cover
Contact Name
Rizki Wahyudi
Contact Email
rizki.key@gmail.com
Phone
+6281329125484
Journal Mail Official
telematika@amikompurwokerto.ac.id
Editorial Address
The Telematika, with registered number ISSN 2442-4528 (online) ISSN 1979-925X (print) is a scientific journal published by Universitas Amikom Purwokerto. The journal registered in the CrossRef system with Digital Object Identifier (DOI) prefix 10.35671/telematika. The aim of this journal publication is to disseminate the conceptual thoughts or ideas and research results that have been achieved in the area of Information Technology and Computer Science. Every article that goes to the editorial staff will be selected through Initial Review processes by the Editorial Board. Then, the articles will be sent to the Mitra Bebestari/ peer reviewer and will go to the next selection by Double-Blind Preview Process. After that, the articles will be returned to the authors to revise. These processes take a month for a minimum time. In each manuscript, Mitra Bebestari/ peer reviewer will be rated from the substantial and technical aspects. The final decision of articles acceptance will be made by Editors according to Reviewers comments. Mitra Bebestari/ peer reviewer that collaboration with The Telematika is the experts in the Information Technology and Computer Science area and issues around it.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Telematika
ISSN : 1979925X     EISSN : 24424528     DOI : 10.35671/telematika
Core Subject : Education,
Jl. Letjend Pol. Soemarto No.126, Watumas, Purwanegara, Kec. Purwokerto Utara, Kabupaten Banyumas, Jawa Tengah 53127
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol 14, No 2: August (2021)" : 6 Documents clear
Topic Modeling of Online Media News Titles during COVID-19 Emergency Response in Indonesia Using the Latent Dirichlet Allocation (LDA) Algorithm M Didik R Wahyudi; Agung Fatwanto; Usfita Kiftiyani; M. Galih Wonoseto
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1225

Abstract

Online media news portals have the advantage of speed in conveying information on any events that occur in society. One way to know what a story is about is from the title. The headline is a headline that introduces the reader's knowledge about the news content to be described. From these headlines, you can search for the main topics or trends that are being discussed. It takes a fast and efficient method to find out what topics are trending in the news. One method that can be used to overcome this problem is topic modeling. Topic modeling is necessary to help users quickly understand recent issues. One of the algorithms in topic modeling is Latent Dirichlet Allocation (LDA). The stages of this research began with data collection, preprocessing, forming n-grams, dictionary representation, weighting, validating the topic model, forming the topic model, and the results of topic modeling. The results of modeling LDA topics in news headlines taken from www.detik.com for 8 months (March-October 2020) during the COVID-19 pandemic showed that the best number of topics produced each month were 3 topics dominated by news topics about corona cases, positive corona, positive COVID, COVID-19 with an accuracy of 0.824 (82.4%). The resulting precision and recall values indicate that the two values are identical, so this is ideal for an information retrieval system.
Data Mining Method to Determine a Fisherman's Sailing Schedule Using Website Dwi Ayu Mutiara; Alung Susli; Didit Suhartono; Dani Arifudin; Imam Tahyudin
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1193

Abstract

Some of Cilacap people live in coastal areas as fishermen who utilize the seafood to meet the needs of life. One of the fishermen supporters in the cruise is the information of Meteorological, Climatological, and Geophysical Agency (BMKG). This information is important for safety such as wind speed and wave height. For addressing the problem, research is conducted to determine the sailing schedule of fishermen using data mining method with the website based. The proposed method is using Support Vector Machine (SVM) classification algorithm. This research uses data from BMKG Cilacap from 2015 until 2017. Test data is part of data that is 30% randomly fetched from the overall data used. From model testing, get value with performance results from datasets that generate accuracy of 88%, 87% precision and 89% recall. This solution is followed by constructing the website in order to easy to access of sailing information. Therefore, the researcher created a website of fisherman sailing scheduling system based on SVM algorithm.
CNN Architecture for Classifying Types of Mango Based on Leaf Images Nur Nafi'iyah; Jauharul Maknun
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1262

Abstract

In such conditions, it is necessary to have a system that can automatically classify plant species or identify types of plant diseases using either machine learning or deep learning. The plant classification system for ordinary people who are not familiar with the field of crops is not an easy job, it requires in-depth knowledge of the field from the experts. This study proposes a system for identifying mango plant species based on leaves using the CNN method. The reason for proposing the CNN method from previous research is that the CNN method produces good accuracy. Most previous studies to classify plant species use the leaves of the plant. The purpose of this study is to propose a CNN architectural model in classifying mango species based on leaf imagery. The input image of colored mango tree leaves measuring 224x224 is trained based on the CNN architectural model that was built. There are 4 CNN architectural models proposed in the study and 1 transfer learning InceptionV4. Based on the evaluation test results of the proposed CNN architectural model, that the best architectural model is the third. The number of parameters of the third CNN architecture is 1,245,989 with loss values and accuracy during evaluation are 1,431 and 0.55. The largest number of parameters is transfer learning InceptionV3 21,802,784, but transfer learning shows the lowest accuracy value and the highest loss, namely 0.2, and 1.61.
Smart Payment Application Security Optimization from Cross-Site Scripting (XSS) Attacks Based on Blockchain Technology Imam Riadi; Rusydi Umar; Tri Lestari
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1221

Abstract

The digital era is an era everyone has used technology and they are connected to each other very easily. The Smart Payment application is one of the applications that is developing in the digital era. This application is not equipped with security, so there is a concern that hackers will try to change user or even change user data. One of the possible attacks on this application is a cross-site attack (XSS). It is a code injection attack on the user side. Security in the Smart Payment application needs to be improved so that data integrity is maintained. In this research, security optimization is carried out by implementing blockchain. Blockchain has the advantage in terms of security with the concept of decentralization by utilizing a consensus algorithm that can eliminate and make improvements to data changes made by hackers. The result obtained from this study is the implementation of blockchain to maintain the security of payment transaction data on the Smart Payment application from XSS attacks. It is proven by the results of the vulnerability before and after blockchain implementation. Before the implementation of the vulnerability is found, 1 XSS vulnerability had a high level of overall risk. Meanwhile, the result of the vulnerability after blockchain implementation was not found from XSS attacks (the XSS vulnerability was 0 or not found).
The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding Ilham Firman Ashari
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1031

Abstract

Information security is an important aspect of maintaining the confidentiality of information. One type of document kept secret is images (.jpg, .png, .gif, dan .bmp). MP3 audio files are popular audio files that can be used as a medium for steganography. The method implemented in this study uses Base64 in the image and the insertion method used is using Low-Bit Encoding (LBE). In this study, the parameters of the value of LBE will be evaluated. The purpose of the evaluation is to compare the LBE parameter parameters that are the most optimal in securing the message while taking into account the quality of steganographic files. The results obtained from the study are the proposed method that supports the imperceptibility aspect seen from the image histogram and audio frequency spectrum. The fidelity aspect is seen from the PSNR and SNR values, where The optimal value on the LBE + 2 parameter is by considering the capacity of the picture message that can be inserted and audio quality. PSNR LBE + 2 values range from 50-60 dB with SNR different about 0.01% from LBE + 1. The proposed method does not support the robustness aspect because it is not resistant to attacks by bit rate manipulation and channel mode. The test results on the recovery aspect are worth 100%, meaning that the image's quality and size before and after extraction will be the same. And finally, the test results on the payload aspect, there is an increase in message capacity with LBE + 2 around 12.5% of LBE + 1, and using LBE + 3 will increase the maximum size around 25% of LBE + 1 and about 14% of LBE + 2. The insertion and extraction time for LBE + 3 is slower compared to the others.
Survey on Deep Learning Based Intrusion Detection System Omar Muhammad Altoumi Alsyaibani; Ema Utami; Anggit Dwi Hartanto
Telematika Vol 14, No 2: August (2021)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v14i2.1317

Abstract

Development of computer network has changed human lives in many ways. Currently, everyone is connected to each other from everywhere. Information can be accessed easily. This massive development has to be followed by good security system. Intrusion Detection System is important device in network security which capable of monitoring hardware and software in computer network. Many researchers have developed Intrusion Detection System continuously and have faced many challenges, for instance: low detection of accuracy, emergence of new types malicious traffic and error detection rate. Researchers have tried to overcome these problems in many ways, one of them is using Deep Learning which is a branch of Machine Learning for developing Intrusion Detection System and it will be discussed in this paper. Machine Learning itself is a branch of Artificial Intelligence which is growing rapidly in the moment. Several researches have showed that Machine Learning and Deep Learning provide very promising results for developing Intrusion Detection System. This paper will present an overview about Intrusion Detection System in general, Deep Learning model which is often used by researchers, available datasets and challenges which will be faced ahead by researchers

Page 1 of 1 | Total Record : 6