Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)

Plant Nutrition Monitoring System for Water Spinach Based on Internet of Things Alviana, Sopian; Dwi Nugraha, Rizki; Kurniawan, Bobi
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 5 No. 2 (2024): INJIISCOM: VOLUME 5, ISSUE 2, DECEMBER 2024
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v5i2.12705

Abstract

The concept of plants using a hydroponic system has been widely used. Currently, the weakness in the management of the hydroponic system is the difficulty in managing the nutritional needs of plants. Nutrition is the main requirement for plants with the concept of a hydroponic system. In this research, a system will be proposed that can monitor the nutritional needs of hydroponic plants with a concentration of water spinach plants. The use of internet of things technology is proposed to be able to monitor in real time. With the existence of a monitoring system in real time, it can make it easier to monitor and control the nutritional needs of kangkong plants using a smartphone.
Bibliometric Analysis using Vos Viewer with Publish or Perish of Intelligent Tutoring System in Private Universities Kurniawan, Bobi; Meyliana, M; Leslie Hendric Spits Warnars, Harco; Suharjo, Bambang; Ahiase, Godwin
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 5 No. 2 (2024): INJIISCOM: VOLUME 5, ISSUE 2, DECEMBER 2024
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v5i2.12732

Abstract

The objective of this study is to analyze the development of intelligent tutoring systems in private universities. We conducted the analysis using bibliometric methods, utilizing the Publish or Perish and VOSviewer applications. Data was obtained by using the publish or perish application with the keyword "intelligent tutoring system in private university" from the Google Scholar database from 2019 to 2024. According to search results, the number of research papers has decreased from 117 to 23 from 2020 to 2024. Mapping using VOSviewer application produces three types of visualization, namely network, overlay, and density visualization. In its conclusion, this research notes a decrease in the number of studies discussing in private universities since 2020, but still shows great potential for development by other researchers.
Implementation of Local Binary Pattern Histogram for Automatic Locker System Rahajoeningroem, Tri; Utama, Jana; Kurniawan, Bobi; Hartono, Rodi; Imtyramdhan, Afra Haniv; Aulia, Suci
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 7 No. 1 (2026): INJIISCOM: VOLUME 7, ISSUE 1, JUNE 2026 (ONLINE FIRST)
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research presents the design and evaluation of an automatic locker system employing Local Binary Pattern Histogram (LBPH)-based facial recognition for secure, keyless access control. The system integrates a Logitech C270 webcam, Arduino Uno microcontroller, relay module, and solenoid door lock, with processing performed via a laptop interface. Performance was assessed through two protocols: a single-user variability test under different facial accessories, achieving a 66.7% recognition rate, and a multi-user discrimination test, which yielded 50% accuracy across diverse facial profiles. Results indicate LBPH’s robustness against moderate occlusions but notable decline with heavy facial coverage such as helmets and masks. These findings highlight the critical role of facial visibility in biometric reliability and offer practical insights for implementing facial recognition systems in real-world security applications