cover
Contact Name
Rima Liana Gema
Contact Email
jcsitech@upiyptk.ac.id
Phone
+6281363323413
Journal Mail Official
jufriadifnaam@yahoo.com
Editorial Address
Jl. Raya Lubuk Begalung Padang, Sumatera Barat - 25221
Location
Kota padang,
Sumatera barat
INDONESIA
Journal of Computer Scine and Information Technology
ISSN : 25021486     EISSN : 25021486     DOI : https://doi.org/10.35134/jcsitech
Journal of Computer Science and Information Technology is a threetly journal published by Universitas Putra Indonesia YPTK, Padang. It publishes scientific and technical papers describing original research work or novel product/process development. The objectives are to promote exchange of information and knowledge in research work, new inventions/developments of Computer Science and on the use of Information Technology towards the structuring of an information-rich society and to assist the academic staff from local and foreign universities, business and industrial sectors, government departments and academic institutions on publishing research results and studies in Computer Science and Information Technology through a scholarly publication. This journal is useful to researchers, engineers, scientists, teachers, managers and students who are interested in keeping a track of original research and development work being carried out in the broad area of computer science. Subjects covered by this journal are: Algorithms, Artificial intelligence, Computer graphics, Compiler programming and languages, Computer vision, Data mining, High performance computing, Information technology, Internet computing, Multimedia, Networks, Network Security, Operating systems, Quantum learning systems, Pattern Recognition, Sensor networks, Soft computing.
Articles 4 Documents
Search results for , issue "Volume 7 Issue 3 (2021): JCSITech" : 4 Documents clear
Alliance Rules- based Algorithm on Detecting Duplicate Entry Email Arif Hanafi; Sulaiman Harun; Sofika Enggari; Larissa Navia Rani
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i2.7

Abstract

The way that email has extraordinary significance in present day business communication is certain. Consistently, a bulk of emails is sent from organizations to clients and suppliers, from representatives to their managers and starting with one colleague then onto the next. In this way there is vast of email in data warehouse. Data cleaning is an activity performed on the data sets of data warehouse to upgrade and keep up the quality and consistency of the data. This paper underlines the issues related with dirty data, detection of duplicatein email column. The paper identifies the strategy of data cleaning from adifferent point of view. It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. The paper characterizes the alliance rules based on the concept of mathematical association rules to determine the duplicate entries in email column in data sets.
Bandwidth Management Analysis Using the HTB (Hierarchichal Token Bucket) Method Noviyan
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.9

Abstract

Internet in today's era is one of human needs, because it requires a large bandwidth. Bandwidth usage is basically a measure of the performance of an organization. In this study, the problem to be discussed is how the bandwidth management process in PT. Mainstay Partner Achievement. The purpose of this management process is to manage the balance of download or upload access. The method used in solving this problem is the Hierarchical Token Bucket (HTB) method. This method is widely used to solve problems with Internet connections, maximizing bandwidth usage. The Hierarchical Token Bucket (HTB) method is one of the methods designed to be able to perform bandwidth management well, where this algorithm applies queuing discipline which has advantages in limiting traffic at each level and classification, so that bandwidth that is not used by high levels can be used. or divided by lower levels. In the discussion, the HTB method is able to provide maximum results in bandwidth management. Benefits From these results network performance will be more optimal at PT. The mainstay of Achievement Partners can work even better
Geographic Information System for the Location Veterinarians Based on Android Suhendri Widjaja
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.10

Abstract

Geographic information systems (GIS) have the ability to connect various data at a certain point on the earth, combine them, analyze and finally map the results. The data to be processed in (GIS) is spatial data, which is geographically oriented data and is a location that has a certain coordinate system, as the basis for reference. So that the application (GIS) can answer several questions such as; location, condition, trend, pattern and modeling. This capability is what distinguishes (GIS) from other information systems. The problem in this study discusses the design of a GIS to track the location of veterinarians in the city of Padang. GIS is a concept that can map locations on the earth's surface. The results of its interpretation can be used as information for users in overcoming a problem. The data used in this GIS design is taken from the location of veterinarians in the city of Padang. Gis results provide accuracy in presenting information to users. By building a geographic information system, it is expected to find out where the location of the veterinarians in the city of Padang based can help the android community. So that the public can more easily find out the location of the veterinarians in the city of Padang quickly and accurately which can be accessed via mobile phones (Smartphones). In making this geographic information system, additional application programs used are Android Studio, and other supporting applications
Analysis of Ethernet Over Internet Protocol (EOIP) VPN Performance Ahmad Purwana
Journal of Computer Scine and Information Technology Volume 7 Issue 3 (2021): JCSITech
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/jcsitech.v7i3.11

Abstract

The need for interconnection between networks will be needed, especially in a company that has many branch offices, but companies usually demand a minimum use of resources in order to get maximum results. To overcome this problem, a Virtual Private Network (VPN) network is needed by utilizing the EOIP protocol, Ethernet Over IP (EOIP) is a protocol on Mikrotik RouterOS which functions to build a network tunnel between Mikrotik routers on a TCP / IP connection, namely by utilizing internet connection as a liaison. This study aims to analyze the performance of VPN by using the concept of Ethernet Over Internet Protocol (EOIP) on the existing network at PT. Energy Source Dempo. This analysis is needed to manage network access to connected data in each branch of the company. This is to anticipate access rights that enter the network owned by PT. Energy Source Dempo. The results of the analysis provide easy access rights and provide a sense of security from the data communication that occurs. In addition, the results of the analysis can also be used as network management control at PT. Dempo Sumber Energi so that the results of the analysis can maximize data communication performance.

Page 1 of 1 | Total Record : 4