cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 217 Documents
The Social Engagement to Agricultural Issues using Social Network Analysis Widiyanti, Tanty Yanuar; Adji, Teguh Bharata; Hidayah, Indriana
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2185

Abstract

Twitter is one of the micro-blogging social media which emphasizes the speed of communication. In the 4.0 era, the government also promotes the distribution of information through social media to reach the community from various lines.  In previous research, Social Network Analysis was used to see the relationship between actors in a work environment, or as a basis for identifying the application of technology adoption in decision making, whereas no one has used SNA to see trends in people's response to agricultural information. This study aims to see the extent to which information about agriculture reaches the community, as well as to see the community's response to take part in agricultural development.  This article also shows the actors who took part in disseminating information. Data was taken on November 13 to 20, 2020 from the Drone Emprit Academic, and was taken limited to 3000 nodes. Then, the measurements of the SNA are represented on the values of Degree Centrality, Betweenness Centrality, Closeness Centrality, and Eigenvector Centrality. @AdrianiLaksmi has the highest value in Eigenvector Centrality and Degree Centrality, he has the greatest role in disseminating information and has many followers among other accounts that spread the same information. While the @RamliRizal account ranks the highest in Betweenness Centrality, who has the most frequently referred information, and the highest Closeness Centrality is owned by the @baigmac account because of the fastest to re-tweet the first information.
A Comparative Study of Transfer Learning and Fine-Tuning Method on Deep Learning Models for Wayang Dataset Classification Mustafid, Ahmad; Pamuji, Muhammad Murah; Helmiyah, Siti
IJID (International Journal on Informatics for Development) Vol. 9 No. 2 (2020): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.09207

Abstract

Deep Learning is an essential technique in the classification problem in machine learning based on artificial neural networks. The general issue in deep learning is data-hungry, which require a plethora of data to train some model. Wayang is a shadow puppet art theater from Indonesia, especially in the Javanese culture. It has several indistinguishable characters. In this paper, We tried proposing some steps and techniques on how to classify the characters and handle the issue on a small wayang dataset by using model selection, transfer learning, and fine-tuning to obtain efficient and precise accuracy on our classification problem. The research used 50 images for each class and a total of 24 wayang characters classes. We collected and implemented various architectures from the initial version of deep learning to the latest proposed model and their state-of-art. The transfer learning and fine-tuning method showed a significant increase in accuracy, validation accuracy. By using Transfer Learning, it was possible to design the deep learning model with good classifiers within a short number of times on a small dataset. It performed 100% on their training on both EfficientNetB0 and MobileNetV3-small. On validation accuracy, gave 98.33% and 98.75%, respectively.
Self-Evaluation of Jurnal Informatika Sunan Kalijaga (JISKa): Perspectives of Reviewers and Authors Gunawan, Eko Hadi; Wonoseto, Muhammad Galih; Minati, Sekar; Nuruzzaman, Muhammad Taufiq
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2265

Abstract

The success of JISKa is inseparable from the role of reviewers and authors. Unfortunately, JISKa had never been assessed or evaluated by reviewers and authors despite the fact that assessment from the reviewers and authors would be valuable feedback for JISKa’s self-evaluation. Therefore, survey-based research has recently been conducted to assess JISKa’s performance using the User Acceptance Test of OJS version 2.4.8.0. This study used a survey method to obtain an assessment and evaluation from reviewers and authors related to JISKa.The respondents in this study consist of 68 authors and 26 reviewers. The result of this study stated that 91.2% of the authors and 84.6% of reviewers are satisfied with JISKa. A percentage number of 100% of writers and reviewers wants JISKa to raise its level of Sinta accreditation. This accreditation is awarded in 2018 and will end in 2023. JISKa is now on Sinta 4.The JISKa website appearance looks good and easy to use. The dashboard on the JISKa page is user-friendly for the author. However, the current version of JISKa OJS 2.4.8.0 needs to be upgraded to OJS version 3. There are some points for the future consideration of JISKa: JISKa needs to promote itself more, upgrade the OJS version, and provide the reviewers with certificates of appreciation for future consideration.
Cover and Table of Content ijid, Ijid
IJID (International Journal on Informatics for Development) Vol. 9 No. 2 (2020): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.%x

Abstract

Information System for Monitoring High-Risk Pregnant Women Wilda, Anisa Nurul; Fitriyati, Yasmini; Muhimmah, Izzati
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2269

Abstract

Maternal mortality rates are still high in several areas, including Bantul Regency, Special Region of Yogyakarta. Based on the data obtained from the Bantul District Health Office, from 2018 to 2019, 28 pregnant women died. Posyandu and Puskesmas cadres often encounter problems in collecting data on pregnant women because they still use manual methods. Manual records using books has disadvantages because sometimes pregnant women forget to bring their books. Therefore, an application for recording pregnancy history is needed to enable convenient monitoring by Posyandu cadres, Puskesmas, doctors, and hospitals in order that pregnant women patients can be handled properly in case of emergency. The application used by pregnant women is Mobile App-based, meanwhile, the Web-based Monitoring Information System is used by Posyandu cadres, Puskesmas, doctors, and hospitals. The application allows displaying the medical history and makes it easier for pregnant women to have counseling or examinations without meeting directly with the doctor. If there are any problems in the womb, the doctor will immediately provide a solution or recommendation. The results of the system testing with 15 respondents as users show that 52,1% strongly agree, 37,7% agree, and 10,2% neutral in response to the system interface. The implementation of the information system for monitoring high-risk pregnant women in the majority is accepted by all actors. Hence, it can be concluded that in an attempt to digitalize manual recording of pregnant women's examinations, this information system for monitoring high-risk pregnant women is reliable to be implemented.
The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack Pradana, Dio Aditya; Budiman, Ade Surya
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2287

Abstract

DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.
Song Recommendation Application Using Speech Emotion Recognition Setiawan, Eko Budi; Iqbal Dzulfiqar, Al Ghani
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2354

Abstract

This research was conducted to facilitate the interaction between radio broadcasters and radio listeners during the song request process.  This research was triggered by the difficulty of the broadcasters in monitoring song requests from listeners. The system is made to accommodate all song requests by listeners. The application produced in this study uses speech emotion recognition technology based on a person's mood obtained from the spoken words.  This technology can change the voice into one of the mood categories: neutral, angry, sad, and afraid.  The k-Nearest Neighbor method is used to get recommendations for recommended song titles by looking for the closeness of the value between the listener's mood and the availability of song playlists. kNN is used because this method is suitable for user-based collaborative problems. kNN will recommend three songs which then be offered to listeners by broadcasters. Based on tests conducted to the broadcasters and radio listeners, this study has produced a song request application by recommending song titles according to the listener's mood,  the text message, the searching songs, and the song requests and the song details that have been requested. Functional test that has been carried out has received 100 because all test components have succeeded as expected.
A Machine Learning Framework for Improving Classification Performance on Credit Approval Prastyo, Pulung Hendro; Prasetyo, Septian Eko; Arti, Shindy
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2384

Abstract

Credit scoring is a model commonly used in the decision-making process to refuse or accept loan requests. The credit score model depends on the type of loan or credit and is complemented by various credit factors. At present, there is no accurate model for determining which creditors are eligible for loans. Therefore, an accurate and automatic model is needed to make it easier for banks to determine appropriate creditors. To address the problem, we propose a new approach using the combination of a machine learning algorithm (Naïve Bayes), Information Gain (IG), and discretization in classifying creditors. This research work employed an experimental method using the Weka application. Australian Credit Approval data was used as a dataset, which contains 690 instances of data. In this study, Information Gain is employed as a feature selection to select relevant features so that the Naïve Bayes algorithm can work optimally. The confusion matrix is used as an evaluator and 10-fold cross-validation as a validator. Based on experimental results, our proposed method could improve the classification performance, which reached the highest performance in average accuracy, precision, recall, and f-measure with the value of 86.29%, 86.33%, 86.29%, 86.30%, and 91.52%, respectively. Besides, the proposed method also obtains 91.52% of the ROC area. It indicates that our proposed method can be classified as an excellent classification.
Sentiment Analysis and Topic Modeling of Indonesian Public Conversation about COVID-19 Epidemics on Twitter Habibi, Muhammad; Priadana, Adri; Rifqi Ma’arif, Muhammad
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2400

Abstract

The World Health Organization (WHO) declared the COVID-19 outbreak has resulted in more than six million confirmed cases and more than 371,000 deaths globally on June 1, 2020. The incident sparked a flood of scientific research to help society deal with the virus, both inside and outside the medical domain. Research related to public health analysis and public conversations about the spread of COVID-19 on social media is one of the highlights of researchers in the world. People can analyze information from social media as supporting data about public health. Analyzing public conversations will help the relevant authorities understand public opinion and information gaps between them and the public, helping them develop appropriate emergency response strategies to address existing problems in the community during the pandemic and provide information on the population's emotions in different contexts. However, research related to the analysis of public health and public conversations was so far conducted only through supervised analysis of textual data. In this study, we aim to analyze specifically the sentiment and topic modeling of Indonesian public conversations about the COVID-19 on Twitter using the NLP technique. We applied some methods to analyze the sentiment to obtain the best classification method. In this study, the topic modeling was carried out unsupervised using Latent Dirichlet Allocation (LDA). The results of this study reveal that the most frequently discussed topic related to the COVID-19 pandemic is economic issues.
Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method Umar, Rusydi; Riadi, Imam; Kusuma, Ridho Surya
IJID (International Journal on Informatics for Development) Vol. 10 No. 1 (2021): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2423

Abstract

Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.

Filter by Year

2012 2025


Filter By Issues
All Issue Vol. 14 No. 1 (2025): IJID June 2025 Vol. 13 No. 2 (2024): IJID December Vol. 13 No. 1 (2024): IJID June Vol. 12 No. 2 (2023): IJID December Vol. 12 No. 1 (2023): IJID June Vol. 11 No. 2 (2022): IJID December Vol. 11 No. 1 (2022): IJID June Vol. 10 No. 2 (2021): IJID December Vol. 10 No. 1 (2021): IJID June Vol. 9 No. 2 (2020): IJID December Vol. 9 No. 1 (2020): IJID June Vol. 8 No. 2 (2019): IJID December Vol. 8 No. 1 (2019): IJID June Vol 7, No 2 (2018): IJID December Vol. 7 No. 2 (2018): IJID December Vol 7, No 2 (2018): IJID December Vol 7, No 1 (2018): IJID June Vol. 7 No. 1 (2018): IJID June Vol 7, No 1 (2018): IJID June Vol. 6 No. 2 (2017): IJID December Vol 6, No 2 (2017): IJID December Vol 6, No 2 (2017): IJID December Vol 6, No 1 (2017): IJID June Vol 6, No 1 (2017): IJID June Vol. 6 No. 1 (2017): IJID June Vol 5, No 2 (2016): IJID December Vol. 5 No. 2 (2016): IJID December Vol 5, No 1 (2016): IJID May Vol. 5 No. 1 (2016): IJID May Vol. 4 No. 2 (2015): IJID December Vol 4, No 2 (2015): IJID December Vol 4, No 1 (2015): IJID May Vol. 4 No. 1 (2015): IJID May Vol 3, No 2 (2014): IJID December Vol. 3 No. 2 (2014): IJID December Vol 3, No 1 (2014): IJID May Vol. 3 No. 1 (2014): IJID May Vol. 2 No. 2 (2013): IJID December Vol 2, No 2 (2013): IJID December Vol 2, No 1 (2013): IJID May Vol. 2 No. 1 (2013): IJID May Vol. 1 No. 2 (2012): IJID December Vol 1, No 2 (2012): IJID December Vol 1, No 2 (2012): IJID December Vol 1, No 1 (2012): IJID May Vol 1, No 1 (2012): IJID May Vol. 1 No. 1 (2012): IJID May More Issue