cover
Contact Name
Yeni Kustiyahningsih
Contact Email
ykustiyahningsih@trunojoyo.ac.id
Phone
+6282139239387
Journal Mail Official
kursor@trunojoyo.ac.id
Editorial Address
Informatics Department, Engineering Faculty University of Trunojoyo Madura Jl. Raya Telang - Kamal, Bangkalan 69162, Indonesia Tel: 031-3012391, Fax: 031-3012391
Location
Kab. bangkalan,
Jawa timur
INDONESIA
Jurnal Ilmiah Kursor
ISSN : 02160544     EISSN : 23016914     DOI : https://doi.org/10.21107/kursor
Core Subject : Science,
Jurnal Ilmiah Kursor is published in January 2005 and has been accreditated by the Directorate General of Higher Education in 2010, 2014, 2019, and until now. Jurnal Ilmiah Kursor seeks to publish original scholarly articles related (but are not limited) to: Computer Science. Computational Intelligence. Information Science. Knowledge Management. Software Engineering. Publisher: Informatics Department, Engineering Faculty, University of Trunojoyo Madura
Articles 157 Documents
Intelligent Imaging Technology Implementation as Terrorism Prevention in Retail Sectors in 21st Century Bob Foster; Muhamad Deni Johansyah
Jurnal Ilmiah Kursor Vol 10 No 2 (2019)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/kursor.v10i2.188

Abstract

Terrorism is a very dangerous thing and has become a threat both on a national and international scale. Understanding terrorism seeks to instill the seeds of hostility towards a group, government agencies and even the state. Before entering the 21st century terror attacks are blatant in the business sector by sabotaging and damaging public facilities and vital objects. These physical attacks can be prevented by recording personal identities or conducting regular security patrols and placing a large number of security personnel in places of business and places that are considered strategic. However, this is still not optimal where the level of security and the number of personnel are limited in monitoring the place for a long time and are sustainable. The terrorist attacks in the 21st century are different and require different handling. Attacks can be physical or non-physical. On non-physical objects attacks are usually carried out by hacking networks that can damage internet network connections in one area and even one country. Ways to prevent attacks that are physical in nature by utilizing computer vision technology capabilities that are used to record all civil society. An additional feature in this technology lies in the face recognition and pattern matching techniques where a person's face will be searched for unique features. Then from these data will be biometric data, namely data that will not change and disappear. Computer vision algorithms can detect a person's face or object even though it has been modified or changed in physical and color conditions. The advantages of these algorithms are effectively used to record visitor identities and are optimal in recognizing an object with an accuracy of up to 90%. This system is able to help and improve a security feature of a business and tourist area.
EVALUASI IMPLEMENTASI SISTEM INFORMASI DENGAN PENDEKATAN UTILITY SYSTEM (STUDI KASUS SISTEM E-CAMPUS UNIVERSITAS WIDYATAMA) Falahah Falahah; Iwan Rijayana
Jurnal Ilmiah Kursor Vol 6 No 2 (2011)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Utility System adalah pendekatan untuk mengevaluasi implementasi sistem informasi yang pertama kali diusulkan oleh Kendall. Pendekatan ini berusaha menangkap persepsi sistem dari enam sudut pandang, yaitu possession, form, place, time, actualization dan goal. Informasi rinci tentang implementasi pendekatan ini tidak dapat diakses secara bebas sehingga menimbulkan keingintahuan untuk pengembangan lebih lanjut bagaimana menerapkan konsep ini untuk mengevaluasi sistem informasi, khususnya di lingkungan akademik. Penelitian ini bertujuan untuk mengusulkan sebuah metode alternatif dalam mengevaluasi sistem yang didasarkan pada pendekatan utility system. Metode ini terdiri atas sekumpulan paket kuisioner yang diturunkan dari pendekatan utility untuk mengungkapkan persepsi pengguna terhadap sistem. Kuisioner ini kemudian diterapkan untuk mengevaluasi sistem ecampus di Universitas Widyatama. Sistem e-campus dipilih karena kesederhanaan struktur dan kemudahan akses sistem tersebut oleh semua pengguna terkait. Hasil pengolahan data menunjukan beberapa temuan penting seperti perbedaan ekspektasi dari setiap jenis pengguna, dan adanya ekspektasi pengguna pada peningkatan fitur sistem. Pengolahan data kuisioner juga dapat memberikan rekomendasi yang berarti untuk peningkatan utility system dan dibutuhkan riset lebih lanjut untuk mengungkapkan fakta-fakta lain yang terkait dengan pengembangan sistem. Kata kunci: Evaluasi, Sistem, Implementasi, Utility. Abstract Utility System is an approach for evaluate system implementation, firstly proposed by Kendall. This approach captured the perception of the system based on 6 points of view, which are possession, form, place, time, actualization and goal. The detail information of this approach is limited and arising the curiosity to explore more detail how to implement this approach to evaluate the information system, especially for the system in academic environment. The aim of this research is to propose the alternative method for evaluate the system based on utility system approach. This method consists of a questionnaires package that derived from utility approach, to elicit the user perception. The questionnaires was implemented to evaluate the e-campus system at Widyatama University which is chosen because of the structure of the system that relatively simple and easy to access. The result gave some important facts, such as the difference of expectation from different user’s point of view and user’s expectations for enhancement. The results also derived some recommendations to improve the utility system and need more extended research to explore the uncover facts for system improvement. Key words: Evaluation, System, Implementation, Utility Approach.
MULTIPLE DISCRIMINANT ANALYSIS WITH FUKUNAGA KOONTZ TRANSFOR AND SUPPORT VECTOR MACHINE FOR IMAGE-BASED FACE DETECTION AND RECOGNITION Sri Andriati Asri; Widyadi Setiawan
Jurnal Ilmiah Kursor Vol 7 No 2 (2013)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MULTIPLE DISCRIMINANT ANALYSIS WITH FUKUNAGA KOONTZ TRANSFOR AND SUPPORT VECTOR MACHINE FOR IMAGE-BASED FACE DETECTION AND RECOGNITION a Sri Andriati Asri, bWidyadi Setiawan aElectrical Engineering Dept., Bali State Polytechnic, Bukit Jimbaran, Kuta Selatan, Badung, Bali b Electrical Engineering Dept., Faculty of Engineering Udayana University, Bukit Jimbaran, Kuta Selatan, Badung, Bali 80361 E-Mail: andriati_s@yahoo.com Abstrak Pengenalan wajah dapat diterapkan pada banyak aplikasi potensial, seperti otentikasi identitas, information security, surveillance dan interaksi manusia komputer. Penelitian ini bertujuan membangun perangkat lunak berbasis Matlab untuk deteksi dan pengenalan wajah dengan masukan berupa citra. Sistem yang akan dibangun meliputi deteksi dan pengenalan wajah. Subsistem Deteksi Wajah memakai Principle Component Analysis (PCA) sebagai ekstraksi fitur dan Jaringan Syaraf Tiruan Perambatan Balik sebagai pengklasifikasinya. Pada Subsistem Pengenalan Wajah memakai metode Support Vector Machine salah satu algoritma kecerdasan buatan yang mampu mengklasifikasikan banyak wajah dengan baik. Metode Multiple Discriminant Analysis with Fukunaga Koontz Transform (MDA/FKT) dipakai sebagai ekstraksi fitur. Pelatihan dan pengujian sistem memakai basis data penelitian, dan basis data standar yaitu basis data ORL sebagai pembanding. Rancang bangun Aplikasi Deteksi dan Pengenalan Wajah telah berhasil diselesaikan pada penelitian ini. Subsistem Deteksi Wajah menghasilkan tingkat keakuratan pendeteksian wajah sebesar 99 %. Pada Subsistem Pengenalan Wajah, tingkat pengenalan basis data penelitian (UNUD) 82,76 %, sedangkan tingkat pengenalan pada basis data ORL 97,5%. Kata kunci: Deteksi Wajah, Pengenalan Wajah, Support Vector Machine, Multiple Discriminant Analysis with Fukunaga Koontz Transform. Abstract Face recognition can be applied to many potential applications, such as identity authentication, information security, surveillance and human computer interaction. This research aims to build a Matlab-based software for face detection and recognition application using an image input form. The system consist of face detection and recognition subsystem. Face detection subsystem using PCA as feature extraction and Back Propagation Neural Network as its classifier. In face recognition subsystem using Support Vector Machine as known as one of the good methods in the artificial intelligence algorithm that is able to classify many faces well. Multiple Discriminant Analysis Method with Fukunaga Koontz Transforms (MDA / FKT) is used as feature extraction. Training and Testing database systems using research (UNUD) database, and ORL database as a comparison. Face detection and recognition application has been successfully completed in this research, face detection subsystem produces face detection accuracy rate of 97.95 %, and for face recognition subsystem, the recognition rate is 82.76 % on research (UNUD) database, while the recognition rate on ORL database is 97.5 %. Key words: Face Detection, Face Recognition, Support Vector Machine, Multiple Discriminant Analysis with Fukunaga Koontz Transform
MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK imam riadi; Rusydi Umar; wasito sukarno
Jurnal Ilmiah Kursor Vol 9 No 4 (2018)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28961/kursor.v9i4.182

Abstract

The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education. Information technology security issues will become the threat that made managers of the website (webadmin) alerted. This paper is focused on how to handle various application web attacks, especially attacks that uses SQL Injection, using The Open Web Application Security Project (OWASP), the aim is raise awareness about application security web and how to handle an occurred attack.
DESIGN AND DEVELOPMENT OF COMPONENT LIBRARY GENETIC ALGORITHM BY USING OBJECT-ORIENTED DESIGN AND PROGRAMMING Hadi Suyono; Adharul Muttaqin; Eka Prakarsa Mandyartha
Jurnal Ilmiah Kursor Vol 7 No 4 (2014)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DESIGN AND DEVELOPMENT OF COMPONENT LIBRARY GENETIC ALGORITHM BY USING OBJECT-ORIENTED DESIGN AND PROGRAMMING aHadi Suyono, bAdharul Muttaqin, and cEka Prakarsa Mandyartha a,b,cDepartment of Electrical Engineering, Faculty of Engineering, University of Brawijaya E-Mail: hadis@ub.ac.id Abstrak Makalah ini menyajikan desain dan pembuatan komponen library Algoritma Genetik dengan menggunakan pendekatan object-oriented designand programming (OODP) dan Component-based Develepment (CBD). KomponenAlgoritma Genetika (AG) merupakan komponen software enginedibuat sendiri yang digunakan untuk membantu menyelesaikan persoalan optimisasi dengan menggunakan struktur Algoritma Genetika yang disebut dengan Library Algoritma Genetika (LibAGen). Metodologi OODP dan CBD meliputi analisis kebutuhan, diagram use-case, diagram kelas dan diagram sekuensial. Library Algoritma Genetika (LibAGen) ini terdiri dari 22 kelas yang dikelompokkan dalam namespace berdasarkan struktur desain AG yang diperlukan meliputi representasi populasi, fungsi evaluasi, operator genetika (crossover dan mutasi) dan seleksi. Untuk mengukur performansi dari engine LibAGen validasi telah dilakukan dengan menggunakan persamaan fungsi sinusoidal dua parameter. Waktu eksekusi dan nilai optimum parameter dengan beberapa pengujian dengan variasi jumlah generasi (iterasi) juga dilakukan pada makalah ini. Parameter AG yang digunakan adalah probabilitas crossover 25% dan probabilitas mutasi 1%. Hasil uji validasi menunjukkan bahwa nilai fitness terbaik adalah 388,501 dengan nilai parameter x1 = 11,6256 dan x2 = 5,7249. Terdapat perbedaan tidak signifikan antara nilai fitness terbaik dibandingkan dengan hasil Michalewicz (1999) yaitu sebesar 0,08%. Kata kunci:Algoritma Genetika, component library, object-oriented design and programming (OODP) Abstract This paper presents the design and development of Genetic Algorithm (GA) library components by using object-oriented design and programming (OODP) and Componentbased development(CBD). Genetic Algorithm component is an engine software component which is developed by own development for solving the optimization problem by using a structure of Genetic Algorithm (GA) called as Genetic Algorithm Library (LibAGen). OODP and CBD methodologies include requirement analysis, use-case diagrams, and class diagrams. Genetic Algorithm Library (LibAGen) consists of 22 classes which is grouped into namespaces based on GA design structure that include population representation, evaluation function, genetic operators (crossover and mutation) and selection. To measure the performance of the LibAGen engine, a validation has been carried outby using a sinusoidal function with two-parameters. Optimal parameter with some testing through variations of the number generations (iterations) have been performed in this paper. The GA parameters selected are crossover probability of 25% and mutation probability of 5%. Validation test results indicate that the best fitness and parameters are 388,501, x1 = 11,6256 and x2 = 5,7249. There is no significant result in term of the best fitness compared with Michalewicz (1999) i.e. 0.08% Key words:Genetic Algorithm, component library, object-oriented design and programming (OODP)
STUDI PERBANDINGAN METODE POHON KEPUTUSAN DAN 1-10 POHON KEPUTUSAN FUZZY PADA KLASIFIKASI PENUTUP LAHAN Dwi Wahyu; M Rahmat Widyanto
Jurnal Ilmiah Kursor Vol 6 No 1 (2011)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Comparative Study of Decision Tree Method and Fuzzy Decision Tree on the Land Cover Classification. This research is a comparative study of the performance of decision tree method with fuzzy decision tree classification of land cover to help manage natural resources. The decision tree method is a simple technique and provides optimal results, but often have difficulty on incomplete data (missing value), the data enumerated, or vague, often found on land cover datasets. While the fuzzy decision tree method for implementing fuzzy concepts in the branch formation so as to produce a complete and expected to accommodate the shortage. Some land cover datasets are selected. Then two methods of performance measurement in some test by grouping the input data and the results compared with the actual classification. The results showed that the fuzzy decision tree method can provide the level of recognition by the 4.96%, but it takes much longer computation 38.13%. The classification method with data recognition capabilities that are incomplete or not clear with time computing is fast becoming a good contribution to be implemented on the application of Geographic Information System.
MATURITY LEVEL OF INFORMATION TECHNOLOGY USING COBIT FRAMEWORK 4.1 (CASE STUDY: CLOUD COMPUTING SERVICE PROVIDER) Mohammad Idhom; Ronggo Alit; Akhmad Fauzi
Jurnal Ilmiah Kursor Vol 9 No 2 (2017)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28961/kursor.v9i2.146

Abstract

This research is focused on the analysis of cloud computing service provision by both division IT Project and IT Support Division at PT. Eikon Technology in Surabaya to improve business process in this company, by examining the extent of cloud services provided by the company to customers through the two divisions by applying information technology. The total detailed control objective used was 38 detail controls performed by the IT Project division and 40 control details performed by the IT Support division. The result of this research is analysis of current and expected maturity level from sub domain PO4, PO7, DS1, DS5, and DS7, got the average total maturity level is 2.7 and the expected maturity level is 3.76. Recommendations and conclusions are expected to develop the process of information technology governance in the form of providing cloud computing services to better and efficient in supporting the business in PT Eikon Technology, Surabaya
INDONESIAN-TRANSLATED HADITH CONTENT WEIGHTING IN PSEUDO-RELEVANCE FEEDBACK QUERY EXPANSION Ivanda Zevi Amalia; Akbar Noto Ponco Bimantoro; Agus Zainal Arifin; Maryamah Faisol; Rarasmaya Indraswari; Riska Wakhidatus Sholikah
Jurnal Ilmiah Kursor Vol 11 No 1 (2021)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/kursor.v11i1.249

Abstract

In general, hadith consists of isnad and matan (content). Matan can be separated into several components for example a story, main content, and some additional information. Other texts besides main content, such as isnad and story can interfere the retrieval process of relevant documents because most users typically use simple queries. Thus, in this paper, we proposed a Named Entity Recognition (NER) component weighting model in improving the Indonesian hadith retrieval system. We did 3 test scenarios, the first scenario (S1) did not separate the hadith into several components, the second scenario (S2) separated the hadith into 2 components, isnad and matan, and the third scenario separated the hadith into 4 components, isnad, background story, content, and additional information. From the experimental results, it is found that the TF-IDF with rocchio algorithm in query expansion outperforms DocVec. Also, separation and weighting of the hadith components affect the retrieval performance because isnad can be considered as noise in a query. Separation of 2 separate components had the best overall results in general although 4 separate components showed better results in some cases with precision up to 100% and 70% recall.
AUGMENTED REALITY ON ANDROID OPERATING SYSTEM- BASED DEVICE;CASE STUDY: MOSQUE FINDER Ary Mazharuddin S; Diaz Hendrianto
Jurnal Ilmiah Kursor Vol 6 No 4 (2012)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Augmented Reality (AR) has become one of research trends in the utilization of virtual object modeling. AR works by modeling objects that exist in the real world into a vitual world by using input devices. The input devices can be a camera, sensor, or even GPS. AR can work in real time fashion to show the movement of a real object by using a form of model shown at monitor screen.This research developed an Augmented Reality for locating a mosque. Augmented Reality (AR) is a technology that combines two-dimensional virtual object into a three-dimensional environment then displays the virtual objects in real-time fashion. To implement the AR concept, this application uses integrated sensors such as accelerometer, compass and Global Positioning System (GPS). The location of mosques are downloaded from a dedicated server and stored in asmartphone. In order to anticipate should there is an update of data at the database; this application is also equipped with synchronization feature using a web service with XML technology. Experiment results show that the mosques location searching can be performed smoothly with the augmented reality technique. The details of the location of the mosque can be accurately displayed at the handled device. Augmented Reality (AR) has become one of research trends in the utilization of virtual object modeling. AR works by modeling objects that exist in the real world into a vitual world by using input devices. The input devices can be a camera, sensor, or even GPS. AR can work in real time fashion to show the movement of a real object by using a form of model shown at monitor screen.This research developed an Augmented Reality for locating a mosque. Augmented Reality (AR) is a technology that combines two-dimensional virtual object into a three-dimensional environment then displays the virtual objects in real-time fashion. To implement the AR concept, this application uses integrated sensors such as accelerometer, compass and Global Positioning System (GPS). The location of mosques are downloaded from a dedicated server and stored in asmartphone. In order to anticipate should there is an update of data at the database; this application is also equipped with synchronization feature using a web service with XML technology. Experiment results show that the mosques location searching can be performed smoothly with the augmented reality technique. The details of the location of the mosque can be accurately displayed at the handled device.
PARTICLE FILTER-BASED OBJECT TRACKING USING JOINT FEATURES OF COLOR AND LOCAL BINARY PATTERN HISTOGRAM FOURIER Dewa Made Wiharta; Wirawan Wirawan; Gamantyo Hendrantoro
Jurnal Ilmiah Kursor Vol 8 No 2 (2015)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28961/kursor.v8i2.64

Abstract

Object tracking is defined as the problem of estimating object location in image sequences. In general, the problems of object tracking in real time and complex environtment are affected by many uncertainty. In this research we use a sequensial Monte Carlo method, known as particle filter, to build an object tracking algorithm. Particle filter, due to its multiple hypotheses, is known to be a robust method in object tracking task. The performances of particle filter is defined by how the particles distributed. The role of distribution is regulated by the system model being used. In this research, a modified system model is proposed to manage particles distribution to achieve better performance. Object representation also plays important role in object tracking. In this research, we combine color histogram and texture from Local Binary Pattern Histogram Fourier (LBPHF) operator as feature in object tracking. Our experiments show that the proposed system model delivers a more robust tracking task, especially for objects with sudden changes in speed and direction. The proposed joint feature is able to capture object with changing shape and has better accuracy than single feature of color or joint color texture from other LBP variants.

Page 4 of 16 | Total Record : 157