Vol 13, No 1 (2021)

DOI: https://doi.org/10.33096/ilkom.v13i1

Table of Contents

Artikel

Motion Detection of Objects in Home Security Systems Using Binary-Image Comparison Method Based on Robot Operating System 2 and Raspberry Pi

author Abdul Jalil(1*); Matalangi Matalangi(2);

(1) STMIK Handayani Makassar
(2) STMIK Handayani Makassar
(*) Corresponding Author

graph Abstract view: 100 times
Compute Function Analysis Utilizing IAAS Private Cloud Computing Service Model in Packstack Development

author Mohamad Iqbal Suriansyah(1*); Iyan Mulyana(2); Junaidy Budi Sanger(3); Sandi Winata(4);

(1) Universitas Pakuan
(2) Universitas Pakuan
(3) Unika De La Salle Manado
(4) Universitas Pakuan
(*) Corresponding Author

graph Abstract view: 62 times
Fuzzy Logic Algorithm and Analytic Network Process (ANP) for Boarding House Search Recommendations

author Wawan Gunawan(1*);

(1) Universitas Mercu Buana
(*) Corresponding Author

graph Abstract view: 45 times
Comparison of K-Means and K-Medoids Algorithms for Clustering the Spread of the COVID-19 Outbreak in Indonesia

author Wargijono Utomo(1*);

(1) Universitas Krisnadwipayana
(*) Corresponding Author

graph Abstract view: 63 times
Application of Knowledge Management System for Cattle Cultivation

author Edi Kusnadi(1*); Yessy Yanitasari(2); Supriyadi Supriyadi(3);

(1) STMIK Kharisma Karawang
(2) STMIK Kharisma Karawang
(3) STMIK Kharisma Karawang
(*) Corresponding Author

graph Abstract view: 31 times
Evaluation of Lambung Mangkurat University Student Academic Portal Using User Experience Questionnaires (UEQ)

author Yuslena Sari(1*); Novitasari Novitasari(2); Hani Pratiwi(3);

(1) Universitas Lambung Mangkurat
(2) Universitas Lambung Mangkurat
(3) Universitas Lambung Mangkurat
(*) Corresponding Author

graph Abstract view: 21 times
Clustering of the Potential of Customers' Internet Bandwidth Upgrade on FTTH Broadband

author Sasa Ani Arnomo(1*); Yulia Yulia(2);

(1) Universitas Putera Batam
(2) STIE Nagoya Indonesia
(*) Corresponding Author

graph Abstract view: 51 times
Development of the Forensic Storage Framework using the Composite Logic method

author Helmi Rachman(1*); Bambang Sugiantoro(2); Yudi Prayudi(3);

(1) Universitas Islam Idonesia
(2) UIN Sunan Kalijaga Yogyakarta
(3) Universitas Islam Indonesia
(*) Corresponding Author

graph Abstract view: 28 times
Steganographic Techniques using Modified Least Significant Bit and Modification Reshape Transposition Methods

author Guntoro Barovih(1); Fadhila Tangguh Admojo(2*); Yoda Hersaputra(3);

(1) STMIK PalComTech
(2) STMIK PalComTech
(3) STMIK PalComTech
(*) Corresponding Author

graph Abstract view: 62 times