cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota banda aceh,
Aceh
INDONESIA
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 13 Documents
Search results for , issue "Vol 2, No 2 (2016): Oktober 2016" : 13 Documents clear
Design Archade Animated Game War Based on Flash Jedi Fathiah, Fathiah; Saputra, Hendra
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

War games are already familiar to children today, but with the development of todays computer is one device that can provide many benefits to children in increasing dexterity and brain. War game system that has been often done by children at this time it would be nice to be converted into a game system in the form of computer applications in the form of 2-dimensional game that is easy to play. So oelh because it required a game application design that can run on computers that have a small memory and simultaneously increase the agility and brain of children by building Game Animation 2D-based Arcade Adobe Flash. The purpose of this research is to develop Arcade game application that is educational game that prioritizes on the speed of hand skill in collecting value and winning game by using mouse media. Research produces a computer game that supports 2 dimensional graphics and can run on a CPU that has a small memory has been successfully built and game applications that have been built prioritize on the skills of hand speed using mouse media.Keywords: game Arcade, Adobe Flash, 2 Dimensions
DETAMAL (ANTI-THEFT DETECTOR) : THEFT CASE PREVENTION DETECTOR APPLICATION OF MICROCONTROLLER ARDUINO UNO BASED AS HOME SECURITY SYSTEM Ardian, Zalfie; Dewi, Sarini Vita
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The increasing criminal case nowadays makes people worried about losing their properties. In addition, they do not hesitate to act anarchist and often hurt the victim. These criminals frequently come to the victims house to perform the act of theft. However, theft is often successfully thwarted only by a shout or alarm sound that makes the thief to be panic and afraid then run while cancelling his intention to  proceed with his action. Therefore the authors wanted to create an automatic detection system by relying on Arduino UNO, PIR sensor as motion detector and equipped with a camera that will capture images right after the sensor sounds and the sound is expected to thwart the robbery action. The advantages of this application is the camera will rotate automatically where the sensors that detect the presence of the thief detected. And the resulting sound is also derived from the micro SD memory card with MP3 format so that the users can use the sound of shouting, guard dog, or siren that will make the thief panic and run.Keywords : arduino uno, detector, pir sensor, theft
HISTOGRAM E QUALIZATION SMOOTHING FOR DETERMINING THRESHOLD ACCURACY ON ANCIENT DOCUMENT IMAGE BINARIZATION Dwipayana, Mahendar; Arnia, Fitri; Musliyana, Zuhar
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ancient documents are inheritance that must be preserved. The documents contain historical, scientific, social, religious information, etc. Converting ancient documents into digital image formats is one of ways to preserve the inheritance and can be stored into a computer. However, images of ancientdocuments have many blemishes caused by age, moisture, flood, etc. Therefore, special techniques are needed for those images to be restored and can improve the legibility of the ancient documents’ images. In this study, the image restoration process uses separation of background and foreground/text on histogram equalization such as research conducted by Fitri Arnia in 2008. Through histogram equalizationimages can be seen the distribution of pixels from the intensity of black color "0" to white "1". The distribution of pixels on histogram equalization describes the curves of foreground/text and curves of background. Among the histogram curves, the determination of thresholdvalues can be done so as to clarify the foreground/text and background areas on images of ancient documents. The lowest point between the two curves is the lowest pixel (local minima) which is used as the threshold value. However, the selection of such threshold values in some cases is very difficult to determine because there are still many fluctuations in the curve at the lowest curve. Therefore, this study proposesa histogram smoothing method in the ancient documents’ images to minimize curvature fluctuations and to determine more accurate threshold values. In this research, average filtering method is used for smoothing the histogram image. This filter successfully refines the histogram and makes the image of the restoration or binary image display the value of the ancient document image readability increases.Keywords: HistogramEqualization, Smoothing Histogram, Average Filtering, Thresholding
PLAGIARISME DETECTION SYSTEM ON THIEF FACULTY OF COMPUTER SCIENCE UNIVERSITY UBUDIYAH INDONESIA BASED TEXT MINING TB, Desita Ria Yusian; Fathiah, Fathiah
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Plagiarism is the act of intentionally or unintentionally in obtaining or trying to obtain credit or value to scientific work., citing part or all of the work / or scientific work of others who are recognized as scientific works, co without stating the source appropriately and adequately. Problem of plagiarism has become a phenomenom that is being discussed in academic forums. Based on a variety of information about the practice of plagiarism is increasingly disturbing, this study conducted at the Ubudiyah University Indonesia (UUI). This system will implemented the detection system plagiarism that will be creating using a document apllied method of vector space model to analyze similarities in document displayed on the web browser. Input on this system is a document in the form of text format whith the extention test performed on real data that is usig data documents with vector space  model algorithm value is above 85% to 100% for high level document. As for a document with a low degree of similarity values below 50%.Keyword : plagiarism, vector space model, similarity
Implementation of Digital Signature on Banking Hamdi, Nurul; Junidar, Junidar
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the advantages of doing business in the internet world is can he do trade transactions where and at any time, without the presence of physical or face to face directly. In terms of profit in its own problems arose, mainly related to authentication. Bagaimanapenj ual can rest assured that the purchased product is the correct person or how the seller know that the credit card used the buyer is legitimate credit card hers. The example above is one of the problems in the internet world you can finish with a digital signature. There are still many more problems in the internet that can be solved with the use of a digital signature or digital signature misalnyadi the field of ecommerce, internet banking and more.Keyword:D igital Signatures, internet, e-commerce
APPLICATION INTERACTIVE TOURISM OF BANDA ACEH CITY USING ADOBE FLASH CS6 Farhansyah, Atras; Muttaqin, Muttaqin
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Development of multimedia makes the delivery of information becomes more practical. Banda Aceh is a city that has tourism potential which is a relic of history. The problem is the media to promote the tourist attractions and historic sites is not maximized. For that created an interactive application that contains information on tourism in the city of Banda Aceh. In scientific writing, create interactive applications Banda Aceh tourism using Adobe Flash CS6. This application is interactive in which the user can choose the location where you want to know. The interactive application is also accompanied by a minimalist travel map containing tourist sites. It also added amenities of the town and a glimpse of information contains the address of the tourist attractions. Output is later is a file-based application exe (Execute) file and swf (Small Web Format) files which contains information on tourism sites in Banda Aceh. Output of the file will be saved in the long term and more practical. This application is expected to be used by the people of Banda Aceh to promote tourist places in the city. With the media is also expected to foster community interest outside Banda Aceh to visit attractions in the city of Banda Aceh.Keyword : Media Information, Tourism, Multimedia, Interactive Application.
PERFORMANCE ASSESSMENT SYSTEM NEEDS ANALYSIS OF LP3I BUSINESS COLLEGE LECTURER BANDA ACEH USING The METHOD Of VIEWPOINT ORIENTED REQUIREMENT DEFINITION (VORD) Wibawa, Muhammad Bayu
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Universitas Ubudiyah Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The needs of the software must be started from the parties involved in the development of a system to be built. The statement describes the needs of consumers or users of the system, nor the clien stokeholder though. In order to get the system needs to do some activity or activities include: requirement elicitation requirment, analysis and negotiation, requirement documentation, validation requirement. This activity aims to produce a document called document specification. Of some sort of method to analyze the needs of the system, one of the methods that can be applied on requirement engineering is the method of Viewpoint Oriented Requirements Definition (VORD). VORD method is one method used to define needs with an approach viewpoint (point of view) the users of the system. The results of the analysis of the VORD method this will generate requirement specification with the help of a tool i.e. VORD tool. The results of this analysis in the form of a document that describes the system needs to be built.Keywords: Requirement Engineering, VORD Method
DETAMAL (ANTI-THEFT DETECTOR) : THEFT CASE PREVENTION DETECTOR APPLICATION OF MICROCONTROLLER ARDUINO UNO BASED AS HOME SECURITY SYSTEM Ardian, Zalfie; Dewi, Sarini Vita
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Ubudiyah Indonesia University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33143/jics.Vol2.Iss2.732

Abstract

ABSTRACTThe increasing criminal case nowadays makes people worried aboutlosing their properties. In addition, they do not hesitate to act anarchist andoften hurt the victim. These criminals frequently come to the victim's houseto perform the act of theft. However, theft is often successfully thwartedonly by a shout or alarm sound that makes the thief to be panic and afraidthen run while cancelling his intention to proceed with his action.Therefore the authors wanted to create an automatic detection system byrelying on Arduino UNO, PIR sensor as motion detector and equipped witha camera that will capture images right after the sensor sounds and thesound is expected to thwart the robbery action. The advantages of thisapplication is the camera will rotate automatically where the sensors thatdetect the presence of the thief detected. And the resulting sound is alsoderived from the micro SD memory card with MP3 format so that the userscan use the sound of shouting, guard dog, or siren that will make the thiefpanic and run.Keywords : Arduino Uno, Detector, PIR sensor, Theft
HISTOGRAM E QUALIZATION SMOOTHING FOR DETERMINING THRESHOLD ACCURACY ON ANCIENT DOCUMENT IMAGE BINARIZATION Dwipayana, Mahendar; Arnia, Fitri; Musliyana, Zuhar
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Ubudiyah Indonesia University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33143/jics.Vol2.Iss2.733

Abstract

Ancient documents are inheritance that must be preserved. Thedocuments contain historical, scientific, social, religious information, etc.Converting ancient documents into digital image formats is one of ways topreserve the inheritance and can be stored into a computer. However,images of ancientdocuments have many blemishes caused by age,moisture, flood, etc. Therefore, special techniques are needed for thoseimages to be restored and can improve the legibility of the ancientdocuments’ images. In this study, the image restoration process usesseparation of background and foreground/text on histogram equalizationsuch as research conducted by Fitri Arnia in 2008. Through histogramequalizationimages can be seen the distribution of pixels from the intensityof black color "0" to white "1". The distribution of pixels on histogramequalization describes the curves of foreground/text and curves ofbackground. Among the histogram curves, the determination ofthresholdvalues can be done so as to clarify the foreground/text andbackground areas on images of ancient documents. The lowest pointbetween the two curves is the lowest pixel (local minima) which is used asthe threshold value. However, the selection of such threshold values insome cases is very difficult to determine because there are still manyfluctuations in the curve at the lowest curve. Therefore, this studyproposesa histogram smoothing method in the ancient documents’ imagesto minimize curvature fluctuations and to determine more accuratethreshold values. In this research, average filtering method is used forsmoothing the histogram image. This filter successfully refines thehistogram and makes the image of the restoration or binary image displaythe value of the ancient document image readability increases.Keywords: HistogramEqualization, Smoothing Histogram, AverageFiltering, Thresholding
PLAGIARISME DETECTION SYSTEM ON THIEF FACULTY OF COMPUTER SCIENCE UNIVERSITY U'BUDIYAH INDONESIA BASED TEXT MINING TB, Desita Ria Yusian; Fathiah, Fathiah
JOURNAL OF INFORMATICS AND COMPUTER SCIENCE Vol 2, No 2 (2016): Oktober 2016
Publisher : Ubudiyah Indonesia University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33143/jics.Vol2.Iss2.734

Abstract

Plagiarism is the act of intentionally or unintentionally in obtaining ortrying to obtain credit or value to scientific work., citing part or all of thework / or scientific work of others who are recognized as scientific works,co without stating the source appropriately and adequately. Problem ofplagiarism has become a phenomenom that is being discussed inacademic forums. Based on a variety of information about the practice ofplagiarism is increasingly disturbing, this study conducted at the UbudiyahUniversity Indonesia (UUI). This system will implemented the detectionsystem plagiarism that will be creating using a document apllied method ofvector space model to analyze similarities in document displayed on theweb browser. Input on this system is a document in the form of text formatwhith the extention test performed on real data that is usig data documentswith vector space model algorithm value is above 85% to 100% for highlevel document. As for a document with a low degree of similarity valuesbelow 50%.Keyword : Plagiarism, Vector Space Model, Similarity

Page 1 of 2 | Total Record : 13