cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
mib.stmikbd@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
JURNAL MEDIA INFORMATIKA BUDIDARMA
ISSN : 26145278     EISSN : 25488368     DOI : http://dx.doi.org/10.30865/mib.v3i1.1060
Decission Support System, Expert System, Informatics tecnique, Information System, Cryptography, Networking, Security, Computer Science, Image Processing, Artificial Inteligence, Steganography etc (related to informatics and computer science)
Articles 1,182 Documents
Sentiment and Discussion Topic Analysis on Social Media Group using Support Vector Machine Salsabila Putri Adityani; Donni Richasdy; Widi Astuti
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4233

Abstract

The growth of social media in this modern era is increasingly rapid, where people are very active digitally interacting with each other. People who have a common interest or simply like to be in a community often gather in an online group, especially on Facebook. Alumni of Telkom University are no exception, who are also actively discussing and sharing information in Telkom University Alumni Forum Facebook group (FAST). By using their status from that group, sentiment and topic discussion analysis can be performed to determine whether the polarity is positive, neutral, or negative. In Addition, topic modeling extracts what topics are often discussed in the group. In this research, sentiment analysis was performed using the Support Vector Machine (SVM) method. Also, the classification process involved TF-IDF for word weighting and confusion matrix as performance measurement. Several testing scenarios were carried out to get the best accuracy value. Based on the tests performed on the preprocessing technique and feature extraction n-gram addition, the highest accuracy value obtained is 80.56%. The result indicates that the best performance is obtained by combining preprocessing techniques without the stopword removal process and feature extraction unigram. Moreover, the topics discussed based on topic modeling results were related to telecommunication and Telkom, Indonesia, alumni, and FAST.
Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia Sunardi Sunardi; Abdul Fadlil; Nur Makkie Perdana Kusuma
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.3999

Abstract

Profiling of victims of crime is intended to facilitate the targeting of information dissemination and carry out prevention efforts. Profiling is helpful to increase the awareness of internet users against cybercrime. This study aims to create a sociodemographic profile based on online fraud victims using Instant Messengers in Indonesia based on the sociodemography of online fraud victims, namely age, gender, education level, domicile, occupation, duration of using the internet in a day, and Instant Messenger media used. The method used in this research is the descriptive statistical method, namely Data Mining using the snowball sampling method by sharing a link via WhatsApp. Participants were given a link to fill out several survey questions about the sociodemographic of the victim, such as age, gender, occupation, domicile, and online fraud that had been experienced through the IM application. The survey was created using GoogleForms and sent online via WhatsApp to participants who had been victims of online fraud. The Data Mining technique was used to analyze the responses of 1910 participants and then classified using the Naïve Bayes Algorithm. The results showed that the Naïve Bayes Algorithm has an accuracy percentage of 75.28%. The prediction model for the vulnerability of online fraud victims is a female respondent, aged 27.3 years, using Instagram and WhatsApp, currently living in Central Java Province, education background is high school, and the duration of using the internet more than eight hours a day, and status as a Student/College Student.
Identify User Behavior based on Tweet Type on Twitter Platform using Agglomerative Hierarchical Clustering Prawiro Weninggalih; Yuliant Sibaroni
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4342

Abstract

Information dissemination can occur through any media, including social media. One of the social media that has become a forum for disseminating information is Twitter. Through user-uploaded tweets, not a few comments are positive (praise/support) or negative (blasphemy), depending on the tweet. This study chooses politics as a discussion. Data crawling was carried out to obtain a dataset and raise the topic of Joko Widodo as a President of Indonesia, whose work is considered poor by the public, so they want him to resign immediately. This makes it interesting because we can identify user behavior from tweets about the topic. The choice of this topic was based on a lot of users who discussed it, so it was trending on Twitter. Preprocessing stage aims to eliminate missing values. After that, it then goes through the feature extraction process. The agglomerative Hierarchical Clustering Algorithm of the clustering method is applied in this research. This algorithm can directly set how many clusters to facilitate the clustering process. The result obtained 3 clusters with different user behavior. Negative user behavior is found in cluster 1, while positive user behavior is found in cluster 2.
Algoritma K-Nearest Neighbors dan Synthetic Minority Oversampling Technique dalam Prediksi Pemesanan Tiket Pesawat Wulan Suci; Samsudin Samsudin
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4374

Abstract

This study applies the Synthetic Minority Oversampling Technique to improve the performance of the K-Nearest Neighbors method in predicting the unbalanced data class. Most classification algorithms implicitly assume that the processed data has a balanced distribution, so that the standard classifier is more inclined towards data with a dominant class number (majority class). The use of Synthetic Minority Oversampling Technique can improve the performance of the K-Nearest Neighbors method for flight ticket booking data. Although in terms of accuracy, Synthetic Minority Oversampling Technique with K-Nearest Neighbors is lower at 79.65% compared to K-Nearest Neighbors without using Synthetic Minority Oversampling Technique, which is 97.81%, the suggested technique did not improve but from other performance, The proposed method can outperform K-Nearest Neighbors by using Synthetic Minority Oversampling Technique in terms of precision, recall, and F1-Score when applied to the Airline Ticket Booking dataset. Precision increased 18.00% from 62.00% to 80.00%, recall increased 28.00% from 52.00% to 80.00%, and F1-Score increased 27.00% from 53.00% to 80 ,00% on the flight ticket booking dataset.
Rekonstruksi Model 3D dari Set Citra Menggunakan Metode SFM-MVS dan Algoritma Poisson Giri Hanbudi; Esa Fauzi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4126

Abstract

The digital creative industry is growing massively and very fast. The use of 3D technology in various industrial fields is also in demand, for example in the manufacturing, film, and animation industries. In a certain scene, generally 3D generalists will create a 3D model that resembles a real model in the real world which is usually used as a property in the 3D scene such as accessories, furniture, wardrobes, and so on. The process of modeling 3D models manually by a 3D generalist is a long process and requires a long time in the process, where the process generally includes 3d layouting, 3d modeling, and 3d texturing. Through this 3D model reconstruction process, 3D models can be obtained quickly, cheaply, and efficiently. This process can be carried out through several stages using a set of images from a model to be reconstructed. Several approaches can be used in this 3D model reconstruction process. In this paper, we will use the Structure From Motion (SFM) and Multi-View Stereo (MVS) methods to obtain information on the sparse and dense point clouds in the image, followed by The Surface Reconstruction process using the Poisson Algorithm to obtain a triangle mesh from the actual shape of the object. The refinement process on the triangle mesh results is carried out in order to get maximum results. Through a combination of these methods, we managed to get a detailed and accurate 3D model with the real object being observed.
Penerapan Algoritma Apriori pada Sistem Informasi Inventori Toko Muhammad Ulil Albab; Deny Hidayatullah
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4160

Abstract

In this contemporary era, meals wishes are a vital want for all people, a variety of commercial enterprise companies that sell their products are coming and growing quite significantly, besides that, dynamic web users in this country are growing quite rapidly every year. Resulting in business actors competing with each other to explore various technical options in terms of data processing to find out information on the availability of incoming goods and goods sold. In this study, a business still uses a manual system here and a computerized system will be created to assist business people in processing goods data in their business, then obtain information related to inventory and profit income. This web-primarily based totally stock statistics device additionally applies apriori information mining to decide income styles on the way to later grow to be patron advice statistics. The results obtained in this study are the creation of a web-based inventory information system by applying apriori data mining aimed at Toko Tri.
Perancangan dan Implementasi Encoder dan Decoder CRC-8 untuk Pendeteksian Error pada Transmisi Data antar Perangkat IoT Donny Priyadi; Theophilus Wellem
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4366

Abstract

Cyclic Redundancy Check (CRC) is a widely used error detection code in digital communication systems to detect errors in data transmitted between transmitter and receiver. With the development of Internet-of-Things (IoT) technology, where many devices communicate wirelessly, the application of error detection codes such as CRC is essential to obtain reliable communication. The computation of CRC can be implemented in hardware using a linear feedback shift register (LFSR) or in software with shift and bitwise exclusive OR (XOR) operations for polynomial division. Due to the frequent use of CRC in wireless communication for IoT, research for the design and implementation of CRC continues to this day. This study aims to design and implement the encoder and decoder of CRC-8 with generator polynomial 0x07 on IoT devices. Two algorithms for computing the CRC, namely bitwise computation using LFSR and another one using lookup tables, are implemented on the Arduino Uno R3 board. Two Arduino boards connected in serial were used to verify the encoder and decoder implementation in the data transmission and error detection process. The experiment results showed that the encoder could correctly calculate the CRC value from the input data. Furthermore, the computation using lookup tables takes about four times faster than the bitwise method but requires more memory. In contrast, the bitwise computation method requires less memory but slower computation time. When testing using input data of 128 characters, the bitwise-based encoder requires a computation time of 2.37 milliseconds, while the lookup table-based encoder utilizing a lookup table requires a computation time of 0.5 milliseconds. In the error detection test, the results demonstrated that the receiver could detect errors in the transmitted data with a percentage of 100%.
Sistem Pendukung Keputusan Penentuan Profesi Mahasiswa Informatika Menggunakan Metode WP-RIASEC Raihan Aqila Taufik; Miftahurrahma Rosyda
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4312

Abstract

Informatic Program in Ahmad Dahlan University engaged in the field of informatics/computer science. At the Informatic Program in Ahmad Dahlan University, there are still many students who are confused when they want to decide which profession to pursue when they graduate. This is based on a questionnaire distributed to final semester students from the Informatics Program in Ahmad Dahlan University. From the distributed questionnaires, the results of the questionnaire were obtained, namely more than 50 percent of respondents were still confused in determining the professional field to be occupied when they graduated. In addition, in an interview conducted with a psychologist, he said that personality is very influential on a person's work. To help Ahmad Dahlan University Informatics Students in determining a profession, a decision support system was created that can help students of the department in determining the appropriate professional field based on the value of the course and their personality. The method used in this research is WP and RIASEC. The WP method plays a role in calculating the weight of each course value. While the RIASEC method plays a role in determining a person's personality which is the basis for determining appropriate professional alternatives based on their personality. The results of system testing that have been carried out on 10 respondents consisting of 7 students and 3 alumni from the Informatics Program in Ahmad Dahlan University have obtained test results with a value of 84.5, which means the system is running well and meets the existing standards.
Penerapan Metode MAUT Dalam Penentuan Kelayakan TKI dengan Pembobotan ROC Dimas Hadityo Ramadan; M Ridho Siregar; Saidi Ramadan Siregar
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4441

Abstract

-Indonesia is a country that has a large population, but the employment opportunities are not sufficient in increasing the survival of the population. This has caused many Indonesians to become Indonesian Migrant Workers (TKI) abroad. During this period of time in making a decision on the eligibility of TKI abroad at the stage of selecting prospective TKI at BP3KI, it is only done by looking at the criteria for work experience, whereas at the selection stage for TKI candidates can use several criteria, namely education, work experience, age, knowledge, skills, and ethics. In determining the eligibility of Indonesian migrant workers abroad, a decision support system is needed. The method applied in this study is the MAUT method with ROC weighting. The application of these two methods is expected to be able to produce alternatives from a number of existing alternatives, while the best alternative result from this research is Alternative A5 "Boby" with a value of Ui = 0.9748 which is eligible to become a TKI abroad.
Desain Interkoneksi Jaringan Menggunakan Vpn Internet Untuk Mendukung Sistem Pemerintahan Berbasis Elektronik Yayan Candra Subidin; Darius Antoni
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.3880

Abstract

The rapid advance in information and communication technologies developement has greatly facilitated the development of electronic government worldwide. This can be seen from the various applications of information technology in government agencies, including integrated Electronic-Based Government System (SPBE). Numerous government agencies have implemented SPBE services for their daily operations. However, there are not infrequently the initiative for the existence of ICT infrastructure in several government institutions has some issues because due to various aims and backgrounds in developing it. The issues such, development of ICT network infrastructure is less efficient and effectiveness, the absence of a standard network system configuration, and the network security system underestimated. Therefore, this research will be designed and built ogan komering ulu regency government network systems using IPv4-based internet VPN with Network Development Life Cycle (NDLC) method. The purpose of this research is to provide a model of uniformity in the preparation of government network configurations, realize network interconnection between government agencies that make better utilization of network infrastructure, and support SPBE in Goverment of Ogan Komering Ulu District and improve aspects of network security in government. The results of this study indicate that by using a VPN network interconnection design, private network communication that passes through the public network (internet) will be more secure so that data confidentiality is maintained. The quality of data exchange in the form of images, sound, and text is better with a stable speed and maintained security. The use of IPv4 for network interconnection is used to reach all government agencies in the Scope of Government of Ogan Komering Ulu Regency.

Page 66 of 119 | Total Record : 1182