cover
Contact Name
Sebastianus Adi Santoso Mola
Contact Email
adimola@staf.undana.ac.id
Phone
-
Journal Mail Official
jicon@undana.ac.id
Editorial Address
Program Studi Ilmu Komputer Universitas Nusa Cendana Jl. Adisucipto - Penfui - Kupang - NTT -Indonesia
Location
Kota kupang,
Nusa tenggara timur
INDONESIA
J-Icon : Jurnal Komputer dan Informatika
ISSN : 23377631     EISSN : 26544091     DOI : -
Core Subject : Science,
J-ICON : Jurnal Komputer dan Informatika focuses on the areas of computer sciences, artificial intelligence and expert systems, machine learning, information technology and computation, internet of things, mobile e-business, e-commerce, business intelligence, intelligent decision support systems, information systems, enterprise systems, management information systems and strategic information systems.
Articles 205 Documents
PERANCANGAN LOAD BALANCE MENGGUNAKAN METODE ECMP (EQUAL COST MULTI PATH) PADA MIKROTIK ROUTERBOARD 750GR3 I Nyoman Bernadus; Prastyadi Wibawa Rahayu; I Made Dwi Ardiada
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8225

Abstract

Internet speed at all times is very helpful in carrying out and completing tasks, especially for workers and students. A slow internet connection can be a very annoying thing if it happens continuously. For this reason, this study discusses how to take advantage of internet links by dividing the traffic load equally or called load balance by using the Equal Cost Multi Path (ECMP) method in order to produce a maximum flow of packages so as to avoid overload on one connection down. From the test results, it is found that applying the load balance system to the ECMP method, the traffic load on the two internet lines can be divided evenly, the connection tag on the Mangle automatically determines incoming and outgoing packet connections so as to maintain and increase the bandwidth speed of the internet connection.
RANCANG BANGUN SISTEM PENGAMAN PINTU BERBASIS INTERNET OF THINGS (IoT) Nurlinah Nurdin; Heliawati Hamrul; Musyrifah Musyrifah
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8335

Abstract

The development of the internet of things (IoT) is one of the influencing factors in the industrial era 4.0 towards the next industrial era, where with this technology humans can communicate with electronic devices connected to microcontrollers remotely using an internet connection. The door is a place to enter or exit to start daily activities. Therefore, door security is the main thing in designing a good room security. This research uses research and development methods, namely methods that aim to produce or develop certain products. There are several stages in the research, namely (1) literature review (2) analysis of tool and material requirements (3) Arduino Integrated Development Environment (IDE) schema design (4) system design with Arduino Nano and (5) system testing and analysis. It can be concluded from the test results that the door safety device can work according to the design made, considering the results of the Arduino Uno which can be connected to Radio Frequency Identification (RFID) and read e-KTP ID and passive infra-red or PIR sensors to detect movement and send notification to Telegram.
PENERAPAN SISTEM PENGONTROL ALAT ELEKTRONIK BERBASIS INTERNET OF THINGS PADA PROGRAM STUDI INFORMATIKA UNIVERSITAS SULAWESI BARAT Ahmad Muaz Asiz; Asmawati S; Musyrifah Musyrifah
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8385

Abstract

The use of electrical energy, especially in the informatics study program room, is very important because negligence is often found in the use of electrical energy in the informatics study program room. The informatics study program room was the target of research because the location was equipped with electronic fans, lights and wi-fi networks, the head of the informatics study program suggested making a remote control so that it strengthened the background of this research. The purpose of this study is to implement a remote-control system for electronic devices, using nodeMCU and relay as a web server to control the switch online. As well as applying the waterfall method in the design to implementation process, system testing is carried out using the black box method to find out the system is working as expected. From the results of field testing, it was found that the implementation of NodeMCU and relay as a web server to control the switch online makes it easier to control electronic equipment remotely if there is a good internet network.
APLIKASI KEAMANAN PESAN (.TXT) MENGGUNAKAN METODE TRIPLE DES DAN METODE KOMBINASI LSB DAN BLUM-BLUM-SHUB Derwin R Sina; Guido A Kiu; Bertha S Djahi; Emerensye S Y Pandie
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8465

Abstract

Security is one of the important aspects of the process of exchanging information (messages). To prevent misuse or attacks by unauthorized parties (attackers) on private messages, the message must be secured. Several methods can be used to secure messages, one of which is by combining the Triple Data Encryption Standard (DES) cryptography method, Blum-Blum Shub (BBS) random number generator, and Least Significant Bit (LSB) steganography. In this study, the Triple DES cryptographic method is used to encrypt messages (embedded-message) with the extension .txt and the BBS random number generator method is used to determine the position of a random pixel to be inserted in the cover-image message. The LSB steganography method is used to perform the embedding process of the encrypted embedded-message at the pixel position resulting from the BBS random number generation process. The test results show that the system can extract embedded messages hidden in a stego-image with 100% accuracy. The maximum number of embedded-message characters that can be used in the test is 150 characters. The test also produces a stego-image that has an average Peak Signal to Noise Ratio (PSNR) value of 88.61, which means that the resulting stego-image has high quality (no significant quality degradation) and the presence of messages in the stego-image is getting harder to detect (imperceptibility).
ANALISIS ELITISME PADA ALGORITMA GENETIKA MENGGUNAKAN PENGKODEAN ORDINAL REPRESENTATION DALAM TRAVELLING SALESMAN PROBLEM Arfan Yehezkiel Mauko; Adriana Fanggidae; Yulianto Triwahyuadi Polly
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8473

Abstract

Traveling salesman problem (TSP) is one of the optimization problems to find the shortest route, where each city is only allowed to visit exactly once. The search for the shortest route can be completed by several algorithms, one of which is the genetic algorithm. Genetic algorithm is an optimization algorithm that works by imitating the evolutionary process in nature. During the evolution process, individuals with the best fitness may undergo changes that result in a decrease in fitness. Therefore, in order to keep individuals with the best fitness from becoming extinct during the evolutionary process, it is necessary to make copies of these individuals which is called elitism. There are three models of elitism, namely, Model 1: the best individuals are copied as many as m replacing the worst m individuals, Model 2: the best m individuals replace the worst m individuals, and Model 3: the best m individuals replace the worst m individuals selected randomly from 100%-m worst individual. The values ​​of the m parameters are 10%, 20%, 30%, and 40%. The tests were carried out with elitism and without elitism on different populations and cities. The test results show that Model 2 with m = 10% and population = 20 is the ideal parameter in solving TSP.
ANALISIS PERBANDINGAN EFISIENSI BIAYA PENGGUNAAN LINUX CLEAROS DAN MIKROTIK UNTUK KEBUTUHAN SOHO Putu Veda Andreyana; I Made Sunia Raharja; I Putu Agus Eka Pratama
J-ICON : Jurnal Komputer dan Informatika Vol 10 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v10i2.8486

Abstract

Currently, various sectors of life and organizations require the availability of computer networks and the internet to be able to provide faster and optimal services, one of which is the Small Office Home Office (SOHO). Internet access requires management so that the internet network can be allocated according to the needs of each field and requires cost calculations according to the ability of the organization. Linux ClearOS and Mikrotik are two operating system platforms commonly used for network management, including SOHO. The test was conducted in the form of a comparison between ClearOS Linux and Mikrotik in terms of cost, basic network capabilities (bandwidth manager, wifi, proxy, load balancing, user management), availability of security features, and additional device requirements. The test results show that for the same needs on SOHO, Linux ClearOS has advantages in terms of lower costs and complete features, so it is more recommended than Mikrotik
EVALUASI ANTARMUKA PERMAINAN 3D BALAP KARUNG MENGGUNAKAN METODE SYSTEM USABILITY SCALE (SUS) Adi Sucipto; Anugrah Dwirangga; RM. Joko Priyono
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9012

Abstract

Traditional games are a form of knowledge passed down from generation to generation. An example of a traditional game is Balap Karung. Currently, many game developers have created the "Balap Karung" application, but it has deficiencies in its User Interface. The User Interface is one of the visual elements that build a game. The User Interface is a communication mechanism between the user and the system that can receive information and provide information to the user to help direct the navigation flow until the user finds the solution. Creating a user interface in the 3D" Balap Karung" game as a visual design for the "Balap Karung" game will be built on an Android-based system. Creating a graphic user interface is done by researching the use of color in the user interface. The colors that match the "Balap Karung" game style will be used. The System Usability Scale (SUS) method was used as a usability test for the "Balap Karung" game. Through the results of game testing using the SUS method by distributing online questionnaires to be filled out by the respondents after they played the "Balap Karung" game, was obtained the average SUS score of 69.42 after calculating the results of the questionnaires from the respondents. According to the scores, it can conclude that the usability of the "Balap Karung" game is said to be good, with buttons and visuals following the purpose of their respective functions. According to the theory of calculating the SUS score, a score of 69.42, the "Balap Karung" game gets a Good rating in terms of usability.
KEAMANAN INFORMASI (INFORMATION SECURITY) PADA APLIKASI SISTEM INFORMASI MANAJEMEN KEPEGAWAIAN DENGAN DEFENSE IN DEPTH Enggar Novianto; Erik Iman Heri Ujianto; Rianto Rianto
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9139

Abstract

The rapid development of Information Technology (IT) has made IT the most important aspect to meet organizational needs. The existence of IT is believed to be able to provide solutions related to the organization's business processes, so that many organizations offer their resources to increase efficiency by relying on information technology support. Information system security is an internal organizational subsystem tasked with managing the risks associated with computerized information systems. Information system security is the application of international control principles, which are specifically used to trigger problems in information systems. Important information leads to protected information structures, more information is now available from the internet, so information management now includes computer and network technology. The goal of information security is to strengthen business operations and protect against falling business prices by minimizing the risks associated with internal security. The purpose of this study is to understand information security in the implementation of the Personnel Management Information System (SIMPEG) at Sebelas Maret University. The research method used is the application of Defense In Depth to analyze information security, including many layers of security to ensure information security. The results of the descriptive analysis explain that the design and development of SIMPEG pays attention to the principles and aspects of data and information security. However, information security vulnerabilities can occur at the server protection layer, network protection layer, and physical protection layer.
APLIKASI SISTEM INFORMASI PEMANDU WISATA DAERAH BANDA NEIRA BERBASIS ANDROID Ahmad Thariq; Dwi F Pattiha
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9795

Abstract

Tourism is a means to introduce a region's natural beauty and cultural uniqueness. Maluku Province, especially in Eastern Indonesia, has a sub-district called Banda Neira. Tourism potential includes historical tourism, nature tourism, and cultural tourism. However, disseminating information about tourist attractions in Banda Neira is still lacking because some information on the internet is not updated, there are no plans or directions to get to a tourist location and some historical information boards of tourist locations are also damaged or even non-existent. An android-based application was made as an answer using android studio tools, and the model used is the prototype. The final result of this application is that it can provide information about various tourist attractions equipped with pictures and maps to make it easier for visitors to choose places to visit while travelling.
IDENTIFIKASI DEFISIENSI UNSUR HARA PADA TANAMAN CABAI MENGGUNAKAN SUPPORT VECTOR MACHINE Arie Qur’ania; Lita Karlitasari; Sufiatul Maryana; Cecep Sudrajat; Zolla Zolla
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9803

Abstract

Plants, like other living things, need a combination of nutrients to live, grow and reproduce. Nutrients in plants can also be divided into two, namely mobile nutrients and immobile nutrients (non-moving nutrients). The condition of plants that are deficient or lacking in nutrients will experience growth disturbances and affect the yield of leaves or fruit. Leaf color can be a characteristic of plants under normal conditions or experiencing nutrient deficiencies. Deficiency of nutrients in plants will affect leaf shape, fruit production and plant age which results in stunted growth and rapid death of plants, in fruit production there will be loss of flowers or ovaries so that production will decrease. So far, plant maintenance has been done manually. Each plant is seen for later analysis of the results and it takes time to identify nutrient deficiencies. The aim of the study was to identify nutrient deficiencies in image-based chili plants based on the characteristics of the Red, Green, Blue (RGB) color and texture analysis using the Support Vector Model (SVM). The benefit of the research is to make machine learning-based applications to identify nutrient deficiencies which are divided into four classes, namely nitrogen (N) and phosphorus (P) deficiencies, P and potassium (K) deficiencies, N and K deficiencies, and chili leaves with normal class. .There are 120 plant data with an accuracy of 84.4%.