{"title":"Multiclass Email Classification by Using Ensemble Bagging and Ensemble Voting","authors":"Ali Helmut, D. Murdiansyah","doi":"10.33387/jiko.v6i2.6394","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6394","url":null,"abstract":"Email is a common communication technology in modern life. The more emails we receive, the more difficult and time consuming it is to sort them out. One solution to overcome this problem is to create a system using machine learning to sort emails. Each method of machine learning and data sampling result in different performance. Ensemble learning is a method of combining several learning models into one model to get better performance. In this study we tried to create a multiclass email classification system by combining learning models, data sampling, and several data classes to obtain the effect of Ensemble Bagging and Ensemble Voting methods on the performance of the macro average f1 score, and compare it with non-ensemble models. The results of this study show that the sensitivity of Naïve Bayes to imbalance data is helped by the Ensemble Bagging and Ensemble Voting method with ∆P (delta performance) of range 0.0001 – 0.0018. Logistic Regression has performance with Ensemble Bagging and Ensemble Voting by ∆P of range 0.0001-0.00015. Decision Tree has lowest performance compared to others with ∆P of -0.01","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOBA GAME REVIEW SENTIMENT ANALYSIS USING SUPPORT VECTOR MACHINE ALGORITHM","authors":"Alif Fajar Panjalu, Syariful Alam, Mochammad Imam Sulistyo","doi":"10.33387/jiko.v6i2.6388","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6388","url":null,"abstract":"MOBA as one of the many popular subgenres today, Mobile Legend, Arena of Valor, League of Legend and Lokapala based on the large number of downloads can be mentioned as popular MOBA games, but the rating of these four applications is below 4.0 on the Google Play platform Store, this happens because some users may think that this mobile MOBA game has several advantages, but also some disadvantages that affect ratings. This study aims to determine the results of sentiment analysis on mobile MOBA games using Google Play Store reviews. Then it is processed using Python programming to create a model with the linear kernel Support Vector Machine (SVM) algorithm to classify the dataset. From the results of the classification model test using 19,579 data, where there were 10,017 positive sentiment data and 9,562 negative sentiment data and the distribution of train data and test data was 70%: 30%, obtained an accuracy of 82.64% and then re-evaluated using the Cross Validation method using 5 times so that an accuracy of 83.38% is obtained Keywords: MOBA, Sentiment Analysis, Machine Learning, SVM, Cross Validation","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DATA MINING IMPLEMENTATION FOR DETECTION OF ANOMALIES IN NETWORK TRAFFIC PACKETS USING OUTLIER DETECTION APPROACH","authors":"Kurnia Setiawan, Arief Wibowo","doi":"10.33387/jiko.v6i2.6092","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6092","url":null,"abstract":"The large number of data packet records of network traffic can be used to evaluate the quality of a network as well as to analyze the occurrence of anomalies in the network, both related to network security and network performance. Based on the data obtained, the occurrence of anomalies in computer networks can not be detected specifically on which traffic packets. Meanwhile, to monitor network traffic packets manually will require a lot of time and resources, making it difficult to detect potential anomaly events more specifically. This study analyzes network packet traffic data to see records that include anomalies with an outlier detection approach, using the Isolation Forest algorithm to detect outliers on network traffic packet data, with the result that minority data are of the outliers type of 1,643 records (4.86%), while inliers are 32,098 records (95.13%). Then check and filter the expert attributes that contain expert information. The outlier detection results were classified using 5 algorithms as comparison, namely Random Forest Classifier, Support Vector Machine, Decision Tree Classifier, K-Nearest Neighbor, and Bernoulli Naive Bayes. The Random Forest algorithm has the highest score for accuracy, macro average precision, and macro average f1-score, namely 0.9962067330488383; 0.78; and 0.82. The classification model can be used to classify samples with labels \"inliers\", \"outliers\", \"Error\", and \"warning outliers\". There are labels that have scores for precision, recall, and f1-scrore that are not too high, namely the labels “error†(0.50; 1.00; and 0.67) and “warning outlier†(0.64; 0 .70; 0.67). The resulting classification model is used for prototype development that facilitates the process of investigating potential network traffic packet anomalies more specifically.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COBIT 2019 INFORMATION SECURITY FOCUS AREA IMPLEMENTATION FOR REINSURCO DIGITAL TRANSFORMATION","authors":"Ananda Viamianni, Rahmat Mulyana, Fitriyana Dewi","doi":"10.33387/jiko.v6i2.6366","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6366","url":null,"abstract":"As information technology (IT) advancement evolves in Indonesia's insurance sector, organizations like ReinsurCo must accelerate their digital transformation (DT) to remain competitively viable. Although DT paves the way for new business models and operational improvements, the implementation often fails due to poor IT governance. Under the supervision of the State-Owned Enterprises Agency (SOE) and the Financial Services Authority (FSA), ReinsurCo must comply with regulations stating that SOEs must independently assess IT maturity to ensure information security. This research utilizes the five stages of Design Science Research (DSR): problem explication, requirement specification, design and development, demonstration, and evaluation. Data was collected through semi-structured interviews and both internal and external document triangulation. The data were then analyzed using the COBIT 2019 Information Security framework, implementing design factors prioritizing information technology governance and management (ITGM) objectives: APO13 Managed Security, DSS05 Managed Security Services, and BAI06 Managed IT Changes. Further analysis and identification were conducted to discover gaps against the seven component capabilities. These identified gaps were mapped into people, process, and technology aspects, which led to the creation of essential improvement recommendations. These recommendations were compiled into an implementation roadmap that can serve as a priority guide for ReinsurCo. This research is expected to provide a knowledge base for prioritizing information security management in supporting DT by implementing the COBIT 2019 Information Security framework. In a practical context, it aids ReinsurCo in controlling its strategic plans to face information security challenges. Furthermore, this study also offers extensive benefits to the insurance industry.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN OF INFORMATION TECHNOLOGY GOVERNANCE IN THE INFORMATION TECHNOLOGY DIVISION OF PT PLN USING THE FRAMEWORK COBIT 2019","authors":"Jennis Tonapa, E. Suryani","doi":"10.33387/jiko.v6i2.6349","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6349","url":null,"abstract":"In order to support the company's main business objectives, PLN UP3 Manokwari has implemented Information Technology (IT) which is structurally managed and implemented by the information technology division. However, information technology management in the IT division has not yet implemented information technology governance. To support the ongoing management of information technology, the information technology division of PLN UP3 Manokwari still uses the system manually. Manual management of information technology has many risks, this causes the company's main business objectives to not be achieved optimally. The method used in this study refers to the 2019 COBIT framework. From data analysis, it is known that the level of capability of the selected IT governance process in this study is the process in the domain EDM03, APO03, APO12, APO13, BAI01, BAI03, BAI06, BAI07, BAI11 , and DSS05 are mostly still at level 2, while the capability level expected by companies is mostly at level 4. The results of this study are in the form of recommendations for improvements aimed at achieving the expected level of capability by companies and design of IT governance as a reference for the IT Division PT PLN UP3 Manokwari in managing better IT processes to support the achievement of the company's main business objectives.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EVALUATION OF SPBE SERVICE MATURITY LEVEL IN CENTRAL MALUKU DISTRICT GOVERNMENT USING SPBE 2020 FRAMEWORK","authors":"Arifin La Adu","doi":"10.33387/jiko.v6i1.5422","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5422","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPARATIVE ANALYSIS OF QUALITY OF SERVICE PERFORMANCE OF VIDEO STREAMING SERVICES USING OSPF AND EIGRP NETWORKS","authors":"Fransiskus Simson","doi":"10.33387/jiko.v6i1.5826","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5826","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131682140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DECISION SUPPORT SYSTEM FOR SELECTING THE BEST EMPLOYEE AT PT BANK DIGITAL BCA USING SAW METHOD","authors":"Angga Ariyanto","doi":"10.33387/jiko.v6i1.5913","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5913","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132397232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF INFORMATION GAIN AND PARTICLE SWARM OPTIMIZATION UPON COVID-19 HANDLING SENTIMENT ANALYSIS BY USING K-NEAREST NEIGHBOR","authors":"Riana Riana","doi":"10.33387/jiko.v6i1.5260","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5260","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PUBLIC VALUE BASED E-GOVERNMENT MATURITY MODEL: A LITERATURE REVIEW","authors":"Titisari Ramadhane","doi":"10.33387/jiko.v6i1.5898","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5898","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}