cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 1,046 Documents
Gift Recommendations Based on Personality Using Fuzzy and Big Five Personality Test Susana Limanto; Vincentius Riandaru Prasetyo; Ni Wayan Gitaputri
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4507

Abstract

Gifts are usually given to someone to strengthen a relationship or to motivate someone. However, givers often need help determining the appropriate gift for the potential recipient. On the other hand, many recipients are disappointed with the gifts received. This event can result in the relationship between the giver and recipient being disrupted or the motivational goal not being achieved. This research aims to develop a system to recommend gifts based on the recipient's personality. Gift recommendation is determined based on the recipient's personality because the recipient highly values gifts that match the recipient's personality. The system is built using the Fuzzy method, and the personality measurement tool used is the Big Five Personality Test. Fifteen pairs of respondents validated the system. The validation results show that 80% of respondents as gift-givers strongly agree that the system helps determine the appropriate gift for someone. In addition, 73.33% of respondents as gift recipients strongly agree that the gifts recommended by the system do not disappoint them.
Heart Attack Notification and Monitoring System Using Internet of Things Maya Fitria; Ramzi Adriman; Irham Muhammaddin Batubara; Akhyar Bintang
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4509

Abstract

People are frequently shocked when someone passes away suddenly without any prior symptoms. One of the contributing factors is a heart attack. This condition might occur anywhere and at any time. A sudden heart attack can be highly perilous for a person who is alone, without family members or friends because the family cannot be informed of the victim's condition or their location. Therefore, it is vital to raise awareness of heart attacks. With the support of the Internet of Things, this study aims to develop a wearable device that people may use to monitor their heart health and connect with hospitals to get alerts in case of a heart attack. This system also provides family members with access to a web-based patient monitoring tool. The heart beat is considered as the parameter in developing this system. There are three types of evaluation which are conducted in this study, namely: 1) Sub-system evaluation; 2) Black-box testing; and 3) Integrating system testing. The three evaluation results show that all assembled hardware components are work properly and the system effectively satisfies the objectives of monitoring, buzzer activation, hospital and patient family notification, and so forth, with 1.96% average sensor error, which is still considerably acceptable.
Using Social Media Data to Monitor Natural Disaster: A Multi Dimension Convolutional Neural Network Approach with Word Embedding Mohammad Reza Faisal; Irwan Budiman; Friska Abadi; Muhammad Haekal; Mera Kartika Delimayanti; Dodon Turianto Nugrahadi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4525

Abstract

Social media has a significant role in natural disaster management, namely as an early warning and monitoring when natural disasters occur. Artificial intelligence can maximize the use of natural disaster social media messages for natural disaster management. The artificial intelligence system will classify social media message texts into three categories: eyewitness, non-eyewitness and don't-know. Messages with the eyewitness category are essential because they can provide the time and location of natural disasters. A common problem in text classification research is that feature extraction techniques ignore word meanings, omit word order information and produce high-dimensional data. In this study, a feature extraction technique can maintain word order information and meaning by using three-word embedding techniques, namely word2vec, fastText, and Glove. The result is data with 1D, 2D, and 3D dimensions. This study also proposes a data formation technique with new features by combining data from all word embedding techniques. The classification model is made using three Convolutional Neural Network (CNN) techniques, namely 1D CNN, 2D CNN and 3D CNN. The best accuracy results in this study were in the case of earthquakes 78.33%, forest fires 81.97%, and floods 78.33%. The calculation of the average accuracy shows that the 2D and 3D v1 data formation techniques work better than other techniques. Other results show that the proposed technique produces better average accuracy.
Topic Modeling for Support Ticket using Latent Dirichlet Allocation Wiranto Wiranto; Mila Rosyida Uswatunnisa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4542

Abstract

In the business world, communication over customers must be built properly to make it easier for companies to find out what customers want. Support ticket is one of the business instrument for communication between the customers and the companies. Through a support ticket, customers can respond, complain or ask questions about products with a support team. Increasing the business process of the companies will be increasing the support ticket volume that should be handled by support team. It also has a value for analysis to get business intelligence decision. With that chance, an efficient data processing method is needed to find topics are being discussed by customers. One way that can be used to solve this problem is Topic Modeling. This research uses several parameters the number of topics, alpha value, beta value, iteration, and random seed. With this combination of parameters, the best results based on evaluation of human judgement and topic coherence with 5 topics, an alpha value of 50, a beta value of 0.01, 100 iterations, and 50 random seeds. The five topics interpretation consists of hosting migration, error problems in wordpress, domain email settings and domain transfer, ticketing and transaction processing. The total of 5 topics has a coherence value of 0.507897.
Measuring the effect of Users' Privacy Concerns on the Use of Jakarta Smart City Mobile Application (JAKI) Arif Wahyudi; Mirza Triyuna Putra; Dana Indra Sensuse; Sofian Lusa; Prasetyo Adi; Assaf Arief
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4544

Abstract

Jakarta Kini (JAKI) is a super-app developed by Jakarta Smart City that offers a one-stop service to help citizens connect and communicate with the Government. It is undeniable that the use of mobile applications can indeed facilitate people's activities, but on the other hand, it also poses risks and raises concerns in terms of privacy. The purpose of this study is to assess the impact of users' privacy concerns on their tendency to use the JAKI mobile application. To measure the privacy concern, we conduct an online survey of the users of JAKI. The hypothesis and research model were formulated to assess the users' privacy concerns based on the Mobile Users' Information Privacy Concerns (MUIPC) theory, with additional factors, namely prior privacy experience and awareness, as the antecedents. As a result, we found that MUIPC had a significant effect on negatively influencing the intention to use the JAKI application. Our study contributes as a starting point in exploring privacy research in the context of a smart city in Indonesia. Additionally, this study proved that the IPC scales that were originally designed for English-based countries could also be adapted to Bahasa Indonesia and utilized in the Indonesian context.
Indonesian Crude Oil Price (ICP) Prediction Using Multiple Linear Regression Algorithm Des Suryani; Mutia Fadhilla; Ause Labellapansa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4590

Abstract

Crude oil prices play a significant role in the global economy, therefore accurate prediction of oil prices is very important. Therefore, a forecasting model is needed to predict Crude Oil Prices. The purpose of this study is to forecast the price of crude oil from Indonesia (ICP). The data source is from a website published by the Ministry of Energy and Mineral Resources (ESDM), namely monthly crude oil price data specifically for six main types of crude oil: SLC, Attaka, Duri, Belida, Banyu and SC. The data used is data for a period of 5 years (2018 – 2022). The data available is in the form of time series data. Dated Brent combined with the Alpha factor for each month and year is a reference in determining the ICP price. Forecasting Indonesian crude oil prices in the future is based on the historical oil price of the previous period. The Data Mining algorithm used for forecasting is Multiple Linear Regression. The dataset processed using training data is 80%, and testing data is 20%. The model produced, on average, has a good level of accuracy in calculating MAPE where for SLC = 9%, Attaka = 45%, Duri = 126%, Belida = 33%, Banyu = 150% and SC = 50%. Based on the MAPE calculation value, the Linear Regression Equation to predict Indonesian Crude Oil Prices (ICP) shows that the model produced by SLC crude oil is very good. Attaka, Belida and SC crude oil yielded fair yields and Duri and Banyu crude oil yielded poor yields.
Digital Forensic on Secure Digital High Capacity using DFRWS Method Anton Yudhana; Imam Riadi; Budi Putra
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4615

Abstract

As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC. The three cases with the highest number are corruption cases, special crimes, and ITE. SDHC is an advanced technology development of Secure Digital (SD) card hardware which functions as storage. SD Card only has a capacity of up to 2 gigabytes, while the largest SDHC capacity is 32 gigabytes. As a storage device that is small, thin, and has a fairly large capacity. this research needs to be done because of the increasingly widespread increase in cases involving SDHC. This study aims to perform digital forensic analysis on SDHC evidence using forensic applications that run on Linux, namely foremost and DC3DD. This study uses the DFRWS method to retrieve valid evidence in court. Based on the research conducted, it was found that the number of files that can be restored at the examination stage using foremost is 77%, and the accuracy of recovered files is 50% with string file hash validation. From this research, it can be concluded that the processing results of DC3DD and Foremost can be used as valid evidence.
Mamdani Fuzzy Expert System for Online Learning to Diagnose Infectious Diseases Istiadi Istiadi; Emma Budi Sulistiarini; Rudy Joegijantoro; Anik Vega Vitianingsih; Affi Nizar Suksmawati
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4656

Abstract

E-learning and expert systems can be implemented for learning in the health sector. Through the e-learning system, prospective health workers can analyze problems by exploring the material in the system. However, material learning alone is less effective, so case study-based learning using an expert system is needed to strengthen understanding. The research applies an expert system to online learning to diagnose several infectious diseases. The disease diagnosis process uses the backward chaining method and the Mamdani fuzzy inference system. The fuzzy Mamdani inference system determines the intensity of disease severity so that appropriate treatment recommendations can be made. The test findings on 15 test datasets yielded a backward chaining accuracy value of 100%. Three test scenarios were used to establish the test using the Mamdani fuzzy inference method. Scenario 1: Testing with the Center of Gravity defuzzification and Fuzzy Mamdani Min inference system Tests employing the Fuzzy Mamdani Min inference method and center average defuzzification are used in Scenario 2. Scenario 3 involves testing using the Fuzzy Mamdani Product Inference System with Center Average Defuzzification. The average outcome for the intensity of disease severity utilizing the Fuzzy Mamdani Min inference system with Center of Gravity defuzzification was greater than that of the two test scenarios that were suggested, which was 49.43%.
Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique Dwi Kurnia Wibowo; Ahmad Luthfi; Yudi Prayudi; Erika Ramadhani; Muhamad Maulana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4714

Abstract

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.
Naïve Bayes and TF-IDF for Sentiment Analysis of the Covid-19 Booster Vaccine Imelda Imelda; Arief Ramdhan Kurnianto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 1 (2023): February 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i1.4467

Abstract

The booster vaccine polemic became a trending topic on Twitter and reaped many pros and cons. This booster vaccine began to be distributed on January 12, 2022. This booster vaccine program was implemented free of charge for the people of Indonesia to prevent the new variant of Covid-19, Omicron. The contribution of this study is to analyze the sentiment of booster vaccines to prevent covid-19 using the Naïve Bayes and TF-IDF methods. We conducted sentiment analysis to determine whether the tweet was positive, negative, or neutral. The solution used is the Naïve Bayes method and TF-IDF. The role of TF-IDF is to determine how relevant the data in the document is by utilizing word weighting. The stages of this research using CRISP-DM include Business Understanding, Data Understanding, Data Preparation, Modelling, Evaluation, and Deployment. The net data results show 1,557 data with a positive sentiment of 1,335, a neutral sentiment of 171 data, and a negative sentiment of 51 data. The test results with 60:40 data sharing obtained accuracy, precision, and recall values of 85.26%, 85%, and 100%. The results of this test have increased by 7.26%, 12%, and 20% from other previous studies with the same data distribution.

Page 63 of 105 | Total Record : 1046