JISKA (Jurnal Informatika Sunan Kalijaga)
https://ejournal.uin-suka.ac.id/saintek/JISKA
<p><span lang="en"><strong><strong><strong>JISKA (Jurnal Informatika Sunan Kalijaga), </strong></strong></strong>abbreviated as <strong>JISKa</strong>, has been published by the <a href="http://informatika.uin-suka.ac.id/" target="_blank" rel="noopener">Department of Informatics</a>, <a href="http://saintek.uin-suka.ac.id/" target="_blank" rel="noopener">Faculty of Science and Technology</a>, <a href="https://uin-suka.ac.id" target="_blank" rel="noopener">UIN Sunan Kalijaga Yogyakarta, </a>since May 2016. JISKa serves as a platform for the publication of research findings from lecturers, researchers, students, and practitioners in the fields of Informatics, Computer Science, and Information Technology. The journal is published three times a year, in <strong>January</strong>, <strong>May</strong>, and <strong>September</strong>. Until 2024, each issue consisted of seven articles. However, beginning with Volume 10 (January 2025), JISKa publishes <strong>ten articles per issue</strong>. All articles are <strong>open access</strong>.</span></p> <p>This journal has been accredited by the National Journal Accreditation (ARJUNA) <a href="https://sinta.kemdikbud.go.id/journals/detail?id=3521" target="_blank" rel="noopener"><strong>Sinta 3</strong></a> from Volume 6 No 1 January 2021 until Volume 10 No 3 September 2025 <strong> </strong>according to the decree, <a href="https://drive.google.com/file/d/15esElh8KaiOTbcz-sbwsHvZFx-8ZwC4Y/view?usp=sharing" target="_blank" rel="noopener">SK NOMOR 79/E/KPT/2023</a> and its <a href="https://drive.google.com/file/d/1vQjjNcN1ht3ImkACCavBwK7qWni1fK4c/view?usp=sharing" target="_blank" rel="noopener">certificate</a>. The current <strong>Sinta Google Citation</strong> and<strong> h-index </strong>are <strong>1724 </strong>and <strong>19</strong>, respectively. The journal has also been indexed by <a title="DOAJ" href="https://doaj.org/toc/2528-0074" target="_blank" rel="noopener">DOAJ</a>, <a href="https://ejournal.uin-suka.ac.id/saintek/JISKA/Dimensions" target="_blank" rel="noopener">Dimensions</a> (<strong>citations: 193</strong> and <strong>mean: 0.97</strong>), <a href="https://search.crossref.org/?q=jiska&from_ui=yes&container-title=JISKA+%28Jurnal+Informatika+Sunan+Kalijaga%29" target="_blank" rel="noopener">Crossref</a>, <a title="ResearchGate" href="https://www.researchgate.net/journal/JISKA-Jurnal-Informatika-Sunan-Kalijaga-2527-5836" target="_blank" rel="noopener">ResearchGate</a>, <a href="https://garuda.kemdikbud.go.id/journal/view/15965" target="_blank" rel="noopener">Garuda</a>, <a title="scite.ai" href="https://scite.ai/journals/2528-0074" target="_blank" rel="noopener">scite.ai</a> (<strong>citations: 383</strong>), <a href="https://www.scilit.net/sources/88388" target="_blank" rel="noopener">Scilit</a> and <a href="https://moraref.kemenag.go.id/archives/journal/97406410605804775" target="_blank" rel="noopener">Moraref</a> (<strong>M3</strong>). Please open the link on the <a href="http://ejournal.uin-suka.ac.id/saintek/JISKA/indexing" target="_blank" rel="noopener">Indexing menu</a> to see the impact of articles that published by JISKa.</p> <p>JISKa opens the opportunity to receive articles any time either in Indonesian or English. Please register account and download the JISKa template file for submitting articles to JISKa. Each article will be reviewed by a minimum of <strong>two reviewers</strong> with a single blind review method, where the reviewer can find out the identity of the author but the articles authors cannot find out who is the reviewer. The rules and examples of writing details can be seen in the Jiska template file. Until now, JISKa only uses the <a title="Template JISKa" href="https://docs.google.com/document/d/1C-lMWbmffRNfMxBejpIo4YwF2w0B_f3z/edit" target="_blank" rel="noopener">MS DOC / DOCX format</a> for article submission. <span lang="en"> JISKa does not charge publication fees nor submission fees. </span></p>UIN Sunan Kalijaga Yogyakartaen-USJISKA (Jurnal Informatika Sunan Kalijaga)2527-5836<p>Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0</p> <p><br />a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-nc/4.0" target="_blank" rel="noopener">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</p> <p>b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</p> <p>c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</p>Optimizing K-Means Algorithm Using the Purity Method for Clustering Oil Palm Producing Regions in North Aceh
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4817
<p><em>The K-Means algorithm is a fundamental tool in machine learning, widely utilized for data clustering tasks. This research aims to improve the performance of the K-Means algorithm by integrating the Purity method, specifically focusing on clustering regions renowned for oil palm production in North Aceh. Oil palm cultivation is a vital agricultural sector in North Aceh, contributing significantly to the local economy and employment. </em><em>T</em><em>his study examines two clustering techniques: the conventional K-Means algorithm and an optimized version, Purity+K-Means. The integration of the Purity method increases the efficiency of K-Means by decreasing the required iterations for convergence. The data used for clustering analysis is sourced from the Department of Agriculture and Food in North Aceh Regency and pertains to oil palm production in 2023. The findings indicate that the Purity+K-Means approach notably reduces the iteration count and improves cluster quality. The average Davies-Bouldin Index (DBI) for standard K-Means is 0.45, whereas the Purity+K-Means method lowers it to 0.30. Furthermore, applying the Purity method reduced the number of K-Means iterations from 15 to just 3. These results highlight an enhancement in clustering performance and overall efficiency</em><em>.</em></p>Novia HasdynaRozzi Kesuma DinataBalqis Yafis
Copyright (c) 2025 Novia Hasdyna, Rozzi Kesuma Dinata, Balqis Yafis
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-3110111510.14421/jiska.2025.10.1.1-15Predicting Olympic Medal Trends for Southeast Asian Countries Using the Facebook Prophet Model
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4825
<p><em>The Olympics is a world sporting event held every four years and is a meeting place for all athletes worldwide. The Olympics are held alternately in different countries. The Olympics were first held in Athens in 1896 and have now reached the 33rd Olympics, which will be held in Paris in 2024. A lot of work has been done to develop prediction models emphasizing improving accuracy to predict Olympic outcomes. However, low-performance regression algorithms are the main problems with prediction. By integrating custom seasonality with the Facebook-Prophet prediction model, this study aims to increase the accuracy of Olympic prediction. The proposed new model involves several steps, including preparing the data and initializing and fitting the Facebook-Prophet model with several parameters such as seasonal mode, annual seasonality, and prior scale. The model is tested using the Olympic dataset (1994–2024). The evaluation results show that this prediction model can provide a good value in predicting the total medals earned. On the Olympic Games (1994-2024) dataset, the model has a very low error MAE, MSE, and RMSE and has an R2 score of 0.99, which is close to perfect. This research shows that the model is effective in improving prediction accuracy.</em></p>Bagus Al QoharYulizchia Malica Pinkan Tanga Putri UtamiMaylinna Rahayu NingsihMuch Aziz Muslim
Copyright (c) 2025 Bagus Al Qohar, Yulizchia Malica Pinkan Tanga , Putri Utami, Maylinna Rahayu Ningsih, Much Aziz Muslim
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101163210.14421/jiska.2025.10.1.16-32Implementation of Long Short-Term Memory for Chili Price Prediction in East Java Province
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4431
<p>Di Indonesia, bahan pangan memiliki harga yang berubah-ubah atau tidak stabil seiring berjalannya waktu dan salah satu komoditas bahan pangan yang sering mengalami ketidakstabilan harga yaitu dari komoditas cabai. Untuk itu, langkah prediksi harga cabai dapat ditempuh untuk memperkirakan harga selanjutnya sehingga dapat diambil strategi yang tepat, khususnya melalui proses pembelajaran mesin dengan memanfaatkan jaringan saraf tiruan LSTM. Pada penelitian ini, dilakukan eksperimen pengujian mengenai <em>hyperparameter</em> serta struktur dari jaringan LSTM itu sendiri yang digunakan untuk prediksi pada data harga dua jenis cabai di Provinsi Jawa Timur yaitu cabai merah dan cabai rawit. Hasil dari penelitian ini menunjukkan konfigurasi <em>hyperparameter</em> dan struktur jaringan terbaik sama untuk tiap data harga jenis cabai yang diuji. Data harga cabai merah menghasilkan nilai rata-rata RMSE terbaik yaitu 1751,690, sedangkan data harga cabai rawit menghasilkan nilai rata-rata RMSE terbaik yaitu 1888,741.</p>Fata Nabil FikriNurochman
Copyright (c) 2025 Fata Nabil Fikri, Nurochman
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101334710.14421/jiska.2025.10.1.33-47Extreme Gradient Boosting Model with SMOTE for Heart Disease Classification
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4826
<p><em>Heart disease is one of the leading causes of death worldwide. According to data from the World Health Organisation (WHO), the number of victims who die from heart disease reaches 17.5 million people every year. However, the method of diagnosing heart disease in patients is still not optimal in determining the right treatment. Along with the development of technology, various models of machine learning algorithms and data processing techniques have been developed to find models that can produce the best precision in classifying heart disease. machine learning algorithm model in classifying heart disease, so that it can improve the effectiveness of diagnosis and help in determining the right treatment for patients. This research also aims to overcome the limitations of accuracy in existing diagnosis methods by identifying models that are capable of providing the best results in processing and analysing health data, especially in terms of heart disease classification. In this study, the XGBoost model was identified as the most superior, with an accuracy of 99%. These results show that the XGBoost model has a higher accuracy rate compared to previous methods, making it a promising solution to improve the accuracy of heart disease diagnosis and classification in the future.</em></p>Ahmad Ubai DullahAditya Yoga DarmawanDwika Ananda Agustina PertiwiJumanto Unjung
Copyright (c) 2025 Ahmad Ubai Dullah, Aditya Yoga Darmawan, Dwika Ananda Agustina Pertiwi, Jumanto Unjung
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101486210.14421/jiska.2025.10.1.48-62Class Weighting Approach For Handling Imbalanced Data On Forest Fire Classification Using EfficientNet-B1
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4831
<p><em>Wildfires pose significant threats to ecosystems and human safety, necessitating effective monitoring techniques. Detecting forest fires based on images of forest conditions could be a breakthrough. But, the model built from imbalanced data leads to low accuracy. This research addresses the challenge of class imbalance in multi-class classification for forest fire detection using the EfficientNet-B1 model. This research explores the implementation of class weighting to enhance model performance, particularly focusing on </em><em>minority</em><em> classes </em><em>namely:</em><em> Fire</em><em>,</em><em> Smoke. A dataset of 7,331 training images, categorized into four classes. The results showed that employing the class weighting method achieved an accuracy of 90%. While training duration of 14 minutes and 45 seconds, outperforming the data augmentation method in terms of </em><em>time </em><em>efficiency. This study contributes to the development of more effective methods for forest fire monitoring and provides insights for future research in machine learning applications in environmental contexts.</em></p>Arvinanto BahtiarMuhammad Ihsan Prawira HutomoAgung WidiyantoSiti Khomsah
Copyright (c) 2025 Arvinanto Bahtiar, Muhammad Ihsan Prawira Hutomo, Agung Widiyanto, Siti Khomsah
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101637310.14421/jiska.2025.10.1.63-73Application of SMOTE in Sentiment Analysis of MyXL User Reviews on Google Play Store
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4678
<p>Aplikasi di dunia nyata sering kali memiliki kumpulan data teks yang tidak seimbang, yang menyebabkan hasil prediksi algoritma klasifikasi menjadi bias terhadap kelas mayoritas dan mengabaikan kelas minoritas. Akurasi yang tinggi tidak mencerminkan kinerja yang sebenarnya. Penelitian ini menggunakan teknik SMOTE untuk menyeimbangkan kelas dalam analisis sentimen menggunakan kumpulan data ulasan pengguna MyXL dari Google PlayStore. Kami membandingkan kinerja algoritma Regresi Logistik dan Support Vector Machine dengan data yang tidak seimbang dan data yang seimbang dari SMOTE. Fitur teks diekstraksi menggunakan TF-IDF, dan metrik evaluasi didasarkan pada akurasi, presisi, recall dan skor F1, yang dioptimalkan melalui GridSearchCV di Scikit-learn. Kinerja terbaik dicapai dengan menerapkan SMOTE ke algoritma SVM, yang menghasilkan akurasi 73,00%, presisi 67,13%, recall 65,82% dan skor F1 66,30%.</p>BadriyahTotok ChamidySuhartono
Copyright (c) 2025 Badriyah, Totok Chamidy, Suhartono
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101748610.14421/jiska.2025.10.1.74-86Revitalizing Art with Technology: A Deep Learning Approach to Virtual Restoration
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4832
<p><em>This study evaluates CycleGAN's performance in virtual painting restoration, focusing on color restoration and detail reproduction. We compiled datasets categorized by art styles and conditions to achieve accurate restorations without altering original reference materials. Various paintings were degraded, including those with a yellow filter, to create effective training datasets for CycleGAN. The model utilized cycle consistency loss and advanced data augmentation techniques. We assessed the results using PSNR, SSIM, and Color Inspector metrics, focusing on Claude Monet's Nasturtiums in a Blue Vase and Hermann Corrodi's Prayers at Dawn. The findings demonstrate superior color recovery and preservation of intricate details compared to other methods, confirmed through quantitative and qualitative evaluations. Key contributions include employing CycleGAN for art restoration, model evaluation, and framework development. Practical implications extend to art conservation, digital library enhancement, art education, and broader access to restored works. Future research may explore dataset expansion, complex architectures, interdisciplinary collaboration, automated evaluation tools, and improved technologies for real-time restoration applications. In conclusion, CycleGAN holds promise for digital art conservation, with ongoing efforts aimed at its integration across fields for effective cultural preservation.</em></p>Nurrohmah Endah PutrantiShyang-Jye ChangMuhammad Raffiudin
Copyright (c) 2025 Nurrohmah Endah Putranti, Shyang-Jye Chang, Muhammad Raffiudin
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-31101879910.14421/jiska.2025.10.1.87-99E-commerce Service Chatbot Application Design using KNN and Random Forest Methods
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4405
<p><em>Our lives are profoundly shaped by technology, with the expansion of e-commerce being a notable outcome that demands attention. Given the prevalence of smartphones equipped with rapid messaging and networking applications, individuals often utilize these platforms to communicate with sellers, offering a convenient means for sellers to efficiently engage with a diverse customer base. Recognizing this trend, there arises a necessity for the digital transformation of services to enhance operational efficiency. In response to this need, the researcher has developed a chatbot application aimed at improving customer service, employing machine learning techniques with the KNN and Random Forest algorithms. To assess the application's viability, the chatbot's results undergo an accuracy test, revealing a satisfactory accuracy value of 71.4%, thereby affirming its feasibility.</em></p>Fardan Zamakhsyari
Copyright (c) 2025 Fardan Zamakhsyari
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-3110110010910.14421/jiska.2025.10.1.100-109Enhancing Abstractive Multi-Document Summarization with Bert2Bert Model for Indonesian Language
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4736
<div><em><span lang="EN-US">This study investigates the effectiveness of the proposed Bert2Bert and Bert2Bert+Xtreme models in improving abstract multi-document summarization for the Indonesian language. This study uses the transformer model as a basis for developing the proposed Bert2Bert and Bert2Bert+Xtreme models. The results of the model evaluation with the Liputan6 dataset using ROUGE-1, ROUGE-2, ROUGE-L, and BERTScore show that the proposed models have slight improvements over previous research models with Bert2Bert being better than Bert2Bert+Xtreme. Despite the challenges posed by limited reference summarization for Indonesian documents, content-based analysis using readability metrics, including FKGL, GFI, and Dwiyanto Djoko Pranowo revealed that the summaries generated by Bert2Bert and Bert2Bert+Xtreme are at a moderate readability level, which means they are suitable for adult readers and in line with the target audience of the news portal.</span></em></div>Aldi Fahluzi MuharamYana Aditia GerhanaDian Sa'adillah MaylawatiMuhammad Ali RamdhaniTitik Khawa Abdul Rahman
Copyright (c) 2025 Aldi Fahluzi Muharam, Yana Aditia Gerhana, Dian Sa'adillah Maylawati, Muhammad Ali Ramdhani, Titik Khawa Abdul Rahman
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-3110111012110.14421/jiska.2025.10.1.110-121Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720
<p><em>The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. The potential for downloaded malware to further compromise the device by installing additional malicious applications is even more concerning. To combat this growing menace, researchers are actively exploring methods to identify and mitigate these threats. This study investigates the effectiveness of reverse engineering as a tool for analyzing suspicious Android applications. Reverse engineering involves meticulously disassembling the application's code, deconstructing its functionalities, and revealing its underlying mechanisms. We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. By understanding how these malicious programs operate, we can develop more robust detection and prevention methods to safeguard Android users from these evolving threats. This research successfully obtained data and information about the virus and the number of attackers. The result also involves the list of specific files that contain malware indicators, so it would be used in the future to enhance detection system.</em></p>Ridho Surya KusumaMuhammad Dirga Purnomo Putra
Copyright (c) 2025 Ridho Surya Kusuma, M Dirga Purnomo Putra
https://creativecommons.org/licenses/by-nc/4.0
2025-01-312025-01-3110112213810.14421/jiska.2025.10.1.122-138