JOIN Jurnal Online Informatika最新文献

筛选
英文 中文
The Hybrid of Jaro-Winkler and Rabin-Karp Algorithm in Detecting Indonesian Text Similarity Jaro-Winkler和Rabin-Karp混合算法在印尼语文本相似度检测中的应用
JOIN Jurnal Online Informatika Pub Date : 2021-06-17 DOI: 10.15575/join.v6i1.640
Muhamad Arief Yulianto, N. Nurhasanah
{"title":"The Hybrid of Jaro-Winkler and Rabin-Karp Algorithm in Detecting Indonesian Text Similarity","authors":"Muhamad Arief Yulianto, N. Nurhasanah","doi":"10.15575/join.v6i1.640","DOIUrl":"https://doi.org/10.15575/join.v6i1.640","url":null,"abstract":"The String-matching technique is part of the similarity technique. This technique can detect the similarity level of the text. The Rabin-Karp is an algorithm of string-matching type. The Rabin-Karp is capable of multiple patterns searching but does not match a single pattern. The Jaro-Winkler Distance algorithm can find strings within approximate string matching. This algorithm is very suitable and gives the best results on the matching of two short strings. This study aims to overcome the shortcomings of the Rabin-Karp algorithm in the single pattern search process by combining the Jaro-Winkler and Rabin-Karp algorithm methods. The merging process started from pre-processing and forming the K-Gram data. Then, it was followed by the calculation of the hash value for each K-Gram by the Rabin-Karp algorithm. The process of finding the same hash score and calculating the percentage level of data similarity used the Jaro-Winkler algorithm. The test was done by comparing words, sentences, and journal abstracts that have been rearranged. The average percentage of the test results for the similarity level of words in the combination algorithm has increased. In contrast, the results of the percentage test for the level of similarity of sentences and journal abstracts have decreased. The experimental results showed that the combination of the Jaro-Winkler algorithm on the Rabin-Karp algorithm can improve the similarity of text accuracy.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91110312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Importance of Computational Thinking to Train Structured Thinking in Problem Solving 计算思维对训练结构化思维解决问题的重要性
JOIN Jurnal Online Informatika Pub Date : 2021-06-17 DOI: 10.15575/JOIN.V6I1.677
R. Andrian, R. Hikmawan
{"title":"The Importance of Computational Thinking to Train Structured Thinking in Problem Solving","authors":"R. Andrian, R. Hikmawan","doi":"10.15575/JOIN.V6I1.677","DOIUrl":"https://doi.org/10.15575/JOIN.V6I1.677","url":null,"abstract":"Ability to do problem solving will be greatly influenced by how the flow of thinking in decomposing a problem until it finds the root of the problem so that it can determine the best solution. There is currently a growing recognition around the world that all fields require a prerequisite ability, namely to think logically, in a structured manner, and use computational tools to rapidly model and visualize data. This ability is known as Computational Thinking (CT). In this study, the author applied the computational thinking key concept in a case study to train structured thinking in problem solving. Computational thinking key concept includes Decomposition, Pattern recognition, Abstraction, and lastly use algorithms when they design simple steps to solve problems. Based on our case study that has been model, the result shows us that Computational Thinking can be used to train structured thinking in problem solving in everyday life","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78190558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of C4.5 Algorithm and Support Vector Machine in Predicting the Student Graduation Timeliness C4.5算法与支持向量机预测学生毕业时效性的比较
JOIN Jurnal Online Informatika Pub Date : 2021-06-17 DOI: 10.15575/JOIN.V6I1.608
Agus Mailana, Andi Agung Putra, Sarifudlin Hidayat, Arief Wibowo
{"title":"Comparison of C4.5 Algorithm and Support Vector Machine in Predicting the Student Graduation Timeliness","authors":"Agus Mailana, Andi Agung Putra, Sarifudlin Hidayat, Arief Wibowo","doi":"10.15575/JOIN.V6I1.608","DOIUrl":"https://doi.org/10.15575/JOIN.V6I1.608","url":null,"abstract":"In higher educational institutions, graduation rates are one of the many aspects to assess the quality of the learning process. Al-Hidayah Islamic University in Bogor is one of the established private Islamic universities to create skilled human resources with moral values required by many companies nowadays. Having another institution in Bogor as a competitor with the same direction and objective is a challenge for Al-Hidayah Islamic University. Thus a solution is required to face the competition. One solution is to predict the student graduation timeliness of the students using data mining method with classification function. The implemented methodology in the data mining is Discovery Knowledge of Database (KDD), starting from selecting, preprocessing, transformation, data mining, and evaluation/ interpretation. There were two Algorithm models used in this paper, namely C4.5 and Support Vector Machine (SVM). The classification procedure consists of predictor variables and one of the target variables. Predictor variables are gender, Grade Point Average, marital status, and job status. Rapid Miner software was used to process the data. The final results of both Algorithms show an 81% precision rate and 80% accuracy level for the C4.5 Algorithm, while SVM has an 88% precision rate and 85% accuracy level.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"184 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90704975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Product Review Ranking in e-Commerce using Urgency Level Classification Approach 基于紧急等级分类方法的电子商务产品评论排序
JOIN Jurnal Online Informatika Pub Date : 2020-12-18 DOI: 10.15575/JOIN.V5I2.612
H. Zuhri, N. Maulidevi
{"title":"Product Review Ranking in e-Commerce using Urgency Level Classification Approach","authors":"H. Zuhri, N. Maulidevi","doi":"10.15575/JOIN.V5I2.612","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.612","url":null,"abstract":"Review ranking is useful to give users a better experience. Review ranking studies commonly use upvote value, which does not represent urgency, and it causes problems in prediction. In contrast, manual labeling as wide as the upvote value range provides a high bias and inconsistency. The proposed solution is to use a classification approach to rank the review where the labels are ordinal urgency class. The experiment involved shallow learning models (Logistic Regression, Naïve Bayesian, Support Vector Machine, and Random Forest), and deep learning models (LSTM and CNN). In constructing a classification model, the problem is broken down into several binary classifications that predict tendencies of urgency depending on the separation of classes. The result shows that deep learning models outperform other models in classification dan ranking evaluation. In addition, the review data used tend to contain vocabulary of certain product domains, so further research is needed on data with more diverse vocabulary.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88977973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedding a Blockchain Technology Pattern Into the QR Code for an Authentication Certificate 在认证证书的QR码中嵌入区块链技术模式
JOIN Jurnal Online Informatika Pub Date : 2020-12-13 DOI: 10.15575/JOIN.V5I2.583
Q. Aini, U. Rahardja, Melani Rapina Tangkaw, N. Santoso, Alfiah Khoirunisa
{"title":"Embedding a Blockchain Technology Pattern Into the QR Code for an Authentication Certificate","authors":"Q. Aini, U. Rahardja, Melani Rapina Tangkaw, N. Santoso, Alfiah Khoirunisa","doi":"10.15575/JOIN.V5I2.583","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.583","url":null,"abstract":"In the disruptive 4.0 era that emphasizes technological sophistication, blockchain is present as a technology that increasingly influences human life, helping humans in all aspects, including education. The role of blockchain technology in the world of education is to test the validity of diplomas, the increasing number of fake diplomas for an interest, both for work and continuing education to a higher level. The purpose of this research with the implementation of blockchain is expected to make it easier for users to verify the authenticity of a diploma. This study uses the SWOT analysis method to identify all possibilities that exist in blockchain technology. The final result of this research, the system will print a physical certificate in the form of paper in general, then the certificate will be printed a QR code. To verify numeric code on QR Code via scanning on smartphone or QR Reader. It is hoped that the blockchain technology applied to digital assets can reduce cases of forgery of diplomas and other important documents.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77360078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Sentiment Analysis on Social Distancing and Physical Distancing on Twitter Social Media using Recurrent Neural Network (RNN) Algorithm 基于递归神经网络(RNN)算法的Twitter社交媒体社交距离和身体距离情感分析
JOIN Jurnal Online Informatika Pub Date : 2020-12-03 DOI: 10.15575/JOIN.V5I2.632
Fikri Nugraha, Nisa Hanum Harani, Roni Habibi, Rd. Nuraini Siti Fatonah
{"title":"Sentiment Analysis on Social Distancing and Physical Distancing on Twitter Social Media using Recurrent Neural Network (RNN) Algorithm","authors":"Fikri Nugraha, Nisa Hanum Harani, Roni Habibi, Rd. Nuraini Siti Fatonah","doi":"10.15575/JOIN.V5I2.632","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.632","url":null,"abstract":"The government is seeking preventive steps to reduce the risk of the spread of Covid-19, one of which is social restrictions that have become popular with social distancing and physical distancing. One way to assess whether the steps taken by the government regarding social and physical distancing are accepted or not by the community is by conducting sentiment analysis. The process of sentiment analysis is carried out using a variant of the Recurrent Neural Network (RNN), namely Long Short-Term Memory (LSTM). In this study, the results obtained from the sentiment analysis, where the public response to social distancing and physical distancing has more positive sentiments than negative sentiments. To measure the accuracy level of sentiment analysis using the Recurrent Neural Network (RNN) algorithm and evaluation of the modeling is done using confusion matrix where the results obtained for the training dataset are 89% accuracy, 89% recall, 89% precision, and 89% F1 Score. Meanwhile, for the test dataset, an accuracy of 80% was obtained, a recall of 79%, a precision of 81%, and an F1 score of 80%.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"4 4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88357895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies 有限状态机算法在2D平台游戏《兔子大战僵尸》中的应用
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.293
Ade Solihin, E. W. Hidayat, A. P. Aldya
{"title":"Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies","authors":"Ade Solihin, E. W. Hidayat, A. P. Aldya","doi":"10.15575/JOIN.V4I1.293","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.293","url":null,"abstract":"This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagles","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73765047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of National Digital Evidence Metadata 国家数字证据元数据的发展
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.292
B. Sugiantoro
{"title":"Development of National Digital Evidence Metadata","authors":"B. Sugiantoro","doi":"10.15575/JOIN.V4I1.292","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.292","url":null,"abstract":"The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76760429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Finding Shortest Route for Pharmacy Location Using A-star Algorithm 基于a星算法的药房选址最短路径的实现
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.296
F. P. Juniawan, Dwi Yuny Sylfania, Dini Agrina
{"title":"Implementation of Finding Shortest Route for Pharmacy Location Using A-star Algorithm","authors":"F. P. Juniawan, Dwi Yuny Sylfania, Dini Agrina","doi":"10.15575/JOIN.V4I1.296","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.296","url":null,"abstract":"The number of pharmacies in the Pangkalpinang City has increased rapidly. This is directly proportional to the needs of the people of Pangkalpinang City to fulfill the health needs, buy medicine or divert doctor's prescriptions. This is a debate for people who do not know the location of pharmacies in this city. Practically, people can just go to a pharmacy with a location that far from user location, even though there is a pharmacy near the user. This is because there is no pharmacy information location in the Pangkalpinang City. To solve this problem, proposed a system that can display the location of all pharmacies in the Pangkalpinang City. In addition, the system can search the shortest path from the user's location to the nearest pharmacy location around using the A * algorithm. This algorithm was chosen because its advantages that are able to produce optimal solutions according to the expected heuristic functions. The results of the testing are that the system can optimize and be able to search the shortest path from the user's location to the nearest pharmacy.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84538596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Advantages from Cloud Computing Application Towards SMME (UMKM) 云计算应用对中小企业(UMKM)的优势
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.307
Tazkia Shabrina Az-zahra
{"title":"The Advantages from Cloud Computing Application Towards SMME (UMKM)","authors":"Tazkia Shabrina Az-zahra","doi":"10.15575/JOIN.V4I1.307","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.307","url":null,"abstract":"Small Micro Medium Enterprises (SMME) is one of the business enterprises that has a prime role in the development of economic growth in Indonesia. The SMME also not only reduces the number of jobless but also improve the community’s standard of living. Nonetheless, in this globalization era where the technology reaches its peak in every field, some SMME entrepreneurs have not taken advantage of IT-based business yet. On the other hand, the utilization of IT in the business field has many profitable benefits. This could make the SMME faced trouble and hard to survive in the tight competition with other bigger enterprises that had applied IT in the future. The main reason that SMME entrepreneur has not applied the IT system is that they lack fund. Moreover, cloud computing is a technology that can be used for every SMME entrepreneur without any costs. The advantages of this system utilization are to improve competitiveness, increase its flexibility, reduce costs, and to improve both agility and scalability. This research is based on a literature study that describes research’s aim that is to seek advantages from cloud computing implementation towards SMME in Indonesia so they can compete with international enterprises with a bigger scale. The researcher expects that SMME entrepreneurs in Indonesia can utilize Information technology particularly cloud computing, to support their business.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82968822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信