cover
Contact Name
Ramdan Satra
Contact Email
Ramdan Satra
Phone
-
Journal Mail Official
ramdan@umi.ac.id
Editorial Address
-
Location
Kota makassar,
Sulawesi selatan
INDONESIA
ILKOM Jurnal Ilmiah
ISSN : 20871716     EISSN : 25487779     DOI : -
Core Subject : Science,
ILKOM Jurnal Ilmiah is an Indonesian scientific journal published by the Department of Information Technology, Faculty of Computer Science, Universitas Muslim Indonesia. ILKOM Jurnal Ilmiah covers all aspects of the latest outstanding research and developments in the field of Computer science, including Artificial intelligence, Computer architecture and engineering, Computer performance analysis, Computer graphics and visualization, Computer security and cryptography, Computational science, Computer networks, Concurrent, parallel and distributed systems, Databases, Human-computer interaction, Embedded system, and Software engineering.
Arjuna Subject : -
Articles 18 Documents
Search results for , issue "Vol 13, No 1 (2021)" : 18 Documents clear
Steganographic Techniques using Modified Least Significant Bit and Modification Reshape Transposition Methods Barovih, Guntoro; Tangguh Admojo, Fadhila; Hersaputra, Yoda
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done is 90,180,270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside.
Application of Knowledge Management System for Cattle Cultivation Kusnadi, Edi; Yanitasari, Yessy; Supriyadi, Supriyadi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cow are family animal bovinae and subfamily bovidae. Cow are raise for use in meat and milk. Beef production does not fullfill National beef demand. This is influenced by several factors, one of them is the cultivation pattern. But knowledge about cultivation is still scattered and unstructured. Knowledge Management System (KMS) offer a knowledge system that can be used to create, collect, store, maintain and disseminate knowledge. In this study KMS has been applied to cattle farming with the Knowledge Management System Life Cycle (KMSLC) method. The outcome of the research is a web based application regarding the management of cattle farming that have been tested by experts and users with an average test results stated good. The features of this KMS application are knowledge capture, knowledge sharing and knowledge application system, so they can share knowledge between one user and another. In addition, this application is equipped with a discussion forum that serves as a place to interact between fellow users or with experts.
Motion Detection of Objects in Home Security Systems Using Binary-Image Comparison Method Based on Robot Operating System 2 and Raspberry Pi Jalil, Abdul; Matalangi, Matalangi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The purpose of this study to build a home security system based on object motion detection using Robot Operating System 2 (ROS2) and Raspberry Pi. ROS2 function in this study as a software that used to read and process the camera data then control the buzzer sound, while the Raspberry Pi hardware function to running the ROS2 on the top of Linux Ubuntu 18.04 operating system. Camera function to read the image and video data can be developing for input device to control the home security systems based on the object motion detection. The method has used to detect the object motion is Binary-Image Comparison (BIC), where this method worked by compare the value of the binary image object with the binary master to use it as a decision-making algorithm when the camera detecting the object movement based on object color. Object colors detected in this study are red, yellow, green, and blue. Each object colors are processes using OpenCV library in the ROS2 node service, after that all of the nodes will communicate through topics to communicating and exchanging the message data. This study result is the prototype has developed can give a buzzer sound warning to the user when the camera detecting the object motion based on the object's color.
Evaluation of Lambung Mangkurat University Student Academic Portal Using User Experience Questionnaires (UEQ) Sari, Yuslena; Novitasari, Novitasari; Pratiwi, Hani
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The student academic portal is one of the Academic Information Systems at Lambung Mangkurat University. The student academic portal can only be accessed by Lambung Mangkurat University students and can be used for academic guidance, managing student study plans, printing exam cards, filling out questionnaires, and viewing exam results (assessments). However, since its release in 2016, there has been no publication regarding evaluations on the website-based student academic portal. Evaluation is one of the stages in the Software Development Life Cycle (SDLC), this stage allows the user to provide an assessment of the system. This study aims to evaluate the student academic portal. Evaluation is carried out to determine user ratings of the existing system. The evaluation method used is the User Experience Questionnaire (UEQ). With this method, users can assess the ULM Student Academic Portal from various aspects, namely aspects of Novelty, Stimulation, Dependability, Efficiency, Perspicuity, and Attractiveness. The results of this study indicate that the Perspicuity aspect gets a high score while Novelty gets a low score.
Compute Function Analysis Utilizing IAAS Private Cloud Computing Service Model in Packstack Development Suriansyah, Mohamad Iqbal; Mulyana, Iyan; Sanger, Junaidy Budi; Winata, Sandi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Development of packstack for compute function analysis with IAAS service  Analysis of computational functions by utilizing the IAAS model for private cloud computing services in Packstack is one of the large-scale data storage solutions. Problems that often occur when implementing various applications are server resource requirements, monitoring processes that are less than optimal, offering that is limited in time when building servers, and when upgrading hardware devices will have an impact on server downtime that quite long. The development of private cloud computing technology can be one solution to the problem in question. This study utilizes Openstack and Packstack by applying a single node server controller with 2 compute server nodes. Administration server with IAAS service approach and self-service. The scalability testing is simple and more time-efficient. Change the size of the virtual server (instance) developed in a more optimal running condition for measuring overhead values in private cloud computing with a downtime of 16 seconds.
Clustering of the Potential of Customers' Internet Bandwidth Upgrade on FTTH Broadband Arnomo, Sasa Ani; Yulia, Yulia
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Increasing customer bandwidth needs to be considered by companies by determining potential customers. Potential determination is needed because previously it was only done randomly. Therefore, first determining the potential is needed by grouping customers who have the same characteristics based on the data and attributes they have. This research will implement data mining technique with clustering method with K-means algorithm on 263 FTTH Broadband customer groups. Then the potency can be determined based on the final centroid point in the grouping. The results obtained are divided into 5 clusters consisting of 34 customers or 12.92% of the total potential customers, 29 customers or 11.02% of the total potential customers, 56 customers or 21.30% of the total potential customers, 54 customers. or 20.53% of the total fewer potential customers and 90 customers or 34.22% of the total non-potential customers. Comparison of the validity of the Davies-Bouldin Index cluster for 5 groups between K-Means and K-Medoids, the value of 0.538 for K-Means and 0.819 for K-Medoids is obtained. This method is used to streamline the distribution of bandwidth.
Fuzzy Logic Algorithm and Analytic Network Process (ANP) for Boarding House Search Recommendations Gunawan, Wawan
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The process of finding a boarding house is usually done manually or by visiting the boarding house one by one. Several choices of boarding houses make boarding house seekers have to make choices according to the desired criteria, so it takes quite a long time. A decision support system is a system that can be used to help make decisions based on existing criteria in determining several alternatives to be selected. The method used in this research is the Analytic Network Process (ANP) and Fuzzy Logic method. This study uses several criteria in providing recommendations including distance, price, facilities, security, number of spaces, parking space and comfort. The weighting of these criteria uses the fuzzy logic method based on the priority scale determined by the boarding house finder. This system will provide a recommendation order for boarding houses based on the results of the calculation process using the ANP method and weighting using fuzzy logic. a value of 6.52%.
Development of the Forensic Storage Framework using the Composite Logic method Rachman, Helmi; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of information technology users, it is possible that crimes that take advantage of information technology continue to develop both directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern, so the need for handling digital evidence is very important. Therefore, a storage forensic framework is needed for handling digital evidence. This framework is designed by applying the Composite Logic method. The Composie Logic method is applied to determine the role model of each variable or initial pattern of the stages that you want to collaborate with. Composite Logic produces a role model who has a role to produce patterns so that they achieve the same goal. The logic composite method collaborates with existing frameworks for handling hdd, ssd, vmware and cloud which are then combined into a foreign storage framework. Based on the results of the tests carried out, this research has produced a new framework called the storage forensic framework. The advantage of this storage forensic framework compared to several other frameworks is that it is far required that it can be used to generate digital evidence in four storage, namely, SSD, HDD, VmWare, and cloud. This framework produces four main stages, namely preparation, collection, analysis and reports.
Comparison of K-Means and K-Medoids Algorithms for Clustering the Spread of the COVID-19 Outbreak in Indonesia Utomo, Wargijono
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The spread of Corono Virus 19 is very fast through effective human-to-human transmission through close contact and respiratory droplets such as coughing or sneezing. Various studies have been conducted to deal with COVID 19, but until now it has not been found how to stop the spread of this virus. Based on data obtained from the covid19.go.id page accessed on January 1, 2021 which was updated by the Ministry of Health, the overall number of confirmed cases was 1,078,314 active cases reaching 175,095 or 16.2% of confirmed cases, recovered 873,221 or 81.0% of cases confirmed, died 29,998 or 2.8% of the confirmed cases. In this study, comparing the two algorithms in the dataset which aims to analyze grouping patterns and determine the best method of data processing. The data used comes from the Ministry of Health, there are 4 attributes including confirmed cases, treatment, recovery and death, in this study only 2 attributes are used, namely confirmed cases and death.  From the results of data analysis and processing through a comparison between the K-Means method and the K-Medoids for grouping the spread of the corona 19 virus in Indonesia, with the Davies Boulden index value from the K2 to K9 values, it turns out that the K-Means method gets the smallest value at the K-value. 5 is 0.064, while K-Medoids at the k-2 value is 0.411. Thus, from the two methods used, it can be found that the best method for clustering the spread of the corona 19 virus outbreak in Indonesia is the K-Means method.
Fuzzy logic algorithm and analytic network process (ANP) for boarding houses searching recommendations Wawan Gunawan
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i1.750.18-30

Abstract

Finding a boarding house is usually done manually or by visiting the boarding house in person. Several choices of boarding houses make boarding house seekers have to make choices according to the desired criteria, so it takes quite a long time. A decision support system is a system that can be used to help make decisions based on existing criteria for determining several alternatives to be selected. The methods used in this research are the Analytic Network Process (ANP) and the Fuzzy Logic method. This study employed several criteria in providing recommendations, including distance, price, facilities, security, number of spaces, parking space and convenience. The weighting of these criteria used the fuzzy logic method based on the priority scale determined by the boarding house seekers. This system has provided a recommendation for boarding houses based on the results of the calculation process using the ANP method and weighting using fuzzy logic. The result of calculations shows that the highest value was obtained by Munawar kos (boarding house) with a value of 6.55% and followed by Diding kos with a value of 6.52%.

Page 1 of 2 | Total Record : 18