cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota samarinda,
Kalimantan timur
INDONESIA
International Journal of Computing and Informatics (IJCANDI)
Published by Universitas Mulawarman
ISSN : 25022334     EISSN : -     DOI : -
IJCANDI (INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS) ISSN: 2502-2334 is a peer reviewed open-access journal published four times a year (February, May, August, November) in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in computing and informatics. All the papers are refereed by two international reviewers, accepted papers will be available on line (free access), and no publication fee for authors. IJCANDI is organized by Faculty of Computer Science and Information Technology, Computer Science and Information Technology Department - Universitas Mulawarman, Faculty of Computing and Informatics - Universiti Malaysia Sabah, and Faculty of Computer Science, Universitas Muslim Indonesia.
Arjuna Subject : -
Articles 17 Documents
Hybrid Methods of Cipher-text and RSA Cryptographic Algorithm Using Classical Vigenère Siska Anraeni; Herdianti Herdianti; Mursyid Mursyid
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 2 (2016): May 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1230.064 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

Maintaining the security of messages is a very important thing both within an organization and the personal especially in the age of information technology today. In order to the sent message does not fall into the one’s hands who are not interested, then encryption should be created to maintain the confidentiality of a message remains secure. Classical cryptography method using Vigenère Cipher and RSA (Riverst Shamir Adleman) is one of securing methods which will be used. In this case, the initial process is doing encryption on Vigenère cipher that produces a temporary ciphertext. The temporary ciphertext will be a plaintext on the RSA algorithm and then encrypted again to produce the actual ciphertext. Merging these two methods produces a ciphertext that is more powerful and difficult to solve.
Towards a Web Based Adaptive and Intelligent Tutoring System Jose Noguera; Foluso Emmanuel Ayeni; Sena Okuboyejo; Sumana Adusumilli
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2017): February 2017
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

E-Learning provides convenient and cost effective education. Learning management systems (LMSs) like Blackboard and Moodle are common platforms. They support teachers in several ways including creating online courses. However, these systems do not consider the individual differences of students and do not adapt according to their needs. To be highly useful, these systems should be built on self-contained and reusable learning objects (LOs) using adaptive hypermedia technologies. Adaptive hypermedia systems apply different forms of user models to contents and links. This paper presents the architecture, design and significance of web-based adaptive and intelligent learning system that optimizes individual learning performance. The system efficiently integrates reusable learning objects and adaptive hypermedia technologies.
Implementation of Bandwidth Management Authentication Aulia Rahman; Haviluddin Haviluddin
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2016): February 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1436.166 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

An internet traffic service mechanism includes monitoring and network security is indispensable. The main purpose of network monitoring is bandwidth optimizing and maintaining network security. This paper has described and implemented Remote Authentication Dial-In User Service (RADIUS) protocol and Authentication, Authorization and Accounting (AAA) server integrated with Mikrotik. The purpose of this article deal with the implementation of bandwidth management, which includes LAN (Local Area Network) and Wi-Fi (Wireless Fidelity) in Universitas Mulawarman. Based on experiment, the system is simple and easy to be used that controls and allocates bandwidth to users (lecturers, staff, and students) as they authenticate with LAN and Wi-Fi. Furthermore, network security perspective shows that users who are not registered to use the internet at the Universitas Mulawarman could be maintained as well.
Telemedicine Diffusion in a Developing Country: A case of Senegal Femi Ekanoye; Foluso Emmanuel Ayeni; Temitope Olokunde; Vekima Nina; Carole Donalds; Victor Mbarika
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2017): February 2017
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Senegal is located in West Africa where health care resources are extremely limited. Although it is improving each day, many say that an even bigger improvement is needed to decrease the high mortality rate, and ensure good health countrywide. Several factors justify the efficient application of Telemedicine in Sub-Saharan Africa (SSA)  to augment the declining health care delivery system in that region of the world. In doing research, telemedicine, along with other solutions, play a huge role in ensuring this plan is effective because of its convenience and benefits. In recent years, the use of telemedicine has become increasingly popular in countries like Senegal. Telemedicine is significant because of its ability to transmit the needed information promptly. Besides, it is a means to communicate and care for patients having limited access to health care at efficient and personalized level. Over the years, the use of telemedicine has extended to several countries and the technology continues to improve each day.
Implementation of Certificateless Signcryption Based On Elliptic Curve Using Javascript Abdul Wahid; Masahiro Mambo
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1223.562 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

Certificateless Cryptography (CLC) provides a new approach in addressing problems in encryption techniques. In CLC, any string can be used as a public key so that the data can be secured without using a certificate. In addition, the CLC concept makes it possible for the revocation of keys with a certain time limit. Another emerging concept is the signcryption which is a cryptographic system that combines the digital signature system and encryption system into one logical step thus requiring a smaller computational cost compared to the regular signature-then-encryption system. Elliptic Curve Cryptography (ECC) is a cryptography that uses elliptic curve which offers the same security but with smaller key sizes thus requiring less memory and computation. In this paper, we attempted to combine the three concepts to obtain all the advantages possessed by each concept without compromising system security. In the implementation we used client-based programming namely javascript which can reduce the workload of the server in order to achieve system security. We compared the computational cost of our scheme with some previous schemes and analyzed the security property of our scheme.
Web service development as mechanism of interoperability between the Academic Information System (AIS) Mulawarman University and the Higher Education Data Base (PDDIKTI) using academic data from Department of Computer Science and Statistic at Faculty of Mathematic and Natural Science Dedy Cahyadi
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 4 (2016): November 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Higher Education Data Base (Pangkalan Data Perguruan Tinggi/PDDIKTI) is used by policy makers at Directorate of Higher Education at the Ministry of Research and Higher Education in order to improve the quality, relevance, affordability and equal access to higher education in which sustainable. In fact, the data still need improvements due to several causes such as invalidity, overlapping, and updating problems.  The management of PDDIKTI does not guarantee the validity of data, therefore universities should carry out regular updates to ensure data displayed on PDDIKTI website (http://forlap.ristekdikti.go.id) is legitimate for users who use the data such as HRD staff of companies in recruitment process.Mulawarman University has connected an Academic Information System (AIS) with PDDIKTI by using web service to process data updates. However, the process itself has a long mechanism and resulted in a slow progress because it must pass through several administrative stages ranging from the department, faculty and university. In the process, validity of the data is still on the department’s responsibility.This research has conducted a Proof of Concept (POC) on the use of web service to process data updates on PDDIKTI through AIS. It is carried out only at department level, consequently, the workflow of updates can become shorter and faster. Based on this result, there are two urgent needs that can be proposed to academic policy makers in campus: improved workflow and an updated standard of procedure in data updates from AIS to PDDIKTI.Higher Education Data Base (Pangkalan Data Perguruan Tinggi/PDDIKTI) is used by policy makers at Directorate of Higher Education at the Ministry of Research and Higher Education in order to improve the quality, relevance, affordability and equal access to higher education in which sustainable. In fact, the data still need improvements due to several causes such as invalidity, overlapping, and updating problems.  The management of PDDIKTI does not guarantee the validity of data, therefore universities should carry out regular updates to ensure data displayed on PDDIKTI website (http://forlap.ristekdikti.go.id) is legitimate for users who use the data such as HRD staff of companies in recruitment process.Mulawarman University has connected an Academic Information System (AIS) with PDDIKTI by using web service to process data updates. However, the process itself has a long mechanism and resulted in a slow progress because it must pass through several administrative stages ranging from the department, faculty and university. In the process, validity of the data is still on the department’s responsibility.This research has conducted a Proof of Concept (POC) on the use of web service to process data updates on PDDIKTI through AIS. It is carried out only at department level, consequently, the workflow of updates can become shorter and faster. Based on this result, there are two urgent needs that can be proposed to academic policy makers in campus: improved workflow and an updated standard of procedure in data updates from AIS to PDDIKTI.
Cluster Computing Analysis Based on Beowulf Architecture Purnawansyah Purnawansyah; Ramdan Sastra
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2016): February 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1340.013 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

The need for computing speed in data processing is in high demandindicated by the increasing data processing in many companies.Aviation companies, for instance, show the growing number ofpassengers daily. The data processing for a big number of customersrequires supercomputer technology at the cost of exponential fund.Therefore, the technology able to process big data with low cost isnecessary. This research has improved a cluster computer which canprocess data with a big capacity processing that is generally cannotbe processed using one computer. Cluster computer is built usingBeowulf cluster architecture using Linux Debian operating systemand SSH, NFS, MPI library and GANGLIA services. The result ofthis research is a cluster computer prototype which is able to process38.000x38.000 matrix calculation data. In the first testing, thecomputer was able to work for a maximum of 30.000x30.000 matrixcalculation whereas cluster computer can process up to38.000x38.000 matrix size. This result indicates that the designedcluster computer is successful to calculate big data with a lowcomputer specification. The further improvement can be applied in amore complicated computer calculation process and bigger data.
Telemedicine Diffusion in a Developing Country: A case of Uganda Femi Ekanoye; Temitope Olokunde; Foluso Emmanuel Ayeni; Vekima Nina; Carole Donalds; Victor Mbarika
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2017): February 2017
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Telemedicine is the diagnosis and treatment of patients by the use of telecommunications technology. Telemedicine has become a popular technological development for long-distance health care and continuing education.Telemedicine is used to assist with giving aid in rural and remote areas that can’t afford real medical help.  In a country like Uganda that has a population of roughly 33 million people and a little over 130 districts, the rate of HIV/AIDS are rising and leaving the life expectancy to about 53 years old. Similar to countries in Africa, Uganda has a very poor healthcare. Most residents of Uganda do not live near healthcare facilities and those who do live nearby may find healthcare unaffordable.This paper captures the different case studies that have benefited Uganda, the current status of telemedicine in Uganda, and what can possibly happen in the nearest future with the rise in the use of technology in telemedicine as well as the infrastructure and need for telemedicine.  
Performance of Assessment Relationship between Characteristics Student Learning Style and Lecturer's Teaching Method Using Fuzzy Inference System: A Case Study Department of Information Technology State Polytechnic of Samarinda Rihartanto Rihartanto; Arief Bramanto W. P.
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 2 (2016): May 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Baseline characteristics of students’ knowledge in the concept of learning technology is required. One is the student's learning style characteristics including attitudes, cognitive and psychomotor or skills. Then, characteristics of learning styles based approach sensory preferences, including visually, auditory, and kinesthetic or learning by doing/movement and touch. In this study, methods of teaching as a learning process consisting of multimedia-based teaching, lectures, demonstrations, problem solving, discussion, exercises (drill), case studies, frequently asked questions, and experiment. Three types of questionnaire consisting of the distribution characteristics of student learning styles, the tendency of students learning methods, and the tendency of lecturers teaching methods have been implemented. In order to determine the grade level of each questionnaire with grade visual (V), auditory (A), kinesthetic (K), auditory-kinesthetic (AK), and visual-auditory (VA) have been exploited. The results showed that the relationship between these three variables has yielded a value of 68.2%. It means that the FIS method could be used in order to assess the performance relationship.
Design of Information System for Acceptance Selection of Prospective Employees Online Using Tahani Fuzzy Logic Method and Simple Additive Weighting (SAW) Bedi Supriaty; Rheo Malani; Oki Dwi Nurhayati
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2016): February 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1342.105 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

applicant selection system by using Tahani fuzzy logical method and Simple Additive Weighting (SAW). This research is designed due to the job applicant selection system that hasn’t been optimized so that the management of an institution as well as a company faces some difficulties and barners in selecting the perfect human resources to be hired. The method applied in this research are Tahani fuzzy logical method and Simple Additive Weighting (SAW) producing web application-based software system that can handle the job applicant selection process by analyzing the data of job application as well as job applicant’s data. This kind of system produced some outputs consisting of job-applicant candidate rank, ideal job applicant rank, and also final rank.

Page 1 of 2 | Total Record : 17