19 articles in this issue
Siti Khomsah, Rima Dias Ramadhani, Sena Wijaya
Word embedding vectorization is more efficient than Bag-of-Word in word vector size. Word embedding also overcomes the loss of information related to sentence context, word order, and semantic relationships between words in sentences. Several kinds of Wor... see more
Annas Prasetio, Rika Rosnelly, Wanayumini
The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy accuracy va... see more
Arif Laksito, Muhammad Royyan Saputra
Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the right dat... see more
Muhammad Iqbal Izzul Haq, Aniati Murni Arymurthy, Irham Muhammad Fadhil
Class imbalance is a serious problem that disrupts the process of semantic segmentation of satellite imagery in urban areas in Earth remote sensing. Due to the large objects dominating the segmentation process, small object are consequently limited, so so... see more
Togu Sianturi, Kalamullah Ramli
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data ... see more
Hartina Hiromi Satyanegara, Kalamullah Ramli
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as ... see more
Syaharuddin Syaharuddin, Fatmawati Fatmawati, Herry Suprajitno
The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general architecture c... see more
Arini Muhafidzah, Kalamullah Ramli
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is needed to ... see more
Sabarudin Saputra, Anton Yudhana, Rusydi Umar
Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of hug... see more
Lidya Ningsih, Agus Buono, Mushthofa, Toto Haryanto
Beef consumption is quite high and expensive in the world. In Indonesia, beef prices are relatively expensive because the meat supply chain from farmers to the market is quite long. The high demand for beef and the difficulty of obtaining meat are factors... see more
Jalu Nusantoro, Faldo Fajri Afrinanto, Wana Salam Labibah, Zamah Sari, Yufis Azhar
At the end of 2019, a new disease called Coronavirus Disease (COVID-19) originated in Wuhan, China. This disease is caused by respiratory tract infections, ranging from the common cold to serious diseases such as Middle East Respiratory Syndrome (MERS) an... see more
Ghina Khoerunnisa, Jondri, Widi Astuti
Twitter is one of the popular microblogs that allow users to write posts. Retweeting is one of the mechanisms for the diffusion of information on Twitter. One way to understand the spread of information is to learn about retweet predictions. This study fo... see more
Safira Nuri Safitri, Haryono Setiadi, Esti Suryani
Educational Data Mining (EDM) often appears to be applied in big data processing in the education sector. One of the educational data that can be further processed with EDM is activity log data from an e-learning system used in teaching and learning activ... see more
Syafri Arlis, Sarjon Defit, Sumijan
Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone. Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid air cell ... see more
Supriyanto, Ika Arfiani
FAQ is an important part of a system because it is used to make it easier for users to solve problems faced by users. Some FAQ systems have even started using Chatbot technology to make it easier for users. Chatbots have been widely used as a medium for s... see more
Mohammad Yazdi Pusadan, Syahrullah, Merry, Ahmad Imam Abdullah
Knowledge and utilization of digital images are growing rapidly not only in the fields of medicine and industry but also in the field of agriculture. This knowledge can apply it to a computer-based program that is used to detect agricultural products more... see more
Aditya Gumilar, Sri Suryani Prasetiyowati, Yuliant Sibaroni
This study proposes several methods to analyze the performance of the hybrid machine learning method using Voting and Stacking on rainfall classification. The two hybrid methods will combine five classification methods, namely Logistic Regression, Support... see more
Adhim Jati Kusuma, Pantjawati Sudarmaningtyas, Antok Supriyanto
With background of Covid-19 pandemic, Indonesian state trying to make various efforts, so people comply health protocols. One of them is through PeduliLindungi application. PeduliLindungi has 3 main functions, namely tracing, tracking, warning and fencing... see more
Zulfahmi Helmi, Ramzi Adriman, Teuku Yuliar Arif, Hubbul Walidainy, Maya Fitria
Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being attacked. The Sybil ... see more