Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) http://jurnal.iaii.or.id/index.php/RESTI <p>Jurnal RESTI is a blind peer-reviewed journal focused on publishing high-quality research in systems engineering, information technology, and related fields. The journal has been accredited by the National Journal Accreditation (ARJUNA) managed by the Ministry of Education, Culture, Research and Technology of the Republic of Indonesia. Jurnal RESTI currently holds a SINTA 2 rating for the period 2017-2021. This rating has been renewed for 2021-2026 based on Decree Number: 158/E/KPT/2021 from the Directorate General of Higher Education, Research, and Technology, issued on December 9, 2021. The SINTA rating and ARJUNA accreditation reflect Jurnal RESTI's commitment to meeting stringent criteria for journal management, quality of content, and contribution to scientific advancement.</p> en-US <p><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">Copyright in each article belongs to the author</span></span></span></p> <ol> <li class="show"><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">The author acknowledges that the RESTI Journal (System Engineering and Information Technology)&nbsp;is the first publisher to publish with a license</span></span></span> <em><span id="result_box" class="" lang="id"><a href="http://creativecommons.org/licenses/by/4.0/" target="_blank" rel="license noopener">Creative Commons Attribution 4.0 International License</a>.</span></em></li> <li class="show"><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the </span></span></span>RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;</li> </ol> ronalw@jurnal.iaii.or.id (Ronal Watrianthos) ritakomalasari.deita@gmail.com (Rita Komalasari) Fri, 07 Mar 2025 00:00:00 +0000 OJS 3.0.2.0 http://blogs.law.harvard.edu/tech/rss 60 Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance http://jurnal.iaii.or.id/index.php/RESTI/article/view/6332 <p><em>Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. This research focuses on detecting Bot-IoT activity using the Bot-IoT UNSW Canberra 2018 dataset. The dataset initially showed a significant imbalance, with 2,934,447 entries of attack activity and only 370 entries of normal activity. To address this imbalance, an innovative data aggregation technique was applied, effectively reducing similar patterns and trends. This approach resulted in a balanced dataset consisting of 8 attack activity points and 80 normal activity points. Feature selection using the ANOVA method identified 10 key features from a total of 17: seq, stddev, N_IN_Conn_P_SrcIP, min, state_number, mean, N_IN_Conn_P_DstIP, drate, srate, and max. The classification process utilized Random Forest, k-NN, Naïve Bayes, and Decision Tree algorithms, with 100 iterations and an 80:20 training-testing split. Random Forest showed superior performance, achieving 97.5% accuracy, 97.4% precision, and 97.4% recall, with a total computation time of 11.54 seconds. Pearson correlation analysis revealed a strong positive correlation (+0.937) between N_IN_Conn_P_DstIP and seq, as well as a weak negative correlation (-0.224) between N_IN_Conn_P_SrcIP and state_number. The novelty of this research lies in the application of a data aggregation technique to address class imbalance, significantly improving machine learning model performance and optimizing training time. These findings contribute to the development of robust cybersecurity systems to effectively detect IoT-related threats</em><em>.</em></p> Firgiawan Faira, Dandy Pramana Hostiadi Copyright (c) 2025 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) https://creativecommons.org/licenses/by/4.0 http://jurnal.iaii.or.id/index.php/RESTI/article/view/6332 Tue, 22 Apr 2025 08:05:13 +0000 Combining the Cellular Automata and Marching Square to Generate Maps http://jurnal.iaii.or.id/index.php/RESTI/article/view/6241 <p class="RESTI-Abstract"><em><span lang="EN-US">As computer technology advances, one of the entertainment media that has emerged is video games. The development of a video game is becoming more expensive and labor-intensive as technology itself continues to grow. One of the characteristics of a game as an entertainment medium is its replay value, which refers to the fact that the subject matter can be played more than once. Automating content through the use of procedural content generation is done with the goal of lowering expenses and reducing the amount of labour that is required. This research has two goals: designing and developing a Maze Game using the Procedural Content Generation method with the Cellular Automata and Marching Square algorithms, and determining the level of player satisfaction with the games developed using the Game User Experience Satisfaction Scale (GUESS) method. This research will utilize Cellular Automata and the Marching Square algorithm as a method for generating 3D game shapes through Procedural Content Generation. After the game has been developed, it will be performed by players, and the Game User Experience Satisfaction Scale will be used to measure the user experience. The result for overall satisfaction, based on the responses of 25 respondents, is 83.14%. Cellular Automata was effectively implemented to generate the map, while Marching Square was used to generate the 3D mesh, albeit with isolated rooms and graphical errors.</span></em></p> Viore, Wirawan Istiono Copyright (c) 2025 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) https://creativecommons.org/licenses/by/4.0 http://jurnal.iaii.or.id/index.php/RESTI/article/view/6241 Sun, 20 Apr 2025 14:36:57 +0000 Efficient Hybrid Network with Prompt Learning for Multi-Degradation Image Restoration http://jurnal.iaii.or.id/index.php/RESTI/article/view/6381 <p><em>Image restoration aims to repair degraded images. Traditional image restoration methods have limited generalization capabilities due to the difficulty in dealing with different types and levels of degradation. On the other hand, contemporary research has focused on multi-degradation image restoration by developing unified networks capable of handling various types of degradation. One promising approach is using prompts to provide additional information on the type of input images and the extent of degradation. Nonetheless, all-in-one image restoration requires a high computational cost, making it challenging to implement on resource-constrained devices. This research proposes a multi-degradation image restoration model based on PromptIR with lower computational cost and complexity. The proposed model is trained and tested on various datasets yet it is still practical for deraining, dehazing, and denoising tasks. By unification convolution, transformer, and dynamic prompt operations, the proposed model successfully reduces FLOPs by 32.07% and the number of parameters by 27.87%, with a comparable restoration result and an SSIM of 34.15 compared to 34.33 achieved by the original architecture for the denoising task.</em></p> Muhammad Yusuf Kardawi, Laksmita Rahadianti Copyright (c) 2025 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) https://creativecommons.org/licenses/by/4.0 http://jurnal.iaii.or.id/index.php/RESTI/article/view/6381 Sun, 20 Apr 2025 12:14:06 +0000 Enhanced Heart Disease Diagnosis Using Machine Learning Algorithms: A Comparison of Feature Selection http://jurnal.iaii.or.id/index.php/RESTI/article/view/6175 <p><em>Heart disease or cardiovascular disease is one of the leading causes of death in the world. Based on WHO data, in 2019, as many as 17.9 million people died from cardiovascular disease. If early prevention is not carried out immediately, of course, the victims will increase every year. Therefore, with the increasingly rapid development of technology, especially in the health sector, it is hoped that it can help medical personnel in treating patients suffering from various diseases, especially heart disease. So in this study, it will be more focused on the selection of relevant features or attributes to increase the accuracy value of the Machine Learning algorithm. The algorithms used include Random Forest and SVM. Meanwhile, for feature selection, several feature selection techniques are used, including information gain (IG), Chi-square (Chi2) and correlation feature selection (CFS). The use of these three techniques aims to obtain the main features so that they can minimize irrelevant features that can slow down the machine process. Based on the results of the experiment with a comparison of 70:30, it shows that CFS-SVM is superior by using nine features, which obtain the highest accuracy of 92.19%, while CFS-RF obtains the best value with eight features of 91.88%. By using feature selection and hyperparameter techniques, SVM obtained an increase of 10.88%, and RF obtained an increase of 9.47%. Based on the performance of the model using the selected relevant features, it shows that the proposed CFS-SVM shows good and efficient performance in diagnosing heart disease.</em></p> Hirmayanti, Ema Utami Copyright (c) 2025 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) https://creativecommons.org/licenses/by/4.0 http://jurnal.iaii.or.id/index.php/RESTI/article/view/6175 Sat, 19 Apr 2025 16:57:17 +0000 Securing Electronic Medical Documents Using AES and LZMA http://jurnal.iaii.or.id/index.php/RESTI/article/view/6260 <p><em>With increasing threats in cyberspace, maintaining the integrity of electronic medical data is crucial. This study aims to develop a method that integrates encryption using Advanced Encryption Standard (AES) and compression with the Lempel-Ziv-Markov Algorithm (LZMA) to protect DICOM files containing sensitive information. This method is designed to address two main challenges: the growth of file sizes after the encryption process and the efficiency in data storage. In this study, an experimental design with random sampling was applied, testing 427 DICOM files from open libraries ranging in size from 513.06 KB to 513.39 KB to evaluate the implementation of this method in reducing file size, encryption time, and maintaining data integrity. The results show that this method is able to reduce file size by between 40-50% with an average encryption time of about 0.2-0.3 seconds per file. In addition, the data remains intact before and after the encryption process, which indicates that the integrity of the data is well maintained. Further analysis revealed that CPU usage during the encryption process reached 94.05%, while memory usage was recorded at 92.95 KB. In contrast, in the decryption process, CPU usage decreased to 78.16% with a much lower memory consumption, which was 31.07 KB. The findings have significant implications for medical information systems, allowing developers to easily implement these methods through APIs. This research is expected to be a reference for future studies that focus on data security in health information systems and provide new insights into the combination of encryption and compression in the context of medical data.</em></p> Toto Raharjo, Yudi Prayudi Copyright (c) 2025 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) https://creativecommons.org/licenses/by/4.0 http://jurnal.iaii.or.id/index.php/RESTI/article/view/6260 Sat, 19 Apr 2025 16:39:37 +0000