JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
https://journal.iteba.ac.id/index.php/jurnal_quancom
<p><strong>Jurnal Quancom</strong> : Jurnal Quantum Komputer adalah jurnal yang fokus pada bidang Teknik komputer atau rekayasa komputer khusus yang mengkombinasikan teknik elektro dan ilmu komputer. Jurnal ini secara konten akan mempublikasi berkaitan erat dengan perancangan, pengembangan dan sistem -sistem berbasis komputer. Artikel yang dapat diisi dalam jurnal Teknik Komputer ini mencakup: Internet of Things (IoT), Robotic, Artificial Intelligence, network. Jurnal ini akan terbit dua kali dalam setahun, pada <strong>Juni</strong> dan <strong>Desember</strong>.</p>LPPM-ITEBAen-USJURNAL QUANCOM: QUANTUM COMPUTER JURNAL2988-1005Inovasi Sistem Kontrol Akses Gerbang Kantor Pemerintahan Berbasis Teknologi Multisensor dan Deteksi Plat Nomor Kendaraan
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/433
<p>Technological advances are developing rapidly at this time, the need for efficiency, security and automation in the office environment has become a top priority. One innovation that answers this need is technology for office gates, the need for a more sophisticated and efficient access control system is increasingly urgent. The problem that occurs, namely intrusions outside working hours, means that unknown individuals can easily enter the office area without permission. Additionally, cases involving lost employee ID cards, which were used by others to access designated areas, underscore the need for identification systems that are more secure and difficult to abuse. The office gate security system utilizes Webcam Camera input, RFID Reader, Fingerprint Sensor, Ultrasonic and Esp8266, Web, Servo, LED, LCD and Buzzer output. The Webcam camera can take pictures and save them on the web and the RFID Reader detects E-KTP, the Fingerprint sensor detects fingerprints and then the LCD displays information that registration is successful. This tool is processed with an Arduino Mega 2560 microcontroller as a connection.</p>Mardhiah MasrilOndra Eka PutraHasri AwalBilly Hendrik
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-28221810.62375/jqc.v2i2.433Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/432
<p>Data security is an essential aspect in the dynamic digital age, including protection of data integrity, confidentiality and authentication. This research evaluates the performance and security of three popular hash algorithms: SHA-256, SHA-3, and Blake2. Resistance to brute force attacks, avalanche effects, and processing time efficiency were analyzed. Results show that all algorithms have excellent resistance to brute force attacks, thanks to the 256-bit hash length. In terms of avalanche effect, SHA-3 shows higher consistency than the other algorithms, making it superior in maintaining data integrity. In terms of processing time efficiency, Blake2 performed best with the fastest hashing time, while SHA-256 offered balanced efficiency for general applications. SHA-3, although slower, has advantages in security and resistance to collision attacks. Overall, SHA-3 is recommended for applications with high security requirements, Blake2 is suitable for applications that prioritize efficiency, and SHA-256 remains relevant for applications that require a balance between speed and security.</p>Joice Sharon Gabriella SinagaNehemia SitorusSteven Lukas Samosir
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-282291610.62375/jqc.v2i2.432Pengujian dan Analisis Teknik Steganografi Menggunakan Metode Playfair, ElGamal, dan LSB untuk Penyembunyian Data pada Gambar Digital dalam Aplikasi Modern
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/422
<p>The rapid advancement of information and communication technology has significantly transformed how individuals interact and share information, particularly through digital media such as images. While offering numerous benefits, the ease of digital media manipulation poses serious challenges, including cybercrimes like phishing and cyberbullying, highlighting the need for reliable data protection methods to maintain information confidentiality. This research focuses on steganography, the art of concealing messages in such a way that only the sender and recipient are aware of the hidden information. The study implements the Least Significant Bit (LSB) technique for embedding secret files within digital images and evaluates its effectiveness across various transmission scenarios, including email and instant messaging applications like WhatsApp, Instagram, and Telegram. Additionally, the research incorporates cryptographic algorithms such as Playfair and ElGamal to enhance data security. The findings aim to provide insights into the strengths and weaknesses of these methodologies, ultimately contributing to the development of secure digital communication practices.</p>Sion Saut Parulian PardosiMelvayana ManikIrene Mutiara Situmorang
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-2822172210.62375/jqc.v2i2.422Perbandingan Performance Kriptografi RSA, RSA-CRT, Rabin dalam Proses Pengamanan Pesan Berbasis Teks
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/417
<p>Data security is a critical aspect in the digital era, especially in securing text-based messages. This research compares the performance of three asymmetric cryptography algorithms-RSA, RSA-CRT, and Rabin-in terms of the speed and efficiency of the encryption and decryption process. The RSA (Rivest-Shamir Adleman) algorithm, one of the most popular cryptographic methods, uses two different keys (public and private) to encrypt and decrypt data, but has a weakness in decryption time efficiency on large data. RSA-CRT, as a modification of RSA with the Chinese Remainder Theorem approach, speeds up the decryption process by dividing large operations into smaller ones. Rabin's algorithm, which is based on prime factorization, shows high time efficiency for both encryption and decryption processes, although it produces four possible plaintexts that require additional selection. All three algorithms were tested using text data with varying character sizes, ranging from 100 to 10,000 characters. The test results show that RSA has the fastest encryption time, RSA-CRT excels in decryption, and Rabin offers the best overall efficiency for securing text-based data. This research provides algorithm recommendations according to system needs, taking into account the balance between efficiency and security.</p>Deby Cynthia Rohara ManaluMutiara EnjelinaJohannes Bastian Jasa Sipayung
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-2822233010.62375/jqc.v2i2.417Perancangan Smart Library Assistant Menggunakan Voice Recognition Module
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/410
<p>This study proposes the design of a Smart Library Assistant using a Voice Recognition Module to facilitate book search in libraries. Despite the availability of digital books, many people still prefer physical books, and libraries remain a vital source of knowledge and information. However, finding books in a library can be challenging, especially when dealing with large collections. To address this issue, the study explores the use of voice recognition technology to create a smart library assistant that can help users locate books efficiently. The system will utilize the DFRobot Gravity offline voice recognition module to identify book genres and execute custom commands for finding books, eliminating the need for an internet connection. The research indicates that the voice recognition module, equipped with a microphone sensitive to -28db and capable of handling a maximum sound pressure level of 120db, enables the smart library system to accurately hear command words. The use of offline voice recognition modules, such as the DFRobot Gravity, can effectively simplify book searching in libraries. This technology allows the Smart Library Assistant to accurately identify genres and process voice commands without needing an internet connection. With a sensitive microphone capable of handling high sound pressure levels, the system provides an efficient solution for navigating large book collections.</p>Jeremy AndikaDeosa Putra CaniagoM. Abrar Masril
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-2822313410.62375/jqc.v2i2.410Rancang Bangun Alat Penetralisir Asap Rokok pada Ruang Tamu Berbasis Internet of Things
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/398
<p>Cigarette smoke is one type of air pollutant that can cause various health problems, such as coughing, cancer and other health problems, especially when accumulated in the house, especially in the living room which is often used for gathering. This research aims to design and build an Internet of Things (IoT)-based cigarette smoke neutralization device that utilizes MQ-2 and MQ-135 sensors to detect the presence of smoke and harmful substances. The method used in this research is the waterfall method, which includes requirements analysis, design, implementation, testing, and maintenance. The development process of this tool is carried out systematically. This tool is equipped with a bot telegram notification system that provides real-time information to users regarding the air quality in the living room. When the sensor detects pollution levels exceeding the threshold, the device will activate the fan to increase air circulation and utilize the exhaust fan to neutralize smoke. In addition, the sound output from the speaker provides information about the air quality and notifies that the room has been successfully neutralized. Based on the test results, this prototype tool is able to detect air quality and takes ±1 minute to neutralize a room contaminated with smoke > 10 ppm while for smoke levels > 50 ppm, it takes ±2 minutes to create a healthy environment for the occupants. This research is expected to provide an innovative solution to the problem of smoke pollution and the implementation of indoor smoking bans.</p>Andika Zahrah Ramadhanti DikaLuki HernandoJoni Eka Candra
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-2822354010.62375/jqc.v2i2.398Implementasi Artificial Intelligence Dalam Aplikasi Chatbot Untuk Rekomendasi Wisata Pantai Di Batam Dengan Metode Feedforwad Neural Network
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/401
<table width="672"> <tbody> <tr> <td width="466"> <p>Batam, as the third largest city in Sumatra, has many attractive beaches such as Melur Beach that attract both local and foreign tourists. However, the abundance of choices and the lack of complete information often make novice travelers confused in choosing the right destination. The variety of attractions and activities at tourist sites also adds to the hesitation. As a solution to this problem, an automated chatbot was developed that is able to provide services as if visitors were interacting directly with staff or officers without any time constraints. This research aims to design and implement a chatbot system capable of providing beach tourism recommendations in Batam using the Feedforward Neural Network (FFNN) method. The dataset used includes descriptive information about beach tourist attractions in Batam as well as reviews from visitors. The model achieved the best accuracy with 80% dataset division for training and 20% for testing, with 600 epochs, batch size 10, and learning rate 0.002, which resulted in 97.1% accuracy. Evaluation of this model shows a macro precision value of 79.71%, macro recall of 80%, and macro F1 score of 79.76%. Overall, the model showed high effectiveness in classification tasks, with high accuracy and a good balance between detecting correct instances and minimizing prediction errors. This design shows that a chatbot with feedforward neural network model can be used effectively which is able to provide beach tourism recommendations in Batam with high accuracy and appropriate response to the user.</p> </td> </tr> </tbody> </table>Arvy Kurnia RamadhanMuhammad Abrar MasrilDeosa Putra Caniago
Copyright (c) 2024 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2024-12-282024-12-2822414610.62375/jqc.v2i2.401