cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota bandung,
Jawa barat
INDONESIA
Indonesian Journal on Computing (Indo-JC)
Published by Universitas Telkom
ISSN : 24609056     EISSN : -     DOI : -
Core Subject : Science,
Indonesian Journal on Computing (Indo-JC) is an open access scientific journal intended to bring together researchers and practitioners dealing with the general field of computing. Indo-JC is published by School of Computing, Telkom University (Indonesia).
Arjuna Subject : -
Articles 198 Documents
Klasifikasi Nada Sesuai Kodàly Handsign Dengan Metode K-Nearest Neighbor Pada Leap Motion Controller Muhammad Croassacipto; Muhammad Ichwan; Dina Budhi Utami
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 1 (2019): Maret, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/INDOJC.2019.4.1.269

Abstract

Tangan dapat menghasilkan berbagai pose di mana setiap pose dapat memiliki makna atau tujuan yang dapat digunakan sebagai bentuk komunikasi ditentukan sesuai kesepakatan umum atau siapa yang berkomunikasi. Pose tangan dapat digunakan sebagai interaksi manusia dengan komputer yang lebih cepat, intuitif dan sesuai dengan fungsi alami dari tubuh manusia yang disebut Handsign. Salah satunya adalah Kodály Handsign yang dibuat oleh seorang komposer Hungaria bernama Zoltán Kodály yang merupakan konsep dalam pendidikan musik di Hungaria. Pendekatan langsung ini digunakan dalam pertunjukan angklung interaktif dalam menentukan nada yang akan dimainkan dengan algoritma K-Nearest Neighbor (KNN) untuk proses klasifikasi berdasarkan pose tangan. Proses klasifikasi ini dilakukan pada data yang diekstrak dari Leap Motion Controller yang mengambil nilai Pitch, Roll dan Yaw berdasarkan prinsip dasar pesawat. Hasil penelitian dilakukan sebanyak 5 kali dengan nilai k secara periodik 1,3,5,7,9 dengan data uji beruapa pose yang terdiri dari 1004 Do, 891 Re, 526 Mi, 661 Fa, 612 Sol, 913 La, 702 Si dan 874 Do' terhadap 21099 data latih. Hasil tes dapat mengenali pose tangan dengan nilai k optimal  k=1 dengan tingkat akurasi 94,87%.
Implementasi untuk Meningkatkan Keamanan Jaringan Menggunakan Deep Packet Inspection pada Software Defined Networks Danaswara Prawira Harja; Andrian Rakhmatsyah; Muhammad Arief Nugroho
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 1 (2019): Maret, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/INDOJC.2019.4.1.286

Abstract

AbstractToday, Software Defined Network (SDN) has been globally recognized as a new technology for network architecture. But, there is still lack in security. Many studies use methods such as the Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) to deal with social problems. But there is still a lack of security in terms of network performance. To solve the problem, can be used Deep Packet Inspection method (DPII) which make administrators can directly know what happens to traffic in real time. In this research, DPI will be implemented as security method and tested with Denial of Service (DoS) attack with Direct Attack. The results of testing on SDN networks that have been added DPI can perform packet detection such as IDS and blocking such as IPS with good performance time in overcoming attack.Keywords: SDN, DPI, DoS attack, Direct Attack, performance
Klasifikasi Gender Berdasarkan Suara Menggunakan Support Vector Machine Raditya Budi Handoko; Suyanto Suyanto
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 1 (2019): Maret, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/INDOJC.2019.4.1.244

Abstract

Klasifikasi gender berdasarkan suara mempengaruhi tingkat performansi dari identifikasi suara. oleh karena itu penelitian tugas akhir ini penulis membuat sistem klasifikasi gender berdasarkan suara. penelitian ini menggunakan dataset berupa rekaman suara sebanyak 2260 suara yang terbagi menjadi dua kelas yaitu "laki-laki" dan "perempuan". Untuk proses ekstrasi ciri digunakan Mel-Frequency Cepstral (MFCC) untuk menghasilkan vektor ciri dari sinyal suara. dalam proses klasifikasi digunakan metode Support Vector Machine (SVM). Hasil akurasi SVM tertinggi untuk klasifikasi gender berdasarkan suara dapat mencapai 100\% menggunakan kernel Polynomial dengan degree = 1.
Numerical Simulation of Soliton Collision by using 1D Boussinesq Model Didit Adytia; Four Saputra BM
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.335

Abstract

Soliton or solitary wave is a physical phenomenon in which a wave propagates without changing of form in a dispersive media. It is a condition when effects of nonlinearity is balanced with effects of dispersion. Therefore solitary wave propagation is a standard test for testing nonlinearity and dispersiveness of a wave model and its numerical implementation. One interesting case of the soliton phenomenon is the soliton collision which is an interaction between two solitary waves facing each other and producing a high impact wave. The phenomenon can be used to study tsunami wave interactions. In this paper we study the phenomenon by using numerical approach. We use a nonlinear dispersive 1D Boussinesq model that is implemented numerically by using Finite Element implementation in a collocated grid. The accuracy of the implementation is test by simulating two test cases of solitary wave, i.e. the propagation of solitary wave againsts analytical soliton solusion of Korteweg-de Vries (KdV) and the collision of two identical solitary waves. Results of simulations are also compared with results of the nonlinear nondispersive Shallow Water Equations (SWE).
Topic Classification of Islamic Questionand Answer Using Naive Bayes Classifier Naufal Furqan Hardifa; Kemas Muslim Lhaksmana; Jondri Jondri
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.346

Abstract

Topic classification is one of the most important components in an automatic Islamic question-answering system, which is capable of automatically providing the most relevant answers given a question about the Islamic issue. In our research, the Islamic question-answering system to be built collects existing Islamic questions and answers from trusted online Islamic consultation websites. To speed up the search for finding the appropriate answers, each Q & A entry should be classified into a topic. However, the question-answering system cannot directly adopt the topic classes provided by the online Islamic consultation websites, because different websites use different classifications. Since the number of Q & A entries could reach tenth thousands, an automatic topic classification method is required. In this paper, a naive Bayes classifier is implemented to classify Q & A entries. The classifier gives a satisfying result with 0.88 precision.
Named Entity Recognition for an Indonesian Based Language Tweet using Multinomial Naive Bayes Classifier Ramadhyni Rifani; Moch Arif Bijaksana; Ibnu Asror
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.330

Abstract

In Natural Languange Processing (NLP), Named Entity Recognition (NER) is a sub discussion that is widely used for research. the main task of Named Entity Recognition (NER) is to help identify and detect the entity names from a word in a sentence. The data sources we use are a real time Indonesian language tweets that often occur, which the number of letter each tweet is limited to 280 characters. The words contained in that Indonesian language tweets can refer to the name of the entity, location, or organization, so to determine the name of that entity, it must be considered first by looking at the word patterns around it. In Indonesia, an average tweet posted from an account at least is 1-3 tweets per day which contain a formal and non-formal contents that made this a difficult challenge to provide the right entity naming. In this research, we are naming the entities from the Indonesian language tweets by using the Multinomial Naive Bayes Classifier algorithm. The system uses precision, recall,and f-measure as evaluation metrics. Naming this entity is able to classify with a value of f-1 reaching 80%.
Multi-Factor Authentication Using a Smart Card and Fingerprint (Case Study: Parking Gate) Isa Mulia Insan; Parman Sukarno; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.309

Abstract

Security is one of the considerations in the development of smart parking. In Indonesia, the most common authentication factor is using a smart card as an authentication factor at the gate. Using a smart card as an authentication factor has loopholes that can be misused. Accordingly, authentication system needs an additional factor (more than one). Authentication that uses more than one factor is also called Multi-Factor Authentication (MFA). However, the MFA applied to smart parking can still be misused. The cause of the MFA can be misused because the MFA cannot ensure the user's smart card. Therefore, we apply the MFA at the gate in smart parking using a two-factor authentication system on this research. These two factors are the smart card and biometric data (fingerprint). This authentication system can prove the hypothesis that if the smart card lost, the smart card cannot be used by other than the owner (H0) and the smart card whose data has been rewritten or cloned cannot be a threat to the system (H1). Proofing of this hypothesis is bypassing several attack scenarios. Thus, the security of the proposed parking gate system can be guaranteed.
Pengembangan Sistem Informasi pada Perusahaan Dagang Menggunakan Zachman Framework Studi Kasus : Toko Perlengkapan Pesta Party Partner Teguh Anshari Nugraha; Mahmud Imrona; Eko Darwiyanto
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.254

Abstract

Perusahaan yang bergerak dibidang penjualan perlengkapan pesta. Bisnis yang dijalankan terus berkembang, hingga menjadi produsen untuk salah satu produk yang dijual di toko dan para pemasok. Proses bisnis yang berlangsung menuntut perusahaan untuk dapat mengelola informasi dengan baik dan dapat memenuhi kebutuhan dalam mengembangkan sistem informasi menjadi lebih baik. Pengembangan yang dilakukan, dapat mencegah terjadinya pembengkakan biaya, kesalahan produksi, dan ketidaksesuaian transaksi dengan ketersediaan stok barang. Masalah yang dikemukakan dianalisis menggunakan Zachman Framework, visi dan misi serta pengembangan sistem informasi. Pengembangan sistem informasi menggunakan Zachman Framework dapat didefinisikan secara sistematis, diidentifikasi dan dikategorikan berdasarkan cara pandang dan fokus analisis. Dari hasil penelitian, diperoleh analisis perusahanan, analisis pada pengembangan sistem informasi menggunakan Zachman Framework dan hasil uji prototype menggunakan metode kuisioner Usability Testing, dengan nilai rata rata 3.668.
Digital Forensic Analysis on iDevice : Jailbreak iOS 12.1.1 as a Case Study Amin Aenurahman Ali; Niken Cahyani; Erwin Jadied
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.349

Abstract

Jailbreak has an issue in data alteration, as it modifies file(s) in the device to allow user to extract more data than without jailbreaking. This issue raises controversy of the use of jailbreaking in digital forensic investigation, as data integrity is a prominent requirement in a court proceeding. This study aims to analyze the process of jailbreak, what is actually done by the jailbreak code in a device, and what data is actually modified by the jailbreak code. By using the latest version of iOS system, this study uses the voucher_swap exploit as a representation of semi-tethered jailbreaking method to investigate the effects of jailbreak on data integrity on a idevice. The investigation is conducted based on to what extent data can be extracted from the jailbreak device, hash value comparison of the data, and source code analysis to scrutinize the effect of jailbreak to the system and user data inside the device. Results of this study suggest that jailbreak is acceptable to prepare idevice in digital forensic investigations to acquire more data, as it maintains the integrity of user data. These results may help forensic communities in their decision about the acceptability of jailbreaking in idevide forensic investigations.
Pembangunan Synonym Set untuk WordNet Bahasa Indonesia dengan Menggunakan Metode Komutatif dina juni restina; Moch. Arif Bijaksana; Kemas Muslim Lhaksamana
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.334

Abstract

Dalam NLP (Natural Language Processing) banyak keterkaitan semantik leksikal yang dapatdiaplikasikan, salah satunya adalah aplikasi WordNet. WordNet yang dibangun menggunakanmetode komutatif dalam proses pembangunan synonym set (synset)-nya. Synset yang akandibangun harus memiliki sifat komutatif baru dapat dikatakan synset yang bernilai valid, yangberarti jika sebuah kata w1 memiliki sinonim w2, maka w2 juga harus memiliki sinonimw1, seperti yang terjadi pada Princeton WordNet. WordNet pertama kali dibuat dalam bahasaInggris, sebelum para peneliti menerjemahkan kedalam berbagai bahasa seperti bahasa Jepang,bahasa Arab, bahasa Turki serta bahasa Indonesia dan bahasa lainnya. Untuk itu dibutuhkanpembangunan WordNet untuk turut serta membantu peneliti lain agar kedepanya WordNetBahasa Indonesia yang ada memiliki kosa kata yang lebih lengkap. WordNet yang akandibangun akan berfokus pada ekstraksi synset yaitu tahapan pertama pembangunan WordNetsebelum tahapan relasi antar synset dan gloss kata. Pembangunan synset ini menggunakankamus Tesaurus Bahasa Indonesia sebagai sumber kata. Nilai F-measure dari pembangunansynset dengan menggunakan metode komutatif adalah sebesar 66 persen.Kata Kunci: WordNet Bahasa Indonesia, Synset dan Metode komutatif

Page 8 of 20 | Total Record : 198