JISKA (Jurnal Informatika Sunan Kalijaga) https://ejournal.uin-suka.ac.id/saintek/JISKA <p><span lang="en"><strong><strong><strong>JISKA (Jurnal Informatika Sunan Kalijaga), </strong></strong></strong>abbreviated as <strong>JISKa</strong>, has been published by the <a href="http://informatika.uin-suka.ac.id/" target="_blank" rel="noopener">Department of Informatics</a>, <a href="http://saintek.uin-suka.ac.id/" target="_blank" rel="noopener">Faculty of Science and Technology</a>, <a href="https://uin-suka.ac.id" target="_blank" rel="noopener">UIN Sunan Kalijaga Yogyakarta, </a>since May 2016. JISKa serves as a platform for the publication of research findings from lecturers, researchers, students, and practitioners in the fields of Informatics, Computer Science, and Information Technology. The journal is published three times a year, in <strong>January</strong>, <strong>May</strong>, and <strong>September</strong>. Until 2024, each issue consisted of seven articles. However, beginning with Volume 10 (January 2025), JISKa publishes <strong>ten articles per issue</strong>. All articles are <strong>open access</strong>.</span></p> <p>This journal has been accredited by the National Journal Accreditation (ARJUNA) <a href="https://sinta.kemdikbud.go.id/journals/detail?id=3521" target="_blank" rel="noopener"><strong>Sinta 3</strong></a> from Volume 6 No 1 January 2021 until Volume 10 No 3 September 2025 <strong> </strong>according to the decree, <a href="https://drive.google.com/file/d/15esElh8KaiOTbcz-sbwsHvZFx-8ZwC4Y/view?usp=sharing" target="_blank" rel="noopener">SK NOMOR 79/E/KPT/2023</a> and its <a href="https://drive.google.com/file/d/1vQjjNcN1ht3ImkACCavBwK7qWni1fK4c/view?usp=sharing" target="_blank" rel="noopener">certificate</a>. The current <strong>Sinta Google Citation</strong> and<strong> h-index </strong>are <strong>1724 </strong>and <strong>19</strong>, respectively. The journal has also been indexed by <a title="DOAJ" href="https://doaj.org/toc/2528-0074" target="_blank" rel="noopener">DOAJ</a>, <a href="https://ejournal.uin-suka.ac.id/saintek/JISKA/Dimensions" target="_blank" rel="noopener">Dimensions</a> (<strong>citations: 193</strong> and <strong>mean: 0.97</strong>), <a href="https://search.crossref.org/?q=jiska&amp;from_ui=yes&amp;container-title=JISKA+%28Jurnal+Informatika+Sunan+Kalijaga%29" target="_blank" rel="noopener">Crossref</a>, <a title="ResearchGate" href="https://www.researchgate.net/journal/JISKA-Jurnal-Informatika-Sunan-Kalijaga-2527-5836" target="_blank" rel="noopener">ResearchGate</a>, <a href="https://garuda.kemdikbud.go.id/journal/view/15965" target="_blank" rel="noopener">Garuda</a>, <a title="scite.ai" href="https://scite.ai/journals/2528-0074" target="_blank" rel="noopener">scite.ai</a> (<strong>citations: 383</strong>), <a href="https://www.scilit.net/sources/88388" target="_blank" rel="noopener">Scilit</a> and <a href="https://moraref.kemenag.go.id/archives/journal/97406410605804775" target="_blank" rel="noopener">Moraref</a> (<strong>M3</strong>). Please open the link on the <a href="http://ejournal.uin-suka.ac.id/saintek/JISKA/indexing" target="_blank" rel="noopener">Indexing menu</a> to see the impact of articles that published by JISKa.</p> <p>JISKa opens the opportunity to receive articles any time either in Indonesian or English. Please register account and download the JISKa template file for submitting articles to JISKa. Each article will be reviewed by a minimum of <strong>two reviewers</strong> with a double-blind peer review method, meaning reviewers do not know the authors' identities and vice versa. The rules and examples of writing details can be seen in the Jiska template file. Until now, JISKa only uses the <a title="Template JISKa" href="https://docs.google.com/document/d/1C-lMWbmffRNfMxBejpIo4YwF2w0B_f3z/edit" target="_blank" rel="noopener">MS DOC / DOCX format</a> for article submission. <span lang="en"> JISKa <strong>does not charge</strong> publication fees nor submission fees.</span></p> <p>The journal welcomes submissions on a broad range of topics, including but not limited to the following areas:</p> <p><strong>Information Technology</strong> – Research on emerging trends, system development, cloud computing, Internet of Things (IoT), edge computing, and IT governance.<br /><strong>Information Systems</strong> – Studies on enterprise systems, business intelligence, e-governance, decision support systems, and human-computer interaction.<br /><strong>Artificial Intelligence</strong> – Advances in machine learning, deep learning, neural networks, expert systems, reinforcement learning, and AI-driven automation.<br /><strong>Computer Networks</strong> – Investigations into network architectures, wireless communications, IoT networks, network protocols, and performance optimization.<br /><strong>Digital Forensics</strong> – Research on cybercrime investigation, forensic analysis techniques, incident response, data recovery, and legal considerations of digital evidence.<br /><strong>Software Engineering</strong> – Studies focusing on software development methodologies, agile and DevOps practices, software testing, software project management, and quality assurance.<br /><strong>Multimedia</strong> – Research on digital media processing, computer graphics, virtual reality (VR), augmented reality (AR), game development, and user experience design.<br /><strong>Computer Security</strong> – Investigations into cybersecurity threats, ethical hacking, intrusion detection systems, cryptography, and security frameworks.<br /><strong>Natural Language Processing (NLP)</strong> – Studies on text mining, machine translation, sentiment analysis, speech recognition, and computational linguistics.<br /><strong>Computer Vision</strong> – Research in image processing, object recognition, facial recognition, video analysis, and automated visual data interpretation.<br /><strong>Database and Big Data</strong> – Studies addressing data management, data mining, NoSQL databases, data analytics, cloud databases, and large-scale data processing techniques.</p> en-US <p>Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0</p> <p><br />a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-nc/4.0" target="_blank" rel="noopener">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</p> <p>b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</p> <p>c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</p> jiska@uin-suka.ac.id (Muhammad Taufiq Nuruzzaman) jiska@uin-suka.ac.id (Muhammad Taufiq Nuruzzaman) Fri, 31 Jan 2025 00:00:00 +0700 OJS 3.3.0.5 http://blogs.law.harvard.edu/tech/rss 60 Optimizing K-Means Algorithm Using the Purity Method for Clustering Oil Palm Producing Regions in North Aceh https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4817 <p><em>The K-Means algorithm is a fundamental tool in machine learning, widely utilized for data clustering tasks. This research aims to improve the performance of the K-Means algorithm by integrating the Purity method, specifically focusing on clustering regions renowned for oil palm production in North Aceh. Oil palm cultivation is a vital agricultural sector in North Aceh, contributing significantly to the local economy and employment. This study examines two clustering techniques: the conventional K-Means algorithm and an optimized version, Purity K-Means. Integrating the Purity method increases K-Means' efficiency by decreasing the required convergence iteration. The data used for clustering analysis is sourced from the Department of Agriculture and Food in North Aceh Regency and pertains to oil palm production in 2023. The findings indicate that the Purity K-Means approach notably reduces the iteration count and improves cluster quality. The average Davies-Bouldin Index (DBI) for standard K-Means is 0.45, whereas the Purity K-Means method lowers it to 0.30. Furthermore, applying the Purity method reduced the number of K-Means iterations from 15 to just 3. These results highlight an enhancement in clustering performance and overall efficiency.</em></p> Novia Hasdyna, Rozzi Kesuma Dinata, Balqis Yafis Copyright (c) 2025 Novia Hasdyna, Rozzi Kesuma Dinata, Balqis Yafis https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4817 Fri, 31 Jan 2025 00:00:00 +0700 Predicting Olympic Medal Trends for Southeast Asian Countries Using the Facebook Prophet Model https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4825 <p><em>The Olympics is a world sporting event held every four years and is a meeting place for all athletes worldwide. The Olympics are held alternately in different countries. The Olympics were first held in Athens in 1896 and have now reached the 33rd Olympics, which will be held in Paris in 2024. Much work has been done to develop prediction models emphasizing improving accuracy to predict Olympic outcomes. However, low-performance regression algorithms are the main problems with prediction. By integrating custom seasonality with the Facebook-Prophet prediction model, this study aims to increase the accuracy of Olympic prediction. The proposed new model involves several steps, including preparing the data and initializing and fitting the Facebook-Prophet model with several parameters such as seasonal mode, annual seasonality, and prior scale. The model is tested using the Olympic dataset (1994–2024). The evaluation results show that this prediction model can provide a good value in predicting the total medals earned. On the Olympic Games (1994-2024) dataset, the model has a very low error MAE, MSE, and RMSE and has an R2 score of 0.99, which is close to perfect. This research shows that the model is effective in improving prediction accuracy.</em></p> Bagus Al Qohar, Yulizchia Malica Pinkan Tanga , Putri Utami, Maylinna Rahayu Ningsih, Much Aziz Muslim Copyright (c) 2025 Bagus Al Qohar, Yulizchia Malica Pinkan Tanga , Putri Utami, Maylinna Rahayu Ningsih, Much Aziz Muslim https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4825 Fri, 31 Jan 2025 00:00:00 +0700 Implementation of Long Short-Term Memory for Chili Price Prediction in East Java Province https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4431 <p><em>Groceries prices often experience fluctuations in several regions in Indonesia, such as East Java Province and one of the commodities is chilies, both red chilies and rawit chilies. Predictive steps that utilize machine learning such as Long-Short Term Memory (LSTM) can be taken to estimate the next price of chili with expectations that the appropriate strategy can be taken by the authorities. LSTM is a network that developed from RNN networks in previous times by offering a longer cell memory so that more information can be stored. This research focuses on finding out whether the LSTM network can be applied to the case of chili price prediction and what architecture and hyperparameter configuration is appropriate for this case. For this reason, the experimental method is used by testing several predetermined variables to obtain the right architecture and hyperparameter configuration. The results of this research show that the LSTM network can be applied in this case and the architecture and best hyperparameter configuration obtained are the same for both types of chilies, namely red chilies and rawit chilies. For red chili, the best RMSE value that can be produced is 1751.890 and 1888.741 for rawit chili.</em></p> Fata Nabil Fikri, Nurochman Nurochman Copyright (c) 2025 Fata Nabil Fikri, Nurochman https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4431 Fri, 31 Jan 2025 00:00:00 +0700 Extreme Gradient Boosting Model with SMOTE for Heart Disease Classification https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4826 <p><em>Heart disease is one of the leading causes of death worldwide. According to data from the World Health Organisation (WHO), the number of victims who die from heart disease reaches 17.5 million people every year. However, the method of diagnosing heart disease in patients is still not optimal in determining the right treatment. Along with technology development, various models of machine learning algorithms and data processing techniques have been developed to find models that can produce the best precision in classifying heart disease. This research aims to develop a machine learning algorithm model in classifying heart disease to improve the effectiveness of diagnosis and help in determining the right treatment for patients. This research also aims to overcome the limitations of accuracy in existing diagnosis methods by identifying models capable of providing the best results in processing and analysing health data, especially in terms of heart disease classification. In this study, the XGBoost model was identified as the most superior, with an accuracy of 99%. These results show that the XGBoost model has a higher accuracy rate than previous methods, making it a promising solution to improve the accuracy of future heart disease diagnosis and classification.</em></p> Ahmad Ubai Dullah, Aditya Yoga Darmawan, Dwika Ananda Agustina Pertiwi, Jumanto Unjung Copyright (c) 2025 Ahmad Ubai Dullah, Aditya Yoga Darmawan, Dwika Ananda Agustina Pertiwi, Jumanto Unjung https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4826 Fri, 31 Jan 2025 00:00:00 +0700 Class Weighting Approach For Handling Imbalanced Data On Forest Fire Classification Using EfficientNet-B1 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4831 <p><em>Wildfires threaten ecosystems and human safety, necessitating effective monitoring techniques. Detecting forest fires based on images of forest conditions could be a breakthrough. But, the model built from imbalanced data leads to low accuracy. This research addresses the challenge of class imbalance in multiclass classification for forest fire detection using the EfficientNet-B1 model. This research explores the implementation of class weighting to enhance model performance, particularly focusing on minority classes, namely: Fire and Smoke. A dataset of 7,331 training images was categorized into four classes. The results showed that employing the class weighting method achieved an accuracy of 90%. The training duration of 14 minutes and 45 seconds outperforms the data augmentation method in terms of time efficiency. This study contributes to the development of more effective methods for forest fire monitoring and provides insights for future research in machine learning applications in environmental contexts.</em></p> Arvinanto Bahtiar, Muhammad Ihsan Prawira Hutomo, Agung Widiyanto, Siti Khomsah Copyright (c) 2025 Arvinanto Bahtiar, Muhammad Ihsan Prawira Hutomo, Agung Widiyanto, Siti Khomsah https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4831 Fri, 31 Jan 2025 00:00:00 +0700 Application of SMOTE in Sentiment Analysis of MyXL User Reviews on Google Play Store https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4678 <p><em>Texts that express customer opinions about a product are important input for companies. Companies obtain valuable information from consumer perceptions of marketed products by conducting sentiment analysis. However, real-world text datasets are often unbalanced, causing the prediction results of classification algorithms to be biased towards the majority class and ignore the minority class. This study analyzes the sentiment of MyXL user reviews on the Google Play Store by comparing the performance of the Logistic Regression and Support Vector Machine algorithms in the SMOTE implementation. This analysis uses TF-IDF to extract feature and GridSearchCV to optimize the accuracy, precision, recall, and F1 score evaluation metrics. This study follows several scenarios of dividing training data and test data. SVM implementing SMOTE is the algorithm with the best performance using the division of training data (90%) and test data (10%), resulting in accuracy (73.00%), precision (67.13%), recall (65.82%) and F1 score (66.30%).</em></p> Badriyah Badriyah, Totok Chamidy, Suhartono Suhartono Copyright (c) 2025 Badriyah, Totok Chamidy, Suhartono https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4678 Fri, 31 Jan 2025 00:00:00 +0700 Revitalizing Art with Technology: A Deep Learning Approach to Virtual Restoration https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4832 <p><em>This study evaluates CycleGAN's performance in virtual painting restoration, focusing on color restoration and detail reproduction. We compiled datasets categorized by art styles and conditions to achieve accurate restorations without altering original reference materials. Various paintings and those with a yellow filter, to create effective training datasets for CycleGAN. The model utilized cycle consistency loss and advanced data augmentation techniques. We assessed the results using PSNR, SSIM, and Color Inspector metrics, focusing on Claude Monet's Nasturtiums in a Blue Vase and Hermann Corrodi's Prayers at Dawn. The findings demonstrate superior color recovery and preservation of intricate details compared to other methods, confirmed through quantitative and qualitative evaluations. Key contributions include employing CycleGAN for art restoration, model evaluation, and framework development. Practical implications extend to art conservation, digital library enhancement, art education, and broader access to restored works. Future research may explore dataset expansion, complex architectures, interdisciplinary collaboration, automated evaluation tools, and improved technologies for real-time restoration applications. In conclusion, CycleGAN holds promise for digital art conservation, with ongoing efforts aimed at integrating across fields for effective cultural preservation.</em></p> Nurrohmah Endah Putranti, Shyang-Jye Chang, Muhammad Raffiudin Copyright (c) 2025 Nurrohmah Endah Putranti, Shyang-Jye Chang, Muhammad Raffiudin https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4832 Fri, 31 Jan 2025 00:00:00 +0700 Comparison of KNN and Random Forest Algorithms on E-Commerce Service Chatbot https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4405 <p><em>Technology heavily influences our lives, with the expansion of e-commerce being an important outcome that demands attention. Given the prevalence of smartphones equipped with messaging apps and fast networks, people often utilize these platforms to communicate with sellers, offering a convenient way for sellers to engage efficiently with a diverse customer base. Recognizing this trend, there is a need for digital transformation of services to improve operational efficiency. Thus, this study aimed to compare the efficiency of classification algorithms in e-commerce service chatbots. The researcher used machine learning techniques with KNN and Random Forest algorithms in this case. To assess the feasibility of the application, the chatbot results will be tested using the confusion matrix method to assess accuracy. From this study, it was obtained that the KNN method and calculating word weight using TF-IDF produces an accuracy value of 71.4%, thus confirming its feasibility.</em></p> Fardan Zamakhsyari, Bagas Adi Makayasa, R. Abudullah Hamami, Muhammad Tulus Akbar, Andi Cahyono, Amirullah Amirullah, Muhammad Zida Hisyamuddin, Maria Ulfah Siregar Copyright (c) 2025 Fardan Zamakhsyari, Bagas Adi Makayasa, R. Abudullah Hamami, Muhammad Tulus Akbar, Andi Cahyono, Amirullah Amirullah, Muhammad Zida Hisyamuddin, Maria Ulfah Siregar https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4405 Fri, 31 Jan 2025 00:00:00 +0700 Enhancing Abstractive Multi-Document Summarization with Bert2Bert Model for Indonesian Language https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4736 <p><em>This study investigates the effectiveness of the proposed Bert2Bert and Bert2Bert+Xtreme models in improving abstract multi-document summarization for Indonesians. This research uses the transformer model to develop the proposed Bert2Bert and Bert2Bert+Xtreme models. This research uses the Liputan6 data set which contains news data along with summary references for 10 years from October 2000 to October 2010 and is commonly used in many automatic text summarization research. The model evaluation results using ROUGE-1, ROUGE-2, ROUGE-L, and BERTScore show that the proposed model has a slight improvement over previous research models, with Bert2Bert being better than Bert2Bert+Xtreme. Despite the challenges posed by limited reference summaries for Indonesian documents, content-based analysis using readability metrics, including FKGL, GFI, and Dwiyanto Djoko Pranowo, revealed that the summaries produced by Bert2Bert and Bert2Bert+Xtreme are at a moderate readability level, meaning they are suitable for mature readers and aligns with the news portal's target audience.</em></p> Aldi Fahluzi Muharam, Yana Aditia Gerhana, Dian Sa'adillah Maylawati, Muhammad Ali Ramdhani, Titik Khawa Abdul Rahman Copyright (c) 2025 Aldi Fahluzi Muharam, Yana Aditia Gerhana, Dian Sa'adillah Maylawati, Muhammad Ali Ramdhani, Titik Khawa Abdul Rahman https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4736 Fri, 31 Jan 2025 00:00:00 +0700 Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720 <p><em>The widespread adoption of Android devices has rendered them a primary target for malware attacks, resulting in substantial financial losses and significant breaches of user privacy. Malware can exploit system vulnerabilities to execute unauthorized premium SMS transactions, exfiltrate sensitive data, and install additional malicious applications. Conventional detection methodologies, such as static and dynamic analysis, often prove inadequate in identifying deeply embedded malicious behaviors. This study introduces a systematic reverse engineering framework for analysing suspicious Android applications. In contrast to traditional approaches, the proposed methodology consists of six distinct stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This structured process facilitates a comprehensive examination of an application's internal mechanisms, enabling the identification of concealed malware functionalities. The findings of this study demonstrate that the proposed method attains an overall effectiveness of 84.3%, surpassing conventional static and dynamic analysis techniques. Furthermore, this research generates a detailed list of files containing specific malware indicators, thereby enhancing future malware detection and prevention systems. These results underscore the efficacy of reverse engineering as a critical tool for understanding and mitigating sophisticated Android malware threats.</em></p> Ridho Surya Kusuma, M Dirga Purnomo Putra Copyright (c) 2025 Ridho Surya Kusuma, M Dirga Purnomo Putra https://creativecommons.org/licenses/by-nc/4.0 https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/4720 Fri, 31 Jan 2025 00:00:00 +0700