cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 490 Documents
Evaluation of Information Technology Governance Using COBIT 5 and ISO/IEC 38500 Tubagus Toifur; Kusrini Kusrini; Agung Budi
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.814

Abstract

Infrastructure Section, Information and Communication Technology Development Division, South Tangerang City Communication and Information Office, one of the main tasks and functions is to provide services and management of internet network infrastructure for all Regional Apparatus Organizations (OPD) in South Tangerang City. The implementation of the Infrastructure Section is constrained by the problem of employee competence that has not reached the standard in internet network management and service, from these problems the researcher intends to evaluate governance using the COBIT 5 framework and ISO/IEC 38500 with recommendations for improvement in the Infrastructure Section. This study uses PAM (Process Assessment Model) with the Guttman scale to determine the results and level of capability. The use of COBIT 5 in this research will focus on the domain of EDM (Evaluate Direct Monitor) point 04, Ensure Resource Management and MEA (Monitor, Evaluate and Assessment) point 01, Performance and Conformance. The results and the level of capability obtained during the research were level 2 Managed Process with a value of 2.46 with a gap of 0.54. The level expected by the Infrastructure Section is at level 3 Established Process with a value of 3.00. Recommendations for achieving Level 3 are used ISO/IEC 38500.
Sentiment Analysis from Indonesian Twitter Data Using Support Vector Machine And Query Expansion Ranking Hasbi Atsqalani; Nur Hayatin; Christian Sri Kusuma Aditya
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.669

Abstract

Sentiment analysis is a computational study of a sentiment opinion and an overflow of feelings expressed in textual form. Twitter has become a popular social network among Indonesians. As a public figure running for president of Indonesia, public opinion is very important to see and consider the popularity of a presidential candidate. Media has become one of the important tools used to increase electability. However, it is not easy to analyze sentiments from tweets on Twitter apps, because it contains unstructured text, especially Indonesian text. The purpose of this research is to classify Indonesian twitter data into positive and negative sentiments polarity using Support Vector Machine and Query Expansion Ranking so that the information contained therein can be extracted and from the observed data can provide useful information for those in need. Several stages in the research include Crawling Data, Data Preprocessing, Term Frequency – Inverse Document Frequency (TF-IDF), Feature Selection Query Expansion Ranking, and data classification using the Support Vector Machine (SVM) method. To find out the performance of this classification process, it will be entered into a configuration matrix. By using a discussion matrix, the results show that calcification using the proposed reached accuracy and F-measure score in 77% and 68% respectively.
Pattern Analysis of Drug Procurement System With FP-Growth Algorithm Zulham Zulham; Ega Evinda Putri; Buyung Solihin Hasugian
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.841

Abstract

The Medan Marelan Health Center is one of the health centers in the city of Medan. The supply of medicines is considered necessary so that these medicines can still be available at any time with various types and functions. In order not to experience difficulties in distributing medicines and anticipating the supply of medicines in the Puskesmas, research was carried out using the Data Mining method. In this study, a test will be carried out on the Association Rule which is used as a solution to problems with the pattern of the drug procurement system, and will display information about the value of support and confidence from each Data Mining process. Tests in this study using Weka Software to determine the procurement of drugs that are often needed. Information obtained from the stages of the FP-Growth Algorithm is to produce patterns in the procurement of medicines, and an itemset combination pattern has been formed using the FP-Growth Algorithm method so that the results of this study can be used in drug supply effectively and efficiently.
E-Commerce For Village Information System Using Agile Methodology Leni Fitriani; Prayoga Hakim; R. Mujahid Al Haq
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.825

Abstract

With the entry into the era of Industrial Revolution 4.0, the development of digitization of various aspects at the village level began. The level of use of mobile devices in the commercial transactions of society is now a massive number of users. It happens not only in large transactions but also in small transactions. With the community's high interest in the use of smartphone devices, this is a different opportunity to explore the potential of each village by helping the community, tiny and medium enterprises in conducting transactions, sales, and marketing online through the village government website. The village information system itself requires an e-commerce feature on its page to help small and medium enterprises in the area to sell products online through a simple page display. This research aims to design and develop new features of the village system that plays a role in the field of e-commerce with the Direct Message transaction method. The system development methodology used is Agile with Scrum as a framework. The Agile Model is a short-term development model that requires rapid adaptation and development to changes in any form. This e-commerce feature is for local communities, especially Micro, Small, and Medium Enterprises, so their products' marketing reach is even more outstanding while being recorded in the village system.
Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication Zamah Sari; Didih Rizki Chandranegara; Rahayu Nurul Khasanah; Hardianto Wibowo; Wildan Suharso
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.839

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a non-attacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
Poincaré Plot Method for Physiological Analysis of the Gadget Use Effect on Children Stress Level Umar Zaky; Afwan Anggara; Muhammad Zakariyah; Ilham Fathullah
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.809

Abstract

Stress in children can affect the way they think, act, and feel. The habit of using gadgets has several advantages and disadvantages, but there has been no in-depth study of the effect of using gadgets on stress levels in children. This study aims to determine the representation of the physiological condition of using gadgets on stress levels in children. A total of 18 electrocardiogram data were extracted with poincaré plot features. This research has found that there is no difference in the level of stress in children between before and after using gadgets in terms of autonomic nervous activity (Sig. > 0.05). However, there is an increase in sympathetic activity that occurs in children even though they have finished using gadgets. Such conditions certainly need to get more attention, especially related to the duration of gadget use and accessible content.
Implementation of Apriori Algorithm for Music Genre Recommendation Michael Henry; Wiryanata Chandra; Amalia Zahra
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.819

Abstract

Music interest is diverse yet enticing to be a part of knowledge discovery. It influences how people feel, study, work, etc. A lot of things are to be considered in producing brand new music with its correlation to its genre. We have already collected the dataset that we can utilize in this research, which is the history of every song listened to by several users in a total of 20.000 records from a million song dataset. This study implements the Apriori algorithm which can handle a large amount of data while simplifying the data to create a recommendation system where the result is a pattern from the music genre according to the interests of each user with the help of the RapidMiner tool. The purpose of this research is that the pattern which has been found can become a reference for music producers in terms of making or distributing their brand-new music. The result of the best combination of genres states that listeners of the rock genre will also hear the pop genre with a combination frequency of 50, support value of 21.2%, and confidence value of 51%.
Data Visualization of COVID-19 Vaccination Progress and Prediction Using Linear Regression Hilal H Nuha; Ahmad Abo Absa
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.736

Abstract

This paper provides a data visualization and analysis of the COVID-19 vaccination program. Important information such as which countries have the highest vaccination rates and numbers. In addition to the types of vaccines used and used by countries in the world, an infographic on the geographic distribution of vaccine use is also shown. To model the obtained data, daily vaccination rates were modeled by linear regression in which five sample countries with different vaccination ranges were processed using data science approach, namely, linear regression. The modeling results show a gradient coefficient that represents an increase in vaccine rates. The prediction results showed that the highest rate of increase in daily vaccination was 1,826,126 additional vaccines per day.
Systematic Literature Review Of Particle Swarm Optimization Implementation For Time-Dependent Vehicle Routing Problem M. Diah; Arief Setyanto; Emha Taufiq Luthfi
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.804

Abstract

Time-dependent VRP (TDVRP) is one of the three VRP variants that have not been widely explored in research in the field of operational research, while Particle Swarm Optimization (PSO) is an optimization algorithm in the field of operational research that uses many variables in its application. There is much research conducted about TDVRP, but few of them discuss PSO's implementation. This article presented as a literature review which aimed to find a research gap about implementation of PSO to resolve TDVRP cases. The research was conducted in five stages. The first stage, a review protocol defined in the form of research questions and methods to perform the review. The second stage is references searching. The third stage is screening the search result. The fourth stage is extracting data from references based on research questions. The fifth stage is reporting the study literature results. The results obtained from the screening process were 37 eligible reference articles, from 172 search results articles. The results of extraction and analysis of 37 reference articles show that research on TDVRP discusses the duration of travel time between 2 locations. The route optimization parameter is determined from the cost of the trip, including the total distance traveled, the total travel time, the number of routes, and the number used vehicles. The datasets that are used in research consist of 2 types, real-world datasets and simulation datasets. Solomon Benchmark is a simulation dataset that is widely used in the case of TDVRP. Research on PSO in the TDVRP case is dominated by the discussion of modifications to determine random values of PSO variables.
Automatic Detection of Hijaiyah Letters Pronunciation using Convolutional Neural Network Algorithm Yana Aditia Gerhana; Aaz Muhammad Hafidz Azis; Diena Rauda Ramdania; Wildan Budiawan Dzulfikar; Aldy Rialdy Atmadja; Deden Suparman; Ayu Puji Rahayu
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.882

Abstract

Abstract— Speech recognition technology is used in learning to read letters in the Qur'an. This study aims to implement the CNN algorithm in recognizing the results of introducing the pronunciation of the hijaiyah letters. The pronunciation sound is extracted using the Mel-frequency cepstral coefficients (MFCC) model and then classified using a deep learning model with the CNN algorithm. This system was developed using the CRISP-DM model. Based on the results of testing 616 voice data of 28 hijaiyah letters, the best value was obtained for accuracy of 62.45%, precision of 75%, recall of 50% and f1-score of 58%.