Journal title
ISSN: 2580-0760    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 6 Number 3 Year 2022

19 articles in this issue 

Siti Khomsah, Rima Dias Ramadhani, Sena Wijaya

Word embedding vectorization is more efficient than Bag-of-Word in word vector size. Word embedding also overcomes the loss of information related to sentence context, word order, and semantic relationships between words in sentences. Several kinds of Wor... see more

Pags. 352 - 358  

Annas Prasetio, Rika Rosnelly, Wanayumini

The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy accuracy va... see more

Pags. 359 - 369  

Arif Laksito, Muhammad Royyan Saputra

Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the right dat... see more

Pags. 370 - 375  

Muhammad Iqbal Izzul Haq, Aniati Murni Arymurthy, Irham Muhammad Fadhil

Class imbalance is a serious problem that disrupts the process of semantic segmentation of satellite imagery in urban areas in Earth remote sensing. Due to the large objects dominating the segmentation process, small object are consequently limited, so so... see more

Pags. 376 - 379  

Togu Sianturi, Kalamullah Ramli

Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data ... see more

Pags. 380 - 386  

Hartina Hiromi Satyanegara, Kalamullah Ramli

Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as ... see more

Pags. 387 - 396  

Syaharuddin Syaharuddin, Fatmawati Fatmawati, Herry Suprajitno

The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general architecture c... see more

Pags. 397 - 402  

Arini Muhafidzah, Kalamullah Ramli

The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is needed to ... see more

Pags. 403 - 411  

Sabarudin Saputra, Anton Yudhana, Rusydi Umar

Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of hug... see more

Pags. 412 - 420  

Lidya Ningsih, Agus Buono, Mushthofa, Toto Haryanto

Beef consumption is quite high and expensive in the world. In Indonesia, beef prices are relatively expensive because the meat supply chain from farmers to the market is quite long. The high demand for beef and the difficulty of obtaining meat are factors... see more

Pags. 421 - 429  

Jalu Nusantoro, Faldo Fajri Afrinanto, Wana Salam Labibah, Zamah Sari, Yufis Azhar

At the end of 2019, a new disease called Coronavirus Disease (COVID-19) originated in Wuhan, China. This disease is caused by respiratory tract infections, ranging from the common cold to serious diseases such as Middle East Respiratory Syndrome (MERS) an... see more

Pags. 430 - 441  

Ghina Khoerunnisa, Jondri, Widi Astuti

Twitter is one of the popular microblogs that allow users to write posts. Retweeting is one of the mechanisms for the diffusion of information on Twitter. One way to understand the spread of information is to learn about retweet predictions. This study fo... see more

Pags. 442 - 447  

Safira Nuri Safitri, Haryono Setiadi, Esti Suryani

Educational Data Mining (EDM) often appears to be applied in big data processing in the education sector. One of the educational data that can be further processed with EDM is activity log data from an e-learning system used in teaching and learning activ... see more

Pags. 448 - 456  

Syafri Arlis, Sarjon Defit, Sumijan

Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone. Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid air cell ... see more

Pags. 457 - 465  

Supriyanto, Ika Arfiani

FAQ is an important part of a system because it is used to make it easier for users to solve problems faced by users. Some FAQ systems have even started using Chatbot technology to make it easier for users. Chatbots have been widely used as a medium for s... see more

Pags. 466 - 470  

Mohammad Yazdi Pusadan, Syahrullah, Merry, Ahmad Imam Abdullah

Knowledge and utilization of digital images are growing rapidly not only in the fields of medicine and industry but also in the field of agriculture. This knowledge can apply it to a computer-based program that is used to detect agricultural products more... see more

Pags. 471 - 480  

Aditya Gumilar, Sri Suryani Prasetiyowati, Yuliant Sibaroni

This study proposes several methods to analyze the performance of the hybrid machine learning method using Voting and Stacking on rainfall classification. The two hybrid methods will combine five classification methods, namely Logistic Regression, Support... see more

Pags. 481 - 490  

Adhim Jati Kusuma, Pantjawati Sudarmaningtyas, Antok Supriyanto

With background of Covid-19 pandemic, Indonesian state trying to make various efforts, so people comply health protocols. One of them is through PeduliLindungi application. PeduliLindungi has 3 main functions, namely tracing, tracking, warning and fencing... see more

Pags. 491 - 498  

Zulfahmi Helmi, Ramzi Adriman, Teuku Yuliar Arif, Hubbul Walidainy, Maya Fitria

Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being attacked. The Sybil ... see more

Pags. 499 - 504