cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 10 Documents
Search results for , issue "Vol 14, No 1 (2020): January" : 10 Documents clear
P2P Communication among Computers and Smartphones Based on Bluetooth and Wi-Fi Direct Technologies Venant Uzayisenga; Tri Kuntoro Priyambodo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.28470

Abstract

As result of the development of technology, most of modern computer and smartphones are Bluetooth and Wi-Fi direct wireless technologies enabled. While those wireless technologies come with the benefits of interconnecting devices without the need access point or central base station. However, computer and smartphones connected via Bluetooth based or via Wi-Fi Direct connection does not guarantee intercommunication or data transmission in meaningful way. Therefore, third party software is always needed to help for achieving data transmission. In this research an effort is done to design and develop P2P software applications and web based application by using C# and ASP.net MVC programming languages as features of Visual Studio 2017. Application would facilitate P2P communication of interconnected devices via the same channel. Built software system has been tested based on functional testing method, and usability testing. The result from functional testing shows that P2P communication meets functional requirements while usability testing has an average score of 72.2% from System Usability Scale method. The results from SUS scores brands our proposed P2P communication system to be good and highly accepted.
Oversampling Method To Handling Imbalanced Datasets Problem In Binary Logistic Regression Algorithm Windyaning Ustyannie; Suprapto Suprapto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.37415

Abstract

The class imbalance is a condition when one class has a higher percentage than the other then it can affect the accuracy. One method in data mining that can be used to classification is logistic regression method. The method used in this research is RWO-sampling method using random replicate approach for synthetic data generation on descrete attribute. The result of the research can handle the problem of class imbalance, RWO-sampling method with random replicate approach shows better accuracy than RWO-sampling method with roulette and ROS approach. The accuracy value for RWO-Sampling method with roulette and RWO-Sampling approach with random replicate approach has increased to an average of 15.55% of each dataset. As for comparithem with the ROS method has increased an average of 3.7% of each dataset. Furthermore, for testing the underfitting problem in logistic regression, the oversampling method is better than non-oversampling with an increase in accuracy value reaching an average of 2.3% of each dataset.
Combination of AHP Method and VIKOR Method For Assesing Sunday School Teacher Devi Valentino Waas; Suprapto Suprapto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.40533

Abstract

The performance appraisal of Sunday school teacher in the Imanuel Lurang congregation aims to measure and distinguish the quality of performance achieved by Sunday school teacher and decide various policies such as giving rewards to every Sunday school teacher with the best performance, and for Sunday school teacher who have poor performance scores will be given a guiding, approach, etc. The number of criteria in determining the quality of Sunday school teacher is not an easy thing to do by manual. Then it is essential that a computerized performance appraisal-based performance  app can speed up the process of progressing to be more effective and efficient. This research develops decision support systems (DSS) that is dynamic using the PHP programming language, by combining the AHP method that has been refined by the VIKOR method. The AHP method is used in determining the weight of each criterion, and the VIKOR method is used for the ranking process. Test results indicate that the system can provide a sequence of alternative Sunday school teacher that will be used as recommendations for decision makers to determine which Sunday school teachers are quality and not qualified.
GSA to Obtain SVM Kernel Parameter for Thyroid Nodule Classification Dias Aziz Pramudita; Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.41215

Abstract

Support Vector Machine (SVM) is one of the most popular methods of classification problems due to its global optima solution. However, the selection of appropriate parameters and kernel values remains an obstacle in the process. The problem can be solved by adding the best value of parameter during optimization process in SVM. Gravitational Search Algorithm (GSA) will be used to optimize parameters of SVM. GSA is an optimization algorithm that is inspired by mass interaction and Newton's law of gravity. This research hybridizes the GSA and SVM  to increase system accuracy. The proposed approach had been implemented to improve the classification performance of Thyroid Nodule. The data used in this research are ultrasonography image of Thyroid Nodule obtained from RSUP Dr. Sardjito, Yogyakarta. This research had been evaluated by comparing the default SVM parameters with the proposed method in term of accuracy. The experiment results showed that the use of GSA on SVM is capable to increase system accuracy. In the polynomial kernel the accuracy rose up from 58.5366 % to 89.4309 %, and 41.4634 % to 98.374 % in Polynomial kernel
Chatbot in Bahasa Indonesia using NLP to Provide Banking Information Abidah Elcholiqi; Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.41289

Abstract

FAQs are mostly provided on the company's website to inform their service and product. It's just that the FAQ is usually less interactive and presents too much information that is less practical. Chatbot can be used as an alternative in providing FAQ. In this study, chatbots were developed for BTPN in providing information about their products, namely Jenius. Chatbot developed utilizes natural language processing so that the system can understand user queries in the form of natural language. The cosine similarity algorithm is used to find similarities between queries and patterns in the knowledge base. Patterns with the highest cosine values are considered to be most similar to user queries. It's just that, this algorithm does not pay attention to the structure of the sentence so that it adds checking the structure of the sentence with the parse tree to give weight to the pattern. This chatbot application has been tested by 10 users and it was found that the suitability of the answers with user input was 84%. Therefore the chatbot developed can be used by BTPN to provide Jenius product information to consumers more interactively and practically.
The Evaluation QS-WFQ Scheduling Algorithm For IoT Transmission To Cloud Hirzen Hasfani; Mardhani Riasetiawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.48157

Abstract

This study using the Weighted Fair Queue scheduling algorithm when the weights can change and calculated based on changes in the average queue size in the buffer. This algorithm divides the priorities of each sensor into three priorities, namely high, medium and low priority. Each queue is given a weight that is adjusted to the resource requirements of each traffic. High priority data will take precedence, but medium and low priority data will remain underserved and guaranteed by network resources.The results of this study show packet loss ratio when the ratio of the number of buffers and the amount of data is 1: 3 with variations in the number of high, medium and low priority buffers 75: 75: 150 and 50: 50: 200 is 0%. The delay time in the high priority and the medium priority buffer has almost the same delay time when data is transmitted, whereas for the low priority buffer increased in the delay time.
Classification of Traffic Vehicle Density Using Deep Learning Abdul Kholik; Agus Harjoko; Wahyono Wahyono
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.50376

Abstract

The volume density of vehicles is a problem that often occurs in every city, as for the impact of vehicle density is congestion. Classification of vehicle density levels on certain roads is required because there are at least 7 vehicle density level conditions. Monitoring conducted by the police, the Department of Transportation and the organizers of the road currently using video-based surveillance such as CCTV that is still monitored by people manually. Deep Learning is an approach of synthetic neural network-based learning machines that are actively developed and researched lately because it has succeeded in delivering good results in solving various soft-computing problems, This research uses the convolutional neural network architecture. This research tries to change the supporting parameters on the convolutional neural network to further calibrate the maximum accuracy. After the experiment changed the parameters, the classification model was tested using K-fold cross-validation, confusion matrix and model exam with data testing. On the K-fold cross-validation test with an average yield of 92.83% with a value of K (fold) = 5, model testing is done by entering data testing amounting to 100 data, the model can predict or classify correctly i.e. 81 data.
An Interactive Content Media on Information System iLearning+ Untung Rahardja; Indri Handayani; Ninda Lutfiani; Fitra Putri Oganda
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.51157

Abstract

Along with the increasing development of Information and Communication Technology (ICT), there has been a change in the learning approach method. Methods of face-to-face learning (conventional) and classrooms as implementation have now changed. The ilearning method approach has turned into the direction of future learning or as a learning age of knowledge. In the world of education, information becomes a vital need to support teaching and learning activities. In the online learning system that applied to iLearning+ information needs become critical needs therein. But in reality, the delivery of information is not done online, but with current information such as the delivery of information is done in an intermediary between lecturers and students, which must be done face to face so get a piece of information. So in that event, a system is needed to be able to convey information with a Web-based system so that delivery can be done online and can be accessed anytime and anywhere without being limited by time and space. In this study, using the literature review research method as a comparison material on existing research.
Agent-based Truck Appointment System for Containers Pick-up Time Negotiation Fakhri Ihsan Ramadhan; Meditya Wasesa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.51274

Abstract

Congestion in the seaports area is a common issue in many parts of the world. Fluctuating truck arrival has been identified as one of the significant determinants of congestion. In response, a truck appointment system (TAS) is introduced to manage truck arrival, particularly at peak times. In the existing TAS mechanism, the scheduling decision is centralized and disregards the concerns of trucking companies. Moreover, TAS may complicate the business operation of trucking companies that already have a constrained truck schedule. This study proposes a decentralized negotiation mechanism in TAS that allows trucking companies to adjust arrival times by utilizing the waiting time estimation provided by the terminal operator. We develop an agent-based model of a TAS in the container terminal pick-up procedure. The simulation results indicate that compared to the existing TAS mechanism, the negotiation TAS mechanism generates a shorter average truck turnaround time regardless of truck arrival rates. In terms of average net time cost, the negotiation TAS mechanism provides better value under high truck arrival rate conditions. The incentive for trucking companies to participate in the negotiations is even higher at peak times.
The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network Lilia Ervina Jeronimo Guterres; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.53265

Abstract

The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  

Page 1 of 1 | Total Record : 10