cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 134 Documents
Analysis of the Resilient Method in Training and Accuracy in the Backpropagation Method Widodo Saputra; Agus Perdana Windarto; Anjar Wanto
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 1 (2021): March 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i1.2922

Abstract

Artificial Neural Network (ANN) is one of the clusters of computer science that leads to artificial intelligence, there are several methods in ANN, one of which is the backpropagation method. This method is used in the prediction process. In some cases the backpropagation method can help in problems solving, especially predictions. However, the backpropagation method has weaknesses. The results of the backpropagation method are very influenced by the determination of the parameters so that the convergence becomes very slow. So needed an optimization method to optimize the performance of the bakpropagation method. The resilient backpropgation method is one solution, this method can change the weight and bias of the network with a direct adaptation process of weighting based on local gradient information from learning iterations so that it can provide optimal results. The data used is the Higher Education Gross Enrollment Rate in Indonesia from 2015-2020 by province. The results were obtained from several data testing with architectural experiments 3-5-1, 3-20-1, 3-37-1, 3-19-1, 3-26-4 and 3-4-1 from backpropagation and resilient testing, shows that the data training process can be optimized significantly, but the accuracy is not evenly optimal
Geographic Information System of Oil Palm Location Based on Android Olha Musa; Zainudin Sidik
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3173

Abstract

This study designs a geographic information system (GIS) that always adapts to the current development of information technology, many researches are carried out to encourage the emergence of new discoveries in the world of technology. One of the uses of GIS is to make it easier for decision makers to determine the policies to be taken, especially those related to spatial aspects. So far, the data and information on the location of plantation lands that are presented are still in the form of reports containing numbers and text, while maps are still presented manually on books or paper, so a geographic information system is needed that can provide information to companies about the location of oil palm lands. easy and fast. The purpose of this study is to build an android-based geographic information system for oil palm land in Mootilango District. The method used is the Research and Development method, this application is designed using PHP and HTML programming language software, namely Macromedia Dreamwever, Java programming language using Android studio, and tools for modeling using UML (Unified Modeling Language). By testing the system using whitebox and blackbox testing, with this test the correct graph flow is obtained as a sample of researchers in testing. The results of this research are the implementation of the system that is designed to be suitable for use and can have a good impact on the company, so that this system can make it easier for companies to get palm oil information quickly anytime and anywhere. Based on the blackbox test table, the results are appropriate
Application of SAW (Simple Additive Weighting) for the Selection of Campus Ambassadors Iman Judi Tua Situmeang; Siti Hummairoh; Sonya Malinda Harahap; Mesran Mesran
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 1 (2021): March 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i1.2847

Abstract

Budi Darma University is one of the private colleges in North Sumatra, Indonesia. To make this campus even better, a campus ambassador was chosen who would later be assigned as student representatives to promote the campus to the community and also as an icon that could have a better impact on the campus environment. Campus ambassadors themselves are active students at the campus who are selected based on predetermined criteria according to the needs of the campus. In the process of selecting a campus ambassador to get more optimal results, a decision support system is needed. In this study using the simple additive weighting (SAW) method as decision support in selecting campus ambassadors.
Business Intelligence for Unemployment Rate Management System Tika Octri Dieni; Ken Ditha Tania; Fathoni Fathoni; M Ihsan Jambak; Pacu Putra
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3128

Abstract

Unemployment rate is one of many problems which being faced by the government for each country, especially in Indonesia. Based on statistics data, Central Bureau of Statistics (Indonesia), unemployment rate in Indonesia is quite high which scattered throughout the province. Those data was obtained with a long proccess, by the time, human resources and cost which are not small. Thus, this paper proposes business intelligence for unemployment rate management system to predict from its several causes which are potentially on increasing unemployment rate, using Business Intelligence Roadmap methods, it used because its adaptive and detail which consists of 18 stages from 6 phases. There is one of the 18 stages, namely data mining, for this data mining using the KNN algorithm. Business intelligence can proccessing data into useful information or knowledge. Generally, business intelligence has main process which are data collection, then this data would be processed by ETL (Extract, Transform, Load) before get into data warehouse as a place data storage, so that those data could functionally used for analysis process with OLAP and data mining to classify the result of unemployment rate prediction from its several potentially causes. This paper would possibly to find patterns in the unemployment rate and its causes then the result of the pattern will visualizations on web application with business intelligence based that would be developed that easy to used / user friendly and attractive user interface
Analysis of Community Awareness Against Threats to Personal Data Security Through Phishing Websites M Alvian H Nasution; Joko Dwi Santoso
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3053

Abstract

The threat of personal data security is a very sensitive matter lately, Website Phishing is one of the activities that can trap and threaten someone by deceiving that person. From the results of the Phishing Website, the victim indirectly provides data or information about the victim to the trapper. In this case, Phishing Websites are one of the cyber crimes that are still very often used to retrieve victim data. "What is expected from this research is to obtain a percentage value related to the level of public awareness of the crime of phishing where many people are still unfamiliar with the crime that is increasingly happening through social media, one of which is WhatsApp". Phishing website attacks are carried out by creating a fake website address that is as similar as possible to the original website, then the trapper sends this Phishing website address to the target/victim via Whatsapp social media. In this study, the data collection method will use the quantitative method, which is how to make a questionnaire that will be filled out by 80 respondents who come from the general public who are still unfamiliar with technology. The results of this study will contain the presentation of respondents to the awareness of Phishing Websites, it is hoped that this research will make the general public who are still unfamiliar with Phishing Websites more careful about website threats that can attack at any time.
Analysis of Website Security of SMKN 1 Pangandaran Against SQL Injection Attack Using OWASP Method Agung Tri Laksono; Joko Dwi Santoso
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3208

Abstract

Every technological development is usually accompanied by an increase in security on a digital platform that is widely used by a large audience. However, with the rapid development of information technology, some of the security gaps found can be used as loopholes to commit crimes where these actions can harm others. These actions are often carried out by irresponsible people to benefit from the actions taken. Some of the gaps that are often found on digital platforms, especially on websites are SQL Injection where from BSSN data from January to April 2019, 73% of the vulnerability reports received are SQL Injection vulnerabilities. In addition, SQL Injection is also the number one threat to the security of a website application, where this SQL Injection attack is a code injection attack technique that is carried out by exploiting the security gaps that exist in the database layer of a website. In this study, taking the theme of SQL Injection which aims to conduct security analysis from the website of the school agency SMKN 1 Pangandaran, using OWASP which is used to carry out the analysis process. The result of testing the system on the website is where the attacker can perform injection using SQL payload to enter the database. Where the results of system analysis and testing will be recommended to close gaps on existing websites.
Estimation Chlorophyll-a Using Landsat-8 Imagery in Shallow Water: Effect of Atmospheric and Algorithm Abdi Sukmono; Lilik Kristianingsih
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 1 (2021): March 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i1.2954

Abstract

Chlorophyll-a estimation using remote sensing technology is being challenged to improve its accuracy. Various algorithms and correction methods need to be studied, including the influence of the atmosphere. It can influence the passage of the electromagnetic wave from the sun to the object and from the object to the sensor that makes the difference on the image reflectance. There are two kinds of reflectance; which are ToA (Top of Atmosphere) reflectance and BoA (Bottom of Atmosphere) reflectance. ToA reflectance is the reflectance captured by the sensor yet BoA reflectance is the reflectance of the object corrected by the atmosphere. ToA reflectance is produced by radiometric calibration while BoA reflectance is made of atmospheric correction process. This research studies aims to compare those to reflectance to investigate the impact of atmospheric correction usage on chlorophyll-a case study. The waters of Wedung district is chosen as the research field because it is the largest area in Demak regency. This study used DOS (Dark Object Substractions), FLAASH (Fast Line of sight Atmospheric Analysis of Spectral Hypercubes), and 6SV (Second Simullations of a Satellite Signal in the Solar Spectrum) correction method. To compare between ToA and BoA reflectance in the calculation of chlorophyll-a, the writer used the algorithms of Wouthuyzen, Wibowo, Pentury, Much Jisin and also Lestari Laksmi. The result shown is that the usage of BoA image reflectance (atmospherically corrected) had a better model result than ToA image reflectance. This is indicated from the consecutive determination coefficient values of ToA reflectance which are 0,2292; 0,4562; 0,2292; 0,2252. Meanwhile the consecutive coefficient values of BoA reflectance by DOS correction method are 0,5251; 0,5575; 0,5251; 0,6939; by FLAASH correction method are 0,6168, 0,5041, 0,6168, 0,614; by 6SV method are 0,6436; 0,4033; 0,6436; 0,6365. The result of hypothesis and validation test is that atmospheric correction significantly influences on the calculation of chlorophyll-a in Wedung district except using Wibowo algorithm.
Pond Geographic Information System Polygon Geometry Web Based at Pohuwato Regency Office Abdul Malik I Buna; Bahtiar Senung; Abdul Rahman Ismail
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3191

Abstract

The large number of pond owners using land that is already included in protected forest areas and nature reserve areas has made it difficult for officers to obtain information on the tax objects for pond cultivation. Geographical Information System Application for Tambak Web Based Geometry Polygon at the Pohuwato Fisheries Service which is integrated directly with the internet. The goal is to make it easier for the officers and owners of the pond to find out information about the area of the pond and the taxes payable periodically automatically directly from the website. The research method uses the Waterfall method. Take basic activities such as specification, development, validation, and evolution and represent them as different process phases such as requirements specification, software design, implementation, testing and so on. This application will be developed for the desktop with a web-based operating system. There are two programming techniques used, the client side will use Java programming and the server side will use PHP Programing
Performance Comparison Analysis of the Elias Delta Code Algorithm with the Even Rodeh Code Algorithm for Compressing Image Files Elvia Hariska; Ega Yuliani; Surya Darma Nasution
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 1 (2021): March 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i1.2888

Abstract

A file or files have a large size, especially an image file. So that it can affect a storage memory and also mess in the speed of data transmission. If an image file has a large capacity it can affect the sending process. So that the sending process has two possibilities, namely the image file sent will require a long process or the image file will experience failure in sending because the storage size exceeds the maximum limit. This problem can be overcome by compressing the data. Data compression can reduce the size of data storage on both internal and external memory, speeding up data transmission due to smaller storage sizes. Data compression has several algorithms that can be used. In this research, the writer will compare the performance of Elias Delta Code algorithm with even Rodeh Code algorithm. Thus obtaining which algorithm is the most efficient used for the image file compression process.
Analysis of Missing Value Imputation Application with K-Nearest Neighbor (K-NN) Algorithm in Dataset Achmad Fikri Sallaby; Azlan Azlan
The IJICS (International Journal of Informatics and Computer Science) Vol 5, No 2 (2021): July 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/ijics.v5i2.3185

Abstract

Missing value is a problem that is still often found in many studies. Missing value is where data or data features are not available completely and intact. This still happens a lot in datasets that will be used in research. The missing value is caused by many factors such as human error, unavailable data or even from a virus in the database. Data is important for research, incomplete data will affect the results obtained. Data mining is a process that is very influential on data, including the classification process. Classification in data mining can be done if the data is complete. These problems can be overcome by the Imputation process by combining it with the K-Nearest Neighbor process or the process can be called K-Nearest Neighbor Imputation (K-NNI). In the research that has been done the K-Nearest Neighbor Imputation algorithm can overcome the problem of missing values in the dataset. This can be seen from the level of accuracy obtained where the accuracy of the classification process before handling the missing value is 77.01% while after the imputation process the accuracy is 78.31%

Page 6 of 14 | Total Record : 134