cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 490 Documents
An Analysis of Spam Email Detection Performance Assessment Using Machine Learning Santoso, Budi
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.298

Abstract

Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.
Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation Fitriyanto, Rachmad; Yudhana, Anton; Sunardi, Sunardi
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.304

Abstract

Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
The Advantages from Cloud Computing Application Towards SMME (UMKM) Az-zahra, Tazkia Shabrina
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.307

Abstract

Small Micro Medium Enterprises (SMME) is one of the business enterprises that has a prime role in the development of economic growth in Indonesia. The SMME also not only reduces the number of jobless but also improve the community’s standard of living. Nonetheless, in this globalization era where the technology reaches its peak in every field, some SMME entrepreneurs have not taken advantage of IT-based business yet. On the other hand, the utilization of IT in the business field has many profitable benefits. This could make the SMME faced trouble and hard to survive in the tight competition with other bigger enterprises that had applied IT in the future. The main reason that SMME entrepreneur has not applied the IT system is that they lack fund. Moreover, cloud computing is a technology that can be used for every SMME entrepreneur without any costs. The advantages of this system utilization are to improve competitiveness, increase its flexibility, reduce costs, and to improve both agility and scalability. This research is based on a literature study that describes research’s aim that is to seek advantages from cloud computing implementation towards SMME in Indonesia so they can compete with international enterprises with a bigger scale. The researcher expects that SMME entrepreneurs in Indonesia can utilize Information technology particularly cloud computing, to support their business.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab Suteja, Fauzan Novaldi; Hidayat, Eka Wahyu; Widiyasono, Nur
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.314

Abstract

The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
Lossless Text Image Compression using Two Dimensional Run Length Encoding Nuha, Hilal H
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.330

Abstract

Text images are used in many types of conventional data communication where texts are not directly represented by digital character such as ASCII but represented by an image, for instance facsimile file or scanned documents. We propose a combination of Run Length Encoding (RLE) and Huffman coding for two dimensional binary image compression namely 2DRLE. Firstly, each row in an image is read sequentially. Each consecutive recurring row is kept once and the number of occurrences is stored. Secondly, the same procedure is performed column-wise to the image produced by the first stage to obtain an image without consecutive recurring row and column. The image from the last stage is then compressed using Huffman coding. The experiment shows that the 2DRLE achieves a higher compression ratio than conventional Huffman coding for image by achieving more than 8:1 of compression ratio without any distortion.
Diagnosis of Types of Diseases in Cassava Plant by Bayes Method Sidik, Agung Purnomo
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.379

Abstract

This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.
Reactive Forwarding and Proactive Forwarding Performance Comparison on SDN-Based Network Suranegara, Galura Muhammad; Ichsan, Ichwan Nul; Setyowati, Endah
JOIN (Jurnal Online Informatika) Vol 5 No 1 (2020)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v5i1.382

Abstract

Software-defined networking (SDN) technology is one key technology in telecommunications networks that are currently widely studied. In SDN-based networks, the controller holds the key to the reliability of a network because all control functions are held by the controller as one of the open-source controllers, the Open Network Operating System (ONOS) has two forwarding mechanisms, namely reactive forwarding, and proactive forwarding. This study compares performance between reactive forwarding and proactive forwarding on ONOS with VM migration as traffic. The parameter measured is the total migration time using simple network topology. From the test results, the proactive forwarding scenario can optimize the fastest potential of the topology tested by using the path that has the largest bandwidth available on the network topology. In comparison, reactive forwarding can only pass through the smallest hops of the tested topology. From the measurement results, the average migration time performance using a proactive forwarding scenario is 36.16% faster than the reactive forwarding scenario.
Security Scanner For Web Applications Case Study: Learning Management System Andrian, Rian; Fauzi, Ahmad
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.394

Abstract

In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.
Load Balancing Network by using Round Robin Algorithm: A Systematic Literature Review Hidayat, Taufik; Azzery, Yasep; Mahardiko, Rahutomo
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.446

Abstract

The use of load balance on a network will be very much needed if the network is an active network and is widely accessed by users. A reason is that it allows network imbalances to occur. Round Robin (RR) algorithm can be applied for network load balancing because it is a simple algorithm to schedule processes so that it can provide work process efficiency. Authors use the Systematic Literature Review (SLR) method in which it can be applied for criteria selection during papers search to match the title being raised. SLR is divided into five stages, namely formalization of questions, criteria selection, selection of sources, selection of search results, and quality assessment. By using SLR, it is expected that papers according to criteria and quality can be found.
A Middleware Framework between Mobility and IoT Using IEEE 802.15.4e Sensor Networks Alam, Tanweer
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.487

Abstract

In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.