cover
Contact Name
I Wayan Agus Arimbawa
Contact Email
arimbawa@unram.ac.id
Phone
-
Journal Mail Official
jcosine@unram.ac.id
Editorial Address
-
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Journal of Computer Science and Informatics Engineering (J-Cosine)
Published by Universitas Mataram
ISSN : 25408895     EISSN : 25410806     DOI : -
Core Subject : Science,
Journal of Computer Science and Informatics Engineering (J-Cosine) is a journal that is published by Informatics Engineering Dept., Faculty of Engineering, University of Mataram (Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram) under online and print ISSN: 2541-0806 and 2540-8895, respectively J-Cosine is also blind and peer-reviewed journal, which the reviewer processes are carried out by at least 2 reviewers who are decided by associate editor. The J-Cosine is published bi-annually.
Arjuna Subject : -
Articles 119 Documents
Predict A Person's Personality Based On The Shape of Handwriting of The Letters "i", "o", and "t" Using The Levenberg Marquardt Backpropagation Method Annisa Mujahidah Robbani; I Gede Pasek Suta Wijaya; Fitri Bimantoro; Heri Wijayanto
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.178

Abstract

The literature shows that Graphology is common and relatively useful in our life. For example, as one of the job requirements. Professional organizations hire a professional handwriting analyst called Graphologist to analyze the characteristic traits of the candidates by identified their handwriting. However, the accuracy of handwriting analysis depends on how skilled the graphologist is, two graphologists which predict the same handwriting may give us a different result of the prediction. To improve the accuracy, we develop a system that can automatically predict a person’s personality based on the shape of the handwriting of the letters "i", "o", and "t" using the Levenberg Marquardt Backpropagation method. Based on this research we got the maximum accuracy by using 2 hidden layers. We got 71,42% of accuracy for the letter “i”, 76,92% of accuracy for the letter “o”, and 60% of accuracy for letter the “t”.
Analisis Tata Kelola Teknologi Informasi Untuk Mendefinisikan Arsitektur Informasi Dengan Framework COBIT 4.1 (Studi Kasus Instalasi Rawat Jalan RSUD Prov. NTB): Information Technology Governance Analysis to Define Architecture Information Using the COBIT Framework 4.1 Case studies Instalasi Rawat Jalan RSUD Prov. NTB Media Isti Azzizah; Nadiyasari Agitha; Ida Bagus Ketut Widiartha
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.188

Abstract

Treatment for outpatient installations (IRJA) NTB provincial hospitals have used hospital management information systems, but this is still not effective. The information system is not effective because registration centred in the main hall. The centralized registration caused the accumulation of patient queues that occurred in each IRJA polyclinic, and this was due to the absence of an integrated queue number between registrations carried out in the main hall and IRJA polyclinics. Therefore, the governance of information architecture processes needs to be applied to optimize information systems. We use COBIT 4.1 to conduct governance. The aim is to get existing and expected outpatients from Prov. NTB Hospital. So, it can help to manage information architecture to perform quality and competitive outpatient services. The results showed the IT processes selected in PO2 (Determine Information Architecture) and AI4 (Activate and Use). We reach the maturity level of all IT processes at level 3 (the specified process) for conditions as they are and 5 (optimized) for conditions that will occur. The level of maturity can help the NTB Provincial Hospital to improve its services.
Rancang Bangun Sistem Informasi Geografis Untuk Pemetaan Lokasi Tempat Ibadah Di Kota Mataram Menggunakan Metode Extreme Programming: Design of Geographic Information System For Mapping The Location of Worship in Mataram City Using Extreme Programming Method Ricky Satria; Royana Afwani; Sri Endang Anjarwani
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.395

Abstract

In Mataram city, finding places of worship is quite difficult for foreigners because they do not know the position/road around them. And currently, the data management of places of worship is still carried out using Ms. Excel by the Departemen Agama NTB which makes data collection ineffective and inefficient in searching and updating existing data. In this final project research, the researcher designed and built a Geographic Information System for Mapping the Location of Places of Worship in Mataram City to provide information and layout of places of worship in Mataram City, and can make it easier for the Ministry of Religion to collect data from the system that makes data management of existing places of worship more effective and efficient. This final project research uses the Extreme Programming (XP) system development method because one of the characteristics of XP itself involves the client during the system development process to minimize errors in the system and according to client needs.
Effective Factors Influencing the Intention to Use Citizens Complaint Handling System Nur Shabrina Meutia; Apol Pribadi Subriadi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.406

Abstract

The citizen's complaint handling system aims to make citizens easily file a complaint against the condition and development of the city so that it can be followed up immediately, but the implementation of this Smart City program is less than optimal. The real condition shows that there are still many citizens who have not used this application. This study aims to evaluate what factors influence the citizen's intention to use the complaint handling application. The methodology used in this study is a qualitative method with a phenomenological approach. This study conducted in-depth interviews with six research informants, then the results of the interviews were tested and analyzed, and the interview data was encoded. The results of this study found factors that influence the intention to use complaint handling applications. These factors are citizen awareness, social influence, perceived usefulness, and trust. The expected result is a new model that can be implemented to improve the use of complaint handling applications and similar e-government services.
Segmentasi Multi Proyeksi pada Citra Cone Beam Computed Tomography Gigi Menggunakan Metode Level Set Fahmi Syuhada; Rarasmaya Indraswari; Agus Zainal Arifin; Dini Adni Navastara
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.413

Abstract

Segmentation of dental Cone-beam computed tomography (CBCT) images based on Boundary Tracking has been widely used in recent decades. Generally, the process only uses axial projection data of CBCT where the slices image that representing the tip of the tooth object have decreased in contrast which impact to difficult to distinguish with background or other elements. In this paper we propose the multi-projection segmentation method by combining the level set segmentation result on three projections to detect the tooth object more optimally. Multiprojection is performed by decomposing CBCT data which produces three projections called axial, sagittal and coronal projections. Then, the segmentation based on the set level method is implemented on the slices image in the three projections. The results of the three projections are combined to get the final result of this method. This proposed method obtains evaluation results of accuracy, sensitivity, specificity with values of 97.18%, 88.62%, and 97.61%, respectively.
Keamanan Data Pasien dengan Algoritma Blowfish pada HOTSPODT: Patient Data Security with Blowfish Algorithm on HOTSPODT Nuniek Fahriani; Indah Kurniawati
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.416

Abstract

At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.
Ekstraksi Fitur Citra Radiografi Thorax Menggunakan DWT dan Moment Invariant: Feature Extraction of Thorax Radiography Image Using DWT and Moment Invariant I Gede Pasek Suta Wijaya; Ditha Nurcahya Avianty; Fitri Bimantoro; Rina Lestari
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.423

Abstract

COVID-19 is an infectious disease caused by the coronavirus family, namely severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The fastest method to identify the presence of this virus is a rapid antibody or antigen test, but confirming the positive status of a COVID-19 patient requires further examination. Lung examination using chest X-ray images taken through X-rays of COVID-19 patients can be one way to confirm the patient's condition before/after the rapid test. This paper proposes a feature extraction model to detect COVID-19 through chest radiography using a combination of Discrete Wavelet Transform (DWT) and Moment Invariant features. In this case, haar wavelet transform and seven Hu moments were used to extract image features in order to find unique features that represent chest radiographic images as suspected COVID-19, pneumonia, or normal. To find out the uniqueness of the proposed features, it is coupled with the kNN and generic ANN classification techniques. Based on the performance parameters assessed, it turns out that the wavelet-based and moment invariant thorax radiographic image feature model can be used as a unique feature associated with three categories: Normal, Pneumonia, and Covid-19. This is indicated by the accuracy value of 82.7% in the kNN classification technique and the accuracy, precision, and recall of 86%, 87%, and 86% respectively with the ANN classification technique.
Two Factor Authentication Berbasis SMS pada Layanan Single Sign-On Universitas Mataram: SMS Based Two Factor Authentication in Mataram University’s Single Sign-On Service Ahmad Zafrullah Mardiansyah; Ariyan Zubaidi; I Gde Putu Wirarama Wedaswhara W; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.424

Abstract

Security is an important part of electronic transactions. Information systems at Mataram University are generally using the conventional username and password fields to authenticate the user (Single Factor Authentication - SFA). The SFA method is vulnerable to brute force attacks, especially to the Single Sign-On (SSO) service. To prevent brute force attacks, this study proposes an implementation of SMS-based Two Factor Authentication (TFA) toward SSO. This study found that the tests carried out by analyzing the simulation of brute force attacks, attackers could not obtain access to the user accounts. Another test done by the User Experience Questionnaire (UEQ) method found the score on the Pragmatic aspect was 1.927 (Excellent), on the Hedonic aspect it was 1.667 (Excellent), and overall was 1.797 (Excellent).
Expert System of Anti-Diabetic Medicine Selection Andi Hutami Endang
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 5 No 2 (2021): December 2021
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v5i2.425

Abstract

The Prediction of World Health Organization (WHO) estimates that in 2030 the number of diabetics in Indonesia reached approximately 21.3 million people. Moreover, the development of medicine consumed by diabetics also varies. In this paper, we present a system that represents a diabetes expert into a knowledge based on the domain ontology. The early stage of the system is developing drugs ontology (including functions and contraindications) and patient ontology. Then, matching a weighted ontology will give drugs recommendations that are suitable with the patient's condition. The system is able to analyze diabetes symptoms to give drugs recommendations to the patient.
Sistem Informasi Daya Tampung Area Parkir Pada Pusat Perbelanjaan Untuk Meningkatkan Layanan Penggunaan Parkir (Studi Kasus: Lombok Epicentrum Mall): Parking Area Resources Information System in The Shopping Center to Improve Parking Use Services (Case Study: Lombok Epicentrum Mall Sri Endang Anjarwani; Humaira Indreswari Illina; Nadiyasari Agitha
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.284

Abstract

Capacity Information System Parking Area at the Shopping Center aims to facilitate customers who come to the shopping center. Regarding the increasing information needs, services such as parking services will continue to be demanded to continuously improve information systems. This is to be able to present information that is able to provide comfort, convenience and security for drivers and service managers at this time.The weakness of the regulatory system that is usually the visitor has difficulty in finding an empty parking slot, so visitors have to spin around to find the slot that is used to park their vehicles in the parking area. When you have entered the parking area, the driver does not necessarily get an empty parking space and sometimes there is no parking attendant directing to the empty area, so that the time spent looking for more parking slots. In addition, motorists usually forget where they parked their vehicles before. Therefore a system is created that is able to minimize these problems. From these problems, a Parking Capacity Information System was created that can provide convenience for service drivers and parking service personnel. The ticket is given a slot number so that it is easy to park the vehicle, the screen is provided with a map of the parking lot, and reporting is made to facilitate the management.

Page 9 of 12 | Total Record : 119