Claim Missing Document
Check
Articles

Penggunaan Operator Quantifier Guided Dominance Degree (QGDD) sebagai Certainty Factor pada Clinical Group Decision Support System (CGDSS) Sri Kusumadewi; Sri Hartati; Retantyo Wardoyo; Agus Harjoko
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Salah satu permasalahan dalam Clinical Group Decision Support System (CDSS) adalah masalah dianosis. Apabila pada proses pengambilan keputusan, suatu CDSS membutuhkan dukungan dari beberapa orang pakar, maka perlu dibentuk suatu Clinical Group Decision Support System (CGDSS). Pada penelitian ini, akan dibangun suatu model basis pengetahuan berbasis aturan pada CGDSS dengan format preferensi yang diberikan oleh setiap pengambil keputusan berbentuk ordered vectors. Operator Ordered Weighted Averaging (OWA) digunakan untuk melakukan agregasi preferensi yang diberikan oleh setiap pengambil keputusan, dengan menggunakan quantifier fuzzy, ”most”. Konsistensi informasi pada matriks agregasi dilakukan sesuai dengan batasan-batasan yang diberikan pada relasi preferensi fuzzy. Proses perankingan untuk menentukan nilai kinerja setiap alternatif dilakukan dengan menggunakan operator Quantifier Guided Dominance Degree (QGDD). Hasil perankingan sebagai nilai kinerja alternatif akan digunakan sebagai certainty factor (CF) untuk setiap aturan pada basis pengetahuan.Kata kunci: Clinical Group Decision Support System, Ordered Weighted Averaging, Quantifier Guided Dominance Degree
KAJIAN MODEL DAN PROTOTIPE SCHEMA MATCHING (Studi untuk Menemukan Peluang Pengembangan Model dan Prototipe Baru) Edhy Sutanta; Retantyo Wardoyo; Khabib Mustofa; Edi Winarko
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2015
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract—Schema matching is critical problem within manyapplications to integration of data / information, to achieveinteroperability, and other cases caused by schematic heterogeneity.Models and the schema matching methods evolved from manualway on a specific domain, leading to a new models and methodsthat are semi-automatic and more general, so it is able to effectivelydirect the user within generate a mapping among elements of twothe schema or ontologies better. This paper is a summary ofliterature review on research and publication on models, methods,and prototypes on schema matching within the last 25 years todescribe the progress of and research opportunities on a newmodels, methods, and prototypes.Keywords—model, hybrid model, prototipe, schema matching
Oversampling Approach Using Radius-SMOTE for Imbalance Electroencephalography Datasets Retantyo Wardoyo; I Made Agus Wirawan; I Gede Angga Pradipta
Emerging Science Journal Vol 6, No 2 (2022): April
Publisher : Ital Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28991/ESJ-2022-06-02-013

Abstract

Several studies related to emotion recognition based on Electroencephalogram signals have been carried out in feature extraction, feature representation, and classification. However, emotion recognition is strongly influenced by the distribution or balance of Electroencephalogram data. On the other hand, the limited data obtained significantly affects the imbalance condition of the resulting Electroencephalogram signal data. It has an impact on the low accuracy of emotion recognition. Therefore, based on these problems, the contribution of this research is to propose the Radius SMOTE method to overcome the imbalance of the DEAP dataset in the emotion recognition process. In addition to the EEG data oversampling process, there are several vital processes in emotion recognition based on EEG signals, including the feature extraction process and the emotion classification process. This study uses the Differential Entropy (DE) method in the EEG feature extraction process. The classification process in this study compares two classification methods, namely the Decision Tree method and the Convolutional Neural Network method. Based on the classification process using the Decision Tree method, the application of oversampling with the Radius SMOTE method resulted in the accuracy of recognizing arousal and valence emotions of 78.78% and 75.14%, respectively. Meanwhile, the Convolutional Neural Network method can accurately identify the arousal and valence emotions of 82.10% and 78.99%, respectively. Doi: 10.28991/ESJ-2022-06-02-013 Full Text: PDF
SISTEM ONTOLOGI E-LEARNING BERBASIS SEMANTIC WEB Bernard Renaldy Suteja; Suryo Guritno; Retantyo Wardoyo; Ahmad Ashari
Jurnal Ilmu Komputer dan Informasi Vol 2, No 1 (2009): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (889.058 KB) | DOI: 10.21609/jiki.v2i1.120

Abstract

E-learning content being a barrier for e-learning is no longer true on todays Internet. The current concerns are how to effectively annotate and organize the available content (both textual and non-textual) to facilitate effective sharing, reusability and customization. In this paper, we explain a component-oriented approach to organize content in an ontology. We also illustrate our 3-tier e-learning content management architecture and relevant interfaces. We use a simple yet intuitive example to successfully demonstrate the current working prototype which is capable of compiling personalized course materials. The e-learning system explained here uses the said ontology.
Goal-Oriented Requirements Engineering: State of the Art and Research Trend Rosa Delima; Retantyo Wardoyo; Khabib Mustofa
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1062.134 KB) | DOI: 10.30595/juita.v9i1.9827

Abstract

The Goal-Oriented Requirements Engineering (GORE) is one approach that is widely used for the early stages of software development. This method continues to develop in the last three decades. In this paper, a literature study is conducted to determine the GORE state of the art. The study begins with a Systematic Literature Review (SLR) was conducted to determine the research trend in the last five years. This study reviewed 126 papers published from 2016 to 2020.  The research continues with the author's search for scientific articles about GORE. There are 26 authors who actively publish GORE research results. Twenty-six authors were grouped into seven groups based on their relation or co-authoring scientific articles. An in-depth study of each group resulted in a holistic mapping of GORE research.  Based on the analysis, it is known that most research focuses on improving GORE for an automated and reliable RE process, developing new models/frameworks/methods originating from GORE, and implementing GORE for the RE process. This paper contributes to a holistic mapping of the GORE approach. Through this study, it is known the various studies that are being carried out and research opportunities to increase automation in the entire RE process.
Integrated AHP, Profile Matching, and TOPSIS for selecting type of goats based on environmental and financial criteria Clara Hetty Primasari; Retantyo Wardoyo; Anny Kartika Sari
International Journal of Advances in Intelligent Informatics Vol 4, No 1 (2018): March 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v4i1.105

Abstract

Goat farm businessman should considered environmental and financial criteria in breeding their commodities. The environmental factors are temperature, humidity, rain intensity, and altitude. For financial criteria, used several sub criteria i.e NPV (Net Present Value), ROI (Return On Investment), BCR (Benefit Cost Ratio), PBP (Payback Period), and BEP (Break Event Point) to determine financial feasibility. This research aims to develop a decision support system for selecting type of goat to breed by combining AHP, Profile Matching, and TOPSIS. AHP method was used for calculating the weight, Profile Matching for environment suitability evaluation, and TOPSIS for producing a valid decision that represents the goat expert's decision. The result showed that three methods can be integrated, and an experimental results which was validated by expert show that Bligon goat had the highest preference value (0.8835847). This can be concluded that DSS decision was valid and it successfully represented expert’s consideration.
An Implementation of Catmap-Rijndael (AES) Algorithm For Image Security (Case Study on A Software For Making Students Card At Universitas Jenderal Soedirman) Bangun Wijayanto; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.1995

Abstract

Abstract— The function of image encryption is to transform known have that meaning to images that cannot be read or irregular images in order to security. Storing the image data in local computer system will bring some risks on the image security.The aim of this research is to construct an image encryption system based on Catmap-Rijndael algorithm. The system is implemented on a software form making students card at Universitas Jenderal Soedirman. The result shows that the combination of Catmap-Rijndael algorithm on bitmap image 200x200 pixel by using 3 times repetition of the Catmap algorithm (with parameter a=1 and b=1) can overcome the problem of textured of the object that caused by base colour on the image and uniform histogram of the encrypted image in short time process.Keywords— Rijndael, AES, Catmap, image security, students card.
Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS Decky Hendarsyah; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.1997

Abstract

Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party. Therefore it requires a security in sending an SMS message which is called cryptography. Given limited resources on cellular phone, then the implementation of symmetric cryptographic technique is suitable to meet the security needs of an SMS message. In symmetric cryptography, there is a symmetric key for encryption and decryption process. In order to secure exchange of symmetric keys in public channels is required of a protocol for key exchange.This research implements RC4 symmetric cryptography to encrypt and decrypt messages, while for key exchange is using Diffie-Hellman protocol. In this research, there are modifications to the Diffie-Hellman protocol that is the calculation of the public key and symmetric key to include cellular phone number as authentication. Whereas on a modified RC4 is the key where there is a combination with cellular phone number as authentication and key randomization, and then there are also modifications to the pseudorandom byte generator, encryption and decryption of the RC4 algorithm. The system is constructed using the Java programming language in the platform Micro Edition (J2ME) based MIDP 2.0 and CLDC 1.0.The research found that with the cellular phone number as authentication, key, encryption and decryption process automatically it is able to maintain confidentiality, data integrity, authentication and non-repudiation to the message. Keywords—  Diffie-Hellman, Key exchange, RC4, SMS Secure, Symmetric Cryptography.
Optimasi Cluster Pada Fuzzy C-Means Menggunakan Algoritma Genetika Untuk Menentukan Nilai Akhir Putri Elfa Mas`udia; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 6, No 1 (2012): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2145

Abstract

AbstrakNilai akhir mahasiswa dapat ditentukan dengan berbagai cara, beberapa diantaranya menggunakan range nilai, standart deviasi, dll. Dalam penelitian ini akan ditawarkan sebuah metode baru untuk menentukan nilai akhir mahasiswa menggunakan clustering dalam hal ini adalah Fuzzy C-Means.Fuzzy C-Means digunakan untuk mengelompokkan sejumlah data dalam beberapa cluster. Tiap data memiliki derajat keanggotaan pada masing-masing cluster antara 0-1 yang diukur melalui fungsi objektif. Pada Fuzzy C-Means ini fungsi objektif diminimumkan menggunakan iterasi yang biasanya terjebak dalam optimum lokal. Algoritma genetika diharapkan dapat menangani masalah tersebut karena algoritma genetika berbasis evolusi yaitu dapat mencari individu terbaik melalui operasi genetika (seleksi, crossover, mutasi) dan dievaluasi berdasarkan nilai fitness. Penelitian ini bertujuan untuk mengoptimasi titik pusat cluster pada Fuzzy C-Means menggunakan algoritma genetika. Hasilnya, bahwa dengan menggunakan GFS didapatkan fungsi objektif yang lebih kecil daripada menggunakan FCM, walaupun membutuhkan waktu yang relative besar. Meskipun selisih antara FCM dan GFS tidak terlalu besar namun hal tersebut berpengaruh pada anggota cluster  Kata kunci— clustering, Fuzzy C-Means, algoritma genetika AbstractThe final grade of students could be determined in various ways, some of which use a range of values, deviation standard, etc. In this study will be offered a new method for determining final grades of students by using the clustering method. In this research the clustering method that will be used is the Fuzzy C-Means (FCM).Fuzzy C-Means is used to group a number of data in multiple clusters. Each data has a degree of membership (the range value of membership degree is 0-1). Membership degree is measured through the objective function. In Fuzzy C-Means,  objective function is minimized by using iteration and is usually trapped in a local optimum. Genetic algorithm is expected to handle these problems. The operation of genetic algorithm based on evolution that is able to find the best individuals through genetic operations (selection, crossover and mutation) and evaluated based on fitness values.This research aims to optimize the cluster center point of FCM by using genetic algorithms. The result of this research shows that by combining the Genetic Algorithm with FCM could obtained a smaller objective function than using FCM, although it takes longer in execution time. Although the difference of objective function that produced by FCM and FCM-Genetic Algorithm combination is not too big each other, but it takes effect on the cluster members. Keywords— clustering, fuzzy c-means, genetic algorithm
Artificial Intelligence on Computer Based Chess Game: An Implementation of Alpha-Beta-Cutoff Search Method Albert Dian Sano; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 1, No 2 (2007): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2277

Abstract

AbstractA chess program usually consists of three main parts, that is, a move generator to generate all legal moves, an evaluation function to evaluate each move, and a search function to select the best move. The search function is the core of thinking process. The goal of this research is to implement the alpha beta cutoff as a search method. This method is derived from minimax search method and is more optimal than the minimax search method.In minimax, all nodes is searched and compared one by one to get the best value. On the other hand, the alpha beta cut of methd only searches nodes which make contribution to the previous value and cuts off nodes which are not useful. It means that the alpha beta method will not search and compare all nodes. The new node will be better than the previous one and replace the old value with the new one. This will make the alpha beta method requires smaller search time.The proposed method is tested by doing a series of matches between humans and a computer. The results show that the computer has ability to think well and performs a good artcial intelligence though it is very open to be modified and more optimized.Keywords: move generator function, evaluation function, search function, minimax, alpha beta cutoff
Co-Authors Abdul Wahid Adiananda Adiananda Agus Harjoko Ahmad Ashari Ahmad Asharit Aina Musdholifah Aina Musdholifah Albert Dian Sano Anastasya Latubessy Andeka Rocky Tanaamah Andika Kurnia Adi Pradana Andriyani, Widyastuti Anny Kartika Sari Arief Kelik Nugroho, Arief Kelik Azhari Azhari Azhari Azhari Azhari Subanar Bambang Sugiantoro Bambang Sugiantoro Bangun Wijayanto Bernard Renaldy Suteja Christian Dwi Suhendra Clara Hetty Primasari Danang Lelono Decky Hendarsyah Desyandri Desyandri Djemari Mardapi Doni Setyawan E. Elsa Herdiana Murhandarwati Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Edi Winarko Edi Winarko Enny Itje Sela Gede Angga Pradipta, Gede Angga Hananto, Andhika Rafi Hardyanto Soebono Herri Setiawan Herri Setiawan I Made Agus Wirawan I Made Agus Wirawan Ida Ayu Putu Sri Widnyani Istiyanto, Jazi Eko Jazi Eko Istiyanto Jazi Eko Istiyanto Jazi Eko Istiyanto Joan Angelina Widians, Joan Angelina Khabib Mustofa Khairunnisa Khairunnisa Kusrini Kusrini Lausu, Suwandi Lilik Sumaryanti M Mustakim M.Cs S.Kom I Made Agus Wirawan . Moh Edi Wibowo Muhamad Munawar Yusro Muhammad Fakhrurrifqi Muhammad Mukharir Munakhir Mudjosemedi Mustakim, M Nola Ritha NUR HASANAH Peggi Sri Astuti Pratama, Kharis Suryandaru Purba, Susi Eva Maria Purwo Santoso Putri Elfa Mas`udia Rahman Erama Rahmat Budiarsa Ramos Somya Rika Rosnelly Rosa Delima Rosihan Rosihan, Rosihan Santoso, Purwo Silmina, Esi Putri Sri Andayani Sri Hartati Sri Hartati Sri Hartati Sri Hartati Sri Kusrohmaniah, Sri Sri Kusumadewi Sri Mulyana Subahar, Subahar subanar subanar Suryo Guritno Suryo Guritno Suryo Guritno Tempola, Firman Tenia Wahyuningrum Wenty Dwi Yuniarti, Wenty Dwi Wibowo, Moh Edi Winarko, Edi Wiwiet Herulambang Yayi Suryo Prabandari