Table of Contents
Artikel
Object motion detection in home security system using the binary-image comparison method based on robot operating system 2 and Raspberry Pi
Abdul Jalil(1*); Matalangi Matalangi(2) (1) STMIK Handayani Makassar (2) STMIK Handayani Makassar (*) Corresponding Author 10.33096/ilkom.v13i1.686.1-8 Abstract view: 972 times |
1-8
|
Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development
Mohamad Iqbal Suriansyah(1*); Iyan Mulyana(2); Junaidy Budi Sanger(3); Sandi Winata(4) (1) Universitas Pakuan (2) Universitas Pakuan (3) Unika De La Salle Manado (4) Universitas Pakuan (*) Corresponding Author 10.33096/ilkom.v13i1.693.9-17 Abstract view: 568 times |
9-17
|
Fuzzy logic algorithm and analytic network process (ANP) for boarding houses searching recommendations
Wawan Gunawan(1*) (1) Universitas Mercu Buana (*) Corresponding Author 10.33096/ilkom.v13i1.750.18-30 Abstract view: 570 times |
18-30
|
The comparison of k-means and k-medoids algorithms for clustering the spread of the covid-19 outbreak in Indonesia
Wargijono Utomo(1*) (1) Universitas Krisnadwipayana (*) Corresponding Author 10.33096/ilkom.v13i1.763.31-35 Abstract view: 1194 times |
31-35
|
Implementation of knowledge management system in cattle farming
Edi Kusnadi(1*); Yessy Yanitasari(2); Supriyadi Supriyadi(3) (1) STMIK Kharisma Karawang (2) STMIK Kharisma Karawang (3) STMIK Kharisma Karawang (*) Corresponding Author 10.33096/ilkom.v13i1.785.36-44 Abstract view: 612 times |
36-44
|
Evaluation of lambung mangkurat university student academic portal using user experience questionnaire (UEQ)
Yuslena Sari(1*); Novitasari Novitasari(2); Hani Pratiwi(3) (1) Universitas Lambung Mangkurat (2) Universitas Lambung Mangkurat (3) Universitas Lambung Mangkurat (*) Corresponding Author 10.33096/ilkom.v13i1.787.45-50 Abstract view: 687 times |
45-50
|
Clustering the potential bandwidth upgrade of FTTH broadband subscribers
Sasa Ani Arnomo(1*); Yulia Yulia(2) (1) Universitas Putera Batam (2) STIE Nagoya Indonesia (*) Corresponding Author 10.33096/ilkom.v13i1.805.51-57 Abstract view: 435 times |
51-57
|
Forensic storage framework development using composite logic method
Helmi Rachman(1*); Bambang Sugiantoro(2); Yudi Prayudi(3) (1) Universitas Islam Idonesia (2) UIN Sunan Kalijaga Yogyakarta (3) Universitas Islam Indonesia (*) Corresponding Author 10.33096/ilkom.v13i1.811.58-66 Abstract view: 360 times |
58-66
|
Steganographic techniques using modified least significant bit and modification reshape transposition methods
Guntoro Barovih(1); Fadhila Tangguh Admojo(2*); Yoda Hersaputra(3) (1) STMIK PalComTech (2) STMIK PalComTech (3) STMIK PalComTech (*) Corresponding Author 10.33096/ilkom.v13i1.848.67-77 Abstract view: 486 times |
67-77
|