cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
jurnal.bits@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Building of Informatics, Technology and Science
ISSN : 26848910     EISSN : 26853310     DOI : -
Core Subject : Science,
Building of Informatics, Technology and Science (BITS) is an open access media in publishing scientific articles that contain the results of research in information technology and computers. Paper that enters this journal will be checked for plagiarism and peer-rewiew first to maintain its quality. This journal is managed by Forum Kerjasama Pendidikan Tinggi (FKPT) published 2 times a year in Juni and Desember. The existence of this journal is expected to develop research and make a real contribution in improving research resources in the field of information technology and computers.
Arjuna Subject : -
Articles 92 Documents
Search results for , issue "Vol 4 No 2 (2022): September 2022" : 92 Documents clear
Sistem Informasi Pramuka Berbasis Website Menggunakan Rational Unified Process Henri Herdiyanto; Lukman Lukman
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1731

Abstract

In this study the authors will examine the scouting system where the system built is able to overcome various problems that exist in the scouting area, including the registration process, dissemination of activity information, money management and trainer requests. Data collection on scouting activities in the city of Sorong, West Papua is still mostly done manually, this has resulted in many files being damaged or lost. Therefore we need a system that improves services to manage data and can overcome these obstacles. The making of this scouting information system is made using the PHP programming language and MySQL for the database. The method used is the rational unified process (RUP) where in this method the steps for making a good and correct system are described as well as testing using Roger Prassman where the results of the research carried out got a 90% satisfaction level
Analisis Sentimen Dalam Pengkategorian Komentar Youtube Terhadap Layanan Akademik dan Non-Akademik Universitas Terbuka Untuk Prediksi Kepuasan Rhini Fatmasari; Virda Mega Ayu; Hari Anto; windu Gata; Lili Dwi Yulianto
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1738

Abstract

The key to the success of an educational organization in achieving its goals of course cannot be separated from the quality of service both in academic and non-academic forms. Where in achieving these goals of course by giving satisfaction to the academics. The case study was carried out to predict service satisfaction at the Open University by using comments on social media Youtube as data processing. The text mining approach is a good alternative in terms of interpreting the meaning in the comments given. This study aims to analyze the predictions of service satisfaction from several categories as a benchmark. The categories are: Module, Tutorial, Scholarship, Lecturer, Exam, Application, Non-Academic and Others. The research method used is comparative, by applying 4 algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), Naïve Bayes (NB) and Random Forest (RF) for Prediction Accuracy. The total initial dataset is 7776 data and after cleansing and preprocessing is 6920 data. And then evaluated for the 7 categories after being accured to produce: Module category with the highest accuracy of 99.37% using the DT algorithm, Application Category with the highest accuracy of 100% using the DT algorithm, Teaching Category the highest accuracy of 99.42% using the algorithm DT. The tutorial category has the highest accuracy 92.4% using the SVM algorithm, the exam category has the highest accuracy 99.7% using the RF algorithm, the non-academic category has the highest accuracy 99.90% using the DT algorithm. And for the Others category the highest accuracy is 96.58% using the DT algorithm
Eksperimen Pengujian Optimizer dan Fungsi Aktivasi Pada Code Clone Detection dengan Pemanfaatan Deep Neural Network (DNN) Errissya Rasywir; Yovi Pratama; Fachruddin Fachruddin
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1776

Abstract

The problem of similarity (similarity) of program code can be one solution to the plagiarism detection approach. Plagiarism raises a form of action and consequences of plagiarism itself if the source used is not open source. Plagiarism is an act of deception of the work of others without the knowledge of the original author, which violates a Copyright and Moral Rights. With the increasing amount of data and data complexity, deep learning provides solutions for predictive analytics, with increased processing capabilities and optimal processor utilization. Deep learning shows success and improves the classification model in this field. On the other hand, clone detection code with massive, varied and high-speed data volumes requires feature extraction. With the potential of deep learning to extract better features, deep learning techniques are suitable for code clone detection. For this reason, it is necessary to develop a clone detection code that can process data from a programming language by utilizing deep learning. Based on the results of experiments conducted on 100 PHP program code data files, experimented with several types of activation function and optimizer methods. The average value of the resulting accuracy is good. With a variety of activation functions that we use such as Relu, Linear, Sigmoid, Softmax, Tanh, Elu, Selu, Softplus, Softsign, hard, and sigmoid, as well as variations of the optimizer used are Adagrad, RMSProp, SGD, Adadelta, Adam, Adamax and Nadam , the best attribute selection is in the Selu function and the RMSProp optimizer. The number of epochs used is 1000, the number of neurons per layer is 500 and the best number of hidden layers is 10, the average accuracy is 0.900
Penerapan Supply Chain Management (SCM) Dalam Pemantauan Stok Barang Berbasis Web Sri Wahyuni Nasution; Nuriadi Manurung; Elly Rahayu
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1781

Abstract

Umi Nala Shop store is engaged in selling toys, such as floats, laptop screens, construction sets, ambulance cars, small cars, jeep cars, and many more. The problem is that this store does not know the amount of inventory of goods in the warehouse. This store purchases goods from suppliers for the inventory of goods to be sold without knowing the available stock. This makes the inventory of goods to be sold by the store uncontrollable. The store records incoming and outgoing goods and transactions manually using paper so that data can be lost. The Umi Nala Shop has more than 200 resellers but is inactive and has ten suppliers to supply the goods sold. The sale of goods at the Umi Nala Shop is still offline, where customers come directly to the Umi Nala Shop. Marketing is carried out through social media networks such as Facebook, WhatsApp, and Instagram. In carrying out its business, it is necessary to pay attention to inventory management to provide for consumer needs and control inventory when there is a high demand for goods. For the store to compete, it is necessary to implement Supply Chain Management (SCM) to integrate suppliers, warehouse manufacturing, and storage so that goods are distributed in the correct quantity at the right time, to minimize costs and provide satisfaction to consumers. The purpose of this study is to build an SCM application that can make it easier for stores to find out the amount of inventory to ensure the availability of goods. The results of this study with the implementation of Supply Chain Management at the Umi Nala Shop store can help and make it easier for store owners to manage the supply chain of goods.
Penerapan dan Implementasi Metode Certainty Factor Dalam Sistem Pakar Diagnosa Awal Gangguan Menstruasi PALM-COEIN Putri Azzahra; Elin Haerani
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1805

Abstract

Menstrual disorders are changes that occur in the cycle, the amount of blood, and other changes related to the menstrual cycle. Menstrual disorders are often considered a common problem that can affect daily activities. Menstrual disorders that are ignored on an ongoing basis can cause various reproductive system disorders and are also an early sign of dangerous diseases. Many women ignore the menstrual disorders they experience because they are constrained in consulting a doctor both in terms of time, distance, and cost. To help overcome these obstacles, an expert system can be a solution. This expert system is made using the certainty factor method which consists of 43 symptoms with 7 types of disease. This system produces output in the form of a percentage of the type of possible disease experienced by the user and suggestions based on the symptoms selected by the user. The expert system built is expected to be a medium of information about menstrual disorders and can contribute to providing benefits to the community, especially women, to make an initial diagnosis of menstrual disorders experienced without being constrained in terms of time, distance, or cost
Rancangan Virtual Private Server Pada Kantor Kelurahan Menggunakan ZeroTier Theovan Gracia Stefana Putra; Indrastanti R Widiasari
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1810

Abstract

Banyuanyar Village is a guided village developed by the Boyolali Regency Government to become an internet village. The operational activities of the Banyuanyar Urban Village Office also utilize the existing internet network. However, its use is still not optimal and is at risk of being attacked because it uses the same network as general internet users and the Banyuanyar Urban Village Office does not yet have a central server as a database due to limited funds and technicians. Because of this, the activities of the staff who work become sluggish and less effective. Therefore, it takes a Virtual Private Server Design that is useful to support performance. This design uses ZeroTier which can be used as an open-source VPS and VPN and has the latest technology. This research provides effectiveness and security regarding data transfer and network in the Banyuanyar Village Office. Because ZeroTier can be controlled and supervised by admins who can later provide convenience in network management.
Analysis of IPSec Implementation on Dynamic Multipoint VPN Protocol Using Routing Border Gateway Protocol Muhammad Ali Said; Setyorini ‏‏‎ ‏‏‎ Setyorini‏‏‎; Erwid M Jadied
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1836

Abstract

Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations of VPN scalability. DMVPN has a combination of components: Next hop resolution protocol (NHRP), Multipoint Generic Routing Encapsulation (mGRE) and Routing protocol. This research implements a simple network consisting of Hub, Spoke1, Spoke2, Lan1, Lan2 and Lan3 using the GNS3 simulator. This study compares the performance of IPSec and without IPsec on DMVPN using the BGP Routing protocol on performance parameters namely delay, throughput, jitter and packet loss to evaluate the security impact of the DMVPN network. The results of this study indicate that IPSec DMVPN has an effect on sending UDP packets which have a throughput value without IPSec of 5082.18 kbit/s while IPSec's throughput is 5034.40 kbit/s. The value of packet loss without IPSec has a value of 7.54% while IPSec has a value of 4.79%. The results of the jitter value have the same value. The delay value without IPSec has a value of 0.183s while the IPSec delay value is 0.410s. TCP packet delivery has a throughput value without IPSec is 1139.16 kbit/s while the IPSec throughput value is 1105.20 kbit/s. The results of the packet loss value and the jitter value have the same value. The delay value without IPSec has a value of 0.185s while the IPSec delay value is 0.187s.
Depression Detection on Twitter Using Bidirectional Long Short Term Memory Putri Ester Sumolang; Warih Maharani
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1850

Abstract

The usage of social media as a platform for individual expression is one example of how the advancement of technology has an impact on society. Therefore, many Twitter users show symptoms of depressive disorders through their tweets. It is crucial to be aware of the need to consult a doctor or other specialists to prevent suicides. However, leveraging Twitter user tweet data to detect depression early on can be avoided by using the Bidirectional Long Short Term Memory (BILSTM) approach and the word2vec feature extraction method. The dataset utilized in this study was obtained from respondents who agreed to have their data used in research after completing a questionnaire based on the Depression Anxiety and Stress Scales - 42 (DASS-42). The whole data from 159 users of Twitter who have been classified as depressed or normal based on the results of the DASS-42 labeling are then preprocessed so that the data can be entered into the word2vec feature extraction and modeled by BiLSTM as a classification. The evaluation revealed an accuracy of 83.46 % and an f1-score of 87.11 %. By increasing the number of neurons, accuracy increased by 2.36 %, and f1-score climbed by 1.64 %.
Sistem Pendukung Keputusan Untuk Menentukan Eco Office Award Pada Dinas Lingkungan Hidup Kabupaten Asahan Dengan Metode MFEP Ihsanul Fikri; Iqbal Kamil Siregar; Nurkarim Nehe
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1851

Abstract

The Asahan Regency Environmental Service is the result of a government agency which is the implementing element of the Regional Government in the field of the Environment. As for determining the Eco Office Award at the Environmental Office of Asahan Regency, where the process of assessing the work environment of each office is carried out by providing a report that is assessed by the environmental team, where the assessment report determining the Eco Office Award is still carried out by file collection and archived so that there may be inaccuracies in determining the Eco Office Awards are very high. In this study, the MFEP method was chosen to determine the decision assessment to determine the Eco Office Award. This method is more efficient than other methods included in the completion of Multi Attribute Decision Making (MADM). The reason is because the time required for the calculation is shorter. As can be obtained from the calculation of the alternative evaluation of Determining the Eco Office Award above, the decision to choose from the alternative is chosen from the highest value, then PT. Pos Indonesia Range
Identification of Big Five Personality on Twitter Users using the AdaBoost Method Ajeung Angsaweni; Warih Maharani
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1853

Abstract

Social media is one of the lifestyles in the modern era that uses web-based technology for social interaction. As one of the most popular social media platforms, Twitter allows users to express themselves through tweets that can show their personality. The Big Five theory states that a person’s personality is divided into five dimensions: openness, conscientiousness, extraversion, agreeableness, and neuroticism. Several methods have been used to conduct user personality research based on activity on social media. The AdaBoost method is used in this study to identify the personality of Twitter users using sentiment, emotion, social, PCA, and POS-tag features. There are two test scenarios in this study. The first is testing the AdaBoost model with all features, and the second is testing the AdaBoost model with a combination of three features. The research indicates that the data preprocessing method can affect the model. The results showed that the AdaBoost model with all the features and without the stemming process had the highest accuracy value of 53.57%.

Page 1 of 10 | Total Record : 92