cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 476 Documents
Flower Pollination Inspired Algorithm on Exchange Rates Prediction Case I Nyoman Prayana Trisna; Afiahayati Afiahayati; Muhammad Auzan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.84223

Abstract

The flower pollination algorithm is a bio-inspired system that adapts a similar process to a genetic algorithm that aims for optimization problems. In this research, we examine the utilization of the flower pollination algorithm in linear regression for currency exchange cases. Each solution represents the regression coefficients. The population size for the solutions and the switching probability between global pollination and local pollination is experimented with in this research. The result shows that the final solution is obtained using a larger population and higher switch probability. Furthermore, our research finds that the increasing population size leads to considerable running time, where the probability of global pollination just slightly increases the running time
The Effect of Data Augmentation in Deep Learning with Drone Object Detection Ariel Yonatan Alin; Kusrini Kusrini; Kumara Ari Yuana
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.84785

Abstract

 Drone object detection is one of the main applications of image processing technology and pattern recognition using deep learning. However, the limited drone image data that can be accessed for training detection algorithms is a challenge developing drone object detection technology. Therefore, many studies have been conducted to increase the amount of drone image data using data augmentation techniques. This study aims to evaluate the effect of data augmentation on deep learning accuracy in drone object detection using the YOLOv5 algorithm. The methods used in this research include collecting drone image data, augmenting data with rotate, crop, and cutout, training the YOLOv5 algorithm with and without data augmentation, as well as testing and analyzing training results.The results of the study show that data augmentation can't improve the accuracy of the YOLOv5 algorithm in drone object detection. Evidenced by the decreasing value of precision and mAP@0.5 and the relatively constant value of recall and F-1 score. This is caused by too much augmentation, which can cause a loss of important information in the data and cause noise or distortion.
Predictive Analysis of Rice Pest Distribution in Bali Province Using Backpropagation Neural Network I Kadek Agus Dwipayana; putu sugiartawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.85584

Abstract

The distribution of pests in rice plants results in significant losses in production and damage to rice plants for farmers, seen from data on the area of rice borer attacks in the province of Bali in Tabanan district. Therefore, by predicting the distribution of rice pests, we can know the pattern of pest attacks so that we can anticipate them because predicting can provide accuracy and error values through the test results. One of the prediction models is BPNN, where BPNN's advantages for solving complex problems are very suitable for use where large amounts of data are involved and many input/output variables, BPNN is also capable of modeling nonlinear relationships between input and output variables, which may be difficult to capture by this type of predictive model. other. Backpropagation includes supervised learning, which means it can learn from labeled examples and can make accurate predictions on new, unlabeled data. Split data using K-fold cross-validation serves to assess the process performance of an algorithmic method by dividing random data samples and grouping the data as many as K k-fold values.
C Source code Obfuscation using Hash Function and Encryption Algorithm Sarah Rosdiana Tambunan; Nur Rokhman
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.86118

Abstract

Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption. In this research, the development of an obfuscator that can work on C language source code uses the code transposition method, namely randomizing the arrangement of lines of code with a hash function and then using the DES encryption algorithm to hide the parameters of the hash function so that it is increasingly difficult to find the original format. This obfuscator is specifically used to maintain the security of source code in C language from plagiarism and piracy. In order to evaluate this obfuscator, nine respondents who understand the C programming language were asked to deobfuscate the obfuscated source code manually. Then the percentage of correctness and the average time needed to perform the manual deobfuscation are observed. The evaluation results show that the obfuscator effectively maintains security and complicates the source code analysis.
Application of Extreme Learning Machine Method With Particle Swarm Optimization to Classify of Heart Disease Adela Putri Ariyanti; Muhammad Itqan Mazdadi; Andi - Farmadi; Muliadi Muliadi; Rudy Herteno
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.86291

Abstract

Penyakit jantung koroner adalah tersumbatnya suplai darah jantung. Penyakit jantung adalah penyebab utama kematian di seluruh dunia. Berbagai faktor risiko berkontribusi terhadap penyakit jantung, termasuk merokok, gaya hidup tidak sehat, kolesterol tinggi, dan hipertensi. Dengan demikian, prediksi penyakit dapat dilakukan untuk mengidentifikasi individu yang berisiko guna mencegah peningkatan kematian akibat penyakit jantung. Penambangan data, khususnya metode Extreme Machine Learning (ELM), biasanya digunakan untuk tujuan ini. ELM adalah metode jaringan saraf dalam kecepatan pelatihan dan tidak memerlukan propagasi balik, dan menentukan jumlah node tersembunyi yang optimal dan mencapai hasil yang akurat tetap menjadi tantangan. Pada penelitian ini, ELM dengan Particle Swarm Optimization (PSO) diusulkan untuk mengoptimalkan klasifikasi penyakit jantung, yang bertujuan untuk mencapai hasil optimal dengan pembelajaran cepat. Penelitian ini mengikuti proses yang sistematis, termasuk pengumpulan data, preprocessing, pemodelan, dan evaluasi menggunakan analisis matriks konfusi. Hasil dan pembahasan menyajikan efektivitas metode yang diusulkan dengan mengevaluasi akurasi klasifikasi berdasarkan berbagai parameter, seperti ukuran populasi, jumlah node tersembunyi, dan iterasi. Temuan menunjukkan bahwa ELM dengan optimasi PSO dapat memberikan hasil klasifikasi yang akurat untuk diagnosis penyakit jantung, dengan tingkat akurasi yang menjanjikan.
Deep Learning Approaches for Nusantara Scripts Optical Character Recognition Agi Prasetiadi; Julian Saputra; Iqsyahiro Kresna; Imada Ramadhanti
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 3 (2023): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.86302

Abstract

The number of speakers of regional languages who are able to read and to write traditional scripts in Indonesia is decreasing. If left unaddressed, this will lead to the extinction of Nusantara scripts and it is not impossible that their reading methods will be forgotten in the future. To anticipate this, this study aims to preserve the knowledge of reading ancient scripts by developing a Deep Learning model that can read document images written using one of the 10 Nusantara scripts we have collected: Bali, Batak, Bugis, Javanese, Kawi, Kerinci, Lampung, Pallava, Rejang, and Sundanese. While previous studies have made efforts to read traditional Nusantara scripts using various Machine Learning and Convolutional Neural Network algorithms, they have primarily focused on specific scripts and lacked an integrated approach from script type recognition to character recognition. This study is the first to comprehensively address the entire range of Nusantara scripts, encompassing script type detection and character recognition. Convolutional Neural Network, ConvMixer, and Visual Transformer models were utilized and their respective performances were compared. The results demonstrate that our models achieved 96% accuracy in classifying Nusantara script types, with character recognition accuracy ranging from 93% to approximately 100% across the ten scripts.
Exploring Pre-Trained Model and Language Model for Translating Image to Bahasa Ade Nurhopipah; Jali Suhaman; Anan Widianto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 4 (2023): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.76389

Abstract

In the last decade, there have been significant developments in Image Caption Generation research to translate images into English descriptions. This task has also been conducted to produce texts in non-English, including Bahasa. However, the references in this study are still limited, so exploration opportunities are open widely. This paper presents comparative research by examining several state-of-the-art Deep Learning algorithms to extract images and generate their descriptions in Bahasa. We extracted images using three pre-trained models, namely InceptionV3, Xception, and EfficientNetV2S. In the language model, we examined four architectures: LSTM, GRU, Bidirectional LSTM, and Bidirectional GRU. The database used was Flickr8k which was translated into Bahasa. Model evaluation was conducted using BLEU and Meteor. The performance results based on the pre-trained model showed that EfficientNetV3S significantly gave the highest score among other models. On the other hand, in the language model, there was only a slight difference in model performance. However, in general, the Bidirectional GRU scored higher. We also found that step size in training affected overfitting. Larger step sizes tended to provide better generalizations. The best model was generated using EfficientNetV3S and Bidirectional GRU with step size=4096, which resulted in an average score of BLEU-1=0,5828 and Meteor=0,4520.
Evaluation of Food Security Area of East Java Province Using Fuzzy C-Means (FCM) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) Yuniar Farida; Ghina Salsabila Firdaus; Ahmad Teguh Wibowo; Silvia Kartika Sari; Latifatun Nadya Desinaini
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 4 (2023): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.82297

Abstract

The formation of quality human resources cannot be separated from food, as nutritional intake affects human performance and health. As time increases, the number of residents increases to increase food needs. The ability of a region to meet food needs in its territory is different from other regions. This study aims to classify regions in East Java Province based on food security and determine areas with the best and lowest food security. The method used is the Fuzzy C-Means (FCM) and TOPSIS methods.This research uses criteria based on the Food Security Index compiled by the Food Security Agency. The results of regional clustering using FCM selected the best cluster using three clusters for all requirements, except in food utilization in the city using five clusters. Furthermore, from the clustering results, clustering and cluster members use TOPSIS and produce Magetan regency and Madiun city as areas with the highest food security. At the same time, the lowest food securities are Probolinggo regency and Kediri city.
ESSAY ANSWER CLASSIFICATION WITH SMOTE RANDOM FOREST AND ADABOOST IN AUTOMATED ESSAY SCORING Wilia Satria; Mardhani Riasetiawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 4 (2023): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.82548

Abstract

 Automated essay scoring (AES) is used to evaluate and assessment student essays are written based on the questions given. However, there are difficulties in conducting automatic assessments carried out by the system, these difficulties occur due to typing errors (typos), the use of regional languages , or incorrect punctuation. These errors make the assessment less consistent and accurate. Based on the dataset analysis that has been carried out, there is an imbalance between the number of right and wrong answers, so a technique is needed to overcome the data imbalance. Based on the literature, to overcome these problems, the Random Forest and AdaBoost classification algorithms can be used to improve the consistency of classification accuracy and the SMOTE method to overcome data imbalances.The Random Forest method using SMOTE can achieve an F1 measure of 99%, which means that the hybrid method can overcome the problem of imbalanced datasets that are limited to AES. The AdaBoost model with SMOTE produces the highest F1 measure reaching 99% of the entire dataset. The structure of the dataset is something that also affects the performance of the model. So the best model obtained in this study is the Random Forest model with SMOTE.
Classification Methods Performance On Logistic Package State Recognition Muhammad Auzan; Dzikri Rahadian Fudholi; Paulus Josianlie P; M Ridho Fuadin
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 17, No 4 (2023): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.82697

Abstract

 In the distribution sector, logistic package experience activities, such as transport, distribution, storage, packaging, and handling. Even though those processes have reasonable operational procedures, sometimes the package experience mishandling. The mishandling is hard to identify because many packages run simultaneously, and not all processes are monitored. An Inertial Measurement Unit (IMU) is installed inside a package to collect three acceleration and rotation data. The data is then labeled manually into four classes: correct handling, vertical fall, and thrown and rotating fall. Then, using cross-validation, ten classifiers were used to generate a model to classify the logistic package status and evaluate the accuracy score. It is hard to differentiate between free-fall and thrown. The classification only uses the accelerometer data to minimize the running time. The correct handling classification gives a good result because the data pattern has few variations. However, the thrown, free-fall and rotating data give a lower result because the pattern resembles each other. The average accuracy of the ten classifications is 78.15, with a mean deviation of 4.31. The best classifier for this research is the Gaussian Process, with a mean accuracy of 94.4 % and a deviation of 3.5 %.