Journal IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

-
70 articles
Page of 1
Articles per Page
by
Fajar Ratnawati, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 1-10; doi:10.22146/ijccs.19237

Abstract:Movie has unique characteristics. When someone writes an opinions about a movie, not only the story in the movie itself is written, but also the people involved in the movie are also written. Opinion ordinary movie written in social media primarily twitter.To get a tendency of opinion on the movie, whether opinion is likely positive, negative or neutral, it takes a sentiment analysis. This study aims to classify the sentiment is positive, negative and neutral from opinions Indonesian language movie and look for the accuracy, precission, recall and f-meausre of the method used is Dynamic Convolutional Neural Network. The test results on a system that is built to show that Dynamic Convolutional Neural Network algorithm provides accuracy results better than Naive Bayes method, the value of accuracy of 80,99%, the value of precission 81,00%, recall 81,00%, f-measure 79,00% while the value of the resulting accuracy Naive Bayes amounted to 76,21%, precission 78,00%, recall 76,00%, f-measure 75,00%.
Sri Mulyana, Ilham Sahputra
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 11-20; doi:10.22146/ijccs.22886

Abstract:The accident that occurred to somebody will give much suffering; moreover, if the accident gives the serious injury, such as a broken bone which needs to get more seriously treatment. Not only does the patient need the action towards his/her injury, but also he/she needs the psychological therapy in facing the problems happened which is suggested by a psychologist. One of the reasoning method in expert systems is Case-Based Reasoning (CBR). In Case-Based Reasoning, a case-based consists of various cases in conditions or symptoms and solution (the psychological therapy) given. To find out the solution from a new problem given, the system will find any cases in the case-based which have higher the degree of similarity between the cases. This research develops a case-based reasoning system to decide the action of the psychological therapy towards the patients in the post-accident who needs seriously treatment. The psychological therapy involves in giving assistance, consultation, psychiatrist support, and the compound of various actions as well. A case study was conducted from the medical records of psychological treatment at ‘Dr Soeharso’ hospital in Surakarta. Based on the result of the research developed, the action of psychological therapy upon the patient has successfully determined. They have accuracy rates of 60% in the threshold 50% compared to the treatments resulted from the psychologist. The result was found by calculating the degree of similarity between the new issue and all cases existing in the case base.
Restu Maulunida, Achmad Solichin
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 73-82; doi:10.22146/ijccs.28707

Abstract:At present, the need to access the data have been transformed into digital data, and its use has been growing very rapidly. This transformation is due to the use of the Internet is growing very rapidly, and also the development of mobile devices are growing massively. People tend to store a lot of files in their storage and transfer files from one media to another media. When approaching the limit of storage media, the fewer files that can be stored. A compression technique is required to reduce the size of a file. The dictionary coding technique is one of the lossless compression techniques, LZW is an algorithm for applying coding dictionary compression techniques. In the LZW algorithm, the process of forming a dictionary uses a future based dictionary and encoding process using the Fixed Length Code. It allows the encoding process to produce a sequence that is still quite long. This study will modify the process of forming a dictionary and use Variable Length Code, to optimize the compression ratio. Based on the test using the data used in this study, the average compression ratio for LZW algorithm is 42,85%, and our proposed algorithm is 38,35%. It proves that the modification of the formation of the dictionary we proposed has not been able to improve the compression ratio of the LZW algorithm.
Muhammad Ihsan, Reza Pulungan, A Afiahayati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 95-106; doi:10.22146/ijccs.32142

Abstract:Library services quality is one of the most vital parts in library management. Evaluation of the library services based on the perspective of users is important. In this paper, we propose a collaboration of GDSS-AHP (Group Decision Support System-Analytical Hierarchy Process), LibQual, and IPA (Importance-Performance Analysis) methods to evaluate library services quality. The collaboration of GDSS-AHP and LibQual is used to calculate the weight of each evaluation statement and the level of library services quality based on users’ perception and expectation. IPA is then used to determine the position of the value of each evaluation statement in IPA’s four quadrants to obtain the recommended level for the library services improvement. This study is conducted at the Library of the Ministry of Trade of Indonesia, involving four decision makers: a head librarian, a library academic expert, and two library practitioners. Fifty library visitors become respondents to assess the quality services questionnaires. Based on their responses, we obtain that users’ satisfaction level is at least satisfied by 76.49 %. Meanwhile, usability testing is also conducted on the developed system by using three observation elements: effectiveness, efficiency and satisfaction. The usability testing is performed on five respondents, one admin, and two decision makers, and results in an average usability level of 90.03%.
Maulida Ayu Fitriani, Aina Musdholifah, Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 53-62; doi:10.22146/ijccs.27871

Abstract:Various clustering methods to obtain optimal information continues to evolve one of its development is Evolutionary Algorithm (EA). Adaptive Unified Differential Evolution (AuDE), is the development of Differential Evolution (DE) which is one of the EA techniques. AuDE has self adaptive scale factor control parameters (F) and crossover-rate (Cr).. It also has a single mutation strategy that represents the most commonly used standard mutation strategies from previous studies.The AuDE clustering method was tested using 4 datasets. Silhouette Index and CS Measure is a fitness function used as a measure of the quality of clustering results. The quality of the AuDE clustering results is then compared against the quality of clustering results using the DE method.The results show that the AuDE mutation strategy can expand the cluster central search produced by ED so that better clustering quality can be obtained. The comparison of the quality of AuDE and DE using Silhoutte Index is 1:0.816, whereas the use of CS Measure shows a comparison of 0.565:1. The execution time required AuDE shows better but Number significant results, aimed at the comparison of Silhoutte Index usage of 0.99:1 , Whereas on the use of CS Measure obtained the comparison of 0.184:1.
Khabib Mustofa, Sunu Pinasthika Fajar
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 63-72; doi:10.22146/ijccs.28121

Abstract:In a software development projects, testing is an activity that can spend time, effort or cost up to 35%. To reduce this, developers can choose automatic testing. Automated testing, especially for functional testing, on web applications can be done by using tools, one of which is Selenium. By default, Selenium testing is done sequentially and without exploiting multithreading, which has an impact a sufficiently long time.In this study, a platform that allows Selenium users to test and utilize multithreading with Ruby language to speed up testing was developed. Thr result shows that Ruby's multithreading has proven to be capable of speeding functional testing up on various web applications. Variations occur depending on the functionality being tested, the testing approach and also the type of browsers used.
Cornelis Frederik Junifer Latupapua, Tri Kuntoro Priyambodo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 43-52; doi:10.22146/ijccs.27292

Abstract:LTE networks were created to improve on previous technologies, where the advantages of LTE networks are at the speed of data transfer and greater service capacity, reduced operational costs and can be integrated with existing technologies.This simulation is used to analyze the video performance of FDD streaming mode in handover process using Network Simulator 3 with 3 cell for different speed and number of users, with delay, packet loss and throughput parameters. The test results show that the performance of streaming video in handover process on all test, not affected by delay value. The highest delay value is still in good category that is 153. 43 ms. The highest packet loss is 54.5% with 60 users at speeds of 100 km / h. The highest throughput value is 0.60 Mbps at a speed of 40 km / h with 5 users and the lowest throughput value is 0.40 Mbps at a speed of 60 km / h with 60 users. The best performance occurred at a speed of 40 km / h, on the contrary at speeds of 70 Km / h and 100 Km / h, the performance decreased due to increased packet loss and decreased throughput value.
Nelson Rumui, Agus Harjoko, Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 33-42; doi:10.22146/ijccs.26331

Abstract:Stroke is a type of cerebrovascular disease that occurs because blood flow to the brain is disrupted. Examination of stroke accurately using CT scan, but the tool is not always available, so it can be done by the Siriraj Score. Each type of stroke has similar symptoms so doctors should re-examine similar cases prior to diagnosis. The hypothesis of the Case-based reasoning (CBR) method is a similar problems having similar solution.This research implements CBR concept using Siriraj score, dense index and Jaccard Coeficient method to perform similarity calculation between cases.The test is using k-fold cross validation with 4 fold and set values of threshold (0.65), (0.7), (0.75), (0.8), (0.85), (0.9), and (0.95). Using 45 cases of data test and 135 cases of case base. The test showed that threshold of 0.7 is suitable to be applied in sensitivity (89.88%) and accuracy (84.44% for CBR using indexing and 87.78% for CBR without indexing). Threshold of 0.65 resulted high sensitivity and accuracy but showed many cases of irrelevant retrieval results. Threshold (0.75), (0.8), (0.85), (0.9) and (0.95) resulted in sensitivity (65.48%, 59.52%, 5.95%, 3,57% and 0%) and accuracy of CBR using indexing (61.67%, 55.56%, 5.56%, 3.33%, and 0%) and accuracy of CBR without indexing (62.78% 56.67%, 55.56%, 5.56%, 3.33%, and 0%).
Chandra Kusuma Dewa, Amanda Lailatul Fadhilah, A Afiahayati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 83-94; doi:10.22146/ijccs.31144

Abstract:Convolutional neural network (CNN) is state-of-the-art method in object recognition task. Specialized for spatial input data type, CNN has special convolutional and pooling layers which enable hierarchical feature learning from the input space. For offline handwritten character recognition problem such as classifying character in MNIST database, CNN shows better classification result than any other methods. By leveraging the advantages of CNN over character recognition task, in this paper we developed a software which utilizes digital image processing methods and CNN module for offline handwritten Javanese character recognition. The software performs image segmentation process using contour and Canny edge detection with OpenCV library over captured handwritten Javanese character image. CNN will classify the segmented image into 20 classes of Javanese letters. For evaluation purposes, we compared CNN to multilayer perceptron (MLP) on classification accuracy and training time. Experiment results show that CNN model testing accuracy outperforms MLP accuracy although CNN needs more training time than MLP.
Ferdi Chahyadi, Azhari SN, Hendra Kurniawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 12, pp 21-32; doi:10.22146/ijccs.23056

Abstract:Nurse’s scheduling in hospitals becomes a complex problem, and it takes time in its making process. There are a lot of limitation and rules that have to be considered in the making process of nurse’s schedule making, so it can fulfill the need of nurse’s preference that can increase the quality of the service. The existence variety of different factors that are causing the nurse scheduling problem is so vast and different in every case. The study is aimed to develop a system used as an equipment to arrange nurse’s schedule. The working schedule obtained will be checked based on the constraints that have been required. Value check of the constraint falsification used Simulated Annealing (SA) combined with cooling method of Probabilistic Cooling Scheme (PCS). Transitional rules used cost matrix that is employed to produce a new and more efficient state. The obtained results showed that PCS cooling methods combined with the transition rules of the cost matrix generating objective function value of new solutions better and faster in processing time than the cooling method exponential and logarithmic. Work schedule generated by the application also has a better quality than the schedules created manually by the head of the room.
Ira zulfa, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.24716

Abstract:Sentiment analysis is a computational research of opinion sentiment and emotion which is expressed in textual mode. Twitter becomes the most popular communication device among internet users. Deep Learning is a new area of machine learning research. It aims to move machine learning closer to its main goal, artificial intelligence. The purpose of deep learning is to change the manual of engineering with learning. At its growth, deep learning has algorithms arrangement that focus on non-linear data representation. One of the machine learning methods is Deep Belief Network (DBN). Deep Belief Network (DBN), which is included in Deep Learning method, is a stack of several algorithms with some extraction features that optimally utilize all resources. This study has two points. First, it aims to classify positive, negative, and neutral sentiments towards the test data. Second, it determines the classification model accuracy by using Deep Belief Network method so it would be able to be applied into the tweet classification, to highlight the sentiment class of training data tweet in Bahasa Indonesia. Based on the experimental result, it can be concluded that the best method in managing tweet data is the DBN method with an accuracy of 93.31%, compared with Naive Bayes method which has an accuracy of 79.10%, and SVM (Support Vector Machine) method with an accuracy of 92.18%.
Enny Itje Sela, M Ihsan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.24756

Abstract:Currently to find out the quality of eggs was conducted on visual observation directly on the egg, both the outside of the egg in the form of eggshell conditions or the inside of the egg by watching out using sunlight or a flashlight. This method requires good accuracy, so in the process it can affect results that are not always accurate. This is due to the physical limitations of each individual is different. This study examines the utilization of digital image processing for the detection of egg quality using eggshell image.The feature extraction method performed a texture feature based on the histogram that is the average intensity, standard deviation, skewness, energy, entropy, and smoothness properties. The detection method for training and testing is K-Means Clustering algorithm. The results of this application are able to help the user to determine the quality of good chicken eggs and good quality chicken eggs, with accurate introduction of good quality eggs by 90% and poor quality eggs by 80%.
Victor Paskalathis, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.16631

Abstract:Common practice in crowdsourced delivery services is through direct delivery. That is by dispatching direct trip to a driver nearby the origin location. The total distance can be reduced through multiple pickup and delivery by increasing the number of requests in a trip.The research implements exact algorithm to solve the consolidation problem with up to 3 requests in a trip. Greedy heuristic is performed to construct initial route based on highest savings. The result is then optimized using Ant Colony Optimization (ACO). Four scenarios are compared. A direct delivery scenarios and three multiple pickup and delivery scenarios. These include 2-consolidated delivery, 3-consolidated delivery, and 3-consolidated delivery optimized with ACO. Four parameters are used to evaluate using Analytical Hierarchical Process (AHP). These include the number of trips, total distance, total duration, and security concerns.The case study is based on Yogyakarta area for a whole day. The final route optimized with ACO shows 178 requests can be completed in 94 trips. Compared to direct delivery, consolidation can provides savings up to 20% in distance and 14% in duration. The evaluation result using AHP shows that ACO scenario is the best scenario.
Ari Kusuma Wardana, Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.24214

Abstract:Genetic Algorithm is one of famous algorithm and often used in many sector. Usually genetic algoritm is used in solution searching about complex problems. Pencak silat macth scheduling is a complex scheduling and needs a lot of time to made it. Objective this research implements a genetic algorithm as an algorithm which can solve the problem of pencak silat macth scheduling and can satisfy all of hard constraint and minimize soft constraint. In this research genetic algorithm roles as algorithm which solves pencak silat mach scheduling problems in Pimda 02 Tak Suci Bantul. Population which produced by genetic algorithm represents solution alternatives which offered. Best chromosome in a population represents macth scheduling solution. This solution is sequence of match partai based on rules of pencak silat match scheduling. This research produces best fitness value ever in each generation is 1. More and more chromosom number and more and more generation number will make batter solution and batter fitness value. This research is expected helping pencak silat match committes make a pencak silat schedule in pencak silat championship.
Made Arya Budhi, Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.22773

Abstract:Determining the best employee at Lombok Garden inteded to stimulate the performance of the hotel employees Lombok Garden. Improved performance of employees it will have a direct effect on the quality of hotel services. Employee performance appraisement are conducted by six assessors, namely the head of each department and consists of several criteria. Assessments will be difficult if done manually considering each appraiser has its own preferences in assessment. To solve that problem, we need a computer system that helps decision-making is a group decision support system (GDSS) determination of the best employees in the hotel Lombok Garden.Group decision support system developed in this study using TOPSIS (Technique For Order Preference By Similiarity To Ideal Solution) and Borda to assist decision-making group. TOPSIS method is used for decision-making in each appraiser, while the Borda method used to combine the results of each assessor's decision so as to obtain the final result of the best employees in Lombok Garden.Based on the final result of the system of determination of the best employees in the form of a ranking of the final value of each employee. The highest value will be used as a recommendation as the best employee at Lombok Garden.
Pawit Rianto, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.17416

Abstract:Because there is no a system based on Digital Image Processing to determine the degree of ripeness of Salak Pondoh (Salacca zalacca Gaertner Voss.) on tree, then this study has attempted to implement such a system. System was built with consists of several sub-processes. First, the segmentation process, the system will perform a search of pixels alleged pixels salak pondoh, by utilizing the features of color components r, g, b, and gray of each pixel salak pondoh then calculated large the dissimilarity ( Euclidean Distance ) against values of data features , , , and comparison. If the value of dissimilarity less than the threshold value and is also supported by the neighboring pixels from different directions has a value of dissimilarity is less than a threshold value, the pixel is set as an object pixel, for the other condition set as background pixels. For the next, improvements through an elimination noise stage and filling in the pixels to get a perfect binary image segmentation. Second, classification, by knowning the mean value of R and V of the entire pixel object, then the level of ripeness salak pondoh can be determined by using the method of classification backpropagation or k -Nearest Neighbor. From the test results indicate that the success of the system by 92% when using a backpropagatioan classification algorithm and 93% with k-Nearest Neighbor algorithm.
Muhammad Fahrurrozi, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.18360

Abstract:Semantic web is a technology that allows us to build a knowledge base or ontology for the information of the web page can be understood by computers. One software for building ontology-based semantic web is a protégé. Protege allows developers to develop an ontology with an expression of logic description. Protégé provides a plugin such as DL-Query and SPARQL-Query to display information that involve expression of class, property and individual in the ontology. The problem that then arises is DL-plugin Query only able to process the rules that involve expression of class to any object property, despite being equipped with the function of reasoning. while the SPARQL-Query plugin does not have reasoning abilities such as DL-Query plugin although the SPARQL-Query plugin can query memperoses rules involving class, property and individual. This research resulted in a new plugin using SPARQL-DL with input natural language as a protégé not provide a plugin with input natural language to see results from the combined expression-expression contained in the ontology that allows developers to view information ontology language that is easier to understand without having think of SPARQL query structure is complicated.
Lukman Heryawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.24761

Abstract:Diabetic retinopathy is a complication caused by diabetes mellitus. Diabetic retinopathy, if not handled properly can lead to blindness. A necessary step to prevent blindness is early detection. Early detection can be done by finding the initial symptoms that microaneurysm. In this research, a system made to detect diabetic retinopathy using algorithms detection microaneurysm with mathematical morphology. The algorithm is divided into three stages of preprocessing, detecting candidate microaneurysm and postprocessing. In this research, the system will be made by using a raspberry pi as the media. To see how well the system detects diabetic retinopathy, the test will be done. in the tests performed, system obtained an accuracy of 90%, sensitivity 90, and specificity of 55% using data diaretdb1. While testing using data from e-ophtha obtained results with an accuracy of 70.5%, a sensitivity of 80% and a specificity of 60%.
Pradita Eko Prasetyo Utomo, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.16643

Abstract:Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle.This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents, vehicles and unemployment. The study also determined the classification level of vulnerability to the crime of theft of a motorcycle using a method based on the Decision Tree CART ARIMA forecasting method.Forecasting time series data with ARIMA method performed by each of the variables to produce the best ARIMA forecasting model which varies based on the data pattern of each of those variables. The results of classification by CART method to get the value of accuracy of 92% for the city of Yogyakarta and 85% for DIY. Based on the above, the results of ARIMA forecasting and classification CART can be used in determining the level of vulnerability to the crime of theft of motorcycles.
Bambang Hermanto, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.15946

Abstract:In an effort to improve the quality of customer service, especially in terms of feasibility assessment of borrowers due to the increasing number of new prospective borrowers loans financing the purchase of a motor vehicle, then the company needs a decision making tool allowing you to easily and quickly estimate Where the debtor is able to pay off the loans.This study discusses the process generates C4.5 decision tree algorithm and utilizing the learning group of debtor financing dataset motorcycle. The decision tree is then interpreted into the form of decision rules that can be understood and used as a reference in processing the data of borrowers in determining the feasibility of prospective new borrowers. Feasibility value refers to the value of the destination parameter credit status. If the value of the credit is paid off status mean estimated prospective borrower is able to repay the loan in question, but if the credit status parameters estimated worth pull means candidates concerned debtor is unable to pay loans..System testing is done by comparing the results of the testing data by learning data in three scenarios with the decision that the data is valid at over 70% for all case scenarios. Moreover, in generated tree and generate rules takes fairly quickly, which is no more than 15 minutes for each test scenario
Eka Wahyudi, Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.15523

Abstract:Case Based Reasoning (CBR) is a computer system that used for reasoning old knowledge to solve new problems. It works by looking at the closest old case to the new case. This research attempts to establish a system of CBR for diagnosing heart disease. The diagnosis process is done by inserting new cases containing symptoms into the system, then the similarity value calculation between cases uses the nearest neighbor method similarity, minkowski distance similarity and euclidean distance similarity. Case taken is the case with the highest similarity value. If a case does not succeed in the diagnosis or threshold <0.80, the case will be revised by experts. Revised successful cases are stored to add the systemknowledge. Method with the best diagnostic result accuracy will be used in building the CBR system for heart disease diagnosis. The test results using medical records data validated by expert indicate that the system is able to recognize diseases heart using nearest neighbor similarity method, minskowski distance similarity and euclidean distance similarity correctly respectively of 100%. Using nearest neighbor get accuracy of 86.21%, minkowski 100%, and euclidean 94.83%
Dharma Pratama, Seng Hansun
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.15558

Abstract:Food is one of the basic needs for human being. The needs of food will always increase unanimous with the number of people, so that many restaurants appear. Because of there are so many restaurants, it can arise a confusion when we want to choose a restaurant to eat. Therefore, an application which can give a restaurant recommendation will be built in this research. The recommendation given by the system is calculated using Slope One algorithm and the restaurants database is gathered from Google Places API. Slope One algorithm make the recommendation by summing the rating of a restaurants with the difference average to other restaurants. The application also had been tested to the user by using J.R.Lewis questionnaire with questions categories of application usefulness, information quality, and user interface quality. The results from the testing are user find the application useful to give the proper restaurant recommendation, the information quality is good, and the user interface quality is also good.
Ria Astriratma, Retantyo Wardoyo, Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.17342

Abstract:Through the State Civil Apparatus Law, the Government attempt to reduce nepotism by creating an open competition system among civil servants in the process of filling positions. Regional Civil Service Agency (BKD) Tarakan already has personnel database and decision support system that can combine the existing database with the scoring model to get the candicate profile who fit with vacant positions is needed to support more objective performance.The Application of profile matching method in this decision support system is expected to help the candidate selection process on structural officer in the Government of Tarakan comply with the ability of a required field in a position. From the research we concluded that the change in the value of the candicate profile, and the number of subcriteria that used to categorize the positions can affect the closeness of candidates with vacant position and the use of profile matching method for case that the highest value is the best value requires that the ideal value used is the value the maximum in order to avoid exceeding the expectations of ideal.
Siti Khomsah, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.15927

Abstract:The successful rate of the poor families empowerment can be classified by characteristic patterns extracted from the database that contains the data of the poor families empowerment. The purpose of this research is to build a classification model to predict the level of success from poor families, who will receive assistance empowerment of poverty. Classification models built with WARM, which is combining two methods, they are HITS and WIT-tree. HITS is used to obtained the weight of the attributes from the database. The weights are used as the attributes’s weight on methods WIT-tree. WIT-tree is used to generate the association rules that satisfy a minimum weight support and minimum weight confidence. The data used was 831 sample data poor families that divided into two classes, namely poor families in the standard of "developing" and poor families in the level of "underdeveloped". The performance of classification model shows, weighting attribute using HITS approaches the accuracy of 86.45% and weighted attributes defined by the user approaches the accuracy of 66.13%. This study shows that the weight of the attributes obtained from HITS is better than the weight of the attributes specified by the user.
Adri Priadana, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.17526

Abstract:There is still a lot of juvenile delinquency in the middle of the community, especially people in urban areas, in the modern era. Juvenile delinquency may be fights, wild racing, gambling, and graffiti on the walls without permission. Vandalized wall is usually done on walls of office buildings and on public or private property. Results from vandalized walls can be seen from the image of the change between the initial image with the image after a motion.This study develops a image change detection system in video to detect the action of graffiti on the wall via a Closed-Circuit Television camera (CCTV) which is done by simulation using the webcam camera. Motion detection process with Accumulative Differences Images (ADI) method and image change detection process with Illumination Invariant Change Detection method coupled with image cropping method which carried out a comparison between the a reference image or image before any movement with the image after there is movement.Detection system testing one by different times variations, ie in the morning, noon, afternoon, and evening. The proposed method for image change detection in video give results with an accuracy rate of 92.86%.
Dirja Nur Ilham, Sri Mulyana
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.16595

Abstract:The right Placement Job Training (PKL) selection for the students is a very important thing, because it can maximize the abilities and talents of each student so that can produce graduates who are ready to compete in the world of work. The most common problem of PKL selection is the lack of competence in terms of the needs of the company, as well as the needs of students will be on PKL place selection. To overcome these problems required a computer system in the form of group decision support systems (GDSS) who can help South Aceh Polytechnic for the selection of the right vendors for students. In this study, Group decision support system developed by using AHP (Analytical Hierarchy Process) and Borda for group decision-making. AHP method is used to determine the weights of criteria and sub-criteria of each company where PKL alternative to alternative perangkingan company for each student from each of the decision makers. Borda method used for incorporation gradement results obtained by each decision maker so getting rank final and decisive recommendations PKL student places. Based on the outcome of a group decision support system in the form of a rank of criteria values of students to alternative company where PKL placement selection. And alternative companies that get the highest yield serve as recommendations PKL student placement decisions for computer engineering department Polytechnics South Aceh.
Mugenzi Thierry, Tri Kuntoro Priyambodo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.17167

Abstract:E-Government basically comprises the use of electronic communications technologies such as the internet, in enhancing and advancing the citizens access to public services. In most developing countries including Burundi, citizens are facing many difficulties for accessing public services. One of the identified problems is the poor quality of service in managing citizens’ complaints. This study proposes an SMS and web based e-Government Model as a solution. In this study, a case study of a complaint management system at District of Gihosha has been used as a reference to prove that SMS and Web based e-Government Model can enhances the access of public services. The objective of this study is the development of an SMS and web-based system that can enhances the process and the management of citizens’ complaints at District of Gihosha. The system has been developed using PHP as front end, Apache as web server, MySQL as Database and Gammu as SMS gateway. The obtained results after testing the system shows that all the functionalities of the developed system worked properly. Thus, the SMS and web based complaint management system developed is considered to be effective.
Fuzy Yustika Manik, Kana Saputra saragih
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.17838

Abstract:Post harvest issues on star fruit are produced on a large scale or industry is sorting. Currently, star fruit classified by rind color analysis visually human eye. This method does not effective and inefficient. The research aims to classify the starfruit sweetness level by using image processing techniques. Features extraction used is the value of Red, Green and Blue (RGB) to obtain the characteristics of the color image. Then the feature extraction results used to classify the star fruit with Naïve Bayes method. Starfruit image data used 120 consisting of 90 training data and 30 testing data. The results showed the classification accuracy using RGB feature extraction by 80%. The use of RGB as the color feature extraction can not be used entirely as a feature of the image extraction of star fruit.
Tonny Suhendra, Tri Kuntoro Priyambodo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 11; doi:10.22146/ijccs.15743

Abstract:Development of technology and complexity of an environment (dynamic environtment), the use of algorithms in path planning becomes an important thing to do, problem to be solved by the path planning is safe patch (collision-free), second is the distance traveled, ie, the path length is generated from the robot start position to the current target position and the thirdtravel time, ie, the timerequired by the robot to reached its destination.this research uses ACO algorithm and A-star Algorithm to determine the influence of obstacles (simple environment) and also differences in the pattern of the target motion (linier and sinusoidal)on the ability of the algorithm in pathplanning for finding the shortest path. The test results show that for a simple environtment where the state of target and obstacles still static,the resukt that A-star algorithm is betterthan ACO algorithm both in terms of travel time and travel distance. Testing with no obstacles, seen from the distance travelled differences obtained of 0,57%, whereas for testing with obstacles difference of 9%. Testing in a complex environtment where the targets and obstacles which movesdinamically with a certain pattern, from the three environmental conditions that has been tested, ACO algorithm is better than A-star algorithm where the ACO algorithm can find a path with optimal distance or the sortest distance.
Fadhila Tangguh Admojo, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.11186

Abstract:Mountain climbing path information has been widely available on the internet. However, to get information that suits the needs of climbers take time to browse and compare all the available information. The diversity of the search results content actually confuse the climbers. This research aims to provide a solution to the problems faced by climbers, by developing an information retrieval system for mountain climbing path using semantic technology (ontology) based approach . The system is developed by using two knowledge base (ontology), ontology Bahasa represents linguistic knowledge and ontology Mountaineering represents mountaineering knowledge. The system is designed to process and understand natural language input form. The process of understanding the natural language based on syntactic and semantic analysis using the rules of Indonesian grammar. The results of the research that has been conducted shows that the system is able to understand natural language input and is capable of detecting input that is not in accordance with the rules of Indonesian grammar both syntactically and semantically. The system is also able to use a thesaurus of words in the search process. Quantitative test results show that the system is able to understand 69% of inputs are taken at random from the respondents.
Yuning Widiarti Darsono, Adianto Adianto, Mirna Apriani
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15491

Abstract:The need for monitoring, effective and efficient control and evaluation of water quality in regional waters Surabaya become a demand for population growth, climate change and variability in the current era of urbanization. The traditional method is done by collecting water samples, test and analyze water in the laboratory has been relatively expensive and do not have the ability to capture real-time data, analysis and information delivery fast in making decisions. On the other hand, the rapid spread in the use of mobile phones in developing countries has increased mobile data management applications. A variety of mobile applications has also increased in recent years. This is because mobile phones cheap, easy to use and can transmit multiple types of information including images and GPS data remotely. In this paper, the author describes a data communication system of water quality resources based on UDP protocol. This system is called ubiquitous mobile sensing consisting of microcontroller Arduino, water quality sensors, and Android smartphones. It has the ability to detect temperature, dissolved oxygen (DO), pH and electrical conductivity (EC) in real time. By using this monitoring system, the data result is expected more accurate, faster and cheaper.
Mulyanto Mulyanto, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15528

Abstract:As an important IT infrastructure, website is a system which requires high reliability and availability levels. Website meets the criteria as a highly available system because website must provide services to clients in real time, handle a large amount of data, and not lose data during transaction. A highly available system must meet the condition of being able to run continuously as well as guaranteeing consistency on data requests. This study designed a website with high availability. The approach was building network cluster with failover and replicated block device functions. Failover was built to provide service availability, while replicated block device provides data consistency during failure of service. With failover cluster and replicated block device approaches, a cluster which is able to handle service failures of web server and database server on the website. The result of this study was the services of the website could run well if there was any failure in node members of the cluster. The system was able to provide 99,999 (five nines) availability on database server services and 99,98 (three nines) on web server services.
Nola Ritha, Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15532

Abstract:Rainfall prediction can be used for various purposes and the accuracy in predicting is important in many ways. In this research, data of rainfall prediction use daily rainfall data from 2013-2014 years at rainfall station in Putussibau, West Kalimantan. Rainfall prediction using four parameters: mean temperature, average humidity, wind speed and mean sea level pressure.This research to determine how performance Neural Fuzzy Inference System with Levenberg-Marquardt training algorithm for rainfall prediction. Fuzzy logic can be used to resolve the linguistic variables used in rule of rainfall. While neural networks have ability to adapt and learning process, due to recognize patterns of data from input need training to prediction. And Levenberg-Marquardt algorithm is used for training because of effectiveness and convergence acceleration.The results showed five models NFIS-LM developed using a variety of membership functions as input obtained that model NFIS-LM with twelve of membership functions and use four inputs, such as mean temperature, average humidity, wind speed and mean sea level pressure gives best results to predict rainfall with values Mean Square Error (MSE) of 0.0262050. When compared with model NN-Backpropagation, NFIS-LM models showed lower accuracy. It is shown from MSE generated where model NN-Backpropagation generate MSE of 0.0167990.
Made Leo Radhitya, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15949

Abstract:One of the dangers that occur at the beach is rip current. Rip current is significant danger for beachgoers. This research tried to serve the geographical information about rip current's occurence risk by using decision tree that built by C4.5 Algorithm. The output from decision tree is rip current's occurrence risk. Case study in this research is the beach that located at Rote Island, Rote Ndao, Nusa Tenggara Timur.The system evaluation result shown the average of accuracy is 0.84, the average of precision is 0.61, the average of recall is 0.68 and the average of F-measure is 0.59 from range 0 to 1.
Kharis Syaban, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.16628

Abstract:Compared with other methods of classifiers such as cellular and molecular biological methods, using the image of the leaves become the first choice in the classification of plants. The leaves can be characterized by shape, color, and texture; The leaves can have a color that varies depending on the season and geographical location. In addition, the same plant species also can have different leaf shapes. In this study, the morphological features of leaves used to identify varieties of pepper plants. The method used to perform feature extraction is a moment invariant and basic geometric features. For the process of recognition based on the features that have been extracted, used neural network methods with backpropagation learning algorithm. From the neural-network training, the best accuracy in classifying varieties of chili with minimum error 0.001 by providing learning rate 0.1, momentum of 0.7, and 15 neurons in the hidden layer foreach of various feature. To conduct cross-validation testing with k-fold tehcnique, obtained classification accuracy to be range of 80.75%±0.09% with k=4.
Devid Haryalesmana Wahid, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.16625

Abstract:Antusias masyarakat yang memberikan perhatian lebih terhadap akun resmi selebriti di Twitter memunculkan tren penggunaan Twitter sebagai upaya manajemen kesan. Penggalian reaksi masyarakat di media sosial merupakan upaya strategis untuk memperoleh umpan balik, namun tidak mudah dilakukan. Pengguna membutuhkan waktu yang lama untuk membaca ribuan tweet sekaligus memilah sentimennya, sehingga dibutuhkan peringkasan sentimen ekstraktif secara otomatis. Penelitian terdahulu umumnya tidak memasukkan informasi sentimen yang terkandung pada sebuah tweet sebagai bobot peringkat kalimat, sehingga hasil ringkasan masih berupa topik umum yang dibicarakan masyarakat. Penelitian ini bertujuan mengkombinasikan metode SentiStrength, Hybrid TF-IDF dan Cosine Similarity untuk mengekstraksi ringkasan sentimen positif dan negatif masyarakat terhadap topik selebriti di Twitter secara otomatis, dengan artis Agnes Monica sebagai studi kasus. Metode SentiStrength digunakan untuk mendapatkan skor kekuatan sentimen dan mengklasifikasi tweet ke dalam kelas positif, negatif dan netral. Tweet bersentimen positif dan negatif diringkas dengan cara pemeringkatan tweet menggunakan Hybrid TF-IDF yang dikombi­nasi dengan skor kekuatan sentimen, kemudian menghilangkan tweet yang mirip menggunakan Cosine Similarity.Hasil pengujian memperlihatkan bahwa kombinasi SentiStrength, Hybrid TF-IDF, dan Cosine Similarity mampu menghasilkan ringkasan sentimen dengan akurasi yang lebih baik dibandingkan menggunakan Hybrid TF-IDF saja, dengan perolehan akurasi rata-rata sebesar 60% dan f-measure sebesar 62%. Hal ini disebabkan karena penambahan kekuatan sentimen sebagai bobot peringkasan.
Azizah Fatmawati, Azhari SN, Nisa RNA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.17521

Abstract:Saks Sentence Completion Test (SSCT) is one of the projective tests for revealing personality dynamics that is able to show characters of someone toward his or her interpersonal relationship and interpretation to environment. Normally, this kind of test is conducted by psychologists where they have very important and complicated task to interpret respondents' answer test. However, since the advance development of intelligent agent based system, the task that is previously complicated for psychologist now becoming easier. They just need to delegate intelligent agent software to interpret the test result from respondent in order to decide the test result.In this research we developed an intelligent agent software using Java Agent Development Framework (JADE) and BDI as agents architecture with Prometheus method. The application development focuses on how to utilize summary method to generate answer model from SSCT while the psychologists are able to obtain interpretation result immediately.Results showed that the average percentage of successfully identified answers by the model reaches 59.00% while the average percentage of its accuracy is 95.13%. Moreover, by using four agents that are communicating each other psychologists may obtain the test result.
Doni Setyawan, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.17485

Medi Taruk, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15529

Abstract:Transmission Control Protocol (TCP) is a protocol that works at the transport layer of the OSI model. TCP was originally designed more destined for a wired network. However, to meet the need for the development of a very fast network technology based on the needs of the use by the user, it needs further development to the use of TCP on wireless devices. One implementation of a wireless network based on Worldwide Interoperability for Microwave Access (WiMAX) network is a model that offers a variety advantage, particularly in terms of access speed.In this case, use NS-2 to see throughput at TCP variants tested, namely TCP-Tahoe, TCP-Reno, TCP-Vegas, and TCP-SACK over WiMAX network model, with few observations scenarios. The first is a look at each of these variants throughput of TCP when only one particular variant of the work in the network. Second observe all variants of TCP throughput at the same time and have the equivalent QoS, but with the possibility of a small congestion based on the capacity of the link is made sufficient. Third observed throughput with multi congestion.In WiMAX network has scheduling services are UGS, rtPS and ertPS using UDP protocol and nrtPS and BE using the TCP Protocol. By using the software network simulator (NS-2) to obtain performance comparison TCP protocol-based services on the WiMAX network with QoS parameters are throughput, packet loss, fairness and time delay.
Kabul Kurniawan, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.15525

Abstract:The Implementation of web services using point-to-point method considered to be irrelevant weather the number of services are growing up rapidly and more complex. In the other hand, the differences of web service implementation standard is also being a serious problem when the integration and communication among web services are needed.One way that can be applied to provide management information system integration among others is the implementation of Enterprise Service Bus (ESB). ESB is an infrastructure that can be the solution of n-to-n integration complexity problem. ESB concept strongly supports the implementation of Service Oriented Architecture (SOA).This research will discuss about the implementation of ESB in government area, especially in Sleman, sub-district of Daerah Istimewa Yogyakarta local government, Indonesia. Some of ESB functionality such as Routing and Transformation are applied to solve the integration problem between Government to Public (G2P) in case of checking lisence process at Badan Penanaman Modal dan Izin Terpadu (BMPT) Sleman Sub-Distric. The results show that the ESB can be used as the mediator of information integration in case of checking lisence process. Beside that, the results of performance testing shows that the average execution time (AET) for service operations reach up to 0,085 seconds. Furthermore, the system has an average amount of execution about 11.99 times and produces data about 15746.86 bytes or equivalent to 15.38 KB per second. These results indicate that the execution time is considered to be small enaugh so that the services will not interfere the process of the transactions.
I Gede Winaya, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.11188

Abstract:MongoDB is a database that uses document-oriented data storage models. In fact, to migrate from a relational database to NoSQL databases such as MongoDB is not an easy matter especially if the data are extremely complex. Based on the documentation that has been done by several global companies related to the use of MongoDB, it can be concluded that the process of migration from RDBMS to MongoDB require quite a long time. One process that takes quite a lot is transformation of relational database schema into a document-oriented data model on MongoDB. This research discusses the development transformation system of relational database schema to the document oriented data model in MongoDB. The process of transformation is done by utilizing the structure and relationships between tables in the scheme as the main parameters of the modeling algorithm. In the process of the modeling documents, it necessary to adjustments the specifications of MongoDB document that formed document model can be implemented in MongoDB. Document models are formed from transformation process can be a single document, embedded document, referenced document or combination of these. Document models are formed depending on the type, rules, and the value of the relationships cardinality between tables in the relational database schema.
Rachmat Wahid Saleh Insani, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 93-102; doi:10.22146/ijccs.11192

The publisher has not yet granted permission to display this abstract.
Annisa Mauliani, Sri Hartati, Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 71-80; doi:10.22146/ijccs.11190

The publisher has not yet granted permission to display this abstract.
I Nym Saputra Wahyu Wijaya, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 81-92; doi:10.22146/ijccs.11191

The publisher has not yet granted permission to display this abstract.
Aina Musdholifah, Mujiono Mujiono
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 1-10; doi:10.22146/ijccs.11184

The publisher has not yet granted permission to display this abstract.
Dian Hafidh Zulfikar, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 35-46; doi:10.22146/ijccs.11187

The publisher has not yet granted permission to display this abstract.
Teguh Susyanto, Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 103-114; doi:10.22146/ijccs.12734

The publisher has not yet granted permission to display this abstract.
Murhaban Murhaban, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10; doi:10.22146/ijccs.11189

Abstract:Handover method is used to keep the stabilization of connection. Its connected with the performance was caused the process canal traffic transfer automatically in mobile station (MS) that was used to communicate without cutting off the connection. The main factor of success in handover was quality of service to provide the difference level of service in arranging and giving the traffic priority in the network like voice over IP (VoIP) application or communication voice using internet network. This research will analyse the achievement quality of service in the WiMax network standard 802.16e used hard handover and softhandover method with the VoIP application in mobile station. Based on the testing that was carried out hard handover and soft handover method used the application of voice over internet protocol in mobile station has obtained value jitter 0.001 Ms – 0.31 ms, and delay 10.5 ms 39 ms this is proved that the influence of jitter and delay against handover with the VoIP application still in the tolerance stage that was permitted. It is different with the output throughput 85 Bit/Sekon - 550 Bit/Sekon that is too low and indicated that throughput is not sentitif against handover with the voice over internet protocol application.
Ahmad Ashari, Alimuddin Alimuddin
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 10, pp 11-22; doi:10.22146/ijccs.11185

The publisher has not yet granted permission to display this abstract.
Yoga Dwitya Pramudita, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9; doi:10.22146/ijccs.7546

The publisher has not yet granted permission to display this abstract.
Jani Kusanti, Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 187-196; doi:10.22146/ijccs.7547

The publisher has not yet granted permission to display this abstract.
Izmy Alwiah Musdar, Azhari SN
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 157-166; doi:10.22146/ijccs.7544

The publisher has not yet granted permission to display this abstract.
Dwi Agus Diartono, Yohanes Suhari, Aji Supriyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 145-156; doi:10.22146/ijccs.7543

The publisher has not yet granted permission to display this abstract.
Erma Susanti, Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 111-120; doi:10.22146/ijccs.7540

The publisher has not yet granted permission to display this abstract.
Agus Halid, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 133-144; doi:10.22146/ijccs.7542

The publisher has not yet granted permission to display this abstract.
Hence Beedwel Lumentut, Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 197-206; doi:10.22146/ijccs.7548

The publisher has not yet granted permission to display this abstract.
Wayan Gede Suka Parwita, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 167-176; doi:10.22146/ijccs.7545

The publisher has not yet granted permission to display this abstract.
La Surimi, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 121-132; doi:10.22146/ijccs.7541

The publisher has not yet granted permission to display this abstract.
Agus Harjoko, Herman Herman
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 207-218; doi:10.22146/ijccs.7549

The publisher has not yet granted permission to display this abstract.
Decky Hendarsyah, Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 5; doi:10.22146/ijccs.1997

The publisher has not yet granted permission to display this abstract.
Christian Dwi Suhendra, Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 77-88; doi:10.22146/ijccs.6642

The publisher has not yet granted permission to display this abstract.
I Putu Adi Pratama, Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9; doi:10.22146/ijccs.6641

The publisher has not yet granted permission to display this abstract.
Ika Oktavia Suzanti, Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 13-22; doi:10.22146/ijccs.6636

The publisher has not yet granted permission to display this abstract.
Effan Najwaini, Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 89-100; doi:10.22146/ijccs.6643

The publisher has not yet granted permission to display this abstract.
Freska Rolansa, Azhari S.N.
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 9, pp 101-110; doi:10.22146/ijccs.6644

The publisher has not yet granted permission to display this abstract.
Agustinus Jacobus, Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 8, pp 13-24; doi:10.22146/ijccs.3491

The publisher has not yet granted permission to display this abstract.
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 8; doi:10.22146/ijccs.3489

The publisher has not yet granted permission to display this abstract.
Peggi Sri Astuti, Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 8, pp 1-12; doi:10.22146/ijccs.3490

The publisher has not yet granted permission to display this abstract.
Nur Rokhman, Iqnatius Dimas Nugroho
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 7, pp 209-220; doi:10.22146/ijccs.3361

The publisher has not yet granted permission to display this abstract.
Sri Hartati, Sri Nurdiati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems), Volume 5; doi:10.22146/ijccs.1996

Abstract:— In recent years, the occurrence of protein shortage of children under 5 years old in many poor area has dramatically increased. Since this situation can cause serious problem to children like a delay in their growth, delay in their development and also disfigurement, disability, dependency, the early diagnose of protein shortage is vital. Many applications have been developed in performing disease detection such as an expert system for diagnosing diabetics and artificial neural network (ANN) applications for diagnosing breast cancer, acidosis diseases, and lung cancer. This paper is mainly focusing on the development of protein shortage disease diagnosing application using Backpropagation Neural Network (BPNN) technique. It covers two classes of protein shortage that are Heavy Protein Deficiency. On top of this, a BPNN model is constructed based on result analysis of the training and testing from the developed application. The model has been successfully tested using new data set. It shows that the BPNN is able to early diagnose heavy protein deficiency accurately. Keywords— Artificial Neural Network, Backpropagation Neural Network, Protein Deficiency.
Page of 1
Articles per Page
by

Refine Search

Authors

New Search

Advanced search