Journal of Applied Computer Science and Technology https://journal.isas.or.id/index.php/JACOST <p align="justify"><strong>Journal of Applied Computer Science and Technology (JACOST)</strong> adalah sebuah jurnal blind peer-review yang didedikasikan untuk publikasi hasil penelitian yang berkualitas dalam&nbsp; bidang ilmu komputer dan Teknologi namun tak terbatas secara implisit. Semua publikasi di junal <strong>JACOST</strong> bersifat akses terbuka yang memungkinkan artikel tersedia secara bebas online tanpa berlangganan apapun.</p> Indonesian Society of Applied Science en-US Journal of Applied Computer Science and Technology 2723-1453 <h1 class="page_title">Pernyataan Hak Cipta dan Lisensi</h1> <div class="page"> <div class="page"> <p><span class="" lang="id"><span title="International Journal on Informatics Visualization (JOIV) are published under the terms of the Creative Commons Attribution-ShareAlike."><span class="VIiyi" lang="id"><span class="JLqJ4b" data-language-for-alternatives="id" data-language-to-translate-into="en" data-phrase-index="0">Dengan mengirimkan manuskrip ke <strong>Journal of Applied Computer Science and Technology (JACOST)</strong>, penulis setuju dengan kebijakan ini. Tidak diperlukan persetujuan dokumen khusus.</span></span></span></span></p> <ol> <li class="show">Hak cipta pada setiap artikel adalah milik penulis.</li> <li class="show"><span class="VIiyi" lang="id"><span class="JLqJ4b" data-language-for-alternatives="id" data-language-to-translate-into="en" data-phrase-index="0">Penulis mempertahankan semua hak mereka atas karya yang diterbitkan, tak terbatas pada hak-hak yang diatur dalam laman ini.</span></span></li> <li class="show">Penulis mengakui bahwa <strong>Journal of Applied Computer Science and Technology (JACOST)</strong> sebagai yang pertama kali mempublikasikan dengan lisensi <em><span id="result_box" class="" lang="id"><span title="International Journal on Informatics Visualization (JOIV) are published under the terms of the Creative Commons Attribution-ShareAlike."><a href="https://creativecommons.org/licenses/by-sa/4.0" target="_blank" rel="license noopener">Creative Commons Atribusi 4.0 Internasional (CC BY-SA)</a>.</span></span></em></li> <li class="show">Penulis dapat memasukan tulisan secara terpisah, mengatur distribusi non-ekskulif &nbsp;dari naskah yang telah terbit di jurnal ini kedalam versi yang lain (misal: dikirim ke respository institusi penulis, publikasi kedalam buku, dll), dengan mengakui bahwa naskah telah terbit pertama kali pada&nbsp;<strong>Journal of Applied Computer Science and Technology (JACOST)</strong>;</li> <li class="show"><span class="VIiyi" lang="id"><span class="JLqJ4b" data-language-for-alternatives="id" data-language-to-translate-into="en" data-phrase-index="0">Penulis menjamin bahwa artikel asli, ditulis oleh penulis yang disebutkan, belum pernah dipublikasikan sebelumnya, tidak mengandung pernyataan yang melanggar hukum, tidak melanggar hak orang lain, tunduk pada hak cipta yang secara eksklusif dipegang oleh penulis</span></span>.</li> <li class="show"><span class="VIiyi" lang="id"><span class="JLqJ4b" data-language-for-alternatives="id" data-language-to-translate-into="en" data-phrase-index="0">Jika artikel dipersiapkan bersama oleh lebih dari satu penulis, setiap penulis yang mengirimkan naskah menjamin bahwa dia telah diberi wewenang oleh semua penulis bersama untuk menyetujui hak cipta dan pemberitahuan lisensi (perjanjian) atas nama mereka, dan setuju untuk memberi tahu rekan penulis persyaratan kebijakan ini.&nbsp;</span></span>&nbsp;<strong>Journal of Applied Computer Science and Technology (JACOST)</strong><span class="VIiyi" lang="id"><span class="JLqJ4b" data-language-for-alternatives="id" data-language-to-translate-into="en" data-phrase-index="0"> tidak akan dimintai pertanggungjawaban atas apa pun yang mungkin timbul karena perselisihan internal penulis. </span></span></li> </ol> <p><strong><span class="" lang="id"><span title="International Journal on Informatics Visualization (JOIV) are published under the terms of the Creative Commons Attribution-ShareAlike.">Lisensi :</span></span></strong></p> <p><span id="result_box" class="" lang="id"><span title="International Journal on Informatics Visualization (JOIV) are published under the terms of the Creative Commons Attribution-ShareAlike."><strong>Journal of Applied Computer Science and Technology (JACOST)</strong> diterbitkan berdasarkan ketentuan <a href="https://creativecommons.org/licenses/by-sa/4.0" target="_blank" rel="license noopener">Lisensi Creative Commons Atribusi 4.0 Internasional (CC BY-SA)</a>. </span></span><span class="" lang="id"><span title="Authors retain the copyright to their work.">Lisensi ini mengizinkan setiap orang untuk :</span></span><span class="" lang="id"><span title="Authors retain the copyright to their work.">.</span></span></p> <ul> <li class="license share"><strong>Berbagi</strong> — menyalin dan menyebarluaskan kembali materi ini dalam bentuk atau format apapun;</li> <li class="license remix"><strong>Adaptasi</strong> — menggubah, mengubah, dan membuat turunan dari materi ini untuk kepentingan apapun.</li> </ul> <p><strong>Lisensi :</strong></p> <ul class="license-properties col-md-offset-2 col-md-8" dir="ltr" style="text-align: left;"> <li class="license by"> <p><strong>Atribusi</strong> — Anda harus mencantumkan <a id="appropriate_credit_popup" class="helpLink" tabindex="0" title="" href="https://creativecommons.org/licenses/by-sa/4.0/deed.id#" data-original-title="">nama yang sesuai</a>, mencantumkan tautan terhadap lisensi, dan <a id="indicate_changes_popup" class="helpLink" tabindex="0" title="" href="https://creativecommons.org/licenses/by-sa/4.0/deed.id#" data-original-title="">menyatakan bahwa telah ada perubahan yang dilakukan</a>. Anda dapat melakukan hal ini dengan cara yang sesuai, namun tidak mengisyaratkan bahwa pemberi lisensi mendukung Anda atau penggunaan Anda. <span id="by-more-container"></span></p> </li> <li class="license sa"> <p><strong>BerbagiSerupa</strong> — Apabila Anda menggubah, mengubah, atau membuat turunan dari materi ini, Anda harus menyebarluaskan kontribusi Anda di bawah <a id="same_license_popup" class="helpLink" tabindex="0" title="" href="https://creativecommons.org/licenses/by-sa/4.0/deed.id#" data-original-title="">lisensi yang sama</a> dengan materi asli.</p> </li> </ul> </div> </div> Peramalan Harga Cabai Rawit Merah Menggunakan Attention Mechanism Berbasis Long Short-Term Memory https://journal.isas.or.id/index.php/JACOST/article/view/875 <p><em>Red cayenne pepper is a commodity that has important economic value in Indonesia, especially in West Java Province. Cayenne pepper often experiences significant price fluctuations which can cause inflation. In 2022 there will be the highest inflation in West Java in the last eight years due to increased commodity prices, including cayenne pepper. There needs to be an effort to maintain the stability of the price of red cayenne pepper in West Java. This research aims to create a price forecasting system for red cayenne peppers in West Java by comparing two deep learning approaches, namely Long-Short Term Memory (LSTM) and Long-Short Term Memory with Attention Mechanism (LSTM-Attention-LSTM) to obtain high accuracy in predicting the price of red cayenne pepper. The results of this research show that the LSTM model using 3 hidden layers, 100 neurons, 128 dense, 1 dense, and 32 batch sizes, produces Mean Absolute Error (MAE) values ​​of 0.023, Root Mean Square Error (RMSE) of 0.152, and Mean Absolute Percentage Error (MAPE) is 3.68%. Meanwhile, the LSTM-Attention-LSTM model with the same configuration produces an MAE value of 0.017, RMSE of 0.130, and MAPE of 2.74%. The results of this research can be a reference for the community and government in maintaining price stability for cayenne pepper in West Java.</em></p> Wina Witanti Setyo Arie Anggara Melina Melina Copyright (c) 2024 Wina Witanti, Setyo Arie Anggara, Melina Melina https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 128 135 10.52158/jacost.v5i2.875 Identifikasi Kelayakan Air Minum Dengan Metode Analisis Komponen Utama Berbasis Entropi https://journal.isas.or.id/index.php/JACOST/article/view/815 <p><em>The need for clean water is a fundamental requirement that must be met by humans, as water constitutes 60 to 70% of the total human body weight. Therefore, it is important to be able to determine the quality of the water entering the body, as consuming unsafe water will bring various diseases, such as diarrhea, and in severe cases might lead to death. This study aimed to investigate the factors which determine the potability of drinking water. Specifically, this research aims to produce a fault detection algorithm that can detect the potability of water samples based on Principal Component Analysis (PCA) and entropy-based subset selection methods. This paper addresses th</em><em>e</em> <em>linearity </em><em>problem </em><em>that commonly occurred in PCA </em><em>by finding a subset of data that has a good entropy relation among the parameters contained in the subset, thus maintaining linearity in the data.</em><em> There were 8 parameters considered in this reseach: pH, hardness, total dissolved solids, chloramines, sulfate, conductivity, organics carbon, trihalomethanes and turbidity. The experiment was conducted with 811 water samples, where 645 samples were used to train the model and the rest for validating the model predictive accuracy. </em><em>Based on experiments conducted, it is confirmed that the proposed algorithm can determine the potability of drinking water samples from synthetic data sourced from India with an accuracy of over 98% for potable water data and 100% for non-potable water data.</em></p> Thommy willay Jimmy Tjen Paskalia Kartini Riyadi Jimmy Iskandar Copyright (c) 2024 Thommy willay, Jimmy Tjen, Paskalia Kartini, Riyadi Jimmy Iskandar https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 136 143 10.52158/jacost.v5i2.815 Klasifikasi Multilabel Pada Gaya Belajar Siswa Sekolah Dasar Menggunakan Algoritma Machine Learning https://journal.isas.or.id/index.php/JACOST/article/view/940 <p><em>Learning style plays a very important role in determining the success of a person's learning process. An individual generally has a combination of all three existing learning styles including Visual, Auditorial, and Kinesthetic. However, what distinguishes the abilities of individuals from each other is how the dominant combination of each learning style is or not, so it is important to identify. This study aims to build a multi-label classification model to classify the learning styles of elementary school students. The machine learning algorithms used to build the model are Decision Tree, K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Multi-Layer Perceptron (MLP). The performance of these four models is compared using the Hamming Loss, Accuracy, Precision, Recall, and F1-Score performance metrics. The Classifier Chains method is implemented to provide capabilities to KNNs and SVMs that cannot directly handle multi-label classification problems. The dataset used in this study is the Data Set of Learning Style Preference. The separation of the dataset was made into three different forms of data sizes, including: Data I: 90% training, 10% testing; Data II: 80% training 20% testing; and Data III: 70% training 30% testing. Cross-validation using K-Fold Cross Validation with a k-value of 10-fold was also applied to the training data. Based on testing, the best performance was obtained on the Decision Tree model with a hamming loss of 0.014, which indicates a very low prediction error rate per individual label.&nbsp; A recall value of 99% indicates that the model is able to detect almost all positive labels correctly, and an F1-score of 98% indicates that the model has excellent and balanced performance, without bias against both positive and negative label predictions. The performance of the Decision Tree model was followed by MLP, SVM, and KNN which showed lower results.</em></p> I Kadek Nicko Ananda Ni Putu Novita Puspa Dewi Ni Wayan Marti Luh Joni Erawati Dewi Copyright (c) 2024 I Kadek Nicko Ananda, Ni Putu Novita Puspa Dewi, Ni Wayan Marti, Luh Joni Erawati Dewi https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 144 154 10.52158/jacost.v5i2.940 Klasifikasi Kualitas Biji Kedelai Menggunakan Transfer Learning Convolutional Neural Network Dan SMOTE https://journal.isas.or.id/index.php/JACOST/article/view/1002 <p><em>Soybeans are an important commodity in the food and feed industry, where they can be used to produce soy milk or other processed products. However, low-quality seeds can reduce the quality of the processed products and increase production costs. To address this issue, a soybean seed quality classification system was developed using the method of Transfer Learning with CNN and SMOTE. This method leverages the ability of neural networks for extracting of the visual features and handle for data imbalance between classes. The study shows that the CNN model achieved value accuracy is 91.09%, while the combination of CNN and SMOTE get the accuracyf 89.92%. Additionally, the MobileNetV2 model reached an accuracy of 91.11%, which further improved to 92.42% after applying SMOTE. These results demonstrate that the use of Transfer Learning and SMOTE significantly enhances accuracy in soybean seed quality classification, resulting in a more effective.</em></p> Amanda Prawita Ningrum Sri Winarno Vincentius Praskatama Copyright (c) 2024 Amanda Prawita Ningrum, Sri Winarno, Vincentius Praskatama https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 155 164 10.52158/jacost.v5i2.1002 Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ https://journal.isas.or.id/index.php/JACOST/article/view/873 <p><em>This study aims to analyze and evaluate the vulnerability of Insecure Direct Object Reference (IDOR) in the thesis registration web application at XYZ University, as well as to provide improvement recommendations to enhance the security of students' personal data. The IDOR vulnerability allows unauthorized access to students' personal documents, which can jeopardize privacy and information security. Utilizing an action research methodology consisting of four stages: diagnosis, action taking, evaluation, and learning, this research identifies the URL patterns generated when students upload documents such as ID cards, family cards, birth certificates, diplomas, and photos. During the action-taking phase, the researcher conducts attacks using Burp Suite to test the vulnerability by modifying URL parameters based on the identified patterns. The testing results indicate that all documents can be accessed without proper authorization, with a status code of 200 indicating successful access. These findings underscore the necessity for stricter security improvement measures in the thesis registration application to protect students' personal data. The implications of this research highlight the importance of implementing tighter access controls and better input validation in higher education applications to prevent potential data leaks in the future. This study makes a significant contribution to enhancing information security within educational environments.</em></p> Stefanus Eko Prasetyo Haeruddin Tiara Copyright (c) 2024 Stefanus Eko Prasetyo, Haeruddin, Tiara https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 165 171 10.52158/jacost.v5i2.873 Implementasi Keamanan Ruangan Berbasis IoT dengan Sensor PIR, Telegram, dan Peringatan Suara https://journal.isas.or.id/index.php/JACOST/article/view/860 <p style="text-align: justify; margin: 0cm 0cm 6.0pt 0cm;"><em><span lang="EN-US" style="font-size: 9.0pt;">Home security is crucial for protecting property and occupant safety. Conventional technology often falls short in providing optimal protection. With advancements in the Internet of Things (IoT), smarter and more affordable security solutions are now accessible. This research develops an IoT-based room security system using a PIR sensor to detect motion, Telegram notifications for real-time communication, and sound alerts as preventive measures. The NodeMCU ESP8266 module processes data from the PIR sensor and transmits signals via WiFi. Test results show that the PIR sensor successfully detects motion up to 5 meters with a 93.33% success rate. The system also effectively sends real-time notifications to the Telegram app and provides efficient sound alerts. Thus, this system significantly enhances home security with minimal cost and complexity, offering convenience and quick response to users.</span></em></p> <p style="text-align: justify; margin: 0cm 0cm 6.0pt 0cm;"><em><span style="font-size: 9.0pt;">&nbsp;</span></em></p> Adi Wibowo Adi Fandi kurniawan Copyright (c) 2024 Adi Wibowo Adi, Fandi kurniawan https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 press press 10.52158/jacost.v5i2.860 Implementasi Algoritma Support Vector Machine (SVM) Untuk Klasifikasi Penyakit Stroke https://journal.isas.or.id/index.php/JACOST/article/view/817 <p><em>Stroke or known as Cerebrovascular Accident (CVA) is a functional disorder caused by impaired blood flow function from within the human brain. Stroke carries a high risk of brain damage, paralysis, speech disorders, visual impairment, even death. Stroke is one of 10 life-threatening diseases in Indonesia. Classification is one of a few methods in predicting stroke symptoms with the aim of obtaining accurate prediction of disease. The researchers implemented a method to classify stroke with the Support Vector Machine (SVM) algorithm. The SVM is a learning method used in medical diagnosis for classification, the researchers processed data sets using the Orange tool. The research applied cross validation techniques to improve the accuracy of the model. The study used data sets from the data.world.com site with a total of 40,910 data consisting of 11 attributes. In this process, 80% of the training data and 20% of the test data are used. Using the Orange tool, the study managed to classify stroke disease well using the RBF kernel with cross validation techniques resulting in an accuracy of 94.8%. The results of this study can be concluded that the stroke classification model developed has excellent performance. Overall, these results indicate that the Stroke classification model developed is highly reliable and effective, with excellent ability to detect stroke cases and provide accurate predictions. Making better and quicker medical judgments can be aided by using this approach to diagnose strokes.</em></p> Danis Rifa Nurqotimah Ahsanun Naseh Khudori Risqy Siwi Pradini Copyright (c) 2024 Danis Rifa Nurqotimah, Ahsanun Naseh Khudori, Risqy Siwi Pradini https://creativecommons.org/licenses/by-sa/4.0 2024-12-31 2024-12-31 5 2 press press 10.52158/jacost.v5i2.817