cover
Contact Name
Al-Khowarizmi
Contact Email
alkhowarizmi@umsu.ac.id
Phone
+6281376010441
Journal Mail Official
jcositte@umsu.ac.id
Editorial Address
Jalan Kapten Mukhtar Basri Medan, Sumatera Utara, Indonesia, 20238 Telp. (+6261) 6624567, Fax. (+6261) 6625474
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE)
ISSN : -     EISSN : 27213838     DOI : -
ournal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) is being published in the months of March and September. It is academic, online, open access (abstract), peer reviewed international journal. The aim of the journal is to: Disseminate original, scientific, theoretical or applied research in the field of Engineering and allied fields. Dispense a platform for publishing results and research with a strong empirical component. Aqueduct the significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Seek original and unpublished research papers based on theoretical or experimental works for the publication globally. Publish original, theoretical and practical advances in Computer Science & Engineering, Information Technology, Electrical and Electronics Engineering, Electronics, Communication and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences. Impart a platform for publishing results and research with a strong empirical component. Create a bridge for significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Solicit original and unpublished research papers, based on theoretical or experimental works. Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) covers all topics of all engineering branches. Some of them are Computer Science & Engineering, Information Technology, Electronics & Communication, Electrical and Electronics, Electronics and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences.
Articles 128 Documents
Long Range RFID Based Automatic Doorstops in Housing Habibi Ramdani Safitri; Muhammad Habib Maulana
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 1 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i1.14199

Abstract

Currently Internet of Things (IoT)-based technology is one of the new trends in the world which will most likely become a trend in the future. Simply put, IoT connects devices continuously connected to the Internet and can be controlled remotely through a user's device. The Internet of Things (IoT) is a structure where objects and people are given exclusive identities and the ability to relocate data over a network without requiring two-way touch between humans for example source to destination or human-to-computer interaction.
Implementation of the Selection Sort Algorithm to Sort Data in PHP Programming Language Indah Purnama Sari; Al-Khowarizmi Al-Khowarizmi; Fanny Ramadhani; Oris Krianto Sulaiman
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 1 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i1.14362

Abstract

The role of algorithms in software or programming is very important, so it is necessary to understand the basic concept of the algorithm. The sorting algorithm is, selection sort (sorting by selecting) is the process of sorting data according to certain rules so that they are ordered regularly. Sorting data consisting of some criteria have priority where the data is sorted by language PHP programming that provides the sort function to sort array datain ascending or descending order from smallest to largest. The sort function is sort data from smallest to largest digit or last letter of letters first each word prioritizes letters then numbers if the data is in that table data consists of a mixture of numbers and letters. The method used is searching the smallest element of the array and swaps it with the element in the first position, then this algorithm repeats the same thing again, namely looking for elements in second position, The process that will result from this system continues until all array elements successfully sorted.
Analysis of Pneumatic Systems Using the Laplace Equation Based on Python Programing Adhe Lingga Dewi; Rizwan Arisandi
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.16266

Abstract

Analysis for Pneumatic Systems using the Python programming language on Google Colab has been carried out. The steps taken before the simulation are to design a pneumatic system and then determine the Laplace equation based on Bernoulli's law equation. The Python programming language on Google Colab was chosen because it allows users to type Python code in a web browser and can be used for free. The simulation is carried out by varying the value of capacitance (C) from 50 kPa - 300 kPa with an increase of 50 kPa. This aims to determine the effect of changes in capacitance variations on the pressure exerted on the pneumatic system. Based on the simulation results, the greater the capacitance variation given, the resulting graph will be more sloping or closer to the x-axis. The C = 50 kPa variation has a steeper graph, while the C = 300 kPa variation has a more sloping graph and is closer to the x-axis.
Implementation of Data Classification Using K-Means Algorithm in Clustering Stunting Cases Indah Purnama Sari; Al-Khowarizmi Al-Khowarizmi; Oris Krianto Sulaiman; Dicky Apdilah
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15765

Abstract

Stunting is still a serious public health problem in Indonesia, where the prevalence of this condition is 37.2%, up from 35.6% in 2019 and 36.8% in 2020. The length or height of a child who is short (dwarf) is below average for his age. Stunting has a negative impact on IQ deficiencies, infectious diseases, mental health problems, and child development. Toddlers with stunting cases are detected when their growth and development does not match their age, but currently there is no data grouping based on these criteria that is of concern to parents and posyandu cadres. Data can be grouped using the K-Means data mining technique. The K-Means algorithm is often used by researchers as a grouping procedure to ascertain whether children are stunted or not. 395 datasets are used in this research data. The Knowledge Discovery In Databases (KDD) approach, a comprehensive nontrivial procedure for detecting and recognizing patterns in data, underlies this research. Based on the variables of age, weight and height, this study aims to identify groups or clusters of stunting status in children under five. The best number of clusters with K = 2 was determined by the findings of this investigation. There are 392 children in cluster 0-Shanum, Rizka, Nurjanah, and others-and three toddlers in cluster 1-Ezra, M. Abidza, and Abd Mahmud. With a total of 287 stunted toddlers and 108 toddlers with normal development, the most ideal DBI value is 0.007 which is close to 0, this shows that the clusters under review provide quality clusters.
Implementation of the UCD (User Centered Design) Method for monitoring the Implementation of Personnel Tasks at DITSAMAPTA Website Based Police of North Sumatra Eka Rahayu; Arie Rafika Dewi
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.16268

Abstract

DITSAMAPTA Polda Utara Sumatera is one of the Working Units of the North Sumatra Regional Police, based on Police Regulation Number 14 of 2018 DITSAMAPTA has a main role and task in terms of fostering and carrying out general police duties (regulation, guarding, escorting, patrolling, handling Tipiring, handling TPTK, security and rescue assistance), crowd control and demonstrations, animal assistance in carrying out tracking, deterrence, providing tactical assistance in carrying out investigative and investigative duties. From these various tasks, DITSAMAPTA has problems in collecting data and placing personnel to carry out their main daily tasks, so that things often occur such as multiple assignments to one personnel, several main tasks are not fulfilled due to errors in reporting the number of personnel in real terms, and other tasks related to the assignment or placement of personnel, this is because DITSAMAPTA in its personnel data collection is still manual, resulting in inaccurate information and confusion in deciding the policies of leaders in the field. Given these problems, a study was conducted to monitor the activities of DITSAMAPTA personnel which aims to provide convenience in finding information on any personnel on duty, standby, not entering the office such as: sick, permits, leave and so on. Monitoring of personnel activities is carried out using a website-based application. The website is a platform to make it easier to find information and facilitate communication. The application applies the UCD (User Centered Design) method where the system can provide more accurate and precise according to user needs.
Hyperparameter Model Architecture Xception in Classifying Zophobas Morio and Tenebrio Molitor Amri Ismail Tumanggor; Muhathir Muhathir
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15800

Abstract

Zophobas Morio and Tenebrio Molitor are popular larvae as feed ingredients that are widely used by animal lovers to feed reptiles, birds, and other poultry. However, these two larvae are similar in appearance; their nutritional content is very different. Zophobas Morio is more nutritious and has a higher economic value compared to Tenebrio Molitor. Due to limited knowledge, many animal lovers have difficulty distinguishing between the two. This study aims to build the best configuration of the Xception architecture hyperparameter model that can distinguish between the two. The model is trained using images taken from mobile phones. Training is carried out using the parameters Epoch 15, Batch Size 32, Optimizer Adam, RMSprop, and SGD. The experimental results on the dataset show that the best accuracy for the Xception architecture hyperparameter model is Optimizer Adam with an accuracy rate of 100%, and Optimizer SGD with an accuracy rate of 100%. And of course, it gives very good results
COFDM System: An Overview Mhnd Farhan
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.16396

Abstract

This article compares the performance of two modulation techniques—quadrature phase shift keying (QPSK) and M-ary quadrature amplitude modulation (M-QAM) with M=8, 16, 32, and 64—in a coded orthogonal frequency division multiplexing system. As an error-correcting code, convolutional technology is employed. A vehicular channel with additive white gaussian noise (AWGN) is utilized for communication. According to simulation data, for QPSK and M-QAM, a coded orthogonal frequency division multiplexing system performs better than an uncoded one. Additionally, the system performs better with QPSK than it does with M-QAM. Additionally, when M rises, the performance declines.
Utilization of Digital Image and Convolution Neural Network Algorithm in Customer Satisfaction Survey with Facial Expressions Tri Andre Anu; Rika Rosnelly; Dedi Irawan; Progresif Bulolo; Ubaidullah Hasibuan
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15915

Abstract

The human face provides us with a lot of information about a person, and arguably the two most important pieces of information in a face are a person's identity and their emotional state. Judgments of identity and emotion facilitate social interactions. Services are a crucial part of the activities of all organizations, especially those in the service sector. Good services support customer satisfaction and ultimately impact the progress of the organization. The Convolutional Neural Network algorithm has become the most widely used neural architecture in various tasks, including image classification, audio pattern recognition, machine translation of text, and speech recognition. The data groups (angry, fearful, happy, neutral, sad, and surprised) tested with a threshold value of 30 epochs achieved a loss (error) accuracy of 1.5146 on the test data. The accuracy on the test data is 0.61. The proposed Convolutional Neural Network algorithm and digital image utilization achieved high accuracy performance to assist in evaluating a service-related field.
Predicting The Quality of Red Wine and White Wine Using Data Mining Ni Wayan Priscila Yuni Praditya; Noor Akhmad Setiawan; Fery Antony
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15095

Abstract

In business intelligence or artificial intelligence, data mining is a technique that can classify and cluster data based on the nature and correlation of the data set used. in data mining, several methods can be used, such as C45, K-Means, Apriori Decision Tree, KNN, LSTM, Naive Bayesian, etc. This research utilizes the Decision Tree method which aims to classify the quality of red wine and white wine. The results of this study indicate that the prediction of red wine has a precision of 61.1%, recall of 60.7%, f-measure of 60.3%, and an average accuracy of 60.7% while white wine has a precision of 58.2%, recall of 58.7%, f-measure 58.4%, and 58.7% accuracy. The method used in this study also shows that Decision Tree can outperform other methods such as Lib-SVM, BayesNet, and Multi Perceptron.
Data Analysis Automatic Fare Collection Light Rail Transit Jakarta using the Cluster Method Mario Hagi; Heri Suroyo; Alek Wijaya; Ahmad Syazili
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.16413

Abstract

The use of public transportation such as LRT (Light Rail Transit) can reduce the level of congestion in an area and DKI Jakarta is a province with a high level of congestion. The purpose of this study was to determine the general preferences of passengers and to classify stations based on the number of passengers entering-station-exit pairs of the Jakarta LRT by utilizing the cluster analysis method. The data analyzed using the Tableau Desktop application was obtained from the AFC (Automatic Fare Collection) LRT Jakarta. The data contains seven fields, namely PAYMENT METHOD, DATE, TIME OUT, RANGE 60', RANGE 15', STATION OUT, STATION IN for 15 days from 1 January 2023 to 15 January 2023. The results of the study are in the form of data visualization, descriptive statistics, clustering results, and dashboard. Based on the results of the analysis, three clusters were formed with cluster 3 being filled by VEL-BVU and BVU-VEL by controlling 14038 passengers or 40.8% of the total passengers, cluster 2 being filled by VEL-DPD, VEL-BVS, DPD-VEL, and BVS -VEL controlling 10,053 passengers or 29.2% of the total passengers, and the remaining 27 items are in cluster 1 controlling 10,317 passengers or 30.0% of the total passengers.

Page 6 of 13 | Total Record : 128