cover
Contact Name
Dodi Siregar
Contact Email
dodi.729ar@gmail.com
Phone
+6281361223297
Journal Mail Official
dodi.729ar@gmail.com
Editorial Address
Jl. Sisingamangaraja No. 338 Simpang Limun, Medan-20219
Location
Kota medan,
Sumatera utara
INDONESIA
EXPLORER
ISSN : -     EISSN : 27744647     DOI : https://doi.org/10.47065/explorer.v2i1.148
Core Subject : Science,
EXPLORER Journal of Computer Science and Information Technology is a scientific journal published by the FKPT (Forum Kerjasama Pendidikan Tinggi). This journal contains scientific papers from Academics, Researchers, and Practitioners about research on Computer Science and Information Technology. EXPLORER Journal of Computer Science and Information Technology is published twice a year in January and July. The paper is an original script and has a research base on Computer Science and Information Technology. The scope of the paper includes several studies but is not limited to the study Artificial Intelligence, Computer Graphics and Animation, Image Processing, Cryptography, Computer Network Security, Modelling and Simulation, Multimedia, Computer Architecture Design, Computer Vision and Robotics, Parallel and Distributed Computing, Operating System, Information System, Mobile Computing, Natural Language Processing, Data Mining, Machine Learning, Expert System and Geographical Information System. Thus, we invite Academics, Researchers, and Practitioners to participate in submitting their work to this journal.
Articles 5 Documents
Search results for , issue "Vol 4 No 1 (2024): January 2024" : 5 Documents clear
Rancang Bangun Sistem Absensi Berbasis Website di SMK Muhammadiyah 3 Dolopo Karaman, Jamilah; Gunawan, Putri Miya; Firdhossiah, Shailatul; Fitriani, Lely Mustikasari Mahardhika; Sucipto, Sucipto; Indriati, Rini
Explorer Vol 4 No 1 (2024): January 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v4i1.818

Abstract

Attendance is an important part of collecting attendance data at an event. The data serves as a tool for evaluation, accountability, and event development. SMK Muhammadiyah 3 Dolopo, a vocational high school in Madiun Regency, East Java, is one of the educational institutions that requires a good attendance system. The school aims to excel in the field of technology and information. To achieve this goal, improving the quality of learning and service to students, including in terms of absenteeism, is needed. Currently, SMK Muhammadiyah 3 Dolopo still uses a manual attendance system which has several disadvantages, such as time-consuming, error-prone, easy to fake, difficult to archive, and less flexible. The use of attendance system can be done quickly and accurately, anywhere and anytime. The use of the Attendance Information System is an effective solution in monitoring and managing student attendance accurately and efficiently. Research shows that this system helps maximize learning time by ensuring timely student attendance. The results showed that the adoption of this technology has the potential to improve the overall quality and effectiveness of learning
Analisis Existing Convolutional Neural Network Untuk Klasifikasi Usia Pengunjung Rumah Sakit: Studi Kasus Pemantauan Anak dan Dewasa Harahap, Herlina; Rahman, Sayuti; Zen, Muhammad; Suriati, Suriati
Explorer Vol 4 No 1 (2024): January 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v4i1.881

Abstract

The purpose of this study is to examine the Convolutional Neural Network (CNN) model for classifying the age groups of hospital visits, both children and adults. Hospitals serve as treatment facilities for a variety of ailments caused by viruses, germs, car accidents, and other factors. Children are not permitted to visit the hospital due to hurdles to patient comfort as well as hazards associated with immunity and trauma to children. As a result, a digital strategy is required to monitor the presence of youngsters in the hospital setting. The notion of computer vision and the Convolutional Neural Network (CNN) are employed in this study to attain this goal. The dataset utilized is All-Age-Faces (AAF), which includes photos of human faces ranging in age from 2 to 80 years. To categorize visitors into children or adults, two CNN architectures, ResNet and SqueezeNet, are used with fine-tuning (FT) and full retraining (FR) approaches. The accuracy of FR-ResNet was 97.22%, beating the accuracy of the previous research FT-SqueezeNet, which was 93.09%, better to 4.13%. This study confirmed that the use of CNN, namely the FR-ResNet technique, was effective in accurately categorizing the age of hospital visits. Controlling children's access to hospital areas can help reduce the danger of illness transmission.
Proteksi Keamanan Data dengan Menerapkan Algoritma Bacon Cipher dan ROT128 Rahmatsyah, Indra; Siregar, Yunita Sari; Khairunnisa, Khairunnisa
Explorer Vol 4 No 1 (2024): January 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v4i1.1099

Abstract

The data storage and information exchange activities digitally have risks and of course must be accompanied by information security. Various ways are done to protect data such as hiding data with steganography techniques or by encoding data with cryptographic techniques. If in general the steganography technique is done by inserting data into image, audio or video media, but in this study the data will be inserted or hidden into a text file as a media (cover message) to hide the data. While data security with cryptographic techniques is done by changing the data to be kept secret (plaintext) into encoded data (ciphertext) so that the data cannot be understood by people who do not have legality in the data. Therefore, with this method of securing research files, it produces a test of blackbox testing of encryption and description and extraction. Where is the result of the encryption on the encrypted text file using the ROT128 algorithm with a time of 1.82ms and where is the result of the description on the text file producing a decrypted text file using the ROT128 algorithm with a time of 1.47ms. After carrying out the extraction process on the resulting text file description using the Bacon Cipher algorithm, it will produce the original text with a time of 13.95ms
Perbandingan Metode AHP dan ANP Pemilihan Presiden Tahun 2024 Generasi Milenial Politeknik Negeri Cilacap Syafirullah, Lutfi; Maharrani, Ratih Hafsarah; Bahroni, Isa; Vikasari, Cahya
Explorer Vol 4 No 1 (2024): January 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v4i1.1151

Abstract

The Presidential Election is one of the key elements in democracy which is regulated by the 1945 Constitution of the Republic of Indonesia (UUD 1945). General elections (elections) in Indonesia are held every five years, and the people have the right to vote to elect a presidential candidate who they consider worthy of leading the country during the next term of office. The Presidential election process involves various stages, including nomination by political parties or individuals, political campaigns, debates between candidates, and the voting or election stage. The presidential election (presidential election) is held simultaneously with the legislative election. It is important to note that elections are the foundation for democratic governance, ensuring the active participation of the people in determining the direction and leadership of the country. The Presidential Election in Indonesia is a manifestation of the implementation of democratic principles in the country's political system. The AHP (Analytic Hierarchy Process) method and the ANP (Analytic Network Process) method are methods that can be used in making decisions. A method developed by mathematician Thomas L. Saaty to help solve very complex problems by breaking down various decisions into several smaller criteria. The AHP and ANP methods can overcome assessments based on subjective viewpoints and personal preferences, and transform them into weights with consistent and rational values. Super Decisions is a tool developed specifically to support AHP and ANP calculation applications. Super Decisions provides useful tools in analyzing and processing comparison tables, performing consistency calculations, and assisting in AHP and ANP based decision making.
Pemodelan Proses Bisnis Sistem Marketplace Penjualan Kebutuhan Ormas Dan Partai Berbasis Website Telaumbanua, Kristian; Damanik, Florida; Suparnap, Erlanie; Sembiring, Afen Prana
Explorer Vol 4 No 1 (2024): January 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v4i1.1183

Abstract

Indonesian marketplaces have grown rapidly in recent years, especially since 2009 when many types of marketplace applications emerged. With the advancement of technology and easy access to the Internet, some consumers who previously never shopped online are now interested in switching to a digital shopping environment to fulfill their needs. However, there are obstacles for sellers in selling the needs of mass organizations and parties such as sellers only selling at the workplace, promotions are still based on references from buyers who buy in stores, so that sales figures are often not maximized. Therefore, an analysis and design of a website-based marketplace application for selling the needs of mass organizations and parties that can meet the sales needs of parties and mass organizations. This research uses the SDLC (System Development Life Cycle) waterfall method to design a system that produces a design of a marketplace application for selling the needs of mass organizations and parties that can facilitate buyers in making product order transactions and facilitate sellers in selling the needs of mass organizations and parties. This design is expected to be a reference to be developed into an application that can be implemented.

Page 1 of 1 | Total Record : 5