JOIN (Jurnal Online Informatika)
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Articles
12 Documents
Search results for
, issue
"Vol 4 No 2 (2019)"
:
12 Documents
clear
Load Balancing Network by using Round Robin Algorithm: A Systematic Literature Review
Taufik Hidayat;
Yasep Azzery;
Rahutomo Mahardiko
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.446
The use of load balance on a network will be very much needed if the network is an active network and is widely accessed by users. A reason is that it allows network imbalances to occur. Round Robin (RR) algorithm can be applied for network load balancing because it is a simple algorithm to schedule processes so that it can provide work process efficiency. Authors use the Systematic Literature Review (SLR) method in which it can be applied for criteria selection during papers search to match the title being raised. SLR is divided into five stages, namely formalization of questions, criteria selection, selection of sources, selection of search results, and quality assessment. By using SLR, it is expected that papers according to criteria and quality can be found.
Security Scanner For Web Applications Case Study: Learning Management System
Rian Andrian;
Ahmad Fauzi
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.394
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.
A Middleware Framework between Mobility and IoT Using IEEE 802.15.4e Sensor Networks
Tanweer Alam
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.487
In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.
Diagnosis of Types of Diseases in Cassava Plant by Bayes Method
Agung Purnomo Sidik
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.379
This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.
Lossless Text Image Compression using Two Dimensional Run Length Encoding
Hilal H Nuha
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.330
Text images are used in many types of conventional data communication where texts are not directly represented by digital character such as ASCII but represented by an image, for instance facsimile file or scanned documents. We propose a combination of Run Length Encoding (RLE) and Huffman coding for two dimensional binary image compression namely 2DRLE. Firstly, each row in an image is read sequentially. Each consecutive recurring row is kept once and the number of occurrences is stored. Secondly, the same procedure is performed column-wise to the image produced by the first stage to obtain an image without consecutive recurring row and column. The image from the last stage is then compressed using Huffman coding. The experiment shows that the 2DRLE achieves a higher compression ratio than conventional Huffman coding for image by achieving more than 8:1 of compression ratio without any distortion.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab
Fauzan Novaldi Suteja;
Eka Wahyu Hidayat;
Nur Widiyasono
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.314
The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab
Suteja, Fauzan Novaldi;
Hidayat, Eka Wahyu;
Widiyasono, Nur
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.314
The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
Lossless Text Image Compression using Two Dimensional Run Length Encoding
Nuha, Hilal H
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.330
Text images are used in many types of conventional data communication where texts are not directly represented by digital character such as ASCII but represented by an image, for instance facsimile file or scanned documents. We propose a combination of Run Length Encoding (RLE) and Huffman coding for two dimensional binary image compression namely 2DRLE. Firstly, each row in an image is read sequentially. Each consecutive recurring row is kept once and the number of occurrences is stored. Secondly, the same procedure is performed column-wise to the image produced by the first stage to obtain an image without consecutive recurring row and column. The image from the last stage is then compressed using Huffman coding. The experiment shows that the 2DRLE achieves a higher compression ratio than conventional Huffman coding for image by achieving more than 8:1 of compression ratio without any distortion.
Diagnosis of Types of Diseases in Cassava Plant by Bayes Method
Sidik, Agung Purnomo
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.379
This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.
Security Scanner For Web Applications Case Study: Learning Management System
Andrian, Rian;
Fauzi, Ahmad
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i2.394
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.