cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 10 Documents
Search results for , issue "Vol 18, No 1 (2024): January" : 10 Documents clear
The Adoption of Blockchain Technology the Business Using Structural Equation Modelling Aini, Qurotul; Manongga, Danny; Sediyono, Eko; Joko Prasetyo, Sri Yulianto; Rahardja, Untung; Santoso, Nuke Puji Lestari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.82107

Abstract

There are many aspects of readiness that must be considered when implementing technological breakthroughs, the business sector is still relatively slow in adopting blockchain technology. However, considering that blockchain technology is still in its early stages of development and has many potential applications, it is necessary to conduct empirical studies on the factors influencing its application in the industry. The problem of this study is to develop an appropriate framework based on how well its features match the needs of the business sector. This research method uses data collection using online questionnaires to obtain information from 86 respondents. The current study also utilizes the Smart PLS 4 model to produce a structural hypothetical model. The results of this study find a significant influence on Revolutionary Innovation by enriching the literature on the relationship between Blockchain, Big Data and the Business Sector, which is expanded by adding new variables. The novelty of this research identifies potential utilization, analyzes internal and external factors, and identifies how blockchain disrupts the business sector. The purpose of this study is to assess how blockchain technology is currently used in the business sector for data provision as a theoretical information technology innovation
Ensemble Method for Anomaly Detection On the Internet of Things Kurniabudi, Kurniabudi; Winanto, Eko Arip; Astri, Lola Yorita; Sharipuddin, Sharipuddin
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.85834

Abstract

 The internet of things generates various types of data traffic with a very large amount of data traffic which has an impact on security issues, one of which is an attack on the Internet of Things network. In the IoT data traffic flow, which contains various data, it turns out that the portion of attack data traffic is usually smaller than normal traffic. Therefore, the attack detection method must be able to recognize the type of attack on a very large data traffic flow and unbalanced data. High data dimensions and unbalanced data are one of the challenges in detecting attacks. To overcome the large data dimensions, Chi-square was chosen as a feature selection technique. In this study, the ensemble method is proposed to improve the ability to detect anomalies in unbalanced data. To produce an ideal detection method, a combination of several classification algorithms such as Bayes Network, Naive Bayes, REPtree and J48 is used. The CICIDS-2017 dataset is used as experimental data because it has a high data dimension which contains unbalanced data. The test results show that the proposed Ensemble method can improve the performance of anomaly detection for high-dimensional data containing unbalanced data
Webcam-Based Bus Passenger Detection System Using Single Shot Detector Method Wasista, Sigit
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.87393

Abstract

Buses are one of the most widely chosen transportation methods to support the mobility of the Indonesian people. Mobility that is often found in addition to public transportation, is also often found in the mobility of tourism tour activities for a travel group. The number of tourist destinations to which passengers go up and down makes the assistant bus driver or group leader work hard to ensure that the number of passengers boarding the bus matches the number of groups. It often takes a long time to ensure the accuracy of the number of passengers before departure to the next destination. This conventional method results in the delay of the tourism tour schedule. In this research, the author designs a webcam-based bus passenger face detection system using the Single Shot Detector (SSD) method that can provide real-time information to bus drivers, assistant bus drivers or group leaders. The results obtained by the system obtained an achievement of 95% of the total system creation along with testing the detection of bus passenger faces in actual conditions resulted in an average accuracy of 77.5%.
Rule-Based Natural Language Processing in Volcanic Ash Data Searching System Priandana, Rangga Kusuma; Indra, Indra
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.88081

Abstract

Indonesia is a country with a unique geography. The confluence of three tectonic plates located in the country results in frequent natural disasters, from earthquakes to volcanic activity. BMKG is a monitoring agency tasked with providing information related to these natural disasters. However, one type of natural disaster data, the SIGMET data (Significant Meteorological Information) used to provide information on volcanic ash, has a complicated format that is difficult for ordinary people to understand. Therefore, this research seeks to make finding information related to volcanic ash and volcanic eruptions in Indonesia easier in terms of access and comprehension. In this research, an application design will be carried out that can search SIGMET data by implementing natural language processing with a production rule base. The research results have an accuracy rate of 84% using 25 test sample sentences that combine sentences and words contained in the important words section.
Modeling OTP Delivery Notification Status through a Causality Bayesian Network Asriny, Novendri Isra; Dewa, Chandra Kusuma; Luthfi, Ahmat
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.90030

Abstract

Digital money is the fundamental driving factor behind today's modern economy. Credit/debit cards, e-wallets, and other contactless payment options are widely available nowadays. This also raises the security risk associated with passwords in online transactions. One-time passwords (OTPs) are another option for mitigating this. A one-time password (OTP) serves as an additional password authentication or validation technique for each user authentication session. Failures in transmitting OTP passwords through SMS can arise owing to operator network faults or technological concerns.To minimize the risk value that arises in online transactions, it is necessary to evaluate the causality of the OTP SMS sending transaction status category by determining the main factors for successful OTP SMS sending and identifying the causes of failure when sending OTP SMS using the Bayesian Network method. According to data analysis, online transactions occur more frequently in the morning, with status summaries such as no delay, unknown status, and others. Furthermore, there is causality with at least three variables in the principal status summary, including no delay, uncertain summary, long delay, normal, likely operator issues, abnormal, and more. With a high accuracy rate of around 90% in forecasting the likelihood of recurrence.
Maintaining Query Performance through Table Rebuilding & Archiving Andriyani, Widyastuti; Pujianto, Pujianto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.90062

Abstract

Despite the system previously utilizing optimal query configurations and database settings, the transaction table in the database, which is undergoing significant numerical increases and notable queries and updates on each line, has seen a drop in query speeds simultaneous with data growth. This situation arises due to an increase in disk space in the database tablespace, which results from block fragmentation. At times, database engines do not detect this problem, thereby overlooking it in the database recommendation engine. Lacking an understanding of the fundamental issue, database engineers need analysis and strategies to maintain the query speed of the transaction table in the relational database
Multivariat Predict Sales Data Using the Recurrent Neural Network (RNN) Method Ardriani, Ni Nengah Dita; Yastawil, Jamiin Al Yastawil; Erawati, Kadek Nonik; Yudi Antara, I Gede Made; Santiago, Gede Agus
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.90165

Abstract

Sales is an activity or business selling a product or service. In this study, I took a case study on Kaggle. Sales problems at the company cause inventory to be very high or vice versa, causing a loss of sales because there are no items to sell. Inventory that is too high results in increased costs due to existing resources being inefficient. In the opposite condition, it will cause a product vacancy in the market. Using the Recurrent Neural Network (RNN) Algorithm, this study predicts sales. The data used is sales data in 2020 with the parameter Number of sales per day in the last four months. The results obtained through testing several training scenarios and testing the implementation of the algorithm, in this case, is the highest accuracy value of 96.92% in the network architecture of three input neuron layers, three hidden layer neurons, one output, division of training, and test data 70: 30, learning value rate of 0.9 and a maximum of 9000000 epochs
Effect of Hyperparameter Tuning Using Random Search on Tree-Based Classification Algorithm for Software Defect Prediction Rizky, Muhammad Hevny; Faisal, Mohammad Reza; Budiman, Irwan; Kartini, Dwi; Abadi, Friska
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.90437

Abstract

The field of information technology requires software, which has significant issues. Quality and reliability improvement needs damage prediction. Tree-based algorithms like Random Forest, Deep Forest, and Decision Tree offer potential in this domain. However, proper hyperparameter configuration is crucial for optimal outcomes. This study demonstrates the use of Random Search Hyperparameter Setting Technique to predict software defects, improving damage estimation accuracy. Using ReLink datasets, we found effective algorithm parameters for predicting software damage. Decision Tree, Random Forest, and Deep Forest achieved an average AUC of 0.73 with Random Search. Random Search outperformed other tree-based algorithms. The main contribution is the innovative Random Search hyperparameter tuning, particularly for Random Forest. Random Search has distinct advantages over other tree-based algorithms
Anomaly Detection of Hospital Claim Using Support Vector Regression Hapsari, Luthfia Nurma; Rokhman, Nur
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.91857

Abstract

BPJS Kesehatan plays a crucial role in providing affordable access to healthcare services and reducing individual financial burdens. However, deficit issues can disrupt the sustainability of the program, making anomaly detection highly important to conduct. Previous research on unsupervised anomaly detection in BPJS Kesehatan revealed a limitation with Simple Linear Regression (SLR), which only accommodates linear relationships among independent variables and the target variable of BPJS Kesehatan claim values. Minister of Health Regulation No. 52 of 2016 identified eight influential non-linear independent variables, leading to the proposal of Support Vector Regression (SVR) to address SLR's shortcomings.Research findings demonstrate SVR's superior anomaly detection performance over SLR. Interestingly, the SVR model excels in anomaly detection but lacks in prediction. Optimal tuning of SVR hyperparameters (C=9, epsilon=90, gamma=0.009, residual anomaly definition > 0.5*RMSE for both datasets) yields impressive metrics: Accuracy=0.97, Precision=0.84, Recall=0.97, and F1-Score=0.90. The anomaly detection results are expected to greatly support the sustainability of the BPJS Kesehatan program in Indonesia.
DEVELOPMENTS AND TRENDS IN CYBERSECURITY AGAINST HUMAN FACTORS AND TIME PRESSURE USING BIBLIOMETRIC ANALYSIS Saputri, Aprilia Mayang; Syaifullah, Syaifullah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 18, No 1 (2024): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.92636

Abstract

Memahami keamanan siber sangat penting di era digital saat ini, dan penelitian telah dilakukan untuk memahami faktor-faktor yang mempengaruhi keberhasilan atau kegagalannya. Faktor manusia berperan penting dalam keamanan siber, dan lebih dari 95% serangan yang berhasil disebabkan oleh kesalahan manusia. Tekanan waktu adalah faktor lain yang tidak boleh diabaikan, karena organisasi sering kali menghadapi tekanan waktu yang tinggi dalam lingkungan bisnis yang kompetitif dan dinamis. Penelitian mengenai faktor manusia dalam keamanan siber menunjukkan bahwa faktor manusia masih menjadi perhatian utama dibandingkan dengan teknologi. Penelitian ini bertujuan untuk menganalisis perkembangan dan tren keamanan siber mengenai faktor manusia dan tekanan waktu dari tahun 2014 hingga 2023 menggunakan Analisis Bibliometrik dari software R studio. Metodologi penelitian meliputi perencanaan, identifikasi kata kunci, pencarian data Scopus, dan pembatasan pencarian pada "semua bidang" untuk memperoleh data yang sesuai dengan tema penelitian. Penelitian dibatasi sebanyak 110 jurnal yang diambil dari database Scopus. Kesimpulannya, memahami faktor manusia dan tekanan waktu dalam keamanan siber sangat penting bagi organisasi untuk meningkatkan langkah-langkah keamanan siber mereka. Dengan menganalisis perkembangan dan tren faktor-faktor ini, para peneliti dapat lebih memahami masa depan keamanan siber dan mengambil keputusan yang tepat untuk melindungi informasi dan infrastruktur penting. 

Page 1 of 1 | Total Record : 10