Jurnal Teknologi dan Sistem Komputer

Journal Information
ISSN / EISSN : 26204002 / 23380403
Current Publisher: Diponegoro University (10.14710)
Total articles ≅ 229
Current Coverage
Archived in

Latest articles in this journal

Subiyanto Subiyanto, Dina Priliyana, Moh. Eki Riyadani, Nur Iksan, Hari Wibawanto
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 210-216; doi:10.14710/jtsiskom.2020.13590

Genetic algorithm (GA) can improve the classification of the face recognition process in the principal component analysis (PCA). However, the accuracy of this algorithm for the smart home security system has not been further analyzed. This paper presents the accuracy of face recognition using PCA-GA for the smart home security system on Raspberry Pi. PCA was used as the face recognition algorithm, while GA to improve the classification performance of face image search. The PCA-GA algorithm was implemented on the Raspberry Pi. If an authorized person accesses the door of the house, the relay circuit will unlock the door. The accuracy of the system was compared to other face recognition algorithms, namely LBPH-GA and PCA. The results show that PCA-GA face recognition has an accuracy of 90 %, while PCA and LBPH-GA have 80 % and 90 %, respectively.
Rihartanto Rihartanto, Riris Kurnia Ningsih, Achmad Fanany Onnilita Gaffar, Didi Susilo Budi Utomo
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 201-209; doi:10.14710/jtsiskom.2020.13476

Information that can be in the form of text, image, audio, and video, is a valuable asset that needs to be secured from unauthorized parties. This research aims to study the implementation of Vigenere cipher 128 (VC-128) and square rotation to secure text information. The square rotation is applied to increase the security of the encryption results obtained from VC-128. The randomness of the rotation results was measured using Shannon entropy based on the distance between characters, and the Avalanche Effect measured changes in the encryption results compared to the original text. The square rotation can increase the randomness of the VC-128 encryption results, as indicated by an increase in entropy values. The highest increase in entropy of 34.8 % occurs in repetitive texts with the square size that produces optimal entropy was a 9x9 medium-size square. The Avalanche effect for each test data shows inconsistent results ranging from 44.5 % to 49 %.
Andi Nurkholis, Imas Sukaesih Sitanggang
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 192-200; doi:10.14710/jtsiskom.2020.13657

Land suitability evaluation has a vital role in land use planning aimed to increase food production effectiveness. Palm oil is a leading and strategic commodity for Indonesian people, which is predicted consumption will exceed production in the future. This study aims to evaluate palm oil land suitability using a spatial decision tree algorithm that is conventional decision tree modification for spatial data classification with adding spatial join relation. The spatial dataset consists of eight explanatory layers (soil nature and characteristics), and a target layer (palm oil land suitability) in Bogor District, Indonesia. This study produced three models, where the best model was obtained based on optimizing accuracy (98.18 %) and modeling time (1.291 seconds). The best model has 23 rules, soil texture as the root node, two variables (drainage and cation exchange capacity) are uninvolved, with land suitability visualization obtains percentage S2 (29.94 %), S3 (53.16 %), N (16.57 %), and water body (0.33 %).
Endina Putri Purwandari, Aan Erlansari, Andang Wijanarko, Erich Adinal Adrian
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 178-184; doi:10.14710/jtsiskom.2020.13422

Recognition of human faces in forensics applications can be identified through the Sketch recognition method by matching sketches and photos. The system gives five criminal candidates who have similarities to the sketch given. This study aims to perform facial recognition on photographs and sketches using Principal Component Analysis (PCA) as feature extraction and Euclidean distance as a calculation of the distance of test images to training images. The PCA method was used to recognize facial images from pencil sketch drawings. The system dataset is in the form of photos and sketches in the CUHK Face Sketch database consists of 93 photos and 93 sketches, and personal documentation consists of five photos and five sketches. The sketch matching application to training data produces an accuracy of 76.14 %, precision of 91.04 %, and recall of 80.26 %, while testing with sketch modifications produces accuracy and recall of 95 % and precision of 100 %.
Ali Rizal Chaidir, Gamma Aditya Rahardi, Khairul Anam
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 185-191; doi:10.14710/jtsiskom.2020.13643

Line following and lane tracking are robotic navigation techniques that use lines as a guide. The techniques can be applied to mobile robots in the industry. This research applied the Braitenberg controller and image processing to control and obtain line information around the mobile robot. The robot was implemented using Arduino Uno as a controller. A webcam was connected to a computer that performs image processing using canny edge detection and sends the data to the robot controller via serial communication. The robot can navigate on the side of the line, and the success rate of the system is 100 % at a turn of 135 ° and 80 % at a turn of 90 °.
Laurentinus Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, Fransiskus Panca Juniawan
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 171-177; doi:10.14710/jtsiskom.2020.13468

Improved security of short message services (SMS) can be obtained using cryptographic methods, both symmetric and asymmetric, but must remain efficient. This paper aims to study the performance and efficiency of the symmetric crypto of AES-128 and asymmetric crypto of RSA with message compression in securing SMS messages. The ciphertext of RSA and AES were compressed using the Huffman algorithm. The average AES encryption time for each character is faster than RSA, which is 5.8 and 24.7 ms/character for AES and AES+Huffman encryption and 8.7 and 45.8 ms/character for RSA and RSA+Huffman, from messages with 15, 30, 60 and 90 characters. AES decryption time is also faster, which is 27.2 ms/character compared to 47.6 ms/character in RSA. Huffman compression produces an average efficiency of 24.8 % for the RSA algorithm, better than 17.35 % of AES efficiency for plaintext of 1, 16, 45, and 88 characters.
Sumardi Sumardi, Hadha Afrisal, Wisnu Dyan Nugroho
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 164-170; doi:10.14710/jtsiskom.8.2.2020.164-170

This research aims to develop a quadrotor control system for maintaining its position and balance from disturbance while hovering. A fast and reliable control technique is required to respond to high maneuverability and high non-linearity of six degrees of freedom system. Hence, this research focuses on designing a Self-Tuning Fuzzy-PD control system for quadrotor’s attitude. The designed control system utilizes input data from the Inertial Navigation System (INS). Then the quadrotor’s attitude is controlled by passing the PWM signal to the flight controller APM 2.6. The result shows that the average absolute error for the roll, pitch, and yaw angles are relatively small, as mentioned consecutively 2.0790, 2.2660, and 1.5280, while the maximum absolute errors are 6.3140, 6.7220, and 3.820.
Mulki Indana Zulfa, Ari Fadli, Arief Wisnu Wardhana
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 157-163; doi:10.14710/jtsiskom.8.2.2020.157-163

Utilization of an in-memory database as a cache can overcome relational database latency problems in a web application, especially when using a lot of join queries. This study aims to model the academic relational data into Redis compatible data and analyze the performance of join queries usage to accelerate access to relational data managed by RDBMS. This study used academic data to calculate student GPA that is modeled in the RDBMS and Redis in-memory database (IMDB). The use of Redis as an in-memory database can significantly increase Mysql database system performance up to 3.3 times faster to display student data using join query and to shorten the time needed to display GPA data to 52 microseconds from 61 milliseconds.
Nathaniel Clarence Haryanto, Lucia Dwi Krisnawati, Antonius Rachmat Chrismanto
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 140-149; doi:10.14710/jtsiskom.8.2.2020.140-149

The architecture of the text-reuse detection system consists of three main modules, i.e., source retrieval, text analysis, and knowledge-based postprocessing. Each module plays an important role in the accuracy rate of the detection outputs. Therefore, this research focuses on developing the source retrieval system in cases where the source documents have been obfuscated in different levels. Two steps of term weighting were applied to get such documents. The first was the local-word weighting, which has been applied to the test or reused documents to select query per text segments. The tf-idf term weighting was applied for indexing all documents in the corpus and as the basis for computing cosine similarity between the queries per segment and the documents in the corpus. A two-step filtering technique was applied to get the source document candidates. Using artificial cases of text reuse testing, the system achieves the same rates of precision and recall that are 0.967, while the recall rate for the simulated cases of reused text is 0.66.
Anastasia Rita Widiarti
Jurnal Teknologi dan Sistem Komputer, Volume 8, pp 150-156; doi:10.14710/jtsiskom.8.2.2020.150-156

The concept of classification using the k-nearest neighbor (KNN) method is simple, easy to understand, and easy to be implemented in the system. The main challenge in classification with KNN is determining the proximity measure of an object and how to make a compact reference class. This paper studied the implementation of the KNN for the automatic transliteration of Javanese, Sundanese, and Bataknese script images into Roman script. The study used the KNN algorithm with the number k set to 1, 3, 5, 7, and 9. Tests used the image dataset of 2520 data. With the 3-fold and 10-fold cross-validation, the results exposed the accuracy differences if the area of the extracted image, the number of neighbors in the classification, and the number of data training were different.
Back to Top Top