Pub Date : 2019-06-11DOI: 10.14421/JISKA.2018.32-07
Astika Ayuningtyas, Yuliani Indrianingsih
The National Education Standards Agency's (BSNP) curriculum requires in principle the active participation of students in collecting information from various media, including one on the Internet. The role of schools, especially teachers, in providing sources of materials is also very necessary. The Internet is one of the means of information essential to the learning process. Therefore, setting up a digital hardware service network can be an effective learning tool. Digital hardware services can be mutually integrated between schools to obtain a variety of physical resources. The existence of a web service can integrate subject data into each school and can provide distributed information to many providers and service users according to the needs of each user. The Web service is different from a search engine system that does not provide the necessary data integration on hardware service systems that connect data between schools to be distributed to users according to their needs. The web service technology that is built is able to integrate the subject's service material and can be distributed to many users with different needs.
{"title":"WEB SERVICE UNTUK INTEGRASI DATA MATERI PELAJARAN SEKOLAH MENENGAH PERTAMA (SMP) SECARA TERDISTRIBUSI","authors":"Astika Ayuningtyas, Yuliani Indrianingsih","doi":"10.14421/JISKA.2018.32-07","DOIUrl":"https://doi.org/10.14421/JISKA.2018.32-07","url":null,"abstract":"The National Education Standards Agency's (BSNP) curriculum requires in principle the active participation of students in collecting information from various media, including one on the Internet. The role of schools, especially teachers, in providing sources of materials is also very necessary. The Internet is one of the means of information essential to the learning process. Therefore, setting up a digital hardware service network can be an effective learning tool. Digital hardware services can be mutually integrated between schools to obtain a variety of physical resources. The existence of a web service can integrate subject data into each school and can provide distributed information to many providers and service users according to the needs of each user. The Web service is different from a search engine system that does not provide the necessary data integration on hardware service systems that connect data between schools to be distributed to users according to their needs. The web service technology that is built is able to integrate the subject's service material and can be distributed to many users with different needs.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66961041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-10DOI: 10.14421/jiska.2018.31-02
Landung Sudarmana
Proses pengolahan data yang dilakukan di MTs Al-Ghazali Mirit Kebumen sudah berwujud satu lembar nilai yang pengerjaannya menggunakan microsoft excel, dan wali kelas dalam mengolah nilai raport membutuhkan waktu yang lama, karena harus menunggu nilai-nilai dari guru mata pelajaran. Guru mata pelajaran sering kehilangan data nilai siswa dikarenakan banyaknya berkas nilai berbentuk kertas menjadikan tidak terarsip dengan baik seperti ulangan harian, ulangan tengah semester, ulangan akhir semester, dan disisi lain tidak semua siswa bisa menjaga raport dengan baik, sehingga dikhawatirkan bisa menyebabkan raport hilang, basah terkena air, robek yang mengakibatkan kerusakan pada raport. Penggunaan aplikasi terbatas pada Ms. Excel untuk mengolah data nilai yang dihasilkan tidak terintegrasi dengan baik. Penghitungan nilai akhir dilakukan dengan manual sehingga rawan kesalahan dan jika terdapat perubahan data diperlukan banyak bagian yang diubah. Pengumpulan data dilakukan dengan metode observasi dan wawancara, sedangkan pada tahap analisis dan perancangan menggunakan beberapa tahap yaitu menentukan entitas, mendesain relasi antar tabel, dan membuat form, dan terakhir dilakukan tahap implementasi sistem. Penerapan sebuah sistem pengolahan data nilai raport menjadikan solusi tepat guna membantu pengolahan data nilai raport bagi siswa, guru wali kelas, dan guru mata pelajaran. Penggunaan sistem pengolahan data ini mampu memangkas waktu proses pengolahan data nilai menjadi lebih cepat dibandingkan masih menggunakan proses pengolahan nilai secara manual.Kata Kunci : penerapan sistem, pengolahan data, solusi tepat, nilai raport
{"title":"PENERAPAN SISTEM PENGOLAHAN NILAI RAPORT DI MTS AL-GHAZALI MIRIT KEBUMEN BERBASIS WEB","authors":"Landung Sudarmana","doi":"10.14421/jiska.2018.31-02","DOIUrl":"https://doi.org/10.14421/jiska.2018.31-02","url":null,"abstract":"Proses pengolahan data yang dilakukan di MTs Al-Ghazali Mirit Kebumen sudah berwujud satu lembar nilai yang pengerjaannya menggunakan microsoft excel, dan wali kelas dalam mengolah nilai raport membutuhkan waktu yang lama, karena harus menunggu nilai-nilai dari guru mata pelajaran. Guru mata pelajaran sering kehilangan data nilai siswa dikarenakan banyaknya berkas nilai berbentuk kertas menjadikan tidak terarsip dengan baik seperti ulangan harian, ulangan tengah semester, ulangan akhir semester, dan disisi lain tidak semua siswa bisa menjaga raport dengan baik, sehingga dikhawatirkan bisa menyebabkan raport hilang, basah terkena air, robek yang mengakibatkan kerusakan pada raport. Penggunaan aplikasi terbatas pada Ms. Excel untuk mengolah data nilai yang dihasilkan tidak terintegrasi dengan baik. Penghitungan nilai akhir dilakukan dengan manual sehingga rawan kesalahan dan jika terdapat perubahan data diperlukan banyak bagian yang diubah. Pengumpulan data dilakukan dengan metode observasi dan wawancara, sedangkan pada tahap analisis dan perancangan menggunakan beberapa tahap yaitu menentukan entitas, mendesain relasi antar tabel, dan membuat form, dan terakhir dilakukan tahap implementasi sistem. Penerapan sebuah sistem pengolahan data nilai raport menjadikan solusi tepat guna membantu pengolahan data nilai raport bagi siswa, guru wali kelas, dan guru mata pelajaran. Penggunaan sistem pengolahan data ini mampu memangkas waktu proses pengolahan data nilai menjadi lebih cepat dibandingkan masih menggunakan proses pengolahan nilai secara manual.Kata Kunci : penerapan sistem, pengolahan data, solusi tepat, nilai raport","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49210052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-10DOI: 10.14421/JISKA.2018.31-04
Hari Surrisyad, A. Yazid
Artificial Neural Network (ANN) Technology) can help humans in processing data into information with design resembling the performance of the human brain. ANN adopts 5 aspects of human capability: Memorization, Generalization, Efficiency, Accuracy, and Tolerance in its application. ANN proves to be effective in pattern recognition. Researchers developed an application implementing ANN to recognize Java Pegon Letter pattern. The research uses 160 image data, divided into 100 training data (consisting of 5 normal images for each character) and 60 test data (consisting of 1 normal data, 1 data is not complete/corrupt, and 1 data with noise) for each character. The data obtained from the processed captures, so all of data have the same dimensions and size: 100x100 pixels. All data is processed through preprocessing and extraction stages. Furthermore, the data result is used in training stage to recognize the pattern of Java Pegon by applying the Learning Vector Quantization method. The application can recognize Java pegon pattern very well. The application can recognize 100% of training data and test data. This application also has the ability to recognize abnormal data very well, such as data with noise or corrupted data.
{"title":"APLIKASI JARINGAN SYARAF TIRUAN DALAM PENGENALAN POLA HURUF PEGON JAWA","authors":"Hari Surrisyad, A. Yazid","doi":"10.14421/JISKA.2018.31-04","DOIUrl":"https://doi.org/10.14421/JISKA.2018.31-04","url":null,"abstract":"Artificial Neural Network (ANN) Technology) can help humans in processing data into information with design resembling the performance of the human brain. ANN adopts 5 aspects of human capability: Memorization, Generalization, Efficiency, Accuracy, and Tolerance in its application. ANN proves to be effective in pattern recognition. Researchers developed an application implementing ANN to recognize Java Pegon Letter pattern. The research uses 160 image data, divided into 100 training data (consisting of 5 normal images for each character) and 60 test data (consisting of 1 normal data, 1 data is not complete/corrupt, and 1 data with noise) for each character. The data obtained from the processed captures, so all of data have the same dimensions and size: 100x100 pixels. All data is processed through preprocessing and extraction stages. Furthermore, the data result is used in training stage to recognize the pattern of Java Pegon by applying the Learning Vector Quantization method. The application can recognize Java pegon pattern very well. The application can recognize 100% of training data and test data. This application also has the ability to recognize abnormal data very well, such as data with noise or corrupted data.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43690172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-10DOI: 10.14421/JISKA.2018.31-03
Rozzi Kesuma Dinata
Traditional Aceh cuisine is a dish cooked by the people of Aceh and marinade formulated by the people of Aceh. Based on the results of interviews with the community around the traditional dishes are often cooked every day such as "kuah plik/ patarana, kuah asam keu-eung, kuah masak puteh, kuah lemak/santan, kuah masak mirah, boh manok U, asam sabee, bileh payeh, asam u, dan urap Aceh". Nowadays according to the advanced application can help the young mothers who from not able to cook become skilful cooking Aceh cuisine, one of them is from the application of traditional recipe of Aceh-based recipe android so that the young mothers can be assisted in the process of way cooking Aceh cuisine. In implementing the AHP method, the authors use the method on the portion of the cuisine divided into 3 (three) portion division of which the three portion, the seven portions and the 12 portions. We show that results in rankings of the most desirable of the 12th share with the highest ranking value of the calculation are 0.37.
传统的亚齐菜是由亚齐人民烹制的菜肴,并由亚齐人民配制腌料。根据对社区的采访结果,传统菜肴通常每天都会烹饪,如“kuah plik/patarana,kuah asam keu eung,kuah masak puteh,kuah lemak/santan,kuah maak mirah,boh manok U,asam sabee,bileh payeh,asam U,dan urap Aceh”。如今,根据先进的应用程序可以帮助那些不会做饭的年轻妈妈们熟练地烹饪亚齐美食,其中之一就是从传统的亚齐食谱android应用程序中,让年轻妈妈们在烹饪亚齐美食的过程中得到帮助。在实施AHP方法时,作者使用该方法将菜肴的部分划分为3(三)部分,其中3部分、7部分和12部分。我们发现,在计算排名值最高的第12个份额中,最理想的排名结果为0.37。
{"title":"APLIKASI TUTORIAL RESEP MASAKAN TRADISIONAL ACEH BERBASIS ANDROID MENGGUNAKAN METODE ANALYTICAL HIERARCHY PROCESS (AHP)","authors":"Rozzi Kesuma Dinata","doi":"10.14421/JISKA.2018.31-03","DOIUrl":"https://doi.org/10.14421/JISKA.2018.31-03","url":null,"abstract":"Traditional Aceh cuisine is a dish cooked by the people of Aceh and marinade formulated by the people of Aceh. Based on the results of interviews with the community around the traditional dishes are often cooked every day such as \"kuah plik/ patarana, kuah asam keu-eung, kuah masak puteh, kuah lemak/santan, kuah masak mirah, boh manok U, asam sabee, bileh payeh, asam u, dan urap Aceh\". Nowadays according to the advanced application can help the young mothers who from not able to cook become skilful cooking Aceh cuisine, one of them is from the application of traditional recipe of Aceh-based recipe android so that the young mothers can be assisted in the process of way cooking Aceh cuisine. In implementing the AHP method, the authors use the method on the portion of the cuisine divided into 3 (three) portion division of which the three portion, the seven portions and the 12 portions. We show that results in rankings of the most desirable of the 12th share with the highest ranking value of the calculation are 0.37.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44692669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-10DOI: 10.14421/JISKA.2018.31-01
Akhmad Deviyanto, M. Wahyudi
AbstractThis research is made to implement the KNN (K-Nearest Neighbor) algorithm for sentiment analysis Twitter about Jakarta Governor Election 2017. The object is 2000 data tweets in Indonesia collected from Twitter during Januari 2017 using Python package called Twitterscraper. The methode used in sentiment analysis system is KNN with TF-IDF term weighting and Cosine similarity measure. As the test result, the highest accuracy is 67,2% when k=5, the highest precision is 56,94% with k=5, and the highest recall 78,24% with k=15.Keywords : K – Nearest Neighbor, Twitterscraper, TF-IDF, Cosine Similarity Penelitian ini dibuat untuk mengimplementasikan algoritma KNN (K - Nearest Neighbor) dalam analisis sentimen pengguna Twitter tentang topik Pilkada DKI 2017. Data tweet yang digunakan adalah sebanyak 2000 data tweet berbahasa Indonesia yang dikumpulkan selama bulan Januari 2017 menggunakan package Python bernama Twitterscraper. Menggunakan algoritma KNN dengan pembobotan kata TF-IDF dan fungsi Cosine Similarity, akan dilakukan pengklasifikasian nilai sentimen ke dalam dua kelas : positif dan negatif. Dari hasil pengujian diketahui bahwa nilai akurasi terbesar adalah 67,2% ketika k=5, presisi tertinggi 56,94% ketika k=5, dan recall 78,24% dengan k=15.Kata Kunci : K – Nearest Neighbor, Twitterscraper, TF-IDF, Cosine Similarity
{"title":"PENERAPAN ANALISIS SENTIMEN PADA PENGGUNA TWITTER MENGGUNAKAN METODE K-NEAREST NEIGHBOR","authors":"Akhmad Deviyanto, M. Wahyudi","doi":"10.14421/JISKA.2018.31-01","DOIUrl":"https://doi.org/10.14421/JISKA.2018.31-01","url":null,"abstract":"AbstractThis research is made to implement the KNN (K-Nearest Neighbor) algorithm for sentiment analysis Twitter about Jakarta Governor Election 2017. The object is 2000 data tweets in Indonesia collected from Twitter during Januari 2017 using Python package called Twitterscraper. The methode used in sentiment analysis system is KNN with TF-IDF term weighting and Cosine similarity measure. As the test result, the highest accuracy is 67,2% when k=5, the highest precision is 56,94% with k=5, and the highest recall 78,24% with k=15.Keywords : K – Nearest Neighbor, Twitterscraper, TF-IDF, Cosine Similarity Penelitian ini dibuat untuk mengimplementasikan algoritma KNN (K - Nearest Neighbor) dalam analisis sentimen pengguna Twitter tentang topik Pilkada DKI 2017. Data tweet yang digunakan adalah sebanyak 2000 data tweet berbahasa Indonesia yang dikumpulkan selama bulan Januari 2017 menggunakan package Python bernama Twitterscraper. Menggunakan algoritma KNN dengan pembobotan kata TF-IDF dan fungsi Cosine Similarity, akan dilakukan pengklasifikasian nilai sentimen ke dalam dua kelas : positif dan negatif. Dari hasil pengujian diketahui bahwa nilai akurasi terbesar adalah 67,2% ketika k=5, presisi tertinggi 56,94% ketika k=5, dan recall 78,24% dengan k=15.Kata Kunci : K – Nearest Neighbor, Twitterscraper, TF-IDF, Cosine Similarity","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42512655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-10DOI: 10.14421/jiska.2018.31-07
M. U. Siregar, Ahmad Hasan Arif
This research is to analyse the software quality of the Bonus System of PT Surya Pratama Alam Yogyakarta. The goal of this study is to determine the level of users’ satisfaction in the use of the system. Method of analysis used is McCall method which is based on operation products with usability factors. The metrics used are Operability metrics and Training metrics. In the operability metrics, the researchers refer to the J.R. Lewis Questionnaires. Based on the conducted research, researchers can state that the results of software quality measurements of the Bonus System of PT Surya Pratama Alam Yogyakarta is 74.72 % with standard deviation ±14.39 % for Operability metrics and 4.41 seconds with standard deviation ± 1.36 seconds for Training metrics. Based on these two metrics, it can be concluded that the Bonus System of PT Surya Pratama Alam Yogyakarta already has good usability value.
本研究旨在分析日惹PT Surya Pratama Alam奖金系统的软件质量。本研究的目的是确定用户在使用该系统时的满意度。使用的分析方法是麦考尔方法,该方法基于具有可用性因素的操作产品。所使用的度量是可操作性度量和训练度量。在可操作性指标中,研究人员参考了J.R.Lewis问卷。根据所进行的研究,研究人员可以指出,PT Surya Pratama Alam Yogyakarta奖金系统的软件质量测量结果为74.72%,可操作性指标的标准偏差为±14.39%,训练指标的标准差为±1.36秒,为4.41秒。基于这两个指标,可以得出结论,PT Surya Pratama Alam Yogyakarta的奖金系统已经具有良好的可用性价值。
{"title":"A Usage of McCall's Software Quality Analysis on the Bonus System of PT Surya Pratama Alam","authors":"M. U. Siregar, Ahmad Hasan Arif","doi":"10.14421/jiska.2018.31-07","DOIUrl":"https://doi.org/10.14421/jiska.2018.31-07","url":null,"abstract":"This research is to analyse the software quality of the Bonus System of PT Surya Pratama Alam Yogyakarta. The goal of this study is to determine the level of users’ satisfaction in the use of the system. Method of analysis used is McCall method which is based on operation products with usability factors. The metrics used are Operability metrics and Training metrics. In the operability metrics, the researchers refer to the J.R. Lewis Questionnaires. Based on the conducted research, researchers can state that the results of software quality measurements of the Bonus System of PT Surya Pratama Alam Yogyakarta is 74.72 % with standard deviation ±14.39 % for Operability metrics and 4.41 seconds with standard deviation ± 1.36 seconds for Training metrics. Based on these two metrics, it can be concluded that the Bonus System of PT Surya Pratama Alam Yogyakarta already has good usability value.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43452456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-20DOI: 10.14421/JISKA.2018.32-04
jumadil abdul rahman
Correspondence is one activity that can not be separated from an organization, because the mail is one of the important communication media in the organization and communication with other organizations.High-intensity correspondence activities need to have a good management, so that the information conveyed can be delivered properly and safely. This management can also make letters well documented.System development in this research using Extreme Programming method. This method was chosen because the development is still done on a small scale. In addition, this method has a simple process, fast and precise because prioritizing the communication aspects between clients with developers. The built-in information system has features for receiving incoming mail, sending outgoing mail, sending and receiving mail dispositions, and sending and receiving memos. With this system can be effecient mail management and make it easy to manage the data letter itself. Keywords : Agile Process, Letter, Extreme Programming, PHP, Information System
{"title":"Rancang Bangun Sistem Informasi Surat Di Majelis Pendidikan Dasar Dan Menengah Pimpinan Wilayah Muhammadiyah Daerah Istimewa Yogyakarta Menggunakan Metode Extreme Programming","authors":"jumadil abdul rahman","doi":"10.14421/JISKA.2018.32-04","DOIUrl":"https://doi.org/10.14421/JISKA.2018.32-04","url":null,"abstract":"Correspondence is one activity that can not be separated from an organization, because the mail is one of the important communication media in the organization and communication with other organizations.High-intensity correspondence activities need to have a good management, so that the information conveyed can be delivered properly and safely. This management can also make letters well documented.System development in this research using Extreme Programming method. This method was chosen because the development is still done on a small scale. In addition, this method has a simple process, fast and precise because prioritizing the communication aspects between clients with developers. The built-in information system has features for receiving incoming mail, sending outgoing mail, sending and receiving mail dispositions, and sending and receiving memos. With this system can be effecient mail management and make it easy to manage the data letter itself. Keywords : Agile Process, Letter, Extreme Programming, PHP, Information System","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44653446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-28DOI: 10.14421/JISKA.2018.31-06
Risalatul Muawanah, Aulia Faqih Rifa’i
Alquran and hadist are the source of life guidance for muslims, and books of scolars as the proponents. The structure of contents use Arabic language, so studying of Arabic language recommended to all of muslims in islam. Difficutly of understanding structure of Arabic languageis in analyzing Irab. Errors in determining harakat offen occur.This research was conducted tobuild the system in determining Irob position consisting of from, category, Irob and position ofkalimah by implemting Artificial Intelligence especially with Breadth First Search.Refer to theresult of the test that research do with so samples of simple sentence, about 90% this systemis able run well. The result test questionnaire , useful from 35 respondents showed 41.0% ofthem strongly agreed, 44.5% agreed, and 14.3% choosen neutral. Keywords : Al Imrithi, Breadth First Search, Arabic Language, Irab Analysis
{"title":"Analisis Kedudukan I’rab Kalimah Bahasa Arab Pada Kitab Al - Imrithi Menggunakan Algoritma Breadth First Search (BFS)","authors":"Risalatul Muawanah, Aulia Faqih Rifa’i","doi":"10.14421/JISKA.2018.31-06","DOIUrl":"https://doi.org/10.14421/JISKA.2018.31-06","url":null,"abstract":"Alquran and hadist are the source of life guidance for muslims, and books of scolars as the proponents. The structure of contents use Arabic language, so studying of Arabic language recommended to all of muslims in islam. Difficutly of understanding structure of Arabic languageis in analyzing Irab. Errors in determining harakat offen occur.This research was conducted tobuild the system in determining Irob position consisting of from, category, Irob and position ofkalimah by implemting Artificial Intelligence especially with Breadth First Search.Refer to theresult of the test that research do with so samples of simple sentence, about 90% this systemis able run well. The result test questionnaire , useful from 35 respondents showed 41.0% ofthem strongly agreed, 44.5% agreed, and 14.3% choosen neutral. Keywords : Al Imrithi, Breadth First Search, Arabic Language, Irab Analysis","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45515079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-27DOI: 10.14421/JISKA.2017.22-07
Tsuraya Ats Tsauri, Nurochman Nurochman
Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm. Brute force attack and exhaustive attack is a technique of kriptanalisis vigenere ciphers, but less optimal in result. In my research this time proposed a way of solving the secret key (Cryptanalysis), using a genetic algorithm on text Indonesia-speaking ciphers. .The first step in this study performed a chromosome design would be the length of the keyword, the method used is the coincidence index (IOC), the IOC values with text Indonesian is 0,075. To get the value of fitness done the search weights by comparison Word decryption of keywords with Indonesian Language Dictionary. Genetic algorithms will seek all possible keywords, there are genetic algorithms in the process of reproduction includes crossover, mutation and elitisme. There are parameters that are included in the process of a keyword search that is the value of the probability of crossover, mutation probability and population, number of the parameter that you want to optimize to get keywordsThis analysis is performed on the five scenarios with any combination of parameters, number of characters chipertext and two types of different keywords. After 1000 times testing with a combination of parameters generated 467 the data successfully guessing keywords within approximately 60 minutes. With the testing of two different keywords and two different ciphers text amount done by as much as five times the test showed that both have the value of the average test time the fastest standard deviation value. After an analysis of the results of the research, the optimal parameters is obtained with a value Pc 0.09, Pm 0.3 and Pop_size 20.Keywords : Cryptanalysis, Genetic Algorithm, Vigenere Chiper, Index Coincidence.
{"title":"Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci","authors":"Tsuraya Ats Tsauri, Nurochman Nurochman","doi":"10.14421/JISKA.2017.22-07","DOIUrl":"https://doi.org/10.14421/JISKA.2017.22-07","url":null,"abstract":"Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm. Brute force attack and exhaustive attack is a technique of kriptanalisis vigenere ciphers, but less optimal in result. In my research this time proposed a way of solving the secret key (Cryptanalysis), using a genetic algorithm on text Indonesia-speaking ciphers. .The first step in this study performed a chromosome design would be the length of the keyword, the method used is the coincidence index (IOC), the IOC values with text Indonesian is 0,075. To get the value of fitness done the search weights by comparison Word decryption of keywords with Indonesian Language Dictionary. Genetic algorithms will seek all possible keywords, there are genetic algorithms in the process of reproduction includes crossover, mutation and elitisme. There are parameters that are included in the process of a keyword search that is the value of the probability of crossover, mutation probability and population, number of the parameter that you want to optimize to get keywordsThis analysis is performed on the five scenarios with any combination of parameters, number of characters chipertext and two types of different keywords. After 1000 times testing with a combination of parameters generated 467 the data successfully guessing keywords within approximately 60 minutes. With the testing of two different keywords and two different ciphers text amount done by as much as five times the test showed that both have the value of the average test time the fastest standard deviation value. After an analysis of the results of the research, the optimal parameters is obtained with a value Pc 0.09, Pm 0.3 and Pop_size 20.Keywords : Cryptanalysis, Genetic Algorithm, Vigenere Chiper, Index Coincidence.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48324803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.14421/jiska.2017.21-01
Mochamad Bilal, Teguh Andrianto
Alamat IP versi 6 dalam dunia jaringan komputer dimunculkan untuk mengatasi keterbatasan alokasi alamat IP versi 4, (Deering & Hinden, 1998). Diperlukan langkah secara bertahap untuk transisi dari IPv4 menuju IPv6. Salah satu metode transisi IPv4 menuju IPv6 adalah tunneling IPv6 over IPv4 (IPv6IP), (Amoss & Minoli, 2008). Terdapat beberapa macam tunneling. Penelitian ini bertujuan untuk menguji kinerja dari IPv4 murni, IPv6 murni, tunneling IPv6IP manual, auto, dan GRE dengan menggunakan aplikasi FTP sebagai sarana pengujian sehingga bisa didapatkan konfigurasi terbaik untuk aplikasi FTP. Penelitian dilakukan dengan cara menghubungkan komputer server dan client yang dipisahkan dengan 5 buah router cisco. Alamat hubungan antara komputer dengan ruter menggunakan IPv6 sedangkan hubungan antar router menggunakan IPv4. Setiap router yang terhubung dengan komputer dilakukan setting tunneling. Pada komputer server dijalakan software FTP server dan pada komputer client dilakukan download 10 file dengan ukuran yang berbeda-beda. Selama proses download dilakukan analisis kinerja tunneling meliputi Throughput, Goodput, dan Delay.
{"title":"Pemilihan Tunneling IPv6IP pada FTP untuk Konfigurasi Transisi IPv4 Ke IPv6 Terbaik","authors":"Mochamad Bilal, Teguh Andrianto","doi":"10.14421/jiska.2017.21-01","DOIUrl":"https://doi.org/10.14421/jiska.2017.21-01","url":null,"abstract":"Alamat IP versi 6 dalam dunia jaringan komputer dimunculkan untuk mengatasi keterbatasan alokasi alamat IP versi 4, (Deering & Hinden, 1998). Diperlukan langkah secara bertahap untuk transisi dari IPv4 menuju IPv6. Salah satu metode transisi IPv4 menuju IPv6 adalah tunneling IPv6 over IPv4 (IPv6IP), (Amoss & Minoli, 2008). Terdapat beberapa macam tunneling. Penelitian ini bertujuan untuk menguji kinerja dari IPv4 murni, IPv6 murni, tunneling IPv6IP manual, auto, dan GRE dengan menggunakan aplikasi FTP sebagai sarana pengujian sehingga bisa didapatkan konfigurasi terbaik untuk aplikasi FTP. Penelitian dilakukan dengan cara menghubungkan komputer server dan client yang dipisahkan dengan 5 buah router cisco. Alamat hubungan antara komputer dengan ruter menggunakan IPv6 sedangkan hubungan antar router menggunakan IPv4. Setiap router yang terhubung dengan komputer dilakukan setting tunneling. Pada komputer server dijalakan software FTP server dan pada komputer client dilakukan download 10 file dengan ukuran yang berbeda-beda. Selama proses download dilakukan analisis kinerja tunneling meliputi Throughput, Goodput, dan Delay. ","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42587944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}