21 articles in this issue
Aal Hibsy, Arief Wibowo
In the Covid-19 pandemic phase, some business processes were halted, adapted, and modified to deal with the policy of social restrictions. This impact is experienced by all levels of society, including athletes who are forced to do training from home (Tra... see more
Fina Triana, Jon Endri, Irma Salamah
Information data security is an important aspect of exchanging data and information. Data and information security can be done in various ways, including by using the cesarean cipher method in cryptographic techniques. The cesarean cipher method of crypto... see more
Nurul Chamidah, Mayanda Mega Santoni, Nurhafifah Matondang
Oversampling is a technique to balance the number of data records for each class by generating data with a small number of records in a class, so that the amount is balanced with data with a class with a large number of records. Oversampling in this study... see more
Arwin Datumaya Wahyudi Sumari, Muhammad Bisri Musthafa, Ngatmari, Dimas Rossiawan Hendra Putra
Siti Khomsah, Agus Sasmito Aribowo
YouTube is the most widely used in Indonesia, and it’s reaching 88% of internet users in Indonesia. YouTube’s comments in Indonesian languages produced by users has increased massively, and we can use those datasets to elaborate on the polarization of pub... see more
Crisanadenta Wintang Kencana, Erwin Budi Setiawan, Isman Kurniawan
Social media is one of the ways to connect every individual in the world. It also used by irresponsible people to spread a hoax. Hoax is false news that is made as if it is true. It may cause anxiety and panic in society. It can affect the social and poli... see more
Gabriella Icasia, Raras Tyasnurita, Etria Sepwardhani Purba
Examination Timetabling Problem is one of the optimization and combinatorial problems. It is proved to be a non-deterministic polynomial (NP)-hard problem. On a large scale of data, the examination timetabling problem becomes a complex problem and takes t... see more
Dhomas Hatta Fudholi, Rahadian Kurniawan, Dimas Panji Eka Jalaputra, Izzati Muhimmah
Knowledge is needed for children with special needs to support their quality of life. This is a challenge for prospective educators / prospective teachers. A deeper knowledge is needed to really understand children with special needs. This research is car... see more
Anton Yudhana, Abdul Fadlil, Muhammad Rizki Setyawan
Cybercrime is an activity utilizing electronic devices and network technology as tools or media to commit crimes. One of them uses the Skype application that is installed on the smartphone. In finding evidence from a cybercrime case, a forensic activity k... see more
Agusta Praba Ristadi Pinem, Siti Asmiatun, Astrid Novita Putri
Today, the development of the use of spatial data is not only used for information geographic or transportation. But also can be used for site selection with integrating decision support system methods. Generated information can help in making decisions a... see more
Angelia Destriana, Kristoko Dwi Hartomo, Hanna Prillysca Chernovita
The process of manually recording and visualizing data that has high and complicated transaction rates, is no longer relevant for analyzing errors that often occur in company. The impact is the information generated becomes inaccurate in decision making. ... see more
Yan Puspitarani, Yenie Syukriyah
The examination of complaints of labor violations is part of the main activity of the labor inspection section within the Department of Manpower. Monitors will examine companies that are considered to have violated labor laws based on a letter of complain... see more
Brenda Irena, Erwin Budi Setiawan
Social media is a means to communicate and exchange information between people, and Twitter is one of them. But the information disseminated is not entirely true, but there is some news that is not in accordance with the truth or often called hoaxes. Ther... see more
Rastri Prathivi
The low accuracy when performing the image classification process is a problem that often occurs. The image classification process requires the completeness of the features of the image which form an informative image pattern so that information from the ... see more
Jiddy Abdillah, Ibnu Asror, Yanuar Firdaus Arie Wibowo
The rapid change of the music market from analog to digital has caused a rapid increase in the amount of music that is spread throughout the world as well because music is easier to make and sell. The amount of music available has changed the way people f... see more
Imam Riadi, Sunardi, Panggah Widiandana
Cyberbullying in group conversations in one of the instant messaging applications is one of the conflicts that occur due to social media, specifically WhatsApp. This study conducted digital forensics to find evidence of cyberbullying by obtaining work in ... see more
Muh Fadli Hasa, Anton Yudhana, Abdul Fadlil
The process of securing data is related to anti-forensic science, one of the anti-forensic techniques that can be used to safeguard data security, namely by deleting data on storage media. This study examines the implementation of data deletion using the ... see more
Albertus Ari Kristanto, Yulius Harjoseputro, Joseph Eric Samodra
A good application development requires a testing phase to ensure there are no errors before it’s released to public. But testing phase becomes difficult if the application development involves features from third parties. The idea to resolve the problem ... see more
Hadid Tunas Bangsawan, Lukman Hanafi, Deny Suryana
Computer Vision (CV) is an interdisciplinary scientific field that discusses how computers can gain a high-level understanding of digital images or video. A system has been created that is capable of detecting a compact fluoresence lamp (CFL) light. Howev... see more
Elfizar Elfizar
The Covid-19 pandemic makes massive use of information technology (IT) in various fields. This study aims to evaluate the use of IT in Computer Networks lectures at the Department of Computer Science, Faculty of Mathematics and Natural Sciences, Universit... see more
Erika Nachrowi, Yani Nurhadryani, Heru Sukoco
The implementation of E-government evaluation is already a necessity to know the level of process of governance and management of service and provide improvement suggestions for quality improvement. Evaluation of the governance and management of services ... see more