Vol 13, No 1 (2021)

DOI: https://doi.org/10.33096/ilkom.v13i1

Table of Contents

Artikel

Object motion detection in home security system using the binary-image comparison method based on robot operating system 2 and Raspberry Pi

author Abdul Jalil(1*); Matalangi Matalangi(2)

(1) STMIK Handayani Makassar
(2) STMIK Handayani Makassar
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.686.1-8 graph Abstract view: 446 times
PDF
1-8
Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development

author Mohamad Iqbal Suriansyah(1*); Iyan Mulyana(2); Junaidy Budi Sanger(3); Sandi Winata(4)

(1) Universitas Pakuan
(2) Universitas Pakuan
(3) Unika De La Salle Manado
(4) Universitas Pakuan
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.693.9-17 graph Abstract view: 251 times
PDF
9-17
Fuzzy logic algorithm and analytic network process (ANP) for boarding houses searching recommendations

author Wawan Gunawan(1*)

(1) Universitas Mercu Buana
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.750.18-30 graph Abstract view: 199 times
PDF
18-30
The comparison of k-means and k-medoids algorithms for clustering the spread of the covid-19 outbreak in Indonesia

author Wargijono Utomo(1*)

(1) Universitas Krisnadwipayana
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.763.31-35 graph Abstract view: 305 times
PDF
31-35
Implementation of knowledge management system in cattle farming

author Edi Kusnadi(1*); Yessy Yanitasari(2); Supriyadi Supriyadi(3)

(1) STMIK Kharisma Karawang
(2) STMIK Kharisma Karawang
(3) STMIK Kharisma Karawang
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.785.36-44 graph Abstract view: 170 times
PDF
36-44
Evaluation of lambung mangkurat university student academic portal using user experience questionnaire (UEQ)

author Yuslena Sari(1*); Novitasari Novitasari(2); Hani Pratiwi(3)

(1) Universitas Lambung Mangkurat
(2) Universitas Lambung Mangkurat
(3) Universitas Lambung Mangkurat
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.787.45-50 graph Abstract view: 138 times
PDF
45-50
Clustering the potential bandwidth upgrade of FTTH broadband subscribers

author Sasa Ani Arnomo(1*); Yulia Yulia(2)

(1) Universitas Putera Batam
(2) STIE Nagoya Indonesia
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.805.51-57 graph Abstract view: 196 times
PDF
51-57
Forensic storage framework development using composite logic method

author Helmi Rachman(1*); Bambang Sugiantoro(2); Yudi Prayudi(3)

(1) Universitas Islam Idonesia
(2) UIN Sunan Kalijaga Yogyakarta
(3) Universitas Islam Indonesia
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.811.58-66 graph Abstract view: 145 times
PDF
58-66
Steganographic techniques using modified least significant bit and modification reshape transposition methods

author Guntoro Barovih(1); Fadhila Tangguh Admojo(2*); Yoda Hersaputra(3)

(1) STMIK PalComTech
(2) STMIK PalComTech
(3) STMIK PalComTech
(*) Corresponding Author

doi 10.33096/ilkom.v13i1.848.67-77 graph Abstract view: 206 times
PDF
67-77