cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 154 Documents
Circularly polarized metamaterial Antenna in energy harvesting wearable communication systems Bala Inuwa; Olabode Idowu-Bismark; Oluseun Oyeleke; Jemitola Paul Olugbeji
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p106-118

Abstract

When battery powered sensors are spread out in places that are sometimes hard to reach, sustaining them become difficult. Therefore, to develop this technology on a large scale such as in the internet of things (IoT) scenario, it is necessary to figure out how to power them. The proffered solution in this work, is to get energy from the environment using energy harvesting Antennas. This work presents a wearable circular polarized efficient receiving and transmitting sensors for medical, IoT, and communication systems at the frequency range of WLAN, and GSM from 900 MHz up to 6 GHz. Using a cascaded system block of a circularly polarized Antenna, a rectifier and t-matching network, the design was successfully simulated. A DC charging voltage of 2.8V was achieved to power-up batteries of the wearable and IoT sensors. The major contribution of this work is the tri-band Antenna system which is able to harvest reflected Wi-Fi frequencies and also GSM frequencies combined in a miniaturized manner. This innovative configuration is a step forward in building devices with over 80% duty cycle. 
Virtual reality's effects on air crash accident investigation learning interaction Faisal Othman H Alburaidi; Karl Jenkins; Tom-Robin Teschner
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p160-168

Abstract

The objective of this study is to gain a deeper comprehension of the factors that play a role in the evolution of virtual reality (VR) for application in the investigation of aviation disasters. This study was motivated by the concept of utilising VR to create an illusion of the procedures involved in an anviation accident. A conceptual model has been presented, to create the scene that will be simple to understand the procedure of accident following an air crash. The idea is to compile a series of steps that an investigation team will go through and then present them in VR. This stage entails obtaining complete views of the object before it crashes and at ground level. This study contributes to the process of creating the groundwork for adopting VR in air crash investigations to provide instructional experiences. The idea that was presented in this research focuses on feature of the surrounding area of the crash or accident, wreckage distribution, wreckage above the ground, wreckage in motion, wreckage at the ground, spatial view effect, and full view projection as the primary VR features that are required for teaching and learning about air crash accident investigations using VR.
Caring jacket: health monitoring jacket integrated with the internet of things for COVID-19 patients Hari Maghfiroh; Daru Kusumastuti; Rebbeka Siswandina Sari; Muhammad Hammam Al-Choiri; Maulana Afif; Ricky Aston Susetyo; Muhammad Ahmad Baballe
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p127-134

Abstract

One of the policies that have been made by the World Health Organization (WHO) and the Indonesian government during this COVID-19 pandemic, is to use an oximeter for self-isolation patients. The oximeter is used to monitor the patient if happy hypoxia which is a silent killer, happens to the patient. To maintain body endurance, exercise is needed by COVID-19 patients, but doing too much exercise can also cause decreased immunity. That’s why fatigue level and exercise intensity need to be monitored. When exercising, social distancing protocol should be also reminded because can lower COVID-19 spreading up to 13.6%. To solve this issue, the Caring Jacket is proposed which is a health monitoring jacket integrated with an IoT system. This jacket is equipped with some sensors and the global positioning system (GPS) for tracking. The data from the test showed the temperature reading accuracy is up to 99.38%, the oxygen rate up to 97.31%, the beats per minute (BPM) sensor up to 97.82%, and the precision of all sensors is 97.00% compared with a calibrated device.
Net impact implementation application development life-cycle management in banking sector Noviana Pramitasari; Yova Ruldeviyani; Irvan Ramadhan Zarkasie
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p169-182

Abstract

Digital transformation in the banking sector creates a lot of demand for application development, either new development or application enhancement. Continuous demand for reimagining, revamping, and running applications reliably needs to be supported by collaboration tools. Several big banks in Indonesia use Atlassian products, including Jira, Confluence, Bamboo, Bitbucket, and Crowd, to support strategic company projects. We need to measure the net impact of application development life-cycle management (ADLM) as a collaboration tool. Using the deLone and McLean model, process questionnaire data from banks in Indonesia that use ADLM. Processing data using structural equation modeling (SEM), multiple variables are analyzed statistically to establish, estimate, and test the causation model. The conclusions highlight that system quality strongly affected only User Satisfaction (p=0.049 and β=0.39). Information quality strongly affected use (p=0.001 and β=0.84) and strongly affected user satisfaction (p=0.169 and β=0.28). Service quality strongly affected only use (p=0.127 and β=0.31). Conclusion research verifies the information system's achievement approach described by DeLone and McLean. Importantly, it was discovered that system usability and quality were key indicators of ADLM success. To fulfill their objective, ADLM must be developed in a way that is simple to use, adaptable, and functional.
Optimization of an inset-fed calculations for rectangular microstrip antenna Sulwan Dase; Irawati Razak
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p143-148

Abstract

This paper offers an alternative solution to produce a formula to calculate the inset-fed (y0) feed distance from the edge of the patch in order to obtain the impedance of a rectangular patch microstrip antenna as close to 50 Ohm as possible. The basic calculation refers to Ramesh's calculation formula to calculate the inset-fed (y0) on a rectangular patch microstrip antenna. From this research it is hoped that a number of correction factors will be obtained which will be multiplied by the Ramesh formula in order to obtain an inset-fed calculation which results in a lower return loss (S11) and voltage standing wave ratio (VSWR). From several calculation attempts, the approximate value for the correction factor is s=0.83477. This s correction factor is then multiplied by Ramesh's calculation formula. In this experiment, a microstrip antenna was simulated using an FR4 epoxy printed circuit board (PCB) with a relative permittivity, εr= 4.4, with a thickness of h=1.6 mm. The specified antenna nominal input impedance is 50 Ohms. The transmission line used is a microstrip line with a characteristic impedance of 50 Ohm. The test method used is to compare the results of simulation calculations using the Ramesh formula with the results of simulation calculations using the Ramesh formula multiplied by the correction factor. Tests are carried out using varying working frequencies. From the experimental results it can be seen that the average Return Loss (S11) and VSWR of the antenna are lower when using the Ramesh formula with a correction factor compared to the original Ramesh formula.
Privacy in computer ethics: Navigating the digital age Maxwell Zostant; Robin Chataut
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p183-190

Abstract

In this digital age, privacy has become a crucial issue due to the vast amount of personal information we share online. As a fundamental aspect of computer ethics, it concerns the appropriate use of information and communication technologies. This paper will discuss five key points related to privacy in computer ethics: the concept of privacy and its significance in the context of computer ethics; ethical considerations surrounding personal information in the digital space, including issues of consent, transparency, and data protection; the legal framework surrounding privacy in different jurisdictions, such as data protection laws and international standards; the role of technology in protecting privacy, including the use of encryption and other security measures; and finally, the challenges associated with protecting privacy in the digital age, such as the risk of data breaches, identity theft, and other forms of online exploitation. Through these five key points, this paper aims to provide a comprehensive understanding of privacy in computer ethics and emphasize the importance of promoting responsible and ethical use of technology.
An ensemble approach for the identification and classification of crime tweets in the English language Tooba Siddiqui; Saman Hina; Raheela Asif; Saad Ahmed; Munad Ahmed
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p149-159

Abstract

Twitter is a famous social media platform, which supports short posts limited to 280 characters. Users tweet about many topics like movie reviews, customer service, meals they just ate, and awareness posts. Tweets carrying information about some crime scenes are crime tweets. Crime tweets are crucial and informative and separate classification is required. Identification and classification of crime tweets is a challenging task and has been the researcher’s latest interest. The researchers used different approaches to identify and classify crime tweets. This research has used an ensemble approach for the identification and classification of crime tweets. Tweepy and Twint libraries were used to collect datasets from Twitter. Both libraries use contrasting methods for extracting tweets from Twitter. This research has applied many ensemble approaches for the identification and classification of crime tweets. Logistic regression (LR), support vector machine (SVM), k-nearest neighbor (KNN), decision tree (DT), and random forest (RF) Classifier assigned with the weights of 1,2,1,1 and 1 respectively ensemble together by a soft weighted Voting classifier along with term frequency – inverse document frequency (TF-IDF) vectorizer gives the best performance with an accuracy of 96.2% on the testing dataset.
National archival platform system design using the microservice-based service computing system engineering framework Taufik Iqbal Ramdhani; Ninon Nurul Faiza
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p95-105

Abstract

Archives play a vital function concerning the dynamics of people and nations as an instrument to treasure information in diverse domains of politics, society, economics, culture, science, and technology. The acceleration of digital transformation triggers the implementation of a smart government that supports better public services. The smart government encourages a national archival system to facilitate archive producers and users. The four electronic-based government system (SPBE) factors in the archival sector and open archival information system (OAIS) as a data preservation standard are the benchmarks in developing this study's national archival platform system. An improved service computing system engineering (SCSE) framework adapted to the microservice architecture is used to aid the design of the national archival platform system. The proposed design met the four-factor service design validation of coupling, cohesion, complexity, and reusability. Also, the prototype suggests what resources are needed to put the design into action by passing the performance test of availability measurement.
The observed preprocessing strategies for doing automatic text summarizing Muhammad Farhan Juna; Mardhiya Hayaty
Computer Science and Information Technologies Vol 4, No 2: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i2.p119-126

Abstract

It is challenging for humans to keep up with the rapid creation of digital information due to the explosion of digital information. A written document can be analyzed to extract meaningful information using automatic text summarization. This research proposes 16 different experimental settings in which the model developed by IndoBERT will be applied in order to answer the question of how much of an impact preprocessing has on the quality of summaries produced by automatic text summarization. In order to answer this question, the researchers have devised this study. In this study, we will explicitly talk about preprocessing strategies by conducting tests with different combinations of preprocessing techniques. These techniques include data cleansing, stopwords, stemming, and case folding. After that, the recall-oriented understudy for gisting evaluation (ROUGE) assessment will be used to conduct the measurement of the research results. According to the findings of this research, the optimal level of performance may be accomplished by combining the processes of data cleaning and case folding with scores of 0.78, 0.60, and 0.68 for ROUGE-1, ROUGE-2, and ROUGE-L respectively.
Constraint satisfaction algorithms: edition of timetables in the license-master-doctorate system Maurice Comlan; Corentin Allohoumbo
Computer Science and Information Technologies Vol 4, No 3: November 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v4i3.p217-225

Abstract

In this paper, we studied some algorithms for solving constraint satisfaction problem (CSP) and then applied them to solve the problem of generating schedules in a university setting. In other words, we studied the genetic algorithm, the simulated annealing, the hill climbing, a hybridization of the genetic algorithm and the simulated annealing as well as a hybridization of the genetic algorithm and the hill climbing. These algorithms have been tested on the problem of scheduling in a university environment. The hybrid uses hill climbing or simulated annealing to improve each individual in the starting population to a certain stopping point. These individuals are then sent to the genetic algorithm. Our results show that the hybridization of the genetic algorithm with a metaheuristic gives better execution time and performs better as the problem size increases compared to the classical genetic algorithm.

Page 8 of 16 | Total Record : 154