JOIN Jurnal Online Informatika最新文献

筛选
英文 中文
Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android 基于Android的Arduino Nano E-KTP在家庭安全中的应用
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.238
Riyanto Mustolih, U. T. Lenggana, Jajang Mulyana
{"title":"Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android","authors":"Riyanto Mustolih, U. T. Lenggana, Jajang Mulyana","doi":"10.15575/JOIN.V4I1.238","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.238","url":null,"abstract":"Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88385100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of Spam Email Detection Performance Assessment Using Machine Learning 基于机器学习的垃圾邮件检测性能评估分析
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.298
B. Santoso
{"title":"An Analysis of Spam Email Detection Performance Assessment Using Machine Learning","authors":"B. Santoso","doi":"10.15575/JOIN.V4I1.298","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.298","url":null,"abstract":"Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"729 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72438888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm 基于Rivest-Shamir-Adleman算法的短消息服务编码
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.264
D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari
{"title":"Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm","authors":"D. Prasetyo, Eko Didik Widianto, Ike Pratiwi Indasari","doi":"10.15575/JOIN.V4I1.264","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.264","url":null,"abstract":"SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85905769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation Jpeg/exif消息摘要编译中SHA512哈希函数和Boyer-Moore字符串匹配算法的实现
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.304
Rachmad Fitriyanto, A. Yudhana, S. Sunardi
{"title":"Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation","authors":"Rachmad Fitriyanto, A. Yudhana, S. Sunardi","doi":"10.15575/JOIN.V4I1.304","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.304","url":null,"abstract":"Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87337624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of Readiness and Usability of Information Systems Use 信息系统使用的就绪性和可用性评估
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.256
D. Yuniarto, A'ang. Subiyakto, Aedah Binti Abd. Rohman, Reny Rian Marliana
{"title":"Assessment of Readiness and Usability of Information Systems Use","authors":"D. Yuniarto, A'ang. Subiyakto, Aedah Binti Abd. Rohman, Reny Rian Marliana","doi":"10.15575/JOIN.V4I1.256","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.256","url":null,"abstract":"The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76131933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Nearest Mosque Using Haversine Formula on Android Platform 在Android平台上使用Haversine公式查找最近的清真寺
JOIN Jurnal Online Informatika Pub Date : 2019-09-06 DOI: 10.15575/JOIN.V4I1.267
Indah Setyorini, Desi Ramayanti
{"title":"Finding Nearest Mosque Using Haversine Formula on Android Platform","authors":"Indah Setyorini, Desi Ramayanti","doi":"10.15575/JOIN.V4I1.267","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.267","url":null,"abstract":"Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detect Malware in Portable Document Format Files (PDF) Using Support Vector Machine and Random Decision Forest 使用支持向量机和随机决策森林检测便携式文档格式文件(PDF)中的恶意软件
JOIN Jurnal Online Informatika Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.196
Abdachul Charim, Setio Basuki, Denar Regata Akbi
{"title":"Detect Malware in Portable Document Format Files (PDF) Using Support Vector Machine and Random Decision Forest","authors":"Abdachul Charim, Setio Basuki, Denar Regata Akbi","doi":"10.15575/JOIN.V3I2.196","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.196","url":null,"abstract":"Portable Document Format is a very powerful type of file to spread malware because it is needed by many people, this makes PDF malware not to be taken lightly. PDF files that have been embedded with malware can be Javascript, URL access, media that has been infected with malware, etc. With a variety of preventive measures can help to spread, for example in this study using the classification method between dangerous files or not. Two classification methods that have the highest accuracy value based on previous research are Support Vector Machine and Random Forest. There are 500 datasets consisting of 2 classes, namely malicious and not malicius and 21 malicius PDF features as material for the classification process. Based on the calculation of Confusion Matrix as a comparison of the results of the classification of the two methods, the results show that the Random Forest method has better results than Support Vector Machine even though its value is still not perfect.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85838786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Logging Implementation on Web-Based Communication on Arduino Devices 基于Arduino设备的基于web通信的数据记录实现
JOIN Jurnal Online Informatika Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.252
Yasyfi Rahmanda Tsani, Alif Subardono
{"title":"Data Logging Implementation on Web-Based Communication on Arduino Devices","authors":"Yasyfi Rahmanda Tsani, Alif Subardono","doi":"10.15575/JOIN.V3I2.252","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.252","url":null,"abstract":"Arduino is one of the microcontroller devices commonly used on the Internet of Things. This research designed and objectified web-based data logging system that aimed to record communication and sensir data in iot devices, so it could monitor log data in iot. Devices from this data logging system was created using arduino uno r3 with adding ethernet shield modul and temperature sensor DHT 11. in iot devices, there is an important parameter, that is date time as a history in data logging sistem using an actual time. Website was functioned as system for showing data from log data and could be monitored realtime. This system could record communication brtween arduino device and NTP server using internet network. Beside that?this system could record important parameters in the system such as IP source address, ip destination address, ip address in each node, device time, and room temperature information. Parameters that had been recorded would be stored to database, then would be showed in web data logging.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78773714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Support System for Determining Thesis Supervisor using A Weighted Product (WP) Method 基于加权积法的论文导师决策支持系统
JOIN Jurnal Online Informatika Pub Date : 2019-02-01 DOI: 10.15575/join.v3i2.230
Suci Ramadhani Arifin, Josua Crishan Mintamanis
{"title":"Decision Support System for Determining Thesis Supervisor using A Weighted Product (WP) Method","authors":"Suci Ramadhani Arifin, Josua Crishan Mintamanis","doi":"10.15575/join.v3i2.230","DOIUrl":"https://doi.org/10.15575/join.v3i2.230","url":null,"abstract":"English Department of Tadulako University is a department with the highest number of lecturers in Tadulako University. Thesis supervisor determination at the English Department of Tadulako University still use the conventional way so that the determination of the thesis supervisor is done in a long time. In addition, some lecturers have more workload than other lecturers. Decision support system for the determination of the thesis supervisor in the English Department of Tadulako University was built to overcome this problem using the Weighted Product method. The system is a desktop-based application using the Visual Studio programming language and MySQL DBMS for database processing. The application of a decision support system for determining thesis supervisors can help make the selection of supervisors accurately and quickly with a mathematical calculation system.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"58 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Backpropagation Algorithm in Predicting the Most Number of Internet Users in the World 反向传播算法在预测世界最大互联网用户数中的应用分析
JOIN Jurnal Online Informatika Pub Date : 2019-02-01 DOI: 10.15575/JOIN.V3I2.205
S. Setti, A. Wanto
{"title":"Analysis of Backpropagation Algorithm in Predicting the Most Number of Internet Users in the World","authors":"S. Setti, A. Wanto","doi":"10.15575/JOIN.V3I2.205","DOIUrl":"https://doi.org/10.15575/JOIN.V3I2.205","url":null,"abstract":"The Internet today has become a primary need for its users. According to market research company e-Marketer, there are 25 countries with the largest internet users in the world. Indonesia is in the sixth position with a total of 112.6 million internet users. With the increasing number of internet users are expected to help improve the economy and also education in a country. To be able to increase the number of internet users, especially in Indonesia, it is necessary to predict for the coming years so that the government can provide adequate facilities and pre-facilities in order to balance the growth of internet users and as a precautionary step when there is a decrease in the number of internet users. The data used in this study focus on data on the number of internet users in 25 countries in 2013-2017. The algorithm used is Artificial Neural Network Backpropagation. Data analysis was processed by Artificial Neural Network using Matlab R2011b (7.13). This study uses 5 architectural models. The best network architecture generated is 3-50-1 with an accuracy of 92% and the Mean Squared Error (MSE) is 0.00151674.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88417742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信