Explorer https://journal.fkpt.org/index.php/Explorer <p><strong>EXPLORER Journal of Computer Science and Information Technology</strong> is a scientific journal published by the FKPT (Forum Kerjasama Pendidikan Tinggi). This journal contains scientific papers from Academics, Researchers, and Practitioners about research on Computer Science and Information Technology. EXPLORER journal has an EISSN <a href="https://issn.brin.go.id/terbit/detail/1607529636" target="_blank" rel="noopener">2774-4647</a>. <strong>EXPLORER Journal of Computer Science and Information Technology</strong> is published twice a year in January and July. The paper is an original script and has a research base on Computer Science and Information Technology. The scope of the paper includes several studies but is not limited to the study of Artificial Intelligence, Computer Graphics, and Animation, Image Processing, Cryptography, Computer Network Security, Modelling and Simulation, Multimedia, Computer Architecture Design, Computer Vision and Robotics, Parallel and Distributed Computing, Operating System, Information System, Mobile Computing, Natural Language Processing, Data Mining, Machine Learning, Expert System and Geographical Information System. Thus, we invite Academics, Researchers, and Practitioners to participate in submitting their work to this journal. <br>EXPLORER Journal of Computer Science and Information Technology has indexed by <a href="https://scholar.google.com/citations?hl=id&amp;user=57j7ZW4AAAAJ">Google Scholar</a> | <a href="https://garuda.kemdikbud.go.id/journal/view/23556">Portal Garuda</a> | <a href="https://portal.issn.org/resource/ISSN/2774-4647">ROAD</a> | <a href="https://search.crossref.org/?q=2774-4647&amp;from_ui=yes">Crossref</a> | <a href="https://www.scilit.net/journal/7012280">Scilit</a> | <a href="https://app.dimensions.ai/discover/publication?search_mode=content&amp;and_facet_source_title=jour.1120349">Dimensions</a> | <a href="https://www.worldcat.org/search?q=2774-4647&amp;qt=results_page">WorldCat.org</a>&nbsp;</p> en-US <p>Authors retain copyright and grant the<strong>&nbsp;EXPLORER</strong>&nbsp;right of first publication with the work simultaneously licensed under a&nbsp;<a href="http://creativecommons.org/licenses/by-sa/4.0/">Creative Commons Attribution License (CC BY-SA 4.0)</a>&nbsp;that allows others to&nbsp;<strong>share</strong>&nbsp;(copy and redistribute the material in any medium or format) and&nbsp;<strong>adapt&nbsp;</strong>(remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in&nbsp;<strong>EXPLORER</strong>.<br><br>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in&nbsp;<strong>EXPLORER</strong>.<br><br>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).</p> dodi.stth@gmail.com (Dodi Siregar) dian.10.22@gmail.com (Tengku Mohd Diansyah) Mon, 13 Jan 2025 03:31:43 +0000 OJS 3.1.2.1 http://blogs.law.harvard.edu/tech/rss 60 Media Pembelajaran Praktikum Jaringan Komputer Berbasis Augmented Reality dengan Metode Marker Based Tracking https://journal.fkpt.org/index.php/Explorer/article/view/1719 <p><em>This study aims to create a learning media for computer network practicum based on Virtual Lab simulation using Augmented Reality (AR) technology that can be used by Istiqlal Vocational High School students to direct computer networks anytime and anywhere. This learning media is created to help students understand the basic concepts of 3D object computer networks that appear in the real world through mobile devices in a more interactive and interesting way. The method used in this study is Marker Based Tracking. This learning media utilizes markers to display 3D learning objects that can be interacted with by students, thus helping them understand the material more deeply and practically. The results of the study showed that the use of AR with the Marker Based Tracking method was effective in improving students' understanding of computer network material. Students were more interested and active in practicums, and were able to apply theories in real 3D object simulations, which increased the effectiveness of learning. Based on the results of trials on 23 respondents, most users gave positive responses to the 3D objects provided, with 91.7% of users assessing the 3D objects presented as good quality, and 75% felt that this application increased interest in learning. In addition, 83.3% of respondents felt helped in understanding the material.</em></p> Suci Wulandari, Haida Dafitri, Yessi Fitri Annisah Lubis Copyright (c) 2025 Suci Wulandari, Haida Dafitri, Yessi Fitri Annisah Lubis https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1719 Fri, 10 Jan 2025 00:00:00 +0000 Otentikasi Dua Faktor Menggunakan Totp dengan SHA-512 untuk Sistem Pemilihan Presiden Mahasiswa https://journal.fkpt.org/index.php/Explorer/article/view/1782 <p>This study originated from the need for a secure election system in academic environments, particularly to address credential theft and cyberattack threats in the security of the Student Presidential election system. Ensuring security in student election systems presents a significant challenge, as conventional authentication methods are prone to voter identity authenticity manipulation. Therefore, this research proposes a two-factor authentication model using Time-Based One-Time Password (TOTP) based on the SHA-512 algorithm. This model provides an additional layer of security through time-based authentication and a stronger hash mechanism against attacks. Testing was conducted involving several user accounts from Gmail applications, where OTP codes were successfully sent to the users' email accounts. The results indicated that TOTP delivery and validation times ranged between 150 and 300 ms, with user satisfaction levels exceeding 80%. The implications of this study include enhanced security in the student presidential election system within academic environments and the potential for broader adoption in other fields requiring user authentication</p> Diki Arisandi, Seri Hartati, Givo Vrabora Copyright (c) 2025 Diki Arisandi, Seri Hartati, Givo Vrabora https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1782 Mon, 13 Jan 2025 03:21:03 +0000 Penerapan Metode Analytical Hierarchy Process dalam Pemilihan Human Personality https://journal.fkpt.org/index.php/Explorer/article/view/1787 <p>To obtain personality criteria based on the work provided, several agencies usually set standard personalities that prospective workers must possess, with the aim that workers can work in fields that support their personalities. Likewise, the Siumbut-umbut Kisaran Village Office sets standard personalities that must be possessed by each employee so that the work carried out has optimal results. This study aims to determine the type of personality appropriate for work in the Siumbut-umbut Kisaran Village Office using the Analytical Hierarchy Process (AHP) method. Decision Support Systems (DSS) are applied to overcome problems in determining standard personalities for employees so that work results are optimal. This study found that the highest personality priority is Phlegmatic (K2), and the prioritized alternative is Eva Wulandari (At1).</p> Zulfi Azhar, Wan Hafizah Ainun Syah Putri, Rizky Putri Mahfuz Copyright (c) 2025 Zulfi Azhar, Wan Hafizah Ainun Syah Putri, Rizky Putri Mahfuz https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1787 Fri, 24 Jan 2025 00:00:00 +0000 Implementasi Algoritma Greedy pada Rute Wisata Danau Tao Desa Batang Onang Baru Berbasis Website https://journal.fkpt.org/index.php/Explorer/article/view/1755 <p>This study aims to facilitate the travel of tourists visiting Tao Lake and increase travel efficiency by determining the fastest route. One of the methods used to determine the fastest route to Tao Lake is the greedy algorithm method. The advantage of the greedy algorithm is that it is fast in acting and does not take long to consider the consequences of what is decided so that it is very easy to implement in several existing problems. This website was created for the Gunung Tua and Padang Sidempuan areas. The results of the trial of the Tao Lake tourism website using a black box stated that the results of the website's feasibility point were 54% strongly agree, 26% agree, 14% disagree and 6% strongly disagree. The results of the website user satisfaction point were 58% strongly agree, 32% agree, 6% disagree and 4% strongly disagree.</p> Riska Novasari Siregar, Rahmat Aulia, Rosyidah Siregar Copyright (c) 2025 Riska Novasari Siregar, Rahmat Aulia, Rosyidah Siregar https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1755 Fri, 31 Jan 2025 00:00:00 +0000 Optimasi Fungsi Aktivasi pada Artificial Neural Network untuk Prediksi Gagal Jantung Secara Akurat https://journal.fkpt.org/index.php/Explorer/article/view/1840 <p>Heart failure is one of the major health problems that can be fatal if not diagnosed properly and quickly. Therefore, early prediction using artificial intelligence models, especially Artificial Neural Network (ANN), is needed to improve the accuracy in detecting heart failure. This study aims to optimize the activation function in ANN to predict heart failure accurately. Several optimization algorithms tested, namely Adam, RMSprop, SGD, Adagrad, and Adadelta, were used to evaluate model performance in terms of accuracy, precision, recall, and F1-score. The results showed that the Adam optimization algorithm provided the best performance with an accuracy of 86.74%, precision of 75.12%, recall of 66.67%, and F1-score of 70.64%. Meanwhile, other algorithms such as RMSprop, SGD, Adagrad, and Adadelta showed lower performance, with some metrics reaching 0%. This study shows that proper activation function optimization in ANN is very important to improve the model's ability to predict heart failure with a high level of accuracy.</p> Mokhamad Ramdhani Raharjo, Indra Riyana Rahadjeng, Muhammad Noor Hasan Siregar, Putrama Alkhairi Copyright (c) 2025 Mokhamad Ramdhani Raharjo, Indra Riyana Rahadjeng, Muhammad Noor Hasan Siregar, Putrama Alkhairi https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1840 Fri, 31 Jan 2025 00:00:00 +0000 Analisis Segmentasi Pasien Berdasarkan Persepsi Kualitas Pelayanan dengan Algoritma Clustering https://journal.fkpt.org/index.php/Explorer/article/view/1818 <p>Patient segmentation based on perceptions of service quality is a crucial step in improving patient experiences, optimizing resources, and enhancing healthcare service quality. However, understanding patients' needs and priorities in depth poses a challenge, particularly for hospitals serving populations with diverse demographic backgrounds. This study aims to cluster patients in a private hospital in Jambi City based on their perceptions of service quality using the K-Means algorithm. Data were collected from a 2022-2023 survey, covering patient demographics and perceptions of service quality. The data were processed through preprocessing steps, including missing value imputation, normalization, and encoding. The optimal number of clusters was determined using the Elbow and Silhouette Score methods. The results revealed three main clusters with distinct characteristics. The first cluster (34.29%) includes patients prioritizing service speed and procedural ease. The second cluster (46.12%) consists of patients who emphasize staff competence and cost fairness as their main priorities. The third cluster (19.59%) comprises patients with higher educational backgrounds who are more critical of facility quality and complaint handling. Evaluation using the Davies-Bouldin index demonstrated good cluster separation (score -0.645). This study concludes that patient segmentation based on perceptions of service quality can serve as a foundation for strategic decision-making to improve hospital service quality. Recommendations for future research include applying other algorithms such as DBSCAN, integrating sentiment analysis, and employing a hybrid approach to predict patient needs. These approaches are expected to provide a deeper understanding and more effective personalization of patient care.</p> Frangky Frangky, Rudolf Sinaga, M. Raihansyah Copyright (c) 2025 Frangky Frangky, Rudolf Sinaga, M. Raihansyah https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1818 Fri, 31 Jan 2025 00:00:00 +0000 Metode One Time Pad sebagai Verifikasi Akun E-Wallet dalam Pencegahan Cybercrime https://journal.fkpt.org/index.php/Explorer/article/view/1817 <p><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">This research aims to improve security when every time a user logs in or makes a transaction, an OTP (One time pad) will be sent via email, the OTP code is generated randomly and can only be accessed by the account party that has a valid and valid OTP key at that time. certain. Using the one time pad algorithm provides a very high level of security, because the resulting OTP is unique for each transaction. However, its implementation requires strict discipline in key management and proper encryption or decryption processes so that it can function optimally. This system is designed for account user security to prevent data leaks, thereby minimizing the potential for crimes such as identity theft and fraud. The research results show that not a single OTP was repeated in the 10 transactions carried out. Each OTP code generated is unique and different from previous OTPs, both on successful and failed transactions, proving the effectiveness of the system. This website was created using Visual Studio Code to ensure a stable and efficient system implementation</span></span></span></span></em></p> Sarifah Sarifah, Ilham Faisal, Imran Lubis Copyright (c) 2025 Sarifah Sarifah, Ilham Faisal, Imran Lubis https://creativecommons.org/licenses/by-sa/4.0 https://journal.fkpt.org/index.php/Explorer/article/view/1817 Fri, 31 Jan 2025 00:00:00 +0000