cover
Contact Name
Bayu Priyatna
Contact Email
-
Phone
+6281382923086
Journal Mail Official
bit-cs@ubpkarawang.ac.id
Editorial Address
Telukjambe Timur 05/03 TJ Karawang
Location
Kab. karawang,
Jawa barat
INDONESIA
Buana Information Technology and Computer Sciences (BIT and CS)
ISSN : 27152448     EISSN : 27157199     DOI : https://doi.org/10.36805/bit-cs
Core Subject : Science,
Buana Information Technology and Computer Science (BIT and CS) is a journal focusing on new technologies that handle IT research and management - including strategy, change, infrastructure, human resources, information system development and implementation, technology development, future technology, policies and national standards and articles that advance understanding and application of research approaches and methods. This journal publishes works from disciplinary, theoretical and methodological perspectives. It was designed to be read by researchers, scholars, teachers, and students in the area of Information Systems and Computer Science, as well as IT developers, consultants, software vendors, and senior IT executives who are looking for updates on current experiences and prospects related to information and communication technology contemporary.
Articles 6 Documents
Search results for , issue "Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)" : 6 Documents clear
The Role of Financial Technology in The Creative Industries in Indonesia Nono Heryana; Rini Mayasari; Rudi Aprianto
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (571.17 KB) | DOI: 10.36805/bit-cs.v1i2.840

Abstract

In the modern era, the use of technology is growing rapidly to obtain information and various other electronic services, many people who already use technology, especially the internet to facilitate their work. Seeing the rapid development of the internet has given rise to various innovations, especially financial technology to meet the various needs of the community including access to financial services and transaction processing. Fintech (Financial Technology) is an innovation in the financial sector that refers to modern technology used to transact, check deposit rates, transfer funds, and perform various other financial services. The creative industries are an industry that utilizes the creativity and skills of individuals use as goods of value. The purpose of this study is to determine the role of financial technology and its constraints in the creative industry in Indonesia. The existence of innovation and creativity that arises in the community, making the creative industry is an essential role in the development of a regional economy. The research method used in writing this article is descriptive qualitative. Thus, qualitative research only describes responses to situations or events so that it does not explain causality or do hypothesis testing.
Implementation of K-Nearest Neighbor Algorithm for Customer Satisfaction Sutan Faisal Sutan Faisal; Nurhayati Sutan Faisal
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1234.763 KB) | DOI: 10.36805/bit-cs.v1i2.886

Abstract

Customer satisfaction is one of the goals of the company in providing services to its customers both service and non-service companies. One of the camera rental service provider companies that are committed to customer satisfaction is Cikarang Camera Rental. This study aims to analyze customer satisfaction in Cikarang camera rental using the K Nearest Neighbor (KNN) algorithm. Customer satisfaction input attributes in this study include price, facilities, and dam loyalty services. The output results from the input attributes above are satisfied and not satisfied. This research is expected to help Cikarang Camera Rental to increase customer satisfaction and increase profit on Cikarang Camera Rental. The results of the research that can be achieved using the KNN algorithm are accuracy = 98%, classification recall = 86.67%, Classification precision = 100% and AUC = 0.750. The results of this study can be used as a reference to build an application that can facilitate companies in obtaining information about customer satisfaction.Keywords— Datamining, classification, KNN algorithm, customer satisfaction
Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13 Bayu Priyatna; April Lia Hananto
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (898.219 KB) | DOI: 10.36805/bit-cs.v1i2.980

Abstract

Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses. MD5 is one technique that is widely used in password data security issues, which algorithm has many advantages including. MD5 has a one-way hash function so that the message has been converted to a message digest, and it is complicated to restore it to the original message (plaintext). In addition to the advantages of MD5 also has a variety of shortcomings including; very easy to solve because MD5 has a fixed encryption result, using the MD5 modifier generator will be easily guessed, and MD5 is not proper because it is vulnerable to collision attacks. The research method used in this study uses Computer Science Engineering by conducting experiments combining two cryptographic arrangements. The results obtained from this study after being tested with Avalanche Effect technique get ciphertext randomness results of 43.69%, which tends to be very strong to be implemented in password data authentication.
Design of Reminder Information Last Contract (RILC) Applications Using Web-Based Sms Gateway Arip Solehudin; Aldi Angga Putra; Kamal Prihandani; Nono Heryana
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.092 KB) | DOI: 10.36805/bit-cs.v1i2.1025

Abstract

Currently informarsi system is needed by several large companies. To support some data processing, one of them is employee data processing and employee contract data. Given the existing problems in contract data pengelohan often occurs that the check is not maximal so some data left behind and even neglected impact on the increase in salaries of employees who are late due to contracts that are not handled according to schedule. This study aims to create a web-based RIL application using sms gateway for delivery of contract data reminder information. This research uses SDLC method with Extreme Programming model with stages of planning, designing, coding, testing, implementation and evaluation. SMS gateway is a gateway for information dissemination using SMS. With SMS gateway can spread the message of the serial number automatically and quickly which is directly connected with the database of mobile numbers that have been stored. This can be done by RIL applications in sending reminder information messages to the HRD division as well as employees receiving their contract expiration date information. The result of the research is the user can maximize the checking of contract data so that nothing is left behind and give the report that arranged well and clear
Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security Agung Agung; Nono Heryana; Arip Solehudin
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.513 KB) | DOI: 10.36805/bit-cs.v1i2.1072

Abstract

The progress of communication technology has had a positive impact on human life, including in the field of education. The education office is currently implementing computer-based exams starting from the State Higher Education Entrance Joint Selection (SBMPTN) exam to the School Final Examination. But with the implementation of computer-based exams this is of course the less secure the level, therefore the authors make this research with the aim of securing the exam data that will be tested with Hill cipher cryptography and Caesar cipher. Cryptography is a technique of hiding data that is done to secure data, in this case cryptography aims to secure data on exam questions.
Information System Design COVID-19 with Prototype Model Syahri Susanto; Julifer P. Manurung; Feddy Wnditya Setyawan
Buana Information Technology and Computer Sciences (BIT and CS) Vol 1 No 2 (2020): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1018.191 KB) | DOI: 10.36805/bit-cs.v1i2.1074

Abstract

Information System Design COVID-19 with Prototype Model

Page 1 of 1 | Total Record : 6