cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
sji@mail.unnes.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Scientific Journal of Informatics
ISSN : 24077658     EISSN : 24600040     DOI : -
Core Subject : Science,
Scientific Journal of Informatics published by the Department of Computer Science, Semarang State University, a scientific journal of Information Systems and Information Technology which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences.
Arjuna Subject : -
Articles 14 Documents
Search results for , issue "Vol 6, No 2 (2019): November 2019" : 14 Documents clear
Face Identification Based on K-Nearest Neighbor Widiari, Ni Putu Ayu
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19503

Abstract

Face identification has been widely applied this time, such as security on gadgets, smart home security, and others. Face dominates as a biometric which is most increase in the next few years. Face is used for biometric identification which is considered successful among several other types of biometrics and accurate results. Face recognition utilizes facial features for security purposes. The classification method in this paper is K-nearest Neighbor (KNN). The K-Nearest Neighbor algorithm uses neighborhood classification as the predictive value of a good instance value. K-NN includes an instance-based learning group. This paper developed face identification using Principal Component Analysis (PCA) or eigenface extraction methods. The stages of face identification research using the KNN method are pre-processing in the input image. Preprocessing used in this research are contrass stretching, grayscale, and segmentation used haar cascade. This research is registered 30 people, each person had 3 images used for training and 2 images used for testing. The results obtained from several trials of k values are as follows. Experiments with a value of k=1 get the best accuracy, namely 81%, k=2 get 53% accuracy, and k=3 get 45% accuracy.
Mobile Note Application for Bendesa Adat at Bali Adijaya, Oka Mahardika
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19705

Abstract

Bendesa Adat is the head of village whose job is to coordinate customary matters in the village he leads, for example, the piodalan ceremony and also the dewasa ayu, especially the dewasa ayu pengabenan of the village. Dewasa ayu is a great day in doing an activity that is believed by the people in Bali. Determination of dewasa ayu and also piodalan has the calculations in accordance with the Balinese Calendar such as calculation of wuku, sasih and also pengalantaka that is in the Balinese Calendar. Not everyone understands how to look for dewasa ayu and piodalan that will occur in the village. Bendesa Adat Notes Based on Android are made to make people know about piodalan and dewasa ayu and holidays in Bali. This application consists of three main informations, there are ceremony day information, dewasa ayu information and also piodalan information that has been tried out to the public and from the results of the trial 32% of the community said they were very satisfied, 54% said they were satisfied and 14% said enough satisfied.
Inverse Modeling Using Taylor Expansion Approach and Jacobi Matrix on Magnetic Data (Dyke/Magma Intrusion Cases) Suprianto, Agus; Wahyudi, Wahyudi; Suryanto, Wiwit; Setiawan, Ari; Adhi, Aryono; Priyantari, Nurul; Supriyadi, Supriyadi; Subekti, Agus
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19798

Abstract

The mathematical modelling of geological structures, i.e. magma intrusion or dyke, has been done,  based on magnetic data with inversion techniques using MatLab. The magnetic equation is a non-linear equation, and completion is done using a linear approach to non-linear mathematical models of magnetic data using the Taylor expansion approach and Jacobi Matrix. The first step of this research is to make synthetic data forward modelling from the magnetic equation of magma intrusion or dyke cases without errors, and the next stepping then add errors to the data. The next step is to do an inversion to get the parameters sought, i.e. depth and angle of the magma intrusion, by giving initial guesses, and then re-correct iteratively until convergent results are obtained. Finally, parameters of slope dyke or thin magma intrusion and its depth can be determined. The results obtained indicate that this technique can be used to get physical parameters sought from magnetic data for simple geological cases, i.e. dyke and magma intrusion.
AUTOMATIC DETECTION OF MOTORCYCLE ON THE ROAD USING DIGITAL IMAGE PROCESSING sutikno, sutikno; Wibawa, Helmie Arif; Saputra, Ragil
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.20143

Abstract

Traffic accident is one of the causes of death in the world. One of them is traffic accidents on motorcyclist not wearing helmets. To overcome this problem, several researchers have developed detection system of motorcyclist not wear helmet. This system consists of motorcycle detection and motorcyclist head detection. On motorcycle detection, accuracy still needs to be improved. For this reason, this paper proposed motorcycle detection by adding image improvement processes that are enhancing contrast and adding object positioning features.The techniques proposed in this study are divided into 3 stages of image enhancement, feature extraction, and classification. The image enhancement stage consists of enhance contrast, convert RGB image to gray scale, background subtraction, convert gray scale image to binary, closing operation, and small object removal. The features used in this paper are the features of the object area, the circumference of the object, and the location of the object, while the method for classification process using back-propagation neural network and SVM. The proposed method resulted in an accuracy of 96.97%. Error occurs in all image test data not motorcycle objects detected as motorcycle objects. This error is caused because the pixel value between the objects in the image with the background color has a level of difference is too small, so it is detected as an object not a motorcycle.
SOFTWARE DEFINED NETWORKS: A COMPARATIVE STUDY AND QUALITY OF SERVICES EVALUATION Nugroho, Herry Prasetyo; Irfan, Muhammad; Faruq, Amrul
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.20585

Abstract

Software-Defined Network (SDN) as architecture network that separates the control and forwarding functions, so that network operators and administrators can configure the networks in a simple and centrally between thousands of devices. This study is designed and evaluate the Quality of Services (QoS) performances between the two networks employed SDN-based architecture and without SDN-based. MinNet as a software emulator used as a data plane in the network Software Define Network. In this study, comparison of the value of the QoS on the network based on Software Defined Network and traditional network during the test run from the source node is investigated. Network testing by using traffic loads. Traffic loads are used starting from 20Mbps-100Mbps. The result is verified that the QoS analysis of the Software-Defined Network architecture performed better than conventional network architectures. The value of the latency delay on the Software Define Network range between 0,019-0,084ms, and with 0% packet loss when addressed the network traffics of 10-100Mbps.
INTELLIGENT WEB APPLICATIONS AS FUTURE GENERATION OF WEB APPLICATIONS Wakil, Karzan; N.A.Jawawi, Dayang
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19297

Abstract

During the recent years World Wide Web very fast increased a fundamental part in our everyday life. In commerce, personal relationship, the effect of the universal network has wholly changed the way people interact with each other and with machines. The problem is after rising the Artificial Intelligence to presenting human feelings, everything changed including web applications. In this paper, we describe the intelligent web applications as present and future of web applications, moreover we highlight the special features and their roles in increasing intelligence of web applications as well as impact this application in the process development web systems. The goals of this paper led to developers to create smart and modern web applications.
ANALYSIS SECURITY OF SIA BASED DSS05 ON COBIT 5 USING CAPABILITY MATURITY MODEL INTEGRATION (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
Face Identification Based on K-Nearest Neighbor Wirdiani, Ni Kadek Ayu; Hridayami, Praba; Widiari, Ni Putu Ayu; Rismawan, Komang Diva; Candradinata, Putu Bagus; Jayantha, I Putu Deva
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19503

Abstract

Face identification has been widely applied this time, such as security on gadgets, smart home security, and others. Face dominates as a biometric which is most increase in the next few years. Face is used for biometric identification which is considered successful among several other types of biometrics and accurate results. Face recognition utilizes facial features for security purposes. The classification method in this paper is K-nearest Neighbor (KNN). The K-Nearest Neighbor algorithm uses neighborhood classification as the predictive value of a good instance value. K-NN includes an instance-based learning group. This paper developed face identification using Principal Component Analysis (PCA) or eigenface extraction methods. The stages of face identification research using the KNN method are pre-processing in the input image. Preprocessing used in this research are contrass stretching, grayscale, and segmentation used haar cascade. This research is registered 30 people, each person had 3 images used for training and 2 images used for testing. The results obtained from several trials of k values are as follows. Experiments with a value of k=1 get the best accuracy, namely 81%, k=2 get 53% accuracy, and k=3 get 45% accuracy.
Mobile Note Application for Bendesa Adat at Bali Sudana, Oka; Mahardika, Oka; Dharmaadi, I Putu Arya
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.19705

Abstract

Bendesa Adat is the head of village whose job is to coordinate customary matters in the village he leads, for example, the piodalan ceremony and also the dewasa ayu, especially the dewasa ayu pengabenan of the village. Dewasa ayu is a great day in doing an activity that is believed by the people in Bali. Determination of dewasa ayu and also piodalan has the calculations in accordance with the Balinese Calendar such as calculation of wuku, sasih and also pengalantaka that is in the Balinese Calendar. Not everyone understands how to look for dewasa ayu and piodalan that will occur in the village. Bendesa Adat Notes Based on Android are made to make people know about piodalan and dewasa ayu and holidays in Bali. This application consists of three main informations, there are ceremony day information, dewasa ayu information and also piodalan information that has been tried out to the public and from the results of the trial 32% of the community said they were very satisfied, 54% said they were satisfied and 14% said enough satisfied.
Analysis Security of SIA Based DSS05 on COBIT 5 Using Capability Maturity Model Integration (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.

Page 1 of 2 | Total Record : 14