cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 61 Documents
EXTRACT TRANSFORM LOAD (ETL) PROCESS IN DISTRIBUTED DATABASE ACADEMIC DATA WAREHOUSE Yulianto, Ardhian Agung
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 2 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

While a data warehouse is designed to support the decision-making function, the most time-consuming partis the Extract Transform Load (ETL) process. Case in Academic Data Warehouse, when data source came from thefaculty?s distributed database, although having a typical database but become not easier to integrate. This paperpresents how to an ETL process in distributed database academic data warehouse. Following Data Flow Threadprocess in the data staging area, a deep analysis performed for identifying all tables in each data sources, includingcontent profiling. Then the cleaning, confirming, and data delivery steps pour the different data source into the datawarehouse (DW). Since DW development using bottom-up Kimball?s multidimensional approach, we found the threetypes of extraction activities from data source table: merge, merge-union, and union. Result for cleaning andconforming step set by creating conform dimension on data source analysis, refinement, and hierarchy structure. Thefinal of the ETL step is loading it into integrating dimension and fact tables by a generation of a surrogate key. Thoseprocesses are running gradually from each distributed database data sources until it incorporated. This technicalactivity in distributed database ETL process generally can be adopted widely in other industries which designer musthave advance knowledge to structure and content of data source.
INTERNET USAGE AND SELF-REGULATED LEARNING ASSESSMENT AT JUNIOR HIGH SCHOOL STUDENTS IN TASIKMALAYA CITY, INDONESIA El Akbar, R. Reza; Ratnaningsih, Nani; Hidayat, Edi
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 2 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

describes the pattern of relationship between internet usages on students, on the assessment of aspects of selfregulated learning. The aspect of self-regulated learning measured from 10 aspects. This study discusses the effects ofgender, the categories of schools (excellent schools and regular school), the total value of self-regulated learning andthe value of math exams. In brief, the research stages consist of three stages. The first stage of research is to createand retrieve the questionnaire data. The goal is to obtain all things related to internet usage, as well as measure aspectsof self-regulated learning assessment. The second stage of treatment on students. This treatment time is done for fourmonths, where students follow the math lesson with self-regulated learning method. Students provided with multimediadevices, textbooks and other. The third stage is the assessment or math test. The analytical method used is qualitativemethod with descriptive statistical approach. The results obtained that the dominant male students using internet forgames tend to have greater Aspects of Finding and Utilizing Relevant Learning Resources. While female, tend to bedominant in aspects of Evaluating Learning Processes and Results. The average mathematical exam results, in studentswho often use the game tend to have a higher value, compared with other students who often use social media.
INITIAL DYNAMIC SYSTEM DESIGN FOR OPTIMIZATION OF GRAVITY IRRIGATION WATER MANAGEMENT (OPEN GRAVITATION IRRIGATION) Hidayat, Asep Kurnia; El Akbar, R. Reza; Kosnayani, Ai Sri
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 2 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

an expression of conflict in the field. To overcome this problem is a regulation of several parameters,including regulation of planting schedules and reduction of land area. The model of the irrigation water managementsystem used is based on the risk of land failure and the optimum area of land that can be planted. The parameters usedto overcome this problem are planting schedules, risk of land failure and factor k. The k factor is the ratio of wateravailability to water needs. The output of this system is optimal net benefit based on the optimal alternative irrigatedland area. The results of the formula will show the optimal amount of land area that produces optimal net benefitsbased on certain planting schedules and certain effective rainfall. This system will also show that optimization will beachieved if there is a water balance between the availability and needs of irrigation water. The system referred to inthis study is a dynamic system. The purpose of this study is to make a preliminary design of a dynamic system to optimizethe irrigation system of agricultural land. The results obtained in this study were in the form of feedback loops andinteractions between loops with each other in agricultural irrigation systems.
AN EMPIRICAL STUDY FOR EVALUATING PERFORMANCE OF KING ABDULAZIZ INTERNATIONAL AIRPORT WITH SIX SIGMA Basahel, Abdullah; Alqarni, Abdullah M.
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 2 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is intended to evaluate the efficiency of proceures and processes used by the King AbdulazizInternational Airport (KAIA) in Jeddah, Saudi Arabia with the help of Six Sigma. For, we have framed differentobjectives for analyzing the effect of six sigma in decision makings and quality control of the KAIA. The aim is also tofind out the relationship of Six Sigma on an information system used by KAIA. We have used the qualitative researchmethod (semi-structured interview method) with the target population of five employees working at KAIA. Qualitativedata was collected from participants through transcribed, audio-recorded and codes. Thematic analysis was carriedout in order to obtain the study result. Our study finds that there is a significant effect of Six Sigma in streamlining ofall the processes of KAIA, which contributed towards the improvement of the quality and providing better control. Wefound that the KAIA applies KPIs to measure the decision makin, empowering the decision makers or managers. Wehave also reflected on the role of Six Sigma towards the effective performance of individuals in finance, customersupport, and internal business process and team development.
MAPPING PERCEPTION OF CONSUMER ANTIVIRUS SOFTWARE WITH MULTIDIMENSIONAL SCALING METHOD Nurhayati, Ai; ., Frencius
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus software industry must be able toknow its position in the minds of consumers, especially domestic consumers. In this research, Smadav will representthe antivirus software industry from Indonesia. In this research want to know how the position of smadav comparedwith its current competitors, namely Avast, Avira, AVG, Kaspersky, McAfee and Norton. This research is only done tomap antivirus software based on similarity according to respondent's perception. This research uses Multidimensionalscaling (MDS) method through SPSS software program version 23. The results showed that there are three groups ofdifferent antivirus software based on similarity level according to the respondent's perception. On the two-dimensionaland three-dimensional maps Norton antivirus software, Avast and Avira have similar resemblance according to therespondent's perception, because the location is closest and is in the same quadrant. Smadav differs according toperceptions of respondents. AVG, McAfee and Kaspersky have similarities according to respondents' perceptions.
META ANALYSIS: MANAGEMENT CONTROL SYSTEM, STRATEGY, COMPANY PERFORMANCE Pujiati, Desi; ., Margianti; ., Misdiyono
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aimed at determining and analyzing the meta analysis on journals review of the managementcontrol system, strategy and company performance theme. The management control system used lever's approach ofcontrol consisting of belief system, boundary system, diagnostic control system and interactive control system. Theinfluence and impact of the management control system was resulted from previous research studies. This researchused meta-analysis method. Meta-analysis is the study of a number of research results in similar problems. The unit ofanalysis in the study were written documents about the research of management control system in the form of journalarticles and research reports taken purposively based on their compatibility with the research theme. Data analysisused was quantitative data analysis with percentage and qualitative data analysis for descriptive analysis result dataon 25 research related to management control system. Findings of meta-analysis results based on research objectives,research variables used, population / sample of research, data collection techniques and analysis tools show thatmanagement control system lever's of control approach can contribute to the achievement of strategy and impact onbusiness unit performance improvement.
PERFORMANCE COMPARISON OF ASYMMETRIC CRYPTOGRAPHY (CASE STUDY-MAIL MESSAGE) Sann, Zarni; Soe, Thi thi; Knin, Kaythi Wyut Mhone; Win, Zin May
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data encryption is well known as essential for today?s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government?s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.
AN APPROACH TOWARDS DEVELOPMENT OF A MIGRATION ENABLED IMPROVED DATACENTER BROKER POLICY Das, Debashis; Banerjee, Sourav; Kundu, Ayan; Chandra, Swagata; Pal, Saptarshi; Biswas, Utpal
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computinghas left its remarkable note on the computing world over the last few years. Through itseffectiveness, litheness, scalability & availability cloud computinghas changed the nature of computer systemdeployment. The Quality of Service (QoS) of a cloud service provider (CSP) is an important element of research interestwhich includes different critical issues such as proper load, minimization of waiting time, turnaround time, makespanand suppressing the wastage of bandwidth of the system. The Datacenter Broker (DCB) policy helpsassigning acloudletto a VM. In present study, we proposed an algorithm, i.e., Migration enabled Cloudlet Allocation Policy(MCAP) for allocation of cloudlets to the VMs in a Datacenter by taking into accounttheload capacity of VMs andlength of the cloudlets. The experimental results obtained using CloudSim toolkit under extensive loads that establishperformance supremacy of MCAP algorithm over the existing algorithms.
FOG AND RAIN ATTENUATION CHARACTERIZATION AND PERFORMANCE OF TERRESTRIAL FREE SPACE OPTICAL COMMUNICATION IN AKURE, NIGERIA O, Ajewole M.; A, Owolawi P.; S, Ojo J.; M., Adetunji R.
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Reliable broadband communication requires secure high data rate and bandwidth links. With the observedincrease in broadband users, known communication systems such as RF and microwave links cannot promise suchrequirements due to link interference and low bandwidth. A current communication system that promises suchrequirements and more is Free Space Optical (FSO) communication. This system basically involves the transmissionof signal-modulated optical radiation from a transmitter to a receiver through the atmosphere or outer space. However,location-variant atmospheric channel degrades the performance of an FSO system under severe atmosphericconditions, thus necessitating local atmospheric attenuation studies.This paper presents the characterization of both fog- and rain-induced attenuation and the performance ofan FSO system in a terrestrial terrain at Akure, Nigeria. One-year archived visibility data and in-situ measured 1-minute integration time rain rate data obtained from Nigerian Meteorological Agency (NIMET) and the Departmentof Physics, Federal University of Technology, Akure were used to compute the fog- and rain-induced specificattenuations using Kruse model and Carboneur model respectively. The performance of the FSO system is analyzedthrough link margin by using the parameters of a commercial optical transceiver, Terescope 5000.
PERIMETER INTRUSION DETECTIVE SYSTEM USING ARDUINO Naing, Thiri; Khaing, Kyi Kyi; Nwet, Tin Tin
APTIKOM Journal on Computer Science and Information Technologies Vol 4 No 3 (2019): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure public and private placessuch as military bases, airports, power station and security related application, the used of perimeter fencing iswidely applicable for isolating and protecting. Fence structures merely prevent a percentage of intrusions orpostpone them. Therefore, to monitor and investigate activities on or around the university, a higher level of securityis needed. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCDdisplay module and speaker. The unauthorized person who tries to intrude the university woulld be sensed, detectedand alarm would generate a signal that an intruder was trying to enter the university. The sound level depended onthe distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of theobject or personal found in its region on the LCD display. This system was very useful for security applications.Ultrasonic sensor would be searching if there was a motion in its range.