cover
Contact Name
Sebastianus Adi Santoso Mola
Contact Email
adimola@staf.undana.ac.id
Phone
-
Journal Mail Official
jicon@undana.ac.id
Editorial Address
Program Studi Ilmu Komputer Universitas Nusa Cendana Jl. Adisucipto - Penfui - Kupang - NTT -Indonesia
Location
Kota kupang,
Nusa tenggara timur
INDONESIA
J-Icon : Jurnal Komputer dan Informatika
ISSN : 23377631     EISSN : 26544091     DOI : -
Core Subject : Science,
J-ICON : Jurnal Komputer dan Informatika focuses on the areas of computer sciences, artificial intelligence and expert systems, machine learning, information technology and computation, internet of things, mobile e-business, e-commerce, business intelligence, intelligent decision support systems, information systems, enterprise systems, management information systems and strategic information systems.
Articles 205 Documents
IDENTIFIKASI TELAPAK TANGAN MENGGUNAKAN METODE EKSTRAKSI CIRI PRINCIPAL COMPONENT ANALYSIS (PCA) DAN IDENTIFIKASI CIRI RESILIENT PROPAGATION Mellanie Lette; Adriana Fanggidae; Nelci D Rumlaklak
J-ICON : Jurnal Komputer dan Informatika Vol 4 No 1 (2016): Maret 2016
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v4i1.5199

Abstract

The palmprint recognation in this research was being held through several stages, which are image acquisition, preprocessing using histogram equalization,edge detection using sobel operation, feature extraction using Principal Componnent Analysis and face identification using Resilient Propagation. This research use Principal Componnent Analysis as its feature extraction method and Resilient Propagation as its recognition method. This research use 40 training data and 20 testing data wich are gained from PolyU. The final result of the research shows that accuration performance of system using Principal Componnent Analysis and Resilient Propagation by using error tolerance as 1,E-06 and neuron hidden output as 10 are giving best performation that is 65% can be recognized as compared with using the othe error tolerance , neuron output and neuron hidden .
APLIKASI PERHITUNGAN HARTA WARISAN BERDASARKAN HUKUM ISLAM Rahmadanilah Rahmadanilah; Yulianto T Polly; Adriana Fanggidae
J-ICON : Jurnal Komputer dan Informatika Vol 4 No 1 (2016): Maret 2016
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v4i1.5200

Abstract

Heritage is something that is inherited, such as property, reputation, etcetera. In the daily lives, legacy issues often trigger conflicts and raises a family relationship. The main cause is human greed, and beyond this the lack of knowledge of the relevant parties regarding the calculation of inheritance law. Many Muslims do not know the law and how the calculation is based on the Islamic law of inheritance. To overcome these problems then built an application to assist in the calculation of the legacy based on Islamic Law following that Islamic Law rules. This application produces the percentage and nomina which received by each heirs.
SISTEM INFORMASI GEOGRAFIS PEMETAAN LOKASI PUSKESMAS MENGGUNAKAN GOOGLE MAPS API DI KABUPATEN BADUNG I Wayan Widi Karsana; Gede Surya Mahendra
J-ICON : Jurnal Komputer dan Informatika Vol 9 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v9i2.5214

Abstract

The Badung Regency Government through the Health Office implements a comprehensive health service program for the community. Health service facilities and infrastructure for the community are continuously improved to meet public health services including the development of community health centers (puskemas). The Puskesmas in the Badung district stated that there are 13 units scattered in various areas. Several problems have arisen where the community cannot see the location of the nearest puskesmas if there is an emergency such as an accident. The solution is offered to overcome the problems that arise by designing and building a geographic information system for the location map of the health center using the Google Maps API for coordinating information on the location of the health center using a map from Google. The community is expected to be able to see the location of the closest puskesmas and to be able to get information about addresses and telephone numbers that can be contacted through the system. This Geographical Information System uses the waterfall model in system development from analysis, design, design, coding, implementation and system testing. The results of the design and implementation of the geographic information system for the location of the Badung district health center can help the community to see and find the location of the nearest puskesmas so that they can more quickly assist in handling in an emergency situation.
DETEKSI KEBERADAAN RAMBU PERINTAH DI JALAN MENGGUNAKAN EUCLIDEAN COLOR FILTERING Rizal Pebianto; Adriana Fanggidae; Yulianto Triwahyuadi Polly
J-ICON : Jurnal Komputer dan Informatika Vol 9 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v9i2.5217

Abstract

Command signs are one of the types of traffic signs that we often encounter when driving on the road and are used to express some commands while driving. A distinctive feature of command signs is that they have a blue background color. Driver negligence in paying attention to the presence of command signs on the road can result in accidents. There needs to be a system that can detect command signs on the road as a solution. The command sign detection process uses the Euclidean Color Filtering method to filter colors and BLOB to look for interconnected pixels. The RGB color center values ​​(10,110,200) and the radius range [90, 150] are used in the color filter stage with Euclidean Color Filtering. The system was tested on 150 images of primary data and 25 images of secondary data. Primary data collection was carried out in the morning, afternoon, and evening with a distance of 5–10 meters and 10–15 meters. The system's average accuracy of command sign detection in testing primary data is 90.67%, and secondary data is 76%, so the average accuracy of the whole system is 88.5%. System failure in detecting the presence of command signs on the road is due to insufficient or excessive lighting conditions, signs blocked by other objects, angles that are too tilted, and signs adjoining other things with the same color or close to the background color.
PERANCANGAN APLIKASI ”SIAPPARA” UNTUK PELAPORAN SETORAN E-RETRIBUSI PASAR KABUPATEN HUMBANG HASUNDUTAN Verawaty Situmorang; Yohanssen Pratama; Riyanthi Angrainy Sianturi; Arnaldo Marulitua Sinaga
J-ICON : Jurnal Komputer dan Informatika Vol 9 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v9i2.5256

Abstract

Market retribution are local retribution that payed for the use of market facilities provided by the district government to individuals or entities. The process of collecting, recording, and reporting market retribution currently in Humbang Hasundutan Regency is still not effective and efficient, so it requires information technology support to enable it to improve the quality of services that are transparent and accountable in the traditional markets of Humbang Hasundutan Regency. The applications that will be developed are mobile and web-based applications that allow the collection and recording process to be more effective and efficient as well as more transparent reporting. Through the “SIAPPARA” Application, it is hoped that the process of collecting retribution in several markets in Humbang Hasundutan Regency will be easier and more transparent.
Analisis Pengaruh Kualitas Layanan Terhadap Kepuasan Pengguna Aplikasi MyARS Menggunakan Metode Webqual 4.0 Arey DS; Rangga Sanjaya
J-ICON : Jurnal Komputer dan Informatika Vol 9 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v9i2.5273

Abstract

Submission of ongoing academic activities and information in the field of education can take advantage of information technology. One of the most important is to create an academic information system that can be accessed by students online. The MyARS application is an academic information system that provides lecture information for ARS University students. The MyARS application page can be accessed via the link https://myars.ars.ac.id/. The question related to this research is whether the quality of the MyARS application used has an impact on user satisfaction. This study focuses on user satisfaction with the webqual method which consists of three variables, namely usability, information quality, and interaction quality. The obtained data is processed using multiple linear regression analysis techniques using SPSS 16 software. the quality of information is 3,620 with a percentage level of 83.79%. This is also supported by the regression results which prove the quality of usability has a significant positive effect on customer satisfaction. The results of the information quality score of 4,051 with a percentage level of 83.35%. This is also supported by the regression results which prove the quality of information has a significant positive effect on customer satisfaction. While the results of the information quality score of 2,167 with a percentage level of 80.25% This is also supported by the regression results which prove that the quality of information has a significant positive effect on customer satisfaction
Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik Gever Imanuel Taopan; Meiton Boru; Adriana Fanggidae
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 1 (2022): Maret 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i1.5296

Abstract

The use of digital documents has been widely used in various groups, organizations or agencies. One of the digital documents that often used is the Portable Document Format (PDF). An algorithm needed to implemented in the software, so that it can secure these documents from parties who can harm. One of the algorithms that can be used is Elliptic Curve Cryptography (ECC). ECC has an advantage on the level of data security with a key not too long. Encryption carried out on a 16 Bytes PDF header using 7 ECC parameters, prime number, coefficient A, coefficient B, base point, secret key, public key and K. The prime numbers used are 67, 71, 151, 199, 229, and 239. Other parameters chosen randomly. Each prime number involved for encryption of 4 types of file size, 1KB-2MB, 2MB-4MB, 4MB-6MB, and more than 5MB, where each type of file size has 5 different files. There were 3 trials for each file, so there were 360 trials. The 360 trials, there were ±55.33% in the very low correlation class, ±34.72% in the low class, ±10% in the medium class and ±1.94% in the strong class. Overall the average correlation generated is 0.212282779. Therefore, the use of the ECC algorithm for encryption the header of PDF is quite good. In the encryption process there is also an increase in file size by 64 Bytes, but when decrypting the file size returns to its original size.
IMPLEMENTASI PENDETEKSIAN SPAM EMAIL MENGGUNAKAN METODE TEXT MINING DENGAN ALGORITMA NAÏVE BAYES DAN DECISION TREE J48 Rizka Safitri Lutfiyani; Niken Retnowati
J-ICON : Jurnal Komputer dan Informatika Vol 9 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v9i2.5304

Abstract

Email is quite popular as a digital communication media. This is because the message sending process via email is easy. Unfortunately, most messages in emails are spam emails. Spam is a message that the recipient of the message does not want because spam usually contains advertising messages or fraudulent messages. Ham is the message that the recipient wants. One way to sort these messages is to classify email messages into spam or Ham. Naïve Bayes and decision tree J48 are the algorithms that can be used to classify email messages. Therefore, this study aims to compare the effectiveness of the Naïve Bayes algorithm and decision tree J48 in sorting spam emails. The method used is text mining. Data containing the text of the email message in English will be processed before being classified with Naïve Bayes and decision tree J48. The pre-process stage includes tokenization, disposal of stop word lists, stemming, and attribute selection. Furthermore, Data text for email message will be processed using the Naïve Bayes algorithm and decision tree J48. The Naïve Bayes algorithm is a classification algorithm based on Bayesian Decision Theory, while the J48 decision tree algorithm is the development of the ID3 decision tree algorithm. The result of this research is that the decision tree J48 algorithm gets higher accuracy than the Naïve Bayes algorithm. The decision tree J48 algorithm has an accuracy of 93,117% while Naïve Bayes has an accuracy of 88,5284%. The conclusion of this study is that the decision tree J48 algorithm is superior to Naive Bayes for sorting spam emails when viewed from the level of accuracy of each algorithm.
Aplikasi Mikrotik Dasar Sebagai Pembatasan Bandwidth pada Warung Internet Teranet One di Prabumulih Rahmat Novrianda Dasmen; Kharisma Pangestu; Kevin Saputra
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 1 (2022): Maret 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i1.6270

Abstract

With the development of information technology, the need for the use of the internet is becoming increasingly important in helping daily life. Computer network support equipment is still very much needed. Currently the internet is not only needed to do office work but also to communicate, play games and do school work. Mikrotik has the most important task in building a computer network system. Mikrotik is a computer network hardware that can transmit data to the network. Mikrotik also acts as a liaison between many networks to transfer data from one network to another. Mikrotik is priced at a fairly high price and is still difficult to reach by the general public, so an operating system is formed, namely Mikrotik Router OS. Mikrotik Router OS is a solution for those who need a reliable router only with a personal computer (standalone) with the Mikrotik operating system. The internet cafe (warnet) of Teranet One is experiencing a bandwidth leak problem where users can access the internet without any bandwidth restrictions. Therefore, it takes a bandwidth limitation system using Mikrotik. With this bandwidth limitation system, bandwidth leaks can be overcome and the upload and download speeds of each user can be regulated.
Penerapan Pembatasan User Wi-Fi Pada Kantor Yayasan Patra Mandiri 01 Palembang Rahmat Novrianda Dasmen; Muhamad Dito Nugraha; Adelia Adelia
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 1 (2022): Maret 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i1.6286

Abstract

The need for the use of the internet has become very important in helping daily life along with the development of information technology. Wi-fi (wireless fidelity) has a role in building computer network systems today. Wi-Fi can be defined as a technology that uses electronic equipment to exchange data using radio waves (wireless) through a computer network. Yayasan Patra Mandiri 01 Palembang office has used the Wi-Fi facility but there is no user restriction facility available. This causes frequent lag when accessing the internet. This study aims to limit Wi-Fi users at the Yayasan Patra Mandiri 01 Palembang office and to find out the importance of using a Wi-Fi network in meeting information needs at the Kantor Yayasan Patra Mandiri 01 Palembang office. The user restriction process is carried out by configuring internet protocol (IP) addresses using the dynamic host configuration protocol (DHCP) facility on Mikrotik equipment. The result of this research is that there is a user restriction facility on the Wi-Fi network of the Patra Mandiri 01 Palembang Foundation Office.

Page 11 of 21 | Total Record : 205