cover
Contact Name
Bayu Priyatna
Contact Email
-
Phone
+6281382923086
Journal Mail Official
bit-cs@ubpkarawang.ac.id
Editorial Address
Telukjambe Timur 05/03 TJ Karawang
Location
Kab. karawang,
Jawa barat
INDONESIA
Buana Information Technology and Computer Sciences (BIT and CS)
ISSN : 27152448     EISSN : 27157199     DOI : https://doi.org/10.36805/bit-cs
Core Subject : Science,
Buana Information Technology and Computer Science (BIT and CS) is a journal focusing on new technologies that handle IT research and management - including strategy, change, infrastructure, human resources, information system development and implementation, technology development, future technology, policies and national standards and articles that advance understanding and application of research approaches and methods. This journal publishes works from disciplinary, theoretical and methodological perspectives. It was designed to be read by researchers, scholars, teachers, and students in the area of Information Systems and Computer Science, as well as IT developers, consultants, software vendors, and senior IT executives who are looking for updates on current experiences and prospects related to information and communication technology contemporary.
Articles 48 Documents
Retraction: Time Series Based Gene Expression Profiling Algorithm for Stomach Cancer Diagnosis Teresa Abuya; Bayu Priyatna
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (398.755 KB) | DOI: 10.36805/bit-cs.v3i2.2426

Abstract

Retraction to: Teresa Abuya. & B Priyatna. (20202). Time Series Based Gene Expression Profiling Algorithm for Stomach Cancer Diagnosis. Into Another Journal This article has been withdrawn by the publisher for the following reasons: This is based on the author's acknowledgment to the editor that the author has committed a violation of publication ethics. The author canceled the publication after the article was published, arguing that the template from the publisher was not standard even though the publisher had made a standard template that refers to IEEE. As such this article constitutes a grave abuse of the scientific publishing system.
Automatic Face Mask Detection On Gates To Combat Spread Of Covid-19 Musa
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (395.854 KB) | DOI: 10.36805/bit-cs.v3i2.2759

Abstract

The COVID-19 pandemic has spread across the globe, hitting almost every country. To stop the spread of the COVID-19 pandemic, this article introduces face mask detection on a gate to assure the safety of Instructors and students in both class and public places. This work aims to distinguish between faces with masks and without masks. A deep learning algorithm You Only Look Once (YOLO) V5 is used for face mask detection and classification. This algorithm detects the faces with and without masks using the video frames from the surveillance camera. The model trained on over 800 video frames. The sequence of a video frame for face mask detection is fed to the model for feature acquisition. Then the model classifies the frames as faces with a mask and without a mask. We used loss functions like Generalize Intersection of Union for abjectness and classification accuracy. The datasets used to train the model are divided as 80% and 20% for training and testing, respectively. The model has provided a promising result. The result found shows accuracy and precision of 95% and 96%, respectively. Results show that the model performance is a good classifier. The successful findings indicate the suggested work's soundness.
Systematic Literature Review Implementation of the Internet of Things (IoT) in Smart City Development Gunawan; Wilda Shabrina; Wresti Andriani
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (167.454 KB) | DOI: 10.36805/bit-cs.v3i2.2762

Abstract

Internet of Things (IoT) "The smart city concept has become a dream that big cities in Indonesia want to achieve, basically the smart city concept focuses on developing the human element using technology. IoT opens up many opportunities for new services by connecting the physical world and the virtual world to various electronic devices. IoT aims to leverage cutting-edge technology to support sustainable services for governments and their citizens. Systematic Literature Review (SLR) is one method in conducting an overview of previous interrelated researchers. The purpose of the literature study in this research is to understand trending research topics, methods, and architecture in the development of smart cities with IoT. In this study, various interesting information was found in various research journals regarding the role of IoT in building a smart city that has a role to serve smart city infrastructure, identify and analyze trends, develop smart cities and become innovations for IoT. Based on the research, there are things that need to be done to improve the study to focus more on the role of IoT that can be more utilized. IoT is also one of the technologies that are widely used in several countries in the development of IoT in the future. IoT in smart cities will become an inseparable technology because humans will increasingly depend on IoT in their daily lives
Signature Verification Using The K-Nearest Neighbor (KNN) Algorithm and Using the Harris Corner Detector Feature Extraction Method Aang Alim Murtopo; Bayu Priyatna; Rini Mayasari
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.408 KB) | DOI: 10.36805/bit-cs.v3i2.2763

Abstract

The security of the transaction process is very important in this day and age. Signatures can be used as a means of guaranteeing the security of a transaction other than fingerprints. However, the threat of signature forgery for those who use signatures as security is still very high and frequent. In this research, we will verify the authenticity of a signature and test it using the K-Nearest Neighbour (KNN) algorithm and the Harris Corner feature extraction method. There are two kinds of distance calculations that will be used in the K-NN algorithm, namely by calculating the distance from Euclidean Distance and Manhattan Distance. The k value at KNN taken is at k = 1, k = 3, and k = 5.
Analysis of Signal Quality, Voice Service, and Data Access on Telkomsel And Indosat Providers in Pakisjaya District Arip solehudin; Nono Heryana; Agustia Hananto
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (225.879 KB) | DOI: 10.36805/bit-cs.v3i2.2764

Abstract

Quality in communication is very important in activities in this modern era. It is expected that the expected network quality against network quality is actually not expected. Measurement of network performance is important to refer for users to choose the right operator for service providers to improve the quality of their service Drive Test Method is a method used to measure cellular network performance. The purpose of this study is to study the results of research between service providers. The parameters used in this analysis are Receive Signal Code Power (RSCP), Cell ID, Signal Noise Ratio (SNR), Upload Rate, and Download Rate. This parameter is used for the measurement process of the Drive Test method. While the tool used to collect the value of each Drive Test parameter by using an Android-based application, GNet Track Pro. The measurement results with GNet Track Pro are then processed with the Google Earth application as a measurement area. Research data collected in this analysis were 60 cases, with each village 20 data collected to continue processing with the Drive Test method. In this study, Telkomsel chose to excel in voice services with 150 successful numbers of 150 attempted calls. While Indosat excels in providing data access services and special signals in the village of Tanjungbungin.
Changing Data Image Into Numeric Data on Kiln Manufacture Machinery Use Optical Character Recognition (OCR) Agustia Hananto Hananto; Elfina Novalia; Goenawan Brotosaputro
Buana Information Technology and Computer Sciences (BIT and CS) Vol 3 No 2 (2022): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (448.899 KB) | DOI: 10.36805/bit-cs.v3i2.2766

Abstract

In the process of making ceramic tiles, there is a combustion process using a kiln manufacture or oven. To ensure the combustion process goes well, 39 parameters are monitored on the kiln engine which must be monitored manually based on the data generated by the image on the kiln engine. The process of monitoring these parameters is ineffective due to human error or negligence and other human traits that result in losses for the company. Therefore, a system is needed to store the parameter data of the ceramic tile combustion engine which can be stored in a database. After analyzing the kiln, the sensor recorder that displays parameter data can be accessed via a LAN (Local Area Network), but the data generated is in the form of an image, not in the form of alphanumeric digital data. The image data obtained need to be translated into alphanumeric data as a data source. Through the introduction of optical character recognition (OCR) with the template matching method, the image is converted into alphanumeric data so that it can be stored in a database. From the results of this study, the prototype system made obtained an accuracy of 100.00% for the conversion of image data to alphanumeric data.
Village Government Readiness Toward the Adoption of E-Government Rini Mayasari; Nono Heryana; Agustia Hananto
Buana Information Technology and Computer Sciences (BIT and CS) Vol 4 No 1 (2023): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v4i1.3241

Abstract

Public services in the village are very important because the village is the smallest part of the administrative government system in Indonesia and is the front line of public services. Technological developments encourage the government to manage public services to improve the ineffective bureaucratic paradigm. E-government is a solution to improve public services. One of the failures in implementing E-Government is the village government's lack of readiness to adopt information technology. The research method used in this research is descriptive qualitative. The results obtained suggest that the STOPE framework model consisting of Strategy, Technology, Organization, People, and Environment is the most appropriate model to analyze the readiness of the village government. Of the 5 domains that were assessed, 3 domains received the Very Ready predicate and 2 domains received the Ready predicate
Coastal Batik Motifs Identification Using K-Nearest Neighbor Based on The Grey Level Co-occurrence Method Wresti Andriani; Gunawan; Sawaviyya Anandianskha
Buana Information Technology and Computer Sciences (BIT and CS) Vol 4 No 1 (2023): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v4i1.3342

Abstract

Indonesia is a country rich in natural, cultural, and tourism resources. One of the famous human cultural heritage in Indonesia is batik. Batik has unique motifs that are very diverse so it is difficult to recognize the in certain classes. This research was conducted to classify coastal batik, especially Tegal batik, Pekalongan batik, and Cirebon batik so that it can help facilitate the introduction and understanding of coastal batik when compared to another batik, such as Yogyakarta batik. The method used is Grey Level Co-occurrence Matrices to extract texture features, while, to determine the proximity of the test image to the training data using the K-Nearest Neighbor method, the calculation of the distance to be used is the Euclidean Distance and Manhattan Distance based on the texture characteristics of the batik image obtained. In this study, the highest score was obtained at 64% for Euclidean Distance and 66% for Manhattan Distance at k=15
The Critical Path Method In Management Information System of Contractor Service Company Using Incremnetal Model Hamim Tohari; Ahmad Kudhori; Hedi Pandowo
Buana Information Technology and Computer Sciences (BIT and CS) Vol 4 No 1 (2023): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v4i1.2770

Abstract

Good control is needed in managing a project, starting from controlling the human resources to systematic scheduling. CV. XYZ Surabaya is a contractor service company, that does not yet have an information system that can be used as a control tool in project management. Critical Path Method (CPM) is one method that can be used to schedule projects. This study aims to design a project management information system by implementing CPM. The system design is done using the Incremental Model. The results of this study are in the form of a prototype system that fits the needs of CV. XYZ Surabaya, includes system flow, Contextual Data Model (CDM), and User Interface (UI).
An Enhanced Bio-Inspired Aco Model For Fault-Tolerant Networks Samuel Lusweti; Collins Odoyo; Dorothy Rambim
Buana Information Technology and Computer Sciences (BIT and CS) Vol 4 No 1 (2023): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v4i1.3040

Abstract

This research mainly aimed at establishing the current functionality of computer network systems, evaluating the causes of network faults, and developing an enhanced model based on the existing ACO model to help solve these network issues. The new model developed suggests ways of solving packet looping and traffic problems in common networks that use standard switches. The researcher used simulation as a method of carrying out this research whereby an enhanced algorithm was developed and used to monitor and control the flow of packets over the computer network. The researcher used an experimental research design that involved the development of a computer model and collecting data from the model. The traffic of packets was monitored by the Cisco Packet Tracer tool in which a network of four computers was created and used to simulate a real network system. Data collected from the simulated network was analyzed using the ping tool, observation of the movement of packets in the network and message delivery status displayed by the Cisco Packet Tracer. In the experiment, a control was used to show the behavior of the network in ideal conditions without varying any parameters. Here, all the packets sent were completely and correctly received. Secondly, when a loop was introduced in the network it was found that the network was adversely affected because for all packets sent by the computers on the network, none of them was delivered due to stagnation of packets. In the third experiment, still, with the loops on, a new ACO model was introduced in the cisco packet tracer used to simulate the network. In this experiment, all the packets sent were completely and correctly delivered just like in the control experiment.