cover
Contact Name
Fransiskus Panca Juniawan
Contact Email
Fransiskus Panca Juniawan
Phone
-
Journal Mail Official
fransiskus.pj@atmaluhur.ac.id
Editorial Address
-
Location
Kota pangkal pinang,
Kepulauan bangka belitung
INDONESIA
Jurnal Sisfokom (Sistem Informasi dan Komputer)
ISSN : 23017988     EISSN : 25810588     DOI : -
Jurnal Sisfokom merupakan singkatan dari Jurnal Sistem Informasi dan Komputer. Jurnal ini merupakan kolaborasi antara sivitas akademika STMIK Atma Luhur dengan perguruan tinggi maupun universitas di Indonesia. Jurnal ini berisi artikel ilmiah dari peneliti, akademisi, serta para pemerhati TI. Jurnal Sisfokom diterbitkan 2 kali dalam setahun yaitu pada bulan Maret dan September. Jurnal ini menyajikan makalah dalam bidang ilmu sistem informasi dan komputer.
Arjuna Subject : -
Articles 678 Documents
Comparison of the Performance of Random Forest and K-Nearest Neighbor in Classifying Leukemia Using Principal Component Analysis Sriani, Sriani; Ikhsan, Muhammad; harahap, lailan sofinah
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 2 (2024): JULY
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i2.2165

Abstract

Leukemia is the most common blood cancer in Asia, one of which is Indonesia. Leukemia can affect blood cells, bone marrow, lymph nodes and other parts of the lymphatic system. One way to detect leukemia is to use microarray technology by applying gene expression. Microarrays have a very large number of genes so it is necessary to reduce the number of genes in order to eliminate irrelevant features and increase the accuracy of the classification process. The leukemia feature/gene reduction process was carried out using PCA and the classification process was carried out using RF and KNN. The accuracy results from the RF classification method using 100 n_estimators were 78.57%, while using the KNN method the accuracy results with K=1 were 78.57%, K=3 and 5 were 85.71%, and K=7 and 9 were 71.42%. The best accuracy results use KNN with K=3 and 5.
Performance Analysis of Classification Models in Multiclass Facial Expression Recognition Based on Eigenface Features Yulina, Syefrida; Rachmawati, Heni
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 12, No 3 (2023): NOVEMBER
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v12i3.1742

Abstract

Facial Expression Recognition (FER) is currently widely explored by researchers in the field of Computer Vision. The application of Machine Learning and Deep Learning methods is useful in developing an intelligent system that is accurate in recognizing facial expressions such as emotions. This is inseparable from the type of dataset and classification method used which certainly affects the desired results. To choose the right method, it is necessary to compare the performance of these methods. This study focuses on comparing the performance results of four classification methods namely, Convolutional Neural Network (CNN), Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Naïve Bayes Classifier (NBC) on a multiclass dataset for seven classes of facial emotion labels based on Eigenface feature selection uses the Personal Component Analysis (PCA) algorithm. The test parameters used to perform method comparisons are accuracy, recall, precision, f1-score, as well as the Receiving Operating Characteristic (ROC) and Area Under Curve (AUC) curves. The results of the analysis state that the SVM method has the highest accuracy value, while other methods show varying performance based on recall, precision, f1-score, and ROC and AUC analysis. This research was conducted on the FER 2013 dataset which showed that the classification method tested had quite good performance according to the test parameters.
Comparison of Gabor Filter Parameter Characteristics for Dorsal Hand Vein Authentication Using Artificial Neural Networks Putra, Wahyu Irwan; Yudono, Muchtar Ali Setyo; Sujjada, Alun
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 12, No 3 (2023): NOVEMBER
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v12i3.1819

Abstract

The importance of digital security in today's technological era requires various innovations in creating a reliable security system for humans. Biometrics is an authentication method and the most effective system for performing personal recognition because biometrics have unique characteristics. Dorsal hand vein become biometrics for the individual recognition process in this study using feature extraction of gabor filters and neural network backpropagation to classify recognition into five classes of human individuals, which are expected to be able to provide a higher accuracy value when compared to research on the introduction of dorsal hand vein. This classification process has several stages, namely input image, image pre-processing, segmentation, feature extraction, and image classification. The test results show that the percentage of success based on the five test scenarios has an average value of 75%. In this study, the results of the greatest test accuracy in the fourth scenario were 91%.
Identifying Credit Card Fraud in Illegal Transactions Using Random Forest and Decision Tree Algorithms Werdiningsih, Indah; Purwanti, Endah; Wira Aditya, Gede Rangga; Hidayat, Auliya Rakhman; Athallah, R. Sulthan Rafi; Sahar, Virda Adisty; Wibisono, Tio Satrio; Nura Somba, Darren Febriand
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 12, No 3 (2023): NOVEMBER
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v12i3.1730

Abstract

The use of credit cards is increasing in today's digital era. This increase has resulted in many cases of fraud which have had a negative impact on credit card owners. To overcome this, many financial institutions have developed credit card fraud detection systems that can identify suspicious transactions. This study uses a classification method, namely random forest and decision tree to identify illegal transactions using a credit card, which then compares the results and attempts to create a model that can be useful for detecting fraud using a credit card that is more accurate and effective. The result of this study is that the accuracy provided by the Decision Tree Classifier is 0.98, while the accuracy provided by the Random Forest Classification is also 0.975. The conclusion obtained that the decision tree has a higher level of accuracy compared to the Random Forest Classification Algorithm, which is 98%. On the other hand, the Random Forest classification algorithm has a slightly lower level of accuracy compared to the Decision Tree classification algorithm, with an accuracy rate of 97.5%
Implementation of Data Mining to Predict Student Study Period with Decision Tree Algorithm (C4.5) Putri, Kirana Alyssa; Febriawan, Dimas; Hasan, Firman Noor
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 1 (2024): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i1.1943

Abstract

Graduating on time is what every student wants to accomplish in college. Students of Prof. Dr. Hamka Muhammadiyah University are one of those who have this dream. Based on 2020 graduates data from the Tracer Study, 60% said the university had a high enough impact  on improving competence.  This data indicates that university needs to evaluate improvement of academic quality. Often, students have difficulty finding information about important factors that support achieving timely graduation. A prediction analysis is needed to provide information about the student's graduation study period. For this analysis, data mining is implemented using the classification function of the decision tree (C4.5) algorithm with RapidMiner tools. The methodology for implementing data mining follows the stages of Knowledge Discovery In Database (KDD), beginning with data collection, preprocessing, transformation, data mining, and evaluation. The research findings consist of visualization and decision tree rules that reveal GPA as the most influential factor in determining a student's study period.There is other information, namely, students graduated on time (less than equal to 4 years) amounted to 170 or 54.5% and students did not graduate on time (more than 4 years) amounted to 142 or 45.6%. Testing the performance of decision tree (C4.5) utilizing confusion matrix through RapidMiner tools, resulted in accuracy reaching 83.87%, with precision of 87.50% and recall of 91.18%. Provides evidence that the decision tree algorithm (C4.5) has optimal performance to provide valuable information about predicting student graduation in order to increase student enrollment with the right study period.
Factors Influencing Acceptance of ILMU E-Learning Among Lecturers: An Empirical Study Based on UTAUT Model Safitri, Eristya Maya; Amalia, Indira Setia; Mukaromah, Siti; Faroqi, Asif
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 1 (2024): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i1.1972

Abstract

E-learning is a form of innovation in technology used in educational field, including higher education. University of Pembangunan Nasional “Veteran” Jawa Timur is one of many universities that have implemented e-learning called ILMU to support the teaching-learning process. The application of ILMU as e-learning has yet to be utilised by lecturers, due to some challenges in implementation of ILMU regarding accessibility and features of ILMU. Meanwhile, successful implementation of a technology requires acceptance from its users. This research was acquited to define what acceptance factors that influence lecturers while accessing ILMU. This study is measured using UTAUT model. The research was carried on by quantitatively distributing questionnaires to 60 lecturers. Data were analyzed and processed using SEM-PLS technique and SMARTPLS 3.0 application. Factors that influence users to receive ILMU e-learning and significantly are effort expectancy, social influence, facilitating conditions, and behavioral intention. Meanwhile, performance expectancy does not influence users significantly to accept ILMU e-learning. These factors are key indicators to of the implementation and improvement of ILMU e-learning, thus it will develop a better implementation for the lecturers to use and accept it. 
Detection of Rice Leaf Pests Based on Images with Convolution Neural Network in Yollo v8 Fauzi, Ahmad; Baihaqi, Kiki Ahmad; Pertiwi, Anggun; Devianto, Yudo; Dwiasnati, Saruni
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 1 (2024): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i1.2008

Abstract

Detection of rice leaf pests is important in agriculture because it can help farmers determine appropriate preventive measures. One method that can be used to detect rice leaf pests is digital image processing technology. In this research, proof of suitability for solving this case was carried out between the Convolutional Neural Network (CNN) algorithm which was run offline with R-CNN and YOLOv8 for detecting rice leaf pests. At the data preparation stage, images of rice leaves were taken from various sources with a total of 100 images taken from website data and 10 images taken from the research site. Next, preprocessing and data augmentation are carried out to improve image quality and increase data variation. At the model training stage, a training and evaluation process is carried out using two types of algorithms, namely R-CNN and YOLOv8. The accuracy of the testing results using the same data using Yolov8 obtained 87.0% accuracy and 79% precision, while using R-CNN the results obtained were 85% for accuracy and 75% for precision with data divided into 80 training data 20 validation data and 10 testing data. Labeling the dataset uses Makesensei which has been completely standardized, with the resulting parameters being the spots on rice leaves.
Analysis of Factors that Influence the Acceptance of Using Online Retail Applications: A Case Study of XYZ Wholesale and Retail Stores Inayah, Suci -; Sensuse, Dana Indra; Lusa, Sofian
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 1 (2024): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i1.2051

Abstract

E-commerce users in Indonesia continue to increase along with advances in digitalization. This causes a trend to occur where many offline shop entrepreneurs are responding to changes in consumer behavior by creating online shopping applications to maintain the existence of their business to be consistent with time progress. The purpose of this research is to find out what factors affect user acceptance of online retail applications used for online shopping at XYZ stores using the UTAUT2 acceptance model. In line with changes, case studies were conducted on grocery stores and retail stores that carried out digital innovation by creating online retail applications for their consumers. The research was conducted using a mixed method, data was collected through interviews with sources and using a questionnaire spread to 149 research sample consumers. The data processing technique uses PLS-SEM with SmartPLS tools. The research results show that 4 factors influence the use of online retail applications, including hedonic motivation, habit, behavioral intention, and application use. The results of this research can be used as material for management considerations to increase the excellence of the application so that user interest in online shopping using the application at XYZ store increases
Analysis and Design of Integration Model for API Management and CI/CD at Directorate General of Taxation Pramudaya, Tri; Agustina, Fenni
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 2 (2024): JULY
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i2.2086

Abstract

The Directorate General of Taxes (DGT) currently  utilizes Application Programming Interface (API) to enhance efficiency in tax data exchange with external parties. DGT is facing challenges due to the rising number of published APIs and the increasing connections from external parties to the DGT system, which necessitates a speedy API issuance process. The objective of this research is to assist the Directorate General of Taxation (DGT) in developing an integrated API management system with Continuous Integration/Continuous Deployment (CI/CD). The system design process is conducted using the Standards and Architectures for E-Government Application (SAGA) framework, encompassing Enterprise Viewpoint, Technology Viewpoint, Computational Viewpoint, Information Viewpoint, and Engineering Viewpoint. A qualitative method is employed, including interviews to gain insights into the existing issues. Additionally, information regarding systems and technologies is documented for gap analysis. The results of this analysis are then utilized to design the architecture of the API management system, applications, and technologies. This research yields a model of the API management system integrated with CI/CD at DGT. The model is developed using 3Scale and Jenkins software. Following validation, the API management system at DGT operates effectively with three DGT API systems and three API users.
Analysis of the USM Lecturer PPKM application portal using COBIT 2019 Framework nuranto, bogo; Hartomo, Kristoko Dwi; wahyono, Teguh
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 13, No 2 (2024): JULY
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i2.2108

Abstract

The USM lecturer PPKM application portal information system provides services and information regarding the research and community service activities of USM lecturers. The services available in this application include PPKM proposals, PPKM assessments, PPKM evaluations, progress reports, contracts, assignment letters and presentation schedules. To improve the system services that have been used so far, analysis and evaluation are needed so that system performance can provide accurate information and according to needs. The purpose of this research is to analyze the performance of applications using the COBIT 2019 framework. The method used is a mix method, which combines data from interviews and observations and data from questionnaires. The research subjects consisted of 7 (seven) IT admins and 30 USM permanent lecturers. The COBIT 2019 framework used as the basis for analysis consists of 11 factors, namely:  Enterprise strategy; Enterprise goals; Risk Profile; IT Related Issue; IT Threat Landscape; Compliance Requirement; Role Of IT; IT Sourcing Model; IT Implementation Method; Technology Adaptation Strategy; and Enterprise Strategy. The results showed that there are 2 (two) objectives that need to go to the core model evaluation stage, namely BAI03 and BAI07. The results of the maturity analysis on BAI03 are at level 2, which is 67.1%. While the results of the maturity analysis on BAI07 show results of 72.7%.