cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 490 Documents
Vehicle Tracking to Determine Position in The Parking Lot Utilizing CCTV Camara Adi Suheryadi; Willy Permana P; Reza PY; A Sumarudin; Firdaus Firdaus
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.671

Abstract

Traveling to a place using a private vehicle is an activity that many people do when visiting an area. The visitors leave their cars in several parking lots within a certain period. The resulted, them having difficulty finding vehicles in the parking lot. This study aims to assist parking service users in finding cars parked at the parking location using CCTV cameras. Apart from being used as a security system, cameras have installed in the parking lot can also be used to track the visitor's cars to the point where they park. The proposed method consists of three large blocks: background subtraction, vehicle recognition, and vehicle tracking. Results this study obtained in the test include the accuracy for the vehicle tracking process of about 91.5%, with a true positive rate of approximately 81.12%, and vehicle recognition about 70%.
Enhancement of White Blood Cells Images using Shock Filtering Equation for Classification Problem Gregorius Vito; Putu Harry Gunawan
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.739

Abstract

Medical image processing has developed rapidly in the last decade. The autodetection and classification of white blood cells (WBC) is one of the medical image processing applications. The analysis of WBC images has engaged researchers from medical also technology fields. Since WBC detection plays an essential role in the medical field, this paper presents a system for distinguishing and classifying WBC types: eosinophils, neutrophils, lymphocytes, and monocytes, using K-Nearest Neighbor (K-NN) and Logistic Regression (LR). This study aims to find the best accuracy of pre-processing images using original grayscale, shock filtering, and thresholding grayscale. The highest average accuracy in classifying WBC images in the conducting research is 43.54% using the LR algorithm from 2103 images. It is obtained from the combination of thresholding grayscale image and shock filtering equation to enhance the quality of an image. Overall, using two algorithms, KNN and LR, the classification accuracy can increase up to 12%.
Chatbot for Signaling Quranic Verses Science Using Support Vector Machine Algorithm Undang Syaripudin; Deden Suparman; Yana Aditia Gerhana; Ayu Puji Rahayu; Mimin Mintarsih; Rizka Alawiyah
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.827

Abstract

The many verses in the Qur'an encourage finding the right way how to understand it thematically. The purpose of the research is to develop a chatbot application that can be used to explore and elaborate the content of verses in the Qur’an that hint at science. The support vector machine (SVM) algorithm classifies question and answers datasets in chatbot applications. The number of data sets used is 76, with test data as much as 10%. The test results show that the SVM algorithm is quite good in classifying, with an accuracy value of 87.5%. While the user test results obtained an average MOS of 8.4, which means the chatbot application developed is very effective in understanding the Qur'an, which implies science. This research is expected to provide an overview of the explanation of the Qur'an about science and technology.
The Comparison of Audio Analysis Using Audio Forensic Technique and Mel Frequency Cepstral Coefficient Method (MFCC) as the Requirement of Digital Evidence Helmy Dzulfikar; Sisdarmanto Adinandra; Erika Ramadhani
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.702

Abstract

Audio forensics is the application of science and scientific methods in handling digital evidence in the form of audio. In this regard, the audio supports the disclosure of various criminal cases and reveals the necessary information needed in the trial process. So far, research related to audio forensics is more on human voices that are recorded directly, either by using a voice recorder or voice recordings on smartphones, which are available on Google Play services or iOS Store. This study compares the analysis of live voices (human voices) with artificial voices on Google Voice and other artificial voices. This study implements the audio forensic analysis, which involves pitch, formant, and spectrogram as the parameters. Besides, it also analyses the data by using feature extraction using the Mel Frequency Cepstral Coefficient (MFCC) method, the Dynamic Time Warping (DTW) method, and applying the K-Nearest Neighbor (KNN) algorithm. The previously made live voice recording and artificial voice are then cut into words. Then, it tests the chunk from the voice recording. The testing of audio forensic techniques with the Praat application obtained similar words between live and artificial voices and provided 40,74% accuracy of information. While the testing by using the MFCC, DTW, KNN methods with the built systems by using Matlab, obtained similar word information between live voice and artificial voice with an accuracy of 33.33%.
Interactive Digital Catalog for Canopy Workshop Using Augmented Reality Rohman Dijaya; Rizky Bayu Wardana; Suprianto Suprianto
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.761

Abstract

This research study develops a product promotion method for a canopy roofs. The development of this method is to apply a 3-dimensional (3D) catalog using Augmented Reality (AR) technology. By utilizing Augmented Reality technology, sellers do not need to create markets or miniature products that are commonly used to provide examples to consumers to save costs, attract consumer interest, and display objects that appear natural. Based on the tests that have been done, it is concluded that implementing Augmented Reality in the canopy sales promotion media using the Luther development method with the stages of analysis, design, implementation, testing, and maintenance. Implementation of Augmented Reality in canopy sales promotion media uses concept data from the types of canopies included in the Augmented Reality-based application, namely stainless and hollow types made using a 3D blender program. A marker as a sign to bring up 3D objects in the application. Markers are created using Photoshop and entered the database so that they can be stored online. System testing uses the BlackBox testing method where the program's functionality is running as desired.
The Implementation of RPG Concept on Breakout Games Using LibGDX Framework Andres Nodas; Djajasukma Tjahjadi; Ali Rahman
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.517

Abstract

As technology becomes more global, RPG games runs into a good development. One of which is a combination of RPG with another games. This journal aims to combine the breakout games and the RPG which has its characteristics. This game development uses prototyping method, in which analysing the necessity and determining the goals of the software. Then, prototype will be created and evaluated regularly so that the result can use 2D graphics. This game also can be used as a reference to reflexes practising. A modeling is conducted to design ‘use case,’ scenario process, activity diagram, class diagram, and sequence diagram as well as to conduct an interface design. A calibration that is used, is calibrating the programme which is created as well as the features in the programme itself. It can be concluded that the construction of RPG games combination and breakout using eclipse and libgdx works well. In addition, it uses the components such as TMX tile map, sprite, sprite batching, box2d and input handling.
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method Yuliani Indrianingsih; Hero Wintolo; Eviana Yulianti Saputri
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.703

Abstract

Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
Kansei Engineering in Designing Web-Based e-Commerce UMKM Product Indra Griha Tofik Isa; Indri Ariyanti
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.786

Abstract

Human-Computer Interaction (HCI) is a part of the development of a system in addition to the usability factor. Several methods were developed in HCI to produce a User Interface design that persuasively attracts the user’s interest. One of these methods was Kansei Engineering which involved psychological factors and user emotions in the stage. The study focused on developing the e-commerce User Interface for UMKM products which based on how to maximize the service and quality of e-Commerce because so far the development of the web-based UMKM  e-Commerce product user interface has not paid attention to psychological factors. The Research followed Kansei Engineering Type 1 (KEPack) with the stages: (1) Research Initiation, (2) Collecting Kansei Words (KW), (3) Translating KW into SD scale, (4) Collecting Specimens, (5) Classifying Item / Category Specimens, (6) Evaluating Questionnaire Participants’ Data, (7) Multivariate Statistical Analysis, (8) Translating Statistical Data into Design Elements, (9) Creating Guideline Matrix Kansei Engineering. This study involved 40 participants, 20 Kansei Words, and ten specimens of UMKM e-Commerce products. The final result is the Kansei e-Commerce matrix guideline for web-based UMKM products, which had two main concepts, they were complexity consisting of formal, natural and simple emotion factors; and Uniqueness consisting of Comfortable, Soft, and Unique which consists of 8 main parts which divided into 65 design elements. The contribution of this Research in the informatics area is to provide recommendations for the appearance of  web-based UMKM  e-Commerce products based on the psychological factors of the user through the Kansei Engineering Stages.
Determinant Factors in the Implementation of Information Technology Strategic Management to Academicians' Performance in Higher Education Institution Cepy Slamet; Aedah binti Abdul Rahman; Muhammad Ali Ramdhani
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.829

Abstract

This study aimed to understand the determinant factors of information technology (IT) strategic management to individual (lecturer) performance using data samples from selected higher education institutions in Indonesia. Since the use of IT innovation in (HEI) is often considered a lens representing the strength of strategy, competitiveness, and quality within a corporate view, it is vague on its impact on individual performance. The investigation included data collection based on an online survey conducted on 325 respondents to investigate the relationship between strategic factors, elaborated into several relevant criteria. The results of statistical data processing showed that of all the strategic factors involved, the business model and strategic alignment categorized in high determinations in influencing academicians' performance at HEI.
Prediction Model for Soybean Land Suitability Using C5.0 Algorithm Andi Nurkholis; Styawati Styawati
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.711

Abstract

Soybean is one of the protein main sources that can be used for consumption in tempeh, tofu, milk, etc. Based on projection results, soybean production and consumption balance in Indonesia, in 2018-2022, it is estimated that deficit will increase by 6.18% per year. So, it's necessary to guide soybean land suitability, which can be carried out by evaluating existing land suitability to support soybean farming expansion and production. This study conducted an analytical study to evaluate soybean land suitability using C5.0 algorithm based on land and weather characteristics. The C5.0 algorithm is an extension of spatial decision tree, an ID3 decision tree extension. Dataset is divided into two categories: explanatory factors representing seven land characteristics (drainage, land slope, base saturation, cation exchange capacity, soil texture, soil pH, and soil mineral depth) and two weather data (rainfall and temperature), and a target class represent soybean land suitability in two study areas, namely Bogor and Grobogan Regency. The result generated two land suitability models with the best model obtained accuracy for training data 98.58%, while testing data was 97.17%. The best model rules are 69 rules that do not involve three attributes: cation exchange capacity, soil mineral depth, and rainfall.