language rule-based approach using syntactic features for aspect and opinion extraction, and we compare several algorithm for rule prediction such as Random Forest Regression, Decision Tree Regression, K-Nearest Neighbor Regression (KNN), Linear Regression, Support Vector Regression (SVR), and Extreme Gradient Boosting Regression (XGBoost) that can generate rules with a tree-based approach. By employing syntactic features and rule prediction, it has been able to explore important features in a sentence. In rule prediction, comparison results show that Support Vector Regression (SVR) was identified as the most effective model for aspects rule prediction, providing the best results with a Mean Squared Error (MSE) of 0.022, Root Mean Squared Error (RMSE) of 0.150, and Mean Absolute Error (MAE) of 0.123. While XGBoost was identified as the most effective model for opinions rule prediction, with MSE of 0.013, RMSE of 0.117, and MAE of 0.075. Since we used syntactic feature-based approaches and rule prediction in this work, it is expected to be implemented for other cases, with other domain datasets.
Object Detection of BISINDO Sign Language Letters Using Residual Network Eriyadi, Maulidina Norick; Ilyas, Ridwan; Abdillah, Gunawan; Hadiana, Asep Id
Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika Vol. 10 No. 1 (2024): April 2024
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v10i1.3670

Abstract

Indonesian Sign Language or BISINDO is an alternative language used by people who suffer from disabilities, especially those who have hearing impairments. This language grew and developed from the deaf community, so its use is based on the visual aspect. This research aims to apply Residual Networks to detect objects in the context of Bisindo Letter Sign Language, with the hope of increasing accuracy and efficiency in letter recognition. Object detection goes through 2 stages, namely feature extraction and model training. ResNet is a type of Convolutional Neural Network (CNN) architecture that utilizes models that have been previously trained, so it can save the time required in the model development process. In this research, Residual Network (ResNet) was used for feature extraction to recognize important aspects in the Bisindo letter sign image, such as hand position, finger shape characteristics, and direction of movement. The research results show that the new dataset used as training data and test data has a fairly good ability to detect with a division of 70% train set, 20% valid set and 10% test set with size 640x640 with 300 epochs for the training model.
Prediksi Capaian Bulanan Pajak Daerah Kabupaten Bandung Barat Menggunakan Metode Logistic Regression Ramdhani, Muhammad; Umbara, Fajri Rakhmat; Ilyas, Ridwan
Journal of Information System Research (JOSH) Vol 5 No 4 (2024): Juli 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v5i4.5330

Abstract

Tax is the main source of income for the state, so that tax revenue is the biggest contributor to government agencies. However, the Regional Revenue Agency (BAPENDA) sometimes has difficulties in predicting regional monthly income. The data owned by BAPENDA is very important for estimating tax increases every month, but often these estimates are wrong. Therefore, research on predicting monthly tax ACHIEVEMENT is very helpful. Researchers consider the data mining method approach is a technique that can help BAPENDA find predictive patterns that are important for making tax increase decisions. sebumnya has predicted the results of the Ann method where for neurons 20 it produces an rmse prediction of 0.12. In this study, the logistic regression algorithm approach was used to predict regional tax achievements in West Bandung Regency. In addition, experiments were carried out to evaluate which variables affect the probability value.
PRIMARY QUERY ANALYSIS ON SQL DATABASE RESTRUCTURING IN GEOGRAPHIC INFORMATION SYSTEMS Ilyas, Ridwan; Witanti, Wina; Syarafina, Fildzah
JIKO (Jurnal Informatika dan Komputer) Vol 7, No 2 (2024)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v7i2.8565

Abstract

Database restructuring is a crucial process aimed at enhancing data management and access efficiency by modifying the existing data structure. This research focuses on improving a Geographic Information System (GIS) for taxation by migrating and restructuring an inefficient and redundant database. The study conducts a comparative performance evaluation of the old and restructured databases using benchmarking tests with varying numbers of threads and ramp-ups. The results reveal a significant increase in average throughput (24.60%) following the restructuring, indicating a substantial improvement in the database's data processing capacity. However, there is also an average increase in response time (21.65%), suggesting a trade-off between enhanced throughput and slower response times. This increase in response time indicates that while the system can handle more data, it requires more time to process each query. Overall, the restructured database demonstrates enhanced performance and efficiency, though further optimization is necessary to achieve consistent throughput across different workloads and to mitigate the increased response times
Eksploitasi Broken Access Control Untuk Eskalasi Hak Akses Pada LMS Universitas XYZ Muhammad, Azri; Hadiana, Asep Id; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2287

Abstract

This study aims to identify and exploit security vulnerabilities in the Learning Management System (LMS) of a university, with a primary focus on Broken Access Control (BAC) flaws resulting from misconfigurations in user access settings. With the rising threat of data breaches, this research also analyzes the extent to which security principles are applied to protect sensitive LMS user data—an increasingly critical issue in the digital era.The research approach began with the signing of a Non-Disclosure Agreement (NDA) to ensure the confidentiality of information, followed by an analysis of existing vulnerability assessment reports. Penetration testing was then conducted to identify potential unauthorized privilege escalation and further exploitation of vulnerabilities within the system. The analysis revealed a BAC vulnerability that allowed attackers to modify user roles without authorization. Additionally, it identified the use of the outdated MD5 hashing algorithm and the insecure storage of sensitive data on the client side without proper encryption. The exploitation of these vulnerabilities demonstrated that an attacker could gain administrator access simply by manipulating user roles, thereby enabling access to over 117,000 user records, including personal information and health history.This research contributes in three main aspects: first, an in-depth identification of critical vulnerabilities within the LMS, particularly concerning weak access control and inadequate data protection; second, a demonstration of how BAC exploitation can lead to the leakage of sensitive data in higher education environments; and third, the provision of mitigation recommendations based on current security best practices, such as the implementation of Role-Based Access Control (RBAC), the principle of least privilege, stricter role validation, Zero Trust Architecture, and the integration of artificial intelligence (AI) to detect threats early and provide automated responses to potential attacks.It is expected that this research can serve as a guideline for educational institutions in strengthening LMS security systems and more effectively protecting user data.
Pemanfaatan Open-Source Intelligence untuk Deteksi dan Penanganan Cybercrime Judi Online Berbasis Forensik Digital Ramdani, Maullidan Alfa Rizki Fikri; Hadiana, Asep Id; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2314

Abstract

The phenomenon of cybercrime related to online gambling is increasing in Indonesia, with web defacement attacks and backdoor insertion on websites that damage the psychological aspects of players and the family economy. This research aims to identify and analyze the threats posed by online gambling through Open-Source Intelligence (OSINT) and penetration testing methods. Using the Google Dorking technique, OSINT successfully identified sites involved in online gambling, while penetration testing uncovered system weaknesses that perpetrators exploit, such as SQL Injection and Cross-Site Scripting (XSS), which allow backdoor insertion. The results of this study demonstrate the effectiveness of OSINT and penetration testing in identifying sites that are vulnerable to attacks as well as loopholes that are often exploited by perpetrators. In addition, this research highlights the importance of digital forensics in handling legitimate electronic evidence for the court. As a scientific contribution, this research proposes the development of more accurate backdoor detection tools, the improvement of web security systems, as well as the implementation of rapid response in dealing with online gambling threats. This research is expected to assist the government and society in addressing cybercrime threats in Indonesia and strengthen policies and strategies to protect digital infrastructure.
Pengembangan Aplikasi Multimedia untuk Edukasi Sejarah pada Zaman Megalitikum Di Indonesia pada Platform Mobile Ihsan, Aminuddin; Yuniarti, Rezki; Ilyas, Ridwan
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2522

Abstract

This research developed a two-dimensional (2D) educational game themed on the history of the Megalithic Age in Indonesia for mobile platforms using the Rapid Prototyping method and Unity Engine. The aim was to provide interactive learning media that combines historical narratives with exploration-based game mechanics and puzzle solving. The development process included visual asset design, prototyping, and alpha and beta testing. Beta testing involved 20 respondents from junior high and high school levels, resulting in a satisfaction rate of 71.5% (Agree category) based on the Likert Scale, which indicates positive acceptance of the gameplay and educational content. The limitations of the study include the scope of historical material, which only covers the early Megalithic period, the limited number of respondents, and the difficulty level adjustment, which is not yet optimal for all age groups. Further development is recommended to expand the variety of missions, enrich historical content with the latest research references, and add analytical features to monitor user learning achievements.
Co-Authors Achmad Aziz Adriana, Reyhan Agung Besti Agus Komarudin Akbar, Tzazkia Febriyana Aminuddin Ihsan, Aminuddin Ari Sri Windyaswari Ari Sri Windyaswari, Ari Sri Ariq Irawan, Muhamad Asendra, Irfan Asep Saepul Ridwan Ashaury, Herdy Aziz, Achmad Azmira Mifti Harjana Besti, Agung Chandani Nurul Hafizah Destri Wulansari Dhimas Ariya Wibiksana Djamal, Esmeralda Contesa Dwi Hendratmo Widyantoro Dwifani, Bella Melati Wiranur Eddie Khrisna Putra Eriyadi, Maulidina Norick Esmeralda C Djamal Esmeralda C Djamal Esmeralda C. Djamal Esmeralda C. Djamal Esmeralda Contessa Djamal Fadhilahsyah Ramadhan, Muhammad Diky Fahrauk Faramayuda, Fahrauk Fajri Rakhmat Umbara Fajri Umbara Fatimah Indrianti, Nisa Fitri Nur Suciani Gunawan Abdillah Gunawan Abdillah, Gunawan Hadiana, Asep Id Hidayat, Ferdian Afza Iqbal Prayoga Willyana Ismail, Nursafira Khairunnisa Iyan Taufik Hidayat Janjan Nurjaman Kania Ningsih, Ade Kasyidi, Fatan Luthfi Ahmad Fadhil Masayu Leylia Khodra Maulidina Norick Eriyadi Melina Melina Muhamad Ramdan, Muhamad Muhamad Rizal Firmansyah Muhammad Ramdhani, Muhammad Muhammad, Azri Naufal Akhfasy, Muhammad Neneng Nurhamidah NIDA MUTHI ANNISA Nur Shabrina, Nariswari Nurhamidah, Neneng Nursafira Khairunnisa Ismail Nurul S, Puspita Nurul Sabrina, Puspita Paramita, Veronika Santi Purnama Ginandjar, Ichas Putra, Dion Revaldy Putri, Dhiffa Namira Alifia Ramdani, Maullidan Alfa Rizki Fikri Ramdhan, Edvin Resa Abdilah Reyhan Adriana Deris Reza Dwi Putra Reza Indrawan Rezki Yuniarti Rezky Yuniarti ridwan fauzi Rifaz Muhammad Sukma Rizka Khoirunnisa Guntina Rizki Kurniawan, Moch. Sopian, Annisa Mufidah Susilowati, Merliana Tri Syarafina, Fildzah Tzazkia Febriyana Akbar Wildan Pratama Wina Witanti Yamina Azmi Yoga Esa Mahendra Yulison Herry Chrisnanto Yustiana Fauziyah