cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 476 Documents
Clustering followers of influencers accounts based on likes and comments on Instagram Platform Puji Winar Cahyo; Muhammad Habibi
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 2 (2020): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.53028

Abstract

The promotion of goods or services is now facilitated by the dissemination of information through Instagram. Dissemination of information is usually done by influencers or promotional accounts. The account used certainly has a lot of followers. Because of the large amount of follower data in that account, it can be grouped into the same characters. This is done to determine the potential for promotion using social media accounts. This study uses data from 2 popular accounts. The first account is an artist with the username ayutingting92. The second account is Infounjaya, the official promotion account from Jenderal Achmad Yani University, Yogyakarta. The results of grouping can divide follower data into two cluster groups with different interactions. The basic difference between the two groups is the number of likes and comments. The infounjaya account analysis results showed that of 4,906 followers, only 3,211 followers were actively involved in the interaction, 1,695 followers were passive followers who did not like or did not comment on the interaction. Meanwhile, the results of the ayutingting92 follower cluster show that out of 1 million sample data followers, only 13,591 followers were actively involved in the interaction of likes and comments, 986,409 were passive followers.
Application of Blockchain Technology for iLearning Student Assessment Sudaryono Sudaryono; Qurotul Aini; Ninda Lutfiani; Firman Hanafi; Untung Rahardja
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 2 (2020): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.53109

Abstract

Blockchain is the core technology used to create cryptocurrencies, such as Bitcoin. As one part of the fourth industrial Revolution since the invention of steam engines, electricity, and information technology, blockchain technology has begun to be applied in areas such as finance, judiciary, and trade. Blockchain technology uses decentralized, distributed and transparency techniques for data security. This research aims to determine the implementation of blockchain technology in the field of education, especially in the Data Security section. The study uses two methods namely the mind mapping method and literature review. The results of this study showed that with the presence of blockchain technology, the data is more secure from attacks from both inside and outside because it passes through two levels of security, namely encryption and decentralized data.
Blockchain Technology into Gamification on Education Qurotul Aini; Untung Rahardja; Alfiah Khoirunisa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 2 (2020): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.53221

Abstract

As we know, Indonesia has begun to enter the era of revolution 4.0 which in that era there were many changes in all fields including the presence of blockchain technology which began to be in demand. Including in the field of education, the changes that occur in the world of education today are so significant with the commencement of the abandonment of teaching methods that still use conventional methods. Keep track of tasks by book, face to face communication, which of course will cause many losses in a certain period of time, as many tasks that have long been buried become difficult to find when needed, and the possibility of manipulation of tasks is still great. The learning method is considered as a boring and insecure way, where students cannot explore learning because the collected files can still be manipulated by other parties. So from now on the application of learning methods is changed by the concept of gamification which relies on blockchain technology. The gamification learning method was created to compensate for the times when students preferred to play games rather than learning, therefore the gamification method could be applied to management education in higher education.
The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network Lilia Ervina Jeronimo Guterres; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.53265

Abstract

The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  
HOG Feature Extraction and KNN Classification for Detecting Vehicle in The Highway Firnanda Al Islama Achyunda Putra; Fitri Utaminingrum; Wayan Firdaus Mahmudy
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 3 (2020): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.54050

Abstract

Autonomous car is a vehicle that can guide itself without human intervention. Various types of rudderless vehicles are being developed. Future systems where computers take over the art of driving. The problem is prior to being attention in an autonomous car for obtaining the high safety. Autonomous car need early warning system to avoid accidents in front of the car, especially the system can be used in the Highway location. In this paper, we propose a vision-based vehicle detection system for Autonomous car. Our detection algorithm consists of three main components: HOG feature extraction, KNN classifier, and vehicle detection. Feature extraction has been used to recognize an object such as cars. In this case, we use HOG feature extraction to detect as a car or non-car. We use the KNN algorithm to classify. KNN Classification in previous studies had quite good results. Car detected by matching about trining data with testing data. Trining data created by extract HOG feature from image 304 x 240 pixels. The system will produce a classification between car or non-car.
Resource Modification On Multicore Server With Kernel Bypass Dimas Febriyan Priambodo; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 4 (2020): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.54170

Abstract

Technology develops very fast marked by many innovations both from hardware and software. Multicore servers with a growing number of cores require efficient software. Kernel and Hardware used to handle various operational needs have some limitations. This limitation is due to the high level of complexity especially in handling as a server such as single socket discriptor, single IRQ and lack of pooling so that it requires some modifications. The Kernel Bypass is one of the methods to overcome the deficiencies of the kernel. Modifications on this server are a combination increase throughput and decrease server latency. Modifications at the driver level with hashing rx signal and multiple receives modification with multiple ip receivers, multiple thread receivers and multiple port listener used to increase throughput. Modifications using pooling principles at either the kernel level or the program level are used to decrease the latency. This combination of modifications makes the server more reliable with an average throughput increase of 250.44% and a decrease in latency 65.83%.
Social-Child-Case Document Clustering based on Topic Modeling using Latent Dirichlet Allocation Nur Annisa Tresnasari; Teguh Bharata Adji; Adhistya Erna Permanasari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 2 (2020): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.54507

Abstract

Children are the future of the nation. All treatment and learning they get would affect their future. Nowadays, there are various kinds of social problems related to children.  To ensure the right solution to their problem, social workers usually refer to the social-child-case (SCC) documents to find similar cases in the past and adapting the solution of the cases. Nevertheless, to read a bunch of documents to find similar cases is a tedious task and needs much time. Hence, this work aims to categorize those documents into several groups according to the case type. We use topic modeling with Latent Dirichlet Allocation (LDA) approach to extract topics from the documents and classify them based on their similarities. The Coherence Score and Perplexity graph are used in determining the best model. The result obtains a model with 5 topics that match the targeted case types. The result supports the process of reusing knowledge about SCC handling that ease the finding of documents with similar cases
Development of Android Based Hajj and Umrah Pilgrims Monitoring Application In Dago Wisata International Muhammad Ilham Budiawan; Irawan Afrianto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 3 (2020): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.55199

Abstract

 Hajj and Umrah are worship activities carried out by Muslims around the world. The problem that often occurs during the implementation of the Hajj and Umrah is that pilgrims are often lost and separated from the group. Pilgrims also find it difficult to look for prayers because they are still using guidebooks, they have to look for prayers one by one in the feeling of a busy and hot holy land. The case study was carried out at Dago Wisata Internasional. The solution used is utilizing geofencing technology and Firebase Cloud Messaging that allows the process of monitoring pilgrims to be carried out easily and the pilgrims can get prayer notifications in accordance with the location of pilgrims. Research supporting data obtained from interviews with employees of Dago Wisata Internasional and literature studies. Based on testing on the application that has been built, the following results are obtained 93.33% supervisor states that this application simplifies the process of monitoring pilgrims, 84% worshipers claim to be able to ask for help easily from the supervisor using this application, and 86% worshipers claim this application makes it easy for pilgrims in looking for the practice deeds.
An Expert System of Chicken Disease Diagnosis by Using Dempster Shafer Method Yaqutina Marjani Santosa; Suprapto Suprapto; Wahyono Wahyono
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 3 (2020): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.55632

Abstract

 Chicken is an animal that can provide many benefits for human life, meat and eggs can be used as food to fulfill the needs of human food, the excrement can be made fertilizer, and frequently its be used as a farm animal. Although it can provide many benefits, but for chicken farmers, the maintenance of chicken meet some obstacles that must be faced such as disease, poor environmental sanitation, and the production of eggs are declining. From some of the obstacles that have been mentioned, the most frequently encountered are animals infected with the disease. Based on the results of interviews that have been done to some chicken farmers, it can be said that the knowledge of chicken farmers against chicken disease and its handling is still very lacking. But the number of experts who understand and know about the type of chicken disease and the way of handling is limited, then it takes an expert system that can simulate knowledge and understanding of experts to overcome the problem. Based on the study of the libraries, the method suitable for use in the expert system is the Dempster shafer method by processing the value of belief in a disease. Dempster shafer method is a method used to calculate uncertainty due to the addition or reduction of new facts that will change the existing rules. Based on tests in 40 cases using an expert system applying the Dempster Shafer method, obtained the percentage of diagnostic compatibility result given by experts and system is 95%.
Traffic Density Classification Using Twitter Data and GPS Based On Android Application Mohammad Afrizal; Idham Ananta Timur
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 2 (2020): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.55761

Abstract

Increasing the number of vehicles in Special Region of Yogyakarta caused by congestion occurred at various traffic points in Special Region of Yogyakarta. The solution to reducing congestion is by increasing the use of public transportation within the city, but it still not in demand by the public. Optimizing daily activities, community always tries to avoid the traffic density on the road to be bypassed.Some research on social media has been used to detect traffic density anomalies. However, the system still cannot provide traffic density information on roads that will be passed by the user because it is just a mapping. Based on this problem, this study aims to classify the traffic density on the road that will be passed by users in the Special Region of Yogyakarta into the category of high traffic and low traffic by utilizing Twitter and GPS data.The results show that Android Applications are able to classify traffic density on the road to be traversed using Geonames.org API. Using the naïve bayes classification algorithm, the system can classify traffic density on 14 streets with an average accuracy of 77.5%, 90% precision, 79.1% recall, and 82.8% f-score.