Journal title
ISSN: 2580-0760    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 4 Number 4 Year 2020

21 articles in this issue 

Aal Hibsy, Arief Wibowo

In the Covid-19 pandemic phase, some business processes were halted, adapted, and modified to deal with the policy of social restrictions. This impact is experienced by all levels of society, including athletes who are forced to do training from home (Tra... see more

Pags. 618 - 626  

Fina Triana, Jon Endri, Irma Salamah

Information data security is an important aspect of exchanging data and information. Data and information security can be done in various ways, including by using the cesarean cipher method in cryptographic techniques. The cesarean cipher method of crypto... see more

Pags. 627 - 634  

Nurul Chamidah, Mayanda Mega Santoni, Nurhafifah Matondang

Oversampling is a technique to balance the number of data records for each class by generating data with a small number of records in a class, so that the amount is balanced with data with a class with a large number of records. Oversampling in this study... see more

Pags. 635 - 641  

Siti Khomsah, Agus Sasmito Aribowo

YouTube is the most widely used in Indonesia, and it’s reaching 88% of internet users in Indonesia. YouTube’s comments in Indonesian languages produced by users has increased massively, and we can use those datasets to elaborate on the polarization of pub... see more

Pags. 648 - 654  

Crisanadenta Wintang Kencana, Erwin Budi Setiawan, Isman Kurniawan

Social media is one of the ways to connect every individual in the world. It also used by irresponsible people to spread a hoax. Hoax is false news that is made as if it is true. It may cause anxiety and panic in society. It can affect the social and poli... see more

Pags. 655 - 663  

Gabriella Icasia, Raras Tyasnurita, Etria Sepwardhani Purba

Examination Timetabling Problem is one of the optimization and combinatorial problems. It is proved to be a non-deterministic polynomial (NP)-hard problem. On a large scale of data, the examination timetabling problem becomes a complex problem and takes t... see more

Pags. 664 - 671  

Dhomas Hatta Fudholi, Rahadian Kurniawan, Dimas Panji Eka Jalaputra, Izzati Muhimmah

Knowledge is needed for children with special needs to support their quality of life. This is a challenge for prospective educators / prospective teachers. A deeper knowledge is needed to really understand children with special needs. This research is car... see more

Pags. 672 - 681  

Anton Yudhana, Abdul Fadlil, Muhammad Rizki Setyawan

Cybercrime is an activity utilizing electronic devices and network technology as tools or media to commit crimes. One of them uses the Skype application that is installed on the smartphone. In finding evidence from a cybercrime case, a forensic activity k... see more

Pags. 682 - 690  

Agusta Praba Ristadi Pinem, Siti Asmiatun, Astrid Novita Putri

Today, the development of the use of spatial data is not only used for information geographic or transportation. But also can be used for site selection with integrating decision support system methods. Generated information can help in making decisions a... see more

Pags. 691 - 696  

Angelia Destriana, Kristoko Dwi Hartomo, Hanna Prillysca Chernovita

The process of manually recording and visualizing data that has high and complicated transaction rates, is no longer relevant for analyzing errors that often occur in company. The impact is the information generated becomes inaccurate in decision making. ... see more

Pags. 697 - 703  

Yan Puspitarani, Yenie Syukriyah

The examination of complaints of labor violations is part of the main activity of the labor inspection section within the Department of Manpower. Monitors will examine companies that are considered to have violated labor laws based on a letter of complain... see more

Pags. 704 - 710  

Brenda Irena, Erwin Budi Setiawan

Social media is a means to communicate and exchange information between people, and Twitter is one of them. But the information disseminated is not entirely true, but there is some news that is not in accordance with the truth or often called hoaxes. Ther... see more

Pags. 711 - 716  

Rastri Prathivi

The low accuracy when performing the image classification process is a problem that often occurs. The image classification process requires the completeness of the features of the image which form an informative image pattern so that information from the ... see more

Pags. 717 - 722  

Jiddy Abdillah, Ibnu Asror, Yanuar Firdaus Arie Wibowo

The rapid change of the music market from analog to digital has caused a rapid increase in the amount of music that is spread throughout the world as well because music is easier to make and sell. The amount of music available has changed the way people f... see more

Pags. 723 - 729  

Imam Riadi, Sunardi, Panggah Widiandana

Cyberbullying in group conversations in one of the instant messaging applications is one of the conflicts that occur due to social media, specifically WhatsApp. This study conducted digital forensics to find evidence of cyberbullying by obtaining work in ... see more

Pags. 730 - 735  

Muh Fadli Hasa, Anton Yudhana, Abdul Fadlil

The process of securing data is related to anti-forensic science, one of the anti-forensic techniques that can be used to safeguard data security, namely by deleting data on storage media. This study examines the implementation of data deletion using the ... see more

Pags. 736 - 744  

Albertus Ari Kristanto, Yulius Harjoseputro, Joseph Eric Samodra

A good application development requires a testing phase to ensure there are no errors before it’s released to public. But testing phase becomes difficult if the application development involves features from third parties. The idea to resolve the problem ... see more

Pags. 745 - 750  

Hadid Tunas Bangsawan, Lukman Hanafi, Deny Suryana

Computer Vision (CV) is an interdisciplinary scientific field that discusses how computers can gain a high-level understanding of digital images or video. A system has been created that is capable of detecting a compact fluoresence lamp (CFL) light. Howev... see more

Pags. 751 - 756  

Elfizar Elfizar

The Covid-19 pandemic makes massive use of information technology (IT) in various fields. This study aims to evaluate the use of IT in Computer Networks lectures at the Department of Computer Science, Faculty of Mathematics and Natural Sciences, Universit... see more

Pags. 757 - 763  

Erika Nachrowi, Yani Nurhadryani, Heru Sukoco

The implementation of E-government evaluation is already a necessity to know the level of process of governance and management of service and provide improvement suggestions for quality improvement. Evaluation of the governance and management of services ... see more

Pags. 764 - 774