25 articles in this issue
Faried Zamachsari, Niken Puspitasari
The rapid development of information technology coupled with an increase in public activity in electronic financial transactions has provided convenience but has been accompanied by the occurrence of fraudulent financial transactions. The purpose of this ... see more
Noor Hafidz, Dewi Yanti Liliana
On March 2020 World Health Organization (WHO) has declared Covid-19 as global pandemic. As special agency of United Nation who responsible for international public healthy, WHO has done various actions to reduce this pandemic spreading rate. However, the ... see more
Khofifah Putriyani, Tenia Wahyuningrum, Yogo Dwi Prasetyo
Primandani Arsi, Rizki Wahyudi, Retno Waluyo
President Joko Widodo decided to move the capital city of the country outside Java. The relocation of the capital city is contained in the 2020-2024 National Medium-Term Development Plan. Community response to this has been mixed through national televisi... see more
Annisak Izzaty Jamhur Nisa, Radius Prawiro, Novi Trisna
Tourism is an activity carried out by humans to a place alone or together to have fun to get rid of the burden of thoughts that were previously acquired. The Mandeh area is a leading tourist area in West Sumatra which has 10 alternative tourist attraction... see more
Yuslena Sari, Maulidia Arafah, Novitasari
University of Lambung Mangkurat (ULM) has an academic information system that can facilitate access to information and provide quality academic services. One of the ULM academic information system services is the Portal Akademik Dosen ULM. Since its relea... see more
Anjar Wanto, Sarjon Defit, Agus Perdana Windarto
Research has been carried out with several training functions using standard backpropagation methods, One-Step Secant (OSS), and Bayesian regulation. The purpose of this study was to (i) analyze the Performance accuracy (Performance) of the standard backp... see more
Arum TiaraSari, Emy Haryatmi
Corn kernels detection can be implemented in industry area. This can be implemented in the selection and packaging the corn kernels before it is distributed. This technique can be implemented in the selection and packaging machine to detect corn kernels a... see more
Deny Ramdhany, Imas Sukaesih Sitanggang, Ikhsan Kurniawan, Wulandari Wulandari
To prevent and handle forest and land and forest fire (karhutla), the Ministry of Environment and Forestry assembled a patrol team that conducts a daily task to observe directly to the hotspot location as an indication for land fire. Currently, the patrol... see more
Darussalam Darussalam, Arief Goeritno
An embedded system has been fabricated through the use of the RFID module, load cell, and infrared sensor assisted by the Arduino module. The objectives of this study are to design an embedded system and embed applications and measure the performance of t... see more
I Wayan Aditya Suranata, I Gede Humaswara Prathama
The current agricultural systems generally uses chemical fertilizers as a growth booster in order to meet the global food needs of 7 billion people and all of their livestock. But unfortunately not all are aware of the great danger behind such an overuse,... see more
Muhamad Wildan, Arief Goeritno, Joki Irawan
A PLC-based embedded device on a miniature conveyor machine for operating a rejection system has been designed and constructed. The research objectives, namely (i) design and manufacture of an integrated system, (ii) making program structure based on a la... see more
Rima Dias Ramadhani, Afandi Nur Aziz Thohari, Condro Kartiko, Apri Junaidi, Tri Ginanjar Laksana, Novanda Alim Setya Nugraha
Waste is goods / materials that have no value in the scope of production, where in some cases the waste is disposed of carelessly and can damage the environment. The Indonesian government in 2019 recorded waste reaching 66-67 million tons, which is higher... see more
Hilmi Aziz Bukhori Bukhori, Bayu Rahayudi, Widhy Hayuhardhika Nugraha Putra
The emergence of the COVID-19 case has a major impact on all sectors. At this critical time, customer satisfaction can be done by optimizing the use of resources by implementing BPI. The BPI method will conduct a review regarding the resources owned and w... see more
Khairun Nisa Meiah Ngafidin, Artika Arista, Rona Nisa Sofia Amriza
The necessity of learning assistance for elementary student is to ensure that students can absorb the learning well. In order to keep track of the student's progress, the teacher needs to know how and what the student has done while at home. The FeedbackM... see more
I Made Yudha Arya Dala, I Ketut Gede Darma Putra, Putu Wira Buana
Dengue disease has been known to the people of Indonesia since 1779. The Aedes mosquito has two types, namely Aedes aegypti and Aedes albopictus. Aedes aegypti is a mosquito that carries the dengue virus. The dengue fever cases in Bali province tend to in... see more
Haris Mustaqin, Yuliar, Rizal Munadi
IEEE 802.11ah WLAN is a technology standard for IoT networks because it can provide a higher transmission range and data rate than WPAN and LPWAN. To manage channel access up to 8191 at the MAC layer IEEE 802.11ah a Restricted Access Window scheme was int... see more
Sunardi, Abdul Fadlil, Ryan Fitrian Pahlevi
Higher Education Quality Assurance (QA) is regulated in Quality Standards and the number of criteria as well as its relationship with the implementation of the Quality Assurance System (QAS), namely the Internal and External Quality Assurance System (IHSG... see more
Gede Aditra Pradnyana, Arif Djunaidy
Documents clustering based on frequent itemsets can be regarded a new method of documents clustering which is aimed to overcome curse of dimensionality of items produced by documents being clustered. The Maximum Capturing (MC) technique is an algorithm of... see more
Eka Pandu Cynthia, M. Afif Rizky A., Alwis Nazir, Fadhilah Syafria
This paper explains the use of the Random Forest Algorithm to investigate the Case of Acute Coronary Syndrome (ACS). The objectives of this study are to review the evaluation of the use of data science techniques and machine learning algorithms in cr... see more
Luqman Hakim, Zamah Sari, Handhajani Handhajani
Emy Haryatmi, Sheila Pramita Hervianti
A University can have many student data in their database because many students did not graduate on time. Data mining technique can be used to process student data to predict student graduation on time. Support Vector Machine (SVM) algorithm is one of dat... see more
Mahendra Dwifebri Purbolaksono, Muhammad Irvan Tantowi, Adnan Imam Hidayat, Adiwijaya Adiwijaya
Diabetes (diabetes) was a metabolic disorder caused by high levels of sugar in the blood caused by disorders of the pancreas and insulin. According to data from the Ministry of Health of the Republic of Indonesia, Diabetes was the third-largest cause of d... see more
Alfiansyah Imanda Putra Alfian, Rusydi Umar, Abdul Fadlil
The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve t... see more
April Firman Daru, Febrian Wahyu Christanto, Arif Kurniawan
Bandwidth problems are the most frequently encountered problems in sharing information traffic or internet access on computer networks. The factor that causes slow internet access is the large number of devices connected to the internet that are not match... see more