p-Index From 2021 - 2026
6.835
P-Index
This Author published in this journals
All Journal IAES International Journal of Artificial Intelligence (IJ-AI) IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Buana Informatika Dinamika Informatika Jurnal Teknologi MAGISTRA Sinergi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Proceedings Konferensi Nasional Sistem dan Informatika (KNS&I) Seminar Nasional Informatika (SEMNASIF) INFORMATIKA Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Jurnal Ilmiah KOMPUTASI Sistemasi: Jurnal Sistem Informasi JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Creative Information Technology Journal Jurnal Sains dan Informatika MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Penelitian dan Pengabdian Kepada Masyarakat UNSIQ CSRID (Computer Science Research and Its Development Journal) Informasi Interaktif JOISIE (Journal Of Information Systems And Informatics Engineering) EDUMATIC: Jurnal Pendidikan Informatika Jurnal Suara Keadilan Technologia: Jurnal Ilmiah KURVATEK Jurnal Tecnoscienza Respati Jurnal Sistem Komputer & Kecerdasan Buatan Journal of Computer System and Informatics (JoSYC) Jurnal Informa: Jurnal Penelitian dan Pengabdian Masyarakat Madani : Indonesian Journal of Civil Society JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal TIKOMSIN (Teknologi Informasi dan Komunikasi Sinar Nusantara) Jurnal Teknimedia: Teknologi Informasi dan Multimedia Journal of Electrical Engineering and Computer (JEECOM) Jurnal Computer Science and Information Technology (CoSciTech) Jurnal Senopati : Sustainability, Ergonomics, Optimization, and Application of Industrial Engineering Journal of Applied Sciences, Management and Engineering Technology (JASMET) Jurnal Ekonomi dan Teknik Informatika Transformasi Jurnal Ilmiah IT CIDA : Diseminasi Teknologi Informasi Jurnal Dinamika Informatika (JDI) Prosiding Seminar Nasional Sisfotek (Sistem Informasi dan Teknologi Informasi) PELS (Procedia of Engineering and Life Science) JAIA - Journal of Artificial Intelligence and Applications Duta.com : Jurnal Ilmiah Teknologi Informasi dan Komunikasi EXPLORE Prosiding University Research Colloquium COREAI: Jurnal Kecerdasan Buatan, Komputasi dan Teknologi Informasi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal of Information Technology and Society (JITS) Teknomatika: Jurnal Informatika dan Komputer Explore Jurnal Teknologi SWAGATI: Journal of Community Service
Claim Missing Document
Check
Articles

DETEKSI SKEMA PONZI PADA BLOCKCHAIN MENGGUNAKAN ALGORITMA ADABOOST Rizfi Syarif; Andi Sunyoto; Asro Nasiri
Technologia : Jurnal Ilmiah Vol 13, No 2 (2022): Technologia (April)
Publisher : Universitas Islam Kalimantan Muhammad Arsyad Al Banjari

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (204.49 KB) | DOI: 10.31602/tji.v13i2.6338

Abstract

Ponzi adalah skema penipuan yang sudah ada sejak 150 tahun lalu. Sekarang berkembang cara penawarannya dengan teknologi yang modern. Salah satu teknologi yang digunakan adalah cryptocurrency. Ethereum sebagai blockchain platform yang juga mengakomodasi cryptocurrency menjadi ajang beredarnya penipuan ponzi. Tidak sedikit nilai finansial yang menjadi kerugian pengguna Ethereum. Ponzi yang beredar sangat diuntungkan dengan adanya smart contract. Karena proses transaksi yang bersifat rahasia dan tanpa adanya campur tangan pihak ketiga. Sekali transaksi ponzi dilakukan tidak ada cara untuk mengembalikan ke pengirimnya. Penelitian yang ada mempunyai tingkat akurasi yang bagus tetapi kebanyakan harus berdasarkan data transaksi. Ini artinya deteksi ponzi baru bisa dilakukan jika adanya transaksi. Dengan kata lain sudah ada korban yang melakukan transaksi. Hal tersebut butuh adanya penelitian deteksi ponzi sebelum jatuh korban. Pada penelitian ini dikemukakan proses yang lebih cepat untuk pendeteksian skema ponzi pada Ethereum. Dengan menggunakan Adaboost dalam klasifikasi bytecode yang diubah menjadi matrik bobot dari algoritma word embedding. Ditemukan hasil paling maksimal adalah F1 Score sebesar 85%.
Pemodelan Arsitektur Enterprise dengan TOGAF pada SMK Bhakti Mulia Pare Adimas Ketut Nalendra; Wing Wahyu Winarno; Andi Sunyoto
JURNAL EKONOMI DAN TEKNIK INFORMATIKA Vol 4 No 1 (2016): Jurnal Ekonomi dan Teknik Informatika
Publisher : Politeknik Sawunggalih Aji

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.667 KB)

Abstract

Usage of Information Technology (IT) in the governance of secondary schools, especially vocational Bhakti Mulia Pare has not fully own architecture and use of certain framework, the use of IT is currently only to satisfy a need for a part or division terntentu. Enterprise architecture planning aims to align business strategy and technology strategy of an organization. To align the blueprint dibutuhak an information system. TOGAF is a framework that can assist in analyzing an information system blueprint. The results of the analysis of TOGAF in the form of the proposed business architecture, application architecture, data architecture and technology architecture. Ujikelayakan EA using EA Scorecard to generate more than 50% valid. Keywords—Enterpirse Arhitecture, TOGAF, EA Scorecard
Perencanaan Arsitektur Enterprise Sistem Informasi Pada STIE Dharma Iswara Madiun Noordin Asnawi; M. Suyanto; Andi Sunyoto
JURNAL EKONOMI DAN TEKNIK INFORMATIKA Vol 4 No 2 (2016): Jurnal Ekonomi dan Teknik Informatika
Publisher : Politeknik Sawunggalih Aji

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (896.835 KB)

Abstract

Information system development process is not yet organized and well documented allowing implementation of information systems that are not aligned with the business needs of an organization. Enterprise Architecture Planning (EAP) is a methodology that can be used to plan the enterprise architecture that focus on data architecture, application architecture and technology architecture, and the planned implementation of the architecture enterprise that has been made. The purpose of planning is to create a blueprint of information system that includes data architecture, application architecture, technology architecture and implementation scheduling. The results of this planning is the establishment of a data entity, the proposed application, network architecture mapping and scheduling implementation as references in the development of information systems. Keywords—enterprise architecture, EAP, information system
EVALUASI EFEKTIVITAS SISTEM INFORMASI DENGAN PENDEKATAN UTILITY SYSTEM (Studi Kasus : Politeknik Sawunggalih Aji) Singgih Arif Widodo; Bambang Soedijono; Andi Sunyoto
JURNAL EKONOMI DAN TEKNIK INFORMATIKA Vol 5 No 1 (2017): JURNAL EKONOMI DAN TEKNIK INFORMATIKA
Publisher : Politeknik Sawunggalih Aji

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (359.606 KB)

Abstract

This research aimed to evaluate information system Polytechnic Sawunggalih Aji by using utility systemapproach. Utility system approach to evaluate information system from the point of the system effectiveness, firstlyproposed by Kendall. This approach captured the perception of the system based on 6 points of view, which arepossession, form, place, time, actualization and goal, as well as the scale of measurement using a likert scale and SPSSsoftware. This study uses a research instruments with a likert scale questionnaire. The results showed how good thequality of the information system Polytechnic Sawunggalih Aji, and any item of utility system that contributed the most toimproving the quality of the system, as well as proposals that may be submitted to the management of information systemto develop more qualified information system.Keywords: Evaluation, Information system, effectiveness, Utility Approach, SPSS.
INFORMATION RETRIEVAL DOKUMEN TESIS UNTUK MENGETAHUI KEMIRIPANNYA DENGAN PENELITIAN YANG TELAH ADA Monica Mayeni Wing Wahyu Winarno Andi Sunyoto3
TRANSFORMASI Vol 12, No 2 (2016): TRANSFORMASI
Publisher : STMIK BINA PATRIA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.074 KB) | DOI: 10.56357/jt.v12i2.73

Abstract

AbstrakInformation retrieval system adalah sistem yang digunakan dalam menemukan kembali informasi yang pernah tersimpan sebelumnya.  Penelitian ini membahas perancangan sistem temu kembali informasi dengan menggunakan Vector Space Model dalam penelusurannya serta menggunakan ukuran kesamaan Cosine Similarity sebagai metode dalam meranking dokumen yang ditemukan yang sesuai dengan kata kunci/query.  Tujuan dari penelitian ini adalah untuk membantu memudahkan mahasiswa dalam memprediksi apakah penelitian yang akan diajukan tersebut diterima atau ditolak, dan merancang sistem untuk memperlihatkan dokumen-dokumen yang mirip dengan query yang dimasukkan sebagai batasan pencarian.  Penelitian ini tidak menghitung tingkat plagiasi dari dokumen terpilih.  Fokus penelitian adalah pada perancangan sistem penelusuran namun aplikasi prototype diuji untuk memperlihatkan hasil implementasi sistem.  Uji coba dilakukan dengan menggunakan 60 dokumen berformat .pdf, aplikasi dieksekusi secara desktop dengan tampilan localhost dan database disimpan dalam hardisk komputer.  Hasil akhir sistem adalah urutan dokumen-dokumen terpilih yang relevan atau mirip dengan query user yang nantinya dapat juga digunakan sebagai referensi penelitian.  Karena keterbatasan aturan pada Porter stemmer algorithm maka sebaiknya untuk pengembangan sistem perlu ditambahkan daftar kata yang tidak terambil secara sempurna pada saat dilakukan proses stemming. Kata kunci: Information Retrieval System, Vector Space Model, Porter Stemmer Algorithm, Cosine Similari
Deteksi Serangan SQL Injection Menggunakan Hidden Markov Model Pramono *; Andi Sunyoto; Eko Pramono
JURNAL TECNOSCIENZA Vol. 5 No. 2 (2021): TECNOSCIENZA
Publisher : JURNAL TECNOSCIENZA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51158/tecnoscienza.v5i2.432

Abstract

Serangan aplikasi web terus meningkat jumlahnya dan dalam tingkat keparahan. Information besar tersedia di internet memotivasi penyerang untuk melakukan serangan jenis baru. Di dalam konteks, penelitian intensif tentang keamanan aplikasi web telah dilakukan. Serangan berbahaya yang menargetkan web aplikasi adalah Structured Query Language Injection (SQLI). Serangan ini merupakan ancaman serius bagi web aplikasi. Beberapa pekerjaan penelitian melakukan cara untuk mengurangi serangan ini baik dengan mencegahnya dari awal tahap atau mendeteksinya saat itu terjadi. Dalam tulisan ini, kami sajikan gambaran umum tentang serangan injeksi SQL dan klasifikasi dari solusi deteksi dan pencegahan yang baru diusulkan. Dalam penelitian ini kami menggunakan Hidden Markov Model (HMM) untuk melakukan metode deteksi dan pencegahan dari serangan SQLI untuk mengurangi serangan ini khususnya yang didasarkan pada ontologi dan pembelajaran mesin. Kata kunci: HMM, SQL Injection, Web Security
Sistem Pendukung Keputusan Kelayakan Mendirikan Bangunan Menggunakan MOORA Rafli Junaidi Kasim; Samsul Bahri; Syukirman Amir; Rudi Prietno; Rahim Jamal; Andi Sunyoto; M. Syukri Mustafa
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.938 KB)

Abstract

The selection of the feasibility of building a building permit is one of the tasks of the Ternate City Investment and One Stop Integrated Service. In building feasibility selection is still done manually by going down a location survey assessing the criteria needed one by one for each proposal without a method that can provide an assessment priority with various criteria including type of building, foundation, building level, building area and walls, there are many criteria for proposals that are submitted to DPMPTSP. Decision Support System (SPK) is needed to facilitate the Investment and One Stop Integrated Service. The system that was built was web-based, in this research it was carried out through literature reviews and direct interviews with DMPTSP employees. The model used is the method of Multy Objective Optimization On The Basis Of Ratio Analysis. The results of the Multy Objective Optimization Method On The Basis Of Ratio Analysis are considered to have a good level of selectivity in determining an alternative, easy to understand and flexible in separating objects to the evaluation process of the decision weight criteria.
Kombinasi Algoritma Sampling dengan Algoritma Klasifikasi untuk Meningkatkan Performa Klasifikasi Dataset Imbalance Gagah Gumelar; Norlaila2; Quratul Ain; Riza Marsuciati; Silvi Agustanti Bambang; Andi Sunyoto; M. Syukri Mustafa
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.284 KB)

Abstract

A class to be imbalanced when there is a class that has more data than other classes. A comparison between minority classes and the majority class is called Imbalance Ratio (IR). The greater the difference between the minority class and the majority class the value of the Imbalance Ratio (IR) is getting larger. Dataset imbalance in data mining is a serious problem. The application of the classification algorithm regardless of class balance resulted in a good prediction for the majority class and a neglected minority class. Therefore, in this research, the SMOTE algorithm was applied to balance the dataset. The study used 4 datasets with different Imbalance Ratio and used classification algorithms, C45, Naïve Bayes, K-NN, and SVM. Then compared before and after using SMOTE. The research results that have been done accuracy value and value G-mean Naïve Bayes algorithm is consistent with its performance at each level of imbalance ratio, before the implementation has no good performance, whereas after the implemented SMOTE algorithm Naïve Bayes has a consistent increase in accuracy. So it can be concluded that the combination SMOTE + Naïve Bayes most effectively used in the imbalance dataset with different levels in the scheme of 10 fold cross validation and 80% data testing tested as much as 50 times.
Implementation of Transfer Learning in the Convolutional Neural Network Algorithm for Identification of Potato Leaf Disease Abdul Jalil Rozaqi; Muhammad Rudyanto Arief; Andi Sunyoto
Procedia of Engineering and Life Science Vol 1 No 1 (2021): Proceedings of the 1st Seminar Nasional Sains 2021
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (513.221 KB) | DOI: 10.21070/pels.v1i1.820

Abstract

Potatoes are a plant that has many benefits for human life. The potato plant has a problem, namely a disease that attacks the leaves. Disease on potato leaves that is often encountered is early blight and late blight. Image processing is a method that can be used to assist farmers in identifying potato leaf disease by utilizing leaf images. Image processing method development has been done a lot, one of which is by using the Convolutional Neural Network (CNN) algorithm. The CNN method is a good image classification algorithm because its layer architecture can extract leaf image features in depth, however, determining a good CNN architectural model requires a lot of data. CNN architecture will become overfitting if it uses less data, where the classification model has high accuracy on training data but the accuracy becomes poor on test data or new data. This research utilizes the Transfer Learning method to avoid an overfit model when the data used is not ideal or too little. Transfer Learning is a method that uses the CNN architecture that has been trained by other data previously which is then used for image classification on the new data. The purpose of this research was to use the Transfer Learning method on CNN architecture to classify potato leaf images in identifying potato leaf disease. This research compares the Transfer Learning method used to find the best method. The results of the experiments in this research indicate that the Transfer Learning VGG-16 method has the best classification performance results, this method produces the highest accuracy value of 95%.
Evaluasi Penerapan Sistem Informasi Akademik Dengan Pendekatan Model Delone & McLean, HOT FIT dan UTAUT (Studi Kasus: STMIK Duta Bangsa Surakarta) Indah Nofikasari; Bambang Soedijono WA; Andi Sunyoto
Jurnal DutaCom Vol 12 No 1
Publisher : LPPM Universitas Duta Bangsa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (337.216 KB)

Abstract

Penelitian ini bertujuan untuk mengevaluasi dan mengetahui tingkat keberhasilan penerapan sistem informasi akademik di STMIK Duta Bangsa Surakarta dengan mengacu pada gabungan tiga model yakni DeLone & McLean, Hot Fit dan UTAUT. Objek penelitian ini adalah SIAKAD (Sistem Informasi Akademik). Metode analisis data penelitian ini menggunakan SPSS 16.0 untuk uji validitas dan realibilitas instrument penelitian. Sedangkan uji hipotesis menggunakan SEM PLS.Hasil penelitian menunjukan bahwa tingkat keberhasilan penerapan SIAKAD sebesar 50,38%, berarti penerapan SIAKAD belum sepenuhnya berhasil, sedangkan variabel kualitas informasi, dukungan organisasi, kepuasan pengguna berpengaruh positif dan signifikan terhadap net benefit  sebesar 65,51 % dan niat pengguna sistem berpengaruh positif dan signifikan terhadap net benefit sebesar 34,49 %. (tingkat signifikan 0,05). Kata Kunci: SIAKAD, Delone & McLean, HOT FIT dan UTAUT
Co-Authors *, Pramono A.A. Ketut Agung Cahyawan W Aam Shodiqul Munir Abdul Jalil Rozaqi Abdul Jalil Rozaqi Abdul Mizwar A. Rahim Abidarin Rosidi Abidarin Rosidi Ade Kurniawan kurniawan Ade Pujianto, Ade Afis Julianto Afis Julianto Agus Harjoko Agus Harjoko AGUS PURWANTO Aidina Ristyawan, Aidina Alva Hendi Muhammad Alva Hendi Muhammad Alva Hendi Muhammad Muhammad Ana Wati Ndarbeni Anna Baita Annas Al Amin Arif Sutikno Asro Nasiri Asro Nasiri Asro Nasiri Astria, Kadek Kiki B, Arijal Bahri, Saiful Bambang Soedijono Bambang Soedijono WA Banu Dwi Putranto Bayu Anugerah Putra Bayu Setiaji Bonifacius Vicky Indriyono Bonifacius Vicky Indriyono, Bonifacius Vicky Cahyo, D. Diffran Nur Dhanar Intan Surya Saputra Diansyah, Ahmad Febri Dwi Sari Widyowaty Dwi Yuli Prasetyo Eka Yulia Sari Eko Pramono Eko Pramono Ema Utami Emha Taufiq Luthfi Emha Taufiq Luthfi Ferry Wahyu Wibowo Ferry Wahyu Wibowo Firdiyan Syah Fitri Handayani Gagah Gumelar Gori, Takhamo Hanafi Hanafi Hani Atun Mumtahana Hani Atun Mumtahana Hani Setiani Hanif Al Fatta Hanif Al Fatta Hanif Al Fatta Hanif Al Fatta Harianto, Harianto Hidayat Hidayat Huda, Luthfi Nurul Ibnu Hadi Purwanto Ikhwan Baidlowi Sumafta Ikmah Ikmah Indah Nofikasari Irawanto, Indra Ismail, Muhamad Yusuf K Kusrini Kapti . kurniawan, Ade Kurniawan Kurniawan, Mei P Kurniawan, Mei P. Kusnawi Kusnawi Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini Kusrini, K Kusrini, Kusrini Liana Trihardianingsih Licantik M rudyanto Arief M. Afriansyah M. Rudyanto Arief M. Suyanto M. Suyanto, M. M. Syukri Mustafa Maie Istighosah Mashuri, Ahmad Sanusi Masruri, Nizar Haris Mohammad Suyanto Mudawil Qulub Muhammad Rudyanto Arief Muhammad Setiyawan Muhammad, Anva Hendi Muhartini, Sitti Mumtahana, Hani Atun Mursyid Ardiansyah Nalendra, Adimas Ketut Nasiri, Asro Noordin Asnawi Norlaila2 Nugraha, Anggit Ferdita Nulngafan, Nulngafan Nur Arifin Akbar Parsiyono Parsiyono Patmawati Patmawati, Patmawati Pramono * Putranto, Dinar Wakhid Quratul Ain Rafli Junaidi Kasim Rahim Jamal Rahmat Hidayat Raynaldi Fatih Amanullah Ria Andriani Rifda Faticha Alfa Aziza Rifqi Mulyawan Riyanto, Thomas Pramuji Singgih Riza Marsuciati Rizfi Syarif Rizky Arya Kurniawan Rohim, Ni’matur Rudi Prietno Sahirul Muklis Salmuasih - Samsul Bahri Sari, Rita Novita Setiawan Budiman Sholihin, Iasya Silvi Agustanti Bambang Singgih Arif Widodo Slamet Triyanto Soedijono W A, Bambang Sudarmawan Sudarmawan Sudarmawan, Sudarmawan Sudiana Sudiana Sukresno Sukresno Sulistyowati Sulistyowati Suliswaningsih Suliswaningsih Sumafta, Ikhwan Baidlowi Supomo, Eko Sutejo, Danang Syah, Firdiyan Syah, Firdiyan Syukirman Amir TONNY HIDAYAT Tribiakto, Herlandro Ulinuha, Hinova Rezha W., Bambang Soedijono WA, Bambang Soedijono Wahyu Caesarendra Wahyu Hidayat Wihayati, Wihayati Windarni, Vikky Aprelia Windha Mega Pradnya Dhuhita Wing Wahyu Winarno Yoga Dwi Pambudi Yoga Pristyanto Yohanes Setyo Prabowo, Yohanes Setyo Yusuf Sutanto Zaipin, Zaipin