Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Teknik Informatika (JUTIF)

DEVELOPMENT OF A WEB-BASED TONSEA LANGUAGE CORPUS USING THE EVOLUTIONARY PROTOTYPING METHOD Conggresco, Sherly; Rantung, Vivi P.; Kainde, Quido C.
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2201

Abstract

Without realising it, when humans increasingly follow technological advances and are only concerned with the demands of the times where technology can coexist with humans, humans sometimes forget to preserve their culture, one of which is local language. One of them is Tonsea language. Tonsea language is a regional language originating from North Sulawesi. The purpose of this study is to research material for Tonsea language corpus linguistics in the preparation of dictionaries and add Tonsea language resources to preserve the Tonsea language by developing a website to analyse the Tonsea language corpus. Corpus analysis can also be used to research or study variations in the use of the Tonsea language because the corpus can help linguists and lexicographers in the preparation of dictionaries in working on dictionary microstructures which include lemmas/sublemmas, word classes, definitions and writing. As a result, there are six key concepts of corpus analysis techniques, namely tokens, word frequency, concordance, collocation, ngrams, and word lists. In the Token feature, the Token can be used by pekamus to create a dictionary and linguists can also analyse the Tonsea language on Ankorsea and for the Concordance, Collocation and Ngram features users can search for keywords to find out the meaning of the use of a language. This research uses the Evolutionary Prototyping method.
APPLICATION OF MULTI-TASK CASCADED CONVOLUTIONAL NEURAL NETWORK ALGORITHM IN SCHOOL SUPERVISOR ATTENDANCE SYSTEMS IN THE FIELD OF COMPUTER VISION Rorimpandey, Gladly C.; Intan, Sondakh Agnes; Kainde, Quido C.
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2218

Abstract

The attendance system used by the Education Department can be said to be still manual. Where they use the Timestamp application to take photos. Where the application only takes faces without detecting the face. Therefore, researchers created a face detection presence system by applying the Multi-Task Cascaded Convolutional Neural Network algorithm using the face-api.min.js library for the face detection process. The aim of this research is to make it easier for school supervisors to manage attendance, so they can provide accurate information. Then, based on the research results, a face detection and location detection system for school supervisors was successfully developed using the Multi-Task Cascaded Convolutional Neural Network (MTCNN) algorithm. From the results of tests carried out using a dataset of 140 images from 28 people with different photos taken (face view, top view, bottom view, left side view, right side view). Test results on the facial presence detection system using the MTCNN (Multi-Task Cascaded Convolutional Neural Network) algorithm succeeded in detecting faces by 100%.
FORENSIC ANALYSIS OF PHISHING ATTACKS: INVESTIGATIVE APPROACH Kainde, Quido Conferti; Tambanaung, Josua Setdefit; Inkiriwang, Valent Tio; Mile, Alexandra Anrala Putri
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2294

Abstract

Phishing attacks continue to pose a significant threat to cybersecurity, with perpetrators becoming increasingly sophisticated in crafting convincing fraudulent methods. This article examines the forensic analysis process used to effectively investigate phishing attacks. Through a review of existing literature, the author understands the workings of phishing and analyzes real cases that have occurred, followed by data collection using secondary sources. Using theories and insights gained from literature studies, the author analyzes and identifies important aspects of the conducted research data. A content analysis method is employed to analyze the data, determining the steps for prevention and investigation of phishing attacks. In this analysis, thematic and textual methods are applied to gather crucial components of a phishing attack. The analysis results indicate that forensic approaches and a deep understanding of phishing mechanisms can help protect data and significantly reduce the impact of phishing attacks. This article concludes by providing practical recommendations to enhance readiness in facing future phishing attacks.