首页 > 最新文献

JISKA Jurnal Informatika Sunan Kalijaga最新文献

英文 中文
Pemilihan Lokasi Budidaya Rumput Laut Menggunakan Metode Analytical Hierarchy Process (AHP) dan Simple Additive Weighting (SAW)
Pub Date : 2022-05-25 DOI: 10.14421/jiska.2022.7.2.122-133
Sri Rahayu, Hamdani Hamdani, Ramadiani Ramadiani
One of the professions in the marine sector that is mostly occupied by people living in coastal areas is seaweed cultivation. Seaweed is one of the marine product commodities with great potential to be developed in Indonesia because it has high economic value. One of the areas that are included as producers of Eucheuma Cottonii seaweed is Nunukan Island, which is located in Nunukan Regency, North Kalimantan Province. The main factor that determines success in seaweed cultivation activities is the selection of land locations. Errors in site selection can lead to crop failure and low quality of the seaweed produced. The purpose of this study is to create a decision support system to facilitate and assist the community in selecting the best location for seaweed cultivation quickly and precisely according to the criteria using the Analytical Hierarchy Process (AHP) method to calculate the criteria weights and the Simple Additive Weighting (SAW) method for performing alternative ratings. The criteria used were 7, namely depth, pH, current speed, brightness, temperature, salinity, and dissolved oxygen, while alternative data were 11 points of seaweed cultivation locations on Nunukan Island. Based on the results of the implementation of the two methods, recommendations for two locations for seaweed cultivation are Sei Banjar I and Sei Banjar II with the same preference value of 0.937 which is the highest value compared to other alternatives.
在海洋部门,主要由沿海地区居民从事的职业之一是海藻养殖。海藻具有较高的经济价值,是印尼极具开发潜力的海产品商品之一。努努坎岛(Nunukan Island)位于北加里曼丹省努努坎摄县,是被列为真草(Eucheuma Cottonii)生产商的地区之一。决定海藻养殖活动成功与否的主要因素是土地位置的选择。选址上的错误可能导致作物歉收和生产的海藻质量低下。本研究的目的是建立一个决策支持系统,以方便和协助社区根据标准快速准确地选择最佳海藻养殖地点,使用层次分析法(AHP)方法计算标准权重,使用简单加性加权法(SAW)进行替代评级。使用的标准有7个,即深度、pH值、水流速度、亮度、温度、盐度和溶解氧,而替代数据是Nunukan岛上11个海藻养殖地点。根据两种方法的实施结果,推荐的两个海藻养殖地点为Sei Banjar I和Sei Banjar II,两者的偏好值相同,均为0.937,是其他备选地点中最高的。
{"title":"Pemilihan Lokasi Budidaya Rumput Laut Menggunakan Metode Analytical Hierarchy Process (AHP) dan Simple Additive Weighting (SAW)","authors":"Sri Rahayu, Hamdani Hamdani, Ramadiani Ramadiani","doi":"10.14421/jiska.2022.7.2.122-133","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.122-133","url":null,"abstract":"One of the professions in the marine sector that is mostly occupied by people living in coastal areas is seaweed cultivation. Seaweed is one of the marine product commodities with great potential to be developed in Indonesia because it has high economic value. One of the areas that are included as producers of Eucheuma Cottonii seaweed is Nunukan Island, which is located in Nunukan Regency, North Kalimantan Province. The main factor that determines success in seaweed cultivation activities is the selection of land locations. Errors in site selection can lead to crop failure and low quality of the seaweed produced. The purpose of this study is to create a decision support system to facilitate and assist the community in selecting the best location for seaweed cultivation quickly and precisely according to the criteria using the Analytical Hierarchy Process (AHP) method to calculate the criteria weights and the Simple Additive Weighting (SAW) method for performing alternative ratings. The criteria used were 7, namely depth, pH, current speed, brightness, temperature, salinity, and dissolved oxygen, while alternative data were 11 points of seaweed cultivation locations on Nunukan Island. Based on the results of the implementation of the two methods, recommendations for two locations for seaweed cultivation are Sei Banjar I and Sei Banjar II with the same preference value of 0.937 which is the highest value compared to other alternatives.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41856616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementasi Algoritma K-Means Clustering Seleksi Siswa Berprestasi Berdasarkan Keaktifan dalam Proses Pembelajaran 基于学习过程的积极参与,k -均值算法的实现
Pub Date : 2022-05-25 DOI: 10.14421/jiska.2022.7.2.111-121
Falih Pramataning Dewi, Priskila Siwi Aryni, Yuyun Umaidah
The learning process through various interactions and learning experiences has a considerable influence on developing student activity to improve the quality of education. The teacher is the most important factor in determining the success of students in the implementation of the process. The development of the quality and activeness of students in learning is a basic element as a form of success in the learning process which of course not all students have a level of speed in understanding material. This is a concern for schools in improving the quality of education. The purpose of this study was to classify the level of activity of students at SMP ABC using the correlation between grades and the level of student activity who would be recommended to take part in competitions or prospective scholarship recipients. The data source that we used in this study came from the State Junior High School ABC which consists of several variables, including student attendance data, academic scores, psychomotor scores, and affective values. The method used in this research is the Clustering method with the K-means Algorithm. The results of this study can be grouped into 3 clusters including cluster 0 indicating active students as many as 30 students, cluster 1 showing inactive students as many as 8 students, and cluster 2 indicating less active students as many as 21 students.
通过各种互动和学习经历的学习过程对发展学生活动以提高教育质量有着相当大的影响。教师是决定学生在实施过程中成功与否的最重要因素。学生学习质量和积极性的发展是学习过程中成功的一个基本要素,当然,并非所有学生都能快速理解材料。这是学校在提高教育质量方面所关心的问题。本研究的目的是利用成绩与推荐参加比赛或潜在奖学金获得者的学生活动水平之间的相关性,对SMP ABC学生的活动水平进行分类。我们在这项研究中使用的数据来源来自州立初中ABC,该数据由几个变量组成,包括学生出勤率数据、学业成绩、心理运动成绩和情感价值观。本研究所使用的方法是使用K-means算法的聚类方法。这项研究的结果可以分为3个集群,其中集群0表示活跃学生多达30名,集群1表示不活跃学生多达8名,集群2表示不太活跃的学生多达21名。
{"title":"Implementasi Algoritma K-Means Clustering Seleksi Siswa Berprestasi Berdasarkan Keaktifan dalam Proses Pembelajaran","authors":"Falih Pramataning Dewi, Priskila Siwi Aryni, Yuyun Umaidah","doi":"10.14421/jiska.2022.7.2.111-121","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.111-121","url":null,"abstract":"The learning process through various interactions and learning experiences has a considerable influence on developing student activity to improve the quality of education. The teacher is the most important factor in determining the success of students in the implementation of the process. The development of the quality and activeness of students in learning is a basic element as a form of success in the learning process which of course not all students have a level of speed in understanding material. This is a concern for schools in improving the quality of education. The purpose of this study was to classify the level of activity of students at SMP ABC using the correlation between grades and the level of student activity who would be recommended to take part in competitions or prospective scholarship recipients. The data source that we used in this study came from the State Junior High School ABC which consists of several variables, including student attendance data, academic scores, psychomotor scores, and affective values. The method used in this research is the Clustering method with the K-means Algorithm. The results of this study can be grouped into 3 clusters including cluster 0 indicating active students as many as 30 students, cluster 1 showing inactive students as many as 8 students, and cluster 2 indicating less active students as many as 21 students.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44303260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Respons Pengguna Instagram terhadap Periklanan Paid Promote di Instagram dengan Metode CRI Berkonsep AISAS Instagram用户对CRI推广方法在Instagram上对付费广告广告的反应是AISAS
Pub Date : 2022-05-25 DOI: 10.14421/jiska.2022.7.2.100-110
Bekti Cahyo Hidayanto, Jessica Patricia Halim, Aura Febriyanti Puspa Sari, M. Alrifqi, Nur Aini Rakhmawati, Izzat Aulia Akbar
Instagram is a social media that has a shopping feature. Instagram can be used for digital advertising, and among them is paid promotion. Paid promotion is a service to promote goods/services on social media. This service offers advantages such as a broad market segment, low cost, and easy technical implementation. Many online shops are willing to spend a lot of money to be promoted. Unfortunately, online shop owners usually do not know how Instagram users respond when they see a paid promotion. Therefore, the purpose of this study is to find out how Instagram users respond to the paid promotion on Instagram. User response data was taken from a questionnaire, then analyzed using the CRI method with the AISAS concept by using 4 models: AISAS, AISS, AIAS, and AIS. As the result, four models showed the CRI is below 50% (AISAS: 2,8%; AIAS: 3%; AISS: 4,5%; AIS: 8,4%). Considering the result, the respondents do not give a good response to the paid promotion service.
Instagram是一个具有购物功能的社交媒体。Instagram可以用于数字广告,其中包括付费推广。付费推广是在社交媒体上推广商品/服务的一种服务。该服务具有广泛的市场细分、低成本和易于技术实现等优点。许多网上商店愿意花很多钱来推广。不幸的是,网店老板通常不知道Instagram用户看到付费推广时的反应。因此,本研究的目的是了解Instagram用户对Instagram上的付费推广的反应。从问卷中获取用户反馈数据,采用基于AISAS概念的CRI方法,采用AISAS、AISS、AIAS和AIS 4个模型进行分析。结果表明,4个模型的CRI均低于50% (AISAS: 2.8%;公司:3%;中特别有指导性:4,5%;AIS: 8 4%)。考虑到结果,受访者对付费推广服务的反应并不好。
{"title":"Respons Pengguna Instagram terhadap Periklanan Paid Promote di Instagram dengan Metode CRI Berkonsep AISAS","authors":"Bekti Cahyo Hidayanto, Jessica Patricia Halim, Aura Febriyanti Puspa Sari, M. Alrifqi, Nur Aini Rakhmawati, Izzat Aulia Akbar","doi":"10.14421/jiska.2022.7.2.100-110","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.100-110","url":null,"abstract":"Instagram is a social media that has a shopping feature. Instagram can be used for digital advertising, and among them is paid promotion. Paid promotion is a service to promote goods/services on social media. This service offers advantages such as a broad market segment, low cost, and easy technical implementation. Many online shops are willing to spend a lot of money to be promoted. Unfortunately, online shop owners usually do not know how Instagram users respond when they see a paid promotion. Therefore, the purpose of this study is to find out how Instagram users respond to the paid promotion on Instagram. User response data was taken from a questionnaire, then analyzed using the CRI method with the AISAS concept by using 4 models: AISAS, AISS, AIAS, and AIS. As the result, four models showed the CRI is below 50% (AISAS: 2,8%; AIAS: 3%; AISS: 4,5%; AIS: 8,4%). Considering the result, the respondents do not give a good response to the paid promotion service.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48744722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study of K-Means Clustering Algorithm and K-Medoids Clustering in Student Data Clustering 学生数据聚类中K-Means聚类算法与K-Medoids聚类的比较研究
Pub Date : 2022-05-25 DOI: 10.14421/jiska.2022.7.2.91-99
Qomariyah, M. U. Siregar
Universities as educational institutions have very large amounts of academic data which may not be used properly. The data needs to be analyzed to produce information that can map the distribution of students. Student academic data processing utilizes data mining processes using clustering techniques, K-Means and K-Medoids. This study aims to implement and analyze the comparison of which algorithm is more optimal based on the cluster validation test with the Davies Bouldin Index. The data used are academic data of UIN Sunan Kalijaga students in the 2013-2015 batch. In the k-Means process, the best number of clusters is 5 with a DBI value of 0.781. In the k-Medoids process, the best number of clusters is 3 with a DBI value of 0.929. Based on the value of the DBI validation test, the k-Means algorithm is more optimal than the k-Medoids. So that the cluster of students with the highest average GPA of 3,325 is 401 students.
大学作为教育机构,拥有大量的学术数据,这些数据可能没有得到正确的使用。需要对这些数据进行分析,以产生可以映射学生分布的信息。学生学术数据处理利用数据挖掘过程使用聚类技术,K-Means和K-Medoids。本研究旨在实现并分析基于聚类验证测试的算法与Davies Bouldin指数哪种算法更优的比较。使用的数据为2013-2015年unin Sunan Kalijaga学生的学业数据。在k-Means过程中,最佳聚类数为5个,DBI值为0.781。在k- mediids过程中,集群的最佳数量为3个,DBI值为0.929。从DBI验证测试的结果来看,k-Means算法比k-Medoids算法更优。所以平均绩点最高的学生群是401人,平均绩点是3325。
{"title":"Comparative Study of K-Means Clustering Algorithm and K-Medoids Clustering in Student Data Clustering","authors":"Qomariyah, M. U. Siregar","doi":"10.14421/jiska.2022.7.2.91-99","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.91-99","url":null,"abstract":"Universities as educational institutions have very large amounts of academic data which may not be used properly. The data needs to be analyzed to produce information that can map the distribution of students. Student academic data processing utilizes data mining processes using clustering techniques, K-Means and K-Medoids. This study aims to implement and analyze the comparison of which algorithm is more optimal based on the cluster validation test with the Davies Bouldin Index. The data used are academic data of UIN Sunan Kalijaga students in the 2013-2015 batch. In the k-Means process, the best number of clusters is 5 with a DBI value of 0.781. In the k-Medoids process, the best number of clusters is 3 with a DBI value of 0.929. Based on the value of the DBI validation test, the k-Means algorithm is more optimal than the k-Medoids. So that the cluster of students with the highest average GPA of 3,325 is 401 students.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41559135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology 中国国家标准技术研究院
Pub Date : 2022-05-25 DOI: 10.14421/jiska.2022.7.2.83-90
Imam Riadi, Sunardi, F. Nani
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
如今,信息技术的发展正在迅速发展,尤其是电子邮件。电子邮件成为了几乎全世界都拥有的工具。电子邮件是信息和通信发展的结果之一。电子邮件被广泛用于发送和接收数据来交换信息,如文档文件、图片、信件等。经常发生在电子邮件中的犯罪就到此为止了。其中经常发生的电子邮件犯罪是电子邮件欺骗。电子邮件欺骗是发生在电子邮件头部的伪造。因此,电子邮件被当作有效的电子邮件发送。电子邮件欺骗通常用于垃圾邮件活动。网络犯罪必须留下IP地址、发件人邮箱、邮件发送时间等证据。这项研究将对电子邮件欺骗进行取证。该研究使用了实时取证方法,即计算机在开机状态下使用。该研究还使用了NIST(美国国家标准技术研究所)的研究流程。将被分析的电子邮件是在电子邮件头部分使用3个工具,即跟踪电子邮件分析器,电子邮件档案,和邮件头分析。此分析将比较并检查使用这些工具的电子邮件标题的准确性。怀疑电子邮件欺骗将证明使用工具。基于'收到的'和'消息id '头。根据分析结果,分析后符合该值的工具为tracer email分析工具。
{"title":"Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology","authors":"Imam Riadi, Sunardi, F. Nani","doi":"10.14421/jiska.2022.7.2.83-90","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.2.83-90","url":null,"abstract":"Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48000656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analisis Topik Tagar Covidindonesia pada Instagram Menggunakan Latent Dirichlet Allocation Instagram上使用潜在Dirichlet分配的Covidinonesia标签主题分析
Pub Date : 2022-01-25 DOI: 10.14421/jiska.2022.7.1.1-9
Kevin Rafi Adjie Putra Santoso, Asmaul Husna, Nadia Widyawati Putri, Nur Aini Rakhmawati
In this era, technology is increasingly sophisticated, this is evidenced by the number of people using the internet via cell phones, laptops, and other communication tools. One of the developments of this technology is social media such as Instagram. Along with technological developments, Instagram users can upload and share photos and videos using hashtags (#) so that other users can find the results of their posts. Instagram has now become one of the social media used by more than 1 billion people in the world. In this study, the authors wanted to know the dominant topics discussed through the hashtag covidindonesia. This research was conducted using the Latent Dirichlet Allocation (LDA) method. The analysis was carried out after doing text mining on 84 captions from various users on Instagram. To determine the optimal number of topics, by looking at the value of perplexity and topic coherence. The results obtained are the top 5 topics that are the content material in the uploaded video. These topics include covidindonesia, covid_19, pandemics in Indonesia, and discussion of covid-19 virus mutations.
在这个时代,技术越来越复杂,通过手机、笔记本电脑和其他通信工具使用互联网的人数证明了这一点。这项技术的发展之一是社交媒体,如Instagram。随着技术的发展,Instagram用户可以使用标签(#)上传和分享照片和视频,这样其他用户就可以找到他们帖子的结果。Instagram现在已经成为全球超过10亿人使用的社交媒体之一。在这项研究中,作者想知道通过标签covididonesia讨论的主要话题。这项研究是使用潜在狄利克雷分配(LDA)方法进行的。该分析是在对Instagram上不同用户的84个字幕进行文本挖掘后进行的。通过考察困惑和话题连贯的价值来确定话题的最佳数量。获得的结果是作为上传视频中的内容材料的前5个主题。这些主题包括冠状病毒病、冠状病毒19、印度尼西亚的流行病以及对新冠肺炎病毒突变的讨论。
{"title":"Analisis Topik Tagar Covidindonesia pada Instagram Menggunakan Latent Dirichlet Allocation","authors":"Kevin Rafi Adjie Putra Santoso, Asmaul Husna, Nadia Widyawati Putri, Nur Aini Rakhmawati","doi":"10.14421/jiska.2022.7.1.1-9","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.1.1-9","url":null,"abstract":"In this era, technology is increasingly sophisticated, this is evidenced by the number of people using the internet via cell phones, laptops, and other communication tools. One of the developments of this technology is social media such as Instagram. Along with technological developments, Instagram users can upload and share photos and videos using hashtags (#) so that other users can find the results of their posts. Instagram has now become one of the social media used by more than 1 billion people in the world. In this study, the authors wanted to know the dominant topics discussed through the hashtag covidindonesia. This research was conducted using the Latent Dirichlet Allocation (LDA) method. The analysis was carried out after doing text mining on 84 captions from various users on Instagram. To determine the optimal number of topics, by looking at the value of perplexity and topic coherence. The results obtained are the top 5 topics that are the content material in the uploaded video. These topics include covidindonesia, covid_19, pandemics in Indonesia, and discussion of covid-19 virus mutations.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49220227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) 马来西亚入侵检测系统(IDS)
Pub Date : 2022-01-25 DOI: 10.14421/jiska.2022.7.1.46-55
Tri Widodo, Adam Sekti Aji
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
入侵检测系统(IDS)是保证计算机安全的技术之一。入侵检测系统是在发生计算机网络攻击时的早期检测系统。当发生计算机网络攻击时,IDS会向计算机网络管理员发出警报。IDS还记录所有旨在破坏计算机网络和其他计算机网络攻击的企图和活动。本研究的目的是在网络系统上实施入侵检测,并分析入侵检测日志,以确定不同类型的计算机网络攻击。IDS上的日志将被分析,并将被用作提高计算机网络安全性的杠杆。本研究采用Pilli、Joshi和Niyogi提出的网络法医调查框架进行。网络取证调查框架的各个阶段用于执行网络模拟、分析和调查,以确定计算机网络攻击的类型。结果表明,网络取证调查框架简化了网络攻击发生时的调查过程。当计算机网络中存在IDS等网络安全支持应用时,可以有效地使用网络取证调查框架。IDS是检测网络扫描活动和DOS攻击的有效手段。IDS向管理员发出警报,因为存在违反IDS规则的活动。
{"title":"Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)","authors":"Tri Widodo, Adam Sekti Aji","doi":"10.14421/jiska.2022.7.1.46-55","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.1.46-55","url":null,"abstract":"Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48191947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algoritma K-Nearest Neighbor untuk Memprediksi Prestasi Mahasiswa Berdasarkan Latar Belakang Pendidikan dan Ekonomi 邻近的K-Nearest算法根据教育和经济背景来预测学生的成就
Pub Date : 2022-01-25 DOI: 10.14421/jiska.2022.7.1.56-67
Daru Prasetyawan, Rahmadhan Gatra
Student academic performance is one measure of success in higher education. Prediction of student academic performance is important because it can help in decision-making. K-Nearest Neighbor (K-NN) algorithm is a method that can be used to predict it. Normalization is needed to scale the attribute value, so the data are in a smaller range than the actual data. Feature selection is used to eliminate irrelevant features. Data cleaning from outliers in the dataset aims to delete data that can affect the classification process. In the classification process, the dataset is divided into a training set by 80% and a validation set by 20% using the cross-validation method. The classification model that is formed is tested using data that is separate from the training data and is evaluated using a confusion matrix. As an evaluation, the K-NN model has 95.85% average accuracy, 95.97% average precision, and 95.84% average recall.
学生的学习成绩是衡量高等教育成功与否的标准之一。预测学生的学习成绩很重要,因为它有助于决策。k -最近邻(K-NN)算法是一种可以用来对其进行预测的方法。需要规范化来缩放属性值,因此数据的范围比实际数据的范围小。特征选择用于消除不相关的特征。从数据集中的异常值中清除数据的目的是删除可能影响分类过程的数据。在分类过程中,使用交叉验证方法将数据集分成80%的训练集和20%的验证集。所形成的分类模型使用与训练数据分离的数据进行测试,并使用混淆矩阵进行评估。作为评价,K-NN模型的平均准确率为95.85%,平均精度为95.97%,平均召回率为95.84%。
{"title":"Algoritma K-Nearest Neighbor untuk Memprediksi Prestasi Mahasiswa Berdasarkan Latar Belakang Pendidikan dan Ekonomi","authors":"Daru Prasetyawan, Rahmadhan Gatra","doi":"10.14421/jiska.2022.7.1.56-67","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.1.56-67","url":null,"abstract":"Student academic performance is one measure of success in higher education. Prediction of student academic performance is important because it can help in decision-making. K-Nearest Neighbor (K-NN) algorithm is a method that can be used to predict it. Normalization is needed to scale the attribute value, so the data are in a smaller range than the actual data. Feature selection is used to eliminate irrelevant features. Data cleaning from outliers in the dataset aims to delete data that can affect the classification process. In the classification process, the dataset is divided into a training set by 80% and a validation set by 20% using the cross-validation method. The classification model that is formed is tested using data that is separate from the training data and is evaluated using a confusion matrix. As an evaluation, the K-NN model has 95.85% average accuracy, 95.97% average precision, and 95.84% average recall.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48635187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher 基于Vigenere密码算法的数字图像安全
Pub Date : 2022-01-25 DOI: 10.14421/jiska.2022.7.1.33-45
Imam Riadi, Abdul Fadlil, Fahmi Auliya Tsani
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher. This classic algorithm is classified as a polyalphabetic substitution cipher-based algorithm. Therefore, this algorithm tends to only handle data in text form. By this research, a console-based application has been developed which is made from PHP programming language to be able to encrypt and decrypt digital image media using Vigenere Cipher. The encryption process is done by first converting a digital image into a base64 encoding format so that the encryption process can be carried out using the tabula recta containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out by restoring the encrypted file using radix-64 letters, so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. The encryption process took less than 0,2 seconds and 0.19 seconds for the decryption process and 33.34% for average file size addition on the encrypted file from the original file size. Testing on ten different images with different sizes and dimensions showed a 100% success rate which means this research was successfully carried out.
密码学是数据安全中最流行的方法之一,它使数据很难读取甚至不可读。密码学中一种著名的技术或算法是Vigenere密码。该经典算法被归类为基于多字母替换密码的算法。因此,该算法倾向于只处理文本形式的数据。通过本研究,开发了一个基于控制台的应用程序,该应用程序由PHP编程语言制成,能够使用Vigenere密码对数字图像媒体进行加密和解密。加密过程是通过首先将数字图像转换成base64编码格式来完成的,使得加密过程可以使用包含用于base64编码的基数-64字母排列的矩形表来执行。相反,解密过程是通过使用基数-64字母恢复加密文件来执行的,因此我们获得base64编码格式的图像文件。然后,将具有base64编码格式的图像解码为原始文件。加密过程耗时小于0.2秒,解密过程耗时0.19秒,加密文件的平均文件大小从原始文件大小增加到33.34%。对10张不同大小和尺寸的图像进行测试,结果显示成功率为100%,这意味着这项研究成功进行。
{"title":"Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher","authors":"Imam Riadi, Abdul Fadlil, Fahmi Auliya Tsani","doi":"10.14421/jiska.2022.7.1.33-45","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.1.33-45","url":null,"abstract":"Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher. This classic algorithm is classified as a polyalphabetic substitution cipher-based algorithm. Therefore, this algorithm tends to only handle data in text form. By this research, a console-based application has been developed which is made from PHP programming language to be able to encrypt and decrypt digital image media using Vigenere Cipher. The encryption process is done by first converting a digital image into a base64 encoding format so that the encryption process can be carried out using the tabula recta containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out by restoring the encrypted file using radix-64 letters, so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. The encryption process took less than 0,2 seconds and 0.19 seconds for the decryption process and 33.34% for average file size addition on the encrypted file from the original file size. Testing on ten different images with different sizes and dimensions showed a 100% success rate which means this research was successfully carried out.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45210660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pengenalan Pola Huruf Hijaiyah dengan Metode Local Binary Pattern Menggunakan Algoritma Fuzzy K-Nearest Neighbor
Pub Date : 2022-01-25 DOI: 10.14421/jiska.2022.7.1.68-74
Asdar, R. Saputra, Ika Purwanti Ningrum
A letter is a form, stroke, or symbol writing system. Any information obtained from a sentence depends on the letters are written clearly. Finding written hijaiyah letters can be recognized by humans, but will be difficult if a computer tries to recognize them. The reason system is difficult is because of the large variety of different letters. This study aims to make it easier for someone to learn to recognize hijaiyah letters by using the Local Binary Pattern method for the feature extraction process. The results of feature extraction will take the maximum value of the histogram of each letter. And results feature extraction will be carried out classification process using the Fuzzy K-Nearest Neighbor algorithm until finally hijaiyah letters can be recognized. Based on experimental results that have been carried out, the highest level of accuracy is obtained when the amount of training data is 154 data and the number of data testing is 29 data, resulting in an accuracy rate of 96.55%.
字母是一种形式、笔画或符号书写系统。从句子中获得的任何信息都取决于字母写得清楚。人类可以识别书写的hijaiyah字母,但如果计算机试图识别它们,则会很困难。系统之所以困难,是因为不同的字母种类繁多。本研究旨在通过使用局部二进制模式方法进行特征提取过程,使人们更容易学会识别hijaiyah字母。特征提取的结果将取每个字母的直方图的最大值。结果特征提取将使用模糊K-最近邻算法进行分类处理,直到最终识别出hijaiyah字母。基于已经进行的实验结果,当训练数据量为154个数据并且数据测试的数量为29个数据时,获得了最高水平的准确度,导致96.55%的准确率。
{"title":"Pengenalan Pola Huruf Hijaiyah dengan Metode Local Binary Pattern Menggunakan Algoritma Fuzzy K-Nearest Neighbor","authors":"Asdar, R. Saputra, Ika Purwanti Ningrum","doi":"10.14421/jiska.2022.7.1.68-74","DOIUrl":"https://doi.org/10.14421/jiska.2022.7.1.68-74","url":null,"abstract":"A letter is a form, stroke, or symbol writing system. Any information obtained from a sentence depends on the letters are written clearly. Finding written hijaiyah letters can be recognized by humans, but will be difficult if a computer tries to recognize them. The reason system is difficult is because of the large variety of different letters. This study aims to make it easier for someone to learn to recognize hijaiyah letters by using the Local Binary Pattern method for the feature extraction process. The results of feature extraction will take the maximum value of the histogram of each letter. And results feature extraction will be carried out classification process using the Fuzzy K-Nearest Neighbor algorithm until finally hijaiyah letters can be recognized. Based on experimental results that have been carried out, the highest level of accuracy is obtained when the amount of training data is 154 data and the number of data testing is 29 data, resulting in an accuracy rate of 96.55%.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44676408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JISKA Jurnal Informatika Sunan Kalijaga
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1