cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 30 Documents
Search results for , issue "Vol 6 No 2 (2021)" : 30 Documents clear
Design of an Information System for Class Scheduling a Web-Based Lecture Schedule (Case Study: Faculty of Engineering and Science, Ibn Khaldun University) Novita BR Ginting; Yuggo Afrianto; Suratun suratun
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.727

Abstract

During the Covid-19 pandemic, the lecture process was carried out online, so it impacted other academic activities such as the preparation of lecture schedules. The results of observations at the Faculty of Engineering and Science found that the practice of lecture schedules was carried out manually, such as the schedule coordination process was carried out face-to-face between study programs, faculties, and lecturers to overcome conflicts in the use of rooms and teaching time. Changes in the teaching schedule need to be re-checked on the use of the room and the lecturer's teaching time because it has not been documented with the information system. Hence, this study aims to build an information system for preparing lecture schedules using the Greedy Best First Search Method based on the willingness of lecturers to teach. The system was developed using the RAD (Rapid Application Development) and testing using BlackBox testing. The results of this study succeeded in building a lecture scheduling information system that was able to generate lecture schedules automatically and quickly without having to coordinate face-to-face to support online lectures during the Covid-19 pandemic.
Sundanese Stemming using Syllable Pattern Ade Sutedi; Rickard Elsen; Muhammad Rikza Nasrulloh
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.812

Abstract

Stemming is a technique to return the word derivation to the root or base word. Stemming is widely used for data processing such as searching word indexes, translating, and information retrieval from a document in the database. In general, stemming uses a morphological pattern from a derived word to produce the original word or root word.  In the previous research, this technique faced over-stemming and under-stemming problems. In this study, the stemming process will be improved by the syllable pattern (canonical) based on the phonological rule in Sundanese. The stemming result for syllable patterns gets an accuracy of 89% and the execution of the test data resulted in 95% from all the basic words. This simple algorithm has the advantage of being able to adjust the position of the syllable pattern with the word to be stemmed. Due to some data shortage constraints (typo, loan-word, non-deterministic word with syllable pattern), we can improve to increase the accuracy such as adjusting words and adding reference dictionaries. In addition, this algorithm has a drawback that causes the execution to be over-stemming.
Vehicle Tracking to Determine Position in The Parking Lot Utilizing CCTV Camara Adi Suheryadi; Willy Permana P; Reza PY; A Sumarudin; Firdaus Firdaus
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.671

Abstract

Traveling to a place using a private vehicle is an activity that many people do when visiting an area. The visitors leave their cars in several parking lots within a certain period. The resulted, them having difficulty finding vehicles in the parking lot. This study aims to assist parking service users in finding cars parked at the parking location using CCTV cameras. Apart from being used as a security system, cameras have installed in the parking lot can also be used to track the visitor's cars to the point where they park. The proposed method consists of three large blocks: background subtraction, vehicle recognition, and vehicle tracking. Results this study obtained in the test include the accuracy for the vehicle tracking process of about 91.5%, with a true positive rate of approximately 81.12%, and vehicle recognition about 70%.
Enhancement of White Blood Cells Images using Shock Filtering Equation for Classification Problem Gregorius Vito; Putu Harry Gunawan
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.739

Abstract

Medical image processing has developed rapidly in the last decade. The autodetection and classification of white blood cells (WBC) is one of the medical image processing applications. The analysis of WBC images has engaged researchers from medical also technology fields. Since WBC detection plays an essential role in the medical field, this paper presents a system for distinguishing and classifying WBC types: eosinophils, neutrophils, lymphocytes, and monocytes, using K-Nearest Neighbor (K-NN) and Logistic Regression (LR). This study aims to find the best accuracy of pre-processing images using original grayscale, shock filtering, and thresholding grayscale. The highest average accuracy in classifying WBC images in the conducting research is 43.54% using the LR algorithm from 2103 images. It is obtained from the combination of thresholding grayscale image and shock filtering equation to enhance the quality of an image. Overall, using two algorithms, KNN and LR, the classification accuracy can increase up to 12%.
Chatbot for Signaling Quranic Verses Science Using Support Vector Machine Algorithm Undang Syaripudin; Deden Suparman; Yana Aditia Gerhana; Ayu Puji Rahayu; Mimin Mintarsih; Rizka Alawiyah
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.827

Abstract

The many verses in the Qur'an encourage finding the right way how to understand it thematically. The purpose of the research is to develop a chatbot application that can be used to explore and elaborate the content of verses in the Qur’an that hint at science. The support vector machine (SVM) algorithm classifies question and answers datasets in chatbot applications. The number of data sets used is 76, with test data as much as 10%. The test results show that the SVM algorithm is quite good in classifying, with an accuracy value of 87.5%. While the user test results obtained an average MOS of 8.4, which means the chatbot application developed is very effective in understanding the Qur'an, which implies science. This research is expected to provide an overview of the explanation of the Qur'an about science and technology.
The Comparison of Audio Analysis Using Audio Forensic Technique and Mel Frequency Cepstral Coefficient Method (MFCC) as the Requirement of Digital Evidence Helmy Dzulfikar; Sisdarmanto Adinandra; Erika Ramadhani
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.702

Abstract

Audio forensics is the application of science and scientific methods in handling digital evidence in the form of audio. In this regard, the audio supports the disclosure of various criminal cases and reveals the necessary information needed in the trial process. So far, research related to audio forensics is more on human voices that are recorded directly, either by using a voice recorder or voice recordings on smartphones, which are available on Google Play services or iOS Store. This study compares the analysis of live voices (human voices) with artificial voices on Google Voice and other artificial voices. This study implements the audio forensic analysis, which involves pitch, formant, and spectrogram as the parameters. Besides, it also analyses the data by using feature extraction using the Mel Frequency Cepstral Coefficient (MFCC) method, the Dynamic Time Warping (DTW) method, and applying the K-Nearest Neighbor (KNN) algorithm. The previously made live voice recording and artificial voice are then cut into words. Then, it tests the chunk from the voice recording. The testing of audio forensic techniques with the Praat application obtained similar words between live and artificial voices and provided 40,74% accuracy of information. While the testing by using the MFCC, DTW, KNN methods with the built systems by using Matlab, obtained similar word information between live voice and artificial voice with an accuracy of 33.33%.
Interactive Digital Catalog for Canopy Workshop Using Augmented Reality Rohman Dijaya; Rizky Bayu Wardana; Suprianto Suprianto
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.761

Abstract

This research study develops a product promotion method for a canopy roofs. The development of this method is to apply a 3-dimensional (3D) catalog using Augmented Reality (AR) technology. By utilizing Augmented Reality technology, sellers do not need to create markets or miniature products that are commonly used to provide examples to consumers to save costs, attract consumer interest, and display objects that appear natural. Based on the tests that have been done, it is concluded that implementing Augmented Reality in the canopy sales promotion media using the Luther development method with the stages of analysis, design, implementation, testing, and maintenance. Implementation of Augmented Reality in canopy sales promotion media uses concept data from the types of canopies included in the Augmented Reality-based application, namely stainless and hollow types made using a 3D blender program. A marker as a sign to bring up 3D objects in the application. Markers are created using Photoshop and entered the database so that they can be stored online. System testing uses the BlackBox testing method where the program's functionality is running as desired.
The Implementation of RPG Concept on Breakout Games Using LibGDX Framework Andres Nodas; Djajasukma Tjahjadi; Ali Rahman
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.517

Abstract

As technology becomes more global, RPG games runs into a good development. One of which is a combination of RPG with another games. This journal aims to combine the breakout games and the RPG which has its characteristics. This game development uses prototyping method, in which analysing the necessity and determining the goals of the software. Then, prototype will be created and evaluated regularly so that the result can use 2D graphics. This game also can be used as a reference to reflexes practising. A modeling is conducted to design ‘use case,’ scenario process, activity diagram, class diagram, and sequence diagram as well as to conduct an interface design. A calibration that is used, is calibrating the programme which is created as well as the features in the programme itself. It can be concluded that the construction of RPG games combination and breakout using eclipse and libgdx works well. In addition, it uses the components such as TMX tile map, sprite, sprite batching, box2d and input handling.
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method Yuliani Indrianingsih; Hero Wintolo; Eviana Yulianti Saputri
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.703

Abstract

Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
Kansei Engineering in Designing Web-Based e-Commerce UMKM Product Indra Griha Tofik Isa; Indri Ariyanti
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.786

Abstract

Human-Computer Interaction (HCI) is a part of the development of a system in addition to the usability factor. Several methods were developed in HCI to produce a User Interface design that persuasively attracts the user’s interest. One of these methods was Kansei Engineering which involved psychological factors and user emotions in the stage. The study focused on developing the e-commerce User Interface for UMKM products which based on how to maximize the service and quality of e-Commerce because so far the development of the web-based UMKM  e-Commerce product user interface has not paid attention to psychological factors. The Research followed Kansei Engineering Type 1 (KEPack) with the stages: (1) Research Initiation, (2) Collecting Kansei Words (KW), (3) Translating KW into SD scale, (4) Collecting Specimens, (5) Classifying Item / Category Specimens, (6) Evaluating Questionnaire Participants’ Data, (7) Multivariate Statistical Analysis, (8) Translating Statistical Data into Design Elements, (9) Creating Guideline Matrix Kansei Engineering. This study involved 40 participants, 20 Kansei Words, and ten specimens of UMKM e-Commerce products. The final result is the Kansei e-Commerce matrix guideline for web-based UMKM products, which had two main concepts, they were complexity consisting of formal, natural and simple emotion factors; and Uniqueness consisting of Comfortable, Soft, and Unique which consists of 8 main parts which divided into 65 design elements. The contribution of this Research in the informatics area is to provide recommendations for the appearance of  web-based UMKM  e-Commerce products based on the psychological factors of the user through the Kansei Engineering Stages.

Page 1 of 3 | Total Record : 30