Pub Date : 2023-01-30DOI: 10.14421/jiska.2023.8.1.10-21
M. Sholeh, Erna Kumalasari Nurnawati, Uning Lestari
Prediction is one of the methods in data mining. One of the models that can be used in prediction is using linear regression. Linear regression is used to make predictions on the data that has been provided. In this study, a linear regression model was made with a datasheet containing data that affected student achievement in achieving final exam scores. The linear regression model developed can be used to predict student test scores. The linear regression model developed can be used to predict student test scores. The datasheet used in the test uses a public datasheet, namely student_performance.csv. The datasheet consists of 395 records and 33 attributes. The attributes used are selected that influence the label. The selection of attributes is based on the results of the weighting in the process of checking the correlation matrix. Based on the weighting, the attributes used are seven attributes and one attribute becomes a label. The research method uses CRISP DM which consists of business understanding, data understanding, data preparation, model making, evaluation, and deploying. The data mining process uses the Rapid Miner application. The results of the study resulted in a linear regression model y=0.729-(0.024×Medu)-(0.020×Fedu)+(0.053×failures)-(0.077×goout)-(0.012×absences)+(0.126×G1)+(0.862×G2). The result of evaluating the performance of the RMSE value was 0.675. Based on these results, it can be concluded that the resulting model can be recommended for use in predicting student test scores.
{"title":"Penerapan Data Mining dengan Metode Regresi Linear untuk Memprediksi Data Nilai Hasil Ujian Menggunakan RapidMiner","authors":"M. Sholeh, Erna Kumalasari Nurnawati, Uning Lestari","doi":"10.14421/jiska.2023.8.1.10-21","DOIUrl":"https://doi.org/10.14421/jiska.2023.8.1.10-21","url":null,"abstract":"Prediction is one of the methods in data mining. One of the models that can be used in prediction is using linear regression. Linear regression is used to make predictions on the data that has been provided. In this study, a linear regression model was made with a datasheet containing data that affected student achievement in achieving final exam scores. The linear regression model developed can be used to predict student test scores. The linear regression model developed can be used to predict student test scores. The datasheet used in the test uses a public datasheet, namely student_performance.csv. The datasheet consists of 395 records and 33 attributes. The attributes used are selected that influence the label. The selection of attributes is based on the results of the weighting in the process of checking the correlation matrix. Based on the weighting, the attributes used are seven attributes and one attribute becomes a label. The research method uses CRISP DM which consists of business understanding, data understanding, data preparation, model making, evaluation, and deploying. The data mining process uses the Rapid Miner application. The results of the study resulted in a linear regression model y=0.729-(0.024×Medu)-(0.020×Fedu)+(0.053×failures)-(0.077×goout)-(0.012×absences)+(0.126×G1)+(0.862×G2). The result of evaluating the performance of the RMSE value was 0.675. Based on these results, it can be concluded that the resulting model can be recommended for use in predicting student test scores.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45216415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.237-255
Muhammad Norhalimi, Taghfirul Azhima Yoga Siswa
There was an increase in the number of late payments of tuition fees by 3,018 from a total of 5,535 students at the end of 2020. This study uses the Python library which requires data to be of numeric type, so it requires data transformation according to the type of data in the study, data that has a scale is transformed using an ordinal encoder, and data that does not have a scale is transformed using one-hot encoding. The purpose of this study was to evaluate the performance of the Naïve Bayes algorithm and K-Nearest Neighbor with a confusion matrix in predicting late payment of tuition fees at UMKT. The dataset used in this study was sourced from the financial administration bureau as many as 12,408 data with a distribution of 90:10. Based on the results of the calculation of the selection of information gain features, the best 4 attributes that influence the research are obtained, namely faculty, study program, class, and gender. The results of the evaluation of the confusion matrix that have the best performance using the Naïve Bayes with information gain algorithm obtain an accuracy of 55.19%, while the K-Nearest Neighbor with information gain only obtains an accuracy of 50.76%. Based on the accuracy results obtained in the prediction of late payment of tuition fees by using attributes derived from information gain, it influences increasing the accuracy of Naïve Bayes, but the use of the information gain attribute on the K-Nearest Neighbor algorithm makes the accuracy obtained decrease.
{"title":"Optimasi Seleksi Fitur Information Gain pada Algoritma Naïve Bayes dan K-Nearest Neighbor","authors":"Muhammad Norhalimi, Taghfirul Azhima Yoga Siswa","doi":"10.14421/jiska.2022.7.3.237-255","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.237-255","url":null,"abstract":"There was an increase in the number of late payments of tuition fees by 3,018 from a total of 5,535 students at the end of 2020. This study uses the Python library which requires data to be of numeric type, so it requires data transformation according to the type of data in the study, data that has a scale is transformed using an ordinal encoder, and data that does not have a scale is transformed using one-hot encoding. The purpose of this study was to evaluate the performance of the Naïve Bayes algorithm and K-Nearest Neighbor with a confusion matrix in predicting late payment of tuition fees at UMKT. The dataset used in this study was sourced from the financial administration bureau as many as 12,408 data with a distribution of 90:10. Based on the results of the calculation of the selection of information gain features, the best 4 attributes that influence the research are obtained, namely faculty, study program, class, and gender. The results of the evaluation of the confusion matrix that have the best performance using the Naïve Bayes with information gain algorithm obtain an accuracy of 55.19%, while the K-Nearest Neighbor with information gain only obtains an accuracy of 50.76%. Based on the accuracy results obtained in the prediction of late payment of tuition fees by using attributes derived from information gain, it influences increasing the accuracy of Naïve Bayes, but the use of the information gain attribute on the K-Nearest Neighbor algorithm makes the accuracy obtained decrease.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44386327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.192-210
Latansa Amalia, Anik Hanifatul Azizah
E-Kinerja Benda District Tangerang City is an E-Government in the form of an Employee Performance Management Information System in charge of recording and reporting the performance of all employees in the government environment. The system should aim to simplify employee performance management and measure the efficiency and creativity of employees at work, in its implementation, there are still problems that occur. Many employees complain about the system, the implementation of the E-Kinerja system either directly or indirectly is considered troublesome, the internet network is not widely connected, the presence of technology devices (computers) is limited, and the lack of employees in understanding and utilizing the E-Kinerja system, and the lack of attendance and knowledge of information about IT as part of the supporting components in the process of presenting the information. So that an evaluation of the application of E-Kinerja is carried out, with the aim of this study being able to measure evaluation to prove the success rate of implementing E-Kinerja-based performance evaluations in Benda District, Tangerang City and knowing what factors or variables influence it. This study evaluates success using the Enhanced Information System Success Model with 7 evaluation variables: information quality, system quality, service quality, user satisfaction, trust, use, and net benefits. This study will use a qualitative and quantitative data approach through observation, interviews, literature studies, and questionnaires where the total respondents obtained are 62 respondents with PLS-SEM data analysis and SmartPLS 3.3 assistance. Based on the results of the research conducted, it is proven that from the 14 hypotheses proposed there are 5 hypotheses accepted while 9 other hypotheses are rejected. This evaluation also produces recommendations from the seven variables used which contain alternatives to improve and increase the success of the implementation of E-Kinerja.
E-Kinerja Benda District Tangerang City是一个电子政府,以员工绩效管理信息系统的形式,负责记录和报告政府环境中所有员工的绩效。该制度旨在简化员工绩效管理,衡量员工在工作中的效率和创造力,但在实施过程中仍存在问题。许多员工抱怨该系统,E-Kinerja系统的实施直接或间接被认为是麻烦的,互联网网络没有广泛连接,技术设备(计算机)的存在是有限的,员工缺乏对E-Kinerja系统的理解和利用,以及在呈现信息的过程中缺乏关于IT信息的出席和知识作为支持组件的一部分。因此,对E-Kinerja的应用进行评估,本研究的目的是能够测量评估,以证明在坦格朗市本达区实施E-Kinerja绩效评估的成功率,并了解影响其成功率的因素或变量。本研究使用增强型资讯系统成功模型,以资讯品质、系统品质、服务品质、使用者满意度、信任、使用及净效益等7个评量变数来评估资讯系统的成功与否。本研究将采用定性和定量的数据方法,通过观察、访谈、文献研究和问卷调查,在PLS-SEM数据分析和SmartPLS 3.3协助下,获得了62名受访者。根据所进行的研究结果,在提出的14个假设中,有5个假设被接受,另外9个假设被拒绝。这项评价还根据所使用的七个变量提出建议,其中包含改进和增加E-Kinerja执行成功的备选办法。
{"title":"Evaluasi Kesuksesan Penerapan Sistem Elektronik Kinerja (E-Kinerja) Menggunakan Enhanced Information System Success Model di Kecamatan Benda Tangerang","authors":"Latansa Amalia, Anik Hanifatul Azizah","doi":"10.14421/jiska.2022.7.3.192-210","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.192-210","url":null,"abstract":"E-Kinerja Benda District Tangerang City is an E-Government in the form of an Employee Performance Management Information System in charge of recording and reporting the performance of all employees in the government environment. The system should aim to simplify employee performance management and measure the efficiency and creativity of employees at work, in its implementation, there are still problems that occur. Many employees complain about the system, the implementation of the E-Kinerja system either directly or indirectly is considered troublesome, the internet network is not widely connected, the presence of technology devices (computers) is limited, and the lack of employees in understanding and utilizing the E-Kinerja system, and the lack of attendance and knowledge of information about IT as part of the supporting components in the process of presenting the information. So that an evaluation of the application of E-Kinerja is carried out, with the aim of this study being able to measure evaluation to prove the success rate of implementing E-Kinerja-based performance evaluations in Benda District, Tangerang City and knowing what factors or variables influence it. This study evaluates success using the Enhanced Information System Success Model with 7 evaluation variables: information quality, system quality, service quality, user satisfaction, trust, use, and net benefits. This study will use a qualitative and quantitative data approach through observation, interviews, literature studies, and questionnaires where the total respondents obtained are 62 respondents with PLS-SEM data analysis and SmartPLS 3.3 assistance. Based on the results of the research conducted, it is proven that from the 14 hypotheses proposed there are 5 hypotheses accepted while 9 other hypotheses are rejected. This evaluation also produces recommendations from the seven variables used which contain alternatives to improve and increase the success of the implementation of E-Kinerja.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45978986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.143-162
Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya
The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.
{"title":"Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List","authors":"Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya","doi":"10.14421/jiska.2022.7.3.143-162","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.143-162","url":null,"abstract":"The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44197348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.177-191
Muhammad Rifqi Maarif
With the massive implementation of social media in various forms in various business domains, business or product owners have the opportunity to be able to take advantage of user review data that is available free of charge to evaluate the products they issue. User reviews on social media platforms, marketplaces, and e-commerce are User Generated Content (UGC) which is very useful for product owners to find out the extent of user preferences for their products. However, to be able to comprehensively read the data, the right technology is needed considering that the data is in the form of text in very large quantities. Reading one by one and then drawing conclusions is certainly not the right approach because it will take quite a lot of time. So, in this study, the researcher will use a text analysis-based approach, especially topic modeling and sentiment analysis to summarize user reviews in the comments or reviews column on the e-commerce platform. The case study used in this study is user reviews in the comments column on the Amazon site for the Lenovo K8 Note smartphone product. From the experiments carried out, the approach used can summarize the reviews written by quite many users in one summary that can be easily understood.
{"title":"Summarizing Online Customer Review using Topic Modeling and Sentiment Analysis","authors":"Muhammad Rifqi Maarif","doi":"10.14421/jiska.2022.7.3.177-191","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.177-191","url":null,"abstract":"With the massive implementation of social media in various forms in various business domains, business or product owners have the opportunity to be able to take advantage of user review data that is available free of charge to evaluate the products they issue. User reviews on social media platforms, marketplaces, and e-commerce are User Generated Content (UGC) which is very useful for product owners to find out the extent of user preferences for their products. However, to be able to comprehensively read the data, the right technology is needed considering that the data is in the form of text in very large quantities. Reading one by one and then drawing conclusions is certainly not the right approach because it will take quite a lot of time. So, in this study, the researcher will use a text analysis-based approach, especially topic modeling and sentiment analysis to summarize user reviews in the comments or reviews column on the e-commerce platform. The case study used in this study is user reviews in the comments column on the Amazon site for the Lenovo K8 Note smartphone product. From the experiments carried out, the approach used can summarize the reviews written by quite many users in one summary that can be easily understood.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45753531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.163-176
M. Muthmainnah, Deni Bako Tabriawan
The heart is an important organ of the human body. The heart functions to pump blood throughout the body. Health conditions can be seen in the condition of heart function. The heart’s function can be known through the beat when pumping blood. The manufacture of a heart rate device has been carried out using the PPG method. This tool uses the MAX30102 sensor as input. The measurement results are displayed on the smartphone. This tool can calculate the heart rate by sticking the surface of the fingertips for ten seconds. The light waves emitted by the sensor source will hit the surface of the finger. Changes in blood volume cause changes in light intensity according to what is received by the sensor. Based on the test results, the average standard deviation of this tool's heart rate measurement is 1.176. If considered the data from the pulse oximeter is correct, then this tool has an accuracy of 98.804%.
{"title":"Prototipe Alat Ukur Detak Jantung Menggunakan Sensor MAX30102 Berbasis Internet of Things (IoT) ESP8266 dan Blynk","authors":"M. Muthmainnah, Deni Bako Tabriawan","doi":"10.14421/jiska.2022.7.3.163-176","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.163-176","url":null,"abstract":"The heart is an important organ of the human body. The heart functions to pump blood throughout the body. Health conditions can be seen in the condition of heart function. The heart’s function can be known through the beat when pumping blood. The manufacture of a heart rate device has been carried out using the PPG method. This tool uses the MAX30102 sensor as input. The measurement results are displayed on the smartphone. This tool can calculate the heart rate by sticking the surface of the fingertips for ten seconds. The light waves emitted by the sensor source will hit the surface of the finger. Changes in blood volume cause changes in light intensity according to what is received by the sensor. Based on the test results, the average standard deviation of this tool's heart rate measurement is 1.176. If considered the data from the pulse oximeter is correct, then this tool has an accuracy of 98.804%.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47174696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.211-225
Vivi Oktavia, Novan Wijaya
There are 26 Latin letters in Indonesia, 5 of which are vowels and 21 consonants. This study will translate handwriting with a Latin object using the K-Nearest Neighbor method with the Local Binary Pattern extension. The research is being done with a focus on experimentation using a few methods that have already been discussed. Concatenated Latin letters have a few variations that depend on the work's author, so research will be conducted to identify cursive Latin letters based on these variations. Each of the 30 respondents wrote 26 capital letters and 26 lowercase letters on paper, which was then scanned to provide the image data. Black, blue, and red pens were used to write by every ten responders. The recognition procedure is broken into two halves, capital and non-capital letter recognition using 780 picture datasets each. In the study, k-fold cross-validation is used, with k = 6. The best value was reached at k = 7 with 29.49 percent accuracy, 33.88 percent precision, recall 33.46 percent, and F1-score 27.65 percent according to the research utilizing KNN with values k = 3, 5, and 7. and for recognizing non-capital characters, the best result was found at k=3 with accuracy, precision, recall, and F1-score of 26.28, 27.27, and 22.7%, respectively.
{"title":"Pengenalan Tulisan Tangan Huruf Latin Bersambung Menggunakan Local Binary Pattern dan K-Nearest Neighbor","authors":"Vivi Oktavia, Novan Wijaya","doi":"10.14421/jiska.2022.7.3.211-225","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.211-225","url":null,"abstract":"There are 26 Latin letters in Indonesia, 5 of which are vowels and 21 consonants. This study will translate handwriting with a Latin object using the K-Nearest Neighbor method with the Local Binary Pattern extension. The research is being done with a focus on experimentation using a few methods that have already been discussed. Concatenated Latin letters have a few variations that depend on the work's author, so research will be conducted to identify cursive Latin letters based on these variations. Each of the 30 respondents wrote 26 capital letters and 26 lowercase letters on paper, which was then scanned to provide the image data. Black, blue, and red pens were used to write by every ten responders. The recognition procedure is broken into two halves, capital and non-capital letter recognition using 780 picture datasets each. In the study, k-fold cross-validation is used, with k = 6. The best value was reached at k = 7 with 29.49 percent accuracy, 33.88 percent precision, recall 33.46 percent, and F1-score 27.65 percent according to the research utilizing KNN with values k = 3, 5, and 7. and for recognizing non-capital characters, the best result was found at k=3 with accuracy, precision, recall, and F1-score of 26.28, 27.27, and 22.7%, respectively.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49658250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-25DOI: 10.14421/jiska.2022.7.3.226-236
S. R. Wulandari, Hamdani Hamdani, Anindita Septiarini
Rice is one of the staple foods for most of the world's population. However, in planting rice, there are several things that must be considered, namely the aspect of land suitability. Errors in land determination can cause crop failure which results in reduced rice production. This system was built based on the website using the Analytical Hierarchy Process (AHP) method to calculate the weight of the criteria and the Simple Additive Weighting (SAW) method to determine the selection of land suitability for rice plants. In determining the suitability of paddy fields using 5 criteria, namely soil type, soil pH, rainfall, temperature, and irrigation waters. The purpose of this research is to assist farmers/farmer groups in selecting land. The results of this study indicate that the AHP and SAW methods have been successfully applied in the system with the results of land recommendations in the Sungai Kunjang sub-district with a preference value of 0,989.
{"title":"Sistem Pendukung Keputusan Kesesuaian Lahan Tanaman Padi Menggunakan Metode AHP dan SAW","authors":"S. R. Wulandari, Hamdani Hamdani, Anindita Septiarini","doi":"10.14421/jiska.2022.7.3.226-236","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.3.226-236","url":null,"abstract":"Rice is one of the staple foods for most of the world's population. However, in planting rice, there are several things that must be considered, namely the aspect of land suitability. Errors in land determination can cause crop failure which results in reduced rice production. This system was built based on the website using the Analytical Hierarchy Process (AHP) method to calculate the weight of the criteria and the Simple Additive Weighting (SAW) method to determine the selection of land suitability for rice plants. In determining the suitability of paddy fields using 5 criteria, namely soil type, soil pH, rainfall, temperature, and irrigation waters. The purpose of this research is to assist farmers/farmer groups in selecting land. The results of this study indicate that the AHP and SAW methods have been successfully applied in the system with the results of land recommendations in the Sungai Kunjang sub-district with a preference value of 0,989.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48984852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-25DOI: 10.14421/jiska.2022.7.2.75-82
Rinny Asasunnaja, Bambang Sugiantoro
As time goes by, the current technology is also developing very rapidly, the rapid development of technology, especially on the internet network is also developing so that it is expected to continue to provide the best quality to meet the growing and fast information needs. An internet network is highly demanded of its best quality, one of which is in the spotlight to be developed, namely TCP Transmission Control Protocol. The efficiency and smoothness of the data transmission process is the most important thing in a communication network. TCP is one aspect that supports today’s fast internet, with TCP we can exchange information accurately, quickly, and well. In this study, researchers are interested in analyzing the performance of TCP Sack using the Random Early Detection queue. By doing this research is expected to know the performance of TCP Sack by looking at the parameter values of packet delivery ratio, throughput, end to end delay, and packet drop. Based on the results of the analysis, it can be concluded that end-to-end delay parameter testing on the TCP Sack still has poor performance, while for testing the packet delivery ratio, throughput, and packet drop TCP Sack already has good performance.
随着时间的推移,当前的技术也发展得非常迅速,技术的飞速发展,特别是互联网上的网络也在不断发展,从而有望不断提供最好的质量来满足日益增长和快速的信息需求。internet网络对其质量的要求很高,其中TCP传输控制协议(TCP Transmission Control Protocol)是目前发展的热点之一。在通信网络中,数据传输过程的效率和流畅性是最重要的。TCP是支持当今快速互联网的一个方面,通过TCP我们可以准确、快速、良好地交换信息。在本研究中,研究人员对使用随机早期检测队列分析TCP Sack的性能感兴趣。通过这样的研究,期望通过查看数据包传送率、吞吐量、端到端延迟和丢包等参数值来了解TCP Sack的性能。从分析结果可以看出,TCP Sack的端到端时延参数测试性能仍然较差,而TCP Sack的发包率、吞吐量和丢包测试性能已经较好。
{"title":"Analisis Unjuk Kerja TCP Sack Menggunakan Antrian Random Early Detection","authors":"Rinny Asasunnaja, Bambang Sugiantoro","doi":"10.14421/jiska.2022.7.2.75-82","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.75-82","url":null,"abstract":"As time goes by, the current technology is also developing very rapidly, the rapid development of technology, especially on the internet network is also developing so that it is expected to continue to provide the best quality to meet the growing and fast information needs. An internet network is highly demanded of its best quality, one of which is in the spotlight to be developed, namely TCP Transmission Control Protocol. The efficiency and smoothness of the data transmission process is the most important thing in a communication network. TCP is one aspect that supports today’s fast internet, with TCP we can exchange information accurately, quickly, and well. In this study, researchers are interested in analyzing the performance of TCP Sack using the Random Early Detection queue. By doing this research is expected to know the performance of TCP Sack by looking at the parameter values of packet delivery ratio, throughput, end to end delay, and packet drop. Based on the results of the analysis, it can be concluded that end-to-end delay parameter testing on the TCP Sack still has poor performance, while for testing the packet delivery ratio, throughput, and packet drop TCP Sack already has good performance.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45397405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-25DOI: 10.14421/jiska.2022.7.2.134-142
Irhash Ainur Rafiq, Imam Riadi, Herman
The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.
{"title":"Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST","authors":"Irhash Ainur Rafiq, Imam Riadi, Herman","doi":"10.14421/jiska.2022.7.2.134-142","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.134-142","url":null,"abstract":"The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41703624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}