<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>journal &#8211; Yoga Ari Tofan, S.Kom., M.Kom.</title>
	<atom:link href="https://yogatofan.com/tag/journal/feed/" rel="self" type="application/rss+xml" />
	<link>https://yogatofan.com</link>
	<description>Masih ngoding, tapi sekarang sambil ngasih nilai.</description>
	<lastBuildDate>Wed, 21 Jan 2026 01:29:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://yogatofan.com/wp-content/uploads/2026/01/icon-1.webp</url>
	<title>journal &#8211; Yoga Ari Tofan, S.Kom., M.Kom.</title>
	<link>https://yogatofan.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Menyusuri Evolusi CentOS: Stabil, Andal, dan Terus Berkembang</title>
		<link>https://yogatofan.com/research-publications/menyusuri-evolusi-centos-stabil-andal-dan-terus-berkembang/</link>
		
		<dc:creator><![CDATA[yogatofan]]></dc:creator>
		<pubDate>Wed, 31 Dec 2025 15:03:43 +0000</pubDate>
				<category><![CDATA[Riset & Publikasi]]></category>
		<category><![CDATA[centos]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[journal]]></category>
		<category><![CDATA[keamanan]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://yogatofan.com/?p=176</guid>

					<description><![CDATA[CentOS merupakan distribusi Linux berbasis RHEL yang dikenal karena kestabilan dan keamanannya di lingkungan server. Penelitian ini menggunakan metode studi literatur untuk menganalisis perkembangan, kelebihan, kekurangan, serta potensi pengembangan CentOS.]]></description>
										<content:encoded><![CDATA[
<p><strong>Authors</strong>: Yoga Ari Tofan, Rizky Parlika, Dandi Azaidane, Muhammad Ilham Arzaki, Bima Rizqy Prasurya, Fadhli Shidqi Wiratama, Hidayat Nur Tauhid<br><strong>Year</strong>: 2025<br><strong>Publisher</strong>: JIFOSI: Jurnal Informatika dan Sistem Informasi<br><strong>Type</strong>: Journal<br><strong>DOI / URL</strong>: <a href="https://doi.org/10.33005/jifosi.v6i3.558" data-type="link" data-id="https://doi.org/10.33005/jifosi.v6i3.558" target="_blank" rel="noreferrer noopener">https://doi.org/10.33005/jifosi.v6i3.558</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Abstract</strong></h2>



<p>CentOS merupakan distribusi Linux berbasis RHEL yang dikenal karena kestabilan dan keamanannya di lingkungan server. Penelitian ini menggunakan metode studi literatur untuk menganalisis perkembangan, kelebihan, kekurangan, serta potensi pengembangan CentOS. Hasil kajian menunjukkan bahwa CentOS unggul dalam kestabilan sistem, efisiensi sumber daya, dan keamanan kernel, meskipun kurang fleksibel untuk integrasi cloud dan memerlukan konfigurasi manual. Dibandingkan Ubuntu, CentOS lebih stabil dan cocok untuk server enterprise, sedangkan Ubuntu unggul dalam kemudahan penggunaan. Potensi pengembangan CentOS mencakup penerapan pada e-Government, pendidikan, cloud computing, dan sistem monitoring otomatis, menjadikannya fondasi penting dalam transformasi digital modern.</p>



<p><strong>Keywords</strong>: linux, centos, open source, keamanan, cloud computing</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Citation</strong></h2>



<p>R. P. Sari and F. S. Redha, “Sistem Pendukung Keputusan Pemilihan Distro Linux Menggunakan Metode Simple Additive Weighting (SAW),”&nbsp;<em>Jurnal Sistem Komputer dan Informatika (JSON)</em>, vol. 2, no. 3, p. 348, May 2021, doi: 10.30865/json.v2i3.3039.</p>



<p>A. Halim, “Membangun Local Area Network Menggunakan Linux Mandrake 9.1,”&nbsp;<em>Jurnal SATYA Informatika</em>, vol. 7, no. 02, pp. 1–15, 2022, doi: 10.59134/jsk.v7i02.157.</p>



<p>N. A. Santoso, K. B. Affandi, and R. D. Kurniawan, “Implementasi Keamanan Jaringan Menggunakan Port Knocking,”&nbsp;<em>Jurnal Janitra Informatika dan Sistem Informasi</em>, vol. 2, no. 2, pp. 90–95, 2022, doi: 10.25008/janitra.v2i2.156.</p>



<p>M. P. Utami, “Pemanfaatan Desain Interaksi Antar Muka Pengguna Dengan Implementasi Model GOMS Pada Aplikasi Mobile Elma,”&nbsp;<em>Rabit: Jurnal Teknologi dan Sistem Informasi</em>, vol. 8, no. 1, pp. 16–25, 2023, doi: 10.36341/rabit.v8i1.2967.</p>



<p>Ghufron Malik, Kholid Wahyudi, Febri Tri Arie Sakti, Abdul Ghofar, and Abdul Halim Anshor, “Analisa Perbandingan Manajemen Proses Multitasking pada Sistem Operasi Windows dan Linux,”&nbsp;<em>Jurnal Teknik Mesin Industri Elektro dan Informatika</em>, vol. 3, no. 4, pp. 190–199, 2024, doi: 10.55606/jtmei.v3i4.4538.</p>



<p>A. Julyant Firdausy, N. Akbar, S. Humaidy, A. Halim Anshor, and A. Alvin, “Pemanfaatan Sistem Operasi Open Source Dalam Pendidikan dan Pengembangan Software,”&nbsp;<em>JATI: Jurnal Mahasiswa Teknik Informatika</em>, vol. 9, no. 1, pp. 1103–1106, 2024, doi: 10.36040/jati.v9i1.12631.</p>



<p>H. I. Amrullah, A. N. F. Amarta, and E. Rilvani, “Fleksibilitas dan Kesederhanaan Arsitektur Sistem Operasi Linux,”&nbsp;<em>Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi</em>, vol. 3, no. 1, pp. 59–64, Jan. 2025, doi: 10.61132/neptunus.v3i1.630.</p>



<p>Zacky Rafian Fawwauzy, Taufik Eka Albani, and Elkin Rilvani, “Perbandingan Teknik pada Struktur Sistem File Windows &amp; Linux,”&nbsp;<em>Repeater: Publikasi Teknik Informatika dan Jaringan</em>, vol. 3, no. 1, pp. 69–79, 2025, doi: 10.62951/repeater.v3i1.343.</p>



<p>D. O. Nasrulah, A. W. Hertaliando, R. Tullah, and F. Ferawati, “Evaluasi Perbandingan Sistem Operasi Linux untuk Pemanfaatan Client-Server: Studi Kasus Ubuntu dan Debian,”&nbsp;<em>MALCOM: Indonesian Journal of Machine Learning and Computer Science</em>, vol. 5, no. 1, pp. 242–248, 2024, doi: 10.57152/malcom.v5i1.1702.</p>



<p>N. E. Hidayanto, Y. P. Bayono, H. M. M. C. P., and D. K. Susilo, “Pemanfaatan Software Sistem Operasi Bebas dan Lokal Buatan Indonesia BlankOn Linux untuk Meningkatkan Pengenalan Jati Diri Bangsa,”&nbsp;<em>Indonesian Research Journal in Education</em>, vol. 2, no. 1, pp. 338–343, Jan. 2022, doi: 10.31004/irje.v2i1.183.</p>



<p>S. Suryayusra and D. Irawan, “Perbandingan Intrusion Prevention System (IPS) Pada Linux Ubuntu dan Linux CentOS,”&nbsp;<em>Jurnal Teknologi Informasi MURA</em>, vol. 12, no. 02, pp. 131–144, 2020, doi: 10.32767/jti.v12i02.1023.</p>



<p>O. M. Khaled, A. Z. Elsherif, A. Salama, M. Herajy, and E. Elsedimy, “Evaluating Machine Learning Models for Predictive Analytics of Liver Disease Detection Using Healthcare Big Data,”&nbsp;<em>International Journal of Electrical and Computer Engineering</em>, vol. 15, no. 1, pp. 1162–1174, 2025, doi: 10.11591/ijece.v15i1.pp1162-1174.</p>



<p>A. D. Putra and M. T. R. B. Alghozy, “Analisis dan Implementasi Keamanan Jaringan File Transfer Protocol (FTP) Menggunakan Intrusion Prevention System (IPS) pada Mikrotik,”&nbsp;<em>Smart Comp: Jurnalnya Orang Pintar Komputer</em>, vol. 11, no. 4, pp. 762–775, Oct. 2022, doi: 10.30591/smartcomp.v11i4.4263.</p>



<p>G. A. P. Tenaya, I. D. P. G. W. Putra, A. A. G. Ekayana, I. G. M. N. Desnanjaya, and A. A. G. B. Ariana, “Analisis Performansi Dua Sistem Operasi Server CentOS 8 dan Oracle Linux 8 Menggunakan Metode Levene dengan SysBench,”&nbsp;<em>INFORMAL: Informatics Journal</em>, vol. 7, no. 1, p. 31, Apr. 2022, doi: 10.19184/isj.v7i1.30172.</p>



<p>D. A. T. Segara, A. Anwar, and S. Safriadi, “Implementasi OwnCloud Menggunakan Proxmox Virtual Environment dengan Sistem Operasi CentOS 7 pada Medianusa Permana Medan,”&nbsp;<em>Jurnal Teknologi Rekayasa Informasi dan Komputer</em>, vol. 8, no. 1, pp. 1–9, Mar. 2025, doi: 10.30811/jtrik.v8i1.4505.</p>



<p>I. Irianto, A. Afrisawati, and S. Sahren, “Linux-Based Server Operating System Installation Training for Yapdi Bandar Pulau Vocational High School Students,”&nbsp;<em>Jurnal IPTEK Bagi Masyarakat (J-IbM)</em>, vol. 1, no. 2, pp. 90–97, 2021, doi: 10.55537/jibm.v1i2.44.</p>



<p>R. Rusady, S. Dewi, and R. S. Anwar, “Rancang Bangun Aplikasi Berbasis Android Untuk Pembelajaran Linux CentOS,”&nbsp;<em>Computer Science (CO-Sci)</em>, vol. 1, no. 2, pp. 97–104, July 2021, doi: 10.31294/coscience.v1i2.439.</p>



<p>A. Atthariq, M. Nasir, S. Satriananda, and A. Fata, “Peningkatan Hard Skill Computer Networking Linux Operating System bagi Santri Ma’had Ta’limul Qur’an ‘Utsman Bin ‘Affan Lhokseumawe,”&nbsp;<em>Prosiding Seminar Nasional Politeknik Negeri Lhokseumawe</em>, vol. 6, no. 1, pp. 118–121, 2022.</p>



<p>Zalfa Dewi Zahrani, Novianto Andi Hardiansyah, and Elkin Rilvani, “Keamanan Kernel Linux: Pendekatan Hardening dan Perlindungan terhadap Serangan Eksploitasi,”&nbsp;<em>Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika</em>, vol. 3, no. 1, pp. 169–177, 2025, doi: 10.61132/merkurius.v3i1.620.</p>



<p>M. Rizky, A. Purnama Alam, N. Restina Maharani, F. Adeliani Putri, A. Ferdianto, and A. Halim Anshor, “Pemilihan Distribusi Linux Terbaik Untuk Server Berbasis Analytical Hierarchy Process (AHP),”&nbsp;<em>JATI: Jurnal Mahasiswa Teknik Informatika</em>, vol. 9, no. 1, pp. 1300–1305, 2025, doi: 10.36040/jati.v9i1.12686.</p>



<p>R. Spiwoks et al., “CentOS Linux for the ATLAS MUCTPI Upgrade,”&nbsp;<em>IEEE Transactions on Nuclear Science</em>, vol. 68, no. 8, pp. 2127–2131, Aug. 2021, doi: 10.1109/TNS.2021.3084246.</p>



<p>F. S. Zakaria, M. F. S., and G. M. R., “Infrastruktur Jaringan Menggunakan Server Web Hosting CentOS 6 Sebagai Server Aplikasi Monitoring Perkebunan,”&nbsp;<em>Prosiding Industrial Research Workshop and National Seminar</em>, vol. 11, no. 1, pp. 78–82, Sept. 2020, doi: 10.35313/irwns.v11i1.1971.</p>



<p>E. D. Sitanggang, “Analisis Preboot Execution Environment Server Linux dengan Algoritma First Come First Serve,”&nbsp;<em>LOFIAN: Jurnal Teknologi Informasi dan Komunikasi</em>, vol. 1, no. 1, pp. 12–16, Sept. 2021, doi: 10.58918/lofian.v1i1.159.</p>



<p>A. P. Lalengke and I. Nurhaida, “Performance Analysis of CloudLinux-based Web Server at the Embassy of the Kingdom of Morocco in Jakarta,”&nbsp;<em>SISFOKOM</em>, vol. 10, pp. 250–258, 2021, doi: 10.32736/sisfokom.v10i2.1168.</p>



<p>I. Mayendra, H. Saputra, and U. Hasanah, “Rancang Bangun Local Cloud Server dengan NextCloud pada CentOS 7 di SRH Training Center,”&nbsp;<em>JUTSI: Jurnal Teknologi dan Sistem Informasi</em>, vol. 1, no. 1, pp. 39–44, Feb. 2021, doi: 10.33330/jutsi.v1i1.1045.</p>



<p>G. Singh, “Assessing the Vulnerabilities and Impacts of Open SSH Ports on CentOS 9 Virtual Machines Hosted on Mac ARM Computers CVE-2023-25136,” 2024, doi: 10.13140/RG.2.2.23838.14403.</p>



<p>Y. Mulyanto, E. S. Susanto, and Z. M. Putra, “Analisis Perbandingan Cloud Server Menggunakan CentOS 7 dan Ubuntu Server 22.04 Menggunakan Quality of Service,”&nbsp;<em>Digital Transformation Technology</em>, vol. 4, no. 1, pp. 445–451, 2024, doi: 10.47709/digitech.v4i1.4056.</p>



<p>S. Maolia and Rahma Eka Aprilliana, “Literature Review Jurnal Memahami Faktor-Faktor yang Mempengaruhi Popularitas Windows Dibandingkan Linux,”&nbsp;<em>Jurnal Mahasiswa Teknik Informatika</em>, vol. 3, no. 1, pp. 96–101, Apr. 2024, doi: 10.35473/jamastika.v3i1.2791.</p>



<p>A. Arini, A. Fiade, and R. Baharsyah, “Perbandingan Load Balancing Router MySQL dan HAProxy Menggunakan SysBench dan Cluster InnoDB pada Sistem Operasi CentOS,”&nbsp;<em>Cyber Security dan Forensik Digital</em>, vol. 8, no. 1, pp. 17–24, 2025, doi: 10.14421/csecurity.2025.8.1.5004.</p>



<p>Muhammad Anis Al Hilmi, Fauziah Herdiyanti, Renol Burjulius, and Sonty Lena, “Pengujian Keamanan Sistem Operasi Linux Studi Kasus: Celah Keamanan FTP pada Metasploitable2,”&nbsp;<em>IKRA-ITH Informatika: Jurnal Komputer dan Informatika</em>, vol. 8, no. 1, pp. 110–115, 2024, doi: 10.37817/ikraith-informatika.v8i1.3205.</p>



<p>I. K. S. Satwika and K. N. Semadi, “Perbandingan Performansi Web Server Apache dan Nginx dengan Menggunakan IPv6,”&nbsp;<em>SCAN: Jurnal Teknologi Informasi dan Komunikasi</em>, vol. 15, no. 1, pp. 10–15, Feb. 2020, doi: 10.33005/scan.v15i1.1847.</p>



<p>M. Lestandy, M. A. Hidayatullah, A. Faruq, M. Effendy, and M. Irfan, “Replication of Comparative Methods for Single Database Performance in CentOS Operation System with MaxScale,”&nbsp;<em>Cyberspace: Jurnal Pendidikan Teknologi Informasi</em>, vol. 4, no. 2, p. 74, 2020, doi: 10.22373/cj.v4i2.7753.</p>



<p>I. P. A. E. Pratama and P. B. S. W. Putra, “Pengujian IaC Berbasis DevOps dan Ansible Menggunakan Metode Black Box Testing,”&nbsp;<em>Faktor Exacta</em>, vol. 15, no. 2, pp. 84–91, 2022, doi: 10.30998/faktorexacta.v15i2.12039.</p>



<p>D. Hisyam, M. Fathinuddin, and U. Y. K. S. Hediyanto,&nbsp;<em>Operating System Selection for Information System Practicums: A Comparative Study of Rocky Linux, CentOS Stream, and Ubuntu Using the Analytical Hierarchy Process</em>. Universitas Telkom, 2025. Accessed: Dec. 8, 2025. [Online].</p>



<p>A. Wicitra, D. Utomo, and H. K. Wardana, “Membangun Infrastruktur Komputasi Awan Privat Single Cluster dan Multi Cluster dengan Menggunakan Linux CentOS,”&nbsp;<em>Techné: Jurnal Ilmiah Elektro Teknik</em>, vol. 13, no. 2, pp. 185–194, Oct. 2014.</p>



<p>D. Surya Rahmadani, T. Ariyadi, E. Novitasari, D. Pertiwiningsih, and K. Kunci, “Analisis Kinerja Web Server Berbasis Linux Ubuntu 22.04,”&nbsp;<em>Jurnal Tera</em>, vol. 5, no. 1, pp. 35–44, 2025.</p>



<p>M. Khaerudin, A. A. Hendharsetiawan, and T. Sumitra, “Perbandingan Optimasi Penggunaan Memory Untuk Aplikasi Desain Grafis pada Sistem Operasi Windows dan Linux,”&nbsp;<em>Jurnal Sistem Informasi Universitas Suryadarma</em>, vol. 12, no. 1, pp. 43–47, 2014, doi: 10.35968/jsi.v12i1.1326.</p>



<p>H. Saragih and B. W. Yudanto, “Sistem Informasi Lembaga Pemerintahan di Indonesia Melalui Electronic Government (E-Government) dengan Open Source Software,”&nbsp;<em>Jurnal Teknik dan Ilmu Komputer</em>, 2013.</p>



<p>F. R. Permana, “Analisis Implementasi Network Automation pada Sistem Operasi Server Menggunakan Python Berbasis Web,” D4, Politeknik Negeri Jakarta, 2024.</p>



<p>R. Fadhlurrahman, M. C. Saputra, and A. D. Herlambang, “Evaluasi Penerapan E-Government di Pemerintah Kota Batu Menggunakan Kerangka Kerja Pemeringkatan E-Government Indonesia (PeGI),”&nbsp;<em>Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer</em>, vol. 2, no. 12, pp. 5977–5982, Aug. 2018.</p>



<p>E. B. Harjono, “Analisa dan Implementasi dalam Membangun Sistem Operasi Linux Menggunakan Metode LSF dan Remaster,”&nbsp;<em>Sinkron: Jurnal dan Penelitian Teknik Informatika</em>, vol. 1, no. 1, Apr. 2017.</p>



<p>A. Azhar, H. Hendrawaty, M. Mulyadi, and C. Yusnar, “Workshop Administrasi Jaringan Komputer Berbasis Linux bagi Siswa SMK Negeri 1 Tanah Luas Kabupaten Aceh Utara,”&nbsp;<em>Prosiding Seminar Nasional Politeknik Negeri Lhokseumawe</em>, vol. 3, no. 1, p. 185, 2019.</p>



<p>T. Alida, “Implementasi Sistem Keamanan Email Berbasiskan Open Source Studi Kasus PPIN-BATAN,” Bachelor Thesis, UIN Syarif Hidayatullah Jakarta, 2023.</p>



<p>M. Ryan, “Perancangan Modul Pembelajaran dengan Menggunakan Model 4D Berbasis Digital Android Menggunakan Sistem Operasi Linux dengan VirtualBox sebagai Perangkat Virtualisasi,” 2022.</p>



<p>A. Saputra et al., “Sistem Informasi Monitoring dan Evaluasi Pembangunan Kabupaten Bintan (SIMONEV21),”&nbsp;<em>Jurnal Teknologi dan Sistem Informasi</em>, vol. 14, no. 2, pp. 6–10, July 2023.</p>



<p>F. Afiana, A. Fitrian, E. E. Sukoco, and A. B. Wijaya, “Enterprise Architecture Planning untuk Manajemen Strategi SI/TI Pengembangan Pantai Wisata Laguna,”&nbsp;<em>JUSIFOR: Jurnal Sistem Informasi dan Informatika</em>, vol. 3, no. 1, pp. 80–88, June 2024, doi: 10.70609/jusifor.v3i1.4392.</p>



<p>A. S. Kusuma and I. G. S. E. Putra, “Rancang Bangun Sistem Penjadwalan Wawancara Mahasiswa Baru STMIK STIKOM Indonesia,”&nbsp;<em>Jurnal Ilmiah Teknologi Informasi Asia</em>, vol. 11, no. 2, pp. 139–153, Aug. 2017, doi: 10.32815/jitika.v11i2.202.</p>



<p>M. Faisal and M. R. Fachri, “Rancang Bangun Aplikasi Manajemen Bagian Teknik Pemeliharaan pada Kementerian Lingkungan Hidup dan Kehutanan Jakarta,”&nbsp;<em>Krisnadana Journal</em>, vol. 3, no. 2, pp. 101–111, Jan. 2024, doi: 10.58982/krisnadana.v3i2.540.</p>



<p>D. A. Syafitri, D. Fitri, Nurhaliza, and Shahdana, “Pengembangan Aplikasi Quiz Pembelajaran Berbasis Visual Basic dengan Pendekatan Pemrograman Berorientasi Objek,”&nbsp;<em>Kohesi: Jurnal Sains dan Teknologi</em>, vol. 7, no. 8, pp. 91–100, Apr. 2025, doi: 10.3785/kohesi.v7i8.12334.</p>



<p>M. R. Fadila and S. Faizah, “Perancangan Sistem Alert Monitoring Server Menggunakan Telegram dengan Metode Waterfall di PT. Metrocom Global Solusi,”&nbsp;<em>Jurnal Ilmiah Sains dan Teknologi</em>, vol. 1, no. 1, pp. 130–209, 2025.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Links</h3>



<ul class="wp-block-list">
<li>Publisher Page: <a href="https://jifosi.upnjatim.ac.id/index.php/jifosi/article/view/558" data-type="link" data-id="https://jifosi.upnjatim.ac.id/index.php/jifosi/article/view/558" target="_blank" rel="noreferrer noopener">https://jifosi.upnjatim.ac.id/index.php/jifosi/article/view/558</a></li>



<li>Google Scholar: <a href="https://scholar.google.com/scholar?cluster=15704843006237176776" data-type="link" data-id="https://scholar.google.com/scholar?cluster=15704843006237176776" target="_blank" rel="noreferrer noopener">https://scholar.google.com/scholar?cluster=15704843006237176776</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Classification of Eye Diseases Using the AlexNet Convolutional Neural Network Model Algorithm</title>
		<link>https://yogatofan.com/research-publications/classification-of-eye-diseases-using-the-alexnet-convolutional-neural-network-model-algorithm/</link>
		
		<dc:creator><![CDATA[yogatofan]]></dc:creator>
		<pubDate>Wed, 05 Nov 2025 11:54:58 +0000</pubDate>
				<category><![CDATA[Riset & Publikasi]]></category>
		<category><![CDATA[alexnet]]></category>
		<category><![CDATA[classification]]></category>
		<category><![CDATA[cnn]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[eye diseases]]></category>
		<category><![CDATA[journal]]></category>
		<guid isPermaLink="false">https://yogatofan.com/?p=173</guid>

					<description><![CDATA[This study uses the Convolutional Neural Network (CNN) method with the AlexNet model to classify eye diseases based on medical images. The dataset includes labeled images of three types of eye diseases: cataract, glaucoma, and diabetic retinopathy.]]></description>
										<content:encoded><![CDATA[
<p><strong>Authors</strong>: Moch Deny Pratama, Royal Fajar Sultoni, Adil Sandy Wardhani, Maulana Hassan Sechuti, Yerezqy Bagus, Dina Zatusiva Haq, Yoga Ari Tofan<br><strong>Year</strong>: 2025<br><strong>Publisher</strong>: IJCONSIST: International Journal Of Computer, Network Security and Information System<br><strong>Type</strong>: Journal<br><strong>DOI / URL</strong>: <a href="https://doi.org/10.33005/ijconsist.v7i1.160" data-type="link" data-id="https://doi.org/10.33005/ijconsist.v7i1.160" target="_blank" rel="noreferrer noopener">https://doi.org/10.33005/ijconsist.v7i1.160</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Abstract</strong></h2>



<p>This study uses the Convolutional Neural Network (CNN) method with the AlexNet model to classify eye diseases based on medical images. The dataset includes labeled images of three types of eye diseases: cataract, glaucoma, and diabetic retinopathy. The experimental results show that the model achieved an accuracy of 75.18%, which indicates that CNN with the AlexNet architecture can classify eye diseases quite well. This research shows that deep learning can be used to help doctors or health professionals in diagnosing eye diseases through automatic image analysis. Although the accuracy still needs to be improved, this study can serve as a reference for developing an automated diagnostic system in the future. Further research is expected to increase accuracy, expand the dataset, and apply other deep learning techniques to improve the performance of eye disease detection.</p>



<p><strong>Keywords</strong>: Classification of Eye Diseases, Convolutional Neural Network, Alexnet, Deep Learning</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Citation</strong></h2>



<p>M. Ptito, M. Bleau, and J. Bouskila, “The retina: a window into the brain,”&nbsp;<em>Cells</em>, vol. 10, no. 12, MDPI, p. 3269, 2021.</p>



<p>K. Kansal and H. Khan, “Environmental factors and eye health: Protecting your vision in a changing world,”&nbsp;<em>Int. J. Ophthalmol. Optom.</em>, vol. 5, pp. 33–35, 2023.</p>



<p>G. Arslan and Ç. B. Erdaş, “Detection of cataract, diabetic retinopathy and glaucoma eye diseases with deep learning approach,”&nbsp;<em>Intell. Methods Eng. Sci.</em>, vol. 2, no. 2, pp. 42–47, 2023.</p>



<p>D. C. R. Novitasari, P. Wulandari, and D. Z. Haq, “Cervical Cancer Diagnosis System using Convolutional Neural Network ResidualNet,”&nbsp;<em>Int. J. Comput.</em>, vol. 21, no. 1 SE-, pp. 61–68, Mar. 2022, doi: 10.47839/ijc.21.1.2518.</p>



<p>J. Sanghavi and M. Kurhekar, “Ocular disease detection systems based on fundus images: a survey,”&nbsp;<em>Multimed. Tools Appl.</em>, vol. 83, no. 7, pp. 21471–21496, 2024.</p>



<p>D. Marcella, Y. Yohannes, and S. Devella, “Klasifikasi penyakit mata menggunakan Convolutional Neural Network dengan arsitektur VGG-19,”&nbsp;<em>J. Algoritm.</em>, vol. 3, no. 1, pp. 60–70, 2022.</p>



<p>A. E. Suwanda and D. Juniati, “Klasifikasi Penyakit Mata Berdasarkan Citra Fundus Retina Menggunakan Dimensi Fraktal Box Counting Dan Fuzzy K-Means,” 2022.</p>



<p>J. Qiu, X. Lu, X. Wang, C. Chen, Y. Chen, and Y. Yang, “Research on image recognition of tomato leaf diseases based on improved AlexNet model,”&nbsp;<em>Heliyon</em>, vol. 10, no. 13, 2024.</p>



<p>G. V. Doddi, “Eye Disease Retinal Images,”&nbsp;<em>Kaggle</em>, 2022.<br><a href="https://www.kaggle.com/datasets/gunavenkatdoddi/eye-diseases-classification">https://www.kaggle.com/datasets/gunavenkatdoddi/eye-diseases-classification</a></p>



<p>H. Eldem, E. Ülker, and O. Y. Işıklı, “AlexNet architecture variations with transfer learning for classification of wound images,”&nbsp;<em>Eng. Sci. Technol. an Int. J.</em>, vol. 45, p. 101490, 2023.</p>



<p>T. Sivakumari and R. Vani, “Implementation of alexnet for classification of knee osteoarthritis,” in&nbsp;<em>2022 7th International Conference on Communication and Electronics Systems (ICCES)</em>, 2022, pp. 1405–1409.</p>



<p>S. Kavitha, B. Dhanapriya, G. N. Vignesh, and K. R. Baskaran, “Neural style transfer using vgg19 and alexnet,” in&nbsp;<em>2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA)</em>, 2021, pp. 1–6.</p>



<p>G. Naidu, T. Zuva, and E. M. Sibanda, “A review of evaluation metrics in machine learning algorithms,” in&nbsp;<em>Computer science on-line conference</em>, 2023, pp. 15–25.</p>



<p>S. Sathyanarayanan and B. R. Tantri, “Confusion matrix-based performance evaluation metrics,”&nbsp;<em>African J. Biomed. Res.</em>, vol. 27, no. 4S, pp. 4023–4031, 2024.</p>



<p>D. Z. Haq and C. Fatichah, “Ultrasound Image Synthetic Generating Using Deep Convolution Generative Adversarial Network For Breast Cancer Identification,”&nbsp;<em>IPTEK J. Sci. Technol.</em>, vol. 34, no. 1, 2023, doi:&nbsp;<a>http://dx.doi.org/10.12962/j20882033.v34i1.14968</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Links</h3>



<ul class="wp-block-list">
<li>Publisher Page: <a href="https://ijconsist.org/index.php/ijconsist/article/view/160" data-type="link" data-id="https://ijconsist.org/index.php/ijconsist/article/view/160" target="_blank" rel="noreferrer noopener">https://ijconsist.org/index.php/ijconsist/article/view/160</a></li>



<li>Google Scholar: <a href="https://scholar.google.com/scholar?cluster=9341093393877158497" data-type="link" data-id="https://scholar.google.com/scholar?cluster=9341093393877158497" target="_blank" rel="noreferrer noopener">https://scholar.google.com/scholar?cluster=9341093393877158497</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malicious Traffic Detection In DNS Infrastructure Using Decision Tree Algorithm</title>
		<link>https://yogatofan.com/research-publications/malicious-traffic-detection-in-dns-infrastructure-using-decision-tree-algorithm/</link>
		
		<dc:creator><![CDATA[yogatofan]]></dc:creator>
		<pubDate>Mon, 31 Jan 2022 05:30:51 +0000</pubDate>
				<category><![CDATA[Riset & Publikasi]]></category>
		<category><![CDATA[decision tree]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[journal]]></category>
		<category><![CDATA[machine learcning]]></category>
		<category><![CDATA[malicious traffic]]></category>
		<category><![CDATA[traffic analysis]]></category>
		<guid isPermaLink="false">https://yogatofan.com/?p=46</guid>

					<description><![CDATA[Domain Name System (DNS) is an essential component in internet infrastructure to direct domains to IP addresses or conversely. Despite its important role in delivering internet services, attackers often use DNS as a bridge to breach a system.]]></description>
										<content:encoded><![CDATA[
<p><strong>Authors</strong>: Hazna At Thooriqoh, M Naufal Azzmi, Yoga Ari Tofan, Ary Mazharuddin Shiddiqi<br><strong>Year</strong>: 2021<br><strong>Publisher</strong>: JUTI: Jurnal Ilmiah Teknologi Informasi<br><strong>Type</strong>: Journal<br><strong>DOI / URL</strong>: <a href="https://doi.org/10.12962/j24068535.v19i3.a1054" data-type="link" data-id="https://doi.org/10.12962/j24068535.v19i3.a1054" target="_blank" rel="noreferrer noopener">https://doi.org/10.12962/j24068535.v19i3.a1054</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Abstract</strong></h2>



<p>Domain Name System (DNS) is an essential component in internet infrastructure to direct domains to IP addresses or conversely. Despite its important role in delivering internet services, attackers often use DNS as a bridge to breach a system. A DNS traffic analysis system is needed for early detection of attacks. However, the available security tools still have many shortcomings, for example broken authentication, sensitive data exposure, injection, etc. This research uses DNS analysis to develop anomaly-based techniques to detect malicious traffic on the DNS infrastructure. To do this, We look for network features that characterize DNS traffic. Features obtained will then be processed using the Decision Tree algorithm to classifyincoming DNS traffic. We experimented with 2.291.024 data traffic data matches the characteristics of BotNet and normal traffic. By dividing the data into 80% training and 20% testing data, our experimental results showed high detection aacuracy (96.36%) indicating the robustness of our method.</p>



<p><strong>Keywords</strong>: DNS traffic analysis, machine learning, decision tree</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Citation</strong></h2>



<p>L. Watkins et al., “Using semi-supervised machine learning to address the Big Data problem in DNS networks,” 2017 IEEE 7th Annu. Comput. Commun. Work. Conf. CCWC 2017, no. January, 2017, doi: 10.1109/CCWC.2017.7868376.&nbsp;</p>



<p>S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A survey,” Comput. Networks, vol. 57, no. 2, pp. 378–403, 2013, doi: 10.1016/j.comnet.2012.07.021.&nbsp;</p>



<p>X. Li, J. Wang, and X. Zhang, “Botnet detection technology based on DNS,” Futur. Internet, vol. 9, no. 4, pp. 1–12, 2017, doi: 10.3390/fi9040055.&nbsp;</p>



<p>S. Miller and C. Busby-Earle, “The role of machine learning in botnet detection,” 2016 11th Int. Conf. Internet Technol. Secur. Trans. ICITST 2016, pp. 359–364, 2017, doi: 10.1109/ICITST.2016.7856730.&nbsp;</p>



<p>X. Dong, J. Hu, and Y. Cui, “Overview of botnet detection based on machine learning,” 2018, doi: 10.1109/ICMCCE.2018.00106.&nbsp;</p>



<p>A. Feizollah, N. B. Anuar, R. Salleh, F. Amalina, R. R. Ma’arof, and S. Shamshirband, “A study of machine learning classifiers for anomaly-based mobile botnet detection,” Malaysian J. Comput. Sci., vol. 26, no. 4, pp. 251–265, 2013.&nbsp;</p>



<p>M. Singh, M. Singh, and S. Kaur, “Issues and challenges in DNS based botnet detection: A survey,” Comput. Secur., vol. 86, pp. 28–52, 2019, doi: 10.1016/j.cose.2019.05.019.&nbsp;</p>



<p>M. Stevanovic and J. M. Pedersen, “An analysis of network traffic classification for botnet detection,” in 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015, pp. 1–8.&nbsp;</p>



<p>M. Stevanovic, J. M. Pedersen, A. D’Alconzo, S. Ruehrup, and A. Berger, “On the ground truth problem of malicious DNS traffic analysis,” Comput. Secur., vol. 55, pp. 142–158, 2015.&nbsp;</p>



<p>H. R. Zeidanloo, A. B. Manaf, P. Vahdani, F. Tabatabaei, and M. Zamani, “Botnet detection based on traffic monitoring,” in ICNIT 2010 &#8211; 2010 International Conference on Networking and Information Technology, 2010, pp. 97–101, doi: 10.1109/ICNIT.2010.5508552.&nbsp;</p>



<p>S. Y. Yerima and M. K. Alzaylaee, “Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks,” arXiv. 2020.&nbsp;</p>



<p>J. Wu, “Artificial Neural Network Based DGA Botnet Detection,” 2020, doi: 10.1088/1742-6596/1578/1/012074.&nbsp;</p>



<p>E. B. Beigi, H. H. Jazi, N. Stakhanova, and A. A. Ghorbani, “Towards effective feature selection in machine learning-based botnet detection approaches,” 2014, doi: 10.1109/CNS.2014.6997492.&nbsp;</p>



<p>S. Saad et al., “Detecting P2P botnets through network behavior analysis and machine learning,” 2011, doi: 10.1109/PST.2011.5971980.&nbsp;</p>



<p>Y. M. Mahardhika, A. Sudarsono, and A. R. Barakbah, “An implementation of Botnet dataset to predict accuracy based on network flow model,” 2017, doi: 10.1109/KCIC.2017.8228455.&nbsp;</p>



<p>J. Pang, R. De Prisco, J. Hendricks, B. Maggs, A. Akella, and S. Seshan, “Availability, usage, and deployment characteristics of the domain name system,” Proc. 2004 ACM SIGCOMM Internet Meas. Conf. IMC 2004, no. January, pp. 1–14, 2004, doi: 10.1145/1028788.1028790.&nbsp;</p>



<p>A. Alenazi, I. Traore, K. Ganame, and I. Woungang, “Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis,” 2017, doi: 10.1007/978-3-319-69155-8_1.&nbsp;</p>



<p>M. Abedini et al., “A generalized framework for medical image classification and recognition,” IBM J. Res. Dev., vol. 59, no. 2/3, p. 1, 2015.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Links</h3>



<ul class="wp-block-list">
<li>Publisher Page: <a href="https://juti.if.its.ac.id/index.php/juti/article/view/1054" target="_blank" rel="noreferrer noopener">https://juti.if.its.ac.id/index.php/juti/article/view/1054</a></li>



<li>Google Scholar: <a href="https://scholar.google.com/scholar?cluster=8696158275109397624" data-type="link" data-id="https://scholar.google.com/scholar?cluster=8696158275109397624" target="_blank" rel="noreferrer noopener">https://scholar.google.com/scholar?cluster=8696158275109397624</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Systematic Comparison of Software Requirements Classification</title>
		<link>https://yogatofan.com/research-publications/a-systematic-comparison-of-software-requirements-classification/</link>
		
		<dc:creator><![CDATA[yogatofan]]></dc:creator>
		<pubDate>Fri, 01 Jan 2021 11:29:19 +0000</pubDate>
				<category><![CDATA[Riset & Publikasi]]></category>
		<category><![CDATA[classification]]></category>
		<category><![CDATA[cnn]]></category>
		<category><![CDATA[fasttext]]></category>
		<category><![CDATA[journal]]></category>
		<category><![CDATA[software requirements]]></category>
		<category><![CDATA[svm]]></category>
		<guid isPermaLink="false">https://yogatofan.com/?p=169</guid>

					<description><![CDATA[Authors: Fajar Baskoro, Rasi Aziizah Andrahsmara, Brian Rizqi Paradisiaca Darnoto, Yoga Ari TofanYear: 2021Publisher: IPTEK The Journal for Technology &#38; ScienceType: JournalDOI / URL: https://doi.org/10.12962/j20882033.v32i3.13005 Abstract Software requirements specification (SRS) is an essential part of software development. SRS has two features: functional requirements (FR) and non-functional requirements (NFR). Functional requirements define the needs that are [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>Authors</strong>: Fajar Baskoro, Rasi Aziizah Andrahsmara, Brian Rizqi Paradisiaca Darnoto, Yoga Ari Tofan<br><strong>Year</strong>: 2021<br><strong>Publisher</strong>: IPTEK The Journal for Technology &amp; Science<br><strong>Type</strong>: Journal<br><strong>DOI / URL</strong>: <a href="https://doi.org/10.12962/j20882033.v32i3.13005" target="_blank" rel="noreferrer noopener">https://doi.org/10.12962/j20882033.v32i3.13005</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Abstract</strong></h2>



<p>Software requirements specification (SRS) is an essential part of software development. SRS has two features: functional requirements (FR) and non-functional requirements (NFR). Functional requirements define the needs that are directly in contact with stakeholders. Non-functional requirements describe how the software provides the means to carry out functional requirements. Non-functional requirements are often mixed with functional requirements. This study compares four primarily used machine learning methods for classifying functional and nonfunctional requirements. The contribution of our research is to use the PROMISE and SecReq (ePurse) dataset, then classify them by comparing the FastText+SVM, FastText+CNN, SVM, and CNN classification methods. CNN outperformed other methods on both datasets. The accuracy obtained by CNN on the PROMISE dataset is 99% and on the Seqreq dataset is 94%.</p>



<p><strong>Keywords</strong>: CNN; FastText; Requirements Classification; Software Requirements; SVM</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading"><strong>Citation</strong></h2>



<p>Haque MA, Rahman MA, Siddik MS. Non-Functional Requirements Classification with Feature Extraction and Machine Learning: An Empirical Study. In: 1st International Conference on Advances in Science, Engineering and Robotics Technology 2019 (ICASERT 2019) IEEE; 2019. p. 1–5.</p>



<p>Hakim L, Rochimah S, Fatichah C. Evaluasi kombinasi hipernin dan sinonim untuk klasifikasi kebutuhan non-functional berbasis ISO/IEC 25010. Jurnal Teknologi Informasi dan Ilmu Komputer 2019 10;6:491–500.</p>



<p>Gu Y, Zhang S, Qiu L, Wang Z, Zhang L. A layered KNN-SVM approach to predict missing values of functional requirements in product customization. Applied Sciences 2021 3;11:2420.</p>



<p>Osman MH, Zaharin MF. Ambiguous Software Requirement Specification Detection: An Automated Approach. In: Proceedings &#8211; International Conference on Software Engineering IEEE Computer Society; 2018. p. 33–40.</p>



<p>Vanicek J. Software quality requirements. Agric Econ 2008;52:177–185.</p>



<p>Supriyono S. Penerapan ISO 9126 dalam pengujian kualitas perangkat lunak pada E-book. MATICS 2019 10;11:9.</p>



<p>Shreda QA, Hanani AA. Identifying non-functional requirements from unconstrained documents using natural language processing and machine learning approaches. IEEE Access 2021;4:1–22.</p>



<p>Solomin AA, Ivanova Bolotova YA. Modern approaches to multiclass intent classification based on pre-trained transformers. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2020;4(1):532–538.</p>



<p>Li LF, Jin-An NC, Kasirun ZM, Piaw CY. An empirical comparison of machine learning algorithms for classification of software requirements. International Journal of Advanced Computer Science and Applications 2019;10(11):258–263.</p>



<p>Tóth L, Vidács L. Study of the performance of various classifiers in labeling non-functional requirements. Information Technology and Control 2019;48(3):432–445.</p>



<p>Abdel Qader A. A novel intelligent model for classifying and evaluating non-functional security requirements form scenarios. Indonesian Journal of Electrical Engineering and Computer Science 2019 sep;15(3):1578–1585.</p>



<p>Rago A, Marcos C, Diaz-Pace JA. Using semantic roles to improve text classification in the requirements domain. Language Resources and Evaluation 2018 sep;52(3):801–837.</p>



<p>Rahman MA, Haque MA, Tawhid MNA, Siddik MS. Classifying Non-Functional Requirements Using RNN Variants for Quality Software Development. In: MaLTeSQuE 2019 &#8211; Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, co-located with ESEC/FSE 2019 Association for Computing Machinery, Inc; 2019. p. 25–30.</p>



<p>Fahmi AA, Siahaan D. Algorithms comparison for non-requirements classification using the semantic feature of software requirement statements. IPTEK The Journal for Technology and Science 2021 1;31:343.</p>



<p>Tiun S, Mokhtar UA, Bakar SH, Saad S. Classification of Functional and Non-Functional Requirement in Software Requirement Using Word2vec and Fast Text. In: Journal of Physics: Conference Series, vol. 1529 Institute of Physics Publishing; 2020. p. 42077.</p>



<p>Rahimi N, Eassa F, Elrefaei L. An ensemble machine learning technique for functional requirement classification. Symmetry 2020 10;12:1–26.</p>



<p>Canedo ED, Mendes BC. Software requirements classification using machine learning algorithms. Entropy 2020 9;22:1–20.</p>



<p>Baker C, Deng L, Chakraborty S, Dehlinger J. Automatic Multi-Class Non-Functional Software Requirements Classification Using Neural Networks. In: Proceedings &#8211; International Computer Software and Applications Conference, vol. 2 IEEE Computer Society; 2019. p. 610–615.</p>



<p>Houmb SH, Islam S, Knauss E, Jurjens J, Schneider K. Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec. Requirements Eng 2020;15:63–93.</p>



<p>Dekhtyar A, Fong V. RE Data Challenge: Requirements Identification with Word2Vec and TensorFlow. In: Proceedings-2017 IEEE 25th International Requirements Engineering Conference, RE 2017 Institute of Electrical and Electronics Engineers Inc.; 2017. p. 484–489.</p>



<p>Hey T, Keim J, Koziolek A, Tichy WF. NoRBERT: Transfer Learning for Requirements Classification. In: in Proceedings of the IEEE International Conference on Requirements Engineering; 2020. p. 169–179.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Links</h3>



<ul class="wp-block-list">
<li>Publisher Page: <a href="https://iptek.its.ac.id/index.php/jts/article/view/13005" target="_blank" rel="noreferrer noopener">https://iptek.its.ac.id/index.php/jts/article/view/13005</a></li>



<li>Google Scholar: <a href="https://scholar.google.com/scholar?cluster=1908119983044836934" target="_blank" rel="noreferrer noopener">https://scholar.google.com/scholar?cluster=1908119983044836934</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
