cover
Contact Name
Budi Hermawan
Contact Email
-
Phone
+62081703408296
Journal Mail Official
info@kdi.or.id
Editorial Address
Jl. Flamboyan 2 Blok B3 No. 26 Griya Sangiang Mas - Tangerang 15132
Location
Kab. tangerang,
Banten
INDONESIA
bit-Tech
ISSN : 2622271X     EISSN : 26222728     DOI : https://doi.org/10.32877/bt
Core Subject : Science,
The bit-Tech journal was developed with the aim of accommodating the scientific work of Lecturers and Students, both the results of scientific papers and research in the form of literature study results. It is hoped that this journal will increase the knowledge and exchange of scientific information, especially scientific papers and research that will be useful as a reference for the progress of the State together.
Articles 370 Documents
Detected The Sex Of Fish That Is Good For Cultivation Using Fuzzy Satria Abadi; Fitriyani
bit-Tech Vol. 5 No. 2 (2022): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i2.615

Abstract

Fish is a type of vertebrate animal that is poikilotermic (cold-blooded), has distinctive features on its spine, gills and fins and depends on water as a medium for life. Fish have the ability in the water to move by using fins to maintain the balance of their body so that it does not depend on the current or movement of water caused by the wind direction using the FMADM (fuzzy multi attribute decision making) method. The purpose of this study is to get the problem to be solved, namely making a decision support model using the FMADM (fuzzy multi attribute decision making) method with the help of image processing in determining the sex of fish to increase fish farming yields. The preferred alternative in the selection of fish sex is that the 4th alternative has the highest value as the best prospective fish brood with a weighting point of 0.57. Then the investigation is carried out using image processing which is processed using photoshop so that it can be calcified into three image creteria of the physical shape of the sex, and from the number of spines located on the fins of the fish.
Implementation of Linear Regression Algorithm to Predict Stock Prices Based on Historical Data Jelvin Putra Halawa; Aditiya Hermawan; Junaedi .
bit-Tech Vol. 5 No. 2 (2022): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i2.616

Abstract

Stock investment is in great demand by investors because it can provide large profits with large risks or losses, in accordance with the investment principle of low risk low return, high risk high return. Stock prices that fluctuate in a very short time make it difficult for investors to predict stock prices in the future, so investors must pay more attention and gather as much information as possible regarding the shares to be bought or sold. This study aims to create a data mining model using a Linear Regression algorithm that can predict daily stock closing prices to provide information that supports investors in stock transactions. The data used is historical data on daily stock prices for 10 companies in the last 8 years for the period 25 February 2013 – 25 February 2021. Historical stock price data will be prepared using the Noving Average method and create a data mining model using the linear regression method to generate stock price prediction models. The resulting model can be used to predict stock prices well enough to assist investors in making investment decisions to obtain large profits with low risk.
Web-Based IT Helpdesk Ticketing System at PT. Dayacipta Kemasindo Didi Kurnaedi; Erna Oktora; Eko Dharmawan; Irfan Nasrullah; Muhammad Drajat
bit-Tech Vol. 5 No. 2 (2022): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i2.617

Abstract

An IT helpdesk is a software or system that helps users troubleshoot their IT facility through one or more points of contact. Then, it allows users to troubleshoot, track their problems, and get help with products or services. PT Dayacipta Kemasindo, in carrying out administrative processes, and work in the office, cannot be separated from the use of IT, so if there is a problem with IT facilities, it requires assistance from the IT department. However, there are several problems, one of which is that the department that reports disturbances and damage often does not know how long it will take for their issues to be handled because the process of queuing for work is not clearly visible, so it seems relatively slow. The purpose of this research is to develop an IT Helpdesk system for trouble reporting and monitoring repair work. The result of this research is a system that can be used by the IT department to help monitor incoming assignments and work.
APLIKASI BUSINESS INTELLIGENCE PENAMPIL DATA OMSET PENJUALAN USAHA MIKRO KECIL MENENGAH MENGGUNAKAN ONLINE ANALYTICAL PROCESSING DENGAN METODE GROWTH RATIO BERBASIS WEB William Thomas; Rino
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.558

Abstract

Micro, small and medium enterprises are businesses that are generally individually and are small business entities such as selling dumplings, fried bananas, even internet cafes and so on. This study aims to create a business intelligence application that displays sales turnover data for micro, small and medium enterprises using online analytical processing with a web-based growth ratio method that aims to help micro, small and medium enterprises by making application prototypes that can display data from sales results in various easy graphs. viewed and using the growth ratio formula method where the formula calculates the profit as a percentage and can be compared with the previous data. This application program is made for the public with the hope that micro, small and medium enterprises experience significant progress in profiting from their sales turnover Human-created applications were created to facilitate human needs and work ranging from lifestyle, health, security, entertainment, and others. In addition, we often also find several applications that have similarities with each other in various functions, appearance, and so on so that it spurs developers to have to work hard to develop these applications to attract the attention of website users by offering unique advantages and features that can be a differentiator from similar applications. The need for clear and precise information today is needed in everyday life in order to avoid false information or hoaxes. In addition, precise and accurate information can also be an important element that can influence developments in various aspects such as sales business, education, entertainment and so on at this time and in the future.
Topik yang saya akan bahas kali ini adalah tentang pelayanan BPJS Kesehatan melalui aplikasi Mobile JKN, khususnya dalam pemberian informasi dan pelayanan. Mobile JKN merupakan suatu inovasi terbaru pelayanan jaminan Kesehatan nasional yang berbasis elekt Gilbert Parera; Muhammad Darwis
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.691

Abstract

Mobile JKN is a new Government application to register and manage the health protection membership. The problem that often occurs is that many participants do not really understand the application and their use. Therefore, JKN mobile application needs to be adjusted and developed so that the usefulness and benefits can be felt by the participants and the wider community. The method used is the System Usability Scale (SUS), a questionnaire that can be used to measure the usability of a computer system according to the user's subjective point of view. In performing SUS calculations using 5-point Likert scale. The first SUS score was obtained from testing the JKN Mobile Application by distributing SUS questionnaires to 23 respondents.  The second test was carried out by involving 3 professionals and experts in the science of design and IT. The treatment of the SUS questionnaire in the second test was by adding points of recommendation for improvement to the Mobile JKN application in accordance with the first results in each statement of the second test questionnaire. And the results of the SUS score in this second test experienced a significant increase from 59 to 81, this shows that the recommendations for improvements to the Mobile JKN application need to be improved or need to be developed a lot. The Mobile JKN application needs to be developed a lot in terms of updating and providing information about this application because there are still many and do not understand about the Mobile JKN application.
Perancangan Web Sistem Informasi Tes Kemampuan Bahasa Inggris Kelas Menggunakan Metode Fisher Yates Shuffle Andri Wijaya; Frendy Dodo Chang
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.724

Abstract

Information technology has been rapidly developing over the past few decades, and the COVID-19 pandemic has further accelerated the adoption and implementation of technology in various aspects of our lives, particularly in the business sector and education., where improvements in the learning system that were originally offline become online, practical, and easy. Currently, information regarding the English Test at Faculty of Social Sains and Humanities Buddhi Dharma University (UBD) is still running manually starting from registration, scheduling, exam, and announcement of English test results which of course requires more time for both participants and faculty staff. In order to boost students English knowledge, an English comprehension exam test is needed as organized by the faculty, that is English Proficiency Test (EPT). The design of this EPT information system, a part of being able to change the manual method, and also to simplified the EPT procedure. The new system is using website which combined with Fisher-Yates Shuffle method for randomization the exam test to reduce fraudulent actions in the process of conducting English training tests, being followed by 94 respondents as English training participants, system tested using the User Acceptance Test (UAT) method with five aspects of quality components. The results obtained that the system built had a good criteria with a value of 75.93%.
Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases Ruruh Wuryani; Indah Fenriana; Dicky Surya Dwi Putra; Desiyanna Lasut; Susanto Hariyanto
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.728

Abstract

The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
Boarding House Provider Information with Multi Attribute Utility Theory (MAUT) Method Suwitno Suwitno; Niki Djanuar Chandra; Benny Daniawan
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.729

Abstract

The increasing rate of population growth in urban areas to find work or study and the high Basic Credit Interest Rates for Home Ownership Loans, the choice of renting a boarding house can be an alternative for those who do not want to stay in the long term. Implementation of Decision Support System provide choices for information system in order to assist the community in choosing a place to live such as a boarding house. One method of Decision Support System is Multi Attribute Utility Theory (MAUT). MAUT can be interpreted as method of systematic comparison by finding the total weight of a set of values in the criteria to obtain results. MAUT method on a web-based information system, it can help people determine the choice of the desired boarding house. The results from the MAUT method will be used an objective consideration for users. The results of this study were tested by Technology Acceptance Model to measure the acceptance of systems. The calculation of TAM uses questionnaire distributed to 88 respondents and based on t-statistics on the TAM test, Perceived Ease of Use (PEOU) against Attitude Toward Using (ATU) is 2.660, Perceived Usefulness (PU) against ATU is 4.218. Then Behavior Intention to Use (BITU) for Actual System Use (ASU) is 16,122 and PU for BITU is 4,218. Where the indicator to have a positive influence when the value is above 1.9894. Meanwhile, ATU against BITU is only 1.179 which means that it does not have a positive influence.
Asset and Inventory Data Monitoring Application Design PT. Transmarco Didi Kurnaedi; Erna Oktora; Irfan Nasrullah; Agung Prayoga; FX Agung Pramanto
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.731

Abstract

The use of IT asset and inventory management information systems can greatly benefit businesses in managing their IT assets. The objective of this study is to develop an information system application that simplifies the management of IT assets by monitoring inventory data, tracking requests for repair, borrowing, purchase, and inventory recording of IT assets. The study was conducted at PT. Transmarco and the development of the information system application involved layout design, diagram design (including an activity diagram), and database design processes. Modular programming languages such as PHP, Sublime Text, MySQL, and CSS were used in the development process. The IT Asset and Inventory Data Monitoring Application provides information on incoming goods data, outgoing goods data, stock goods, and usage history. By implementing this application, it is expected that managing asset data and IT inventory at PT. Transmarco will become much simpler, including managing item data, item history, and stock of goods. This system will enable firm personnel to efficiently manage IT assets according to the desired outcomes. Overall, the development of the IT asset and inventory data monitoring application at PT. Transmarco showcases the potential benefits of IT asset and inventory management information systems for businesses. The streamlining of IT asset management processes can result in improved efficiency, reduced costs, and better decision-making regarding IT asset investments.
Application of The Haversine Method In The Android-Based Donation Search Application Daniel Daniel; Desiyanna Lasut
bit-Tech Vol. 6 No. 1 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v6i1.736

Abstract

Used goods that we no longer use will only fill the room which if we leave it will be damaged and have no use value because it consumes time. If given to someone else, the goods may still be useful and can help their lives the problem is how we find people who need our goods and vice versa. For this reason, a system is needed that can help facilitate and bring the two parties together. The effort made to make it easier for the recipient to contribute in taking the donated goods is to use the haversine method so that the recipient can consider the distance between them and the donated item. The haversine formula is an equation that uses latitude and longitude to find the distance between the two different points. By using the haversine formula, the output is the distance from the location of the party receiving the donation (current location) to the donor. Therefore, the author wants to create and design an android-based application so that it can reach many people and can make it easier for donors to donate their goods or for the recipient of donations in looking for items that have been donated.

Page 9 of 37 | Total Record : 370