cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
jurnal.bits@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Building of Informatics, Technology and Science
ISSN : 26848910     EISSN : 26853310     DOI : -
Core Subject : Science,
Building of Informatics, Technology and Science (BITS) is an open access media in publishing scientific articles that contain the results of research in information technology and computers. Paper that enters this journal will be checked for plagiarism and peer-rewiew first to maintain its quality. This journal is managed by Forum Kerjasama Pendidikan Tinggi (FKPT) published 2 times a year in Juni and Desember. The existence of this journal is expected to develop research and make a real contribution in improving research resources in the field of information technology and computers.
Arjuna Subject : -
Articles 889 Documents
Analysis of The Impact of Software Detailed Design on Mobile Application Performance Metrics Khairin, Amal; Kusumo, Dana Sulistyo; Priyadi, Yudi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (557.176 KB) | DOI: 10.47065/bits.v4i1.1739

Abstract

The rapid development of mobile applications in recent years has forced developers to develop their applications quickly. Application quality must be one of the top concerns of developers since poor application design will affect the quality of the application. Performance is one of the important quality attributes that determine the quality of an application. One approach that can be used to overcome performance problems is the design pattern. However, as the research progressed, other approaches were discovered such as refactoring code smells and design principles. In this study, a detailed design analysis was carried out on the source code of the mobile application by applying design patterns, refactoring the code smells, and implementing design principles to determine their impact on the application's performance. To measure the application performance, Central Processing Unit (CPU) usage, memory usage, and frame rate metrics are used. Based on the implementation design patterns, refactoring the code smells, and applying design principles, the result found that design patterns can affect application performance depending on the design pattern used. The Strategy pattern and Visitor pattern optimize memory usage by 1%, while the Bridge pattern increases memory usage by 2%. Meanwhile, the result of refactoring the code smells can optimize CPU usage by 35% and memory usage by 2%, and design principles can optimize CPU usage by 25% and application frame rates by 5 frame per second (fps).
Pengembangan Sistem Informasi Video Conference Menggunakan Metode Rapid Application Development Berbasis Website Darmansah, Darmansah; Nengsih, Yeyi Gusla
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.183 KB) | DOI: 10.47065/bits.v4i1.1740

Abstract

Technological advances can also make it easier to communicate, by conducting video conferences, it is no longer necessary to meet in person during meetings. There have been many platforms used for conducting meetings, but having your own application within the agency or company can be more effective and efficient and data security in the agency is also maintained. At this time, the Yogyakarta Communication and Information Office does not yet have its own meeting application. Based on these problems, the author proposes a video conference information system design for meetings at the Yogyakarta Information and Communications Office. The design uses the RAD method and uses UML (Unified Modeling Language) modeling which consists of use case diagrams, activity diagrams, sequence diagrams and class diagrams. The results of this study resulted in a website that could be used for video conferencing by related agencies.
Dimensional Data Unsupervised Learning Using an Analytic Hierarchy Process in Determining Attributes in the Classification Algorithm Putri, Shinta Ayunda; Mustakim, Mustakim
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (390.553 KB) | DOI: 10.47065/bits.v4i1.1752

Abstract

Systematic keyword is needed in improving the quality of higher education, one of which is the needed to increase the competence of graduates every year. In increasing student graduation, it is necessary to classify student graduation to find out whether the student is said to be on time (TW) or possibility on time (KTW) using the BPNN and PNN methods. The data used is the Alumni data of the 2013-2020 Information System study program with 7 criteria use, namely GPA, Total Credits, Number of Repetitive Courses, Taking TA Curse in Semester 7, Procrastination, Self-Confidence, and Discipline. The data obtained is then carried out in the process of sharing training data and testing data using K-Means Clustering with the aim; of getting the best accuracy results. Furthermore, the classification stage using BPNN and PNN resulted in an accuracy of 98% and 95% with learning rate of 0.125 and a spread value of 0.1
Prediksi Tingkat Kesembuhan Pasien Covid-19 Berdasarkan Riwayat Vaksin Menggunakan Metode Naïve Bayes Gudiato, Candra; Prasetyo, Sri Yulianto Joko; Purnomo, Hindriyanto Dwi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.799 KB) | DOI: 10.47065/bits.v4i1.1756

Abstract

Covid-19 has shocked the world since it first appeared at the end of December 2019. At the beginning of 2022, the global community is more prepared to face the COVID-19 pandemic, especially with the mass vaccination program in countries around the world, including Indonesia. The next issue is how effective the vaccine is in dealing with the COVID-19 virus. The main parameter used is to see the recovery rate of patients affected by COVID-19 based on the history of vaccine doses that have been received by the patient. In this study using data mining techniques, namely using the Naïve Bayes algorithm. The test results show the accuracy of the Naïve Bayes algorithm is 98.14%. The prediction results show that the recovery rate of patients who have received the vaccine, either dose 1, dose 2, or dose 3 (booster) is higher than those who have not been vaccinated at all (dose 0). The results of this study are expected to provide an overview to the public and the government about the benefits of vaccination in dealing with the Covid-19 virus.
Supervised Learning Approaches for Nested People Entity Extraction in Indonesian Translated Quran Dzidny, Dimitri Irfan; Bijaksana, Moch Arif; Lhaksmana, Kemas Muslim
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.289 KB) | DOI: 10.47065/bits.v4i1.1758

Abstract

Since the Quran is the primary holy book for Muslims, information extraction research on Quranic texts, especially in a form of People Entity Extraction, is an important task for further Quran and Tafseer understanding. The challenges in extracting people entities from the Quranic text is that many verses have a complex structure, such as nested entities, making it crucial to build a system that can extract the entity automatically, accurately, and quickly. People Entity Extraction on Quran itself is a task that aims to extract people entities in a sentence or verse, such as the name of a person, the name of a group, etc. on the Quranic texts. Example of input taken from snippet Surah Al-Baqarah verse 46 which reads “Those who believe that they will meet their Lord and that they will return to him” from that input the people entity extraction system is expected can identify people entities i.e. “Those who believe that they will meet their Lord”. Currently, People Entity Extraction research for the Quran has not been widely carried out, only a few algorithms with scattered results have been conducted. In this research, we will use several supervised models which are Conditional Random Field (CRF), BiLSTM-CRF, and a pre-trained deep learning model based on IndoBERT transformers. We apply and perform a comparative analysis for the performance of those several models. We found out that deep learning based model, namely BiLSTM-CRF perform best at extracting people entities, whilst probabilistic based model, namely CRF, had difficulty in extracting people entities, specifically nested people entities.
Implementasi Transfer Learning Pada Algoritma Convolutional Neural Network untuk Mengklasifikasikan Image Objek Wisata Mira, Mira; Sembiring, Irwan; Purnomo, Hindriyanto Dwi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (676.196 KB) | DOI: 10.47065/bits.v4i1.1764

Abstract

This study classifies the image of a tourist attraction with 9 labels sky, tree, mountain, water, street, temple, garden, stone and ricefield. The results of multi-label labeling can be used to see the frequency and recommendations of tourist attractions in Central Java, and build a transfer learning model to determine the accuracy value. Classification with multi-label images has its own complexity in the labeling process and few people use it. Testing and evaluating the model uses the equation of accuracy and f-1 score. Several previous researchers also stated that the higher the amount of training data and the number of epochs per step, the higher the accuracy produced. Based on the results of training and evaluation of the four training processes, that 210 data using bs 8, lr 1e-3 and epoch 50 showed an accuracy of 0.8598 with a loss of 0.3245, while 290 data with bs 16, lr 1e-3 and epoch 50 showed an accuracy of 0.8685. with a loss of 0.2903. Then 594 data with bs 32, lr 1e-3 and epoch 50 showed an accuracy of 0.8852 with a loss of 0.2756, and 1000 data with bs 46, lr 1e-3 and epoch 50 showed an accuracy of 0.8833 with a loss of 0.2863. This can answer the statement that the greater the number of datas, the higher the accuracy produced, so that the transfer learning model on the ResNet-50 architecture with multi-label image datas can be applied by showing accuracy results close to the accuracy value on ResNet-50 in the imagenet project. In addition, the contribution of this research is to provide recommendations for potential tourist objects in Central Java, namely tourism objects with the theme of nature, then tourism processed by human hands such as historical places, cultural heritage and family recreation areas.
Sistem Informasi Pramuka Berbasis Website Menggunakan Rational Unified Process Henri Herdiyanto; Lukman Lukman
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1731

Abstract

In this study the authors will examine the scouting system where the system built is able to overcome various problems that exist in the scouting area, including the registration process, dissemination of activity information, money management and trainer requests. Data collection on scouting activities in the city of Sorong, West Papua is still mostly done manually, this has resulted in many files being damaged or lost. Therefore we need a system that improves services to manage data and can overcome these obstacles. The making of this scouting information system is made using the PHP programming language and MySQL for the database. The method used is the rational unified process (RUP) where in this method the steps for making a good and correct system are described as well as testing using Roger Prassman where the results of the research carried out got a 90% satisfaction level
Analisis Sentimen Dalam Pengkategorian Komentar Youtube Terhadap Layanan Akademik dan Non-Akademik Universitas Terbuka Untuk Prediksi Kepuasan Rhini Fatmasari; Virda Mega Ayu; Hari Anto; windu Gata; Lili Dwi Yulianto
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1738

Abstract

The key to the success of an educational organization in achieving its goals of course cannot be separated from the quality of service both in academic and non-academic forms. Where in achieving these goals of course by giving satisfaction to the academics. The case study was carried out to predict service satisfaction at the Open University by using comments on social media Youtube as data processing. The text mining approach is a good alternative in terms of interpreting the meaning in the comments given. This study aims to analyze the predictions of service satisfaction from several categories as a benchmark. The categories are: Module, Tutorial, Scholarship, Lecturer, Exam, Application, Non-Academic and Others. The research method used is comparative, by applying 4 algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), Naïve Bayes (NB) and Random Forest (RF) for Prediction Accuracy. The total initial dataset is 7776 data and after cleansing and preprocessing is 6920 data. And then evaluated for the 7 categories after being accured to produce: Module category with the highest accuracy of 99.37% using the DT algorithm, Application Category with the highest accuracy of 100% using the DT algorithm, Teaching Category the highest accuracy of 99.42% using the algorithm DT. The tutorial category has the highest accuracy 92.4% using the SVM algorithm, the exam category has the highest accuracy 99.7% using the RF algorithm, the non-academic category has the highest accuracy 99.90% using the DT algorithm. And for the Others category the highest accuracy is 96.58% using the DT algorithm
Eksperimen Pengujian Optimizer dan Fungsi Aktivasi Pada Code Clone Detection dengan Pemanfaatan Deep Neural Network (DNN) Errissya Rasywir; Yovi Pratama; Fachruddin Fachruddin
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1776

Abstract

The problem of similarity (similarity) of program code can be one solution to the plagiarism detection approach. Plagiarism raises a form of action and consequences of plagiarism itself if the source used is not open source. Plagiarism is an act of deception of the work of others without the knowledge of the original author, which violates a Copyright and Moral Rights. With the increasing amount of data and data complexity, deep learning provides solutions for predictive analytics, with increased processing capabilities and optimal processor utilization. Deep learning shows success and improves the classification model in this field. On the other hand, clone detection code with massive, varied and high-speed data volumes requires feature extraction. With the potential of deep learning to extract better features, deep learning techniques are suitable for code clone detection. For this reason, it is necessary to develop a clone detection code that can process data from a programming language by utilizing deep learning. Based on the results of experiments conducted on 100 PHP program code data files, experimented with several types of activation function and optimizer methods. The average value of the resulting accuracy is good. With a variety of activation functions that we use such as Relu, Linear, Sigmoid, Softmax, Tanh, Elu, Selu, Softplus, Softsign, hard, and sigmoid, as well as variations of the optimizer used are Adagrad, RMSProp, SGD, Adadelta, Adam, Adamax and Nadam , the best attribute selection is in the Selu function and the RMSProp optimizer. The number of epochs used is 1000, the number of neurons per layer is 500 and the best number of hidden layers is 10, the average accuracy is 0.900
Penerapan Supply Chain Management (SCM) Dalam Pemantauan Stok Barang Berbasis Web Sri Wahyuni Nasution; Nuriadi Manurung; Elly Rahayu
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.1781

Abstract

Umi Nala Shop store is engaged in selling toys, such as floats, laptop screens, construction sets, ambulance cars, small cars, jeep cars, and many more. The problem is that this store does not know the amount of inventory of goods in the warehouse. This store purchases goods from suppliers for the inventory of goods to be sold without knowing the available stock. This makes the inventory of goods to be sold by the store uncontrollable. The store records incoming and outgoing goods and transactions manually using paper so that data can be lost. The Umi Nala Shop has more than 200 resellers but is inactive and has ten suppliers to supply the goods sold. The sale of goods at the Umi Nala Shop is still offline, where customers come directly to the Umi Nala Shop. Marketing is carried out through social media networks such as Facebook, WhatsApp, and Instagram. In carrying out its business, it is necessary to pay attention to inventory management to provide for consumer needs and control inventory when there is a high demand for goods. For the store to compete, it is necessary to implement Supply Chain Management (SCM) to integrate suppliers, warehouse manufacturing, and storage so that goods are distributed in the correct quantity at the right time, to minimize costs and provide satisfaction to consumers. The purpose of this study is to build an SCM application that can make it easier for stores to find out the amount of inventory to ensure the availability of goods. The results of this study with the implementation of Supply Chain Management at the Umi Nala Shop store can help and make it easier for store owners to manage the supply chain of goods.