Journal of Computer Science and Informatics Engineering (J-Cosine) 2022-01-04T11:30:38+08:00 I Wayan Agus Arimbawa Open Journal Systems <p>J-COSINE (Journal of Computer Science and Informatics Engineering) merupakan jurnal dibidang Ilmu Komputer dan Teknik Informatika yang dipublikasi oleh Program Studi Teknik Infroamtika Fakultas Teknik Universitas Mataran dengan <em><strong>online ISSN 2541-0806</strong></em> dan <em><strong>print ISSN &nbsp;2540-8895.&nbsp;</strong></em>J-Cosine juga merupakan&nbsp;&nbsp;<em>blind</em>&nbsp;&nbsp;dan&nbsp;<em>peer-review jurnal</em> yang proses reviewenya dilakukan oleh sekurang-kurangnya &nbsp;2 orang reviewer yang ditujuk oleh&nbsp;associate editor.&nbsp;Jumlah terbitaan dari J-Cosine sebanyak 2 kali dalam setahun.</p> <p>Tujuan&nbsp;&nbsp;utama dari&nbsp;J-Cosine adalah untuk mempublikasikan paper hasil penelitian, inovasi aplikasi, studi perbandingan &nbsp;yang&nbsp;berkualitas baik&nbsp;dan&nbsp;mengikuti&nbsp;perkembangan dan tren teknologi baru dibidang&nbsp;Ilmu Komputer dan Teknik Informatika. Paper yang dipublikasikan pada J-Cosine dapat ditulis dalam bahasa Indonesia atau bahasa Inggris.</p> Keamanan Data Pasien dengan Algoritma Blowfish pada HOTSPODT 2021-12-28T21:27:33+08:00 Nuniek Fahriani Indah Kurniawati <div class="page" title="Page 1"> <div class="section"> <div class="layoutArea"> <div class="column"> <p>At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.</p> </div> </div> </div> </div> 2021-12-28T12:50:53+08:00 Copyright (c) 2021 Nuniek Fahriani, Indah Kurniawati Two Factor Authentication Berbasis SMS pada Layanan Single Sign-On Universitas Mataram 2021-12-29T17:05:56+08:00 Ahmad Zafrullah Mardiansyah Ariyan Zubaidi I Gde Putu Wirarama Wedaswhara W Andy Hidayat Jatmika <p>Security is an important part of electronic transactions. Information systems at Mataram University are generally using the conventional username and password fields to authenticate the user (Single Factor Authentication - SFA). The SFA method is vulnerable to brute force attacks, especially to the Single Sign-On (SSO) service. To prevent brute force attacks, this study proposes an implementation of SMS-based Two Factor Authentication (TFA) toward SSO. This study found that the tests carried out by analyzing the simulation of brute force attacks, attackers could not obtain access to the user accounts. Another test done by the User Experience Questionnaire (UEQ) method found the score on the Pragmatic aspect was 1.927 (Excellent), on the Hedonic aspect it was 1.667 (Excellent), and overall was 1.797 (Excellent).</p> 2021-12-28T17:20:41+08:00 Copyright (c) 2021 Ahmad Zafrullah Mardiansyah, Ariyan Zubaidi, I Gde Putu Wirarama Wedaswhara W, Andy Hidayat Jatmika Android APK Identification using Non Neural Network and Neural Network Classifier 2022-01-01T14:14:06+08:00 Djarot Hindarto Handri Santoso <p>The purpose of this study is to identify Android APK files by classifying them using Artificial Neural Network (ANN) and Non Neural Network (NNN). The ANN is Multi-Layer Perceptron Classifier (MLPC), while the NNN are KNN, SVM, Decision Tree, Logistic Regression and Naïve Bayes methods. The results show that the performance using NNN has decreasing accuracy when training using larger datasets. The use of the K-Nearest Neighbor algorithm with a dataset of 600 APKs achieves an accuracy of 91.2% and dataset of 14170 APKs achieves an accuracy of 88%. The using of the Support Vector Machine algorithm with the 600 APK dataset has an accuracy of 99.1% and the 14170 APK dataset has an accuracy of 90.5%. The using of the Decision Tree algorithm with the 600 APK dataset has an accuracy of 99.2%, the 14170 APK dataset has an accuracy of 90.8%. The experiment using the Multi-Layer Perceptron Classifier has increasing with the 600 APK dataset reaching 99%, the 7000 APK dataset reaching 100% and the 14170 APK dataset reaching 100%.</p> 2021-12-28T12:56:09+08:00 Copyright (c) 2021 Djarot Hindarto, Handri Santoso Analisis Tata Kelola Teknologi Informasi Untuk Mendefinisikan Arsitektur Informasi Dengan Framework COBIT 4.1 (Studi Kasus Instalasi Rawat Jalan RSUD Prov. NTB) 2021-12-29T17:09:47+08:00 Media Isti Azzizah Nadiyasari Agitha Ida Bagus Ketut Widiartha <div class="page" title="Page 1"> <div class="section"> <div class="layoutArea"> <div class="column"> <p>Treatment for outpatient installations (IRJA) NTB provincial hospitals have used hospital management information systems, but this is still not effective. The information system is not effective because registration centred in the main hall. The centralized registration caused the accumulation of patient queues that occurred in each IRJA polyclinic, and this was due to the absence of an integrated queue number between registrations carried out in the main hall and IRJA polyclinics. Therefore, the governance of information architecture processes needs to be applied to optimize information systems. We use COBIT 4.1 to conduct governance. The aim is to get existing and expected outpatients from Prov. NTB Hospital. So, it can help to manage information architecture to perform quality and competitive outpatient services. The results showed the IT processes selected in PO2 (Determine Information Architecture) and AI4 (Activate and Use). We reach the maturity level of all IT processes at level 3 (the specified process) for conditions as they are and 5 (optimized) for conditions that will occur. The level of maturity can help the NTB Provincial Hospital to improve its services.</p> </div> </div> </div> </div> 2021-12-28T13:08:34+08:00 Copyright (c) 2021 Media Isti Azzizah, Nadiyasari Agitha, Ida Bagus Ketut Widiartha Rancang Bangun Sistem Informasi Geografis Untuk Pemetaan Lokasi Tempat Ibadah Di Kota Mataram Menggunakan Metode Extreme Programming 2022-01-01T14:15:12+08:00 Ricky Satria Royana Afwani Sri Endang Anjarwani <p>In Mataram city, finding places of worship is quite difficult for foreigners because they do not know the position/road around them. And currently, the data management of places of worship is still carried out using Ms. Excel by the Departemen Agama NTB which makes data collection ineffective and inefficient in searching and updating existing data. In this final project research, the researcher designed and built a Geographic Information System for Mapping the Location of Places of Worship in Mataram City to provide information and layout of places of worship in Mataram City, and can make it easier for the Ministry of Religion to collect data from the system that makes data management of existing places of worship more effective and efficient. This final project research uses the Extreme Programming (XP) system development method because one of the characteristics of XP itself involves the client during the system development process to minimize errors in the system and according to client needs.</p> 2021-12-28T13:12:47+08:00 Copyright (c) 2021 Ricky Satria, Royana Afwani, Sri Endang Anjarwani Effective Factors Influencing the Intention to Use Citizens Complaint Handling System 2021-12-29T17:08:46+08:00 Nur Shabrina Meutia Apol Pribadi Subriadi <p>The citizen's complaint handling system aims to make citizens easily file a complaint against the condition and development of the city so that it can be followed up immediately, but the implementation of this Smart City program is less than optimal. The real condition shows that there are still many citizens who have not used this application. This study aims to evaluate what factors influence the citizen's intention to use the complaint handling application. The methodology used in this study is a qualitative method with a phenomenological approach. This study conducted in-depth interviews with six research informants, then the results of the interviews were tested and analyzed, and the interview data was encoded. The results of this study found factors that influence the intention to use complaint handling applications. These factors are citizen awareness, social influence, perceived usefulness, and trust. The expected result is a new model that can be implemented to improve the use of complaint handling applications and similar e-government services.&nbsp; &nbsp;</p> 2021-12-28T17:23:43+08:00 Copyright (c) 2021 Nur Shabrina Meutia, Apol Pribadi Subriadi Multi-Projection Segmentation on Dental Cone Beam Computed Tomography Images Using Level Set Method 2021-12-29T17:08:25+08:00 Fahmi Syuhada Rarasmaya Indraswari Agus Zainal Arifin Dini Adni Navastara <p>Segmentation of dental Cone-beam computed tomography (CBCT) images based on Boundary Tracking has been widely used in recent decades. Generally, the process only uses axial projection data of CBCT where the slices image that representing the tip of the tooth object have decreased in contrast which impact to difficult to distinguish with background or other elements. In this paper we propose the multi-projection segmentation method by combining the level set segmentation result on three projections to detect the tooth object more optimally. Multiprojection is performed by decomposing CBCT data which produces three projections called axial, sagittal and coronal projections. Then, the segmentation based on the set level method is implemented on the slices image in the three projections. The results of the three projections are combined to get the final result of this method. This proposed method obtains evaluation results of accuracy, sensitivity, specificity with values of 97.18%, 88.62%, and 97.61%, respectively.</p> 2021-12-28T12:52:35+08:00 Copyright (c) 2021 Fahmi Syuhada, Rarasmaya Indraswari, Agus Zainal Arifin, Dini Adni Navastara Expert System of Anti-Diabetic Medicine Selection 2021-12-29T17:01:35+08:00 Andi Hutami Endang <p class="IEEEAbtract"><span lang="EN-GB">The <span class="hps">Prediction of World Health Organization</span> <span class="hps">(</span>WHO) <span class="hps">estimates that in 2030</span> <span class="hps">the number of diabetics</span> <span class="hps">in</span> <span class="hps">Indonesia reached</span> <span class="hps">approximately</span> <span class="hps">21.3</span> <span class="hps">million</span> <span class="hps">people</span>. Moreover, <span class="hps">the development of</span> <span class="hps">medicine</span> <span class="hps">consumed by diabetics</span> <span class="hps">also</span> <span class="hps">varies</span>. <span class="hps">In this paper</span>, <span class="hps">we present a</span> <span class="hps">system</span> <span class="hps">that</span> <span class="hps">represents a</span> <span class="hps">diabetes</span> <span class="hps">expert</span> <span class="hps">into</span> <span class="hps">a</span> <span class="hps">knowledge based on the domain</span> <span class="hps">ontology</span>. T<span class="hps">he early stage</span> <span class="hps">of the system</span> <span class="hps">is developing</span> <span class="hps">drugs ontology</span> (including <span class="hps">functions</span> <span class="hps">and</span> <span class="hps">contraindications)</span> <span class="hps">and</span> <span class="hps">patient</span> <span class="hps">ontology</span>. <span class="hps">Then, matching a</span> <span class="hps">weighted</span> <span class="hps">ontology</span> <span class="hps">will give drugs recommendations that are suitable with</span> <span class="hps">the patient's condition</span>. <span class="hps">The system is</span> <span class="hps">able to analyze diabetes symptoms to give drugs recommendations to the patient</span>. </span></p> 2021-12-28T12:57:44+08:00 Copyright (c) 2021 Ekstraksi Fitur Citra Radiografi Thorax Menggunakan DWT dan Moment Invariant 2022-01-01T14:04:15+08:00 I Gede Pasek Suta Wijaya Ditha Nurcahya Avianty Fitri Bimantoro Rina Lestari <p>COVID-19 is an infectious disease caused by the coronavirus family, namely severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The fastest method to identify the presence of this virus is a rapid antibody or antigen test, but confirming the positive status of a COVID-19 patient requires further examination. Lung examination using chest X-ray images taken through X-rays of COVID-19 patients can be one way to confirm the patient's condition before/after the rapid test. This paper proposes a feature extraction model to detect COVID-19 through chest radiography using a combination of Discrete Wavelet Transform (DWT) and Moment Invariant features. In this case, haar wavelet transform and seven Hu moments were used to extract image features in order to find unique features that represent chest radiographic images as suspected COVID-19, pneumonia, or normal. To find out the uniqueness of the proposed features, it is coupled with the kNN and generic ANN classification techniques. Based on the performance parameters assessed, it turns out that the wavelet-based and moment invariant thorax radiographic image feature model can be used as a unique feature associated with three categories: Normal, Pneumonia, and Covid-19. This is indicated by the accuracy value of 82.7% in the kNN classification technique and the accuracy, precision, and recall of 86%, 87%, and 86% respectively with the ANN classification technique.</p> 2021-12-28T13:01:55+08:00 Copyright (c) 2021 I Gede Pasek Suta Wijaya, Ditha Nurcahya Avianty, Fitri Bimantoro, Rina Lestari Predict A Person's Personality Based On The Shape of Handwriting of The Letters "i", "o", and "t" Using The Levenberg Marquardt Backpropagation Method 2022-01-04T11:30:38+08:00 Annisa Mujahidah Robbani I Gede Pasek Suta Wijaya Fitri Bimantoro Heri Wijayanto <p>The literature shows that Graphology is common and relatively useful in our life. For example, as one of the job requirements. Professional organizations hire a professional handwriting analyst called Graphologist to analyze the characteristic traits of the candidates by identified their handwriting. However, the accuracy of handwriting analysis depends on how skilled the graphologist is, two graphologists which predict the same handwriting may give us a different result of the prediction. To improve the accuracy, we develop a system that can automatically predict a person’s personality based on the shape of the handwriting of the letters "i", "o", and "t" using the Levenberg Marquardt Backpropagation method. Based on this research we got the maximum accuracy by using 2 hidden layers. We got 71,42% of accuracy for the letter “i”, 76,92% of accuracy for the letter “o”, and 60% of accuracy for letter the “t”.</p> 2021-12-28T13:06:12+08:00 Copyright (c) 2021 Annisa Mujahidah Robbani, I Gede Pasek Suta Wijaya, Fitri Bimantoro