cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Informatika
ISSN : 19780524     EISSN : 25286374     DOI : 10.26555
Core Subject : Science,
Arjuna Subject : -
Articles 419 Documents
Stemming javanese affix words using nazief and adriani modifications Aji Prasetya Wibawa; Felix Andika Dwiyanto; Ilham Ari Elbaith Zaeni; Rizal Kholif Nurrohman; AN Afandi
Jurnal Informatika Vol 14, No 1 (2020): January 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i1.a17106

Abstract

Stemming is the process of finding a basic word with several stages of affix removal. The main reason for stemming is to check spelling and machine translation and to support the effectiveness of the retrieval process. This study uses the Nazief and Adriani algorithm for stemming Javanese-influenced words. The first step taken is data collection and making a basic word dictionary. Then do the stemming process. Before stemming, modifications are made to the rules. The rules of the Nazief and Adriani algorithm, which are based on the morphology rules of the Indonesian language, are modified to suit the morphological rules of the Javanese language. Of the 366 words that were tested, it produced 351 correct basic words and 15 basic words that experienced errors. The results show that this algorithm can be used for stemming Javanese with an accuracy value of 95.9%.
Feature extraction in batik image geometric motif using canny edge detection Muhammad Fikri Hidayattullah; M. Nishom; Slamet Wiyono; Yustia Hapsari
Jurnal Informatika Vol 14, No 1 (2020): January 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i1.a15320

Abstract

One of Indonesia's priceless cultural heritages is batik. Even UNESCO was admitting that batik is an intellectual, cultural right of the Indonesian (October 2). Unfortunately, many Indonesian do not have sufficient knowledge about the various types of the existence of batik's motifs. In fact, in each of these motifs, many treasures must be maintained. Therefore, it is necessary to develop a model that can recognize batik motifs automatically. The model can be built using various kinds of pattern recognition algorithms. One of the most important stages in the introduction of batik motifs is the feature extraction. Feature extraction is needed to determine the parameters that able to define character a batik's motif. One feature extraction model that can be done is by using edge detection. This research focuses on feature extraction using Canny edge detection. The result of edge detection is forming the pattern of a batik motif. The pattern contains pixel values 0 and 1. These values can later be used as input at the classification stage.
Lightning Effects Technique Comparison in Unity 3D Syauqi Hidayatul Hakim; Wahyu Andhyka Kusuma
Jurnal Informatika Vol 13, No 1 (2019): January 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (432.891 KB) | DOI: 10.26555/jifo.v13i1.a9762

Abstract

Game developer team especially indie game developer mostly has small number of members and sometimes unbalanced team composition. Sometimes it has more artist than programmer, sometimes it is the opposite. At the same time, consumer will choose game that has a beautiful graphics. This demands of good graphic game can cause problem to unbalanced developer team. Therefore it is needed to know techniques that can utilize many artist or many programmer to create good graphic games. In this articles, we introduce some techniques to create special lightning effects of characters skills in Unity3D. Some of them can be created with good artistic skill. It means that this technique make use of your artist. The other technique created procedurally using Line Renderer from Unity 3D. This technique is friendly for artist since it utilze programmer. At the end of this article, all of those technique will be tested in their performance of its lightness and speed.
Ubiquitous computing: a learning system solution in the era of industry 4.0 Wildan Toyib; Delvis Agusman; Hari Ramza
Jurnal Informatika Vol 14, No 1 (2020): January 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (70.672 KB) | DOI: 10.26555/jifo.v14i1.a15314

Abstract

Ubiquitous computing, which was initially advocated by Mark Weiser has become one of the keywords to express a vision of the near future of computing systems. The "ubiquitous world" is a ubiquitous computing environment with integrated networks; computer integrated manufacturing system (CIMS) and invisible computers which equipped sensor microchips and radio frequency identification systems. Anyone can access the ubiquitous computing systems anytime and anywhere broader, without individual awareness or skills. Ubiquitous computing is becoming crucial elements to organize the activities of groups of people by use of groupware under workforce mobility. The computer-supported cooperative work is transforming from telework to ubiquitous work with new information and communication technologies that support people working cooperatively. Ubiquitous learning is a demand for the knowledge workforce for more multi-skilled professionals. It is a new and emerging education and training system that integrating e-learning of cyberspace and mobile learning of physical space with a global repository that has the potential to be accessed by anyone at any place and anytime under ubiquitous integrated computing environment. In this paper, we discuss the study of emerging trends through the implementation of work and learning that influenced ubiquitous computing technology prospects. Furthermore, the perspective of ubiquitous work and learning system, gaining quality, and hence credibility with emerging information and communication technologies in education and training systems in the area of the education system are discussed. The experimental results showed that CIMS could improve the students learned more efficiently and achieved better learning performance.
5G-Enabled Tactile Internet for smart cities: vision, recent developments, and challenges Tanweer Alam
Jurnal Informatika Vol 13, No 2 (2019): July 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (799.72 KB) | DOI: 10.26555/jifo.v13i2.a13426

Abstract

The Tactile Internet (TI) is an emerging technology next to the Internet of Things (IoT). It is a revolution to develop smart cities, communities, and cultures in the future. This technology will allow the real-time interaction between humans and machines as well as machine-to-machine with the 1ms challenge to achieve in round trip latency. The term TI is defined by the International Telecommunication Union (ITU) in August 2014. The TI provides a fast, reliable, secure and available internet network that is the requirements of the smart cities in 5G. Tactile internet can develop the part of the world where the machines are strong, and humans are weak. It increases the power of machines so that the value of human power will increase automatically. In this framework, we have presented the idea of tactile internet for the next generation of smart cities. This research will provide a high-performance reliable framework for the internet of smart devices to communicate with each other in a real-time (1ms round trip) using IEEE 1918.1 standard. The objective of this research is expected to bring a new dimension in the research of smart cities.
Mamdani Fuzzy Implementation for New Student Admission Selection Felix Andika Dwiyanto; Mohammad Rizky Kurniawan; Syaichul Fitrian Akbar; Anik Nur Handayani
Jurnal Informatika Vol 13, No 1 (2019): January 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (600.871 KB) | DOI: 10.26555/jifo.v13i1.a15697

Abstract

In the selection process for New Student Admissions, there are many prospective new students. However, not all candidates accepted at a school. They must be passing through the selection stage by following specific criteria. Therefore, schools need to select candidates following specific criteria to make the best selection of students. Especially in vocational high school (VHS), the selection processes are more complex. It is because every department in VHS certainly has its criteria (different in each department). Based on the background, this study aims to propose a method based on Mamdani Fuzzy that can be applied to the new student admission selection process. There are three main stages in this method, which are fuzzification, inference, and defuzzification.
Towards transparent machine learning models using feature sensitivity algorithm Ali A. Abaker; Fakhreldeen A. Saeed
Jurnal Informatika Vol 14, No 1 (2020): January 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i1.a16983

Abstract

Despite advances in health care, diabetic ketoacidosis (DKA) remains a potentially serious risk for diabetes. Directing diabetes patients to the appropriate unit of care is very critical for both lives and healthcare resources. Missing data occurs in almost all machine learning models, especially in production. Missing data can reduce the predictive power and produce biased estimates of models. Estimating a missing value around a 50 percent probability may lead to a completely different decision. The objective of this paper was to introduce a feature sensitivity score using the proposed feature sensitivity algorithm. The data were electronic health records contained 644 records and 28 attributes. We designed a model using a random forest classifier that predicts the likelihood of a developing patient DKA at the time of admission. The model achieved an accuracy of 80 percent using five attributes; this new model has fewer features than any model mentioned in the literature review. Also, Feature sensitivity score (FSS) was introduced, which identifies within feature sensitivity; the proposed algorithm enables physicians to make transparent, and accurate decisions at the time of admission. This method can be applied to different diseases and datasets.
Design and Build Disaster Emergency Response Systems Using Firebase Cloud Messaging Based on Android and SMS Gateway Tri Ferga Prasetyo; Rohmat Rohmat; Dadan Zalilluddin
Jurnal Informatika Vol 13, No 1 (2019): January 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (967.349 KB) | DOI: 10.26555/jifo.v13i1.a11664

Abstract

Design and implementation emergency response system using firebase cloud messaging android based and sms gateway is a disaster notification information system using mobile android based media by utilizing support from firebase cloud message service and sms gateway. This study aims to assist BPBD Majalengka District in improving the effectiveness, accuracy, and speed of the process of delivering disaster information to the public. Applications use cross-platform messaging through firebase clouds that are able to perform real-time notification reporting to users with details or formatting of text, images, or map coordinates. This research uses Agile Method Development system with Rational Unified Process and software used in making this application is using Android Studio 2.3.2 and PHP programming language.
Comparison of Knuth Morris Pratt and Boyer Moore algorithms for a web-based dictionary of computer terms Ali Khumaidi; Yusuf Aras Ronisah; Harjono Padmono Putro
Jurnal Informatika Vol 14, No 1 (2020): January 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i1.a17038

Abstract

Computer students need a dictionary of computer terms to deepen lectures. In developing dictionary applications, the term computer will choose the fastest and most efficient memory algorithm. The comparison algorithm is Knuth Morris Pratt (KMP) and Boyer Moore (BM) algorithm. Based on previous research, the KMP algorithm has a better performance compared to other string matching algorithms. However, other studies have concluded that the BM algorithm has better performance. Besides, the Zhu-Takaoka algorithm is more efficient than the KMP algorithm in dictionary development. The BM algorithm has the same search concept as the Zhu-Takaoka algorithm. The determination of the fastest and most efficient algorithm in this study uses the Exponential Comparison Method (ECM). ECM sets criteria for when searching and using the memory in the search process. The results of the comparison of the KMP and BM algorithm are the search time for the BM algorithm is 37.9%, and the KMP algorithm is 62.1%. The results of the use of search memory for the KMP algorithm are 50.6%, and the BM algorithm is 49.4%. The total ECM score shows that the BM algorithm is 0.55% better than the KMP algorithm.
Information security analysis on physical security in university x using maturity model Khairunnisak Nur Isnaini; Siti Alvi Solikhatin
Jurnal Informatika Vol 14, No 2 (2020): May 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i2.a14434

Abstract

The threat of physical security can be from human factors, natural disasters, and information technology itself. Therefore, to prevent threats, we need the right tools to control current activities, evaluate potential impacts, and make appropriate plans so that business processes at X University will not be affected. This research starts by analyzing the problems that arise, followed by collecting the data needed, discussing the results, and making conclusions and recommendations that can be given. The method uses quantitative descriptive research. The research instrument uses interviews and questionnaire techniques. COBIT 5 is used as a framework for measuring the performance that is being implemented and will be achieved. Maturity models are used to measure current and future activities. The goal to be achieved is that the organization can create a physical security environment by the CIA principle (confidentiality, integrity, & availability). Positioning results are at level 3, meaning that the process is currently running in two main standard operating procedures. However, this evaluation specifically on the DSS5.5.5 subdomain (Providing Service Support-Managing physical security for IT Assets) in COBIT 5, and the results are still below the level 3 standard (Established Process), at 2.9 points. So, the right suggestion is to keep activities safe, one of which is to improve facilities and infrastructure, one of which is the use of biometric control in data center management rooms or other rooms with limited access.

Filter by Year

2008 2025


Filter By Issues
All Issue Vol. 19 No. 1 (2025): January 2025 Vol. 18 No. 3 (2024): September 2024 Vol. 17 No. 1 (2023): January 2023 Vol 17, No 1 (2023): January 2023 Vol 16, No 3 (2022): September 2022 Vol 16, No 2 (2022): May 2022 Vol 16, No 1 (2022): January 2022 Vol 15, No 3 (2021): September 2021 Vol 15, No 2 (2021): May 2021 Vol 15, No 1 (2021): January 2021 Vol 14, No 3 (2020): September 2020 Vol 14, No 2 (2020): May 2020 Vol 14, No 1 (2020): January 2020 Vol. 13 No. 2 (2019): July 2019 Vol 13, No 2 (2019): July 2019 Vol 13, No 1 (2019): January 2019 Vol 12, No 2: July 2018 Vol 12, No 1: January 2018 Vol 11, No 2 (2017): Juli Vol 11, No 2 (2017): Juli Vol 11, No 1 (2017): Januari Vol 11, No 1 (2017): Januari Vol 10, No 2 (2016): Juli Vol 10, No 2 (2016): Juli Vol 10, No 1 (2016): Januari Vol 10, No 1 (2016): Januari Vol 9, No 2 (2015): Juli Vol 9, No 2 (2015): Juli Vol 9, No 1 (2015): Januari Vol 9, No 1 (2015): Januari Vol 8, No 2 (2014): Juli Vol 8, No 2 (2014): Juli Vol 8, No 1 (2014): Januari Vol 8, No 1 (2014): Januari Vol 7, No 2: Juli 2013 Vol 7, No 2: Juli 2013 Vol 7, No 1: Januari 2013 Vol 7, No 1: Januari 2013 Vol 6, No 2: Juli 2012 Vol 6, No 2: Juli 2012 Vol 6, No 1: Januari 2012 Vol 6, No 1: Januari 2012 Vol 5, No 2: Juli 2011 Vol 5, No 2: Juli 2011 Vol 5, No 1: January 2011 Vol 5, No 1: January 2011 Vol 4, No 2: July 2010 Vol 4, No 2: July 2010 Vol 4, No 1: January 2010 Vol 4, No 1: January 2010 Vol 3, No 2: July 2009 Vol 3, No 2: July 2009 Vol 3, No 1: January 2009 Vol 3, No 1: January 2009 Vol 2, No 2: July 2008 Vol 2, No 2: July 2008 Vol 2, No 1: January 2008 Vol 2, No 1: January 2008 More Issue