cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 6 Documents
Search results for , issue "Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)" : 6 Documents clear
MAPPING PERCEPTION OF CONSUMER ANTIVIRUS SOFTWARE WITH MULTIDIMENSIONAL SCALING METHOD Nurhayati, Ai; ., Frencius
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus software industry must be able toknow its position in the minds of consumers, especially domestic consumers. In this research, Smadav will representthe antivirus software industry from Indonesia. In this research want to know how the position of smadav comparedwith its current competitors, namely Avast, Avira, AVG, Kaspersky, McAfee and Norton. This research is only done tomap antivirus software based on similarity according to respondent's perception. This research uses Multidimensionalscaling (MDS) method through SPSS software program version 23. The results showed that there are three groups ofdifferent antivirus software based on similarity level according to the respondent's perception. On the two-dimensionaland three-dimensional maps Norton antivirus software, Avast and Avira have similar resemblance according to therespondent's perception, because the location is closest and is in the same quadrant. Smadav differs according toperceptions of respondents. AVG, McAfee and Kaspersky have similarities according to respondents' perceptions.
META ANALYSIS: MANAGEMENT CONTROL SYSTEM, STRATEGY, COMPANY PERFORMANCE Pujiati, Desi; ., Margianti; ., Misdiyono
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aimed at determining and analyzing the meta analysis on journals review of the managementcontrol system, strategy and company performance theme. The management control system used lever's approach ofcontrol consisting of belief system, boundary system, diagnostic control system and interactive control system. Theinfluence and impact of the management control system was resulted from previous research studies. This researchused meta-analysis method. Meta-analysis is the study of a number of research results in similar problems. The unit ofanalysis in the study were written documents about the research of management control system in the form of journalarticles and research reports taken purposively based on their compatibility with the research theme. Data analysisused was quantitative data analysis with percentage and qualitative data analysis for descriptive analysis result dataon 25 research related to management control system. Findings of meta-analysis results based on research objectives,research variables used, population / sample of research, data collection techniques and analysis tools show thatmanagement control system lever's of control approach can contribute to the achievement of strategy and impact onbusiness unit performance improvement.
PERFORMANCE COMPARISON OF ASYMMETRIC CRYPTOGRAPHY (CASE STUDY-MAIL MESSAGE) Sann, Zarni; Soe, Thi thi; Knin, Kaythi Wyut Mhone; Win, Zin May
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data encryption is well known as essential for today?s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government?s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.
AN APPROACH TOWARDS DEVELOPMENT OF A MIGRATION ENABLED IMPROVED DATACENTER BROKER POLICY Das, Debashis; Banerjee, Sourav; Kundu, Ayan; Chandra, Swagata; Pal, Saptarshi; Biswas, Utpal
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computinghas left its remarkable note on the computing world over the last few years. Through itseffectiveness, litheness, scalability & availability cloud computinghas changed the nature of computer systemdeployment. The Quality of Service (QoS) of a cloud service provider (CSP) is an important element of research interestwhich includes different critical issues such as proper load, minimization of waiting time, turnaround time, makespanand suppressing the wastage of bandwidth of the system. The Datacenter Broker (DCB) policy helpsassigning acloudletto a VM. In present study, we proposed an algorithm, i.e., Migration enabled Cloudlet Allocation Policy(MCAP) for allocation of cloudlets to the VMs in a Datacenter by taking into accounttheload capacity of VMs andlength of the cloudlets. The experimental results obtained using CloudSim toolkit under extensive loads that establishperformance supremacy of MCAP algorithm over the existing algorithms.
FOG AND RAIN ATTENUATION CHARACTERIZATION AND PERFORMANCE OF TERRESTRIAL FREE SPACE OPTICAL COMMUNICATION IN AKURE, NIGERIA O, Ajewole M.; A, Owolawi P.; S, Ojo J.; M., Adetunji R.
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Reliable broadband communication requires secure high data rate and bandwidth links. With the observedincrease in broadband users, known communication systems such as RF and microwave links cannot promise suchrequirements due to link interference and low bandwidth. A current communication system that promises suchrequirements and more is Free Space Optical (FSO) communication. This system basically involves the transmissionof signal-modulated optical radiation from a transmitter to a receiver through the atmosphere or outer space. However,location-variant atmospheric channel degrades the performance of an FSO system under severe atmosphericconditions, thus necessitating local atmospheric attenuation studies.This paper presents the characterization of both fog- and rain-induced attenuation and the performance ofan FSO system in a terrestrial terrain at Akure, Nigeria. One-year archived visibility data and in-situ measured 1-minute integration time rain rate data obtained from Nigerian Meteorological Agency (NIMET) and the Departmentof Physics, Federal University of Technology, Akure were used to compute the fog- and rain-induced specificattenuations using Kruse model and Carboneur model respectively. The performance of the FSO system is analyzedthrough link margin by using the parameters of a commercial optical transceiver, Terescope 5000.
PERIMETER INTRUSION DETECTIVE SYSTEM USING ARDUINO Naing, Thiri; Khaing, Kyi Kyi; Nwet, Tin Tin
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure public and private placessuch as military bases, airports, power station and security related application, the used of perimeter fencing iswidely applicable for isolating and protecting. Fence structures merely prevent a percentage of intrusions orpostpone them. Therefore, to monitor and investigate activities on or around the university, a higher level of securityis needed. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCDdisplay module and speaker. The unauthorized person who tries to intrude the university woulld be sensed, detectedand alarm would generate a signal that an intruder was trying to enter the university. The sound level depended onthe distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of theobject or personal found in its region on the LCD display. This system was very useful for security applications.Ultrasonic sensor would be searching if there was a motion in its range.

Page 1 of 1 | Total Record : 6