JIKO (Jurnal Informatika dan Komputer)最新文献

筛选
英文 中文
Multiclass Email Classification by Using Ensemble Bagging and Ensemble Voting 基于集合Bagging和集合投票的多类电子邮件分类
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-08-06 DOI: 10.33387/jiko.v6i2.6394
Ali Helmut, D. Murdiansyah
{"title":"Multiclass Email Classification by Using Ensemble Bagging and Ensemble Voting","authors":"Ali Helmut, D. Murdiansyah","doi":"10.33387/jiko.v6i2.6394","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6394","url":null,"abstract":"Email is a common communication technology in modern life. The more emails we receive, the more difficult and time consuming it is to sort them out. One solution to overcome this problem is to create a system using machine learning to sort emails. Each method of machine learning and data sampling result in different performance. Ensemble learning is a method of combining several learning models into one model to get better performance. In this study we tried to create a multiclass email classification system by combining learning models, data sampling, and several data classes to obtain the effect of Ensemble Bagging and Ensemble Voting methods on the performance of the macro average f1 score, and compare it with non-ensemble models. The results of this study show that the sensitivity of Naïve Bayes to imbalance data is helped by the Ensemble Bagging and Ensemble Voting method with ∆P (delta performance) of range 0.0001 – 0.0018. Logistic Regression has performance with Ensemble Bagging and Ensemble Voting by ∆P of range 0.0001-0.00015. Decision Tree has lowest performance compared to others with ∆P of -0.01","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOBA GAME REVIEW SENTIMENT ANALYSIS USING SUPPORT VECTOR MACHINE ALGORITHM 基于支持向量机算法的Moba游戏评论情感分析
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-08-06 DOI: 10.33387/jiko.v6i2.6388
Alif Fajar Panjalu, Syariful Alam, Mochammad Imam Sulistyo
{"title":"MOBA GAME REVIEW SENTIMENT ANALYSIS USING SUPPORT VECTOR MACHINE ALGORITHM","authors":"Alif Fajar Panjalu, Syariful Alam, Mochammad Imam Sulistyo","doi":"10.33387/jiko.v6i2.6388","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6388","url":null,"abstract":"MOBA as one of the many popular subgenres today, Mobile Legend, Arena of Valor, League of Legend and Lokapala based on the large number of downloads can be mentioned as popular MOBA games, but the rating of these four applications is below 4.0 on the Google Play platform Store, this happens because some users may think that this mobile MOBA game has several advantages, but also some disadvantages that affect ratings. This study aims to determine the results of sentiment analysis on mobile MOBA games using Google Play Store reviews. Then it is processed using Python programming to create a model with the linear kernel Support Vector Machine (SVM) algorithm to classify the dataset. From the results of the classification model test using 19,579 data, where there were 10,017 positive sentiment data and 9,562 negative sentiment data and the distribution of train data and test data was 70%: 30%, obtained an accuracy of 82.64% and then re-evaluated using the Cross Validation method using 5 times so that an accuracy of 83.38% is obtained Keywords: MOBA, Sentiment Analysis, Machine Learning, SVM, Cross Validation","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DATA MINING IMPLEMENTATION FOR DETECTION OF ANOMALIES IN NETWORK TRAFFIC PACKETS USING OUTLIER DETECTION APPROACH 数据挖掘实现了使用离群值检测方法检测网络流量数据包中的异常情况
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-08-06 DOI: 10.33387/jiko.v6i2.6092
Kurnia Setiawan, Arief Wibowo
{"title":"DATA MINING IMPLEMENTATION FOR DETECTION OF ANOMALIES IN NETWORK TRAFFIC PACKETS USING OUTLIER DETECTION APPROACH","authors":"Kurnia Setiawan, Arief Wibowo","doi":"10.33387/jiko.v6i2.6092","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6092","url":null,"abstract":"The large number of data packet records of network traffic can be used to evaluate the quality of a network as well as to analyze the occurrence of anomalies in the network, both related to network security and network performance. Based on the data obtained, the occurrence of anomalies in computer networks can not be detected specifically on which traffic packets. Meanwhile, to monitor network traffic packets manually will require a lot of time and resources, making it difficult to detect potential anomaly events more specifically. This study analyzes network packet traffic data to see records that include anomalies with an outlier detection approach, using the Isolation Forest algorithm to detect outliers on network traffic packet data, with the result that minority data are of the outliers type of 1,643 records (4.86%), while inliers are 32,098 records (95.13%). Then check and filter the expert attributes that contain expert information. The outlier detection results were classified using 5 algorithms as comparison, namely Random Forest Classifier, Support Vector Machine, Decision Tree Classifier, K-Nearest Neighbor, and Bernoulli Naive Bayes. The Random Forest algorithm has the highest score for accuracy, macro average precision, and macro average f1-score, namely 0.9962067330488383; 0.78; and 0.82. The classification model can be used to classify samples with labels \"inliers\", \"outliers\", \"Error\", and \"warning outliers\". There are labels that have scores for precision, recall, and f1-scrore that are not too high, namely the labels “error” (0.50; 1.00; and 0.67) and “warning outlier” (0.64; 0 .70; 0.67). The resulting classification model is used for prototype development that facilitates the process of investigating potential network traffic packet anomalies more specifically.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COBIT 2019 INFORMATION SECURITY FOCUS AREA IMPLEMENTATION FOR REINSURCO DIGITAL TRANSFORMATION Cobit 2019信息安全重点领域实施再保险数字化转型
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-08-06 DOI: 10.33387/jiko.v6i2.6366
Ananda Viamianni, Rahmat Mulyana, Fitriyana Dewi
{"title":"COBIT 2019 INFORMATION SECURITY FOCUS AREA IMPLEMENTATION FOR REINSURCO DIGITAL TRANSFORMATION","authors":"Ananda Viamianni, Rahmat Mulyana, Fitriyana Dewi","doi":"10.33387/jiko.v6i2.6366","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6366","url":null,"abstract":"As information technology (IT) advancement evolves in Indonesia's insurance sector, organizations like ReinsurCo must accelerate their digital transformation (DT) to remain competitively viable. Although DT paves the way for new business models and operational improvements, the implementation often fails due to poor IT governance. Under the supervision of the State-Owned Enterprises Agency (SOE) and the Financial Services Authority (FSA), ReinsurCo must comply with regulations stating that SOEs must independently assess IT maturity to ensure information security. This research utilizes the five stages of Design Science Research (DSR): problem explication, requirement specification, design and development, demonstration, and evaluation. Data was collected through semi-structured interviews and both internal and external document triangulation. The data were then analyzed using the COBIT 2019 Information Security framework, implementing design factors prioritizing information technology governance and management (ITGM) objectives: APO13 Managed Security, DSS05 Managed Security Services, and BAI06 Managed IT Changes. Further analysis and identification were conducted to discover gaps against the seven component capabilities. These identified gaps were mapped into people, process, and technology aspects, which led to the creation of essential improvement recommendations. These recommendations were compiled into an implementation roadmap that can serve as a priority guide for ReinsurCo. This research is expected to provide a knowledge base for prioritizing information security management in supporting DT by implementing the COBIT 2019 Information Security framework. In a practical context, it aids ReinsurCo in controlling its strategic plans to face information security challenges. Furthermore, this study also offers extensive benefits to the insurance industry.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DESIGN OF INFORMATION TECHNOLOGY GOVERNANCE IN THE INFORMATION TECHNOLOGY DIVISION OF PT PLN USING THE FRAMEWORK COBIT 2019 基于cobit 2019框架的pt PLN信息技术部门信息技术治理设计
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-08-06 DOI: 10.33387/jiko.v6i2.6349
Jennis Tonapa, E. Suryani
{"title":"DESIGN OF INFORMATION TECHNOLOGY GOVERNANCE IN THE INFORMATION TECHNOLOGY DIVISION OF PT PLN USING THE FRAMEWORK COBIT 2019","authors":"Jennis Tonapa, E. Suryani","doi":"10.33387/jiko.v6i2.6349","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6349","url":null,"abstract":"In order to support the company's main business objectives, PLN UP3 Manokwari has implemented Information Technology (IT) which is structurally managed and implemented by the information technology division. However, information technology management in the IT division has not yet implemented information technology governance. To support the ongoing management of information technology, the information technology division of PLN UP3 Manokwari still uses the system manually. Manual management of information technology has many risks, this causes the company's main business objectives to not be achieved optimally. The method used in this study refers to the 2019 COBIT framework. From data analysis, it is known that the level of capability of the selected IT governance process in this study is the process in the domain EDM03, APO03, APO12, APO13, BAI01, BAI03, BAI06, BAI07, BAI11 , and DSS05 are mostly still at level 2, while the capability level expected by companies is mostly at level 4. The results of this study are in the form of recommendations for improvements aimed at achieving the expected level of capability by companies and design of IT governance as a reference for the IT Division PT PLN UP3 Manokwari in managing better IT processes to support the achievement of the company's main business objectives.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVALUATION OF SPBE SERVICE MATURITY LEVEL IN CENTRAL MALUKU DISTRICT GOVERNMENT USING SPBE 2020 FRAMEWORK 基于spbe 2020框架的马鲁古区政府spbe服务成熟度评价
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-04-15 DOI: 10.33387/jiko.v6i1.5422
Arifin La Adu
{"title":"EVALUATION OF SPBE SERVICE MATURITY LEVEL IN CENTRAL MALUKU DISTRICT GOVERNMENT USING SPBE 2020 FRAMEWORK","authors":"Arifin La Adu","doi":"10.33387/jiko.v6i1.5422","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5422","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPARATIVE ANALYSIS OF QUALITY OF SERVICE PERFORMANCE OF VIDEO STREAMING SERVICES USING OSPF AND EIGRP NETWORKS 基于ospf和eigrp网络的视频流业务质量性能比较分析
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-04-15 DOI: 10.33387/jiko.v6i1.5826
Fransiskus Simson
{"title":"COMPARATIVE ANALYSIS OF QUALITY OF SERVICE PERFORMANCE OF VIDEO STREAMING SERVICES USING OSPF AND EIGRP NETWORKS","authors":"Fransiskus Simson","doi":"10.33387/jiko.v6i1.5826","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5826","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131682140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DECISION SUPPORT SYSTEM FOR SELECTING THE BEST EMPLOYEE AT PT BANK DIGITAL BCA USING SAW METHOD 基于锯法的pt银行数字化bca最佳员工选择决策支持系统
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-04-15 DOI: 10.33387/jiko.v6i1.5913
Angga Ariyanto
{"title":"DECISION SUPPORT SYSTEM FOR SELECTING THE BEST EMPLOYEE AT PT BANK DIGITAL BCA USING SAW METHOD","authors":"Angga Ariyanto","doi":"10.33387/jiko.v6i1.5913","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5913","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132397232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTATION OF INFORMATION GAIN AND PARTICLE SWARM OPTIMIZATION UPON COVID-19 HANDLING SENTIMENT ANALYSIS BY USING K-NEAREST NEIGHBOR 基于k近邻的信息增益和粒子群优化在COVID-19处理情感分析中的实现
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-04-15 DOI: 10.33387/jiko.v6i1.5260
Riana Riana
{"title":"IMPLEMENTATION OF INFORMATION GAIN AND PARTICLE SWARM OPTIMIZATION UPON COVID-19 HANDLING SENTIMENT ANALYSIS BY USING K-NEAREST NEIGHBOR","authors":"Riana Riana","doi":"10.33387/jiko.v6i1.5260","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5260","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PUBLIC VALUE BASED E-GOVERNMENT MATURITY MODEL: A LITERATURE REVIEW 基于公共价值的电子政务成熟度模型:文献综述
JIKO (Jurnal Informatika dan Komputer) Pub Date : 2023-04-15 DOI: 10.33387/jiko.v6i1.5898
Titisari Ramadhane
{"title":"PUBLIC VALUE BASED E-GOVERNMENT MATURITY MODEL: A LITERATURE REVIEW","authors":"Titisari Ramadhane","doi":"10.33387/jiko.v6i1.5898","DOIUrl":"https://doi.org/10.33387/jiko.v6i1.5898","url":null,"abstract":"","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信