cover
Contact Name
Al-Khowarizmi
Contact Email
alkhowarizmi@umsu.ac.id
Phone
+6281376010441
Journal Mail Official
jcositte@umsu.ac.id
Editorial Address
Jalan Kapten Mukhtar Basri Medan, Sumatera Utara, Indonesia, 20238 Telp. (+6261) 6624567, Fax. (+6261) 6625474
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE)
ISSN : -     EISSN : 27213838     DOI : -
ournal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) is being published in the months of March and September. It is academic, online, open access (abstract), peer reviewed international journal. The aim of the journal is to: Disseminate original, scientific, theoretical or applied research in the field of Engineering and allied fields. Dispense a platform for publishing results and research with a strong empirical component. Aqueduct the significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Seek original and unpublished research papers based on theoretical or experimental works for the publication globally. Publish original, theoretical and practical advances in Computer Science & Engineering, Information Technology, Electrical and Electronics Engineering, Electronics, Communication and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences. Impart a platform for publishing results and research with a strong empirical component. Create a bridge for significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Solicit original and unpublished research papers, based on theoretical or experimental works. Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) covers all topics of all engineering branches. Some of them are Computer Science & Engineering, Information Technology, Electronics & Communication, Electrical and Electronics, Electronics and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences.
Articles 128 Documents
An Analysis of Performance Comparison of Circuit Breaker Protection Systems in Packing and Picking Operations at PT. Shippindo Teknologi Logistik Sianipar, Tigor Pangihutan; Wibowo, Pristisal; Tharo, Zuraidah
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.23676

Abstract

The protection system in circuit breakers plays a crucial role in maintaining operational stability and safety in the logistics industry, particularly in the packing and picking processes, which involve high-capacity electrical equipment. This study aims to analyze and compare the performance of circuit breaker protection systems in the packing and picking operations at PT. Shippindo Teknologi Logistik, focusing on efficiency, safety, and equipment maintenance. The research methodology includes direct testing of the circuit breakers used in operational processes in the field. The analysis evaluates the capability of circuit breakers to respond to various electrical load conditions during the operation of packing and picking machines. Performance parameters such as response time to electrical disturbances, resistance to overcurrent, and frequency of automatic tripping were measured to compare the different types of circuit breakers used. The results indicate significant differences in the protection performance among the types of circuit breakers, particularly in terms of response time and resistance to current surges. Circuit breakers equipped with the latest technology demonstrated superior performance in maintaining system stability and minimizing equipment downtime. More responsive protection systems were found to enhance operational efficiency while reducing the risk of equipment damage and operational disruptions. In conclusion, the selection of an appropriate circuit breaker protection system significantly impacts the sustainability of packing and picking operations in the logistics industry. This study recommends adopting advanced protection technology circuit breakers to optimize performance at PT. Shippindo Teknologi Logistik
Internet of Things and Artificial Neural Network Application for Optimizing Spirulina Cultivation with Palm Oil Mill Effluent Ula, Munirul; Fajriana, Fajriana; Ulfah, Julia
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.22389

Abstract

This study aims to optimize algae biomass production by utilizing Palm Oil Mill Effluent (POME) as a nutrient source, employing Internet of Things (IoT) technology and Artificial Neural Networks (ANN) for predictive modeling and system control. POME, an organic waste from the palm oil industry, was used as an organic liquid fertilizer to enhance the efficiency and sustainability of algae cultivation. The system was designed to monitor and control key environmental parameters such as pH, temperature, salinity, and dissolved oxygen in real-time during a one-month trial in July 2024. ANN-based models were used to predict and adjust environmental conditions, leading to significant improvements in algae growth and resource efficiency. The results indicate that POME can serve as an effective and eco-friendly nutrient source, contributing to both reduced industrial waste and sustainable biomass production. This integrated approach supports circular economy principles and sustainability goals, with potential applications in bioresource production and waste management. Future research will focus on large-scale system testing, optimization for various algae species, and long-term sustainability assessment.
Implementation of Content-Based Filtering Method for Data Recommendation Of Computational Thinking Students-Based Informatics Subject Fitri, Zahratul; Safriana, Safriana; Nurdin, Nurdin
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.22394

Abstract

Data recommendations are built by displaying the results of student subject recommendations based on students' computational thinking value. The process carried out is tokenization, stopword removal, stemming, and weighting. The extraction results were then compared using the cosine similarity approach. The greater the value of cosine similarity produced, the more similar the two data are, so that the material recommendations will be based on the smallest cosine similarity value between the extraction of student recommendation data. From the 535 data, several student data are included in 3 levels of material, namely recommendation 0 (low), recommendation 1 (medium), and recommendation 2 (high). Recommendation data was obtained from the results of students' computational thinking calculations by looking at decomposition value, pattern value, abstraction value, and algorithm value.
Optimization of K-Means Clustering with Elbow Method for Identification of TB Prone In Central Java RAFIKA HANJAYA PUTRI, LIEM, ANGELITA; Wakhidah, Nur
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.21669

Abstract

Tuberculosis (TB) is an infectious disease caused by the bacillus Mycobacterium tuberculosis. This infectious disease needs more attention because the transmission rate is still high, especially in areas with high case finding rates and low treatment success rates. This study was conducted to monitor areas prone to TB case transmission, especially areas in Central Java Province. The K-Means method was applied to determine areas prone to TB transmission by considering the success rate of TB treatment, through the Elbow approach to determine the optimal number of clusters. The results of clustering show areas that are classified as vulnerable areas, which are areas with high transmission cases but low treatment success. Visualization of clustering results in scatter plots that clarify the division of areas into clusters and help in identifying treatments and areas that need further intervention.
The Analysis of Performance Reliability Electric Power System in 20 Kv Distribution Network in PT. PLN Mendrofa, Silviharyani; Dalimunthe, Muhammad Erpandi; Rahmaniar, Rahmaniar
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.23677

Abstract

The reliability of the electric power distribution system plays a crucial role in ensuring a stable and continuous power supply to consumers. This study analyzes the performance reliability of the 20 kV distribution network at PT. PLN (Persero) UP3 North Medan by evaluating key reliability indices, including SAIDI (System Average Interruption Duration Index), SAIFI (System Average Interruption Frequency Index), and CAIDI (Customer Average Interruption Duration Index). The research methodology involves data collection from historical outage records, fault analysis, and statistical evaluation of reliability indices. The findings indicate that the reliability performance of the 20 kV distribution network in UP3 North Medan is influenced by various factors, such as equipment failures, weather conditions, and external disturbances. Based on the analysis, strategies for improving reliability are proposed, including preventive maintenance, network automation, and enhanced fault detection systems. By implementing these measures, PLN can improve service quality and reduce power outages, ultimately enhancing customer satisfaction and system efficiency.
Clustering of Data Monitoring Water Quality Using Mean-Shift Clustering Method Aidilof, Hafizh Al Kautsar; Rosnita, Lidya; Kurniawati, Kurniawati; Ikhwani, Muhammad
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.22390

Abstract

This study aims to cluster water quality data from Nile tilapia ponds using the Mean Shift Clustering method. The parameters used to analyze water quality include temperature, pH, turbidity, and salinity, which are crucial factors for the growth and health of Nile tilapia. The data used in this research consist of water quality measurements from several Nile tilapia ponds. The clustering process seeks to identify groups of data with similar water quality characteristics, providing insights into optimal environmental conditions for tilapia farming. The clustering results reveal several distinct groups of water quality based on variations in temperature, pH, turbidity, and salinity. Results of the experiment show that a bandwidth value of 400 successfully identifies a relatively simple number of clusters, specifically four clusters. The Mean Shift Clustering method proves effective in grouping data without requiring assumptions about data distribution and can detect clusters with arbitrary shapes. Consequently, the findings of this study can be used to provide recommendations for improving water quality to enhance tilapia pond productivity.
Advanced Encryption Standard (AES) Cryptography Application Design Allwine, Allwine; Atim, Sandi Badiwibowo; Afdhaluddin, Muhammad
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.22746

Abstract

As technology advances, the need for secure data transmission and storage increases. Encryption and decryption are essential processes to ensure data confidentiality and integrity. Encryption transforms original data into unreadable form during transmission, while decryption restores it to its original state for the recipient. This guarantees that unauthorized parties cannot access the data. Cryptosystems have evolved over time, and with the rapid growth of communication technologies, stronger standards are needed. AES (Advanced Encryption Standard), based on the Rijndael algorithm, has become the current standard for encryption. AES can encrypt and decrypt 128-bit data blocks with key lengths of 128, 192, or 256 bits, addressing the limitations of older algorithms and providing enhanced data security to protect confidentiality in modern cryptosystems.
Clustering Women Violence Cases Based on Number in Central Java Province Using K-Means Algorithm Tantisnio, Fanika Putri; Wakhidah, Nur
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.21671

Abstract

Cases of violence against women are one of the cases that require special attention, especially in the Central Java Province area. This study aims to classify the number of cases of violence against women (age 18+) based on data from 2022 and 2023 using the K-Means algorithm. Through the K-Means método, the regions are classified into 2 clusters based on the pattern of the number of cases in the 2 years. The results of clustering show two main groups: the first cluster which is from the majority of regions with a fairly low number of violent cases, and the second cluster which includes Semarang City as a very high number of violent cases. This study provides an overview of cases of violence against women in Central Java Province and identifies areas with higher case rates. This research is expected to be used as a basis for more appropriate policy-making to reduce the rate of violence against women in the most affected areas.
The Voltage Analysis of the Transmission Network in the Aceh Subsystem During the Energization of the 275 KV Nagan–Sigli Sutet using Digsilent Pakpahan, Rosmeri Br; Anisah, Siti; Faisal, Ahmad
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.23678

Abstract

Voltage In Accordance With A Steady State. In 2023, The Aceh Subsystem Received An Additional 440 Mw Of Power Plants And In 2025 Will Be Energized Sutet Nagan - Sigli 275 Kv #1 Then With The Addition Of This Network There Will Be Changes In The Transmission Network. Based On The Problems Above, The Author Will Analyze The Impact That Occurs When The Conductor Enters. In This Final Project, A Simulation Is Carried Out With The Entry Of The Conductor And The Voltage Response In The Aceh Subsystem Using The Digsilent Power Factory 15.1 Application. So That The Location That Experiences High Voltage At The Main Substation Is Obtained, Both At Gi 150 Kv Or Gitet 275 Kv. The Simulation Results Show That When Energizing The Conductor Sutet Nagan - Sigli 275 Kv #1 Will Have An Impact On Overvoltage Voltage In Almost All Main Substations. In Overcoming This, It Is Highly Recommended To Install A Reactor At Gitet Sigli As A Node Substation To Improve The Voltage To Be Stable According To Pln Recommendations.
A Brief Overview of Several Challenges in Finger Vascular Pattern Recognition Normakristagaluh, Pesigrihastamadya
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 6, No 1 (2025)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v6i1.22391

Abstract

Finger vascular pattern recognition biometrics are gaining popularity because they are hard to duplicate and more convenient. However, the challenges addressed during this research are not well-known to the public. Therefore, this paper presents an overview of challenges in finger vein pattern recognition. The challenges described arise from three possible things, namely imaging devices, finger physiology, and the surrounding environment. An illustrative experiment for one of the challenges has been carried out by producing that overexposure illumination during the image acquisition process can cause loss of vein pattern images. In addition, the experiment results on one of the finger images with different skin colors (light and dark) are shown in the histogram of the two images, where there is a slight difference in the graph pattern. From this paper, it is expected that the results of the illustrative experiments, as well as the general issues presented in this study, will inspire further research. Some of the work in this paper is part of the Ph.D thesis of Pesigrihastamadya Normakristagaluh.

Page 11 of 13 | Total Record : 128