首页 > 最新文献

IJID International Journal on Informatics for Development最新文献

英文 中文
Preliminary Study of the Integration of Big Data to Answer the Challenges of Islamic Education in the Technological Age 融合大数据应对科技时代伊斯兰教育挑战初探
Pub Date : 2022-05-24 DOI: 10.14421/ijid.2021.3319
Sarah Adilah Wandansari
Along with the rapid development of technology, individuals today are required to align every aspect of their lives with the technological developments of the industrial revolution 4.0, consisting of artificial intelligence, the internet of things, and big data presented in society. Notably, it was related to education, including Islamic education, which frequently stereotyped about delays in responding to globalization's challenges. This preliminary study aims to encourage empirical research that is still lacking by exploring the role of big data in Islamic education and combining data from general education that has similar core. The study focused on using the scoping review method as a part of a literature review. As a result of this study, there are four impacted factors for strengthening the usage of big data: the performance and behavior factors of learning; the storage of education data; the update in the education system; and the use of big data in the education curriculum. Future studies should begin empirical research to elaborate more on these four impacted factors practically. 
随着技术的快速发展,今天的个人需要将生活的方方面面与工业革命4.0的技术发展保持一致,工业革命4.0包括人工智能、物联网和社会中呈现的大数据。值得注意的是,它与教育有关,包括伊斯兰教育,因为伊斯兰教育经常对应对全球化挑战的延误持定型态度。这项初步研究旨在通过探索大数据在伊斯兰教育中的作用,并结合具有类似核心的普通教育数据,鼓励仍然缺乏的实证研究。该研究的重点是使用范围界定审查方法作为文献综述的一部分。本研究的结果表明,加强大数据使用有四个影响因素:学习的表现和行为因素;教育数据的存储;教育系统的更新;以及在教育课程中使用大数据。未来的研究应该从实证研究开始,从实际出发,对这四个影响因素进行更多的阐述。
{"title":"Preliminary Study of the Integration of Big Data to Answer the Challenges of Islamic Education in the Technological Age","authors":"Sarah Adilah Wandansari","doi":"10.14421/ijid.2021.3319","DOIUrl":"https://doi.org/10.14421/ijid.2021.3319","url":null,"abstract":"Along with the rapid development of technology, individuals today are required to align every aspect of their lives with the technological developments of the industrial revolution 4.0, consisting of artificial intelligence, the internet of things, and big data presented in society. Notably, it was related to education, including Islamic education, which frequently stereotyped about delays in responding to globalization's challenges. This preliminary study aims to encourage empirical research that is still lacking by exploring the role of big data in Islamic education and combining data from general education that has similar core. The study focused on using the scoping review method as a part of a literature review. As a result of this study, there are four impacted factors for strengthening the usage of big data: the performance and behavior factors of learning; the storage of education data; the update in the education system; and the use of big data in the education curriculum. Future studies should begin empirical research to elaborate more on these four impacted factors practically. ","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44920167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Relational Data Model on The University Website with Search Engine Optimization 基于搜索引擎优化的高校网站关系数据模型
Pub Date : 2022-02-16 DOI: 10.14421/ijid.2021.3223
M. R. Alifi, Hashri Hayati, M. G. Wonoseto
The visibility of a university’s website on the search engine becomes an essential factor to reach a wider audience. One way to improve the visibility of a website is through Search Engine Optimization (SEO). University’s website development with SEO is inseparable from the data model because SEO supporting factors are parts of the consideration in the components and structure of the data model. This study aims to build a data model for a university website accompanied by SEO. The relational data model is used in this study based on the performance and maturity in defining schema-based design. This study was conducted through four sequential stages: literature review, planning, implementation, and evaluation. The resulting relational data model is one that has accommodated four supporting factors for SEO, namely Meta description, Meta keywords, URL structure, and image description. This study has succeeded in building a relational data model at the abstraction level of conceptual and logical.  In the conceptual data model, one entity and 11 attributes are formed. The logical data model was implemented in independent work environments using RelaX and operational requirements can be fulfilled by representing each table or relationship in the schema using relational algebra.
大学网站在搜索引擎上的可见性成为接触更广泛受众的重要因素。提高网站可见性的一种方法是通过搜索引擎优化(SEO)。大学网站的SEO开发离不开数据模型,因为SEO支持因素是数据模型的组成部分和结构中要考虑的因素。本研究旨在建立一个伴随SEO的大学网站数据模型。基于定义基于模式的设计的性能和成熟度,本研究使用了关系数据模型。本研究分四个阶段进行:文献综述、规划、实施和评估。由此产生的关系数据模型为SEO提供了四个支持因素,即元描述、元关键字、URL结构和图像描述。这项研究成功地在概念和逻辑的抽象层次上构建了一个关系数据模型。在概念数据模型中,形成了一个实体和11个属性。逻辑数据模型是使用RelaX在独立的工作环境中实现的,并且可以通过使用关系代数表示模式中的每个表或关系来满足操作需求。
{"title":"Relational Data Model on The University Website with Search Engine Optimization","authors":"M. R. Alifi, Hashri Hayati, M. G. Wonoseto","doi":"10.14421/ijid.2021.3223","DOIUrl":"https://doi.org/10.14421/ijid.2021.3223","url":null,"abstract":"The visibility of a university’s website on the search engine becomes an essential factor to reach a wider audience. One way to improve the visibility of a website is through Search Engine Optimization (SEO). University’s website development with SEO is inseparable from the data model because SEO supporting factors are parts of the consideration in the components and structure of the data model. This study aims to build a data model for a university website accompanied by SEO. The relational data model is used in this study based on the performance and maturity in defining schema-based design. This study was conducted through four sequential stages: literature review, planning, implementation, and evaluation. The resulting relational data model is one that has accommodated four supporting factors for SEO, namely Meta description, Meta keywords, URL structure, and image description. This study has succeeded in building a relational data model at the abstraction level of conceptual and logical.  In the conceptual data model, one entity and 11 attributes are formed. The logical data model was implemented in independent work environments using RelaX and operational requirements can be fulfilled by representing each table or relationship in the schema using relational algebra.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44932485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Remote Access Trojan Attack using Android Debug Bridge 安卓调试桥远程访问木马攻击分析
Pub Date : 2022-02-11 DOI: 10.14421/ijid.2021.2839
Deco Aprilliansyah, I. Riadi, Sunardi
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks.  The exploitation method with several steps from preparing the tools and connecting to the testing commands to the testing device have been conducted. The result shows that android version 9 can be remote access by entering the exploit via ADB. Some information has been obtained by third parties, enter and change the contents of the system directory can be remote access like an authorized to do any activities on the device such as opening lock screen, entering the directory system, changing the system, etc.
安卓操作系统中的安全漏洞有时无法由用户实现,例如恶意软件和第三方利用远程访问。本研究旨在利用Ghost Framework识别安卓操作系统的漏洞。安卓智能手机的漏洞是通过使用安卓调试桥(ADB)的利用方法发现的,并分析测试结果和识别远程访问特洛伊木马攻击。开发方法包括从准备工具到连接测试命令到测试设备的几个步骤。结果表明,android版本9可以通过ADB进入漏洞进行远程访问。某些信息已被第三方获取,进入并更改系统目录的内容可以远程访问,如授权在设备上进行任何活动,如打开锁屏、进入目录系统、更改系统等。
{"title":"Analysis of Remote Access Trojan Attack using Android Debug Bridge","authors":"Deco Aprilliansyah, I. Riadi, Sunardi","doi":"10.14421/ijid.2021.2839","DOIUrl":"https://doi.org/10.14421/ijid.2021.2839","url":null,"abstract":"The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks.  The exploitation method with several steps from preparing the tools and connecting to the testing commands to the testing device have been conducted. The result shows that android version 9 can be remote access by entering the exploit via ADB. Some information has been obtained by third parties, enter and change the contents of the system directory can be remote access like an authorized to do any activities on the device such as opening lock screen, entering the directory system, changing the system, etc.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign Language Prediction Model using Convolution Neural Network. 使用卷积神经网络的手语预测模型。
Pub Date : 2022-02-05 DOI: 10.14421/ijid.2021.3284
Rebeccah Ndungi, Samuel Karuga
The barrier between the hearing and the deaf communities in Kenya is a major challenge leading to a major gap in the communication sector where the deaf community is left out leading to inequality. The study used primary and secondary data sources to obtain information about this problem, which included online books, articles, conference materials, research reports, and journals on sign language and hand gesture recognition systems. To tackle the problem, CNN was used. Naturally captured hand gesture images were converted into grayscale and used to train a classification model that is able to identify the English alphabets from A-Z.  Then identified letters are used to construct sentences. This will be the first step into breaking the communication barrier and the inequality.  A sign language recognition model will assist in bridging the exchange of information between the deaf and hearing people in Kenya. The model was trained and tested on various matrices where we achieved an accuracy score of a 99% value when run on epoch of 10, the log loss metric returning a value of 0 meaning that it predicts the actual hand gesture images. The AUC and ROC curves achieved a 0.99 value which is excellent.
肯尼亚听力和聋人社区之间的障碍是一个重大挑战,导致通信部门存在重大差距,聋人社区被排除在外,导致不平等。这项研究使用了主要和次要的数据来源来获取有关这个问题的信息,包括关于手语和手势识别系统的在线书籍、文章、会议材料、研究报告和期刊。为了解决这个问题,CNN被使用了。自然捕获的手势图像被转换为灰度,并用于训练能够识别a-Z中的英文字母的分类模型。然后识别出的字母被用来造句。这将是打破沟通障碍和不平等的第一步。手语识别模式将有助于弥合肯尼亚聋人和听力正常者之间的信息交流。该模型在各种矩阵上进行了训练和测试,在历元10上运行时,我们获得了99%的准确度分数,对数损失度量返回值0,这意味着它预测了实际的手势图像。AUC和ROC曲线达到0.99的值,这是极好的。
{"title":"Sign Language Prediction Model using Convolution Neural Network.","authors":"Rebeccah Ndungi, Samuel Karuga","doi":"10.14421/ijid.2021.3284","DOIUrl":"https://doi.org/10.14421/ijid.2021.3284","url":null,"abstract":"The barrier between the hearing and the deaf communities in Kenya is a major challenge leading to a major gap in the communication sector where the deaf community is left out leading to inequality. The study used primary and secondary data sources to obtain information about this problem, which included online books, articles, conference materials, research reports, and journals on sign language and hand gesture recognition systems. To tackle the problem, CNN was used. Naturally captured hand gesture images were converted into grayscale and used to train a classification model that is able to identify the English alphabets from A-Z.  Then identified letters are used to construct sentences. This will be the first step into breaking the communication barrier and the inequality.  A sign language recognition model will assist in bridging the exchange of information between the deaf and hearing people in Kenya. The model was trained and tested on various matrices where we achieved an accuracy score of a 99% value when run on epoch of 10, the log loss metric returning a value of 0 meaning that it predicts the actual hand gesture images. The AUC and ROC curves achieved a 0.99 value which is excellent.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48829590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sentiment Analysis of Tweets on Prakerja Card using Convolutional Neural Network and Naive Bayes 基于卷积神经网络和朴素贝叶斯的Prakerja卡推文情感分析
Pub Date : 2022-01-01 DOI: 10.14421/ijid.2021.3007
Pahlevi Wahyu Hardjita, Nurochman, Rahmat Hidayat
The Indonesian government launched the Prakerja (pre-employment) card in the midst of the COVID-19 pandemic, andthe local citizens have voiced their opinions about this controversial program through social media such as Twitter. People’scomments on it can be useful information, and this research tries to analyze the sentiment regarding the Prakerja Card programusing the Convolutional Neural Network and Naive Bayes methods. The main task in this sentiment analysis is analyzing the dataand then classifying them into one of the following classes: positive, negative or neutral. Naive Bayes is an algorithm that is often usedin sentiment analysis research, and the results have been very good. Convolutional neural network (CNN) is a deep learning algorithmthat uses one or more layers commonly used for pattern recognition and image recognition. Having applied these methods, thisresearch found that the CNN model with the GlobalMaxPooling layer is the best model of the other two CNN models. Sentimentanalysis has the best accuracy of 78.5% on the CNN method, and NBC of 76.2% accuracy. The best accuracy result in K-fold withfive classes is 85.4% on the CNN model with a learning rate optimization of 0.00158. While the average accuracy on NBC only reached75.3%
在新冠肺炎大流行期间,印度尼西亚政府推出了Prakerja(就业前)卡,当地公民通过推特等社交媒体表达了他们对这一有争议的计划的看法。人们对它的评论可能是有用的信息,本研究试图使用卷积神经网络和朴素贝叶斯方法来分析人们对Prakerja Card程序的看法。这种情绪分析的主要任务是分析数据,然后将其分为以下类别之一:积极、消极或中性。朴素贝叶斯算法是情感分析研究中常用的一种算法,其结果非常好。卷积神经网络(CNN)是一种深度学习算法,使用一层或多层,通常用于模式识别和图像识别。应用这些方法后,本研究发现,具有GlobalMaxPooling层的CNN模型是其他两种CNN模型中最好的模型。在CNN方法中,情感分析的准确率最高,为78.5%,NBC的准确率为76.2%。在学习率优化为0.00158的CNN模型上,具有五个类别的K-fold的最佳准确率结果为85.4%。而NBC的平均准确率仅达到75.3%
{"title":"Sentiment Analysis of Tweets on Prakerja Card using Convolutional Neural Network and Naive Bayes","authors":"Pahlevi Wahyu Hardjita, Nurochman, Rahmat Hidayat","doi":"10.14421/ijid.2021.3007","DOIUrl":"https://doi.org/10.14421/ijid.2021.3007","url":null,"abstract":"The Indonesian government launched the Prakerja (pre-employment) card in the midst of the COVID-19 pandemic, andthe local citizens have voiced their opinions about this controversial program through social media such as Twitter. People’scomments on it can be useful information, and this research tries to analyze the sentiment regarding the Prakerja Card programusing the Convolutional Neural Network and Naive Bayes methods. The main task in this sentiment analysis is analyzing the dataand then classifying them into one of the following classes: positive, negative or neutral. Naive Bayes is an algorithm that is often usedin sentiment analysis research, and the results have been very good. Convolutional neural network (CNN) is a deep learning algorithmthat uses one or more layers commonly used for pattern recognition and image recognition. Having applied these methods, thisresearch found that the CNN model with the GlobalMaxPooling layer is the best model of the other two CNN models. Sentimentanalysis has the best accuracy of 78.5% on the CNN method, and NBC of 76.2% accuracy. The best accuracy result in K-fold withfive classes is 85.4% on the CNN model with a learning rate optimization of 0.00158. While the average accuracy on NBC only reached75.3%","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46852157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Mask Wearing Detection Using Support Vector Machine (SVM) 基于支持向量机的口罩佩戴检测
Pub Date : 2021-12-21 DOI: 10.14421/ijid.2021.3038
Muhammad Nur Yasir Utomo, Fajrin Violita
As an effort to prevent the spread of the Covid-19, various countries have implemented health protocol policies such as work-from-home, social distancing, and face mask-wearing in public places. However, monitoring compliance with the policy is still difficult, especially for the face mask policy. It is still managed by humans and is costly. Thus, this research proposes a face mask-wearing detection using a soft-margin Support Vector Machine (SVM). There are three main stages: feature selection and preprocessing, model training, and evaluation. During the first stage, the dataset of 3833 images (1915 images with face masks and 1918 images without face masks) was prepared to be used in the training stage. The training stage was conducted using SVM added with the soft-margin objective to overcome images that could not be separated linearly. At the final stage, evaluation was conducted using a confusion matrix with 10 folds cross-validation. Based on the experiments, the proposed method shows a performance accuracy of 91.7%, a precision of 90.3%, recall of 93.5%, and an F-measure of 91.8%. Our method also worked fast, taking only 0.025 seconds to process a new image. It is 7.12 times faster than Deep Learning which requires 0.18 seconds for one classification.
为防止新冠肺炎疫情扩散,各国纷纷实施居家办公、保持社交距离、在公共场所佩戴口罩等卫生协议政策。然而,监测政策的遵守情况仍然很困难,特别是对于口罩政策。它仍然由人类管理,而且成本很高。因此,本研究提出了一种基于软边界支持向量机(SVM)的口罩检测方法。主要有三个阶段:特征选择和预处理、模型训练和评估。在第一阶段,准备3833张图像的数据集(1915张带口罩的图像和1918张不带口罩的图像)用于训练阶段。训练阶段采用支持向量机加软边界目标克服不能线性分离的图像。在最后阶段,使用混淆矩阵进行评估,并进行10倍交叉验证。实验结果表明,该方法的准确率为91.7%,精密度为90.3%,召回率为93.5%,F-measure为91.8%。我们的方法也很快,处理一张新图像只需要0.025秒。它比深度学习快7.12倍,深度学习需要0.18秒进行一次分类。
{"title":"Face Mask Wearing Detection Using Support Vector Machine (SVM)","authors":"Muhammad Nur Yasir Utomo, Fajrin Violita","doi":"10.14421/ijid.2021.3038","DOIUrl":"https://doi.org/10.14421/ijid.2021.3038","url":null,"abstract":"As an effort to prevent the spread of the Covid-19, various countries have implemented health protocol policies such as work-from-home, social distancing, and face mask-wearing in public places. However, monitoring compliance with the policy is still difficult, especially for the face mask policy. It is still managed by humans and is costly. Thus, this research proposes a face mask-wearing detection using a soft-margin Support Vector Machine (SVM). There are three main stages: feature selection and preprocessing, model training, and evaluation. During the first stage, the dataset of 3833 images (1915 images with face masks and 1918 images without face masks) was prepared to be used in the training stage. The training stage was conducted using SVM added with the soft-margin objective to overcome images that could not be separated linearly. At the final stage, evaluation was conducted using a confusion matrix with 10 folds cross-validation. Based on the experiments, the proposed method shows a performance accuracy of 91.7%, a precision of 90.3%, recall of 93.5%, and an F-measure of 91.8%. Our method also worked fast, taking only 0.025 seconds to process a new image. It is 7.12 times faster than Deep Learning which requires 0.18 seconds for one classification.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44606399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Handwriting Arabic Character Recognition Using Features Combination 基于特征组合的手写体阿拉伯文字符识别
Pub Date : 2021-10-27 DOI: 10.14421/ijid.2021.2360
Fitriyatul Qomariyah, Fitri Utaminingrum, M. Muchlas
The recognition of Arabic handwriting is a challenging problem to solve. The similarity among the fonts appears as a problem in the recognition processing. Various styles, shapes, and sizes which are personal and different across individuals make the Arabic handwriting recognition process even harder. In this paper, the data used are Arabic handwritten images with 101 sample characters, each of which is written by 15 different handwritten characters (total sample 101x15) with the same size (81x81 pixels). A well-chosen feature is crucial for making good recognition results. In this study, the researcher proposed a method of new features extraction to recognize Arabic handwriting. The features extraction was done by grabbing the value of similar features among various types of font writing, to be used as a new feature of the font. Then, City Block was used to compare the obtained feature to other features of the sample for classification. The Average accuracy value obtained in this study was up to 82%.
阿拉伯语笔迹的识别是一个需要解决的具有挑战性的问题。字体之间的相似性在识别处理中表现为一个问题。各种风格、形状和尺寸都是个人的,而且每个人都不同,这使得阿拉伯语的笔迹识别过程更加困难。在本文中,使用的数据是具有101个样本字符的阿拉伯手写图像,每个样本字符由15个相同大小(81x81像素)的不同手写字符(总样本101x15)书写。精心选择的特征对于获得良好的识别结果至关重要。在这项研究中,研究人员提出了一种新的特征提取方法来识别阿拉伯语笔迹。特征提取是通过抓取不同类型字体书写中相似特征的值来完成的,以用作字体的新特征。然后,使用City Block将获得的特征与样本的其他特征进行比较以进行分类。本研究中获得的平均准确度值高达82%。
{"title":"Handwriting Arabic Character Recognition Using Features Combination","authors":"Fitriyatul Qomariyah, Fitri Utaminingrum, M. Muchlas","doi":"10.14421/ijid.2021.2360","DOIUrl":"https://doi.org/10.14421/ijid.2021.2360","url":null,"abstract":"The recognition of Arabic handwriting is a challenging problem to solve. The similarity among the fonts appears as a problem in the recognition processing. Various styles, shapes, and sizes which are personal and different across individuals make the Arabic handwriting recognition process even harder. In this paper, the data used are Arabic handwritten images with 101 sample characters, each of which is written by 15 different handwritten characters (total sample 101x15) with the same size (81x81 pixels). A well-chosen feature is crucial for making good recognition results. In this study, the researcher proposed a method of new features extraction to recognize Arabic handwriting. The features extraction was done by grabbing the value of similar features among various types of font writing, to be used as a new feature of the font. Then, City Block was used to compare the obtained feature to other features of the sample for classification. The Average accuracy value obtained in this study was up to 82%.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49288129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack 保护DHCP服务器免受DHCP流氓攻击的DHCP监听和DHCP警报方法
Pub Date : 2021-06-30 DOI: 10.14421/ijid.2021.2287
Dio Aditya Pradana, Ade Surya Budiman
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.
DHCP服务器作为网络基础设施的一部分,负责将主机配置分配给所有设备,有可能受到控制。如果DHCP服务器被成功控制,那么连接到该服务器的所有网络设备都可能被控制。根据PT的观察结果,Rekayasa Engineering在DHCP服务器中发现了一个漏洞,该漏洞可能会遭遇DHCP Rogue或DHCP Spoofing,客户端将无法与授权的DHCP服务器通信,并为攻击者进入网络打开大门。因此,实现了DHCP Snooping和DHCP Alert方法。DHCP Snooping将确保每个数据流量都经过过滤并定向到已注册的接口。同时,在发现、提供、请求和确认(DORA)过程中,需要使用DHCP警报来监控数据流量。在执行的测试中,DHCP Snooping和DHCP Alert成功预测了试图在网络基础设施上放置DHCP Rogue的攻击。在代理路由器上配置的DHCP Alert可确保DORA进程只能在授权的DHCP服务器和客户端之间发生。DHCP Snooping测试还显示,来自客户端的通信只能由受信任的DHCP服务器回复。DHCP Snooping和DHCP Alert的存在使主机配置完全由授权的DHCP服务器控制。
{"title":"The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack","authors":"Dio Aditya Pradana, Ade Surya Budiman","doi":"10.14421/ijid.2021.2287","DOIUrl":"https://doi.org/10.14421/ijid.2021.2287","url":null,"abstract":"DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43529189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method Conti勒索软件对计算机网络攻击的现场取证分析
Pub Date : 2021-06-30 DOI: 10.14421/ijid.2021.2423
R. Umar, I. Riadi, Ridho Surya Kusuma
Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.
近年来,勒索病毒已成为一种迅速增长的危险威胁。其中一个变种是Conti勒索软件,它可以传播感染并同时加密数据。攻击通过加密受害者计算机上的数据,将其传播到同一计算机网络上的其他计算机,并要求赎金,从而成为严重威胁并破坏系统。这个勒索软件的工作原理是利用注册表查询,它涵盖了访问、删除、创建、操纵数据以及与C2(命令和控制)服务器通信的所有形式的行为。本研究采用基于网络行为日志的网络取证流程对Conti病毒攻击进行分析。研究过程分为三个阶段,第一阶段是模拟对主机的攻击,第二阶段是使用现场取证方法进行网络取证,第三阶段是使用统计和动态分析对恶意软件进行分析。本研究的结果提供了在RAM和计算机网络上运行时的取证数据和病毒行为,以便获得的数据可以识别网络上的勒索软件流量并处理零日,特别是勒索软件威胁。这样做是可能的,因为分析是基于网络指标生成病毒签名的第一步。
{"title":"Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method","authors":"R. Umar, I. Riadi, Ridho Surya Kusuma","doi":"10.14421/ijid.2021.2423","DOIUrl":"https://doi.org/10.14421/ijid.2021.2423","url":null,"abstract":"Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. Attacks become a severe threat and damage the system, namely by encrypting data on the victim's computer, spreading it to other computers on the same computer network, and demanding a ransom. The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and Control) servers. This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. It is possible to do so because the analysis is an initial step in generating virus signatures based on network indicators.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45443392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Machine Learning Framework for Improving Classification Performance on Credit Approval 一种提高信用审批分类性能的机器学习框架
Pub Date : 2021-06-30 DOI: 10.14421/ijid.2021.2384
Pulung Hendro Prastyo, Septian Eko Prasetyo, S. Arti
Credit scoring is a model commonly used in the decision-making process to refuse or accept loan requests. The credit score model depends on the type of loan or credit and is complemented by various credit factors. At present, there is no accurate model for determining which creditors are eligible for loans. Therefore, an accurate and automatic model is needed to make it easier for banks to determine appropriate creditors. To address the problem, we propose a new approach using the combination of a machine learning algorithm (Naïve Bayes), Information Gain (IG), and discretization in classifying creditors. This research work employed an experimental method using the Weka application. Australian Credit Approval data was used as a dataset, which contains 690 instances of data. In this study, Information Gain is employed as a feature selection to select relevant features so that the Naïve Bayes algorithm can work optimally. The confusion matrix is used as an evaluator and 10-fold cross-validation as a validator. Based on experimental results, our proposed method could improve the classification performance, which reached the highest performance in average accuracy, precision, recall, and f-measure with the value of 86.29%, 86.33%, 86.29%, 86.30%, and 91.52%, respectively. Besides, the proposed method also obtains 91.52% of the ROC area. It indicates that our proposed method can be classified as an excellent classification.
信用评分是决策过程中常用的一种模型,用于拒绝或接受贷款请求。信用评分模型取决于贷款或信用的类型,并辅以各种信用因素。目前,还没有准确的模型来确定哪些债权人有资格获得贷款。因此,需要一个准确和自动的模型,使银行更容易确定合适的债权人。为了解决这个问题,我们提出了一种结合机器学习算法(Naïve Bayes)、信息增益(IG)和离散化对债权人进行分类的新方法。本研究采用了Weka应用程序的实验方法。澳大利亚信贷审批数据被用作一个数据集,其中包含690个数据实例。在本研究中,采用Information Gain作为特征选择,选择相关特征,使Naïve贝叶斯算法能够最优地工作。混淆矩阵用作评估器,10倍交叉验证用作验证器。实验结果表明,本文提出的方法可以提高分类性能,在平均准确率、精密度、召回率和f-measure方面达到了最高的性能,分别为86.29%、86.33%、86.29%、86.30%和91.52%。此外,该方法也获得了91.52%的ROC面积。这表明我们提出的方法是一种很好的分类方法。
{"title":"A Machine Learning Framework for Improving Classification Performance on Credit Approval","authors":"Pulung Hendro Prastyo, Septian Eko Prasetyo, S. Arti","doi":"10.14421/ijid.2021.2384","DOIUrl":"https://doi.org/10.14421/ijid.2021.2384","url":null,"abstract":"Credit scoring is a model commonly used in the decision-making process to refuse or accept loan requests. The credit score model depends on the type of loan or credit and is complemented by various credit factors. At present, there is no accurate model for determining which creditors are eligible for loans. Therefore, an accurate and automatic model is needed to make it easier for banks to determine appropriate creditors. To address the problem, we propose a new approach using the combination of a machine learning algorithm (Naïve Bayes), Information Gain (IG), and discretization in classifying creditors. This research work employed an experimental method using the Weka application. Australian Credit Approval data was used as a dataset, which contains 690 instances of data. In this study, Information Gain is employed as a feature selection to select relevant features so that the Naïve Bayes algorithm can work optimally. The confusion matrix is used as an evaluator and 10-fold cross-validation as a validator. Based on experimental results, our proposed method could improve the classification performance, which reached the highest performance in average accuracy, precision, recall, and f-measure with the value of 86.29%, 86.33%, 86.29%, 86.30%, and 91.52%, respectively. Besides, the proposed method also obtains 91.52% of the ROC area. It indicates that our proposed method can be classified as an excellent classification.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48536260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IJID International Journal on Informatics for Development
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1