cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 11 Documents
Search results for , issue "Vol 5, No 1: March 2024" : 11 Documents clear
Collecting and analyzing network-based evidence K. Singh, Ashwini; Kamble, Dhwaniket; Bains, Abhishek; Tiwari, Naman; R. Deshmukh, Tejas; Pandey, Sanidhya; Kumar, Hemant; M. Bhalerao, Diksha
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p1-6

Abstract

Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context. 
Hybrid model for detection of brain tumor using convolution neural networks K., Bhagyalaxmi; Dwarakanath, B.
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p84-90

Abstract

The development of aberrant brain cells, some of which may turn cancerous, is known as a brain tumor. Magnetic resonance imaging (MRI) scans are the most common technique for finding brain tumors. Information about the aberrant tissue growth in the brain is discernible from the MRI scans. In numerous research papers, machine learning, and deep learning algorithms are used to detect brain tumors. It takes extremely little time to forecast a brain tumor when these algorithms are applied to MRI pictures, and better accuracy makes it easier to treat patients. The radiologist can make speedy decisions because of this forecast. The proposed work creates a hybrid convolution neural networks (CNN) model using CNN for feature extraction and logistic regression (LR). The pre-trained model visual geometry group 16 (VGG16) is used for the extraction of features. To reduce the complexity and parameters to train we eliminated the last eight layers of VGG16. From this transformed model the features are extracted in the form of a vector array. These features fed into different machine learning classifiers like support vector machine (SVM), naïve bayes (NB), LR, extreme gradient boosting (XGBoost), AdaBoost, and random forest for training and testing. The performance of different classifiers is compared. The CNN-LR hybrid combination outperformed the remaining classifiers. The evaluation measures such as recall, precision, F1-score, and accuracy of the proposed CNN-LR model are 94%, 94%, 94%, and 91% respectively.
Deep learning technique for plant disease detection Samson Adekunle, Temitope; Oladayo Lawrence, Morolake; Omotayo Alabi, Oluwaseyi; A. Afolorunso, Adenrele; Nse Ebong, Godwin; Abiola Oladipupo, Matthew
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p55-62

Abstract

A nation's economy is primarily reliant on agricultural growth. However, several plant diseases seriously impair crop growth, both in terms of quantity and quality. Due to a lack of subject matter specialists and low contrast data, accurate diagnosis of many diseases by hand is highly difficult and time-consuming. The farm management system is therefore looking for a method for automatically detecting early illnesses. To overcome these challenges and correctly classify the different diseases, an efficient and small deep learning-based framework (E-GreenNet) is proposed. A MobileNetV3Small model is used as the foundation of our end-to-end architecture to produce finely tuned, discriminative, and noticeable features. Furthermore, the new plant composite (PC), plantvillage (PV), and data repository of leaf images (DRLI) datasets are used to independently train our proposed model, and test samples are used to evaluate its actual performance. The suggested model achieved accuracy rates of 1.00 percent, 0.96 percent, and 0.99 percent on the given datasets after a rigorous experimental study. Additionally, a comparative investigation of our proposed technique against the state-of-the-art (SOTA) reveals extremely high discriminative scores.
Trends in sentiment of Twitter users towards Indonesian tourism: analysis with the k-nearest neighbor method Purnama Harahap, Eka; Dwi Purnomo, Hindriyanto; Iriani, Ade; Sembiring, Irwan; Nurtino, Tio
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p19-28

Abstract

This research analyzes the sentiment of Twitter users regarding tourism in Indonesia using the keyword "wonderful Indonesia" as the tourism promotion identity. The aim of this study is to gain a deeper understanding of the public sentiment towards "wonderful Indonesia" through social media data analysis. The novelty obtained provides new insights into valuable information about Indonesian tourism for the government and relevant stakeholders in promoting Indonesian tourism and enhancing tourist experiences. The method used is tweet analysis and classification using the K-nearest neighbor (KNN) algorithm to determine the positive, neutral, or negative sentiment of the tweets. The classification results show that the majority of tweets (65.1% out of a total of 14,189 tweets) have a neutral sentiment, indicating that most tweets with the "wonderful Indonesia" tagline are related to advertising or promoting Indonesian tourism. However, the percentage of tweets with positive sentiment (33.8%) is higher than those with negative sentiment (1.1%). This study also achieved training results with an accuracy rate of 98.5%, precision of 97.6%, recall of 98.5%, and F1-score of 98.1%. However, reassessment is needed in the future as Twitter users' sentiment can change along with the development of Indonesian tourism itself.
Sentiment analysis of online licensing service quality in the energy and mineral resources sector of the Republic of Indonesia Hizqil, Ahmad; Ruldeviyani, Yova
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p63-71

Abstract

The Ministry of Energy and Mineral Resources of the Republic of Indonesia regularly assessed public satisfaction with its online licensing services. User rated their satisfaction at 3.42 on a scale of 4, below the organization's average of 3.53. Evaluating public service performance is crucial for quality improvement. Previous research relied solely on survey data to assess public satisfaction. This study goes further by analyzing user feedback in text form from an online licensing application to identify negative aspects of the service that need enhancement. The dataset spanned September 2019 to February 2023, with 24,112 entries. The choice of classification methods on the highest accuracy values among decision tree, random forest, naive bayes, stochastic gradient descent, logistic regression (LR), and k-nearest neighbor. The text data was converted into numerical form using CountVectorizer and term frequency-inverse document frequency (TF-IDF) techniques, along with unigrams and bigrams for dividing sentences into word segments. LR bigram CountVectorizer ranked highest with 89% for average precision, F1-score, and recall, compared to the other five classification methods. The sentiment analysis polarity level was 36.2% negative. Negative sentiment revealed expectations from the public to the ministry to improve the top three aspects: system, mechanism, and procedure; infrastructure and facilities; and service specification product types.
The impact of usability in information technology projects Putra Hulu, Freddy Richard; Raharjo, Teguh; Simanungkalit, Tiarma
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p7-18

Abstract

Achieving success in information system and technology (IS/IT) projects is a complex and multifaceted endeavour that has proven difficult. The literature is replete with project failures, but identifying the critical success factors contributing to favourable outcomes remains challenging. The triad of Time-Cost-Quality is widely accepted as key to achieving project success. While time and cost can be quantified and measured, quality is a more complex construct that requires different metrics and measurement approaches. Utilizing the PRISMA Methodology, this study initiated a comprehensive search across literature databases and identified 142 relevant articles pertaining to the specified keywords. A subset of ten articles was deemed suitable for further examination through rigorous screening and eligibility assessments. Notably, a primary finding indicates that despite recognizing usability as a critical element, there is a tendency to neglect usability enhancements due to time and resource constraints. Regarding the influence of usability on project success, the active involvement of end-users emerges as a pivotal factor. Moreover, fostering the enhancement of Human-Computer Interaction (HCI) knowledge within the development team is essential. Failure to provide good usability can lead to project failure, undermining user satisfaction and adoption of the technology.
Safeguarding data privacy: strategies to counteract internal and external hacking threats Jamal, Hassan; Ahmed Algeelani, Nasir; Al-Sammarraie, Najeeb
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p46-54

Abstract

In the digital age, the protection of data privacy has become increasingly important. Hackers, whether internal or external to an organization, could cause significant damage by stealing sensitive data, causing financial loss, compromising the privacy of individuals, or damaging the organization's reputation. This scientific research aimed to make substantial contributions by emphasizing the importance of addressing both internal and external hacking threats to protect sensitive information. The main theme of their work revolved around building a multi-layered defense system that included technological solutions like firewalls, encryption, and intrusion detection systems. The specific goals of their design and development approach were to establish clear policies and procedures for data handling, access control, and incident response, as well as to enhance data privacy strategies to stay ahead of evolving hacking techniques. The authors also highlighted the significance of employee awareness and training programs, collaboration with cybersecurity experts, and staying up-to-date with regulatory requirements to create a robust data privacy framework.
Predicting students' success level in an examination using advanced linear regression and extreme gradient boosting Wahyuningsih, Tri; Iriani, Ade; Dwi Purnomo, Hindriyanto; Sembiring, Irwan
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p29-37

Abstract

This research employs a hybrid approach, integrating advanced linear regression and extreme gradient boosting (XGBoost), to forecast student success rates in exams within the dynamic educational landscape. Utilizing Kaggle-sourced data, the study crafts a model amalgamating advanced linear regression and XGBoost, subsequently assessing its performance against the primary dataset. The findings showcase the model's efficacy, yielding an accuracy of 0.680 on the fifth test and underscoring its adeptness in predicting students' exam success. The discussion underscores XGBoost's prowess in managing data intricacies and non-linear features, complemented by advanced linear regression offering valuable coefficient interpretations for linear relationships. This research innovatively contributes by harmonizing two distinct methods to create a predictive model for students' exam success. The conclusion emphasizes the merits of an ensemble approach in refining prediction accuracy, recognizing, however, the study's limitations in terms of dataset constraints and external factors. In essence, this study enhances comprehension of predicting student success, offering educators insights to identify and support potentially struggling students. 
Fingerprint based smart door lock system using Arduino and smartphone application Sutikno, Tole; Faqih Ubaidillah, Moh Ainur; Arsadiando, Watra; Purnama, Hendril Satrian
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p91-98

Abstract

In 2023, crime cases in Indonesia reached 105,133. Cases of theft with aggravation dominate the majority of cases. Everyone is concerned about safety, but doors are typically opened and closed using physical keys. This is vulnerable to being tampered with with fake keys, which can lead to house break-ins and theft. In this research, we propose a fingerprint-based wireless door lock design using Arduino and a smartphone. We offer this solution as a preventive measure to reduce the high rate of theft in homes or other buildings. The devices used are Arduino UNO R3, fingerprint sensor, HC-05 Bluetooth module, buzzer, and door lock solenoid. The results of the fingerprint-based wireless door lock using Arduino and a smartphone can function well, with an average response time of 1.20 seconds. Furthermore, testing the HC-05 Bluetooth when sending signals to a smartphone shows that it can read data accurately with an average response time of 1.54 seconds.
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price Farida, Yuniar; Ainiyah, Lailatul
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p72-83

Abstract

Over time, cryptocurrencies like Bitcoin have attracted investor's and speculators' interest. Bitcoin's dramatic rise in value in recent years has caught the attention of many who see it as a promising investment asset. After all, Bitcoin investment is inseparable from Bitcoin price volatility that investors must mitigate. This research aims to use Lee's Fuzzy Time Series approach to forecast the price of Bitcoin. A time series analysis method called Lee's Fuzzy Time Series to get around ambiguity and uncertainty in time series data. Ching-Cheng Lee first introduced this approach in his research on time series prediction. This method is a development of several previous fuzzy time series (FTS) models, namely Song and Chissom and Cheng and Chen. According to most previous studies, Lee's model was stated to be able to convey more precise forecasting results than the classic model from the FTS. This study used first and second orders, where researchers obtained error values from the first order of 5.419% and the second order of 4.042%, which means that the forecasting results are excellent. But of both orders, only the first order can be used to predict the next period's Bitcoin price. In the second order, the resulting relations in the next period do not have groups in their fuzzy logical relationship group (FLRG), so they can not predict the price in the next period. This study contributes to considering investors and the general public as a factor in keeping, selling, or purchasing cryptocurrencies.

Page 1 of 2 | Total Record : 11