Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.
{"title":"Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android","authors":"Riyanto Mustolih, U. T. Lenggana, Jajang Mulyana","doi":"10.15575/JOIN.V4I1.238","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.238","url":null,"abstract":"Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88385100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.
{"title":"An Analysis of Spam Email Detection Performance Assessment Using Machine Learning","authors":"B. Santoso","doi":"10.15575/JOIN.V4I1.298","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.298","url":null,"abstract":"Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72438888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari
SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.
SMS(短消息服务)是手机的数据交换功能之一,包括Android智能手机,这是当今使用最广泛的智能手机平台。然而,短信的安全性是值得怀疑的,因为发送的短信必须首先经过第三方,即SMSC (Short message Service Center),因此短信可能被窃听或滥用。降低这种风险的方法之一是通过应用加密算法对原始消息进行加密或保密。本研究的目的是开发一种为android智能手机用户加密和解密短信的系统。该应用程序是在Android平台上使用Java编程语言对短信进行加密和解密,并应用于集成了Android Studio的智能手机上,使用了RSA加密算法。该应用程序可用于在基于android的智能手机上使用RSA算法加密和解密SMS。此应用程序可以发送长度为86个字符的短信,并使用QR码交换公钥。
{"title":"Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm","authors":"D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari","doi":"10.15575/JOIN.V4I1.264","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.264","url":null,"abstract":"SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85905769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
{"title":"Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation","authors":"Rachmad Fitriyanto, A. Yudhana, S. Sunardi","doi":"10.15575/JOIN.V4I1.304","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.304","url":null,"abstract":"Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87337624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.
{"title":"Assessment of Readiness and Usability of Information Systems Use","authors":"D. Yuniarto, A'ang. Subiyakto, Aedah Binti Abd. Rohman, Reny Rian Marliana","doi":"10.15575/JOIN.V4I1.256","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.256","url":null,"abstract":"The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76131933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.
{"title":"Finding Nearest Mosque Using Haversine Formula on Android Platform","authors":"Indah Setyorini, Desi Ramayanti","doi":"10.15575/JOIN.V4I1.267","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.267","url":null,"abstract":"Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Portable Document Format is a very powerful type of file to spread malware because it is needed by many people, this makes PDF malware not to be taken lightly. PDF files that have been embedded with malware can be Javascript, URL access, media that has been infected with malware, etc. With a variety of preventive measures can help to spread, for example in this study using the classification method between dangerous files or not. Two classification methods that have the highest accuracy value based on previous research are Support Vector Machine and Random Forest. There are 500 datasets consisting of 2 classes, namely malicious and not malicius and 21 malicius PDF features as material for the classification process. Based on the calculation of Confusion Matrix as a comparison of the results of the classification of the two methods, the results show that the Random Forest method has better results than Support Vector Machine even though its value is still not perfect.
{"title":"Detect Malware in Portable Document Format Files (PDF) Using Support Vector Machine and Random Decision Forest","authors":"Abdachul Charim, Setio Basuki, Denar Regata Akbi","doi":"10.15575/JOIN.V3I2.196","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.196","url":null,"abstract":"Portable Document Format is a very powerful type of file to spread malware because it is needed by many people, this makes PDF malware not to be taken lightly. PDF files that have been embedded with malware can be Javascript, URL access, media that has been infected with malware, etc. With a variety of preventive measures can help to spread, for example in this study using the classification method between dangerous files or not. Two classification methods that have the highest accuracy value based on previous research are Support Vector Machine and Random Forest. There are 500 datasets consisting of 2 classes, namely malicious and not malicius and 21 malicius PDF features as material for the classification process. Based on the calculation of Confusion Matrix as a comparison of the results of the classification of the two methods, the results show that the Random Forest method has better results than Support Vector Machine even though its value is still not perfect.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85838786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arduino is one of the microcontroller devices commonly used on the Internet of Things. This research designed and objectified web-based data logging system that aimed to record communication and sensir data in iot devices, so it could monitor log data in iot. Devices from this data logging system was created using arduino uno r3 with adding ethernet shield modul and temperature sensor DHT 11. in iot devices, there is an important parameter, that is date time as a history in data logging sistem using an actual time. Website was functioned as system for showing data from log data and could be monitored realtime. This system could record communication brtween arduino device and NTP server using internet network. Beside that?this system could record important parameters in the system such as IP source address, ip destination address, ip address in each node, device time, and room temperature information. Parameters that had been recorded would be stored to database, then would be showed in web data logging.
Arduino是物联网中常用的微控制器设备之一。本研究设计并实现了基于web的数据记录系统,旨在记录物联网设备中的通信和传感数据,实现物联网中日志数据的监控。这个数据记录系统的设备是使用arduino uno r3创建的,并添加了以太网屏蔽模块和温度传感器DHT 11。在物联网设备中,有一个重要的参数,即数据记录系统中使用实际时间作为历史记录的日期时间。网站的功能是从日志数据中显示数据的系统,可以实时监控。该系统可以通过internet网络记录arduino设备与NTP服务器之间的通信。旁边吗?该系统可以记录系统中的重要参数,如IP源地址、IP目的地址、各节点IP地址、设备时间、室温等信息。将记录的参数存储到数据库中,然后在web数据记录中显示。
{"title":"Data Logging Implementation on Web-Based Communication on Arduino Devices","authors":"Yasyfi Rahmanda Tsani, Alif Subardono","doi":"10.15575/JOIN.V3I2.252","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.252","url":null,"abstract":"Arduino is one of the microcontroller devices commonly used on the Internet of Things. This research designed and objectified web-based data logging system that aimed to record communication and sensir data in iot devices, so it could monitor log data in iot. Devices from this data logging system was created using arduino uno r3 with adding ethernet shield modul and temperature sensor DHT 11. in iot devices, there is an important parameter, that is date time as a history in data logging sistem using an actual time. Website was functioned as system for showing data from log data and could be monitored realtime. This system could record communication brtween arduino device and NTP server using internet network. Beside that?this system could record important parameters in the system such as IP source address, ip destination address, ip address in each node, device time, and room temperature information. Parameters that had been recorded would be stored to database, then would be showed in web data logging.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78773714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
English Department of Tadulako University is a department with the highest number of lecturers in Tadulako University. Thesis supervisor determination at the English Department of Tadulako University still use the conventional way so that the determination of the thesis supervisor is done in a long time. In addition, some lecturers have more workload than other lecturers. Decision support system for the determination of the thesis supervisor in the English Department of Tadulako University was built to overcome this problem using the Weighted Product method. The system is a desktop-based application using the Visual Studio programming language and MySQL DBMS for database processing. The application of a decision support system for determining thesis supervisors can help make the selection of supervisors accurately and quickly with a mathematical calculation system.
{"title":"Decision Support System for Determining Thesis Supervisor using A Weighted Product (WP) Method","authors":"Suci Ramadhani Arifin, Josua Crishan Mintamanis","doi":"10.15575/join.v3i2.230","DOIUrl":"https://doi.org/10.15575/join.v3i2.230","url":null,"abstract":"English Department of Tadulako University is a department with the highest number of lecturers in Tadulako University. Thesis supervisor determination at the English Department of Tadulako University still use the conventional way so that the determination of the thesis supervisor is done in a long time. In addition, some lecturers have more workload than other lecturers. Decision support system for the determination of the thesis supervisor in the English Department of Tadulako University was built to overcome this problem using the Weighted Product method. The system is a desktop-based application using the Visual Studio programming language and MySQL DBMS for database processing. The application of a decision support system for determining thesis supervisors can help make the selection of supervisors accurately and quickly with a mathematical calculation system.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet today has become a primary need for its users. According to market research company e-Marketer, there are 25 countries with the largest internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users are expected to help improve the economy and also education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict for the coming years so that the government can provide adequate facilities and pre-facilities in order to balance the growth of internet users and as a precautionary step when there is a decrease in the number of internet users. The data used in this study focus on data on the number of internet users in 25 countries in 2013-2017. The algorithm used is Artificial Neural Network Backpropagation. Data analysis was processed by Artificial Neural Network using Matlab R2011b (7.13). This study uses 5 architectural models. The best network architecture generated is 3-50-1 with an accuracy of 92% and the Mean Squared Error (MSE) is 0.00151674.
{"title":"Analysis of Backpropagation Algorithm in Predicting the Most Number of Internet Users in the World","authors":"S. Setti, A. Wanto","doi":"10.15575/JOIN.V3I2.205","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.205","url":null,"abstract":"The Internet today has become a primary need for its users. According to market research company e-Marketer, there are 25 countries with the largest internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users are expected to help improve the economy and also education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict for the coming years so that the government can provide adequate facilities and pre-facilities in order to balance the growth of internet users and as a precautionary step when there is a decrease in the number of internet users. The data used in this study focus on data on the number of internet users in 25 countries in 2013-2017. The algorithm used is Artificial Neural Network Backpropagation. Data analysis was processed by Artificial Neural Network using Matlab R2011b (7.13). This study uses 5 architectural models. The best network architecture generated is 3-50-1 with an accuracy of 92% and the Mean Squared Error (MSE) is 0.00151674.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88417742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}