ANALISIS PERBANDINGAN ALGORITMA CLASSIFICATION UNTUK AUTHENTICATION UANG KERTAS (STUDI KASUS: BANKNOTE AUTHENTICATION)

Authors

  • Khairul Sani Program Magister Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
  • Wing Wahyu Winarno Program Magister Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
  • Silmi Fauziati Program Magister Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

DOI:

https://doi.org/10.26555/jifo.v10i1.a3344

Abstract

Uang merupakan alat transaksi yang digunakan untuk proses pertukaran barang dan jasa. Peredaran uang palsu dari tahun ke tahun terus mengalami peningkatan. Hal tersebut dikarenakan mudahnya mendapatkan informasi cara membuat uang palsu di internet, ditunjang dengan perkembangan teknologi yang sangat cepat, serta kemajuan digital image processing sehingga susah untuk mengenali mata uang asli atau palsu.  Untuk membedakan mata uang asli dan palsu maka penelitian ini akan menganalisis authentication uang kertas, dengan menggunakan beberapa algoritma classification. Tahapannya dimulai dari pengambilan data, kemudian proses recognition banknote yang terdiri dari proses image acquisition, gray scale conversion, sampai ke tahap classification. Selanjutnya tahap pengujian classification yaitu menggunakan WEKA appliaction tool dengan menerapkan metode cross validation pada data banknote authentication. Dari hasil pengujian yang dilakukan, bahwa algorithm tree C4.5 memiliki nilai classified instance yang paling tinggi yaitu sebesar 98.54 % dibanding dengan algorithm naive bayes dan neural network

References

Y. Kusumaningsih, “Faktor-Faktor Utama yang Berpengaruh Terhadap Prestasi Belajar Mahasiswa Pascasarjana Penerima Beasiswa S2 Dalam Negeri BPK-RI,†Universitas Indonesia, 2010.

Peraturan Presiden Nomor 81 Tahun 2010 tentang Grand Design Reformasi Birokrasi 2010-2025.

“Laporan Tahunan Biro SDM 2014,†2014.

“Laporan Kegiatan Evaluasi Implementasi MAKIN,†2014.

Jogiyanto, “Model Kesuksesan Sistem Teknologi Informasi,†Yogyakarta: Andi, 2007.

W. H. DeLone and E. R. McLean, "Information Systems Success: The Quest for the Dependent Variable," Information Systems Research, pp. 60-95, 1992.

W. H. DeLone and E. R. McLean, "The DeLone and McLean Model of Information Systems Success: A Ten-Year Update," Journal of Management Information Systems, 2003.

V. Venkatesh, M. G. Morris, G. B. Davis and F. D. Davis, "User Acceptance of Information Technology: Toward A Unified View," MIS Quarterly, pp. 425-478, 2003.

M. M. Yusof, J. Kuldis, A. Papazafeiropoulou and L. K. Stergioulas, "An Evaluation Framework for Health Information Systems: Human, Organization, and Technology-Fit Factors (HOT Fit)," International Journal of Medical Informatics 77, pp. 386-398, 2008.

H. Jogiyanto, Konsep dan Aplikasi Structural Equation Modeling (SEM) Berbasis Varian Dalam Penelitian Bisnis. Yogyakarta: UPP STIM YKPN, 2011.

N. A. K. S. Mohamadali and J. M. Garibaldi, "A Novel Evaluation Model Of User Acceptance Of Software Technology In Healthcare Sector," International Conference on Health Informatics, 2010.

J. C. Fan and K. Fang, "ERP Implementation and Information Systems Success: A Test of DeLone and McLean's Model," PICMET 2006 Proceedings, July 2006.

N. A. K. S. Mohamadali and J. M. Garibaldi, "Understanding and Addressing The ‘Fit’ Between User, Technology, and Organization in Evaluating User Acceptance of Healthcare Technology," International Conference on Health Informatics, 2012.

V. Venkatesh and M. G. Morris, "Why Don't Men Ever Stop to Ask For Direction? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior," MIS Quarterly, pp. 115-139, 2000.

G. Liu, S. Huang and X. Zhu, "User Acceptance of Internet Banking In An Uncertain and Risky Environment," The 2008 International Conference on Risk Management and Engineering Management, 2008.

S. AlAwadhi and A. Morris, "The Use of the UTAUT Model in the Adoption of E-government Services in Kuwait," Proceedings of the 41st Hawaii International Conference on System Sciences, 2008.

T. Zhou, "Exploring Mobile User Acceptance Based on UTAUT and Contextual Offering," International Symposium on Electronic Commerce and Security, no. IEEE, 2008.

Downloads

Published

2016-01-01

Issue

Section

Articles