http://jcosine.if.unram.ac.id/index.php/jcosine/issue/feed Journal of Computer Science and Informatics Engineering (J-Cosine) 2024-07-13T23:27:13+08:00 I Wayan Agus Arimbawa jcosine@unram.ac.id Open Journal Systems <p>J-COSINE (Journal of Computer Science and Informatics Engineering) merupakan jurnal dibidang Ilmu Komputer dan Teknik Informatika yang dipublikasi oleh Program Studi Teknik Infroamtika Fakultas Teknik Universitas Mataran dengan <em><strong>online ISSN 2541-0806</strong></em> dan <em><strong>print ISSN &nbsp;2540-8895.&nbsp;</strong></em>J-Cosine juga merupakan&nbsp;&nbsp;<em>blind</em>&nbsp;&nbsp;dan&nbsp;<em>peer-review jurnal</em> yang proses reviewenya dilakukan oleh sekurang-kurangnya &nbsp;2 orang reviewer yang ditujuk oleh&nbsp;associate editor.&nbsp;Jumlah terbitaan dari J-Cosine sebanyak 2 kali dalam setahun.</p> <p>Tujuan&nbsp;&nbsp;utama dari&nbsp;J-Cosine adalah untuk mempublikasikan paper hasil penelitian, inovasi aplikasi, studi perbandingan &nbsp;yang&nbsp;berkualitas baik&nbsp;dan&nbsp;mengikuti&nbsp;perkembangan dan tren teknologi baru dibidang&nbsp;Ilmu Komputer dan Teknik Informatika. Paper yang dipublikasikan pada J-Cosine dapat ditulis dalam bahasa Indonesia atau bahasa Inggris.</p> http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/593 Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security at the University of Mataram’s Electronic Signature (E-Sign) 2024-07-13T23:03:17+08:00 Ahmad Zafrullah Mardiansyah zaf@unram.ac.id Ariyan Zubaidi zubaidi13@unram.ac.id Andy Hidayat Jatmika andy@unram.ac.id Raphael Bianco Huwae raphael.bianco.huwae@unram.ac.id <p>Electronic signatures have been widely used for administrative purposes since 2020, especially when activities from home are a priority. University of Mataram is one of the state universities that provides electronic signature facilities (E-Sign) for its academic community. The ease of using E-Sign has its own obstacles, one of which is in terms of security protection. Protection in the information security system has a role to take preventive action if the worst scenario occurs to the information system, such as unauthorized access by hackers. Naturally, each signature has been given information related to several things, namely who signed, when it was signed, information for signature purposes, and hash values that can be used to ensure the integrity of the data from the signature. When unauthorized access occurs, hackers can create an identity using the identity of a particular person. This makes E-Sign validation difficult and potentially misused. In this study, a scheme for securing user identity is proposed using GNU Privacy Guard (GPG) to encrypt E-Sign data. The encryption process is carried out with two layers of public-private key cryptography combined with the PGP Key Server.</p> 2024-06-30T22:41:14+08:00 Copyright (c) 2024 Ahmad Zafrullah Mardiansyah, Ariyan Zubaidi, Andy Hidayat Jatmika, Raphael Bianco Huwae http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/595 Metoda Kombinasi Modulasi Pergeseran Tingkat Lebar Pulsa dengan Variabel Frekuensi Pembawa Pada Inverter Model Jembatan 2024-07-13T23:15:38+08:00 I Ketut Wiryajati kjatiwirya@unram.ac.id I Nyoman Wahyu Satiawan kjatiwirya@unram.ac.id Ida Bagus Fery Citarsa kjatiwirya@unram.ac.id I Made Budi Suksmadana kjatiwirya@unram.ac.id Supriono kjatiwirya@unram.ac.id <p>Switching is very important in energy conversion systems. The conversion process requires a good and reliable method. This research&nbsp; identifies methods or techniques for pulse width modulation. This technique proposes a new model of modulation technique, namely by combining level shifted modulation techniques, and adjusting the frequency in such a way that it produces a signal that suits the inverter's needs. The inverter tested in this research is an inverter with a bridge model configuration. The proposed research and methods were verified using MATLAB and Simulink software. The results obtained are the ratio of total harmonic distortion (THD)&nbsp; are 25.07%, 76, 66% and 9.183%, respectively</p> 2024-06-30T22:47:54+08:00 Copyright (c) 2024 I Ketut Wiryajati, I Nyoman Wahyu Satiawan, Ida Bagus Fery Citarsa, I Made Budi Suksmadana, Supriono http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/331 Adaptive Classroom Berbasis IoT, Manajemen Penggunaan Air Conditioner Secara Otomatis 2024-07-13T23:20:52+08:00 Muhamad Pahrurrozi muhamadpahrurrozi@gmail.com I Gde Putu Wirarama Wedashwara W wirarama@unram.ac.id Ariyan Zubaidi zubaidi13@unram.ac.id <p>Temperature and humidity are one of the comfort factors. According to the SNI standard, the comfortable temperature range is at 20.5°C-27.1°C. If the temperature is above 27.1°C, an Air Conditioner (AC) is needed to get the effective thermal comfort. AC installed in each PSTI FT UNRAM classroom is operated manually. This research implements Internet of Things (IoT) for automatic AC usage management. This IoT device is made using PIR sensor and DHT22 sensor, the MQTT protocol for data communication between the IoT device and the web system. Based on the testing scenario for the classroom containing students and the empty classroom that has been done, the IoT device is able to manage the AC usage automatically, so that the classroom can be called adaptive classroom. From the MOS testing that has been done, a value of 4.57 from a scale of 5, the system is feasible to use.</p> 2024-06-30T23:55:53+08:00 Copyright (c) 2024 Muhamad Pahrurrozi, I Gde Putu Wirarama Wedashwara W, Ariyan Zubaidi http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/217 Rancang Bangun Purwarupa Simulasi Sistem Keamanan Rumah Berbasis Internet of Things 2024-07-13T23:16:07+08:00 Muhammad Harpan Teguh Saputra saputraharpan25@gmail.com I Wayan Agus Arimbawa arimbawa@unram.ac.id I Gede Pasek Suta Wijaya gpsutawijaya@te.ftunram.ac.id <p>The use of information technology has spread to all fields, for example in the field of security using the Internet of Things technology. One of the places that need to be given security is the home, so that in this study prototypes of home security systems using the Internet of Things have been made with the aim of providing information to homeowners in the event of infiltration through windows or doors, gas leaks and fires. The tools used are Arduino Mega 2560 as a microcontroller, gas sensor, fire sensor, magnetic switch sensor, RFID, keypad, and selenoid. The home security system is made so that homeowners can control the condition of the home. The results of this study are that the home security systems that are made can run well and can be integrated with home security information systems. Sensors can detect gas leaks, fires, and doors or windows open when the security system is active. Homeowners can only turn off the home security system and unlock the door by using RFID tags that have registered IDs and correct passwords. Home security systems can also turn on alarms and send notifications to homeowners, fire stations and police stations in the event of a fire, gas leak or window or door that is opened when the security system is active.</p> 2024-06-30T23:56:28+08:00 Copyright (c) 2024 Muhammad Harpan Teguh Saputra, I Wayan Agus Arimbawa, I Gede Pasek Suta Wijaya http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/544 Rancang Bangun Sistem Informasi Pelaporan Penyelenggaraan Pemerintahan Daerah (SIPPDA) Provinsi Nusa Tenggara Barat Berbasis Website 2024-07-13T23:16:47+08:00 Anisah Mutmainah anisamutmainah.am@gmail.com Nadiyasari Agitha nadiya@unram.ac.id Royana Afwani royana@unram.ac.id <p class="Abstract"><em><span lang="EN-US">The Government Office and Regional Development Agency (OTDA) have the main task of implementing regional autonomy by preparing the Regional Government Administration Report (LPPD). The preparation of LPPD for the NTB Province is still done manually, including the collection of data for each government affair and the calculation of government performance achievements found in various indicators, resulting in a lengthy data collection process for reporting. With the advancement of information technology, a solution can be provided to address the aforementioned issues by developing a web-based Local Government Administration Reporting Information System (SIPPDA) using the extreme programming development method. The system development is carried out using the Laravel framework. During the testing phase, unit testing is performed to verify the functionality of the system, and the results indicate that it runs smoothly without errors. User Acceptance Testing (UAT) is then conducted in three iterations with different numbers of respondents. In the first iteration, with 5 respondents, the acceptance rate is 73.71%. In the second iteration, with 8 respondents, the rate is 89.86%, and in the third iteration, with 5 respondents, the rate is 79.5%.</span></em></p> 2024-06-30T22:37:49+08:00 Copyright (c) 2024 Anisah Mutmainah, Nadiyasari Agitha, Royana Afwani http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/558 Rancang Bangun Sistem Informasi Baitulmal “Masjid Jalan Cahaya” Berbasis Website Menggunakan Metode Service Oriented Architecture (S 2024-07-13T23:14:33+08:00 Sekarsari Bintang Solehah sekarsaribintang@gmail.com Noor Alamsyah nooralamsyah@unram.ac.id Sri Endang Anjarwani endang@unram.ac.id <p>Aside from being a center of worship, the mosque can also function as a place to carry out social muamalah worship. Based on the function, of course the mosque has an agenda or charity activities that are held at certain times. It is the same with the fundraising or crowdfunding system run by Baitulmal "Masjid Jalan Cahaya". In its application, the information distributed on social media has not been modified on one platform, there is overlap between program uploads with one another, this is of course an obstacle for donors to find out which mosque programs are running. To answer these needs, this research builds a website-based Baitulmal information system "Masjid Jalan Cahaya" using the Laravel framework which is expected to be a means for mosques to convey all information about costs or funds needed more broadly, quickly, safely, real-time and transparent. In its development, the Baitulmal information system "Masjid Jalan Cahaya" will be integrated with other mosque websites, such as mosque company profiles, Rumah Qur'an and Baitul muamalah mosques, so that continuous system development is needed that makes it easier for each field to carry out data transactions. Departing from this, this information system applies the Service Oriented Architecture (SOA) approach, where this approach develops software using services. In this study, 3 main services were obtained, namely Charity services, Reports, and Tags/Categories. As well as service users for admin, payment and management files which are additional to the baitulmal website. For scalability testing, the System Usability Testing method was used which obtained a result of 87% in the Best Imaginable category, indicating that this system has good quality to use..</p> 2024-06-30T22:40:22+08:00 Copyright (c) 2024 Sekarsari Bintang Solehah, Noor Alamsyah, Sri Endang Anjarwani http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/594 Studi Pengembangan Sistem Pengenalan Individu Sapi Berbasis Biometrik Muzzle Menggunakan Model Mobilenetv2 2024-07-13T23:19:24+08:00 Giri Wahyu Wiriasto giriwahyuwiriasto@unram.ac.id Misbahuddin misbahuddin@unram.ac.id A. Sjamjiar Rachman sjamsjiar@unram.ac.id Muhamad Syamsu Iqbal msiqbal@unram.ac.id Djul Fikry Budiman jodinheva@gmail.com Lalu Ahmad Syamsul Irfan Akbar irfan@unram.ac.id Bagi Hartawan bagihartawan@gmail.com Eko Prasetyo Wicaksono ekoprasetyo@gmail.com <p>In general, in cattle farming, individual identification is often done using text numbers on the cattle's ears, which is considered efficient. However, field observations reveal limitations of this technique, particularly in terms of data redundancy and new registration validation. Sometimes, errors can occur when cattle identity numbers are exchanged between the farm and the livestock market. Therefore, an intelligent biometric identification system attached to each cattle, such as the pattern on the muzzle, similar to human fingerprints, is needed. In this study, we collected and published primary cattle muzzle data as a dataset in a cloud repository. We also implemented the use of muzzle image data with a convolutional neural network algorithm in TensorFlow as a step for further development. The recognition implementation using the MobileNetV2 architecture resulted in an 83% accuracy rate for 30 individual cattle classes out of a total of 210 primary dataset divided into training and testing data.</p> 2024-06-30T22:42:54+08:00 Copyright (c) 2024 Giri Wahyu Wiriasto, Misbahuddin, A. Sjamjiar Rachman, Muhamad Syamsu Iqbal, Djul Fikry Budiman, Lalu Ahmad Syamsul Irfan Akbar, Bagi Hartawan, Eko Prasetyo Wicaksono http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/599 Analysis of Android Malware "Undangan Pernikahan.Apk" Using Static and Dynamic Methods 2024-07-13T23:27:13+08:00 Muhammad Syafa Asgani syafaazgani27@gmail.com Raphael Bianco Huwae syafaazgani27@gmail.com Andy Hidayat Jatmika syafaazgani27@gmail.com <p><strong>This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and impact of the malware after installation on an Android device. The research shows that this malware covertly steals user credentials through several vulnerabilities. The "UndanganPernikahan" malware is a type of spyware disguised as a wedding invitation and runs in the background without the user's knowledge. To avoid similar malware infections, it is recommended to always update the system and applications, only download applications from trusted sources, and conduct digital security training.</strong></p> 2024-06-30T22:52:43+08:00 Copyright (c) 2024 Muhammad Syafa Asgani Muhammad Syafa Asgani, Raphael Bianco Huwae, Andy Hidayat Jatmika http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/597 Sentiment Analysis on the Impelementation of the 2024 Presidential Election on X Application Using Naive Bayes and Support Vector Machine (SVM) Methods 2024-07-09T11:26:45+08:00 I Dewa Made Aditya Prasantasya Dewa aditya.prasantasia10@gmail.com Ida Bagus Ketut Widiartha widhi@unram.ac.id Santi Ika Murpratiwi santiika@staff.unram.ac.id <p><strong>This article discusses sentiment analysis of the 2024 Presidential Election through data collected from platform X, this research aims to identify and classify positive, negative, and neutral sentiments in X related to the election. This research uses scoring and textblob methods. Where the scoring method is the process of deeply analyzing sentiment and then giving the sentiment value of each data comment and accumulating it. While the textblob method is a tool used specifically for text processing that can provide sentiment for each comment. The results of the analysis provide in-depth understanding of the responses and views of the community manifested in digital space. Sentiment analysis can serve as a guide to understanding the dynamics of public opinion during the election process and its potential to influence public participation and trust in the democratic system. The practical implications of this research include the development of more effective political communication strategies based on an understanding of the sentiments that develop on X.</strong></p> 2024-06-30T22:50:32+08:00 Copyright (c) 2024 I Dewa Made Aditya Prasantasya Dewa, Ida Bagus Ketut Widiartha, Santi Ika Murpratiwi http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/557 Klasifikasi Citra Lubang pada Permukaan Jalan Beraspal dengan Metode Convolutional Neural Networks (CNN) 2024-07-13T23:19:46+08:00 Ni Nyoman Citariani Sumartha citariani.sumartha@gmail.com I Gede Pasek Suta Wijaya gpsutawijaya@unram.ac.id Fitri Bimantoro bimo@unram.ac.id Gibran Satya Nugraha gibransn@unram.ac.id <p>A pothole is a bowl-shaped indentation in the road surface, less than 1 meter in diameter. The presence of potholes on the highway can endanger the safety of road users, so repairs need to be done as soon as possible. Images of potholed roads have high complexity, variations consisting of color contrast, hole size, presence of puddles or not, lighting when taking pictures, background and others. For this reason, an approach is needed that can classify images with a high degree of variation by extracting the important information contained in them. Judging from the potential success of using the Convolutional Neural Networks (CNN) approach in identifying images of potholes that will be reported for entry into the Public Works Service's road improvement record, the authors propose the idea of "Pothole Image Classification on Asphalt Road Surfaces with the Convolutional Neural Networks (CNN) Method”.</p> 2024-06-30T23:48:03+08:00 Copyright (c) 2024 Ni Nyoman Citariani Sumartha, I Gede Pasek Suta Wijaya, Fitri Bimantoro