cover
Contact Name
Rima Liana Gema
Contact Email
jcsitech@upiyptk.ac.id
Phone
+6281363323413
Journal Mail Official
jufriadifnaam@yahoo.com
Editorial Address
Jl. Raya Lubuk Begalung Padang, Sumatera Barat - 25221
Location
Kota padang,
Sumatera barat
INDONESIA
Journal of Computer Scine and Information Technology
ISSN : 25021486     EISSN : 25021486     DOI : https://doi.org/10.35134/jcsitech
Journal of Computer Science and Information Technology is a threetly journal published by Universitas Putra Indonesia YPTK, Padang. It publishes scientific and technical papers describing original research work or novel product/process development. The objectives are to promote exchange of information and knowledge in research work, new inventions/developments of Computer Science and on the use of Information Technology towards the structuring of an information-rich society and to assist the academic staff from local and foreign universities, business and industrial sectors, government departments and academic institutions on publishing research results and studies in Computer Science and Information Technology through a scholarly publication. This journal is useful to researchers, engineers, scientists, teachers, managers and students who are interested in keeping a track of original research and development work being carried out in the broad area of computer science. Subjects covered by this journal are: Algorithms, Artificial intelligence, Computer graphics, Compiler programming and languages, Computer vision, Data mining, High performance computing, Information technology, Internet computing, Multimedia, Networks, Network Security, Operating systems, Quantum learning systems, Pattern Recognition, Sensor networks, Soft computing.
Articles 19 Documents
K- Means Clustering on Based Classification Method of Sales Agent Yeng Primawati; Ihsan Verdian; Gunadi Widi Nurcahyo
Journal of Computer Scine and Information Technology Volume 7 Issue 2 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.1

Abstract

Agent is one of very important assets for distributors. A better knowledge of the agents and their behavior is required, particularly to support decisions related to the company's business strategy and to manage a better relationship with distributors. Such knowledge can be obtained by classifying agents based on their behavior through historical data, such as the sale and purchase transaction data. One approach that can be done is a segmentation approach can be done by dividing the agents into several segments. In this paper, Data Mining techniques i.e. K-means clustering method is exploredto classify sales agents. By implementing k-means, the knowledge about the best agents can be acquired along with the agents that have least contribution to the distributor.
Hybrid Thresholding Method in Detection and Extraction of Brain Hemorrhage on the CT-Scan Image S Sumijan; Y Yuhandri; Wendi Boy
Journal of Computer Scine and Information Technology Volume 7 Issue 2 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.2

Abstract

Brain bleeding can occur because of the outbreak of the blood vessels in the brain which culminated into hemorrhagic stroke or stroke due to bleeding. Hemorrhagic Stroke occurs when there is a burst of blood vessels result from some trigger factor. Segmentation techniques to Scanner computed tomography images (CT scan of the brain) is one of the methods used by the radiologist to detect brain bleeding or congenital abnormalities that occur in the brain. This research will determine the area of the brain bleeding on each image slice CT - scan every patient, to detect and extract brain bleeding, so it can calculate the volume of the brain bleeding. The detection and extraction bleeding area of the brain is based on the hybrid thresholding method.
Identifying Severe Malnutrition in Children with an Expert System Devia Kartika; Rima Liana Gema; Mutiana Pratiwi
Journal of Computer Scine and Information Technology Volume 7 Issue 2 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.3

Abstract

Expert system is a computer program which is designed for modelling the ability of problem solving as it is an expert (human expert). The expert system method used is the forward chaining method which is the inference method that is doing logical reasoning from the problem to its solution. The aim of this research is to design and develop an expert system that is able to identify the severe malnutrition on children from the age of 0 - 5 years old. The knowledge is derived from the question askedto a nutrition expert. The data are taken from the questions asked to the user and when all of the questions has been answered, then the goal will be appeared which shows the nutrition status. This system application will enable the user to diagnose the nutrition/disease that affects children and get the solution. This system can be used by any kind of user due to the easy access. This system is also put the important information about the severe malnutrition and the recent news of children’s health so it will add more knowledge for the parents about the importance of severe malnutrition’s prevention.
Backpropagation Algorithm on Implementation of Signature Recognition Rini Sovia; Musli Yanto; Widya Nursanty
Journal of Computer Scine and Information Technology Volume 7 Issue 2 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.4

Abstract

Many things are required by all parties, especially in the process of recognition of one's identity, ranging from health care, maintenance of bank accounts, aviation services, immigration and others.Many ways of proving one's identity and the most popular one is using a signature.The signature is used as an identification system which serves to recognize a person's identity.Recognition process is still done manually by matching the signature by the person concerned.Therefore, the very need for a system that is able to analyze and identify the characteristics of the signature, so it can be used as an alternative to simplify the process of introducing people’s signature.Artificial neural networks can be used as one of the solutions in identification of signatures.Artificial neural network is a branch of science of artificial intelligence that is capable of processing information with the performance of certain characteristics.Artificial neural networks have some method such as perceptron, Hopfield discrete, Adaline, Backpropagation, and Kohonen.In this paper, the artificial neural network with back propagation method is applied in the process of signature and patternrecognition which provided a solution that is able to analyze and recognize people's signature.Implementation of the application of neural networks in pattern recognition signature can further be applied to any computer that handles problems in the process of matching one's data.
Implementation Kolmogorov-Smirnov Method on Queue System Simulation Halifia Hendri; Sarjon Defit; Mardison
Journal of Computer Scine and Information Technology Volume 7 Issue 2 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.5

Abstract

Long queue always happen as main problem in re-registration of new students who passed the New Registration Student (NRS). The long queue makes the queueing system crowded and cannot be controlled properly. This research is aimed in knowing the model, process simulation model and how to use the method of Kolmogorov-Smirnov of system for re-registration of new students. The method is suitable on how to solve long queue system with new model and simulation. The proposed method is implemented in Senior High School in Padang, West Sumatera, Indonesia. The result of this research shows that after we divided queuing post 1 into two sub-posts namely post 1a and 1b on the first day and we note that average long applicants waiting at post 1a and 1b are smaller i.e. 2.3 minutes and 2.8 seconds as previously for 15 minutes. Furthermore, we divided queuing post 2 into 2 sub-posts namely post 2a and 2b on first day note that average long applicants wait at post 1a and 1b are smaller i.e. 0.2 minutes and 0.2 minutes as previously for 32 minutes. It can be concluded that the solution to the registration posts can make an average registration time waiting to be smaller.
Alliance Rules- based Algorithm on Detecting Duplicate Entry Email Arif Hanafi; Sulaiman Harun; Sofika Enggari; Larissa Navia Rani
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.7

Abstract

The way that email has extraordinary significance in present day business communication is certain. Consistently, a bulk of emails is sent from organizations to clients and suppliers, from representatives to their managers and starting with one colleague then onto the next. In this way there is vast of email in data warehouse. Data cleaning is an activity performed on the data sets of data warehouse to upgrade and keep up the quality and consistency of the data. This paper underlines the issues related with dirty data, detection of duplicatein email column. The paper identifies the strategy of data cleaning from adifferent point of view. It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. The paper characterizes the alliance rules based on the concept of mathematical association rules to determine the duplicate entries in email column in data sets.
Bandwidth Management Analysis Using the HTB (Hierarchichal Token Bucket) Method Noviyan
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.9

Abstract

Internet in today's era is one of human needs, because it requires a large bandwidth. Bandwidth usage is basically a measure of the performance of an organization. In this study, the problem to be discussed is how the bandwidth management process in PT. Mainstay Partner Achievement. The purpose of this management process is to manage the balance of download or upload access. The method used in solving this problem is the Hierarchical Token Bucket (HTB) method. This method is widely used to solve problems with Internet connections, maximizing bandwidth usage. The Hierarchical Token Bucket (HTB) method is one of the methods designed to be able to perform bandwidth management well, where this algorithm applies queuing discipline which has advantages in limiting traffic at each level and classification, so that bandwidth that is not used by high levels can be used. or divided by lower levels. In the discussion, the HTB method is able to provide maximum results in bandwidth management. Benefits From these results network performance will be more optimal at PT. The mainstay of Achievement Partners can work even better
Geographic Information System for the Location Veterinarians Based on Android Suhendri Widjaja
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.10

Abstract

Geographic information systems (GIS) have the ability to connect various data at a certain point on the earth, combine them, analyze and finally map the results. The data to be processed in (GIS) is spatial data, which is geographically oriented data and is a location that has a certain coordinate system, as the basis for reference. So that the application (GIS) can answer several questions such as; location, condition, trend, pattern and modeling. This capability is what distinguishes (GIS) from other information systems. The problem in this study discusses the design of a GIS to track the location of veterinarians in the city of Padang. GIS is a concept that can map locations on the earth's surface. The results of its interpretation can be used as information for users in overcoming a problem. The data used in this GIS design is taken from the location of veterinarians in the city of Padang. Gis results provide accuracy in presenting information to users. By building a geographic information system, it is expected to find out where the location of the veterinarians in the city of Padang based can help the android community. So that the public can more easily find out the location of the veterinarians in the city of Padang quickly and accurately which can be accessed via mobile phones (Smartphones). In making this geographic information system, additional application programs used are Android Studio, and other supporting applications
Analysis of Ethernet Over Internet Protocol (EOIP) VPN Performance Ahmad Purwana
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.11

Abstract

The need for interconnection between networks will be needed, especially in a company that has many branch offices, but companies usually demand a minimum use of resources in order to get maximum results. To overcome this problem, a Virtual Private Network (VPN) network is needed by utilizing the EOIP protocol, Ethernet Over IP (EOIP) is a protocol on Mikrotik RouterOS which functions to build a network tunnel between Mikrotik routers on a TCP / IP connection, namely by utilizing internet connection as a liaison. This study aims to analyze the performance of VPN by using the concept of Ethernet Over Internet Protocol (EOIP) on the existing network at PT. Energy Source Dempo. This analysis is needed to manage network access to connected data in each branch of the company. This is to anticipate access rights that enter the network owned by PT. Energy Source Dempo. The results of the analysis provide easy access rights and provide a sense of security from the data communication that occurs. In addition, the results of the analysis can also be used as network management control at PT. Dempo Sumber Energi so that the results of the analysis can maximize data communication performance.
Towards Food Security: the Prediction of Climatic Factors in Nigeria using Random Forest Approach Charity Ojochogwu Egbunu; Matthew Tunde Ogedengbe; Terungwa Simon Yange; Malik Adeiza Rufai; Habibat Iye Muhammed
Journal of Computer Scine and Information Technology Volume 7 Issue 4 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i4.15

Abstract

With the explosive growth in the world’s population which has little or no corresponding rise in the food production, food insecurity has become eminent, and hence, the need to seek for opportunities to increase food production in order to cater for this population is paramount. The second goal of the Sustainable Development Goals (SDGs) (i.e., ending hunger, achieving food security and improved nutrition, and promoting sustainable agriculture) set by the United Nations (UN) for the year 2030 clearly acknowledged this fact. Improving food production cannot be achieved using the obsolete conventional methods of agriculture by our farmers; hence, this study focuses on developing a model for predicting climatic conditions with a view to reducing their negative impact, and boosting the yield of crop. Temperature, wind, humidity and rainfall were considered as the effect of these factors is more devastating in Nigeria as compared to sun light which is always in abundance. We implemented random forest algorithm using Python programming language to predict the aforementioned climate parameters. The data used was gotten from the Nigerian Meteorological (NiMet) Agency, Lokoja, Kogi State between 1988 and 2018. The result shows that random forest algorithm is effective in climate prediction as the accuracy from the model based on the climatic factors considered was 94.64%. With this, farmers would be able to plan ahead to prevent the impact of the fluctuations in these climatic factors; thus, the yield of crops would be increased. This would dwarf the negative impact of food insecurity to the populace.

Page 1 of 2 | Total Record : 19