cover
Contact Name
Hindayati Mustafidah
Contact Email
jurnal.juita@gmail.com
Phone
+6285842817313
Journal Mail Official
jurnal.juita@gmail.com
Editorial Address
Gedung Fakultas Teknik dan Sains Universitas Muhammadiyah Purwokerto Jl. K.H. Ahmad Dahlan, Dukuh Waluh, Kembaran, Banyumas, Central Java, Indonesia
Location
Kab. banyumas,
Jawa tengah
INDONESIA
JUITA : Jurnal Informatika
ISSN : 20869398     EISSN : 25798901     DOI : 10.30595/JUITA
Core Subject : Science,
UITA: Jurnal Informatika is a science journal and informatics field application that presents articles on thoughts and research of the latest developments. JUITA is a journal peer reviewed and open access. JUITA is published by the Informatics Engineering Study Program, Universitas Muhammadiyah Purwokerto. JUITA invites researchers, lecturers, and practitioners worldwide to exchange and advance knowledge in the field of Informatics. Documents submitted must be in Ms format. Word and written according to author guideline. JUITA is published twice a year in May and November. Currently, JUITA has been indexed by Google Scholar, IPI, DOAJ, and has been accredited by SINTA rank 2 through the Decree of the Director-General of Research and Development Strengthening of the Ministry of Research, Technology and Higher Education No. 36/E/KPT/2019. JUITA is intended as a media for informatics research among academics, practitioners, and society in general. JUITA covers the following topics of informatics research: Software engineering Artificial Intelligence Data Mining Computer network Multimedia Management Information System Digital forensics Game
Articles 17 Documents
Search results for , issue "JUITA Vol. 9 No. 1, May 2021" : 17 Documents clear
The Empirical Comparison of Machine Learning Algorithm for the Class Imbalanced Problem in Conformational Epitope Prediction Binti Solihah; Azhari Azhari; Aina Musdholifah
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (972.975 KB) | DOI: 10.30595/juita.v9i1.9969

Abstract

A conformational epitope is a part of a protein-based vaccine. It is challenging to identify using an experiment. A computational model is developed to support identification. However, the imbalance class is one of the constraints to achieving optimal performance on the conformational epitope B cell prediction. In this paper, we compare several conformational epitope B cell prediction models from non-ensemble and ensemble approaches. A sampling method from Random undersampling, SMOTE, and cluster-based undersampling is combined with a decision tree or SVM to build a non-ensemble model. A random forest model and several variants of the bagging method is used to construct the ensemble model. A 10-fold cross-validation method is used to validate the model.  The experiment results show that the combination of the cluster-based under-sampling and decision tree outperformed the other sampling method when combined with the non-ensemble and the ensemble method. This study provides a baseline to improve existing models for dealing with the class imbalance in the conformational epitope prediction.
Use of Wavelets in Electrocardiogram Research: a Literature Review Darwan Darwan; Hindayati Mustafidah
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (268.897 KB) | DOI: 10.30595/juita.v9i1.10202

Abstract

Currently the introduction and detection of heart abnormalities using electrocardiogram (ECG) is very much. ECG conducted many research approaches in various methods, one of which is wavelet. This article aims to explain the trends of ECG research using wavelet approach in the last ten years. We reviewed journals with the keyword title "ecg wavelet" and published from 2011 to 2020. Articles classified by the most frequently discussed topics include: datasets, case studies, pre-processing, feature extraction and classification/identification methods. The increase in the number of ECG-related articles in recent years is still growing in new ways and methods. This study is very interesting because only a few researchers focus on researching about it. Several approaches from many researchers are used to obtain the best results, both by using machine learning and deep learning. This article will provide further explanation of the most widely used algorithms against ECG research with wavelet approaches. At the end of this article it is also shown that the critical aspect of ECG research can be done in the future is the use of datasets, as well as the extraction of characteristics and classifications by looking at the level of accuracy.
A New Approach in Query Expansion Methods for Improving Information Retrieval Lasmedi Afuan; Ahmad Ashari; Yohanes Suyanto
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1237.644 KB) | DOI: 10.30595/juita.v9i1.9657

Abstract

This research develops a new approach to query expansion by integrating Association Rules (AR) and Ontology. In the proposed approach, there are several steps to expand the query, namely (1) the document retrieval step; (2) the step of query expansion using AR; (3) the step of query expansion using Ontology. In the initial step, the system retrieved the top documents via the user's initial query. Next is the initial processing step (stopword removal, POS Tagging, TF-IDF). Then do a Frequent Itemset (FI) search from the list of terms generated from the previous step using FP-Growth. The association rules search by using the results of FI. The output from the AR step expanded using Ontology. The results of the expansion with Ontology use as new queries. The dataset used is a collection of learning documents. Ten queries used for the testing, the test results are measured by three measuring devices, namely recall, precision, and f-measure. Based on testing and analysis results,  integrating AR and Ontology can increase the relevance of documents with the value of recall, precision, and f-measure by 87.28, 79.07, and 82.85.
Development of an Android-Based Sign Language Education Game Using a Scrum-Game Approach Imam Fauzy Muldani Rachmat; Gazali Gazali
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1652.864 KB) | DOI: 10.30595/juita.v9i1.8721

Abstract

Sign language is used as a communication tool for deaf children. It is also used by non-disabled as a way of communicating with them. However, not all non-disabled understand sign language since knowledge of sign language is required. Based on interviews among non-disabled and deaf people, including relatives and teachers, they experience miscommunication due to the lack of communication skills using sign language and rely only on lip movements. Sign language is applied to a subject in the State Special School of Banjar City, consisting of BISINDO and SIBI with conventional learning. This research to produce game products for learning sign language can help deaf children learn sign language in schools, especially non-disabled who want to learn sign language. The method used for developing games sign language education uses the SCRUM-Game approach, UML models, BlackBox testing, and usability testing. The sprint iteration consists of two sprints that produce educational sign language games: Alphabet SIBI and BISINDO. Educational game testing uses BlackBox testing with the conclusion that all functionality valid. Usability testing of student deaf responders and non-disabled respondents for efficiency, memorability, and errors is categorized as good. Aspect satisfaction and learnability get an excellent score. Overall, the resulting educational games get a good score. Therefore it is proper to be used.
An Approach of Brain-Computer Interface Electroencephalography for Measuring Visual Height Intolerance Moch Yusuf Asyhari; Dhomas Hatta Fudholi; Fery Luvita Sari
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1163.818 KB) | DOI: 10.30595/juita.v9i1.8314

Abstract

The environment is one factor that influences the quality of life, including a high environment for people with the fear of height (Visual Height Intolerance, VHI). Currently, VHI is measured by using the Visual Height Intolerance Severity Scale (VHISS). The lack of evidence-based testing makes these measurements feel weak and less meaningful. The use of Virtual Reality (VR) and Electroencephalography (EEG) based on the Brain-Computer Interface (BCI) deserves to be tested. The test is done by reading the human brain's electrical activity using a BCI-based EEG when given VR exposure. The analysis process uses a simple wave concept. Furthermore, the correlation study was carried out using the Spearman-rho method with a consideration of the normality test, which produced non-parametric data. The correlation test results show that the BCI-based EEG biometric data in the form of the amount of waves per time and magnitude has a strong relationship with the VHISS scale. The higher the number of waves per time, the higher the amplitude, the higher the VHISS scale. The evaluation was carried out by examining the correlation based on the demographics of age and gender. Finally, EEG based on BCI and VR can be an alternative and concrete evidence to review the level of visual height intolerance other than VHISS.
Goal-Oriented Requirements Engineering: State of the Art and Research Trend Rosa Delima; Retantyo Wardoyo; Khabib Mustofa
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1062.134 KB) | DOI: 10.30595/juita.v9i1.9827

Abstract

The Goal-Oriented Requirements Engineering (GORE) is one approach that is widely used for the early stages of software development. This method continues to develop in the last three decades. In this paper, a literature study is conducted to determine the GORE state of the art. The study begins with a Systematic Literature Review (SLR) was conducted to determine the research trend in the last five years. This study reviewed 126 papers published from 2016 to 2020.  The research continues with the author's search for scientific articles about GORE. There are 26 authors who actively publish GORE research results. Twenty-six authors were grouped into seven groups based on their relation or co-authoring scientific articles. An in-depth study of each group resulted in a holistic mapping of GORE research.  Based on the analysis, it is known that most research focuses on improving GORE for an automated and reliable RE process, developing new models/frameworks/methods originating from GORE, and implementing GORE for the RE process. This paper contributes to a holistic mapping of the GORE approach. Through this study, it is known the various studies that are being carried out and research opportunities to increase automation in the entire RE process.
Comparison of Steganography Using the Discrete Cosine Transform Method on Image Based Bilinear, Nearest Neighbor and Spline Interpolation Garno Garno; Adhi Rizal; Arip Solehudin; Reza Ekstanza; Dadang Yusup
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1097.862 KB) | DOI: 10.30595/juita.v9i1.7302

Abstract

The research was conducted in the field of steganography. Discrete Cosine Transform (DCT) is a method used in the insertion technique. The results of steganography have problems if they look blurry, have low levels of similarity and high error values. One way to solve this problem is by proposing image interpolation. The interpolation method consists of various kinds and gives each other advantages. This study intends to compare three kinds of interpolation techniques to find the best one. The three interpolation techniques are bilinear, nearest neighbor, and spline. The method used in this research is experimental. Images with extension formats * .tif, * .png, and * .bmp with dimensions of 512x512 px are interpolated by scaling 1.5, 2, and 4. The results of the interpolation process are used to insert messages in * .txt format of 157 bytes with discrete cosines transform (DCT). The image quality of the message insertion is measured by the MSE and PSNR values. The result of the message insertion test shows that the value of the image quality is directly proportional, meaning that if the condition of the message size is fixed and the cover dimensions are greater, the MSE value will be smaller and the PSNR value will be greater. Images with * .tif and * .bmp extension formats have good stability, * .png images vary in size. The smallest error value test results were obtained in the spline interpolation technique and this method when compared to the other two techniques had the lowest average MSE value of 8.221 and the PSNR value of 40,301 dB.

Page 2 of 2 | Total Record : 17