cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 6 Documents
Search results for , issue "Vol 3, No 3: November 2022" : 6 Documents clear
Implementation of the internet of things on smart posters using near field communication technology in the tourism sector Muhammad Luthfi Hamzah; Astri Ayu Purwati; Sutoyo Sutoyo; Arif Marsal; Sarbani Sarbani; Nazaruddin Nazaruddin
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p194-202

Abstract

Tourism promotion in Pekanbaru is one step in increasing the number of tourists visiting Pekanbaru City. Through tourism promotion, tourists will find out where the locations are in Pekanbaru and information related to these tourist objects. This research aims to design a tourism promotion system using near-field communication (NFC) smart posters using smartphones in the city of Pekanbaru and apply NFC technology to Android smartphones in the city of Pekanbaru. Promote tourism in the city of Pekanbaru. They were testing this application with the System Usability Score, which had a good score of 74.30. This study shows that the planning and modeling of the smart poster system using NFC technology makes it easier to identify important information for every tourism activity in Pekanbaru. The results of this study are the design and product of an intelligent poster using NFC on an Android smartphone that can help users achieve information so that it is more effective and efficient.
Text classification to predict skin concerns over skincare using bidirectional mechanism in long short-term memory Devi Fitrianah; Andre Hangga Wangsa
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p137-147

Abstract

There are numerous types of skincare, each with its own set of benefits based on key ingredients. This may be difficult for beginners who are purchasing skincare for the first time due to a lack of knowledge about skincare and their own skin concerns. Hence, based on this problem, it is possible to find out the right skin concern that can be handled in each skincare product automatically by multi-class text classification. The purpose of this research is to build a deep learning model capable of predicting skin concerns that each skincare product can treat. By comparing the performance and results of predicting the correct skin condition for each skincare product description using both long short-term memory (LSTM) and bidirectional long short-term memory (Bi-LSTM), The best results are given by Bi-LSTM, which has an accuracy score of 98.04% and a loss score of 19.19%. Meanwhile, LSTM results have an accuracy score of 94.12% and a loss score of 19.91%.
Prediction of mango firmness by near infrared spectroscopy tandem with machine learning Sri Agustina; Ramayanty Bulan; Agustami Sitorus
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p148-156

Abstract

The firmness of the mango fruit is one of the internal physical properties that can show its quality. Unfortunately, non-destructive methods to measure this are not yet available. In the current study, we develop a calibration model using near infrared spectroscopy to predict the physical properties (firmness) of the mango cultivar Arumanis (Mangifera indica cv. Arumanis) via machine learning. Spectral data were acquired using the fourier transform near-infrared (FTNIR) benchtop with a wavelength range of 1000 to 2500 nm. Multivariate spectra analysis based on machine learning, including principal component regression (PCR), partial least squares regression (PLSR), and support vector machine regression (SVMR), was utilized and compared to estimate the firmness of fresh mangos. The results obtained show that the prediction of machine learning by PLSR is better than that of SVMR and PCR for the prediction of mango firmness. The coefficient correlation of calibration (rc) and validation (rcv), the root means square error of calibration (RMSE-C) and validation (RMSE-CV), and the ratio of prediction to deviation (RPD) were 0.941, 0.382 kgf, 0.920, 0.472 kgf, and 2.556, respectively. The general results satisfactorily indicate that near infrared spectroscopy technology integrated with an appropriate machine learning algorithm has optimistic results in determining the firmness of mango non-destructively.
Automatic model transformation on multi-platform system development with model driven architecture approach Aila Gema Safitri; Firas Atqiya
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p157-168

Abstract

Several difficulties commonly arise during the software development process. Among them are the lengthy technical process of developing a system, the limited number and technical capabilities of human resources, the possibility of bugs and errors during the testing and implementation phase, dynamic and frequently changing user requirements, and the need for a system that supports multi-platforms. Rapid application development (RAD) is the software development life cycle (SDLC) that emphasizes the production of a prototype in a short amount of time (30-90 days). This study discovered that implementing a model-driven architecture (MDA) approach into the RAD method can accelerate the model design and prototyping stages. The goal is to accelerate the SDLC process. It took roughly five weeks to construct the system by applying all of the RAD stages. This time frame does not include iteration and the cutover procedure. During the prototype test, there were no errors with the create, read, update, and delete (CRUD) procedure. It was demonstrated that automatic transformation in MDA can shorten the RAD phases for designing the model and developing an early prototype, reduce code errors in standard processes like CRUD, and construct a system that supports multi-platform.
Pakistan sign language to Urdu translator using Kinect Saad Ahmed; Hasnain Shafiq; Yamna Raheel; Noor Chishti; Syed Muhammad Asad
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p186-193

Abstract

The lack of a standardized sign language, and the inability to communicate with the hearing community through sign language, are the two major issues confronting Pakistan's deaf and dumb society. In this research, we have proposed an approach to help eradicate one of the issues. Now, using the proposed framework, the deaf community can communicate with normal people. The purpose of this work is to reduce the struggles of hearing-impaired people in Pakistan. A Kinect-based Pakistan sign language (PSL) to Urdu language translator is being developed to accomplish this. The system’s dynamic sign language segment works in three phases: acquiring key points from the dataset, training a long short-term memory (LSTM) model, and making real-time predictions using sequences through openCV integrated with the Kinect device. The system’s static sign language segment works in three phases: acquiring an image-based dataset, training a model garden, and making real-time predictions using openCV integrated with the Kinect device. It also allows the hearing user to input Urdu audio to the Kinect microphone. The proposed sign language translator can detect and predict the PSL performed in front of the Kinect device and produce translations in Urdu.
Improved authenticated elliptic curve cryptography scheme for resource starve applications Esau Taiwo Oladipupo; Oluwakemi Christiana Abikoye
Computer Science and Information Technologies Vol 3, No 3: November 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v3i3.p169-185

Abstract

Elliptic curve cryptography (ECC) remains the best approach to asymmetric cryptography when it comes to securing communication among communication partners in low-computing devices such as wireless sensor networks (WSN) and the Internet of Things (IoT) due to its effectiveness in generating small keys with a strong encryption mechanism. The ECC cuts down on power use and improves device performance, so it can be used in a wide range of devices that don't have a lot of resources. However, most of the existing ECC implementations suffer from implementation flaws that make them vulnerable to cryptanalysis attacks. In this study, flaws in the existing implementation of ECC are identified. A new scheme where the identified flaws are remedied was developed. The results of the security analysis show that the new scheme is an indistinguishable authenticated adaptive chosen ciphertext attack (IND-CCA3), resistant to malleability and man-in-the-middle attacks (MIMA). The results of comparative security analysis show that the mapping scheme employed in the new scheme maps any blocks of plaintext to distinct points on an elliptic curve, which makes it resistant to all attacks that the existing schemes are vulnerable to without having a negative effect on its encryption and decryption time, throughput, or power consumption.

Page 1 of 1 | Total Record : 6