cover
Contact Name
-
Contact Email
jaist@mail.unnes.ac.id
Phone
-
Journal Mail Official
jaist@mail.unnes.ac.id
Editorial Address
Building D5 Level 2, Campus Sekaran, Gunungpati, Semarang, Central Java Indonesia - 50229
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Advances in Information Systems and Technology
ISSN : -     EISSN : 2715999X     DOI : https://doi.org/10.15294/jaist
Core Subject : Science,
Journal of advances in Information Systems and Technology (JAIST) seeks to promote high quality research that is of interest to the international community.
Articles 83 Documents
Implementation of RSA and RSA-CRT Algorithms for Comparison of Encryption and Decryption Time in Android-based Instant Message Applications
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the advances in communication technology is producing instant messaging applications or instant messages. The confidentiality of instant messaging is still not maintained, so cryptography is needed. An example of a reliable cryptographic algorithm is Rivest-Shamir-Adleman (RSA), where RSA is a process of asymmetric key encryption (asymmetric key). Chinese Remainder Theorem (CRT) is an algorithm to reduce modular arithmetic calculation with a large modulus for the same calculation for each factor of the modulus. CRT can shorten the bit size of the decryption exponent d (which is the public key of RSA or RSA-CRT) by hiding d on a congruent system to speed up the decryption time, and it can be used with an RSA algorithm called RSA-CRT. This study uses three modulus n (key length), namely 1024 bits, 2048 bits, and 4096 bits. In the RSA-CRT 1024 bit decryption process, speed increases about 2.6 times faster than the 1024 bit RSA. In the RSA-CRT 2048 bit, the decryption process speed increases almost three times faster than the 2048 bit RSA. Whereas in the RSA-CRT 4096 bit, the decryption process's speed increases approximately 3.6 times faster than the RSA 4096 bit. From the results of this study, it can be concluded that the RSA-CRT algorithm can speed up the decryption process up to three times faster than the decryption process in the RSA algorithm. The longer or greater the modulus n used, the speed of the decryption process in the RSA-CRT algorithm will increase compared to the RSA algorithm.
Application of the Naïve Bayes Classifier Algorithm using N-Gram and Information Gain to Improve the Accuracy of Restaurant Review Sentiment Analysis
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A consumer's review is an essential aspect for influencing others in determining decisions. The process of identifying positive or negative reviews can be conducted through sentiment analysis. One of the popular techniques in the sentiment analysis is the Naïve Bayes Classifier (NBC) algorithm, which has optimal performance. The purpose of this study was to improve the accuracy of the classifier in the analysis of restaurant review sentiments by applying N-Gram as feature extraction and Information Gain as a feature selection. N-Gram is used to produce new features that are more varied, while information gain functions to select relevant features with high weights. The dataset used in this study is the sentiment labeled dataset from UCI machine learning. The results of applying the NBC have an accuracy of 82.5%. The research results revealed that the Naïve Bayes Classifier's accuracy by using N-Gram and information gain of 86%. The application of N-Gram and information gain in the NBC algorithm can be concluded that it has succeeded in improving the classification accuracy of the restaurant review sentiment analysis with an increase in accuracy of 3.5%.
Analysis of Sexual Harassment Tweet Sentiment on Twitter in Indonesia using Naïve Bayes Method through National Institute of Standard and Technology Digital Forensic Acquisition Approach
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this era, the internet is commonly used in society, especially for social media. Social media is an open and unlimited medium of communication where people can freely express their opinions. However, nowadays, many people are abusing social media to do negative things; online sexual harassment is an example. This research was conducted based on previous research or literature studies; the research results showed various sentiment analysis results using the Naïve Bayes classifier method through the digital forensic acquisition approach. The study aims to identify sexual harassment by using sentiment analysis from Twitter and measuring grouping results' accuracy with the Naïve Bayes method. In this study, sexual harassment was identified using analytical sentiment by testing 300 tweets data consisting of 30 queries from Twitter. The result of sentiment analysis from 300 Twitter scraping data shows that the value of negative sentiment is higher than positive sentiment with an average total of 69.7%. From this sentiment, Twitter becomes one of the free communication media and vulnerable to verbal sexual harassment through tweets in Indonesia.
Augmented Reality and Global Positioning System (GPS) for Indoor and Outdoor Navigation using Features from Accelerated Segment Test (FAST) Corner Detection Algorithm and A-Star Algorithm
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Digital technology is currently being developed for mobile devices. The widespread use of gadgets is one aspect that has led to a lot of research on device technology. In the last few years, the technology that is embedded in developing information delivery is augmented reality. Augmented reality technology is a technology that combines real-world space with virtual objects created using computer graphics. The augmented reality technology embedded in the device to find a location is Global Positioning System (GPS). GPS is a system of directions with the help of satellites that are interconnected and are in orbit. Universitas Negeri Semarang will accept new students every new academic year. Many new students and parents were confused about the building they would visit during the new student admission period. This problem refers to the lack of complete plans and location directions for buildings at Semarang State University. With these problems, the researcher proposes a solution in the form of augmented reality technology to make it easier for someone to find the location of a building or room that is combined with a GPS. The application of augmented reality can increase user interaction in finding locations. Location search using augmented reality will be supported with GPS to determine the location of buildings and the user's location so that the application can show directions to the desired location from where the user is. With augmented reality, the direction can be shown in digital form on the user's device screen. This application will be collaborated with the existing Universitas Negeri Semarang floor plan as a marker to indicate the location option to be directed then the application will show the direction. This system will support the delivery of existing information, namely the building location plan at Universitas Negeri Semarang.
The Design of Smart Coffee Drying Technology Innovation Based on Ultrasonic Chill to Achieve Inclusive and Sustainable Agro-Industry in the New Normal
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Drying coffee beans manually using sunlight has disadvantages. When the weather suddenly changes, it will be difficult for coffee farmers to move coffee beans to a place that is protected from the rain. If allowed to rain, the slightly dry coffee beans will become wet and damp again. Humid conditions of coffee beans will reduce their quality. Coffee beans that return to wetness also cause longer drying time, disrupting the supply chain. This study aimed to determine the potential of COSMON as a smart drying technology based on ultrasonic chill. This research uses literature study, which is continued with tools, programs, mechanics; tools testing; and results analysis. This study results that the mass decrease is proportional to the rapid decline in air content. The fastest reduction rate was obtained from vacuum chill drying with the frequency of 45000 Hz because the higher the frequency value, the higher the ultrasonic frequency waves absorbed by the specimen. The more ultrasonic wave vibrations absorbed by the specimen, the faster the drying rate will occur. As a result, the coffee's average dry weight is 84% of its initial weight.
City Transport Driver Revenue System with Multiple Linear Regressions in Times of Large-Scale Social Restrictions
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Large-scale social restrictions are constraints on residents' activities in an area suspected of being infected with Coronavirus Disease 2019 (COVID-19). This situation happens in Sukabumi Regency area of the regions affected by this enactment. One of the problems caused resulted in city transport drivers' income decreasing by 60% of normal income. This study uses multiple linear regressions because this method can significantly analyze each issue on decreasing city transport driver's income. This study uses primary data, with simple random sampling as the sampling technique. Hypothetical test using F test that the number of passengers, deposits, amount of round trip, gasoline and the number of families affect the amount of income of the city transport driver at the time of large-scale social restrictions. Highly influential variables are round trip amount 2,305 and deposit 6,014.
Analysis of Disease Data Patterns in the Elderly with Cardiovascular Patients using the Association Rule Method
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cardiovascular disease is a disease associated with modern behavior patterns. This disease is now attacking developed countries and has threatened countries that are heading towards modernization. Some sources say cardiovascular causes are stress due to work, hypothyroidism, heart rate, chronic kidney, and many more. In general, the reason tends to be due to unhealthy lifestyles such as eating lots of fatty foods, not exercising, etc. In today's times, people tend not to have a healthy lifestyle because of an increasingly modern lifestyle. This causes the cardiovascular disease to increase rapidly and is one of the leading causes of human death in the world. Therefore, it is necessary to analyze the pattern of factors that cause cardiovascular disease to prevent or anticipate cardiovascular disease in today's era. Association rules using the FP-GROWTH algorithm are a method that can perform tracing on historical data to identify data patterns based on previously identified properties. The relationship pattern between data can be searched by looking at the correlation variable between patients with cardiovascular disease. This study found that obesity is a determinant factor for cardiovascular disease; even when you do not consume alcohol and do not smoke, cardiovascular sufferers.
The Effect of Rescaling on the Performance of Recognition with Arabic Characters Using Tesseract OCR Based on Long Short Term Memory
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of the ability to recognize handwritten character images is one of the branches of science that includes pattern recognition and image processing using Optical Character Recognition (OCR) technology. The performance achieved in the case of Arabic characters is not optimal, because of it is cursive nature and relatively high difficulty. Tesseract OCR Engine is a popular OCR framework that is open source and accurate in character recognition development. The Tesseract OCR Engine works well with images that are 300 dpi (dots per inch). This study focuses on rescaling analysis on the recognition of Arabic handwritten characters using Tesseract OCR Engine based Long Short-Term Memory, with scaling sizes 90%, 80%, 70%, and 60% of the source image size. And effect performance on recognized character will be measured with character accuracy as a method of success. This study used 70 images from publicly available IFN / ENIT image samples.
Comparative Performance of Digital Signature Security Using Cryptography AES 192 BIT and RSA 512 BIT Algorithm Model
Journal of Advances in Information Systems and Technology Vol 2 No 2 (2020): October
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Digital signatures are proof of authenticity and have the same function as a signature on a printed document, but the implementation is on digital documents. Public key cryptography or asymmetric keys are widely used in the implementation of data security on information and communication systems. The Rivest-Shamir-Adleman (RSA) algorithm is one of the most popular and widely used public key cryptography because of its less complexity. RSA has two main functions namely the process of encryption and decryption process. This research was made to find out an explanation and discussion of the optimal algorithm for the performance of digital signature data security by comparing the performance of the RSA 512 bit and AES 192 bit algorithms with this, which is expected to provide knowledge about the security performance of digital signatures which in the future can be further developed in order to obtain security.
Forecasting World Crude Oil Prices using the Fuzzy Time Series Method with a Comparison of the Chen and Lee Model
Journal of Advances in Information Systems and Technology Vol 2 No 1 (2020): April
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this study, the Fuzzy Time Series (FTS) method compared to Chen and Lee models is used to predict world crude oil prices. The goal is to determine which model results are best between Chen and Lee models in the fuzzy time series method in predicting world crude oil prices. In the calculation of FTS number and width specified intervals beginning of the process, the process is very influential to the outcome prediction. The method for determining the number and width of the interval that effectively is by using Rules Sturgess. So that the formation of fuzzy logical relationships will be appropriate and effective yield predictive results. Of the 50 trials that have been done using daily data from the Organization of the Petroleum Exporting Countries (OPEC), it is known that the FTSLee model can predict better than the Chen model with a comparison of the results of the AFER fuzzy time series Lee model by 97.4% and RMSE of 1.617 and the results of the AFER fuzzy time series Chen model by 97.2% and RMSE of 1.693.