cover
Contact Name
Sebastianus Adi Santoso Mola
Contact Email
adimola@staf.undana.ac.id
Phone
-
Journal Mail Official
jicon@undana.ac.id
Editorial Address
Program Studi Ilmu Komputer Universitas Nusa Cendana Jl. Adisucipto - Penfui - Kupang - NTT -Indonesia
Location
Kota kupang,
Nusa tenggara timur
INDONESIA
J-Icon : Jurnal Komputer dan Informatika
ISSN : 23377631     EISSN : 26544091     DOI : -
Core Subject : Science,
J-ICON : Jurnal Komputer dan Informatika focuses on the areas of computer sciences, artificial intelligence and expert systems, machine learning, information technology and computation, internet of things, mobile e-business, e-commerce, business intelligence, intelligent decision support systems, information systems, enterprise systems, management information systems and strategic information systems.
Articles 205 Documents
PENGUJIAN PENETRASI PADA WEBSITE ELEARNING2.BINADARMA.AC.ID DENGAN METODE PTES (PENETRATION TESTING EXECUTION STANDARD) Rahmat Novrianda Dasmen; Rasmila Rasmila; Tantri Langgeng Widodo; Kundari Kundari; Muhammad Tio Farizky
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9809

Abstract

Bina Darma University is one of the best private campuses that provides a website-based online learning system. With the increasing distribution of information online in the era of the Covid-19 pandemic and the high enthusiasm of students in online learning, it is very important for Bina Darma University to pay attention to the security of the information system website used to protect user data. The goal to be achieved in this research is to implement penetration testing with the Black Box method and the PTES method on the elearning2.binadarma.ac.id website. The PTES method can be used as a standard guide for assessing web-based application security which consists of 5 stages, which consist of information gathering, threat modeling, vulnerability analysis, exploitation, and reporting. At the end of the research, it can be concluded that testing on elearning2binadarma.ac.id was identified as having a loophole in Cross Site Scripting (XSS) which is quite dangerous if it spreads further. The way to handle this gap can be done by checking website vulnerabilities regularly.
PENERAPAN METODE FUZZY C-MEANS DALAM PENENTUAN PENERIMA BEASISWA PROGRAM INDONESIA PINTAR (PIP) Mardiani Thiaralivta Geraldine Kadja; Nelci Dessy Rumlaklak; Bertha S Djahi
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9846

Abstract

The process of selecting scholarship recipients for Program Indonesia Pintar (PIP) at SMA Negeri 2 Kupang is still done manually by comparing student data. That process can cause the emergence of a reasonably high level of complexity and requires a relatively long time to get the results. Therefore, a Decision Support System (DSS) was built using the Fuzzy C-Means (FCM) method in this study. The FCM method groups data on prospective scholarship recipients with almost the exact resemblance into one cluster. Five (5) criteria are used in selecting PIP scholarships: the number of dependents, parents’ income, water bills, electricity bills and the value of the latest report card. The data is from class XI (eleven) students in 2019 at SMA Negeri 2 Kupang, totaling 422 students. The results of the FCM calculation with a maximum iteration of 100 and an error value of 0.00001 get 240 students entering cluster 1, namely eligible to receive scholarships and as many as 182 students entering cluster 2, namely not eligible to receive scholarships. The testing method used in this study is blackbox testing which is divided into 8 (eight) test scenarios and obtains valid results for all of them. The DSS for determining PIP scholarship recipients using the FCM method is more effective and efficient because it can save time, and scholarships can be awarded to the right students.
DIAGNOSIS GASTROENTERITIS BERBASIS SISTEM PAKAR MENGGUNAKAN METODE FUZZY DAN CERTAINTY FACTOR Sabilatul Hidayah; Yoannes Romando Sipayung
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9849

Abstract

Gastroenteritis is inflammation of the stomach and intestines with symptoms of diarrhea and often fever. The disease in question is repeated defecation, more than four times, and the type of liquid stool, which can be accompanied by blood or mucus. Digestive disorders this disease occurs due to viruses, bacteria, or parasites. This disease is often underestimated because the symptoms are almost the same as diarrhea, so if it is not handled properly, it can endanger the patient's life, especially with conditions that are getting weaker and worse. This study aims to create an expert system application program that can diagnose Gastroenteritis, the results of which can show the disease suffered by the patient. 16 symptom data will be used, namely Fever above 38C, Chills, Headache, Nausea, Lack of appetite, Easy Drowsiness, Constant thirst, Watery stools, Discomfort, Stomach cramps/bloating, Dehydration, Weight loss, Diarrhea with blood, restlessness, weakness, no urine in the diaper for 3 hours or more. To demonstrate its confidence percentage, the authors chose the Fuzzy Logic and Certainty Factor methods as the basis for calculating the archival samples from the clinic with 100% confidence percentage. Based on the expert system trials and the resulting Certainty Factor values, it can be concluded that the expert system that has been created makes it easier to determine Gastroenteritis so that it can be handled properly and correctly.
RANCANG BANGUN PRESENSI KARYAWAN BERBASIS NFC STUDI KASUS UNIVERSITAS PGRI WIRANEGARA Dimas Rega Hadiatullah
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9852

Abstract

There are many indications that show the performance of an employee, one of which is presence or attendance at work. In the institution of Universitas PGRI Wiranegara or UNIWARA, the employee attendance system still uses a manual system or is not modern. In the era of the COVID-19 pandemic, an attendance system based on no physical contact is the best choice. This study aims to develop an automatic attendance system without physical contact using Near Field Communication (NFC). NFC is a wireless computer network technology that uses radio frequency that allows you to connect without physical contact combined with applications developed using the SDLC (Software Development Life Cycle) method that can process data automatically. The final results of the study show that, from the tests carried out by this application, it makes it easy to make attendance without physical contact, where previously physical contact was still used. And in testing using Blackbox there were no errors, whereas when testing an objective system to respondents it was found that this system is easy to use, useful for users, has an attractive appearance, and is easy to understand.
VISUALISASI DASHBOARD POWER BUSINESS INTELLIGENCE JUMLAH KERUGIAN KENDARAAN BERMOTOR DI JAWA TIMUR INDONESIA Ardath Prahara Setyan; I Putu Agus Eka Pratama
J-Icon : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9920

Abstract

East Java Province has a high number of motorized vehicle losses with various modes of crime. There needs to be a system that can process the data to assist the decision-making process for law enforcement officers in investigating the crime of motor vehicle theft and reducing the amount of loss. For this reason, in this research, data processing of motor vehicle theft was carried out using Business Intelligence (BI) and displayed on the Power BI dashboard. The research methodology used is literature study, interviews, data collection, implementation, evaluation, and documentation. The test results show the highest number of vehicle theft cases occurred in 2016 (1,635 cases) with the most modes using fake keys, and with the highest vehicle brand being Honda. The final result of the study shows that the presentation of data and information visually and interactively based on Power BI can help law enforcers to understand data, obtain information, and make decisions and policies to handle motorcycle theft cases.
SISTEM PAKAR DIAGNOSA PENYAKIT GINJAL BERBASIS WEB MENGGUNAKAN METODE CERTAINTY FACTOR Kikye Martiwi Sukiakhy; Sri Azizah Nazhifah; Junidar Junidar
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.9931

Abstract

There are still limited health facilities in Indonesia, especially those dealing with kidney disease and the lack of knowledge and information in the community regarding the early symptoms of kidney disease, causing the death rate caused by this disease to continue to increase every year. An expert system that can diagnose kidney disease is urgently needed to provide a solution to this problem with the hope that people can easily obtain information regarding the symptoms of kidney disease they are experiencing, and that people can make a diagnosis independently. A method called the certainty factor (CF) is used in the expert system in this study. Diagnosis of kidney disease based on various symptoms experienced by the user is the output generated by this expert system. Based on the symptoms entered by the user, the system will then look for the highest CF value and then the results will be displayed to the user. The displayed results include 17 symptoms, disease name, diagnosis results and solutions. The functional tests carried out went as expected for the three access rights, namely admin, expert and user can access all functions and no errors were found in the system, using both the Windows 8 and Windows 10 operating systems for admin, expert and user access.
PEMANFAATAN CCTV ANALOG CAMERA PADA SISTEM MONITORING KEAMANAN RUANGAN BERBASIS MOBILE WEB Emanuel Safirman Bata
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.10033

Abstract

The greater the diversity of a city, the greater the threat to its security. The number of criminal cases in Kupang City was reported at 1,472, with a crime rate of 438 per 100,000 population. The number of theft cases was 1,288. This is a very high number and if it is not addressed, it will cause unrest in the community. STIKOM Uyelindo Kupang has experienced cases of theft of 7 units of laptops, wallets, helmets. The higher crime rate encourages the need for a technology-based security system that is effective, efficient and easily accessible anywhere, one of which is CCTV. Closed Circuit Television (CCTV) is a digital video camera device and is used to send signals to a monitor screen and aims to increase security. Based on the test results at 24 points of the room and open areas of STIKOM Uyelindo kupang, video streaming can run well on the room security monitoring system and can be accessed publicly.
KLASIFIKASI PENGGUNAAN DATA TRAFIK INTERNET MENGGUNAKAN ALGORITMA SUPPORT VECTOR MACHINE Pitrasacha Adytia; Wahyuni Wahyuni; Kelik Sussolaikah; Yudha Satria
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.10039

Abstract

It is undeniable that nowadays, the internet is essential for various needs. STMIK Widya Cipta Dharma is no exception. The internet is widely used in the campus environment by students, lecturers and education staff. Teaching and learning activities and work in the campus environment are inseparable from the need to use the internet. However, internet usage time sometimes accumulates in certain hours and causes slow internet speeds. This is influenced by the large number of header packets sent in the internet traffic flow, so the connection becomes heavy and feels sluggish. Therefore, a classification method is needed to provide information about the activities of students, lecturers and academic staff using the internet. The classification algorithm used is the Support Vector Machine (SVM). The development method used is SKKNI Number 299 of 2020. The parameters used are the flow of packets sent by the user and packets received by the user. The results of this study are in the form of an SVM algorithm model that can classify current internet traffic usage into four categories, namely Download, Game, SocialNetwork, and Web, which has an accuracy of 64% using the Radial Basis Function (RBF) kernel. The resulting accuracy results are pretty low and make the SVM algorithm unsuitable for classifying internet traffic and the need for other methods to classify internet traffic.
MONITORING APPLICATION SYSTEM DEVELOPMENT AND EVALUATION OF “PUPR” DEPARTMENT OF GENDER LEADING ACTIVITIES IMPLEMENTATION Ramacos Fardela; Arif Rizki Marsa; Lilik Suhery; MS Firman Maulana
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.10092

Abstract

Monitoring and evaluation are the jobs that are often done by the Payakumbuh Public Works Department to maximize work in the field. The Payakumbuh Public Works and Public Housing (PUPR) Office itself is experiencing difficulties in monitoring and evaluating work in the field that is currently underway and the activities carried out have been realized. So far, office work has been monitored manually one by one because the Payakumbuh (PUPR) does not have an information system that can monitor and evaluate all work simultaneously and provide an overall target picture yet. In activities, especially work at the Payakumbuh PUPR Service, it applies the application of gender mainstreaming ("PUG"). The Ministry of Public Works of the Republic of Indonesia as the target for PUG implementation is the integration of a gender perspective into the internal culture of the Ministry of Public Works (at the central and regional levels) to produce an institutional culture that is sensitive to gender issues. To monitor this, applications are developed using the Agile Development software system development methodology. Researchers designed this website application to overcome this problem. The system was built using the PHP programming language with the Laravel Framework. The results showed that the application of reports on the implementation of gender mainstreaming activities with the Laravel Framework helped website developer performance to be more effective and efficient than using the static PHP programming language. The Laravel framework supports is object oriented and supports all databases. The Uniform Resource Locators (URL) structure used in Laravel is much more flexible and much easier to change in routing.
SISTEM PENDETEKSI KERUSAKAN JALAN ASPAL MENGGUNAKAN CANNY EDGE DETECTION Farhan Aditya Rafi; Adriana Fanggidae; Yulianto Triwahyuadi Polly
J-ICON : Jurnal Komputer dan Informatika Vol 11 No 1 (2023): Maret 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v11i1.10100

Abstract

Road is a means of access for humans to move from one place to another, connecting one place to another, and serving as transportation infrastructure. At all times, asphalt roads are passed by road users, including small, medium, and large vehicles. However, road conditions are not always smooth and often there are damages in certain parts of the road. Factors such as water, weather, temperature changes, unstable soil conditions, air temperature, poor compaction process on the base layer, and the weight or overload of heavy vehicles that exceed capacity, as well as the increasing volume of vehicles, can cause road damage. Road damage can reduce economic revenue and increase accident rates. Some types of asphalt road damage include undulating, potholes, cracking, and asphalt puddles on the road surface. Potholes are the most common type of damage that cause accidents for road users. This study uses the Canny edge detection method to detect asphalt road damage. The minimum object size that can be detected as road damage is 15x15 pixels and the maximum is 290x540 pixels. Testing was conducted on 65 primary data and 35 secondary data, and the average accuracy obtained were 90.5% and 88%, respectively.