{"title":"IMPLEMENTATION OF SUPPORT VECTOR MACHINE ALGORITHM WITH HYPER-TUNING RANDOMIZED SEARCH IN STROKE PREDICTION","authors":"Yennimar Yennimar, Alvin Rasid, Sun Kenedy","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3479","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3479","url":null,"abstract":"Stroke is a severe health problem and can significantly impact a person's quality of life. Therefore, it is crucial to predict stroke early so that preventive measures can be taken before it is too late. This study demonstrates the importance of hyper tuning and hyperparameters in a stroke prediction model. Literature studies show that many studies on stroke prediction need to explain this, even though this is very important for developing the performance of stroke prediction models. In this study, we use the Support Vector Machine (SVM) algorithm to predict stroke and evaluate the algorithm's performance without hyper tuning and with hyper tuning Randomized Search CV. We also divide the data into training and test data by 75% and 25%. The results of this study indicate that hyper-tuning can improve the accuracy of the stroke prediction algorithm. The algorithm's accuracy is 77% without hyper-tuning, whereas, with hyper-tuning, the accuracy increases to 96%. Hypertuning with the Randomized Search CV method can improve the performance of the stroke prediction algorithm and is very important to do in developing predictive models.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"1105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135837602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF DESIGN THINKING APPROACH METHODS IN CURVING SELL MAINTENANCE WEBSITES (CASE STUDY: KAI DAOP 5 PURWOKERTO)","authors":"Yuni Novita Br. Sihaloho, Akhmad Fauzi, Sisilia Thya Safitri","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3401","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3401","url":null,"abstract":"PT KAI DAOP 5 Purwokerto is one of Indonesia's railroad operating units under the auspices of PT Kereta Api Indonesia (Persero). PT KAI DAOP 5 Purwokerto has several divisions, one of which is the rail and bridge unit. The rail line and bridge units at KAI DAOP 5 Purwokerto are still manually recording plan data and inspecting tracks. So, a system is needed to record plan data and review railroad tracks. This is done to make it easier for inspection officers to store data and reduce the risk of losing data from inspecting railroad tracks. Methods of data collection using literature study methods, interviews, and discussions with prospective website users and the team. This research aims to assist users in recording planning data and to inspect rail lines and bridges. Designing a website using the Design Thinking approach can make it easier to make User Interface designs that suit user needs. Applying the Design Thinking approach, a prototype design was found, which was used as a reference in implementing the Sell Maintenance website. The results of tests conducted on one of the employees on the user interface design were 8 accepted, 2 rejected, and 3 revisions. Applying the Design Thinking approach, a prototype design was found, which was used as a reference in implementing the Sell Maintenance website. The results of tests conducted on one of the employees on the user interface design were 8 accepted, 2 rejected, and 3 revisions. Applying the Design Thinking approach, a prototype design was found, which was used as a reference in implementing the Sell Maintenance website. The results of tests conducted on one of the employees on the user interface design were 8 accepted, 2 rejected, and 3 revisions.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135479440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Windania Purba, Sumita Wardani, Diana Febrina Lumbantoruan, Fransiska Celia Ivoi Silalahi, Thomas Leo Edison
{"title":"OPTIMIZATION OF LUNG CANCER CLASSIFICATION METHOD USING EDA-BASED MACHINE LEARNING","authors":"Windania Purba, Sumita Wardani, Diana Febrina Lumbantoruan, Fransiska Celia Ivoi Silalahi, Thomas Leo Edison","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3413","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3413","url":null,"abstract":"Lung cancer is one of the three deadliest diseases in the world and has rapidly developed. Based on this, researchers conducted research to predict the factors that influence lung cancer. One method to identify this is using data mining methods and classification techniques. Researchers used several popular algorithms in classification to make comparisons of the most accurate algorithms for lung cancer classification. The algorithms used include K-Nearest Neighbor, Random Forest Classifier, Logistic Regression, Linear SVM, Naïve Bayes, Decision Tree, Random Forest, Gradient Boosting, Kernel SVM, and MLPClassifier. The researcher used this algorithm because, in the research that the researcher found on the Kaggle platform, he examined the comparison of the algorithm using the breast cancer dataset. In previous studies, their researchers used SVM, which obtained an accuracy of 96.47%, Neural Networks of 97.06%, and Naïve Bayes with an accuracy of 91.18% to study breast cancer. The difference from previous research is that this study uses several existing algorithms in Machine Learning such as K-Nearest Neighbor, Random Forest Classifier, Logistic Regression, Linear SVM, Naïve Bayes, Decision Tree, Random Forest, Gradient Boosting, Kernel SVM, and MLPClassifier. In addition, this research was conducted to see whether the results of the accuracy of the algorithm that the researchers carried out using the lung cancer dataset had different results. The results of this study found that the more accurate algorithms were Random Forest and Gradient Boosting with an accuracy value of 100%, whereas in previous studies, it was the same. Still, Gradient Boosting had a higher accuracy value than Random Forest. Then, based on the data used in this study, the most influencing factors in predicting a diagnosis of lung cancer are obesity and coughing up blood. The results of this study found that the more accurate algorithms were Random Forest and Gradient Boosting with an accuracy value of 100%, whereas in previous studies, it was the same. Still, Gradient Boosting had a higher accuracy value than Random Forest. Then, based on the data used in this study, the most influencing factors in predicting a diagnosis of lung cancer are obesity and coughing up blood. The results of this study found that the more accurate algorithms were Random Forest and Gradient Boosting with an accuracy value of 100%, whereas in previous studies, it was the same. Still, Gradient Boosting had a higher accuracy value than Random Forest. Then, based on the data used in this study, the most influencing factors in predicting a diagnosis of lung cancer are obesity and coughing up blood.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135827372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of The Fuzzy Grid Partition-Based Mamdani Method to Decision Support System for Determining Salary Increase Eligibility","authors":"Murni Marbun, Sandhuri -, Aishwarya -","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3423","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3423","url":null,"abstract":"Fuzzy grid partition has been used to produce appropriate and optimal output. The output of several fuzzy inference methods such as the Tsukamoto method and the Mamdani method have been improved by applying grid partitions. This study aims to apply the fuzzy grid partition-based mamdani method to determine the feasibility of increasing employee salaries. The stages of the method are carried out starting with determining the number of partitions, forming fuzzy sets, carrying out the process of implicit rules, carrying out rule composition by selecting the maximum value of feasible and infeasible decisions, and finally carrying out the defuzzification process to obtain the calculation of the crips value. Attributes or features for selecting the eligibility for a salary increase are employee status, class status, years of service and benefits received. The results of the research get a decision for each employee whether it is appropriate to receive a salary increase or not. From one sample data tested on sample X7, the result of defuzzification (Z) is 5. Based on the table of feasible and inappropriate decisions, the value of Z = 5 is in a feasible decision","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135240222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naikson Saragih, Ridho Agus Wery Nanda Panjaitan, Mufria Jonatan Purba
{"title":"FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS","authors":"Naikson Saragih, Ridho Agus Wery Nanda Panjaitan, Mufria Jonatan Purba","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932","url":null,"abstract":"ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wireshark. The collection stage involves collecting attack data from snort logs and wireshark for life forensics. While the examination dataset stages are further analyzed and mapped. Advanced check on the server via syslog snort. From the attack testing carried out to obtain information in the form of the attacker's IP address, destination IP address, date of the attack, server time, and type of attack from testing the TCP Flooding and UDP Flooding attacks, all attacks on the customer's VPS can be identified. The information obtained regarding the attacker is in the form of the date and time the attack occurred, the attacker's IP address and the victim's IP address, and the protocol used. Kata kunci : Network Forensic, Dead Forensic, Live Forensic, Virtual Private Server, DDos, TCP Flooding, UDP Flooding.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136175617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EARLY DETECTION OF BREAST CANCER USING THE K-NEAREST NEIGHBOUR (K-NN) ALGORITHM","authors":"Refli Tiarma Ariani Panggabean, Ledy Octavia, Noormala Dwi, Aripin -","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3194","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3194","url":null,"abstract":"ABSTRACT- Cancer is one of the Non-Communicable Disease groups whose growth and development are high-speed. One type of cancer is breast cancer (carcinoma mammae). Breast cancer is the leading cause of death for women. The first breast cancer cells can grow into tumors as large as 1 cm, spanning 8-12 years. The prevalence rate of breast cancer in Indonesia is 50 per 100,000 female population. The method used in this study uses the K-Nearest Neighbor (K-NN) algorithm by comparing k values, namely 3, 5, and 7. The dataset used was obtained from the UCI Machine Learning Repository with the Number of datasets after preprocessing, namely 653 data with a class consisting of benign tumors (benign) and malignant tumors (malignant). The variables used in this study take into account the variables of clump thickness, cell size uniformity, cell shape uniformity, marginal adhesion, single epithelial cell size, cell nucleus size, chromatin, normal cell nucleus, and mitosis. The results of the most influential classification for training and testing are using k = 3 with an accuracy of training and testing at a proportion of 70:30 of 83.8074% and 75%; the ratio of 80:20 is 84.6743% and 74.8092%; the percentage of 90:10 is 84.0136% and 84.6154%. Using the value of k = 3, the resulting gap between training and testing is similar.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136175618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alferedo Tanzil, Randy Aldany Barasa, Yonata Laia, Jepri Banjarnahor
{"title":"Analysis of Method C5.0 in Triggering Factors The Number of Covid-19 Increases or Decreases After Getting the Vaccine","authors":"Alferedo Tanzil, Randy Aldany Barasa, Yonata Laia, Jepri Banjarnahor","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3410","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3410","url":null,"abstract":"Because we now know that many things make everyone sick, such as fever, flu, cough, and other diseases that are said to be easily transmitted, we need a system that can overcome the above problems. This study uses the K-NN method to examine what factors influence the increase in the number of people infected with Covid-19. The factors tested in this study were frequent violations of health practices, overcrowding, and weak immune systems. The K-NN method can overcome the problem of knowing the factors causing the increase in Covid-19 patients after vaccination.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136181800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEB-BASED SPP PAYMENT INFORMATION SYSTEM WITH MIDTRANS PAYMENT GATEWAY","authors":"Mulyadi Aditya, Daning Nur Sulistyowati","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2942","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2942","url":null,"abstract":"ABSTRACT- The tuition payment system at Taufiq Islamic Middle School is still manually using ledger media in transaction activities and data recap. The system still needs to be revised and is prone to errors in calculating incoming payments and reporting payment data. This research was conducted to facilitate the school in the payment management process so that the recording error rate no longer occurs. The system development method used in this study is the Waterfall model and uses the Midtrans payment gateway in the online payment process. The results of this study are in the form of a tuition payment website that can facilitate all parties, both the school and students. This system makes the payment and recording process better and more efficient. Keywords: information system, waterfall, payment gateway, Midtrans.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136181807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF DATA MINING MODELS WITH ALGORITHMS K-NEAREST NEIGHBOR IN MONITORING THE NUTRITIONAL STATUS OF CHILDREN AND STUNTING","authors":"Mutammimul -, Sayed Fachrurrazi, Reyhan Achmad Rizal, Mauliza -, Syarkawi -","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3376","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3376","url":null,"abstract":"Information systems are needed in the development of children in the developmental period and especially in the world of health. Monitoring of children's nutritional status and stunting is necessary to determine children's weight and meet the criteria for children's nutritional status. Pukesmas Muara Satu, North Aceh District, is an implementing element or assistant to the duties of Poskesdes and Midwives in the Health of children's nutritional status and stunting in Paloh Punti Village, which is one of the agencies under the Ministry of Health. This study aims to monitor the growth and development of children such as measuring weight, height, measured to detect early if unwanted things occur such as malnutrition. The problem in this study is designing and monitoring an Information system for child nutritional status and stunting that is integrated with a web application. The purpose of this study is to find out staff and employees in managing, monitoring and accessing data. So that the data at the puskesmas is recorded in the system, and can quickly determine data on the nutritional status of children and stunting. The results of this study are to be able to find out an information system that is able to reduce problems that occur in managing data on the nutritional status of children and stunting at the Muara Satu Health Center. This system is very important because it can make it easier for staff to record the nutritional status of children and stunting at the Health Center. then the results of the KNN (K-Nearest Neighbor) model classification with the recapitulation of the value of new cases with old cases in the first test section is 0.6944, the second test is 0.6388, the third test is 0.555, the fifth test is 0.6388.","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134920650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Melisa Winda, Yosep Septiana, Yanti Apriyani, Mira Kusmira
{"title":"INFORMATION SYSTEM FOR WORK EXIT PERMIT AT CIAMIS STATE COURT","authors":"Melisa Winda, Yosep Septiana, Yanti Apriyani, Mira Kusmira","doi":"10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3224","DOIUrl":"https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.3224","url":null,"abstract":"ABSTRACT- The District Court is a judicial institution within the General Court environment domiciled in the regency or city capital. Submitting information for permits to enter and leave work manually is considered less effective in terms of controlling employee activities, especially going work obligations during working hours for personal or other interests. with the submission method only giving reports verbally to Sub Personnel and Ortala, without any written submissions/reports that must be known by the head of the Agency to apply the SOP that applies to the Agency Observations are made by visiting and observing directly to the research site to see the ongoing process The interview was conducted with one of the employees of the Ciamis district court. Interviews were conducted by asking several questions to determine the system running there. This literature study is used as reference material in doing this final project. Literature studies are used by searching for material through books, the Internet, and journals related to this research. We are designing an information system for entering and leaving work permits (sikasja) to streamline activities in the work environment. So that research results can be utilized by agencies as a primary reference for solving existing problems. As a step of adaptation and use of technology in the current era of digitalization. Knowing the job role of each position in Class 1B agencies, Keywords: Court, System, Waterfall, Personnel, Letters","PeriodicalId":499639,"journal":{"name":"Jusikom : Jurnal Sistem Informasi Ilmu Komputer","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134920651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}