cover
Contact Name
I Wayan Agus Arimbawa
Contact Email
arimbawa@unram.ac.id
Phone
-
Journal Mail Official
jcosine@unram.ac.id
Editorial Address
-
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Journal of Computer Science and Informatics Engineering (J-Cosine)
Published by Universitas Mataram
ISSN : 25408895     EISSN : 25410806     DOI : -
Core Subject : Science,
Journal of Computer Science and Informatics Engineering (J-Cosine) is a journal that is published by Informatics Engineering Dept., Faculty of Engineering, University of Mataram (Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram) under online and print ISSN: 2541-0806 and 2540-8895, respectively J-Cosine is also blind and peer-reviewed journal, which the reviewer processes are carried out by at least 2 reviewers who are decided by associate editor. The J-Cosine is published bi-annually.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 8 No 1 (2024): Juni 2024" : 10 Documents clear
Rancang Bangun Purwarupa Simulasi Sistem Keamanan Rumah Berbasis Internet of Things: Design and Implement of IOT-based Home Security Simulation Prototype Saputra, Muhammad Harpan Teguh; Arimbawa, I Wayan Agus; Wijaya, I Gede Pasek Suta
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.217

Abstract

The use of information technology has spread to all fields, for example in the field of security using the Internet of Things technology. One of the places that need to be given security is the home, so that in this study prototypes of home security systems using the Internet of Things have been made with the aim of providing information to homeowners in the event of infiltration through windows or doors, gas leaks and fires. The tools used are Arduino Mega 2560 as a microcontroller, gas sensor, fire sensor, magnetic switch sensor, RFID, keypad, and selenoid. The home security system is made so that homeowners can control the condition of the home. The results of this study are that the home security systems that are made can run well and can be integrated with home security information systems. Sensors can detect gas leaks, fires, and doors or windows open when the security system is active. Homeowners can only turn off the home security system and unlock the door by using RFID tags that have registered IDs and correct passwords. Home security systems can also turn on alarms and send notifications to homeowners, fire stations and police stations in the event of a fire, gas leak or window or door that is opened when the security system is active.
Adaptive Classroom Berbasis IoT, Manajemen Penggunaan Air Conditioner Secara Otomatis: Adaptive Classroom Based of IoT, Automatic Usage Management of Air Conditioner Muhamad Pahrurrozi; I Gde Putu Wirarama Wedashwara W; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.331

Abstract

Temperature and humidity are one of the comfort factors. According to the SNI standard, the comfortable temperature range is at 20.5°C-27.1°C. If the temperature is above 27.1°C, an Air Conditioner (AC) is needed to get the effective thermal comfort. AC installed in each PSTI FT UNRAM classroom is operated manually. This research implements Internet of Things (IoT) for automatic AC usage management. This IoT device is made using PIR sensor and DHT22 sensor, the MQTT protocol for data communication between the IoT device and the web system. Based on the testing scenario for the classroom containing students and the empty classroom that has been done, the IoT device is able to manage the AC usage automatically, so that the classroom can be called adaptive classroom. From the MOS testing that has been done, a value of 4.57 from a scale of 5, the system is feasible to use.
Rancang Bangun Sistem Informasi Pelaporan Penyelenggaraan Pemerintahan Daerah (SIPPDA) Provinsi Nusa Tenggara Barat Berbasis Website: Design and Development of a Website-Based Reporting Information System for the Implementation of Regional Government (SIPPDA) for West Nusa Tenggara Province Anisah Mutmainah; Nadiyasari Agitha; Royana Afwani
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.544

Abstract

The Government Office and Regional Development Agency (OTDA) have the main task of implementing regional autonomy by preparing the Regional Government Administration Report (LPPD). The preparation of LPPD for the NTB Province is still done manually, including the collection of data for each government affair and the calculation of government performance achievements found in various indicators, resulting in a lengthy data collection process for reporting. With the advancement of information technology, a solution can be provided to address the aforementioned issues by developing a web-based Local Government Administration Reporting Information System (SIPPDA) using the extreme programming development method. The system development is carried out using the Laravel framework. During the testing phase, unit testing is performed to verify the functionality of the system, and the results indicate that it runs smoothly without errors. User Acceptance Testing (UAT) is then conducted in three iterations with different numbers of respondents. In the first iteration, with 5 respondents, the acceptance rate is 73.71%. In the second iteration, with 8 respondents, the rate is 89.86%, and in the third iteration, with 5 respondents, the rate is 79.5%.
Klasifikasi Citra Lubang pada Permukaan Jalan Beraspal dengan Metode Convolutional Neural Networks (CNN): Image Classification of Potholes on Paved Road Surfaces with the Convolutional Neural Networks (CNN) Method Ni Nyoman Citariani Sumartha; I Gede Pasek Suta Wijaya; Fitri Bimantoro; Gibran Satya Nugraha
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.557

Abstract

A pothole is a bowl-shaped indentation in the road surface, less than 1 meter in diameter. The presence of potholes on the highway can endanger the safety of road users, so repairs need to be done as soon as possible. Images of potholed roads have high complexity, variations consisting of color contrast, hole size, presence of puddles or not, lighting when taking pictures, background and others. For this reason, an approach is needed that can classify images with a high degree of variation by extracting the important information contained in them. Judging from the potential success of using the Convolutional Neural Networks (CNN) approach in identifying images of potholes that will be reported for entry into the Public Works Service's road improvement record, the authors propose the idea of "Pothole Image Classification on Asphalt Road Surfaces with the Convolutional Neural Networks (CNN) Method”.
Rancang Bangun Sistem Informasi Baitulmal “Masjid Jalan Cahaya” Berbasis Website Menggunakan Metode Service Oriented Architecture (SOA): Website-Based Design Of Baitulmal Information System “Masjid Jalan Cahaya” Using Service Oriented Architecture (SOA) Method Sekarsari Bintang Solehah; Noor Alamsyah; Sri Endang Anjarwani
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.558

Abstract

Aside from being a center of worship, the mosque can also function as a place to carry out social muamalah worship. Based on the function, of course the mosque has an agenda or charity activities that are held at certain times. It is the same with the fundraising or crowdfunding system run by Baitulmal "Masjid Jalan Cahaya". In its application, the information distributed on social media has not been modified on one platform, there is overlap between program uploads with one another, this is of course an obstacle for donors to find out which mosque programs are running. To answer these needs, this research builds a website-based Baitulmal information system "Masjid Jalan Cahaya" using the Laravel framework which is expected to be a means for mosques to convey all information about costs or funds needed more broadly, quickly, safely, real-time and transparent. In its development, the Baitulmal information system "Masjid Jalan Cahaya" will be integrated with other mosque websites, such as mosque company profiles, Rumah Qur'an and Baitul muamalah mosques, so that continuous system development is needed that makes it easier for each field to carry out data transactions. Departing from this, this information system applies the Service Oriented Architecture (SOA) approach, where this approach develops software using services. In this study, 3 main services were obtained, namely Charity services, Reports, and Tags/Categories. As well as service users for admin, payment and management files which are additional to the baitulmal website. For scalability testing, the System Usability Testing method was used which obtained a result of 87% in the Best Imaginable category, indicating that this system has good quality to use..
Implementasi GNU Privacy Guard (GPG) Hybrid Encryption untuk Meningkatkan Keamanan Informasi pada Layanan Electronic Signature (E-Sign) Universitas Mataram Mardiansyah, Ahmad Zafrullah; Zubaidi, Ariyan; Jatmika, Andy Hidayat; Huwae, Raphael Bianco
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.593

Abstract

Electronic signatures have been widely used for administrative purposes since 2020, especially when activities from home are a priority. University of Mataram is one of the state universities that provides electronic signature facilities (E-Sign) for its academic community. The ease of using E-Sign has its own obstacles, one of which is in terms of security protection. Protection in the information security system has a role to take preventive action if the worst scenario occurs to the information system, such as unauthorized access by hackers. Naturally, each signature has been given information related to several things, namely who signed, when it was signed, information for signature purposes, and hash values that can be used to ensure the integrity of the data from the signature. When unauthorized access occurs, hackers can create an identity using the identity of a particular person. This makes E-Sign validation difficult and potentially misused. In this study, a scheme for securing user identity is proposed using GNU Privacy Guard (GPG) to encrypt E-Sign data. The encryption process is carried out with two layers of public-private key cryptography combined with the PGP Key Server.
Studi Pengembangan Sistem Pengenalan Individu Sapi Berbasis Biometrik Muzzle Menggunakan Model Mobilenetv2: Study on the Development of Cattle Individual Recognition System from Muzzle Images Based on MobileNetV2 Model Giri Wahyu Wiriasto; Misbahuddin; Rachman, A. Sjamjiar; Iqbal, Muhamad Syamsu; Budiman, Djul Fikry; Akbar, Lalu Ahmad Syamsul Irfan; Hartawan, Bagi; Wicaksono, Eko Prasetyo
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.594

Abstract

In general, in cattle farming, individual identification is often done using text numbers on the cattle's ears, which is considered efficient. However, field observations reveal limitations of this technique, particularly in terms of data redundancy and new registration validation. Sometimes, errors can occur when cattle identity numbers are exchanged between the farm and the livestock market. Therefore, an intelligent biometric identification system attached to each cattle, such as the pattern on the muzzle, similar to human fingerprints, is needed. In this study, we collected and published primary cattle muzzle data as a dataset in a cloud repository. We also implemented the use of muzzle image data with a convolutional neural network algorithm in TensorFlow as a step for further development. The recognition implementation using the MobileNetV2 architecture resulted in an 83% accuracy rate for 30 individual cattle classes out of a total of 210 primary dataset divided into training and testing data.
Metoda Kombinasi Modulasi Pergeseran Tingkat Lebar Pulsa dengan Variabel Frekuensi Pembawa Pada Inverter Model Jembatan: Combination Method Of Level Shift Pulse Width Modulation With Carrier Frequency Variables On A Bridge Model Inverter Wiryajati, I Ketut; I Nyoman Wahyu Satiawan; Ida Bagus Fery Citarsa; I Made Budi Suksmadana; Supriono
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.595

Abstract

Switching is very important in energy conversion systems. The conversion process requires a good and reliable method. This research identifies methods or techniques for pulse width modulation. This technique proposes a new model of modulation technique, namely by combining level shifted modulation techniques, and adjusting the frequency in such a way that it produces a signal that suits the inverter's needs. The inverter tested in this research is an inverter with a bridge model configuration. The proposed research and methods were verified using MATLAB and Simulink software. The results obtained are the ratio of total harmonic distortion (THD) are 25.07%, 76, 66% and 9.183%, respectively
Sentiment Analysis on the Impelementation of the 2024 Presidential Election on X Application Using Naive Bayes and Support Vector Machine (SVM) Methods Dewa, I Dewa Made Aditya Prasantasya; Ida Bagus Ketut Widiartha; Santi Ika Murpratiwi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.597

Abstract

This article discusses sentiment analysis of the 2024 Presidential Election through data collected from platform X, this research aims to identify and classify positive, negative, and neutral sentiments in X related to the election. This research uses scoring and textblob methods. Where the scoring method is the process of deeply analyzing sentiment and then giving the sentiment value of each data comment and accumulating it. While the textblob method is a tool used specifically for text processing that can provide sentiment for each comment. The results of the analysis provide in-depth understanding of the responses and views of the community manifested in digital space. Sentiment analysis can serve as a guide to understanding the dynamics of public opinion during the election process and its potential to influence public participation and trust in the democratic system. The practical implications of this research include the development of more effective political communication strategies based on an understanding of the sentiments that develop on X.
Analysis of Android Malware "Undangan Pernikahan.Apk" Using Static and Dynamic Methods Muhammad Syafa Asgani; Raphael Bianco Huwae; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.599

Abstract

This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and impact of the malware after installation on an Android device. The research shows that this malware covertly steals user credentials through several vulnerabilities. The "UndanganPernikahan" malware is a type of spyware disguised as a wedding invitation and runs in the background without the user's knowledge. To avoid similar malware infections, it is recommended to always update the system and applications, only download applications from trusted sources, and conduct digital security training.

Page 1 of 1 | Total Record : 10