Journal of Information System Exploration and Research https://shmpublisher.com/index.php/joiser <p><strong>Journal of Information System Exploration and Research (JOISER)</strong> (e-ISSN: <a href="https://portal.issn.org/resource/issn/2963-6361">2963-6361</a>, p-ISSN: <a href="https://portal.issn.org/resource/issn/2964-1160">2964-1160</a>) is a journal that publishes and disseminates scientific research papers on information systems to a wide audience, particularly within the information system society. Articles devoted to discussing any and all aspects of the most recent and noteworthy advancements in the fields of Decision Science, Computer Science, and Computer Science Applications will be considered for publication. <strong>Submit your paper now through <a href="https://shmpublisher.com/index.php/joiser/about/submissions">Online submission</a> ONLY. </strong>The JOISER publication period is carried out every six months, namely in<strong> January</strong> and <strong>July</strong>. However, authors can submit their work to JOISER at any time throughout the year, as the submission process is continuous. The JOISER has been indexed by <strong><a title="Garuda Joiser" href="https://garuda.kemdikbud.go.id/journal/view/31509" target="_blank" rel="noopener">Garuda</a></strong>, <strong><a href="https://scholar.google.com/citations?hl=en&amp;user=2JUEUwgAAAAJ&amp;view_op=list_works&amp;gmla=AJsN-F6uGjjRHKZcy4GxoE2Pdxnlna_Bq_r39x-mAfkEM20P3NXsTOgMIHGG79BMn-aWp8I07W97Dbl-sMkuI0qwp1Gicjy624nbPatj9ERSLXUVMhHj72MHzND6MtUaU6iUblDtSQ4mYnITNKGrMNtGLJ5_xzrgIA">Google Scholar</a>, <a href="https://search.crossref.org/?q=2963-6361&amp;from_ui=yes" target="_blank" rel="noopener">Crossref,</a></strong> <a href="https://journals.indexcopernicus.com/search/details?id=126590" target="_blank" rel="noopener"><strong>Copernicus</strong></a>, <strong><a title="Dimensions Joiser" href="https://app.dimensions.ai/discover/publication?order=altmetric&amp;and_facet_source_title=jour.1453307" target="_blank" rel="noopener">Dimensions</a></strong>, and <strong><a title="BASE Joiser" href="https://www.base-search.net/Search/Results?type=all&amp;lookfor=%22Journal+of+Information+System+Exploration+and+Research%22" target="_blank" rel="noopener">BASE.</a></strong> The journal is a <strong>Gold Open Access</strong> journal, online readers don't have to pay any fee.</p> en-US shmjoiser@gmail.com (Dwika Ananda Agustina Pertiwi) shmjoiser@gmail.com (Jumanto) Mon, 08 Jul 2024 00:00:00 +0000 OJS 3.2.1.1 http://blogs.law.harvard.edu/tech/rss 60 Breast Cancer Diagnosis Utilizing Artificial Neural Network (ANN) Algorithm for Integrating Multi-Omics Data and Clinical Features https://shmpublisher.com/index.php/joiser/article/view/249 <p>Breast cancer is one of the most common diseases affecting women worldwide, with a significant impact on patient's health and quality of life. Despite advances in medical technology and research, breast cancer diagnosis remains a challenge due to its complexity involving various biological and clinical factors. Several previous studies have focused on detecting this disease with optimal accuracy, but the selection of appropriate algorithms and methods is key to achieving this goal. This study aims to improve the accuracy of breast cancer diagnosis by using the ANN algorithm and data balancing method, SMOTE. This research uses Multi-Omic data and Clinical Features obtained in general from Kaggle. The research process is carried out in several stages, namely Data Collection, Preprocessing, Oversampling, Modeling, and Evaluation. This research successfully obtained an increase in accuracy, which was able to achieve an accuracy of 99.30%. This research shows that early detection of breast cancer with ANN algorithm and data balancing using SMOTE can improve accuracy performance in early detection of breast cancer. Given the use of data in this study is not too large, it is recommended for further research to use a larger dataset to validate the strength of the model that has been built on more varied data.</p> Rofik Rofik, Fani Artiyani; Dwika Ananda Agustina Pertiwi Copyright (c) 2024 Rofik Rofik, Fani Artiyani; Dwika Ananda Agustina Pertiwi https://creativecommons.org/licenses/by-sa/4.0 https://shmpublisher.com/index.php/joiser/article/view/249 Mon, 08 Jul 2024 00:00:00 +0000 The Influence of Determining the K-Value on Improving the Diabetes Classification Model using the K-NN Algorithm https://shmpublisher.com/index.php/joiser/article/view/344 <p>Diabetes mellitus is still an important health problem globally, so it requires an efficient classification model to help determine a patient's diagnosis. This study aims to determine the K-value on the accuracy performance of the diabetes classification model using the K-Nearest Neighbors (K-NN) algorithm. This research utilizes a simulated dataset generated through interaction with ChatGPT, we investigate various K-values ​​in the K-NN model and assess its accuracy using a confusion matrix. Based on experiments, we found that the K-NN classification model with a K=6 obtained an optimal accuracy of 97.62%. Thus, our findings highlight the important role of selecting optimal K-values ​​in improving the performance of diabetes classification models.</p> Nanda Putri Korina, Budi Prasetiyo, Ade Anggian Hakim, M Rivaldi Ali Septian Copyright (c) 2024 Nanda Putri Korina Putri Korina, Budi Prasetiyo https://creativecommons.org/licenses/by-sa/4.0 https://shmpublisher.com/index.php/joiser/article/view/344 Sat, 27 Jul 2024 00:00:00 +0000 Digit and Mark Recognition Using Convolutional Neural Network for Voting Digitization in Indonesia https://shmpublisher.com/index.php/joiser/article/view/365 <p>Digitization of voting results in Indonesia is essential to ensure the accuracy and integrity of the election process. This research introduces an innovative approach that uses Convolutional Neural Networks (CNN) for handwritten number recognition and tally mark recognition. This research uses a dataset obtained from Kaggle. The research process is conducted in several stages, namely Data Collection, Preprocessing, Data Sharing, Modelling, and Evaluation. The results showed that the proposed model achieved an accuracy of 98%. This research shows that using the CNN algorithm for handwritten number recognition and tally mark recognition can improve accuracy and efficiency in digitizing voting results. It is expected that this research can make a significant contribution to the development of a more reliable digital voting system. Future research is recommended to use a larger dataset to validate the strength of the model, which has been built on more varied data.</p> Mandasari Mandasari, Bagus Al Qohar Copyright (c) 2024 Mandasari Mandasari, Bagus Al Qohar https://creativecommons.org/licenses/by-sa/4.0 https://shmpublisher.com/index.php/joiser/article/view/365 Tue, 30 Jul 2024 00:00:00 +0000 Implementation of Least Significant Bit Steganography to Secure Text Messages in Images https://shmpublisher.com/index.php/joiser/article/view/438 <p>Steganography is a technique of securing secret messages in other messages that are not known. Simulation of the steganography method using the Least Significant Bit technique is used to change the last bit in one byte of data by using a text message as the container medium. This study aims to implement the security of text messages in images using the Least Significant Bit technique which is supported by the steganography method. Simulation techniques are used to conduct studies using Cryptool2 which can describe the concept of cryptography. The results obtained from this study regarding the security of text message insertion into an image in *.jpg and *.png format with 5 sampling trials are (1) the encrypted image cannot be distinguished directly through human eyes, (2) there is an increase in file size the image after being encrypted with an average for five trials is 0.31%, this increase depends on the length of the text message and a key to be inserted, the longer the insertion, the larger the resulting file size, (3) The higher the resolution of the image where the description encryption is inserted, the longer the process required, (4) The simulation time of steganographic decryption is faster than steganographic encryption. The decryption simulation process is the same as 50% of the encryption process.</p> Wiyan Herra Herviana, Djuniadi Djuniadi Copyright (c) 2024 Wiyan Herra Herviana, Djuniadi Djuniadi https://creativecommons.org/licenses/by-sa/4.0 https://shmpublisher.com/index.php/joiser/article/view/438 Tue, 30 Jul 2024 00:00:00 +0000 Inception ResNet v2 for Early Detection of Breast Cancer in Ultrasound Images https://shmpublisher.com/index.php/joiser/article/view/439 <p>Breast cancer is one of the leading causes of death in women. Early detection through breast ultrasound images is important and can be improved using machine learning models, which are more accurate and faster than manual methods. Previous research has shown that the use of the CNN (Convolutional Neural Network) algorithm in breast cancer detection still does not achieve high accuracy. This study aims to improve the accuracy of breast cancer detection using the Inception ResNet v2 transfer learning method and data augmentation. The data is divided into training, validation and testing data consisting of 3 classes, namely Benign, Malignant and Normal. The augmentation process includes rotation, zoom, and rescale. The model trained using CNN and Inception ResNet v2 showed good performance by producing the highest accuracy of 89.72% in the training data evaluation data and getting 90% accuracy in the prediction test stage with data testing. This study shows that the combination of data augmentation and the Inception ResNet v2 architecture can improve the accuracy of breast cancer detection in CNN models.</p> Tiara Lailatul Nikmah, Risma Moulidya Syafei, Devi Nurul Anisa; Elmo Juanara; Zohri Mahrus Copyright (c) 2024 Tiara Lailatul Nikmah, Risma Moulidya Syafei, Devi Nurul Anisa https://creativecommons.org/licenses/by-sa/4.0 https://shmpublisher.com/index.php/joiser/article/view/439 Tue, 30 Jul 2024 00:00:00 +0000