cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 1,046 Documents
The Implementation of MQTT Protocol using PT-100 for Monitoring the Vaccine Temperature Sigit Pramono; Slamet Indriyanto; Wahyu Junianto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.481 KB) | DOI: 10.29207/resti.v6i2.3988

Abstract

A vaccine has an essential role for humans because it can reduce the effect of organism infection and activate the body's immune. The limitation of temperature when the vaccine is stored becomes one of the influential factors for its quality. Since the recent technique used for checking the temperature is manual, the process of real-time temperature monitoring cannot be done and becomes the main problem in the process of storing vaccines. This research is aimed to develop a system for measuring temperature on a chiller through a temperature sensor and the internet of things automatically. The methods used in the MQTT protocol are published and subscribed. The quality of service (QoS) to measure network capability and PT-100 is the sensor in this research because it has a high accuracy level, linear signal change, and fast response. This sensor can measure glycol liquid with a temperature range of 2-8°C. Data distribution uses an ESP module to connect the data to Antares through the wifi network. The temperature value measurement using PT-100 toward vaccine chiller temperature obtains an accuracy value of 99,32%. This accuracy value shows that the result is compatible with the logger data measurement tool development used with an error result of 0.58%. Delay parameter testing on the quality of service level obtains the average value of 41.91 ms, while the Packet loss parameter obtains the value of 0%.
Model-Based Feature Selection for Developing Network Attack Detection and Alerting System Yuri Prihantono; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (617.672 KB) | DOI: 10.29207/resti.v6i2.3989

Abstract

Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine learning is one way that is often utilized to overcome challenges that arise during the implementation of IDS. We present a system that uses a machine learning approach to detect network attacks and send attack alerts in this study. The CSE-CICIDS2018 Dataset and Model-Based Feature Selection technique are used to assess the performance of eight classifier algorithms in identifying network attacks to determine the best algorithm. The resulting XGBoost Model is chosen as the model that provides the highest performance results in this comparison of machine learning models, with an accuracy rate of 99 percent for two-class classification and 98.4 percent for multi-class classification.
Pneumonia Image Classification Using CNN with Max Pooling and Average Pooling Annisa Fitria Nurjannah; Andi Shafira Dyah Kurniasari; Zamah Sari; Yufis Azhar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.535 KB) | DOI: 10.29207/resti.v6i2.4001

Abstract

Pneumonia is still a frequent cause of death in hundreds of thousands of children in most developing countries and is generally detected clinically through chest radiographs. This method is still difficult to detect the disease and requires a long time to produce a diagnosis. To simplify and shorten the detection process, we need a faster method and more precise diagnosis of pneumonia. This study aims to classify chest x-ray images using the CNN method to diagnose pneumonia. The proposed CNN model will be tested using max & average pooling. The proposed model is developed in previous studies by adding batch normalization, dropout layer, and the number of epochs used. The dataset used will be optimized with oversampling & data augmentation techniques to maximize model performance. The dataset used in this study is "Chest X-Ray Images (Pneumonia)," with 5,856 data divided into two classes, namely Normal and Pneumonia. The proposed model gets 98% results using average pooling, where the results increase by 9-13% better than the previous study. This is because the overall pixel value of the image is highly considered to classify normal lungs and pneumonia.
The Accuracy Comparison Between Word2Vec and FastText On Sentiment Analysis of Hotel Reviews Siti Khomsah; Rima Dias Ramadhani; Sena Wijaya
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.214 KB) | DOI: 10.29207/resti.v6i3.3711

Abstract

Word embedding vectorization is more efficient than Bag-of-Word in word vector size. Word embedding also overcomes the loss of information related to sentence context, word order, and semantic relationships between words in sentences. Several kinds of Word Embedding are often considered for sentiment analysis, such as Word2Vec and FastText. Fast Text works on N-Gram, while Word2Vec is based on the word. This research aims to compare the accuracy of the sentiment analysis model using Word2Vec and FastText. Both models are tested in the sentiment analysis of Indonesian hotel reviews using the dataset from TripAdvisor.Word2Vec and FastText use the Skip-gram model. Both methods use the same parameters: number of features, minimum word count, number of parallel threads, and the context window size. Those vectorizers are combined by ensemble learning: Random Forest, Extra Tree, and AdaBoost. The Decision Tree is used as a baseline for measuring the performance of both models. The results showed that both FastText and Word2Vec well-to-do increase accuracy on Random Forest and Extra Tree. FastText reached higher accuracy than Word2Vec when using Extra Tree and Random Forest as classifiers. FastText leverage accuracy 8% (baseline: Decision Tree 85%), it is proofed by the accuracy of 93%, with 100 estimators.
Implementation of the Conversational Hybrid Design Model to Improve Usability in the FAQ Supriyanto; Ika Arfiani; Zain Ahmad Taufik
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.414 KB) | DOI: 10.29207/resti.v6i3.3816

Abstract

FAQ is an important part of a system because it is used to make it easier for users to solve problems faced by users. Some FAQ systems have even started using Chatbot technology to make it easier for users. Chatbots have been widely used as a medium for services in almost all fields. Starting from marketing, service systems, education, health, culture and entertainment. Various types of chatbots have sprung up, ranging from text-based like short messaging applications to voice-based ones. However, not all forms of chatbot designs have been successfully implemented in the FAQ system. Adjustments need to be made, especially considering the persona of the user. This research provides a solution by implementing a hybrid conversational design. Hybrid conversation design is accomplished by incorporating text, voice, and buttons into the chatbot interface. Conversation activities with this hybrid interface provide keywords that users may search for in the form of buttons. The hybrid design of the FAQ Chatbot is proven to be able to improve user usability compared to full text chatbots and full text FAQs. The increase in user usability is measured using UEQ, the results of which show an increase in usability from all existing aspects. However, the implementation of this hybrid design also has the consequence that the conversation management system must have structured initial information.
Identification of Malaria Parasite Patterns With Gray Level Co-Occurance Matrix Algorithm (GLCM) Annas Prasetio; Rika Rosnelly; Wanayumini
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.693 KB) | DOI: 10.29207/resti.v6i3.3850

Abstract

The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy accuracy value of 0.22274, an average Homonegity of 0.98532, a PSNR of 6.1336db, and an MSE of 0.24358. Image 3 has an energy average accuracy value of 0.28735, a Homonegity average accuracy value of 0.9793, a PSNR of 6.133db, and an MSE of 0.24358. Image 4 has an energy average accuracy value of 0.32907 and an average homogeneity accuracy value of 0.97073, PSNR 6.133db, and MSE 0.24358. Image 5 has an average accuracy value of 0.74102, Homonegity average of 0.99844, PSNR of 6.133db, and MSE of 0.4358. Image 6 has an accuracy value of 0.34758 energy, an average accuracy value of homogeneity of 0.99129, a PNSR of 6.133db, and an MSE of 0.24358. Obtained the rule if the average value of energy > = 0.50 then the pattern of malaria parasites is very clear, namely Image 1 and image 5 with a pattern of malaria parasites is very clear.
Content Based VGG16 Image Extraction Recommendation Arif Laksito; Muhammad Royyan Saputra
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.557 KB) | DOI: 10.29207/resti.v6i3.3909

Abstract

Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the right data. The recommendation engine may be used to make it simpler to find information that is relevant to the user's needs. Clothing, gadgets, autos, furniture, and other e-commerce items rely on product visualization to entice shoppers. There are millions of images in these items. Displaying the information sought by clients based on visual data is a difficult challenge to address. One strategy that is simple to use in a recommendation system is content-based filtering. This approach will eventually make suggestions to consumers based on previously accessible goods or product descriptions. Content-based filtering works by searching for similarities based on the properties of a product item. User interactions with a product will be recorded and analyzed in order to recommend certain similarities to users. Text-based datasets are used in the majority of content-based filtering studies. In this study, however, we attempt to leverage a dataset received from Kaggle in the form of images of futsal shoes. Then, VGG16 architecture is used to extract the image dataset. The top 5 most relevant item rankings are generated by this recommendation method using cosine similarity. In addition, the NDCG (Normalized Discounted Cumulative Gain) approach is used to assess the results of the suggestions. The NDCG was evaluated in ten test scenarios, with an average NDCG value of 0.855, indicating that the system delivers a reasonable performance suggestion.
Educational Data Mining Using Cluster Analysis Methods and Decision Trees based on Log Mining Safira Nuri Safitri; Haryono Setiadi; Esti Suryani
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.835 KB) | DOI: 10.29207/resti.v6i3.3935

Abstract

Educational Data Mining (EDM) often appears to be applied in big data processing in the education sector. One of the educational data that can be further processed with EDM is activity log data from an e-learning system used in teaching and learning activities. The log activity can be further processed more specifically by using log mining. The purpose of this study was to process log data from the Sebelas Maret University Online Learning System (SPADA UNS) to determine student learning behavior patterns and their relationship to the final results obtained. The data mining method applied in this research is cluster analysis with the K-means Clustering and Decision Tree algorithms. The clustering process is used to find groups of students who have similar learning patterns. While the decision tree is used to model the results of the clustering in order to enable the analysis and decision-making processes. Processing of 11,139 SPADA UNS log data resulted in 3 clusters with a Davies Bouldin Index (DBI) value of 0.229. The results of these three clusters are modeled by using a Decision Tree. The decision tree model in cluster 0 represents a group of students who have a low tendency of learning behavior patterns with the highest frequency of access to course viewing activities obtained accuracy of 74.42% . In cluster 1, which contains groups of students with high learning behavior patterns, have a high frequency of access to viewing discussion activities obtained accuracy of 76.47%. While cluster 2 is a group of students who have a pattern of learning behavior that is having a high frequency of access to the activity of sending assignments obtained accuracy of 90.00%.
bahasa inggris Muhammad Iqbal Izzul Haq; Aniati Murni Arymurthy; Irham Muhammad Fadhil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (369.564 KB) | DOI: 10.29207/resti.v6i3.3993

Abstract

Class imbalance is a serious problem that disrupts the process of semantic segmentation of satellite imagery in urban areas in Earth remote sensing. Due to the large objects dominating the segmentation process, small object are consequently limited, so solutions based on optimizing overall accuracy are often unsatisfactory. Due to the class imbalance of semantic segmentation in Earth remote sensing images in urban areas, we developed the concept of Down-Sampling Block (DownBlock) to obtain contextual information and Up-Sampling Block (UpBlock) to restore the original resolution. We proposed an end-to-end deep convolutional neural network (DenseU-Net) architecture for pixel-wise urban remote sensing image segmentation. this method to segmentation the small object in satellite imagery.The accuracy of the small object class in this study was further improved using our proposed method. This study used data from the Massachusetts Buildings dataset using Dense U-Net method and obtained an overall accuracy of 84.34%.
A Security Framework for Secure Host-to-Host Environments Togu Sianturi; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (448.08 KB) | DOI: 10.29207/resti.v6i3.4018

Abstract

Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data using different media particularly in host-to-host connections. This research focuses on data exchanged (end-to-end communication) using Multi Protocol Label Switching (MPLS), metro ethernet, and Software Defined Wide Area Network (SD-WAN) network architecture with third parties. This research aims to develop a design and analysis framework for verifying data transferred from one host to another in ABC organization by applicable security standards that are appropriate and follow its needs to help the organization. Furthermore, the analysis result is used as materials for drafting a cybersecurity framework through the three standards ISO/EIC 27001:2013, NIST SP800-161, and ITU-T X.805. The methodology used in this study is the comparative analysis of three frameworks, requirement analysis, and content analysis to develop a framework. The framework proposed of eight security dimensions, five threats, and providing mitigation is expected to enhance the security system of data exchange on host-to-host connections in ABC organization.

Page 54 of 105 | Total Record : 1046