Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 2191–2200 dari 6971 artikel
Pengelompokan Penyebaran Covid-19 di Provinsi Jawa Barat menggunakan Metode Clustering K-Medoids
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
Covid-19 is a disease that infects the human respiratory system and has a high-speed transmission ability. West Java Province is one of the areas affected by the Covid-19 pandemic. The number of people confirmed with the Covid-19 virus in West Java is still increasing daily. Therefore, it is necessary to group the level of vulnerability to the spread of Covid-19, especially in West Java Province, using data from the official website of the West Java Provincial Government using 5 attributes, name...
Sumber Asli
Google Scholar
Metode System Development Life Cycle dalam Perancangan Sistem Informasi Kuliah Kerja Kemasyarakatan
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
Our annual activity, Community Service Internship, will be conducted this semester. Previously, this reporting activity was carried out by sending pictures via WhatsApp. So, we created a reporting system to make it more efficient. Now, the reporting process will be handled through a website and monitoring will also be done through the website. This will make it easier for both participants and mentors to carry out the activity," he said. The methodologies used are SDLC (System Development Life C...
Sumber Asli
Google Scholar
Aplikasi E-voting Berbasis Blockchain dengan Metode Smart Contract
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
Voting is an important process in many contexts, such as in organizational decisions and the selection of leaders. With the development of technology, the concept of electronic voting emerged, where humans can cast their votes electronically. Electronic voting has become an important alternative in organizational decision making and leader selection, but often faces challenges related to security and fraud. In this study, a blockchain-based electronic voting application has been developed using...
Sumber Asli
Google Scholar
Identifikasi Kesegaran Ikan Bandeng Non-kontak menggunakan MobileNetV2
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
Milkfish is a superior commodity in several districts in Indonesia, namely Sidoarjo, Semarang, and Banten. This fish is also a favorite of Indonesians because it is nutritious and affordable. Therefore, for milkfish processed product business people, the freshness of milkfish is an important parameter because the freshness of the fish affects the quality of the processed products. Manual fish sorting is a problem when the number of fish is vast because it is prone to errors due to fatigue. In ad...
Sumber Asli
Google Scholar
Pengenalan Gestur Bahasa Isyarat Indonesia dengan Mediapipe Keypoints
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
Difficulty in communication is an obstacle for deaf friends who cannot learn the language orally or acquire normal speech skills. The development of sign language gesture recognition technology is an important step to improve accessibility and social integration for the deaf community. The use of MediaPipe Holistic Keypoints and deep learning techniques provides significant potential in recognizing and understanding sign language gestures. The main objective of this study is to classify Indonesi...
Sumber Asli
Google Scholar
Implementasi Profile Matching pada Sistem Pendukung Keputusan Seleksi Peserta Tenda Kewirausahaan
Setiawan, Aries
; Nuryanto, Imam
; Mintorini, Ery
; Hidajat, Moch. Sjamsul
; Farida, Ida
; Widjajanto, Budi
; Prasetya, Jaka
; Lewa, Andi Hallang
; Karmila, Karmila
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
One of the programs from the Entrepreneurship Unit is the entrepreneurial tent participant program. In the manual assessment process, participant selection is only based on the type of entrepreneurial product that will be offered. However, this does not get maximum selection results because if the existing selection only uses one variable component and the assessment tends to contain elements that have no potential. One decision making method that has weight in its calculations is profile matchi...
Sumber Asli
Google Scholar
Model Hybrid Random Forest dan Information Gain untuk meningkatkan Performa Algoritma Machine Learning pada Deteksi Malicious Software
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
The evolution of malware, or malicious software, has raised increasing concerns, targeting not only computers but also other devices like smartphones. Malware is no longer just monomorphic but has evolved into polymorphic, metamorphic, and oligomorphic forms. With this massive development, conventional antivirus software is becoming less effective at countering it. This is due to malware's ability to propagate itself using different fingerprint and behavioral patterns. Therefore, an intelligent...
Sumber Asli
Google Scholar
Deteksi Serangan Denial of Service (DoS) dan Spoofing pada Internet of Vehicles menggunakan Algoritma K-Nearest Neighbor (KNN)
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
The implementation of Internet of Things (IoT) technology in motor vehicles has been increasing over time and is known as the Internet of Vehicles (IoV). IoV is becoming more essential to society as it provides comfort, safety, and efficiency in driving. Unfortunately, the use of internet technology in IoV brings the potential for cyber-attacks, such as Denial of Service (DoS) and Spoofing. Intrusion Detection Systems in IoV have not yet fully matured, as this technology is still relatively new....
Sumber Asli
Google Scholar
Rancang Bangun Sistem Informasi Manajemen Organisasi Kemahasiswaan Berbasis Web di UNISNU Jepara
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
In today's digital era, Management Information Systems are becoming increasingly important for organizations and businesses. Management Information Systems can help organizations remain competitive and thrive in an increasingly complex and dynamic era. However, in student organizations within Unisnu Jepara, the management process is still carried out with manual practices and using paper media. Where writing on paper media requires a lot of time and energy, moreover the need for information in t...
Sumber Asli
Google Scholar
Implementasi Business Intelligence untuk menganalisis Perkembangan Akademik Mahasiswa di Program Studi Sistem Informasi UNISNU Jepara
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
This research aims to build a Business Intelligence (BI)-based academic monitoring system in the Unisnu Jepara Information Systems Study Program to improve the efficiency and quality of decision making. The method used involves analyzing student academic data with the help of Microsoft Power BI for data processing. Data is taken from the Academic Information System (SIAKAD) and processed to produce visualizations in the form of informative dashboards. The research results show visualization of a...
Sumber Asli
Google Scholar