cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 30 Documents
Search results for , issue "Vol 8 No 1 (2023)" : 30 Documents clear
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method Didih Rizki Chandranegara; Jafar Shodiq Djawas; Faiq Azmi Nurfaizi; Zamah Sari
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1051

Abstract

Malware is intentionally designed to damage computers, servers, clients or computer networks. Malware is a general term used to describe any program designed to harm a computer or server. The goal is to commit a crime, such as gaining unauthorized access to a particular system, so as to compromise user security. Most malware still uses the same code to produce another different form of malware variants. Therefore, the ability to classify similar malware variant characteristics into malware families is a good strategy to stop malware. The research is useful for classifying malware on malware samples presented as bytemap grayscale images. The malware classification research focused on 25 malware classes with a total of 9,029 images from the Malimg dataset. This research implements the VGG-16 and InceptionResNet-V2 architectures by running 2 different scenarios, scenario 1 uses the original dataset and the other scenario uses the undersampled dataset. After building the model, each scenario will get an evaluation form such as accuracy, precision, recall, and f1-score. The highest score was obtained in scenario 2 on the VGG-16 method with a score of 94.8% and the lowest in scenario 2 on the InceptionResNet-V2 method with a score of 85.1%.
Implementation of Ant Colony Optimization – Artificial Neural Network in Predicting the Activity of Indenopyrazole Derivative as Anti-Cancer Agent Isman Kurniawan; Nabilla Kamil; Annisa Aditsania; Erwin Budi Setiawan
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1055

Abstract

Cancer is a disease induced by the abnormal growth of cells in body tissues. This disease is commonly treated by chemotherapy. However, at first, cancer cells can respond to the activity of chemotherapy over time, but over time, resistance to cancer cells appears. Therefore, it is required to develop new anti-cancer drugs. Indenopyrazole and its derivative have been investigated to be a potential drug to treat cancer. This study aims to predict indenopyrazole derivative compounds as anti-cancer drugs by using Ant Colony Optimization (ACO) and Artificial Neural Network (ANN) methods. We used 93 compounds of indenopyrazole derivative with a total of 1876 descriptors. Then, the descriptors were reduced by using the Pearson Correlation Coefficient (PCC) and followed by the ACO algorithm to get the most relevant features. We found that the best number of descriptors obtained from ACO is ten descriptors. The ANN prediction model was developed with three architectures, which are different in hidden layer number, i.e., 1, 2, and 3 hidden layers. Based on the results, we found that the model with three hidden layers gives the best performance, with the value of the R2 test, R2 train, and Q2 train being 0.8822, 0.8495, and 0.8472, respectively.
Classification of Stunting in Children Using the C4.5 Algorithm Muhajir Yunus; Muhammad Kunta Biddinika; Abdul Fadlil
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1062

Abstract

Stunting is a disease caused by malnutrition in children, which results in slow growth. Generally, stunting is characterized by a lack of weight and height in young children. This study aims to classify stunting in children aged 0-60 months using the Decision Tree C4.5 method based on z-score calculations with a sample size of 224 records, consisting of 4 attributes and 1 label, namely Gender, Age, Weight, Height, and Nutritional Status. The results of the study obtained a C4.5 decision tree where the Age variable influenced the classification of stunting with the highest Gain Ratio of 0.185016337. Meanwhile, the evaluation of the model using the Confusion matrix resulted in the highest accuracy of 61.82% and AUC of 0.584.
Digital Image Processing Using YCbCr Colour Space and Neuro Fuzzy to Identify Pornography Beki Subaeki; Yana Aditia Gerhana; Meta Barokatul Karomah Rusyana; Khaerul Manaf
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1070

Abstract

Pornography is a severe problem in Indonesia, apart from drugs. This can be seen based on data from the Ministry of Communication and Informatics in 2021 which found 1.1 million pornographic content online. The increasing number of access to pornographic content sites on the internet can prove this. Several studies have been conducted to produce preventive formulas. However, this research flow has not been effective in solving the problem. This is because the results of the identification value in the output image obtained are not quite right. This study proposes a procedure for identifying pornographic content in digital images as an alternative approach for the early stages of a destructive content access prevention system. The formulation uses the YCbCr color space to analyze human skin on image objects that represent exposed body parts and the classification process with the Neuro Fuzzy approach. The performance of this formula was tested on 100 digital images of random categories of human objects (usually covered, skimpy, and naked) taken from the internet. The test results are at a relatively good level of accuracy, with a weight of 70% for the entire test data.
Texture Analysis of Citrus Leaf Images Using BEMD for Huanglongbing Disease Diagnosis Sumanto; Agus Buono; Karlisa Priandana; Bib Paruhum Silalahi; Elisabeth Sri Hendrastuti
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1075

Abstract

Plant diseases significantly threaten agricultural productivity, necessitating accurate identification and classification of plant lesions for improved crop quality. Citrus plants, belonging to the Rutaceae family, are highly susceptible to diseases such as citrus canker, black spot, and the devastating Huanglongbing (HLB) disease. Traditional approaches for disease detection rely on expert knowledge and time-consuming laboratory tests, which hinder rapid and effective disease management. Therefore, this study explores an alternative method that combines the Bidimensional Empirical Mode Decomposition (BEMD) algorithm for texture feature extraction and Support Vector Machine (SVM) classification to improve HLB diagnosis. The BEMD algorithm decomposes citrus leaf images into Intrinsic Mode Functions (IMFs) and a residue component. Classification experiments were conducted using SVM on the IMFs and residue features. The results of the classification experiments demonstrate the effectiveness of the proposed method. The achieved classification accuracies, ranging from 61% to 77% for different numbers of classes, the results show that the residue component achieved the highest classification accuracy, outperforming the IMF features. The combination of the BEMD algorithm and SVM classification presents a promising approach for accurate HLB diagnosis, surpassing the performance of previous studies that utilized GLCM-SVM techniques. This research contributes to developing efficient and reliable methods for early detection and classification of HLB-infected plants, essential for effective disease management and maintaining agricultural productivity.
Implementation of Generative Adversarial Network to Generate Fake Face Image Pardede, Jasman; Setyaningrum, Anisa Putri
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.790

Abstract

In recent years, many crimes use technology to generate someone's face which has a bad effect on that person. Generative adversarial network is a method to generate fake images using discriminators and generators. Conventional GAN involved binary cross entropy loss for discriminator training to classify original image from dataset and fake image that generated from generator. However, use of binary cross entropy loss cannot provided gradient information to generator in creating a good fake image. When generator creates a fake image, discriminator only gives a little feedback (gradient information) to generator update its model. It causes generator take a long time to update the model. To solve this problem, there is an LSGAN that used a loss function (least squared loss). Discriminator can provide astrong gradient signal to generator update the model even though image was far from decision boundary. In making fake images, researchers used Least Squares GAN (LSGAN) with discriminator-1 loss value is 0.0061, discriminator-2 loss value is 0.0036, and generator loss value is 0.575. With the small loss value of the three important components, discriminator accuracy value in terms of classification reaches 95% for original image and 99% for fake image. In classified original image and fake image in this studyusing a supervised contrastive loss classification model with an accuracy value of 99.93%.
Social Network Analysis: Identification of Communication and Information Dissemination (Case Study of Holywings) Aditiawarman, Umar; Lumbia, Mega; Mantoro, Teddy; Ibrahim, Adamu Abubakar
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.911

Abstract

Social media especially Twitter has been used by corporation or organization as an effective tool to interact and communicate with the consumers. Holywings is one of the popular restaurants in Indonesia that use social media as a tool to promote and disseminate information regarding their products and services. However, one of their promotional items has gone viral and invited public protests which turned into a trending topic on Twitter for a couple of weeks. Holywings allegedly improperly promoted their products by using the most honorable names, “Muhammad” and “Maria”. Social network analysis of Twitter data is conducted to identify and examine information circulating among the users, which leads to wider public attention and law enforcement. In this study, we focused on the conversation about Holywings on Twitter from 24 June to 31 July 2022. The analysis was carried out using Python to retrieve data and Gephi software to visualize the interactions and the intensity of the network group in viewing the spread of information. The findings reveal the centrality account that caused the news to go viral are the CNN Indonesia (@CNNIndonesia) news media account and Haris Pertama (@knpiharis), with a centrality of 0.161 and 0.282, respectively. There are also 121 groups involved in the conversation with modularity of 0.821.
The Implementation of Restricted Boltzmann Machine in Choosing a Specialization for Informatics Students Nastiti, Vinna Rahmayanti Setyaning; Sari, Zamah; Chintia Eka Merita, Bella
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.917

Abstract

Choosing a specialization was not an easy task for some students, especially for those who lacked confidence in their skill and ability. Specialization in tertiary education became the benchmark and key to success for students’ future careers. This study was conducted to provide the learning outcomes record, which showed the specialization classification for the Informatics students by using the data from the students of 2013-2015 who had graduated. The total data was 319 students. The classification method used for this study was the Restricted Boltzmann Machine (RBM). However, the data showed imbalanced class distribution because the number of each field differed greatly. Therefore, SMOTE was added to classify the imbalanced class. The accuracy obtained from the combination of RBM and SMOTE was 70% with a 0.4 mean squared error.
Scalability Testing of Land Forest Fire Patrol Information Systems Khusaeri, Ahmad; Sitanggang, Imas Sukaesih; Rahmawan, Hendra
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.977

Abstract

The Patrol Information System for the Prevention of Forest Land Fires (SIPP Karhutla) in Indonesia is a tool for assisting patrol activities for controlling forest and land fires in Indonesia. The addition of Karhutla SIPP users causes the need for system scalability testing. This study aims to perform non-functional testing that focuses on scalability testing. The steps in scalability testing include creating schemas, conducting tests, and analyzing results. There are five schemes with a total sample of 700 samples. Testing was carried out using the JMeter automation testing tool assisted by Blazemeter in creating scripts. The scalability test parameter has three parameters: average CPU usage, memory usage, and network usage. The test results show that the CPU capacity used can handle up to 700 users, while with a memory capacity of 8GB it can handle up to 420 users. All users is the user menu that has the highest value for each test parameter The average value of CPU usage is 44.8%, the average memory usage is 69.48% and the average network usage is 2.8 Mb/s. In minimizing server performance, the tile cache map method can be applied to the system and can increase the memory capacity used.
Run Length Encoding Compresion on Virtual Tour Campus to Enhance Load Access Performance Bastian, Ade; Mardiana, Ardi; Berliani, Mega; Firmansyah, Mochammad Bagasnanda
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.1000

Abstract

Virtual tour is one of the rapidly growing applications of multimedia technology which is used for various purposes, including the dissemination of information in an interesting way. The education sector is also not spared from using virtual tour media for promotional purposes, and campuses are no exception to this rule. Large virtual tour content causes high access speed, ultimately reducing the level of comfort experienced by users. This study aims to compress panoramic images displayed on a campus virtual tour using a lossless compression method and the Run Length Encoding (RLE) algorithm. First, panoramic images are combined into one, then individual images are compressed. When recreating a virtual campus tour, compressed images are used so that the amount of data transferred is smaller. The load access speed index increases from 7,233 seconds to 3,789 seconds when images are compressed from 64 bits to 8 bits, with a compression percentage of 27%. The findings from this research are that the RLE algorithm has not been able to compress large files effectively even though it is quite successful in increasing the load access of the virtual tour website.

Page 2 of 3 | Total Record : 30