首页 > 最新文献

JOIN Jurnal Online Informatika最新文献

英文 中文
Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android 基于Android的Arduino Nano E-KTP在家庭安全中的应用
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.238
Riyanto Mustolih, U. T. Lenggana, Jajang Mulyana
Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.
安全对于每个房主来说都是绝对必要的,这样他才能在房子留给房主旅行时创造一种安全和平静的感觉。安全措施不佳使这所房子成为盗窃的目标。目前使用的家庭安防仍然采用传统的方法。政府发放给每个公民的电子身份证(E-KTP, Electronic Identity Card)有一项技术,里面有一个RFID芯片,可以代替传统的门锁。为了让e-KTP能够进入家门,需要制作一个可以在安卓智能手机上使用的应用程序。该应用程序使业主在E-KTP注册过程中可以很容易地打开大门。此外,如果窃贼进入房屋,该应用程序可以通过SMS(短消息服务)和通过使用Arduino纳米微控制器控制的SIM800L模块呼叫/呼叫向房主发送通知。
{"title":"Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android","authors":"Riyanto Mustolih, U. T. Lenggana, Jajang Mulyana","doi":"10.15575/JOIN.V4I1.238","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.238","url":null,"abstract":"Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88385100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of Spam Email Detection Performance Assessment Using Machine Learning 基于机器学习的垃圾邮件检测性能评估分析
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.298
B. Santoso
Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.
垃圾邮件是非常恼人的电子邮件帐户用户获取相关信息。垃圾邮件的检测实际上已经通过各种方法应用于为公众提供的电子邮件服务。但是对于有限数量的公司电子邮件帐户的使用,并不是所有的电子邮件服务器都提供垃圾邮件检测功能。服务器管理员必须添加一个单独的或模块化的垃圾邮件检测功能,以便保护电子邮件帐户免受垃圾邮件的侵害。本研究旨在获得垃圾邮件检测过程中的最佳方法。应用逻辑回归、决策树和随机森林等机器学习方法,并对结果进行比较,得到最有效的垃圾邮件检测方法。效率的衡量标准包括培训和测试过程的速度,以及检测垃圾邮件的准确性。本研究结果表明,随机森林方法性能最好,测试数据速度为0.19秒,准确率为98%。该结果可为其他垃圾邮件检测方法的开发提供参考。
{"title":"An Analysis of Spam Email Detection Performance Assessment Using Machine Learning","authors":"B. Santoso","doi":"10.15575/JOIN.V4I1.298","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.298","url":null,"abstract":"Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72438888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm 基于Rivest-Shamir-Adleman算法的短消息服务编码
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.264
D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari
SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.
SMS(短消息服务)是手机的数据交换功能之一,包括Android智能手机,这是当今使用最广泛的智能手机平台。然而,短信的安全性是值得怀疑的,因为发送的短信必须首先经过第三方,即SMSC (Short message Service Center),因此短信可能被窃听或滥用。降低这种风险的方法之一是通过应用加密算法对原始消息进行加密或保密。本研究的目的是开发一种为android智能手机用户加密和解密短信的系统。该应用程序是在Android平台上使用Java编程语言对短信进行加密和解密,并应用于集成了Android Studio的智能手机上,使用了RSA加密算法。该应用程序可用于在基于android的智能手机上使用RSA算法加密和解密SMS。此应用程序可以发送长度为86个字符的短信,并使用QR码交换公钥。
{"title":"Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm","authors":"D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari","doi":"10.15575/JOIN.V4I1.264","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.264","url":null,"abstract":"SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85905769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation Jpeg/exif消息摘要编译中SHA512哈希函数和Boyer-Moore字符串匹配算法的实现
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.304
Rachmad Fitriyanto, A. Yudhana, S. Sunardi
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
JPEG/exif文档的安全信息方法一般是通过使用密码和水印对文档进行保护来防止安全攻击。在信息安全周期的检测阶段,这两种方法都不能用于确定数据完整性的状况。消息摘要是文件的本质,它具有代表数据完整性的数字指纹的功能。本研究旨在编制数位指纹,以侦测资讯安全中JPEG / exif文件所发生的变化。研究阶段分为五个阶段。第一阶段,使用Boyer-Moore字符串匹配算法对JPEG/exif文档结构进行识别,找到JPEG/exif段的位置。第二阶段是片段内容获取,根据获得的片段位置和长度进行。第三步,使用SHA512哈希函数计算每个段的消息摘要。第四阶段,进行JPEG / exif文档修改实验,识别受影响的片段。第五阶段是选择段的哈希值并将其组合到消息摘要中。得到的结果显示了由三个散列值组成的JPEG/exif文档的消息摘要。用于检测JPEG到png转换和图像编辑的修改的SOI段哈希值。用于检测元数据编辑的APP1哈希值。SOF0哈希值用于检测图像重新着色、裁剪和调整大小的修改——这是三个哈希值的组合,作为JPEG/exif的消息摘要。
{"title":"Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation","authors":"Rachmad Fitriyanto, A. Yudhana, S. Sunardi","doi":"10.15575/JOIN.V4I1.304","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.304","url":null,"abstract":"Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87337624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of Readiness and Usability of Information Systems Use 信息系统使用的就绪性和可用性评估
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.256
D. Yuniarto, A'ang. Subiyakto, Aedah Binti Abd. Rohman, Reny Rian Marliana
The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.
许多研究人员对信息系统的使用情况进行了评估。这项研究是在印度尼西亚的私立大学进行的,目前涉及许多信息系统,特别是与高等教育管理相关的信息系统,通过测量信息系统使用的准备情况和可用性,我从两个模型的集成中构建了模型。本研究的测量结果是从问卷的分发中获得的,有47%的受访者填写了61-80%的信息系统使用水平,68%的受访者表示他们准备使用信息系统。该阶段包括评估反射测量模型和结构模型评估。利用复合信度、信度指标、收敛效度和判别效度对内部一致性信度评价中的反思性测量进行评估,最终得出准备性和可用性集成模型的使用可以进入更复杂的研究阶段,可以使用问卷。
{"title":"Assessment of Readiness and Usability of Information Systems Use","authors":"D. Yuniarto, A'ang. Subiyakto, Aedah Binti Abd. Rohman, Reny Rian Marliana","doi":"10.15575/JOIN.V4I1.256","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.256","url":null,"abstract":"The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76131933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Nearest Mosque Using Haversine Formula on Android Platform 在Android平台上使用Haversine公式查找最近的清真寺
Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.267
Indah Setyorini, Desi Ramayanti
Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.
祈祷是伊斯兰教的第二支柱,它被强调在两句话之后。有人说,它和崇拜一样完美,一样美好。祈祷是穆斯林的义务之一,必须为穆基民和穆萨菲尔做。在清真寺祈祷的美德与在其他地方祈祷的20度报酬的价值是一样的。由于交通拥挤,交通堵塞现象日益严重。对于那些在马格里布节之前的下午回家的人来说,由于缺乏最近清真寺的信息,一些人总是对做马格里布祈祷感到困惑。求解最短路径的问题是用最短的路径找到从起点到终点的最小路径的问题。本研究的目的是设计一个应用程序,该应用程序可以提供到Tangerang市Larangan地区最近的清真寺的方向。在本系统的制作中,最短路径的求解可以使用haversine公式,并使用java编程语言,其中使用java构建应用程序,而使用的数据库是MySQL数据库,并使用Google Maps API来确定路线。
{"title":"Finding Nearest Mosque Using Haversine Formula on Android Platform","authors":"Indah Setyorini, Desi Ramayanti","doi":"10.15575/JOIN.V4I1.267","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.267","url":null,"abstract":"Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detect Malware in Portable Document Format Files (PDF) Using Support Vector Machine and Random Decision Forest 使用支持向量机和随机决策森林检测便携式文档格式文件(PDF)中的恶意软件
Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.196
Abdachul Charim, Setio Basuki, Denar Regata Akbi
Portable Document Format is a very powerful type of file to spread malware because it is needed by many people, this makes PDF malware not to be taken lightly. PDF files that have been embedded with malware can be Javascript, URL access, media that has been infected with malware, etc. With a variety of preventive measures can help to spread, for example in this study using the classification method between dangerous files or not. Two classification methods that have the highest accuracy value based on previous research are Support Vector Machine and Random Forest. There are 500 datasets consisting of 2 classes, namely malicious and not malicius and 21 malicius PDF features as material for the classification process. Based on the calculation of Confusion Matrix as a comparison of the results of the classification of the two methods, the results show that the Random Forest method has better results than Support Vector Machine even though its value is still not perfect.
可移植文档格式是一种非常强大的文件类型来传播恶意软件,因为它是许多人需要的,这使得PDF恶意软件不能掉以轻心。嵌入了恶意软件的PDF文件可以是Javascript、URL访问、感染了恶意软件的媒体等。具有多种预防措施有助于传播,例如在本研究中采用危险文件之间的分类方法。在以往的研究中,准确率最高的两种分类方法是支持向量机和随机森林。有500个数据集组成2类,即恶意和非恶意和21个恶意PDF特征作为分类过程的材料。通过计算混淆矩阵对两种方法的分类结果进行比较,结果表明随机森林方法的分类结果优于支持向量机方法,尽管其值仍然不完美。
{"title":"Detect Malware in Portable Document Format Files (PDF) Using Support Vector Machine and Random Decision Forest","authors":"Abdachul Charim, Setio Basuki, Denar Regata Akbi","doi":"10.15575/JOIN.V3I2.196","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.196","url":null,"abstract":"Portable Document Format is a very powerful type of file to spread malware because it is needed by many people, this makes PDF malware not to be taken lightly. PDF files that have been embedded with malware can be Javascript, URL access, media that has been infected with malware, etc. With a variety of preventive measures can help to spread, for example in this study using the classification method between dangerous files or not. Two classification methods that have the highest accuracy value based on previous research are Support Vector Machine and Random Forest. There are 500 datasets consisting of 2 classes, namely malicious and not malicius and 21 malicius PDF features as material for the classification process. Based on the calculation of Confusion Matrix as a comparison of the results of the classification of the two methods, the results show that the Random Forest method has better results than Support Vector Machine even though its value is still not perfect.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85838786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Logging Implementation on Web-Based Communication on Arduino Devices 基于Arduino设备的基于web通信的数据记录实现
Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.252
Yasyfi Rahmanda Tsani, Alif Subardono
Arduino is one of the microcontroller devices commonly used on the Internet of Things. This research designed and objectified web-based data logging system that aimed to record communication and sensir data in iot devices, so it could monitor log data in iot. Devices from this data logging system was created using arduino uno r3 with adding ethernet shield modul and temperature sensor DHT 11. in iot devices, there is an important parameter, that is date time as a history in data logging sistem using an actual time. Website was functioned as system for showing data from log data and could be monitored realtime. This system could record communication brtween arduino device and NTP server using internet network. Beside that?this system could record important parameters in the system such as IP source address, ip destination address, ip address in each node, device time, and room temperature information. Parameters that had been recorded would be stored to database, then would be showed in web data logging.
Arduino是物联网中常用的微控制器设备之一。本研究设计并实现了基于web的数据记录系统,旨在记录物联网设备中的通信和传感数据,实现物联网中日志数据的监控。这个数据记录系统的设备是使用arduino uno r3创建的,并添加了以太网屏蔽模块和温度传感器DHT 11。在物联网设备中,有一个重要的参数,即数据记录系统中使用实际时间作为历史记录的日期时间。网站的功能是从日志数据中显示数据的系统,可以实时监控。该系统可以通过internet网络记录arduino设备与NTP服务器之间的通信。旁边吗?该系统可以记录系统中的重要参数,如IP源地址、IP目的地址、各节点IP地址、设备时间、室温等信息。将记录的参数存储到数据库中,然后在web数据记录中显示。
{"title":"Data Logging Implementation on Web-Based Communication on Arduino Devices","authors":"Yasyfi Rahmanda Tsani, Alif Subardono","doi":"10.15575/JOIN.V3I2.252","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.252","url":null,"abstract":"Arduino is one of the microcontroller devices commonly used on the Internet of Things. This research designed and objectified web-based data logging system that aimed to record communication and sensir data in iot devices, so it could monitor log data in iot. Devices from this data logging system was created using arduino uno r3 with adding ethernet shield modul and temperature sensor DHT 11. in iot devices, there is an important parameter, that is date time as a history in data logging sistem using an actual time. Website was functioned as system for showing data from log data and could be monitored realtime. This system could record communication brtween arduino device and NTP server using internet network. Beside that?this system could record important parameters in the system such as IP source address, ip destination address, ip address in each node, device time, and room temperature information. Parameters that had been recorded would be stored to database, then would be showed in web data logging.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78773714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Support System for Determining Thesis Supervisor using A Weighted Product (WP) Method 基于加权积法的论文导师决策支持系统
Pub Date : 2019-02-01 DOI: 10.15575/join.v3i2.230
Suci Ramadhani Arifin, Josua Crishan Mintamanis
English Department of Tadulako University is a department with the highest number of lecturers in Tadulako University. Thesis supervisor determination at the English Department of Tadulako University still use the conventional way so that the determination of the thesis supervisor is done in a long time. In addition, some lecturers have more workload than other lecturers. Decision support system for the determination of the thesis supervisor in the English Department of Tadulako University was built to overcome this problem using the Weighted Product method. The system is a desktop-based application using the Visual Studio programming language and MySQL DBMS for database processing. The application of a decision support system for determining thesis supervisors can help make the selection of supervisors accurately and quickly with a mathematical calculation system.
塔都拉科大学英语系是塔都拉科大学拥有最多讲师的部门。田都子大学英语系的论文导师的确定一直沿用传统的方式,导致论文导师的确定在很长一段时间内都没有完成。此外,一些讲师的工作量比其他讲师要大。针对这一问题,采用加权积法建立了田都子大学英语系论文导师确定决策支持系统。本系统是一个基于桌面的应用程序,使用Visual Studio编程语言和MySQL DBMS进行数据库处理。论文导师选择决策支持系统的应用,可以借助数学计算系统准确、快速地选择导师。
{"title":"Decision Support System for Determining Thesis Supervisor using A Weighted Product (WP) Method","authors":"Suci Ramadhani Arifin, Josua Crishan Mintamanis","doi":"10.15575/join.v3i2.230","DOIUrl":"https://doi.org/10.15575/join.v3i2.230","url":null,"abstract":"English Department of Tadulako University is a department with the highest number of lecturers in Tadulako University. Thesis supervisor determination at the English Department of Tadulako University still use the conventional way so that the determination of the thesis supervisor is done in a long time. In addition, some lecturers have more workload than other lecturers. Decision support system for the determination of the thesis supervisor in the English Department of Tadulako University was built to overcome this problem using the Weighted Product method. The system is a desktop-based application using the Visual Studio programming language and MySQL DBMS for database processing. The application of a decision support system for determining thesis supervisors can help make the selection of supervisors accurately and quickly with a mathematical calculation system.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Backpropagation Algorithm in Predicting the Most Number of Internet Users in the World 反向传播算法在预测世界最大互联网用户数中的应用分析
Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.205
S. Setti, A. Wanto
The Internet today has become a primary need for its users. According to market research company e-Marketer, there are 25 countries with the largest internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users are expected to help improve the economy and also education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict for the coming years so that the government can provide adequate facilities and pre-facilities in order to balance the growth of internet users and as a precautionary step when there is a decrease in the number of internet users. The data used in this study focus on data on the number of internet users in 25 countries in 2013-2017. The algorithm used is Artificial Neural Network Backpropagation. Data analysis was processed by Artificial Neural Network using Matlab R2011b (7.13). This study uses 5 architectural models. The best network architecture generated is 3-50-1 with an accuracy of 92% and the Mean Squared Error (MSE) is 0.00151674.
今天,互联网已成为其用户的主要需求。根据市场研究公司e-Marketer的数据,世界上有25个国家拥有最多的互联网用户。印度尼西亚排名第六,共有1.126亿网民。随着互联网用户数量的增加,预计将有助于改善一个国家的经济和教育。为了能够增加互联网用户的数量,特别是在印度尼西亚,有必要预测未来几年的情况,以便政府能够提供足够的设施和预设施,以平衡互联网用户的增长,并在互联网用户数量减少时采取预防措施。本研究中使用的数据集中在2013-2017年25个国家的互联网用户数量数据。使用的算法是人工神经网络反向传播。数据分析使用Matlab R2011b(7.13)进行人工神经网络处理。本研究使用了5种建筑模型。生成的最佳网络架构为3-50-1,准确率为92%,均方误差(MSE)为0.00151674。
{"title":"Analysis of Backpropagation Algorithm in Predicting the Most Number of Internet Users in the World","authors":"S. Setti, A. Wanto","doi":"10.15575/JOIN.V3I2.205","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.205","url":null,"abstract":"The Internet today has become a primary need for its users. According to market research company e-Marketer, there are 25 countries with the largest internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users are expected to help improve the economy and also education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict for the coming years so that the government can provide adequate facilities and pre-facilities in order to balance the growth of internet users and as a precautionary step when there is a decrease in the number of internet users. The data used in this study focus on data on the number of internet users in 25 countries in 2013-2017. The algorithm used is Artificial Neural Network Backpropagation. Data analysis was processed by Artificial Neural Network using Matlab R2011b (7.13). This study uses 5 architectural models. The best network architecture generated is 3-50-1 with an accuracy of 92% and the Mean Squared Error (MSE) is 0.00151674.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88417742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
JOIN Jurnal Online Informatika
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1