cover
Contact Name
I Wayan Agus Arimbawa
Contact Email
arimbawa@unram.ac.id
Phone
-
Journal Mail Official
jcosine@unram.ac.id
Editorial Address
-
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Journal of Computer Science and Informatics Engineering (J-Cosine)
Published by Universitas Mataram
ISSN : 25408895     EISSN : 25410806     DOI : -
Core Subject : Science,
Journal of Computer Science and Informatics Engineering (J-Cosine) is a journal that is published by Informatics Engineering Dept., Faculty of Engineering, University of Mataram (Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram) under online and print ISSN: 2541-0806 and 2540-8895, respectively J-Cosine is also blind and peer-reviewed journal, which the reviewer processes are carried out by at least 2 reviewers who are decided by associate editor. The J-Cosine is published bi-annually.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 6 No 1 (2022): June 2022" : 10 Documents clear
Sistem Informasi Daya Tampung Area Parkir Pada Pusat Perbelanjaan Untuk Meningkatkan Layanan Penggunaan Parkir (Studi Kasus: Lombok Epicentrum Mall): Parking Area Resources Information System in The Shopping Center to Improve Parking Use Services (Case Study: Lombok Epicentrum Mall Sri Endang Anjarwani; Humaira Indreswari Illina; Nadiyasari Agitha
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.284

Abstract

Capacity Information System Parking Area at the Shopping Center aims to facilitate customers who come to the shopping center. Regarding the increasing information needs, services such as parking services will continue to be demanded to continuously improve information systems. This is to be able to present information that is able to provide comfort, convenience and security for drivers and service managers at this time.The weakness of the regulatory system that is usually the visitor has difficulty in finding an empty parking slot, so visitors have to spin around to find the slot that is used to park their vehicles in the parking area. When you have entered the parking area, the driver does not necessarily get an empty parking space and sometimes there is no parking attendant directing to the empty area, so that the time spent looking for more parking slots. In addition, motorists usually forget where they parked their vehicles before. Therefore a system is created that is able to minimize these problems. From these problems, a Parking Capacity Information System was created that can provide convenience for service drivers and parking service personnel. The ticket is given a slot number so that it is easy to park the vehicle, the screen is provided with a map of the parking lot, and reporting is made to facilitate the management.
Implementasi Service Oriented Architecture (SOA) pada Sistem Pencatatan Keuangan untuk UMKM: Implementation of Service Oriented Architecture (SOA) in the Financial Recording System for UMKM Royana Afwani; Muhammad Iksanul; Moh. Ali Albar
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.325

Abstract

One of the indications of a UMKM's success is financial statements. UMKM can use SAK EMKM to prepare financial reports. Many UMKM, on the other hand, have yet to incorporate SAK EMKM. UMKM can use information technology to improve its financial records. With the quantity and scope of UMKM, as well as the demand for information technology, flexible systems must be established on a variety of platforms in order to be sustainable. As a result, SOA must be used in the financial recording system for UMKM. As a result of these issues, a SOA-based Financial Recording System was developed. SOA allows the system to be more adaptable and reusable. The system built consists of a service provider and a cloud consumer. Owners of UMKM can use the Android application to keep financial records and generate reports from service providers. According to the results of the Black Box approach, every service offered at the service provider, as well as the cloud consumer's function, has been performing as predicted. And, according to the proprietor of UMKM, the system has been performing admirably.
Sistem Monitoring Kondisi Kesehatan Sebelum dan Sesudah Olahraga Menggunakan Pulse Sensor dan Sensor DS18B20 dengan Metode Naive Bayes: Health Condition Monitoring System Before and After Sports Using Pulse Sensor and DS18B20 Sensor with Naive Bayes Method Islam Hidayah; I Gede Putu Wirama Wedashwara W; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.353

Abstract

Heart rate and body temperature are essential factors that must be considered before exercise is essential to optimize exercise and know the body's condition. The trainer conducts a health check, and management evaluates the exercise results conducted on the athlete. The Internet of Things is the solution provided to facilitate the monitoring of health conditions and measure exercise intensity. Before and after exercise, the health condition monitoring system is designed to determine the user's health condition by measuring heart rate and body temperature as parameters for decision-making by applying the Naïve Bayes method. The Naive Bayes method is rule-based with the python sci-kit-learn programming language and data communication with MQTT. From the study results, the Sports Health condition monitoring system has succeeded in providing monitoring results, condition prediction decisions, and the accuracy of the Naïve Bayes method by 75%.
Storefront Health Protocol IoT System Using Using Raspberry Pi Camera and Haar Cascade Classifier I Gede Bagus Wirawan; I Gede Putu Wirarama Wedashwara; Ahmad Zafrullah Mardiansyah
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.411

Abstract

The Covid-19 health protocol is a regulation by government to feel safer doing activities during Covid-19 pandemic. Generally, spread of Covid-19 occurs in public places, one of which is a shop. By building an IoT tool that is expected to be able to detect early on the potential for someone to contract Covid-19 by detecting body temperature and mask when entering a store. Shop owners can see people who have the potential for Covid-19 and customers who are wrong/not wearing masks, using IoT functions to send data between sensors so that shop owners can monitor website-based systems. From the test results, the success rate of tools and algorithms is 78.38% of data that successfully detects temperature and masks, then there are 29.62% of data that fail to detect masks and temperatures. The data is then recorded in a JSON file which will be displayed into a website-based information system.
Social Distancing Violations Detection Using Iot-Based Raspberry Pi Camera Muhammad Ilham Maulana; I Gede Putu Wirarama Wedashwara; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.417

Abstract

Social distancing is one of the methods used to keep yourself and others safe during a pandemic and prevent the transmission of Covid-19. With social distancing, the spread of Covid-19 can be minimized. By utilizing two tools, namely the Raspberry Pi to classify using the haar cascade classifier algorithm from data obtained from the pi camera module as a visual raspberry pi used to detect a person's body. Raspberry pi camera will start detecting using crontab unit time. If the Raspberry Pi camera detects a person who is less than one meter away, that person is said to have violated social restrictions and vice versa, the data will be stored on the Raspberry Pi which also becomes a web server. The website is used as a system user interface, Raspberry Pi camera communication uses the machine to machine (M2M) protocol which is applied to a website-based application.
Evaluasi Tata Kelola Teknologi Informasi pada Proses Pengelolaan Inovasi dan Pengelolaan Perubahan Teknologi Informasi Menggunakan COBIT 2019 di PT. XYZ: Evaluation of Information Technology Governance in the Innovation Management Process and Management Information Technology Change Using COBIT 2019 at PT. XYZ Muhammad Ikhsan; Dinar Mutiara Kusumo Nugraheni
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.430

Abstract

The development of information technology (IT) is a major factor in driving the business transformation process in an organization. To drive the business transformation process, good IT governance is essential, so that the utilization of IT in organizational functions can run optimally. This study aims to measure the level of IT governance capability at PT.XYZ. The IT governance audit conducted in this study used the COBIT 2019 framework in mapping the process to be assessed. In the design factor results, it is found that there are 2 domain processes that have a value above 75%, namely APO04 and BAI06 which are then obtained in the process of measuring the capability of each level, namely APO04 has a capability value at level 1, and BAI06 has a level 1 capability value. carried out the results of the gap analysis and obtained an average value of the gap of 3, that PT.XYZ needs to improve IT governance and management in order to achieve organizational goals. Based on these improvements, several recommendations are given for improvements that can be made by the company.
Comparison of Backpropagation Neural Network and Convolutional Neural Network on Handwriting Pattern Recognition A. A. SG. Mas Karunia Maharani; Komang Oka Saputra; Ni Made Ary Esta Dewi Wirastuti
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.431

Abstract

Historical manuscripts are one of documents that important to be preserved because they contain a lot of information, one example of them is script as the historical documents . Historical document mostly still use handwriting in so many reserch. Currently, there are many research regarding the preservation of characters. One way of preservation that can be used is the digitization process. Digitizing’s process tanable by recognizing existing information using technology. The technology that can be used is machine learning. Handwriting is a complex case because of the many variations of these characters and the output of the author where variations of the author will produce different writings. The relevant fields for text and documents are Optical Chacarter Recognition (OCR) and handwriting recognition. There are several methods that can be used in the machine learning process, including Artificial Neural Network (ANN) and Convolutional Neural Network (CNN). Both of these methods are methods that can accept complex image input to be processed and recognized, therefore this method is highly recommended for processing handwriting.
Implementation of the Best Neighboring Node Selection Algorithm on DSR Routing Protocol in MANET Andy Hidayat Jatmika; Susilo Pandu Waskito; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.435

Abstract

Mobile Ad Hoc Network (MANET) is a wireless telecommunications technology that consists of a collection of dynamic nodes. Due to these properties resulted in the mobility of nodes in MANET. So that every relationship between nodes will always change and cause the process of finding a vulnerable route to take a long time. Each node also has a role as a host or router in exchanging information. In MANET delivery assurance and the ability to deal with path changes on an ad hoc basis are critical. So that in sending data packets from the source node to the destination node, a Routing protocol is needed. The routing protocol Dynamic Source Routing (DSR) in the route search process broadcasts RREQ to all neighboring nodes (intermediate nodes) without knowing whether the node is the best node or not. So that the possibility of the route being interrupted because it is not composed of the best nodes can occur. A modification of the DSR routing protocol is proposed by finding the best intermediate node based on parameters, namely bandwidth, RTT, packet loss ratio. Then the neighboring nodes (intermediate nodes) that have been selected will arrange the delivery route from the source node to the destination node. The performance of the modified DSR and DSR routing protocols will then be measured using test parameters, namely throughput, packet delivery ratio (PDR) and average end to end delay. Based on the results of research trials, the application of the modified DSR method can improve the performance of the DSR protocol. Which after the application of the method, the average throughput increased by 25%, Packet Delivery Ratio (PDR) was 1.11% and the average end-to-end delay decreased by 17.64 %.
Forecasting Carbon Emissions Using the SARIMA and LSTM Methods Syifa Ilma Nabila Suwandi; Raras Tyasnurita; Hanifan Muhayat
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.436

Abstract

The majority of greenhouse gas (GHG) effects are caused by very high levels of carbon emissions in the world. Therefore, it is necessary to take action to control the levels of carbon emissions in the world. In this study, the world's carbon emission levels were forecasted based on time series data on carbon emissions from 1949 to 2018 in North America. This study uses 2 forecasting methods, namely SARIMA and LSTM, with the consideration that both methods are considered capable of providing good results. Forecasting results show that the best parameter for SARIMA is [(0,1,0) (1,1,0)12] with a MAPE of 1.995%. Meanwhile, if you use the LSTM method with parameters 1 input, 4 hidden layers, and output 1, it produces a MAPE of 0.540%. This condition makes the LSTM method more optimal for predicting carbon emission levels in the world.
Classification of Glaukoma Image with ANN Based on Blood Vessels on Retina Fundus Image Using Comparison of Otsu-Thresholding Method and Canny Edge Detection Teguh Ardian Samudra; Gibran Satya Nugraha; Fitri Bimantoro
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.439

Abstract

Glaucoma is an eye disease that can lead to permanent blindness caused by increased Intraocular Pressure (IOP). There are several methods to detect glaucoma, namely Optical Nerve Hypoplasia Stereo Photographs (ONHSPs), Optical Coherence Tomography (OCT), Scanning Laser Polarimetry (SLP), and Confocal Scanning Laser Ophthalmoscopy (CSLO). However, these methods require a lot of money and expert supervision. In this paper, glaucoma classification will be carried out using the ANN method with a comparison of the otsu-thresholding segmentation method and canny edge detection with the aim of knowing which method gives better results in diagnosing glaucoma images based on the parameters of accuracy, sensitivity, and specificity. The dataset used is RIM-ONE r2 and r3 which will be extracted using 5 features of GLCM and 6 statistical features, and obtained an accuracy of 76% for the otsu-thresholding method, and 79% for canny edge detection.

Page 1 of 1 | Total Record : 10