cover
Contact Name
Ainul Hizriadi, S.Kom., M.Sc.
Contact Email
ainul.hizriadi@usu.ac.id
Phone
-
Journal Mail Official
jocai@usu.ac.id
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Data Science: Journal of Computing and Applied Informatics
ISSN : 25806769     EISSN : 2580829X     DOI : -
Core Subject : Science,
Data Science: Journal of Computing and Applied Informatics (JoCAI) is a peer-reviewed biannual journal (January and July) published by TALENTA Publisher and organized by Faculty of Computer Science and Information Technology, Universitas Sumatera Utara (USU) as an open access journal. It welcomes full research articles in the field of Computing and Applied Informatics related to Data Science from the following subject area: Analytics, Artificial Intelligence, Bioinformatics, Big Data, Computational Linguistics, Cryptography, Data Mining, Data Warehouse, E-Commerce, E-Government, E-Health, Internet of Things, Information Theory, Information Security, Machine Learning, Multimedia & Image Processing, Software Engineering, Socio Informatics, and Wireless & Mobile Computing. ISSN (Print) : 2580-6769 ISSN (Online) : 2580-829X Each publication will contain 5 (five) manuscripts published online and printed. JoCAI strives to be a means of periodic, accredited, national scientific publications or reputable international publications through printed and online publications.
Arjuna Subject : -
Articles 20 Documents
The Implementation Of Bellman-Ford Algorithm In Rembang Tourism Mobile Application As A Tourism Information Media Supraptono, Eko; Arfriandi, Arief; Rizqian, Sulus Ilhamti
Data Science: Journal of Computing and Applied Informatics Vol 3 No 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v3.i1-679

Abstract

Tourism is one of the methods to publish the beauty of nature or the uniqueness of culture in a region that spreads from the coast up to the mountains. The distribution and the access to tourist attractions require mobile application. In creating the application, Bellman – Ford algorithm was used to get the shortest route. The algorithm was the Bellman – Ford algorithm which was used to calculate the shortest distance to the tourist attraction on the weighted graph. Testing the functionality of the application used a black box. The results showed that functions on the mobile application could run well. The compatibility testing showed 100% compatibility with a number of Android devices. In addition, the usability testing showed that the application was appropriate to use with percentage by 82.7% of the 30 respondents. The "Rembang tourism" mobile application can be used by users of information about tourism.
Geographical Considerations for Implementing Autonomous Unmanned Solar-HAPS for Communications Area Coverage Anicho, Ogbonnaya; Charlesworth, Philip B; Baicher, Gurvinder; Nagar, Atulya
Data Science: Journal of Computing and Applied Informatics Vol 3 No 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v3.i1-636

Abstract

The impact and requirements for implementing stratospheric or high altitude vehicles for communications coverage may vary from one geographical location to another. These variations may impose significant constraints on energy and various key parameters of the vehicle’s operation and performance.This paper therefore, examines the potential for autonomous fixed-wing unmanned solar-powered High Altitude Platform Station or Pseudo-Satellite (HAPS) to provide persistent communications coverage. As a solar dependent platform, the potential for harnessing green energy and long platform endurance makes it an attractive communications coverage option. However, the variation of latitude and seasons across the globe presents an implementation constraint and challenges power availability and coverage capability. This paper investigates how the services of a typical solar-powered HAPS are affected by latitude and season. It shows that the degree of insolation directly affects the unmanned aircraft’s altitude, hence, its footprint diameter and power available to the communications payload. The paper highlights effective energy management algorithms as key to successful implementation of solar-powered unmanned HAPS especially at challenging latitudes and seasons
On Mathematical Braids Baldemor, Milagros
Data Science: Journal of Computing and Applied Informatics Vol 3 No 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v3.i1-624

Abstract

A braid is any sequence of crossings of the -strand braid with a positive number n, provided none of the strands are self-crossing. The idea is that braids can be organized into groups, in which the group operation is *, which means: “do the first braid on a set of strands, and then follow it with a second on the twisted strand”. This study dealt with the formulation of additional basic properties of mathematical braids and the connection of mathematical braids to exponential theorems. Moreover, the researchers developed a program that could generate the total number of crossings and the total number of generators in an n-strand braid with a positive number n.
Premagic and Ideal Flow Matrices Teknomo, Kardi
Data Science: Journal of Computing and Applied Informatics Vol 3 No 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v3.i1-621

Abstract

Several interesting properties of a special type of matrix that has a row sum equal to the column sum are shown with the proofs. Premagic matrix can be applied to strongly connected directed network graph due to its nodes conservation flow. Relationships between Markov Chain, ideal flow and random walk on directed graph are also discussed.
Analyzing Decision Support System for Determining Eligibility of Home Ownership Loan Using Fuzzy Mamdani Logical Method and Technology Acceptance Model in Banking Usino, Wendi; Bayyinah, Ayi
Data Science: Journal of Computing and Applied Informatics Vol 3 No 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v3.i1-619

Abstract

Every year, the number of people who want to own a house by credit increase, therefore the chances of increasing problem loans will be greater. Non-Performing Loan (NPL) is an indicator to assess the performance of bank functions. The higher the NPL value, the performance of the bank is considered worse. In order to maintain the caution of banks (creditors) in the provision of credit, the bank needs to assess and determine the criteria of debtors who can be given credit. So the bank can make decisions precisely and accurately. In this research, the Researcher will design decision support system with Mamdani fuzzy logic method with the resulted output in the form of "rejected" or "approved" decision. The accuracy rate in this study is 98%. 2% of the difference consists of 63.64% is a debtor with NPL credit status (problematic). After the system was designed in this study, the researcher conducted an analysis to see the user behavior when using the system. The method used is Technology Acceptance Model (TAM). The result of TAM analysis is the simultaneous relationship among of all variables on the acceptance of information technology (acceptance of IT) have a positive impact. However, a partial relationship between perceived usefulness and attitude toward using does not have a positive effect.
Efficiency of Local Government Units in North Western Philippines as to the Attainment of the Millennium Development Goals Baldemor, Milagros
Data Science: Journal of Computing and Applied Informatics Vol 1 No 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v1.i1-64

Abstract

This study entitled “Efficiency of Local Government Units in Northwestern Philippines as to the Attainment of the Millennium Development Goals” determined the performance of the four provinces and eight cities in Region I, Philippines, vis-à-vis their efficiency along the eight goals and 21 targets of the Millennium Development Goals (MDGs) for 2012-2015. Furthermore, it determined the peer groups and weights of the DMUs (Decision Making Units – the different provinces and cities), the virtual inputs/outputs or potential improvements of the DMUs to be in the efficient frontier, the input and output slacks (input excesses and output shortfalls) needed in the different indicators and the best practices to be considered by the inefficient and weak efficient DMUs. The “best practice” in the frontier is the basis to calculate the adjustments necessary for the DMUs. Different indicators showed varied performance levels in the different years but there are best practices from the “efficient” DMUs which could be adapted by the “weak efficient” and “inefficient” ones.
On Factoring The RSA Modulus Using Tabu Search Candra, Ade; Budiman, Mohammad Andri; Rachmawati, Dian
Data Science: Journal of Computing and Applied Informatics Vol 1 No 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v1.i1-65

Abstract

It is intuitively clear that the security of RSA cryptosystem depends on the hardness of factoring a very large integer into its two prime factors. Numerous studies about integer factorization in the field of number theory have been carried out, and as a result, lots of exact factorization algorithms, such as Fermat’s factorization algorithm, quadratic sieve method, and Pollard’s rho algorithm have been found. The factorization problem is in the class of NP (non-deterministic polynomial time). Tabu search is a metaheuristic in the field of artificial intelligence which is often used to solve NP and NP-hard problems; the result of this method is expected to be close-to-optimal (suboptimal). This study aims to factorize the RSA modulus into its two prime factors using tabu search by conducting experiments in Python programming language and to compare its time performance with an exact factorization algorithm, i.e. Pollard’s algorithm. The primality test is done with Lehmann’s algorithm.
Implementation and comparison of Berry-Ravindran and Zhu- Takaoka exact string matching algorithms in Indonesian-Batak Toba dictionary Budiman, Mohammad Andri; Timanta, Jos; Siburian, Efelin
Data Science: Journal of Computing and Applied Informatics Vol 1 No 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v1.i1-67

Abstract

Indonesia has a variety of local languages, which is the Batak Toba language. This time, there are still some Batak Toba people who do not know speak Batak Toba language fluently. Nowadays, desktop based dictionary is one of reference that very efficiently used to learn a language and also to increase vocabulary. In making the dictionary application, string matching can be implemented for word-searching process. String matching have some algorithm, which is Berry – Ravindran algorithm and Zhu-Takaoka algorithm and will be implemented on the dictionary application. Zhu-Takaoka algorithm and Berry – Ravindran algorithm have two phases, which are the preprocessing phase and the searching phase. Preprocessing phase is a process to make the shifting values according to in pattern that input by user. To know the shifting value with Zhu-Takaoka algorithm, it’s need Zhu-Takaoka Bad Character (Ztbc) and Boyer-Moore Good Suffix (Bmgs). Then, Ztbc will be compared to Bmgs to get the maximum value of them that will be set as shifting value. While Berry-Ravindran algorithm, to know the shifting value is needed Berry-Ravindran Bad Character, which the two characters right of the text at the position m + 1 and m+ 2, is needed to determine the shifting value, where m is length of the pattern.
Improving Data Collection on Article Clustering by Using Distributed Focused Crawler Gunawan, Dani; Amalia, Amalia; Najwan, Atras
Data Science: Journal of Computing and Applied Informatics Vol 1 No 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v1.i1-82

Abstract

Collecting or harvesting data from the Internet is often done by using web crawler. General web crawler is developed to be more focus on certain topic. The type of this web crawler called focused crawler. To improve the datacollection performance, creating focused crawler is not enough as the focused crawler makes efficient usage of network bandwidth and storage capacity. This research proposes a distributed focused crawler in order to improve the web crawler performance which also efficient in network bandwidth and storage capacity. This distributed focused crawler implements crawling scheduling, site ordering to determine URL queue, and focused crawler by using Naïve Bayes. This research also tests the web crawling performance by conducting multithreaded, then observe the CPU and memory utilization. The conclusion is the web crawling performance will be decrease when too many threads are used. As the consequences, the CPU and memory utilization will be very high, meanwhile performance of the distributed focused crawler will be low.
A Framework to Ensure Data Integrity and Safety Paulus, Erick; Fauzan, Mochamad Azmi
Data Science: Journal of Computing and Applied Informatics Vol 2 No 1 (2018): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v2.i1-90

Abstract

The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography and digital signatures, such as authenticity, integrity, and data confidentiality. The application is designed using the SHA-256 algorithm as digital signature, AES algorithm as file encryption, and RSA algorithm as asymmetric key in digital file distribution and signature. Then, several simulation testing was performed to ensure the robustness of the framework. Furthermore, we also evaluated the speed of framework based on CPU and memory capacity. Based on the experiment, our proposed framework can be a reliable solution for securing data in data transaction

Page 1 of 2 | Total Record : 20