(JELIKU) Jurnal Elektronik Ilmu Komputer Udayana
Aim and Scope: JELIKU publishes original papers in the field of computer science, but not limited to, the following scope: Computer Science, Computer Engineering, and Informatics Computer Architecture Parallel and Distributed Computer Computer Network Embedded System Human—Computer Interaction Virtual/Augmented Reality Computer Security Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods) Programming (Programming Methodology and Paradigm) Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data) Network Traffic Modeling Performance Modeling Computer Security IT Governance Networking Technology Robotic Instrumentation Information Search Engine Multimedia Security Information Retrieval Mobile Processing Natural Language Processing Artificial intelligence & soft computing and their applications Neural networks Machine Learning Reasoning and evolution Intelligence applications Computer vision and speech understanding Multimedia and cognitive informatics Data mining and machine learning tools, heuristic and AI planning strategies and tools, computational theories of learning
Articles
488 Documents
Klasifikasi Serangan Distributed Denial of Service (DDoS) Menggunakan Random Forest Dengan CFS
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p01
Distributed Denial of Service (DDoS) attacks can have serious impacts on your organization and can cause enormous losses. This attack works by sending a computer or server an amount of requests that exceeds the capabilities of that computer. When classifying DDoS attacks in this study, feature selection is performed using correlation-based feature selection (CFS). The dataset used by the author in this study is CSE-CIC-IDS 2018. Feature selection on a dataset using CFS gets the results in the form of features related to the dataset. That is, a total of 31 features with a relationship score greater than 0.1. The average precision generated by the system using the random forest method and CFS function selection is 99.784%. Accuracy is the result of using the number of trees parameter with a value of 10. For a random forest model with no feature selection, the highest accuracy is 49.501%. This indicates that changing the random forest model parameters and selecting the CFS feature will affect high accuracy.
Pengamanan Audio Rindik Bali Menggunakan Metode Least Significant Bit Berbasis Android
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p17
The development of an increasingly fast era makes the pace of technology is also growing which is directly proportional to the level of crime that is growing as well. Dissemination of personal or group information becomes vulnerable to attacks from other parties, so the security of data or confidential information needs to be improved. Bali has many different musical instruments in each region, both in terms of the name and the instrument itself. One of them is Rindik. Rindik is one of the percussion instruments that’s still in demand because of its distinctive sound (Aristana et al., 2015). Because of Balinese Rindik is still interesting for most peoples, making its need to be secured to avoid digital crime so that the owner of the audio feels safe. One of the many security that can avoid an action crime on Balinese Rindik musical instruments is by inserting text containing personal data from the audio owner in the format (.txt) into Balinese Rindik audio in the format (.wav) using the Least Significant Bit (LSB) steganography method.
Seleksi Atribut Pada Diagnosis Penyakit Liver Menggunakan Decision Tree Dengan Algoritma Genetika
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p12
Liver disease is caused by inflammation of the liver. WHO shows nearly 1.2 million people in Southeast Asia and Africa per year die from this disease. Therefore, a diagnosis is needed as soon as possible to get further treatment. To make a diagnosis, a classification algorithm is needed which in this study uses the C4.5 algorithm. However, the algorithm is not optimal for forming a decision tree because it requires loading all cases into memory. Therefore, it is necessary to optimize using genetic algorithms to form simpler rules by selecting attributes and trying various possible combinations of attributes until the most optimal combination is obtained. In the evaluation results, the rules generated by optimization are simpler, namely as many as 32 rules when compared to without optimization, which are more complex, which are 145 rules. Then in the evaluation of accuracy, the rules with optimization resulted in a better accuracy of 70,7% when compared to the accuracy of the rules without optimization of 68,9%
Cover & Table of Contents JELIKU Vol. 11 No. 1
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 1 (2022): JELIKU Volume 11 No 1, August 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Implementasi Algoritma Naive Bayes Classifier (NBC) Dan Information Gain Untuk Mendeteksi DDoS
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p06
In this study, feature selection was also carried out using the information gain method, the result of feature selection improve the performance of DDoS attack detection against the Naive Bayes Classifier classification algorithm. The results obtained in this study are system testing on the results of the comparison of data performance that has been selected using 17 features and without the application of information gain feature selection using 43 features of course different, there are superior results from the application of Information Gain feature selection with an average accuracy value of 75.81 %, while the results obtained without the application of feature selection are 75.57%. The average precision level system performance using 17 features is 91.61%, while average precision result using 43 features is 92.20%. For the average recall value using 17 features, it is 57.63%, and results recall uses 43 features by 57.31%. In terms of execution time, the time required to execute the program using 17 features is faster and more effective, namely 89.17 seconds, while the program execution time using 43 features is longer, namely 205.34 seconds.
Video Steganography Encryption on Cloud Storage for Securing Digital Image
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 1 (2022): JELIKU Volume 11 No 1, August 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i01.p05
Cloud storage is a data storage service in cloud computing that allows stored data to be shared and accessed via the internet. Cloud storage is usually used to store personal data such as files, photos, or videos with so that these data can be accessed anywhere via the internet without the need to use physical storage media. However, cases of data leaks in cloud storage still occur which causes personal data stored in cloud storage to be accessed by other people who do not have access. The Client-Side Steganography Encryption on Cloud Storage Application was developed using the Modified Least Significant Bit (LSB) method and the Standard Advanced Encryption (AES) algorithm. This desktop-based application was developed to protect personal data of digital images embedded in a video so that unauthorized parties cannot view the data. This application is expected to be a data security solution on cloud storage to prevent theft of personal data by non-existent parties. From the test results, the developed application can receive input, process input, and produce the desired output. The image from the extraction process from video also does not change at all in terms of visual or visible. The results obtained from this test is the PSNR value with an average of 36,395 dB. A good PSNR value is above 30 dB and indicates that the quality of the extracted image is good and also indicates that the developed application can protect data of digital images into video.
Identifikasi Topeng Bali Dengan Metode KNN (K Nearest Neighbor)
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p19
Mask art is art with the form of a face covering that has various forms such as humans and animals and is an important element in dance and mask drama. Unfortunately, many tourists and also the public cannot know the name of the Balinese mask they see. To overcome this problem, a system was built to help people who want to know information about Balinese masks but do not know the names or types of Balinese masks. In developing a system that able to identify Balinese masks, KNN classification method is implemented as a method that helps identify Balinese masks. The image entered by the user is processed until a classification result is obtained which is then sent back to the system so that it can be displayed to the user. The results of the system evaluation show the percentage accuracy of the KNN algorithm is 85% with value of k = 3.
Pengembangan Aplikasi Rekomendasi Pet Shop Berbasis Android Menggunakan Arsitektur MVVM (Model-View-Viewmodel)
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 2 (2022): JELIKU Volume 11 No 2, November 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i02.p15
At this time, keeping pets such as cats has become a lifestyle for pet lovers, sometimes many consider these pets as their own family. Therefore, pet owners always provide the best care for their beloved animals. Sometimes people are confused about which place is the best for their pet, which one is cheaper, which one is suitable for the type of pet, the benefits, and the location is not too far away. This system uses one of the methods in the Decision Support System. By using the Analytical Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) methods in a Decision Support System, it is hoped that it can help solve problems in semi-structured areas such as the problems above. This study aims to assist users in determining which pet shop they want to visit.
Implementasi Double Frequency Modulation dan FFT dalam Sintesis Suara Rindik
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 1 (2022): JELIKU Volume 11 No 1, August 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i01.p10
The modern era has changed a lot of people's lives, for example traditional culture is slowly being abandoned which is being replaced by the ease of technology which is growing to affect people's lifestyles. One of them is gamelan culture in the Bali area, namely gamelan rindik. In the past, the rindik gamelan was usually used as an entertainment musical instrument played by village farmers, then for the joged roof performance and later adapted as a welcome musical instrument in hotels. However, along with the development of technology, making this gamelan less desirable because people, especially the younger generation, are more interested in modern musical instruments which are more attractive than traditional gamelan such as the rindik. Because of this, the author is interested in making a digital form of gamelan rindik by synthesizing the sound of gamelan rindik and then presenting it through a media website that can be accessed on any platform. This can be an introduction to the younger generation about gamelan rindik with a more attractive visual. Synthesizing requires a sound processing technique with a certain method commonly used, namely Double Frequency Modulation. However, before doing the synthesis, another method is needed to obtain the features that will be used during the synthesis, one of which is the frequency feature of the sound produced by the rindik gamelan. To get the frequency using the Fast Fourier Transform method. The research was conducted by analyzing 11 blades on the rindik and then the synthesis process was carried out. From the test results, it was found that the method used was successful in synthesizing using three datasets with each accuracy for dataset 1 having an accuracy of 36%, for dataset 2 having an accuracy of 100% and dataset 3 having an accuracy of 45%. This result was obtained by recording the sound of the rindik gamelan on its 11 blades
Sistem Media Pembelajaran Matematika Dasar SMP Berbasis Semantik Web
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 11 No 1 (2022): JELIKU Volume 11 No 1, August 2022
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/JLK.2022.v11.i01.p21
Mathematics is a very important science because it is related to human life. Therefore, mastery of mathematics is absolutely necessary and mathematical concepts must be understood correctly. In Indonesia, students' ability to understand mathematics is still relatively low. From this, understanding of mathematical concepts needs to be improved again so that students clearly understand mathematical concepts. In order to improve understanding of mathematical concepts, various efforts were made. One of the efforts carried out by the author is a semantic web-based learning media system using concept maps in basic mathematical ontologies. This system will use ontology to build a system that will represent a mathematical concept as a domain of knowledge explicitly about other concepts related to previous concepts by giving meaning, properties, and relations so as to form a knowledge base. In this research, the writer uses methodological method to build the basic mathematical ontology and the system development will be done by prototyping method. The system built has 2 features, namely exploration and semantic search, with the aim that the existing knowledge in the system can be accessed systematically and according to user needs. To ensure that the system built can run as expected, system testing with black box testing has shown which features in the program run according to their functions and ontology evaluation using OntoQA on Schema Metrics carried out by measuring Relationship Richness (RR), Attribute Richness (AR), and Inheritance Richness (IR). In the evaluation of this ontology, it shows that the Relationship Richness (RR) value is 0.06; Attribute Richness (AR) value is 0.5; and the value of Inheritance Richness (IR) is 14.5.