cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 11 Documents
Search results for , issue "Vol 5, No 2: July 2024" : 11 Documents clear
Smart irrigation system using node microcontroller unit ESP8266 and Ubidots cloud platform Sutikno, Tole; Nur Wahyudi, Ahmad; Wahono, Tri; Arsadiando, Watra; Purnama, Hendril Satrian
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p168-175

Abstract

The agricultural irrigation system is extremely important. For optimal harvest yields, farmers must manage rice plant quality by monitoring water, soil, and temperature on agricultural fields. If market demand rises, traditional rice field irrigation in Indonesia will make things harder for farmers. This modern era requires a system that lets farmers monitor and regulate agricultural fields anywhere, anytime. We need a solution that can control the irrigation system remotely using an internet of things (IoT) device and a smartphone. This study employed the Ubidots IoT cloud platform. In addition, the study uses soil moisture and temperature sensors to monitor conditions in agricultural regions, while pumps function as irrigation systems. The test results indicate the proper design of the system. Each trial collected data. The pump will turn on and off automatically based on soil moisture criteria, with the pump active while the soil moisture is less than 20% and deactivated when the soil moisture exceeds 20%. In simulation mode, the pump operates for an average of 0–5 seconds of watering. The monitoring system shows the current soil temperature and moisture levels. Temperature sensors respond in 1-3 seconds, whereas soil moisture sensors respond in 0–4 seconds.
Transfer learning: classifying balanced and imbalanced fungus images using inceptionV3 Supriyadi, Muhamad Rodhi; Alfin, Muhammad Reza; Karisma, Aulia Haritsuddin; Maulana, Bayu Rizky; Pinem, Josua Geovani
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p112-121

Abstract

Identifying the genus of fungi is known to facilitate the discovery of new medicinal compounds. Currently, the isolation and identification process is predominantly conducted in the laboratory using molecular samples. However, mastering this process requires specific skills, making it a challenging task. Apart from that, the rapid and highly accurate identification of fungus microbes remains a persistent challenge. Here, we employ a deep learning technique to classify fungus images for both balanced and imbalanced datasets. This research used transfer learning to classify fungus from the genera Aspergillus, Cladosporium, and Fusarium using InceptionV3 model. Two experiments were run using the balanced dataset and the imbalanced dataset, respectively. Thorough experiments were conducted and model effectiveness was evaluated with standard metrics such as accuracy, precision, recall, and F1 score. Using the trendline of deviation knew the optimum result of the epoch in each experimental model. The evaluation results show that both experiments have good accuracy, precision, recall, and F1 score. A range of epochs in the accuracy and loss trendline curve can be found through the experiment with the balanced, even though the imbalanced dataset experiment could not. However, the validation results are still quite accurate even close to the balanced dataset accuracy.
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means Nuzulastri, Sari; Stiawan, Deris; Satria, Hadipurnawan; Budiarto, Rahmat
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p176-185

Abstract

Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.
Improving support vector machine and backpropagation performance for diabetes mellitus classification Prastyo, Angga; Sutikno, Sutikno; Khadijah, Khadijah
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p140-149

Abstract

Diabetes mellitus (DM) is a glucose disorder disease in the human body that contributes significantly to the high mortality rate. Various studies on early detection and classification have been conducted as a DM prevention effort by applying a machine learning model. The problems that may occur are weak model performance and misclassification caused by imbalanced data. The existence of dominating (majority) data causes poor model performance in identifying minority data. This paper proposed handling the problem of imbalanced data by performing the synthetic minority oversampling technique (SMOTE) and observing its effect on the classification performance of the support vector machine (SVM) and Backpropagation artificial neural network (ANN) methods. The experiment showed that the SVM method and imbalanced data achieved 94.31% accuracy, and the Backpropagation ANN achieved 91.56% accuracy. At the same time, the SVM method and balanced data produced an accuracy of 98.85%, while the Backpropagation ANN method and balanced data produced an accuracy of 94.90%. The results show that oversampling techniques can improve the performance of the classification model for each data class.
The best machine learning model for fraud detection on e-platforms: a systematic literature review Yussiff, Alimatu-Saadia; Frank Prikutse, Lemdi; Asuah, Georgina; Yussiff, Abdul-Lateef; Dortey Tetteh, Emmanuel; Ibrahim, Norshahila; Wan Ahmad, Wan Fatimah
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p195-204

Abstract

The internet has been instrumental in the development and facilitation of online payment systems. However, its associated fraudulent activities on eplatforms cannot be overlooked. As a result, there has been a growing interest in the application of machine learning (ML) algorithms for fraud detection on financial e-platforms. The goal of this research is to identify common types of fraud on financial e-platform, highlight different machine learning algorithms employed in fraud detection, and derive the best machine learning algorithms for fraud detection on e-platforms. To achieve this goal, the research followed a nine steps systematic review approach to retrieve Journals and conference publications from science direct, Google Scholar and IEEE Xplore between 2018 and 2023. Out of 2,071 articles identified and screened, 44 publications (23 articles and 21 conference proceedings) satisfied the inclusion criteria for further analysis. The random forest algorithm turned out to be the best ML algorithm because it ranked first in the frequency of usage analysis and ranked first in the performance analysis with an average accuracy of 96.67%. Overall, this review has identified the kinds of fraud on financial e-platforms, and proclaimed the best and least ML algorithm for fraud detection on financial e-platform. This can help guide future research and inform the development of more effective fraud detection systems.
Video shot boundary detection based on frames objects comparison and scale-invariant feature transform technique Ibrahim, Noor Khalid; Abduljabbar, Zinah Sadeq
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p130-139

Abstract

The most popular source of data on the Internet is video which has a lot of information. Automating the administration, indexing, and retrieval of movies is the goal of video structure analysis, which uses content-based video indexing and retrieval. Video analysis requires the ability to recognize shot changes since video shot boundary recognition is a preliminary stage in the indexing, browsing, and retrieval of video material. A method for shot boundary detection (SBD) is suggested in this situation. This work proposes a shot boundary detection system with three stages. In the first stage, multiple images are read in temporal sequence and transformed into grayscale images. Based on correlation value comparison, the number of redundant frames in the same shots is decreased, from this point on, the amount of time and computational complexity is reduced. Then, in the second stage, a candidate transition is identified by comparing the objects of successive frames and analyzing the differences between the objects using the standard deviation metric. In the last stage, the cut transition is decided upon by matching key points using a scale-invariant feature transform (SIFT). The proposed system achieved an accuracy of 0.97 according to the F-score while minimizing time consumption.
Implementation of automation configuration of enterprise networks as software defined network Prasetyo, Lindo; Prihandi, Ifan; Rifqi, Muhammad; Budiarto, Rahmat
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p99-111

Abstract

Software defined network (SDN) is a new computer network configuration concept in which the data plane and control plane are separated. In Cisco system, the SDN concept is implemented in Cisco Application Centric Infrastructure (Cisco ACI), which by default can be configured through the main controller, namely the Application Policy Infrastructure Controller (APIC). Conventional configuration on Cisco ACI creates problems, i.e.: the large number of required configurations causes the increase of time required for configuration and the risk of misconfiguration due to repetitive works. This problem reduces the productivity of network engineers in managing Cisco system. In overcoming these problems, this research work proposes an automation tool for Cisco ACI configuration using Ansible and Python as an SDN implementation for optimizing enterprise network configuration. The SDN is implemented and experimented at PT. NTT Indonesia Technology network, as a case study. The experimental result shows the proposed SDN successfully performs multiple routers configurations accurately and automatically. Observations on manual configuration takes 50 minutes and automatic configuration takes 6 minutes, thus, the proposed SDN achieves 833.33% improvement.
Acoustic echo cancellation system based on Laguerre method and neural network Nguyen, Duy-Thao; Nguyen, Thanh-Nghia
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p186-194

Abstract

Acoustic echo cancellation (AEC) is a fundamental requirement of signal processing to increase the quality of teleconferences. In this paper, a system that combines the Laguerre method with neural networks is proposed for AEC. In particular, the signal is processed using the Laguerre method to effectively handle nonlinear transmission line system. The results after applying the Laguerre method are then fed into a neural network for training and acoustic echo cancellation. The proposed system is tested on both linear and nonlinear transmission lines. Simulation results show that combining the Laguerre method with neural networks is highly effective for AEC in both linear and nonlinear transmission lines system. The AEC results obtained by the proposed method achieves a significant improvement in nonlinear transmission lines and it is the basis for building a practical echo cancellation system.
Clustering of uninhabitable houses using the optimized apriori algorithm Al-Khowarizmi, Al-Khowarizmi; Nasution, Marah Doly; Sary, Yoshida; Bela, Bela
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p150-159

Abstract

Clustering is one of the roles in data mining which is very popularly used for data problems in solving everyday problems. Various algorithms and methods can support clustering such as Apriori. The Apriori algorithm is an algorithm that applies unsupervised learning in completing association and clustering tasks so that the Apriori algorithm is able to complete clustering analysis in Uninhabitable Houses and gain new knowledge about associations. Where the results show that the combination of 2 itemsets with a tendency value for Gas Stove fuel of 3 kg and the installed power meter for the attribute item criteria results in a minimum support value of 77% and a minimum confidence value of 87%. This proves that a priori is capable of clustering Uninhabitable Houses to help government work programs.
Development of learning videos for natural science subjects in junior high schools Siswosuharjo, Partono; Al-Bahra, Al-Bahra; Sunarya, Po Abas
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p160-167

Abstract

The purpose of this study was to determine the development procedure and the feasibility of learning media for whiteboard animation in Natural Sciences subjects at SMP Padindi, Tangerang Regency. This study uses a research and development (RD) approach. The development model in this study is the analysis design development implementation evaluation (ADDIE) model. The feasibility test is carried out by means of individual testing (one to one) on 3 experts, namely material experts, learning experts, and media experts, as well as 3 students. In addition, a small group test was also carried out on 9 students. The results showed that: i) the material expert test was 87.5%, the learning expert was 85%, the media expert was 84.44%, 3 students were 88.84%, and the small group was 90%; and ii) this whiteboard animation learning media is suitable for use based on the results of media trials by experts and students.

Page 1 of 2 | Total Record : 11