cover
Contact Name
Muhammad Taufiq Nuruzzaman
Contact Email
m.taufiq@uin-suka.ac.id
Phone
+6287708181179
Journal Mail Official
jiska@uin-suka.ac.id
Editorial Address
Teknik Informatika, Fak. Sains dan Teknologi, UIN Sunan Kalijaga Jln. Marsda Adisucipto No 1 55281 Yogyakarta
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
JISKa (Jurnal Informatika Sunan Kalijaga)
ISSN : 25275836     EISSN : 25280074     DOI : -
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 4 No. 3 (2020): Januari 2020" : 7 Documents clear
Penerapan Algoritma Hill Cipher dan Least Significant Bit (LSB) untuk Pengamanan Pesan pada Citra Digital Desimeri Laoli; Bosker Sinaga; Anita Sindar R M Sinaga
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (909.824 KB) | DOI: 10.14421/jiska.2020.43-01

Abstract

Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.   
Deteksi Serangan Distributed Denia of Services (DDOS) Berbasis HTTP Menggunakan Metode Fuzzy Sugeno Nadila Sugianti; Yayang Galuh; Salma Fatia; Khadijah Fahmi Hayati Holle
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.622 KB) | DOI: 10.14421/jiska.2020.43-03

Abstract

Distributed Denial of Services (DDOS) is a type of attack that exploits the web. This attack causes the server to go down and a system error. Thus, early detection of DDOS attacks is fundamental. The purpose of this paper is to develop applications that are capable of detecting HTTP-based DDOS attacks. This paper uses the sugeno fuzzy method for a systematic approach. From several studies that have been conducted, the researchers identified that the optimal input variables included the number of users, number of packages, number of lengths / users, and length of packages. Data processing used MATLAB software. The validity of the test uses the formula for the level of accuracy as in equation (3), resulting in an application that is able to detect HTTP-based DDOS attacks using sugeno fuzzy method with an accuracy rate of up to 90%.
Journal Classification Based on Abstract Using Cosine Similarity and Support Vector Machine Muhammad Habibi; Puji Winar Cahyo
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2072.722 KB) | DOI: 10.14421/jiska.2020.43-06

Abstract

One of the problems related to journal publishing is the process of categorizing entry into journals according to the field of science. A large number of journal documents included in a journal editorial makes it difficult to categorize so that the process of plotting to reviewers requires a long process. The review process in a journal must be done planning according to the expertise of the reviewer, to produce a quality journal. This study aims to create a classification model that can classify journals automatically using the Cosine Similarity algorithm and Support Vector Machine in the classification process and using the TF-IDF weighting method. The object of this research is abstract in scientific journals. The journals will be classified according to the reviewer's field of expertise. Based on the experimental results, the Support Vector Machine method produces better performance accuracy than the Cosine Similarity method. The results of the calculation of the value of precision, recall, and f-score are known that the Support Vector Machine method produces better amounts, in line with the accuracy value.
Desain dan Implementasi Simulasi Intrusion Index Berbasis Sistem Pakar dengan Metode Forward Chaining Mardian Mardian; H. Jemakmun; Linda Atika
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2013.036 KB) | DOI: 10.14421/jiska.2020.43-04

Abstract

Adanya kebutuhan internet yang semakin meningkat, ketertarikan dan perhatian pada internet juga semakin luas dan cepat sehingga harus diseimbangi dengan keamanan yang lebih cepat pada jaringan internet, terutama  dari hal gangguan serangan atau akses ilegal pada jaringan internet. Keamanan jaringan bergantung pada kecepatan pengaturan jaringan dalam hal menindaklanjuti sistem saat terjadi gangguan. Untuk itu diperlukan suatu perangkat lunak yang mampu melakukan deteksi dan pengukuran serangan dengan menggunakan sistem pakar. Hasil dari desain dan simulasi yang dilakukan dalam penelitian ini dapat menggambarkan cara atau alur penggunaan sistem dari pengelola yang menjadi aktor, memperlihatkan cara aliran informasi mengalir dalam suatu sistem serta dapat memberikan gambaran sistem secara statis yang memperlihatkan relasi atau hubungan antarkelas yang saling berkaitan mengenai sistem informasi sistem pakar untuk keamanan jaringan internet dan penerapan intrusion index yang dapat menggolongkan jenis serangan ke dalam tiga tingkatan yaitu deflect, prevent, dan preempt dengan menerapkan mesin inferensi ke dalam metode forward chaining.  
Pengembangan Sistem Pemetaan Status Mutu Air Sungai Berbasis Web Menggunakan Extreme Programming Shofwatul Uyun
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (630.235 KB) | DOI: 10.14421/jiska.2020.43-05

Abstract

The high water pollution index causes a decrease in water quality so that it can interfere with the health of living things. In order to overcome this, the government has tried to monitor water quality whose results can be known by the community. However, information disclosure and ease of accessing information are felt to be lacking. This study aims to present information about the quality status of river water and its relatively up-to-date and easily accessed by the public online. The storet method is used to determine the status of river water quality with seven parameters: temperature, EC, TDS, pH, DO, BOD and E.coli. The features provided will be explained in the results and discussion presented in several UML diagrams. In order to get results that match user expectations, this system was developed with extreme programming system development methods.
Diagnosa Penyakit Demam Berdarah Dengue (DBD) menggunakan Metode Learning Vector Quantization (LVQ) Firman Tawakal; Ahmedika Azkiya
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1992.248 KB) | DOI: 10.14421/jiska.2020.43-07

Abstract

Dengue Hemorrhagic Fever is a disease that is carried and transmitted through the mosquito Aedes aegypti and Aedes albopictus which is commonly found in tropical and subtropical regions such as in Indonesia to Northern Australia. in 2013 there are 2.35 million reported cases, which is 37,687 case is heavy cases of DHF. DHF’s symthoms have a similarity with typhoid fever, it often occur wrong handling. Therefore we need a system that is able to diagnose the disease suffered by patients, so that they can recognize whether the patient has DHF or Typhoid. The system will be built using Neural Network Learning Vector Quantization (LVQ) based on the best training results. This research is to diagnose Dengue Hemorrhagic Fever using LVQ with input parameters are hemoglobin, leukocytes, platelets, and heritrocytes. Based on result, the best accuracy is 97,14% with Mean Square Error (MSE) is 0.028571 with 84 train data and 36 test data. Conclution from the research is LVQ method can diagnose DHF Keywords: Dengue Hemorrhagic Fever; Learning Vector Quantization; classification; Neural Network;
Pengembangan Aplikasi Computer Based Test dengan Protokol Two Central Facilities Muhannad Nasyithul Ibad
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1929.728 KB) | DOI: 10.14421/jiska.2020.43-02

Abstract

The Indonesian government has issued a policy on Ujian Nasional Berbasis Komputer (UNBK), or it can be called CBT (Computer Based Test). In this study is the development of the CBT system using the Two Central Facilities protocol, which consists of the Central Legitimization Agency (CLA) and the Central Tabulating Facilities (CTF). In developing this CBT system, CLA is used to authenticate the examinees, while CTF is used to provide questions and calculation of exam answers. To maintain security added encryption using the RSA Algorithm (Rivest-Shamir-Adleman) which functions to convert data into ciphertext. From the results of functional trials, this system has succeeded in applying the Two Central Facilities protocol. This system has been connected to the CLA and CTF servers and all data has been successfully encrypted. For this reason, in the future schools will be endeavored to implement the development of the CBT system to avoid fraud.

Page 1 of 1 | Total Record : 7