Table of Contents
Artikel
|
Object motion detection in home security system using the binary-image comparison method based on robot operating system 2 and Raspberry Pi
Abdul Jalil(1*); Matalangi Matalangi(2) (1) STMIK Handayani Makassar (2) STMIK Handayani Makassar (*) Corresponding Author
10.33096/ilkom.v13i1.686.1-8
|
1-8
|
|
Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development
Mohamad Iqbal Suriansyah(1*); Iyan Mulyana(2); Junaidy Budi Sanger(3); Sandi Winata(4) (1) Universitas Pakuan (2) Universitas Pakuan (3) Unika De La Salle Manado (4) Universitas Pakuan (*) Corresponding Author
10.33096/ilkom.v13i1.693.9-17
|
9-17
|
|
Fuzzy logic algorithm and analytic network process (ANP) for boarding houses searching recommendations
Wawan Gunawan(1*) (1) Universitas Mercu Buana (*) Corresponding Author
10.33096/ilkom.v13i1.750.18-30
|
18-30
|
|
The comparison of k-means and k-medoids algorithms for clustering the spread of the covid-19 outbreak in Indonesia
Wargijono Utomo(1*) (1) Universitas Krisnadwipayana (*) Corresponding Author
10.33096/ilkom.v13i1.763.31-35
|
31-35
|
|
Implementation of knowledge management system in cattle farming
Edi Kusnadi(1*); Yessy Yanitasari(2); Supriyadi Supriyadi(3) (1) STMIK Kharisma Karawang (2) STMIK Kharisma Karawang (3) STMIK Kharisma Karawang (*) Corresponding Author
10.33096/ilkom.v13i1.785.36-44
|
36-44
|
|
Evaluation of lambung mangkurat university student academic portal using user experience questionnaire (UEQ)
Yuslena Sari(1*); Novitasari Novitasari(2); Hani Pratiwi(3) (1) Universitas Lambung Mangkurat (2) Universitas Lambung Mangkurat (3) Universitas Lambung Mangkurat (*) Corresponding Author
10.33096/ilkom.v13i1.787.45-50
|
45-50
|
|
Clustering the potential bandwidth upgrade of FTTH broadband subscribers
Sasa Ani Arnomo(1*); Yulia Yulia(2) (1) Universitas Putera Batam (2) STIE Nagoya Indonesia (*) Corresponding Author
10.33096/ilkom.v13i1.805.51-57
|
51-57
|
|
Forensic storage framework development using composite logic method
Helmi Rachman(1*); Bambang Sugiantoro(2); Yudi Prayudi(3) (1) Universitas Islam Idonesia (2) UIN Sunan Kalijaga Yogyakarta (3) Universitas Islam Indonesia (*) Corresponding Author
10.33096/ilkom.v13i1.811.58-66
|
58-66
|
|
Steganographic techniques using modified least significant bit and modification reshape transposition methods
Guntoro Barovih(1); Fadhila Tangguh Admojo(2*); Yoda Hersaputra(3) (1) STMIK PalComTech (2) STMIK PalComTech (3) STMIK PalComTech (*) Corresponding Author
10.33096/ilkom.v13i1.848.67-77
|
67-77
|





Abdul Jalil(1*); Matalangi Matalangi(2)
