cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 1,046 Documents
Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System Hartina Hiromi Satyanegara; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (488.897 KB) | DOI: 10.29207/resti.v6i3.4035

Abstract

Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as website or system deface or phishing. Deep Learning could be able to predict various data well. Hence, in this study, we would like to present the approach to detect MitM attacks and process its data, by implementing hybrid deep learning methods. We used 2 (two) combinations of the Deep Learning methods, which are CNN-MLP and CNN-LSTM. We also used various Feature Scaling methods before building the model and will determine the better hybrid deep learning methods for detecting MitM attack, as well as the feature selection methods that could generate the highest accuracy. Kitsune Network Attack Dataset (ARP MitM Ettercap) is the dataset used in this study. The results prove that CNN-MLP has better results than CNN-LSTM on average, which has the accuracy rate respectively at 99.74%, 99.67%, and 99.57%, and using Standard Scaler has the highest accuracy (99.74%) among other scenarios.
The Formula Study in Determining the Best Number of Neurons in Neural Network Backpropagation Architecture with Three Hidden Layers Syaharuddin Syaharuddin; Fatmawati Fatmawati; Herry Suprajitno
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.715 KB) | DOI: 10.29207/resti.v6i3.4049

Abstract

The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general architecture consisting of one hidden layer. Researchers are still producing minimal research that discusses how to determine the number of neurons when using hidden layers. This article examines the results of experiments by conducting training and testing data using seven recommended formulas including the Hecht-Nelson, Marchandani-Cao, Lawrence & Fredrickson, Berry-Linoff, Boger-Guterman, JingTao-Chew, and Lawrence & Fredrickson modifications. We use rainfall data and temperature data with a 10-day type for the last 10 years (2012-2021) sourced from Lombok International Airport Station, Indonesia. The training and testing data used showed the results that in determining the number of neurons on the hidden-1 screen, it was more appropriate to use the Hecht-Nelson formula and the Lawrence & Fredricson formula which is more suitable for use in the 2nd & 3rd hidden layer. The resulting research was able to provide an accuracy rate of up to 97.79% (temperature data) and 99.94% (rainfall data) with an architecture of 36-73-37-19-1.
Interdependency and Priority of Critical Infrastructure Information (Case Study: Indonesia Payment System) Arini Muhafidzah; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.352 KB) | DOI: 10.29207/resti.v6i3.4051

Abstract

The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is needed to reduce risks that may arise. But the author's best knowledge, in Indonesia, no reference describes the interdependency of the CII sector that could be used as input on strategy making for reducing the risk on all CII sectors which are influencing the payment system. This research uses the Fuzzy-based DANP (FDANP) Framework based on a multi-expert perspective on inter-sector influences to identify the interdependency and priority of the CII sector with a case study on the payment system. The contribution of this research is to provide information about the interdependency and priority of the CII sector. The findings of this research show that 5 sectors that have an influence on other sectors with a case study of the payment system and the information and communication technology sector, the energy and mineral resources sector, and the financial sector are the three major sectors that must be paid more attention to because they have an impact on many sectors.
Implementation of Naïve Bayes for Fish Freshness Identification Based on Image Processing Sabarudin Saputra; Anton Yudhana; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (746.63 KB) | DOI: 10.29207/resti.v6i3.4062

Abstract

Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of huge amounts of fish in the market in order to determine the freshness of the fish before it reaches the hands of consumers. So far, market managers have relied on traditional ways to determine the freshness of fish in circulation. The issue is that traditional solutions, such as the use expert assessment, demand a human physique that quickly experiences fatigue. Technological developments can be a solution to these problems, such as utilizing image processing techniques classification method. Image processing with the use of color features is an effective method to determine the freshness of fish. The classification method used in this research is the Naive Bayes method. This study aims to identify the freshness of fish based on digital images and determine the performance level of the method. The identification process uses the RGB color value feature of fisheye images. The stages of fish freshness identification include cropping, segmentation, RGB value extraction, training, and testing. The classification data are 210 RGB value of extraction images which are divided into 147 data for training and 63 data for testing. The research data were divided into fresh class, started to rot class, and rotted class. The research shows that the Naive Bayes algorithm can be used in the process of identifying the freshness level of fish based on fisheye images with a test accuracy rate of 79.37%.
k-Nearest Neighbor and Feature Extraction on Detection of Pest and Diseases of Cocoa Mohammad Yazdi Pusadan; Syahrullah; Merry; Ahmad Imam Abdullah
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.908 KB) | DOI: 10.29207/resti.v6i3.4064

Abstract

Knowledge and utilization of digital images are growing rapidly not only in the fields of medicine and industry but also in the field of agriculture. This knowledge can apply it to a computer-based program that is used to detect agricultural products more effectively and efficiently. this research aims to build a system to detect the types of pests and diseases of cocoa pods because in general, an inspection of pests and diseases of cocoa pods is still manual based on the visual analysis of the color of the pods visually by the human eye which has limitations, which requires more energy to sort, the level of human consistency. In terms of assessing the symptoms of pests and fruit diseases, it is not guaranteed, because humans can experience fatigue, and humans also assess symptoms of pests and fruit diseases, sometimes it is subjective. This study utilizes digital image processing techniques to extract the color features of digital images of cocoa pods, the method used to extract the color features of Hue, Saturation, Value (HSV), and the classification algorithm used by K-Nearest Neighbor. The data used as many as 150 images divided into 70% training data and 30% testing data. Based on the results of trials using k values ​​of 5,7,11 and 13 in the holdout method, the best accuracy is 84.44% with a value of k = 5. And in the k-5 cross-validation test, the best accuracy is also found at k = 5 with a value accuracy of 99.33%.
Fuzzy Learning Vector Quantization Untuk Klasifikasi Citra Daging Oplosan Berdasarkan Ciri Warna dan Tekstur Lidya Ningsih; Agus Buono; Mushthofa; Toto Haryanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.932 KB) | DOI: 10.29207/resti.v6i3.4067

Abstract

Beef consumption is quite high and expensive in the world. In Indonesia, beef prices are relatively expensive because the meat supply chain from farmers to the market is quite long. The high demand for beef and the difficulty of obtaining meat are factors in the high price of meat. This makes some meat traders cheat by mixing beef and pork (oplosan). Mixing beef and pork is detrimental to beef consumers, especially those who are Muslim. In this paper, we proposed a new strategy for identifying beef, pig, and mixed meat utilizing Fuzzy learning vector quantization (FLVQ) Based on the color and texture aspects of the meat. The HSV (Hue saturation value) approach is used for color features, whereas the GLCM (Gray level co-occurrence matrix) method is used for texture features. This study makes use of primary data collected from the Pasar Bawah Tourism and Cipuan Market in Pekanbaru, Riau Province. The data set consists of 600 photos, 200 each of beef, pork, and mixed. Based on the test scenario, the coefficient of fuzzyness and learning rate affect the accuracy of meat image identification. The proposed strategy has succeeded in classifying pork, beef and mixed meat with the best percentage of accuracy results in theclasses of beef and pork, beef and mixed, pork and mixed meat, respectively, at 100%, 97.5%, and 95%. This demonstrates that the proposed strategy has succeeded in classifying the image of pork, beef, and mixed.
Sybil Attack Prediction on Vehicle Network Using Deep Learning Zulfahmi Helmi; Ramzi Adriman; Teuku Yuliar Arif; Hubbul Walidainy; Maya Fitria
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.315 KB) | DOI: 10.29207/resti.v6i3.4089

Abstract

Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being attacked. The Sybil attack is one of the attacks that occur by broadcasting spurious information to the nodes in the network and could cause a crippled network. The Sybil strikes the network by camouflaging themselves as a node and providing false information to nearby nodes. This study is conducted to predict the Sybil attack by analyzing the attack pattern using a deep learning algorithm. The variables exerted in this research are time, location, and traffic density. By implementing a deep learning algorithm enacting the Sybil attack pattern and combining several variables, such as time, position, and traffic density, it reaches 94% of detected Sybil attacks.
Development of Mastoid Air Cell System Extraction Method on Temporal CT-scan Image Syafri Arlis; Sarjon Defit; Sumijan
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (480.37 KB) | DOI: 10.29207/resti.v6i3.4090

Abstract

Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone. Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid air cell system (MACS), but the fact that medical personnel are experiencing difficulties in determining the size MACS is due to the many different characteristics and objects overlap, so that in the measurement of the area, precise and accurate results have not been obtained. This study aims to separate the object of the MACS with the development of extraction. The proposed method uses Morphology and Regionprops operations. The dataset used in the testing process is 347 of 5 patients indicated for Mastoiditis. The results obtained can calculate the area of MACS for each test image. Based on image testing, the area of the smallest MACS in this study was 0.589 cm2 and the largest was 6.183 cm2. This, the smaller the size of the MACS indicates the severity of infection, so this study can help medical personnel make decisions and take appropriate treatment actions.
Detection of Covid-19 on X-Ray Image of Human Chest Using CNN and Transfer Learning Jalu Nusantoro; Faldo Fajri Afrinanto; Wana Salam Labibah; Zamah Sari; Yufis Azhar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (780.664 KB) | DOI: 10.29207/resti.v6i3.4118

Abstract

At the end of 2019, a new disease called Coronavirus Disease (COVID-19) originated in Wuhan, China. This disease is caused by respiratory tract infections, ranging from the common cold to serious diseases such as Middle East Respiratory Syndrome (MERS) and Severe Acute Respiratory Syndrome (SARS). In Indonesia, there are tests to detect COVID-19, such as PCR and Rapid Test. This detector takes a long time and is less accurate in producing a diagnosis. This study aims to classify chest X-ray images using CNN and Transfer Learning methods to diagnose COVID-19. The proposed model has 4 scenarios: CNN Handcraft Model, Transfer Learning (VGG 16, VGG 19, and ResNet 50). This model is accompanied by data augmentation and data balancing techniques using undersampling techniques. The dataset used in this study is the “Covid-19 (COVID-19 and Normal) Radiographic Database” with 13,808 data divided into two classes, namely COVID-19 and Normal. Each model built will produce values for accuracy, precision, recall, and confusion matrix. The results of CNN Scenario 1 accuracy is 95%, in Scenario 2 VGG 16 the accuracy is 93%, Scenario 3 VGG 19 is 90% and Scenario 4 ResNet 50 is 80%.
Prediction of Retweets Based on User, Content, and Time Features Using EUSBoost Ghina Khoerunnisa; Jondri; Widi Astuti
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.217 KB) | DOI: 10.29207/resti.v6i3.4125

Abstract

Twitter is one of the popular microblogs that allow users to write posts. Retweeting is one of the mechanisms for the diffusion of information on Twitter. One way to understand the spread of information is to learn about retweet predictions. This study focuses on predicting retweets using Evolutionary Undersampling Boosting (EUSBoost) based on user, content, and time-based features. We also consider the vector of text as a predictive feature. Models with EUSBoost are able to outperform models using the AdaBoost method. The evaluation results show that the best model can achieve an AUC performance score of 77.21% and a GM score of 77.18%. While the Adaboost-based models achieved AUC scores ranging from 68% to 69% and GM scores ranging from 62% to 63%. In addition, we found that there was no significant difference between using numeric features only and combining numeric and text features.

Page 55 of 105 | Total Record : 1046