cover
Contact Name
Bayu Priyatna
Contact Email
-
Phone
+6281382923086
Journal Mail Official
bit-cs@ubpkarawang.ac.id
Editorial Address
Telukjambe Timur 05/03 TJ Karawang
Location
Kab. karawang,
Jawa barat
INDONESIA
Buana Information Technology and Computer Sciences (BIT and CS)
ISSN : 27152448     EISSN : 27157199     DOI : https://doi.org/10.36805/bit-cs
Core Subject : Science,
Buana Information Technology and Computer Science (BIT and CS) is a journal focusing on new technologies that handle IT research and management - including strategy, change, infrastructure, human resources, information system development and implementation, technology development, future technology, policies and national standards and articles that advance understanding and application of research approaches and methods. This journal publishes works from disciplinary, theoretical and methodological perspectives. It was designed to be read by researchers, scholars, teachers, and students in the area of Information Systems and Computer Science, as well as IT developers, consultants, software vendors, and senior IT executives who are looking for updates on current experiences and prospects related to information and communication technology contemporary.
Articles 6 Documents
Search results for , issue "Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)" : 6 Documents clear
Apriori Algorithm and Market Basket Analysis to Uncover Consumer Buying Patterns: Case of a Kenyan Supermarket Omol, Edwin Juma; Onyango, Dorcas Awino; Mburu, Lucy Waruguru; Abuonji, Paul Anyango
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6082

Abstract

This article presents a study on utilizing the Apriori algorithm and Market Basket Analysis (MBA) to reveal consumer buying patterns in supermarkets. The aim of this research is to explore the effectiveness of these data mining techniques in revealing valuable insights that can inform marketing strategies and enhance the overall shopping experience for customers. This study centered on improving customer loyalty within the supermarket setting through the utilization of cutting-edge information technology and programming applications, including Python. Specifically, the Apriori algorithm libraries of the Python language were employed to identify frequent item sets and derive 42 association rules, which shed light on product affinities and co-purchasing patterns. By deriving association rules from the frequent item sets, the study identified the significance of strategically placing frequently purchased products to enhance revenue generation. In conclusion, the application of the Apriori algorithm and Market Basket Analysis in this case of a Kenyan supermarket has proven to be a valuable approach for uncovering consumer buying patterns, providing a competitive edge in the dynamic retail industry.
Identification of Socio Economic Registration Data Using OCR Based Tesseract and Google Cloud Vision Ursaputra Pratama, Lionardi; Yuniar Rahman, Aviv; Pahlevi Putra, Rangga
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6258

Abstract

The Indonesian government program, called Socio-Economic Registration (Regsosek), aims to measure and monitor the socio-economic conditions of low-income people. One of the relevant data used for research is Regsosek. This method is used to analyze the influence of economic and social infrastructure on economic growth, analyze the socio-economic determinants of ownership of work accident insurance for informal workers, create a women's socio-economic vulnerability index (IKSEP), and study intercultural literacy from a social, economic and political perspective. The success of the government's Socio-Economic Registration program depends on the role of data collection officers or surveyors, who directly interact with the community to obtain information about Socio-Economic Registration (Regsosek) data collection. This method also has other obstacles that significantly affect the overall results of the survey, where the survey results must be entered manually by the surveyor from a form with handwritten data, after which it is entered into the website. This method is vulnerable to human error, where the handwriting is difficult to read, and mistakes are made during the data input. The technology that can be used to handle this problem is implementing the OCR method, where writing that was initially handwritten manually can be identified and converted into digital text that can be edited (editable text) and processed automatically. This research shows that the proposed method has good accuracy, with an Accuracy of 96.45%, CER 0.3%, and WER 4.30%.
SVM Ransomware Detection Using Machine Learning Algorithm Abiodun Ayeni , Olaniyi; Adejumo, Ibitola
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6265

Abstract

With the advent and subsequent explosion of the internet, global connectivity has been achieved, and is on the rise. This provides a host of advantages such as connectivity and communication, information broadcast and transmission, amongst others. This however introduces a new set of challenges: the safety and protection of these communication channels amongst them. Information has always been power, and the widespread mature of information only results in the widespread attempts to procure it, sometimes via illegal channels. In view of this, this research aims at detecting Crypto-ransomware and locker ransomware. Data was collected from an open repository and cleaned. The cleaned data was then split into tests, train sets and validation which was used to train a number of ML models based on the: Random Forest algorithm, Support Vector Machine (SVM) and Gradient boosting algorithm. Ransomware is one of the well-known ways and frequent use which cyber-attackers use in infecting their victims, either through phishing or drive download. Attackers will create an email pretending to be from a genuine resource and send it to their targeted victims. However, this research illustrated how to combat crypto-ransomware and locker ransomware. Implementing the machine learning algorithm, the system can detect ransomware under 30’s, giving computer users over 90% assurance of their system for ransomware free.
Implementation of Digital Invitation Applications in The Era Society 5.0 As a Business Opportunity Micro Small to Medium (MSMEs) Priyatna, Bayu; Tia Hananto, Agus; Huda, Baenil
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6276

Abstract

Indonesian people have a great opportunity to become MSMEs. One of the MSME players is utilizing digital technology as an innovative product. One of the phenomena slowly transferring to a society or society that was using paper has now changed into digital invitations. Invitations are digital or electronic and can be accessed via a computer, tablet, or smartphone. Digital invitations canbe in images, videos, or text messages created using graphic design or special digital invitation applications. Typically, Digital Invitations include information about the event, such as date, time, place, and theme. Digital Invitations can also be decorated with images, icons, or illustrations related to the event. The advantages of using Digital invitations include a practical and easy-to-disseminate, cost-effective, and more friendly environment that can be accessed anytime. In contrast to conventional invitations, they are susceptible to damage, require additional costs, limit design options, take time to print and ship, and generate waste. Method The research used was descriptive with a qualitative approach through interviews exploring several printed invitation and wedding organizer service providers in Karawang. Research results on digital invitation applications can help MSMEs expand market reach, increase time and cost efficiency, and deliver a more interactive and personalized customer experience.
Early Breast Cancer Detection in Coimbra Dataset Using Supervised Machine Learning (XGBoost) Jaddoa, Ahmed Sami
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6478

Abstract

Worldwide, breast cancer (BC) represents one of the serious health concerns for adult females. The early detection and accurate prediction of risks are vital for the provision of optimum care and enhancement of patient outcomes. In the past few years, promising large data merging and ensemble learning algorithms appeared for the purpose of classification and prediction of BC risk. In the area of medical applications, methods of machine learning (ML) are crucial. Early diagnosis is necessary for a more efficient carcinoma treatment. This study’s aim is to classify the carcinoma with the use of the 10 predictors that are found in Breast Cancer Coimbra dataset (BCCD). Presently, early diagnoses are necessary. The rates of cancer survival could be raised in the case where it is discovered early. Methods of machine learning offer effective way for data classifying and making early disease diagnoses. This study utilizes BCCD for the classification of BC cases utilizing XGBoost algorithm. Based on performance criteria, early detection of BC is the primary goal. The XGBoost classifier in this research achieved 98% precision, 98.32% accuracy, 99% f1-score, and 97% recall.
Quantum computing’s paradigm shift : Implications and Opportunities for Cloud Computing Brahmam Ainala, Veera; Arikatla, Yaswanth; Seru, Varma; Dasu, Sahil; Bikram, B
Buana Information Technology and Computer Sciences (BIT and CS) Vol 5 No 2 (2024): Buana Information Technology and Computer Sciences (BIT and CS)
Publisher : Information System; Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/bit-cs.v5i2.6649

Abstract

The field of computing is about to undergo a revolution thanks to quantum computing, a ground-breaking innovation based on the ideas of quantum physics. The enormous implications and potential that quantum computing has for cloud computing are explored in this publication. We examine the difficulties faced by current cryptography systems as well as prospective improvements in fields like machine learning, simulations, and data security as we delve into the basic alterations in computing paradigms. Additionally, we go over the revolutionary possibilities for cloud computing, such as the creation of quantum-safe cloud security solutions, hybrid computing models, and quantum cloud services.

Page 1 of 1 | Total Record : 6