Journal of Computer Science and Informatics Engineering (J-Cosine) http://jcosine.if.unram.ac.id/index.php/jcosine <p>J-COSINE (Journal of Computer Science and Informatics Engineering) merupakan jurnal dibidang Ilmu Komputer dan Teknik Informatika yang dipublikasi oleh Program Studi Teknik Infroamtika Fakultas Teknik Universitas Mataran dengan <em><strong>online ISSN 2541-0806</strong></em> dan <em><strong>print ISSN &nbsp;2540-8895.&nbsp;</strong></em>J-Cosine juga merupakan&nbsp;&nbsp;<em>blind</em>&nbsp;&nbsp;dan&nbsp;<em>peer-review jurnal</em> yang proses reviewenya dilakukan oleh sekurang-kurangnya &nbsp;2 orang reviewer yang ditujuk oleh&nbsp;associate editor.&nbsp;Jumlah terbitaan dari J-Cosine sebanyak 2 kali dalam setahun.</p> <p>Tujuan&nbsp;&nbsp;utama dari&nbsp;J-Cosine adalah untuk mempublikasikan paper hasil penelitian, inovasi aplikasi, studi perbandingan &nbsp;yang&nbsp;berkualitas baik&nbsp;dan&nbsp;mengikuti&nbsp;perkembangan dan tren teknologi baru dibidang&nbsp;Ilmu Komputer dan Teknik Informatika. Paper yang dipublikasikan pada J-Cosine dapat ditulis dalam bahasa Indonesia atau bahasa Inggris.</p> en-US jcosine@unram.ac.id (I Wayan Agus Arimbawa) rama@unram.ac.id (Ramaditia Dwiyansaputra) Sun, 30 Jun 2024 23:44:09 +0800 OJS 3.1.2.4 http://blogs.law.harvard.edu/tech/rss 60 Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security at the University of Mataram’s Electronic Signature (E-Sign) http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/593 <p>Electronic signatures have been widely used for administrative purposes since 2020, especially when activities from home are a priority. University of Mataram is one of the state universities that provides electronic signature facilities (E-Sign) for its academic community. The ease of using E-Sign has its own obstacles, one of which is in terms of security protection. Protection in the information security system has a role to take preventive action if the worst scenario occurs to the information system, such as unauthorized access by hackers. Naturally, each signature has been given information related to several things, namely who signed, when it was signed, information for signature purposes, and hash values that can be used to ensure the integrity of the data from the signature. When unauthorized access occurs, hackers can create an identity using the identity of a particular person. This makes E-Sign validation difficult and potentially misused. In this study, a scheme for securing user identity is proposed using GNU Privacy Guard (GPG) to encrypt E-Sign data. The encryption process is carried out with two layers of public-private key cryptography combined with the PGP Key Server.</p> Ahmad Zafrullah Mardiansyah, Ariyan Zubaidi, Andy Hidayat Jatmika, Raphael Bianco Huwae Copyright (c) 2024 Ahmad Zafrullah Mardiansyah, Ariyan Zubaidi, Andy Hidayat Jatmika, Raphael Bianco Huwae http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/593 Sun, 30 Jun 2024 22:41:14 +0800 Metoda Kombinasi Modulasi Pergeseran Tingkat Lebar Pulsa dengan Variabel Frekuensi Pembawa Pada Inverter Model Jembatan http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/595 <p>Switching is very important in energy conversion systems. The conversion process requires a good and reliable method. This research&nbsp; identifies methods or techniques for pulse width modulation. This technique proposes a new model of modulation technique, namely by combining level shifted modulation techniques, and adjusting the frequency in such a way that it produces a signal that suits the inverter's needs. The inverter tested in this research is an inverter with a bridge model configuration. The proposed research and methods were verified using MATLAB and Simulink software. The results obtained are the ratio of total harmonic distortion (THD)&nbsp; are 25.07%, 76, 66% and 9.183%, respectively</p> I Ketut Wiryajati, I Nyoman Wahyu Satiawan, Ida Bagus Fery Citarsa, I Made Budi Suksmadana, Supriono Copyright (c) 2024 I Ketut Wiryajati, I Nyoman Wahyu Satiawan, Ida Bagus Fery Citarsa, I Made Budi Suksmadana, Supriono http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/595 Sun, 30 Jun 2024 22:47:54 +0800 Adaptive Classroom Berbasis IoT, Manajemen Penggunaan Air Conditioner Secara Otomatis http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/331 <p>Temperature and humidity are one of the comfort factors. According to the SNI standard, the comfortable temperature range is at 20.5°C-27.1°C. If the temperature is above 27.1°C, an Air Conditioner (AC) is needed to get the effective thermal comfort. AC installed in each PSTI FT UNRAM classroom is operated manually. This research implements Internet of Things (IoT) for automatic AC usage management. This IoT device is made using PIR sensor and DHT22 sensor, the MQTT protocol for data communication between the IoT device and the web system. Based on the testing scenario for the classroom containing students and the empty classroom that has been done, the IoT device is able to manage the AC usage automatically, so that the classroom can be called adaptive classroom. From the MOS testing that has been done, a value of 4.57 from a scale of 5, the system is feasible to use.</p> Muhamad Pahrurrozi, I Gde Putu Wirarama Wedashwara W, Ariyan Zubaidi Copyright (c) 2024 Muhamad Pahrurrozi, I Gde Putu Wirarama Wedashwara W, Ariyan Zubaidi http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/331 Sun, 30 Jun 2024 23:55:53 +0800 Rancang Bangun Purwarupa Simulasi Sistem Keamanan Rumah Berbasis Internet of Things http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/217 <p>The use of information technology has spread to all fields, for example in the field of security using the Internet of Things technology. One of the places that need to be given security is the home, so that in this study prototypes of home security systems using the Internet of Things have been made with the aim of providing information to homeowners in the event of infiltration through windows or doors, gas leaks and fires. The tools used are Arduino Mega 2560 as a microcontroller, gas sensor, fire sensor, magnetic switch sensor, RFID, keypad, and selenoid. The home security system is made so that homeowners can control the condition of the home. The results of this study are that the home security systems that are made can run well and can be integrated with home security information systems. Sensors can detect gas leaks, fires, and doors or windows open when the security system is active. Homeowners can only turn off the home security system and unlock the door by using RFID tags that have registered IDs and correct passwords. Home security systems can also turn on alarms and send notifications to homeowners, fire stations and police stations in the event of a fire, gas leak or window or door that is opened when the security system is active.</p> Muhammad Harpan Teguh Saputra, I Wayan Agus Arimbawa, I Gede Pasek Suta Wijaya Copyright (c) 2024 Muhammad Harpan Teguh Saputra, I Wayan Agus Arimbawa, I Gede Pasek Suta Wijaya http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/217 Sun, 30 Jun 2024 23:56:28 +0800 Rancang Bangun Sistem Informasi Pelaporan Penyelenggaraan Pemerintahan Daerah (SIPPDA) Provinsi Nusa Tenggara Barat Berbasis Website http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/544 <p class="Abstract"><em><span lang="EN-US">The Government Office and Regional Development Agency (OTDA) have the main task of implementing regional autonomy by preparing the Regional Government Administration Report (LPPD). The preparation of LPPD for the NTB Province is still done manually, including the collection of data for each government affair and the calculation of government performance achievements found in various indicators, resulting in a lengthy data collection process for reporting. With the advancement of information technology, a solution can be provided to address the aforementioned issues by developing a web-based Local Government Administration Reporting Information System (SIPPDA) using the extreme programming development method. The system development is carried out using the Laravel framework. During the testing phase, unit testing is performed to verify the functionality of the system, and the results indicate that it runs smoothly without errors. User Acceptance Testing (UAT) is then conducted in three iterations with different numbers of respondents. In the first iteration, with 5 respondents, the acceptance rate is 73.71%. In the second iteration, with 8 respondents, the rate is 89.86%, and in the third iteration, with 5 respondents, the rate is 79.5%.</span></em></p> Anisah Mutmainah, Nadiyasari Agitha, Royana Afwani Copyright (c) 2024 Anisah Mutmainah, Nadiyasari Agitha, Royana Afwani http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/544 Sun, 30 Jun 2024 22:37:49 +0800 Rancang Bangun Sistem Informasi Baitulmal “Masjid Jalan Cahaya” Berbasis Website Menggunakan Metode Service Oriented Architecture (S http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/558 <p>Aside from being a center of worship, the mosque can also function as a place to carry out social muamalah worship. Based on the function, of course the mosque has an agenda or charity activities that are held at certain times. It is the same with the fundraising or crowdfunding system run by Baitulmal "Masjid Jalan Cahaya". In its application, the information distributed on social media has not been modified on one platform, there is overlap between program uploads with one another, this is of course an obstacle for donors to find out which mosque programs are running. To answer these needs, this research builds a website-based Baitulmal information system "Masjid Jalan Cahaya" using the Laravel framework which is expected to be a means for mosques to convey all information about costs or funds needed more broadly, quickly, safely, real-time and transparent. In its development, the Baitulmal information system "Masjid Jalan Cahaya" will be integrated with other mosque websites, such as mosque company profiles, Rumah Qur'an and Baitul muamalah mosques, so that continuous system development is needed that makes it easier for each field to carry out data transactions. Departing from this, this information system applies the Service Oriented Architecture (SOA) approach, where this approach develops software using services. In this study, 3 main services were obtained, namely Charity services, Reports, and Tags/Categories. As well as service users for admin, payment and management files which are additional to the baitulmal website. For scalability testing, the System Usability Testing method was used which obtained a result of 87% in the Best Imaginable category, indicating that this system has good quality to use..</p> Sekarsari Bintang Solehah, Noor Alamsyah, Sri Endang Anjarwani Copyright (c) 2024 Sekarsari Bintang Solehah, Noor Alamsyah, Sri Endang Anjarwani http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/558 Sun, 30 Jun 2024 22:40:22 +0800 Studi Pengembangan Sistem Pengenalan Individu Sapi Berbasis Biometrik Muzzle Menggunakan Model Mobilenetv2 http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/594 <p>In general, in cattle farming, individual identification is often done using text numbers on the cattle's ears, which is considered efficient. However, field observations reveal limitations of this technique, particularly in terms of data redundancy and new registration validation. Sometimes, errors can occur when cattle identity numbers are exchanged between the farm and the livestock market. Therefore, an intelligent biometric identification system attached to each cattle, such as the pattern on the muzzle, similar to human fingerprints, is needed. In this study, we collected and published primary cattle muzzle data as a dataset in a cloud repository. We also implemented the use of muzzle image data with a convolutional neural network algorithm in TensorFlow as a step for further development. The recognition implementation using the MobileNetV2 architecture resulted in an 83% accuracy rate for 30 individual cattle classes out of a total of 210 primary dataset divided into training and testing data.</p> Giri Wahyu Wiriasto, Misbahuddin, A. Sjamjiar Rachman, Muhamad Syamsu Iqbal, Djul Fikry Budiman, Lalu Ahmad Syamsul Irfan Akbar, Bagi Hartawan, Eko Prasetyo Wicaksono Copyright (c) 2024 Giri Wahyu Wiriasto, Misbahuddin, A. Sjamjiar Rachman, Muhamad Syamsu Iqbal, Djul Fikry Budiman, Lalu Ahmad Syamsul Irfan Akbar, Bagi Hartawan, Eko Prasetyo Wicaksono http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/594 Sun, 30 Jun 2024 22:42:54 +0800 Analysis of Android Malware "Undangan Pernikahan.Apk" Using Static and Dynamic Methods http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/599 <p><strong>This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and impact of the malware after installation on an Android device. The research shows that this malware covertly steals user credentials through several vulnerabilities. The "UndanganPernikahan" malware is a type of spyware disguised as a wedding invitation and runs in the background without the user's knowledge. To avoid similar malware infections, it is recommended to always update the system and applications, only download applications from trusted sources, and conduct digital security training.</strong></p> Muhammad Syafa Asgani, Raphael Bianco Huwae, Andy Hidayat Jatmika Copyright (c) 2024 Muhammad Syafa Asgani Muhammad Syafa Asgani, Raphael Bianco Huwae, Andy Hidayat Jatmika http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/599 Sun, 30 Jun 2024 22:52:43 +0800 Sentiment Analysis on the Impelementation of the 2024 Presidential Election on X Application Using Naive Bayes and Support Vector Machine (SVM) Methods http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/597 <p><strong>This article discusses sentiment analysis of the 2024 Presidential Election through data collected from platform X, this research aims to identify and classify positive, negative, and neutral sentiments in X related to the election. This research uses scoring and textblob methods. Where the scoring method is the process of deeply analyzing sentiment and then giving the sentiment value of each data comment and accumulating it. While the textblob method is a tool used specifically for text processing that can provide sentiment for each comment. The results of the analysis provide in-depth understanding of the responses and views of the community manifested in digital space. Sentiment analysis can serve as a guide to understanding the dynamics of public opinion during the election process and its potential to influence public participation and trust in the democratic system. The practical implications of this research include the development of more effective political communication strategies based on an understanding of the sentiments that develop on X.</strong></p> I Dewa Made Aditya Prasantasya Dewa, Ida Bagus Ketut Widiartha, Santi Ika Murpratiwi Copyright (c) 2024 I Dewa Made Aditya Prasantasya Dewa, Ida Bagus Ketut Widiartha, Santi Ika Murpratiwi http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/597 Sun, 30 Jun 2024 22:50:32 +0800 Klasifikasi Citra Lubang pada Permukaan Jalan Beraspal dengan Metode Convolutional Neural Networks (CNN) http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/557 <p>A pothole is a bowl-shaped indentation in the road surface, less than 1 meter in diameter. The presence of potholes on the highway can endanger the safety of road users, so repairs need to be done as soon as possible. Images of potholed roads have high complexity, variations consisting of color contrast, hole size, presence of puddles or not, lighting when taking pictures, background and others. For this reason, an approach is needed that can classify images with a high degree of variation by extracting the important information contained in them. Judging from the potential success of using the Convolutional Neural Networks (CNN) approach in identifying images of potholes that will be reported for entry into the Public Works Service's road improvement record, the authors propose the idea of "Pothole Image Classification on Asphalt Road Surfaces with the Convolutional Neural Networks (CNN) Method”.</p> Ni Nyoman Citariani Sumartha, I Gede Pasek Suta Wijaya, Fitri Bimantoro, Gibran Satya Nugraha Copyright (c) 2024 Ni Nyoman Citariani Sumartha, I Gede Pasek Suta Wijaya, Fitri Bimantoro http://jcosine.if.unram.ac.id/index.php/jcosine/article/view/557 Sun, 30 Jun 2024 23:48:03 +0800