{"title":"Identifikasi Malware pada Android menggunakan Algoritma K-Nearest Neighbor","authors":"Nadya Chitayae, Alva Hendi Muhammad","doi":"10.46229/jifotech.v3i2.752","DOIUrl":"https://doi.org/10.46229/jifotech.v3i2.752","url":null,"abstract":"Tidak sedikit orang yang menyalahgunakan teknologi untuk melakukan kejahatan atau yang disebut dengan cybercrime. Salah satu bentuk kejahatan dunia maya adalah serangan malware atau perangkat lunak berbahaya. Serangan malware perlu dideteksi agar pengguna dapat mengetahui data pada suatu aplikasi Android tersebut aman dari sisipan malware atau tidak. Malware cukup sulit untuk diklasifikasikan dan dibedakan secara langsung; Oleh karena itu, diperlukan suatu cara untuk mengklasifikasikan website baik dan website berbahaya. Penelitian ini menerapkan metode K-Nearest Neighbor untuk mengklasifikasikan malware aplikasi android. Penelitian ini menggunakan data Android Malware/Benign Permissions berupa file CSV yang diperoleh dari Kaggle.com. Hasil penelitian menunjukkan bahwa klasifikasi malware dan bukan malware pada izin aplikasi android dapat dilakukan dengan baik menggunakan algoritma K-Nearest Neighbor yang menghasilkan akurasi sebesar 77%. Klasifikasi malware dan bukan malware lebih baik dilakukan dengan menggabungkan metode K-Nearest Neighbor dengan Feature Selection sehingga meningkatkan nilai akurasi dari 44% menjadi 77%.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135537042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sistem Pakar Diagnosis Kerusakan Sepeda Motor di Bengkel Rahmat Cort menggunakan Metode Forward Chaining","authors":"Sri Mulyani, Fauzan Natsir","doi":"10.46229/jifotech.v3i2.754","DOIUrl":"https://doi.org/10.46229/jifotech.v3i2.754","url":null,"abstract":"Beberapa masyarakat yang memakai sepeda motor sebagai sarana transportasi umum, dan beberapa juga mengandalkan sepeda motor sebagai sumber penghasilan tambahan. Penelitian ini memiliki tujuan untuk mengembangkan sebuah sistem pakar yang dapat mendiagnosis kerusakan sepeda motor. Masalah yang umum terjadi adalah banyak bengkel servis yang tidak memiliki mekanik berpengalaman untuk melakukan diagnosis yang tepat terhadap masalah yang dialami sepeda motor dan seringkali hanya mengandalkan perkiraan. Sebagian mekanik cenderung mengandalkan intuisi mereka, yang pada akhirnya bisa mengakibatkan hasil perawatan yang kurang optimal dan membuat pelanggan merasa kecewa. Metode yang digunakan dalam penelitian ini adalah Forward Chaining, yang bertujuan untuk membantu menganalisis kerusakan dan memberikan solusi dari masalah yang terkait dengan sepeda motor. Hasil dari penulisan ini diharapakan agar mempermudah proses diagnosis kerusakan sepeda motor dengan mencocokkan beberapa gejala yang dialami sehinngga diharapkan dapat membantu pengguna motor dan para mekanik untuk menghemat waktu, tenaga dalam memudahkan mendeteksi kerusakan pada sepeda motor tersebut. Perancangan sistem pakar ini dirancang menggunakan metode inferensi pelacakan ke depan (forward chaining) dan dirancang dalam bentuk website agar mempermudah pengguna dalam menggunakannya.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135536850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rancang Bangun Aplikasi Perjalanan Dinas berbasis Laravel dan Vue (Studi Kasus : Balai Guru Penggerak Kalbar)","authors":"Aditya Pratama, Denny Primanda, Nurman Hariyanto, Adha Maulana","doi":"10.46229/jifotech.v3i2.757","DOIUrl":"https://doi.org/10.46229/jifotech.v3i2.757","url":null,"abstract":"Aplikasi perjalanan dinas telah menjadi unsur penting dalam pengelolaan administrasi dan mobilitas staf di berbagai organisasi dan lembaga. Namun, sebelumnya BGP KALBAR belum memiliki aplikasi perjalanan dinas yang sesuai dengan kebutuhan mereka. Hal ini mengakibatkan sejumlah permasalahan, seperti pengelolaan manual yang kurang efisien, kurangnya transparansi dalam manajemen perjalanan dinas, dan pengalaman yang kurang memuaskan bagi staf dan guru-guru BGP KALBAR.Penelitian ini bertujuan untuk merancang dan mengembangkan aplikasi perjalanan dinas berbasis Laravel dan Vue.js untuk Balai Guru Penggerak Kalimantan Barat (BGP KALBAR). Aplikasi ini bertujuan untuk meningkatkan efisiensi dan transparansi dalam manajemen perjalanan dinas, serta memberikan pengalaman yang lebih baik bagi staf dan guru-guru BGP KALBAR. Metodologi pengembangan menggunakan kombinasi Laravel sebagai kerangka kerja back-end dan Vue.js sebagai kerangka kerja front-end. Laravel memberikan kemampuan yang kuat dalam pengelolaan basis data dan logika bisnis, sementara Vue.js memungkinkan pembuatan antarmuka pengguna yang interaktif dan responsif. Aplikasi ini mencakup fitur-fitur seperti manajemen perjalanan, pelaporan, dan integrasi dengan basis data MySQL. Hasil dari pengujian menunjukkan bahwa sistem yang telah diajukan dalam penelitian ini berfungsi dengan baik. Berdasarkan hasil pengukuran dari MOS (Margin of Satisfaction), aplikasi yang telah dikembangkan mampu mengatasi permasalahan terkait Aplikasi Perjalanan Dinas di Balai Guru Penggerak Kalimantan Barat.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135536716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sistem Kendali Robot Pemadam Api Pintar menggunakan Metode Fuzzy Logic Tsukamoto","authors":"Agatha Deolika, Erik Setiawan","doi":"10.46229/jifotech.v3i2.750","DOIUrl":"https://doi.org/10.46229/jifotech.v3i2.750","url":null,"abstract":"Kebutuhan robot pada era sekarang ini sangat dibutuhkan karena banyak sekali pekerjaan yang beresiko tinggi. Robot pemadan api salah satunya, sangat penting sekali karena memadamkan api adalah pekerjaan beresiko dan butuh ketelitian. Suatu robot pemadam api untuk menemukan lokasi titik api harus memiliki pergerakan yang efisien seperti kecepatan robot mencapai titik api. Pergerakan robot bergantung pada posisinya pada arena atau jalan, sehingga sering terjadi gerakan sia-sia yang berakibat menabrak dinding atau halangan. Pada penelitian ini dilakukan penerapan metode Tsukamoto untuk kontrol kecepatan robot berdasarkan sensor-sensor. Setelah dilakukan penelitian dan penerapan metode Tsukamoto, robot dapat bergerak efisien dengan akurasi 90%.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135537568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perancangan Sistem Pengarsipan Berkas Badan Eksekutif Mahasiswa Institut Shanti Bhuana","authors":"Charley Orilya Grasselly Alfa Delfiny Hartoyo Uray, Essya Essya","doi":"10.46229/jifotech.v3i2.700","DOIUrl":"https://doi.org/10.46229/jifotech.v3i2.700","url":null,"abstract":"Pendidikan merupakan hak dan kewajiban yang harus dipenuhi oleh setiap individu. Partisipasi mahasiswa dalam organisasi kemahasiswaan memberikan pengalaman berharga dan peluang penting bagi pengembangan pribadi. Badan Eksekutif Mahasiswa (BEM) merupakan salah satu organisasi kemahasiswaan di kampus dan berperan penting dalam menjalankan fungsi administrasi dan lainnya di lingkungan kampus. Badan Eksekutif Mahasiswa (BEM) umumnya terdiri dari beberapa bidang atau divisi dengan peran berbeda dalam mengelola urusan internal dan eksternal perguruan tinggi. Bidang – bidang dalam Badan Eksekutif Mahasiswa (BEM) memegang peranan penting dalam mengawasi dan mengkoordinasikan seluruh kegiatan civitas akademika di perguruan tinggi. Agar Badan Eksekutif Mahasiswa (BEM) dapat menjalankan tugasnya dengan baik, maka harus ditata dengan baik dalam berbagai aspek, termasuk operasionalnya. Penggunaan sistem teknologi yang sesuai sangat diperlukan dalam mendukung pengarsipan berkas dalam Badan Eksekutif Mahasiswa (BEM) Institut Shanti Bhuana. Sistem pengarsipan berkas ini dirancang bertujuan untuk memfasilitasi pengelolaan berkas yang efektif dan efisien. Perancangan sistem untuk organisasi Badan Eksekutif Mahasiswa (BEM) Institut Shanti Bhuana dibangun untuk memenuhi kebutuhan fungsional dalam pengarsipan berkas masuk dan keluar dalam organisasi tersebut.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135538369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"‘ChatGPT et al.’: The ethics of using (generative) artificial intelligence in research and science","authors":"Daniel Schlagwein, Leslie Willcocks","doi":"10.1177/02683962231200411","DOIUrl":"https://doi.org/10.1177/02683962231200411","url":null,"abstract":"Artificial intelligence (AI) seeks to make computers do what human minds can do. By ‘AI’, we refer to the use of machine learning, algorithms, large datasets, neural networks and traditional statistical reasoning by computing. The term ‘AI’ is misleading: Despite suggestions to the contrary (Bubeck et al., 2023) – and some surely impressive achievements in specific areas –we are still far from reaching the benchmark of ‘general human intelligence’. AI has undergone several generations, from ‘good old-fashioned AI’ (Haugeland, 1989), the defined algorithms of which failed at the common sense problem, to the current and more successful generation of neural network and deep learning AI. One specific form of current AI is ‘generative AI’ (e.g. ChatGPT, DALL-E, Midjourney) – and without a doubt, it’s the ‘technology hype’ of 2023 and the focus of this editorial comment. Generative AI, specifically ChatGPT, became a ‘cultural sensation’ (Thorp, 2023) rather rapidly in early 2023. When Daniel brought up generative AI as a future ethical issue at a panel for journal editors on publishing ethics in December 2022 (Burton-Jones et al., 2022), many audience members seemed unfamiliar withMidjourney orChatGPT.However, within just a few weeks, the landscape shifted dramatically. Publicly launched on 30 November 2022, ChatGPT – a chatbot built on top of a text-generating AI – had an impressive debut, reaching onemillion users within 5 days and surpassing 100million users in January 2023 (Dwivedi et al., 2023). Since then, ChatGPT has become widely used and is believed to impact many areas, including research and science (Hill-Yardin et al., 2023; Liebrenz et al., 2023; Lund and Wang, 2023). While detailed explanations of the underlying technology can be found in other sources (Goodfellow et al., 2016), generative AI is a subset of deep learning AI that specialises in producing human-like outputs. OpenAI’s ChatGPToperates on a neural network AI architecture, GPT (Generative Pretrained Transformer). Although ChatGPT might have seemed like a natural progression of the AI domain, especially since Midjourney and DALL-E had been introduced earlier, it astonished global audiences and led companies like Alphabet (Google) to hastily release comparable tools (Teubner et al., 2023). Simplified, deep learning AI systems ‘hallucinate’ ‘plausible looking’ (though not necessarily accurate) responses to user prompts. They base these responses on patterns of ‘likeness’ (associations between words and concepts), stored in a digital neural network (multiple layers of interconnected nodes) and learnt from massive training datasets. Such systems can quickly generate high-quality images and texts, outperforming traditional algorithms. However, this advanced capability is accompanied by the challenge of the ‘black box’ problem:wemay understand the model’s general principles, but the reasons behind specific decisions remain opaque. The neural network provides a flexible, changing struc","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135304771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Application of Blockchain to Secure the Conventional Product Authentication Management System","authors":"Md. Azizul Hakim Sowrov, Md Asaduzzaman, Ifthekharul Islam, Md Mushfiqur Rahman, Rashed Mazumder","doi":"10.59185/y2je8k61","DOIUrl":"https://doi.org/10.59185/y2je8k61","url":null,"abstract":"Products counterfeit is a multi-billion dollars market, and the growth of this field is high. There havebeen many technological enhancements like Radio Frequency Identification (RFID) and Encrypted QuickResponse (EQR) code. These technologies have been used to track down those products in the supply chaindownstream and identify products for authenticity. Under these circumstances, all existing solutions must rely ona central database for operating. The matter of this subject points out the drawback of single point of failure. As aresult, these systems are more prone to cyber-attacks. In some cases, supply chain insiders play as a bad actor ofthe system too. To prevent this, tracing concrete proof of provenance of transactions is needed. In addition,business operations require contract and consensus. These can be solved using blockchain technology. Asbusiness requires privacy and cannot rely on public network. Thus, the solution of this need requires to be builtenterprise blockchain environment.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139353186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Human-centric Cybersecurity and Cybercrime","authors":"Anesu Robin Dikito, M. S. Kaiser","doi":"10.59185/cd2a2q06","DOIUrl":"https://doi.org/10.59185/cd2a2q06","url":null,"abstract":"The aim of this study is to propose a model of human-centric cybersecurity and its relationship tocurbing cybercrime in Zimbabwean commercial banks. The effects of human-centric cyber-crimes (e.g.email phishing, identity theft, hacking and malware) are increasing irrespective of the use of cyber securitytechniques (such as firewalls, antispyware and antivirus). In order to prevent security breaches, the role ofthe human element should always be emphasized. The study proposed a model of human-centric cybersecurity solutions in Zimbabwean commercial banks to counter identity theft. Item frameworks were modifiedto illustrate how human cyber security measures would effectively curb cybercrime from the theory ofprotection motivation and the theory of routine activity. Solutions to cybercrime centered on human beingsinclude raising aware- ness about cyber security, top management support and cyber security policies.Quantitative data collected through survey questionnaires which were distributed to 118 key informantsacross thirteen commercial banks in Zimbabwe. Gathered data were analyzed using SPSS 23 and Smart PLSVersion 3.2.8 for partial list structural equation modeling. The findings were interesting, the human solutionssuch as raising awareness, top management support, and cybersecurity policy indicated a negative andmoderate effect on identity theft, R2 value was of 0.64. The standardized root mean square residual value forthe human structural model was 0.08 indicating a good model fit. The findings show that the human factoris key for the successful cybersecurity of any banking institution.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139353097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Biplob Hosen, Ashfaq Ali Shafin, Mohammad Abu Yousuf
{"title":"Performance Analysis of Machine Learning Techniques in Network Intrusion Detection","authors":"Md. Biplob Hosen, Ashfaq Ali Shafin, Mohammad Abu Yousuf","doi":"10.59185/svmz6x07","DOIUrl":"https://doi.org/10.59185/svmz6x07","url":null,"abstract":"A lot of sensitive data is being transmitted over the internet nowadays, which leads to increasedrisks of network attacks. To identify suspicious and malicious activities to secure internal networks,intrusion detection systems aim to recognize unusual access or attacks to the network. Machine learningtechnology can play a vital role in a scheme to detect intrusion. It is a technology that is based onclassification and prediction, to deal with security threats. In this work, we focus on significant featureselection and classification using four machine learning algorithms. Adaptive Boost (AdaBoost), GradientBoosting, Random Forest, and Decision Tree classification techniques have been tested on the dataset ofnetwork intrusion detection which is collected from Kaggle. In our analysis, Gradient Boosting outperformsconsidering the F1-score. Therefore, this machine learning technique can be utilized to implement anintelligent intrusion detection system.","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139353231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Multiplexing Technique For 5G Wireless Network: Analysis and Selection","authors":"Firoz Sarkar, Nahid Akter, Md. Maruf Hasan","doi":"10.59185/25fjcv76","DOIUrl":"https://doi.org/10.59185/25fjcv76","url":null,"abstract":"The 5G cellular communication technology is intended to base on the present Long-TermEvolution (LTE) 4G networks with adopted features. Features of low power consumption and theconstant power level should be the major requirement for an efficient channel allocation method. In thisresearch work, an analysis was performed on multiplexing techniques: Orthogonal Frequency DivisionMultiplexing (OFDM), Generalized Frequency Division Multiplexing (GFDM), Universal FilteredMulticarrier (UFMC) and Filter-Bank Multicarrier (FBMC). Smooth power level had been analyzedaccording to Power Spectral Density (PSD) function vs normalized frequency using AWGN channelmodel. The simulation was done by MATLAB 2019 Simulink software for OFDM and GFDM that werefurther compared to existing results of UFMC and FBMC multiplexing techniques. Calculated power forOFDM and GFDM were 32.1mW and 40.23 µW respectively. Comparative results showed the bettersmooth power spectrum, micro-watt power consumption and better hardware configuration for GFDM.That’s why GFDM channel allocation method selection is one step ahead for the next generationmultiplexing technique","PeriodicalId":50178,"journal":{"name":"Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139353628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}