cover
Contact Name
Hindayati Mustafidah
Contact Email
jurnal.juita@gmail.com
Phone
+6285842817313
Journal Mail Official
jurnal.juita@gmail.com
Editorial Address
Gedung Fakultas Teknik dan Sains Universitas Muhammadiyah Purwokerto Jl. K.H. Ahmad Dahlan, Dukuh Waluh, Kembaran, Banyumas, Central Java, Indonesia
Location
Kab. banyumas,
Jawa tengah
INDONESIA
JUITA : Jurnal Informatika
ISSN : 20869398     EISSN : 25798901     DOI : 10.30595/JUITA
Core Subject : Science,
UITA: Jurnal Informatika is a science journal and informatics field application that presents articles on thoughts and research of the latest developments. JUITA is a journal peer reviewed and open access. JUITA is published by the Informatics Engineering Study Program, Universitas Muhammadiyah Purwokerto. JUITA invites researchers, lecturers, and practitioners worldwide to exchange and advance knowledge in the field of Informatics. Documents submitted must be in Ms format. Word and written according to author guideline. JUITA is published twice a year in May and November. Currently, JUITA has been indexed by Google Scholar, IPI, DOAJ, and has been accredited by SINTA rank 2 through the Decree of the Director-General of Research and Development Strengthening of the Ministry of Research, Technology and Higher Education No. 36/E/KPT/2019. JUITA is intended as a media for informatics research among academics, practitioners, and society in general. JUITA covers the following topics of informatics research: Software engineering Artificial Intelligence Data Mining Computer network Multimedia Management Information System Digital forensics Game
Articles 15 Documents
Search results for , issue "JUITA Vol. 12 No. 1, May 2024" : 15 Documents clear
Editor Preface and Table of Content JUITA: Jurnal Informatika
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.21893

Abstract

Editor Preface and Table of Content Vol 12 No. 1 May 2024
Comparative Analysis of CNN Architectures for SIBI Image Classification Yulrio Brianorman; Dewi Utami
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.20608

Abstract

The classification of images from the Indonesian Sign Language System (SIBI) using VGG16, ResNet50, Inception, Xception, and MobileNetV2 Convolutional Neural Network (CNN) architectures is evaluated in this paper. With Google Colab Pro, a 224 × 224-pixel picture dataset was used for the study. A five-stage technique consisting of Dataset Collection, Dataset Preprocessing, Model Design, Model Training, and Model Testing was applied. Performance evaluation focused on accuracy, precision, recall, and F1-Score. The results identified VGG16 as the top-performing model with an accuracy of 99.60% and an equivalent F1-Score, followed closely by ResNet50 with nearly similar performance. Inception, XCeption, and MobileNetV2 demonstrated balanced performance but with lower accuracy. This study sheds light on the best CNN models to choose for SIBI image classification, and it makes recommendations for further research that include using sophisticated data augmentation methods, investigating novel CNN architectures, and putting the models to practical use.
Image Classification of Room Tidiness Using VGGNet with Data Augmentation Leni Fitriani; Ayu Latifah; Moch. Rizky Cahyadiputra
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.21204

Abstract

Tidiness becomes an essential aspect that everyone should maintain. Tidiness encompasses various elements, and one of the aspects closely related to it is the tidiness of a room. The tidiness of a room creates a comfortable and clean environment. The tidiness of a room is particularly crucial for individuals involved in businesses such as the hospitality industry. Therefore, a solution is needed to address this issue, and one of the approaches is to utilize Deep Learning for automatic room tidiness classification. One popular deep learning method for implementing image classification of room tidiness is the convolutional neural network (CNN), which creates a well-performing model for image classification with data augmentation. This research aims to develop an image classification model using CNN with the VGGNet architecture and data augmentation. This study is a reference for further development, with potential applications in the hospitality industry. The research results in a model that achieves an accuracy of 98.44% with a data proportion of 90% for training and validation, while the remaining 10% is used for testing purposes. The conclusion drawn from this study is that the CNN method, combined with data augmentation, can be utilized for image classification of room tidiness.
Implementation of Live Forensic Method on Fusion Hard Disk Drive (HDD) and Solid State Drive (SSD) RAID 0 Configuration TRIM Features Desti Mualfah; Rizdqi Akbar Ramadhan; Muhammad Arrafi Arrasyid
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.19508

Abstract

One of the solutions used for access speeds is to maximize non-volatile storage functions by a conventional Hard Disk Driver with Solid State Drive that has the TRIM architecture using the Redundant Array of Inexpensive Disks 0 configuration or the commonly known RAID 0. RAID 0 is a stripping technique that has the highest speed among other RAID configurations. However, this configuration has a disadvantage in that when there is damage to one of the storage disks all the data will be corrupted and lost. It's becoming one of the challenges in digital forensic investigation when it comes to computer crime. Furthermore, this research uses experimental practices using live forensic methods to perform analysis and examination against the merger of HDD and SSD configuration RAID 0 TRIM features. The expected is an overview of the characteristics of recovery capability to find out the authenticity integrity values of files that have been lost or permanently deleted on both TRIM SSD functions disable and enable. Furthermore, this research is expected to be a solution for the experimental and practical investigation of computer crime especially in Indonesia given the increasing development of technology that is directly compared with the rise in computer crime. 
Optimization of Hyperparameter K in K-Nearest Neighbor Using Particle Swarm Optimization Muhammad Rizki; Arief Hermawan; Donny Avianto
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.20688

Abstract

This study aims to enhance the performance of the K-Nearest Neighbors (KNN) algorithm by optimizing the hyperparameter K using the Particle Swarm Optimization (PSO) algorithm. In contrast to prior research, which typically focuses on a single dataset, this study seeks to demonstrate that PSO can effectively optimize KNN hyperparameters across diverse datasets. Three datasets from different domains are utilized: Iris, Wine, and Breast Cancer, each featuring distinct classification types and classes. Furthermore, this research endeavors to establish that PSO can operate optimally with both Manhattan and Euclidean distance metrics. Prior to optimization, experiments with default K values (3, 5, and 7) were conducted to observe KNN behavior on each dataset. Initial results reveal stable accuracy in the iris dataset, while the wine and breast cancer datasets exhibit a decrease in accuracy at K=3, attributed to attribute complexity. The hyperparameter K optimization process with PSO yields a significant increase in accuracy, particularly in the wine dataset, where accuracy improves by 6.28% with the Manhattan matrix. The enhanced accuracy in the optimized KNN algorithm demonstrates the effectiveness of PSO in overcoming KNN constraints. Although the accuracy increase for the iris dataset is not as pronounced, this research provides insight that optimizing the hyperparameter K can yield positive results, even for datasets with initially good performance. A recommendation for future research is to conduct similar experiments with different algorithms, such as Support Vector Machine or Random Forest, to further evaluate PSO's ability to optimize the iris, wine, and breast cancer datasets.
Comparative Study of Predictive Classification Models on Data with Severely Imbalanced Predictors Embay Rohaeti; Ani Andriyati
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.21491

Abstract

Analysing pre-COVID-19 unemployment in West Java is vital for comprehending and tackling Indonesia’s economic challenges. This significance arises not only due to the region’s high unemployment rate, but also from the need to understand unemployment patterns before COVID-19, which has become more relevant now during the country’s post-pandemic recovery phase. This study evaluates four machine learning models (Random Forest, Linear SVM, RBF SVM, and Polynomial SVM) to classify employment status using demographic and job-related variables. The objective is to find the most suitable model, particularly considering the imbalanced nature of the study-case data. Data from the National Labor Force Survey (SAKERNAS) in August 2019 is utilized, comprising 54,429 respondents across districts in West Java. The four models are evaluated using holdout validation with a 70:30 stratified proportion, repeated for 100 times. Results indicate that the random forest model outperforms others in balanced accuracy, F1-score, and computational time. The random forest model also underscores the importance of gender and age in classifying employment status in West Java, suggesting a need for targeted intervention, especially for female citizens and individuals in productive age groups.
Non-linear Kernel Optimisation of Support Vector Machine Algorithm for Online Marketplace Sentiment Analysis Abdul Fadlil; Imam Riadi; Fiki Andrianto
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.19798

Abstract

Twitter is a social media platform that is very important in the digital world. Fast communication and interaction make Twitter a vital information center in sentiment analysis. The purpose of this research is to classify public opinion about the presence of marketplaces in Indonesia, both positive and negative sentiments, using a Non-linear SVM algorithm based on 1276 tweets. This research involves the stages of data pre-processing, labeling, feature extraction using TF-IDF, and data division into three scenarios: 80% training data and 20% test data, 50% training data and 50% test data scenario, and 20% training data and 80% test data scenario. The last process, GridSearchCV, combines cross-validation and non-linear SVM parameters for model evaluation using a confusion matrix. The best SVM model resulting from the scenario was 80% training and 20% test data, with hyperparameters Gamma = 100 and C = 0.01, achieving 89% accuracy. When tested on never-before-seen data, the accuracy increased to 90%, with an f1-score of 91%, precision of 88%, and recall of 95% on negative sentiments. In conclusion, evaluating the performance of non-linear SVM kernels with a combination of hyperparameter values can improve accuracy, especially on public response information about online marketplaces and public sentiment.
Enhancing Durrotalk Chatbot Accuracy Utilizing a Hybrid Model Based on Recurrent Neural Network (RNN) Algorithm and Decision Tree Dede Rizki Darmawan; Riza Arifudin
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.20868

Abstract

DurroTalk, a chatbot for new student admissions at Pondok Pesantren Durrotu Ahlissunnah Waljamaah, Semarang, integrates a hybrid model with Recurrent Neural Network (RNN) and Decision Tree. RNN, the base model, employs Natural Language Processing (NLP) to understand sentence structure and context, overcoming vanishing gradient through LSTM layers. The Decision Tree normalizes words, addressing slang and synonyms. The hybrid model boosts chatbot accuracy by 9%, reaching 77% from the initial 68%. This research signifies progress in integrating artificial intelligence into traditional education, showcasing a chatbot adept at handling non-standard language. Decision Tree integration enhances overall performance, making the chatbot proficient in understanding user inputs and generating contextually relevant responses. This study exemplifies the potential of AI, particularly chatbot technology, in modernizing educational processes at traditional institutions.
BCBimax Biclustering Algorithm with Mixed-Type Data Hanifa Izzati; Indahwati Indahwati; Anik Djuraidah
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.21519

Abstract

The application of biclustering analysis to mixed data is still relatively new. Initially, biclustering analysis was primarily used on gene expression data that has an interval scale. In this research, we will transform ordinal categorical variables into interval scales using the Method of Successive Interval (MSI). The BCBimax algorithm will be applied in this study with several binarization experiments that produce the smallest Mean Square Residual (MSR) at the predetermined column and row thresholds. Next, a row and column threshold test will be carried out to find the optimal bicluster threshold. The existence of different interests in the variables for international market potential and the number of Indonesian export destination countries is the reason for the need for identification regarding the mapping of destination countries based on international trade potential. The study's results with the median threshold of all data found that the optimal MSR is at the threshold of row 7 and column 2. The number of biclusters formed is 9 which covers 74.7% of countries. Most countries in the bicluster come from the European Continent and a few countries from the African Continent are included in the bicluster.
Number of Cyber Attacks Predicted With Deep Learning Based LSTM Model Joko Siswanto; Irwan Sembiring; Adi Setiawan; Iwan Setyawan
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.20210

Abstract

The increasing number of cyber attacks will result in various damages to the functioning of technological infrastructure. A prediction model for the number of cyber attacks based on the type of attack, handling actions and severity using time-series data has never been done. A deep learning-based LSTM prediction model is proposed to predict the number of cyberattacks in a time series on 3 evaluated data sets MSLE, MSE, MAE, RMSE, and MAPE, and displays the predicted relationships between prediction variables. Cyber attack dataset obtained from kaggle.com. The best prediction model is epoch 20, batch size 16, and neuron 32 with the lowest evaluation value on MSLE of 0.094, MSE of 9.067, MAE of 2.440, RMSE of 3.010, and MAPE of 10.507 (very good model because the value is less than 15) compared other variations. There is a negative correlation for INTRUSION-MALWARE, BLOCKED-IGNORED, IGNORED-LOGGED, and LOW-MEDIUM. The predicted results for the next 12 months will increase starting from the second month at the same time. The resulting predictions can be used as a basis for policy and strategy decisions by stakeholders in dealing with fluctuations in cyber attacks that occur.

Page 1 of 2 | Total Record : 15