cover
Contact Name
Al-Khowarizmi
Contact Email
alkhowarizmi@umsu.ac.id
Phone
+6281376010441
Journal Mail Official
jcositte@umsu.ac.id
Editorial Address
Jalan Kapten Mukhtar Basri Medan, Sumatera Utara, Indonesia, 20238 Telp. (+6261) 6624567, Fax. (+6261) 6625474
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE)
ISSN : -     EISSN : 27213838     DOI : -
ournal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) is being published in the months of March and September. It is academic, online, open access (abstract), peer reviewed international journal. The aim of the journal is to: Disseminate original, scientific, theoretical or applied research in the field of Engineering and allied fields. Dispense a platform for publishing results and research with a strong empirical component. Aqueduct the significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Seek original and unpublished research papers based on theoretical or experimental works for the publication globally. Publish original, theoretical and practical advances in Computer Science & Engineering, Information Technology, Electrical and Electronics Engineering, Electronics, Communication and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences. Impart a platform for publishing results and research with a strong empirical component. Create a bridge for significant gap between research and practice by promoting the publication of original, novel, industry-relevant research. Solicit original and unpublished research papers, based on theoretical or experimental works. Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) covers all topics of all engineering branches. Some of them are Computer Science & Engineering, Information Technology, Electronics & Communication, Electrical and Electronics, Electronics and Telecommunication, Education Science and all interdisciplinary streams of Social Sciences.
Articles 128 Documents
Development Powtoon Animation Video in Indonesian Language Learning to Improve Student Learning Outcomes Elementary Schools Renni Ramadhani Lubis; Siti Irene Astuti Dwiningrum; Enny Zubaidah
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15990

Abstract

This study aims to develop powtoon based animated video media. This research is research and development (Research and Development). The models are defining stage, design stage, develop stage, and disseminate stage. But in this study only up to the develop stage. The research was conducted at SD Negeri 050660 Kwala Bingai. The research subjects were 25 students of class V, consisting of 13 male students and 12 female students. The object in this study is a powtoon based animated video. Data collection techniques are observation, questionnaires, and tests. Based on the feasibility results by linguists with a percentage of 89.55% it is categorized as feasible, media experts with a percentage of 90.25% are categorized as very feasible, and material experts with a percentage of 93.80% are categorized as very feasible. Based on the trials that have been carried out, it is known that the results of the pretest trial with a percentage of 36% with students who did not complete as many as 22 people. Meanwhile, the results of the posttest trial with a percentage of 88% with 24 students who completed. From the results of the feasibility and effectiveness of powtoon based animated videos in Indonesian language learning for fifth grade students at SD Negeri 050660 Kwala Bingai it is said that it is feasible and effective to use.
Web-Based Offline Game Suit Design: A Model Overview Indah Purnama Sari; Al-Khowarizmi Al-Khowarizmi; Aulia Jannah; Adila Mawaddah Meuraxa; M. Iqbal Tanjung
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15334

Abstract

The rapid development of information and communication technology has made it easier for people to complete work. To keep up with the times in the game world, information technology students learn about the HTML (Hyper Text Mark Up Language), CSS (Cascading Style Sheet), and PHP (Hypertext Preprocessor) programming languages to create website-based games. Using qualitative research methods, IT students create website-based games with the HTML, CSS, and PHP programming languages that can be accessed via the XAMPP localhost. Students can play this Game Suit game with a computer offline. So that with this website-based game it will make it easier for people to access it and do not require storage such as downloading game applications.
Utilization of the Multi Attribute Utility Theory (MAUT) Method in Determining Wedding Halls in Medan City Kadrayani Kadrayani; Hasdiana Hasdiana; Dedy Irwan; Eka Rahayu; Yulia Agustina Dalimunthe
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.16019

Abstract

The building is an important part of the wedding ceremony. Especially if the event owner does not have sufficient land. So far, it's been difficult for the community to decide which wedding hall they want. Both in terms of location, building design, rental prices etc. The purpose of this research is to apply the Multi Attribute Utility Theory (MAUT) method to recommend building rental services. The criteria used to select a building are location, price, facilities, parking space capacity, and number of guests. The alternatives used are Adi Mulia Hotel Medan, Caffe Bel Mondo Medan, Andaliman Hall, Aceh Sepakat, Al-amjad Convention Hall, Wisma Mahina Center, Mutiara Suara Nafiti Convention Hall, Namaken Hall, Al-Maruf Multipurpose Building, and the Dharma Wanita Petisah Building. The results of applying the MAUT method show that the Al-Amjad Convention Hall is most recommended as the building that best fits the given criteria.
A Hybrid RBF Neural Network and FCM Clustering for Diabetes Prediction Dataset Muhammad Khalil Gibran; Amir Saleh
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 4, No 2 (2023)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v4i2.15573

Abstract

This study aims to predict diabetes by combining the Radial Basis Function Neural Network (RBFNN) and Fuzzy C-Means (FCM) clustering methods. Diabetes prediction is an important part of research in an effort to prevent, manage, and reduce this type of disease. The FCM clustering method is used to group diabetes data into groups that have similar characteristics and obtain the final centroid. Then, the RBFNN method is used to build a predictive model using the center of each group as a reference point in the RBF function based on the centroid generated from the FCM clustering method. This step allows for modeling the non-linear relationship between health attributes and diabetes risk in more detail. In this study, the dataset obtained used input parameters regarding health data and risk factors for the disease. The goal of combining these methods is to develop a predictive model that can help identify individuals at high risk of developing diabetes. This hybrid approach has the potential to improve the effectiveness and accuracy of diabetes prediction. From the tests carried out, the proposed method obtained an accuracy of 92%, a precision of 90%, a recall of 92%, and an F1-score of 91%. By combining the clustering power of FCM clustering with RBF's ability to model non-linear relationships, this hybrid approach can make a good contribution to diabetes prediction and assist in efforts to prevent and control this disease.
Message Security Application Using Mobile-Based AES Algorithm Rifki, Mhd Ikhsan; Syamia, Nanda
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 2 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i2.20834

Abstract

All information in data exchange transactions on communication networks travels through the network infrastructure. The network infrastructure sends various types of data, including text, images, and documents with various extensions. These documents may be private and confidential. Therefore, it is crucial to have a message security option that is not only user-friendly but also has a high level of security system complexity. The purpose of this research is to build a text message security system using the Advanced Encryption Standard (AES) algorithm on mobile devices. We can utilize it as a security solution to safeguard text messages received through mobile devices. The AES security algorithm is known to have reliability in processing data encryption and decryption. The research will describe components such as the design, implementation, and analysis of application requirements. Important features include encryption, decryption, and key management in addition to an easy-to-use UI. The research findings show that this program successfully secures text messages while maintaining the confidentiality and integrity of the data sent. Additionally, we adjusted the application's parameters to align with mobile device standards, ensuring consistent encryption and decryption procedures that users can easily operate. For application testing, we use the black box testing method to ensure that the design and application function as intended, adhere to security regulations, and provide a positive user experience. This study's results suggest that AES-based mobile messaging security applications can serve as a tool to fulfill the secure communication expectations of mobile users.
A Systematic Review of Energy Efficiency Appliances Adoption in Developing Country Aprilia, Hafiza; Prambudia, Yudha; Amani, Husni
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 1 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i1.18209

Abstract

This research examines the escalating energy demand, particularly driven by household electrical appliances in developing countries, highlighting a critical juncture for sustainable development. Through a systematic literature review, the study analyzes the complexity of energy-efficient appliance adoption with a comprehensive approach. Findings underscore the intricate interplay of economic, cultural, and technological factors shaping the adoption landscape, emphasizing the urgent need for transformative measures. Beyond identifying barriers, the research unveils best practices and success stories from developing countries, providing actionable insights. Technological innovations are explored as beacons of hope, offering tangible solutions to identified barriers. Government policy evaluation emphasizes the pivotal role of governance. The study concludes by underscoring the crucial importance of enhancing the adoption of energy-efficient household appliances in developing countries for sustainable development.
An IoT Design Effectiveness and Reliability of Electric Power Circuit Breakers Aryza, Solly; Lubis, Zulkarnain; Putra, Khairil
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 2 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i2.20908

Abstract

Along with the very rapid development of technology in the current era of globalization. It became3The main instrument in the progress of various social and life aspects. Currently, many people use technology to help solve several problems in life. Almost every activity carried out by humans always uses technology. The use of automated security instruments has become an option nowadays. In modern times like now there are many kinds of technology, and therefore I will develop technology with better security instruments.
Neural Network Algorithm for Biometric Analysis of Human Retina Image Nst, Tuti Adi Tama; DEA, Bambang Hidayat; Andini, Nur; Zakaria, Hasballah
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 2 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i2.20000

Abstract

Identity recognition is an important process because many systems require a valid user identity for security and access control. Identity recognition such as passwords, signatures, id cards have some weaknesses that are they can be duplicated, stolen, forgotten, and even lost. Identity recognition using biometric techniques is known to be more reliable. Biometric technique is a recognition and classification technique that uses human behavior and physical atributes. In this research, a non-realtime simulation system is designed to identify a person by biometric of retina image. The system can identify one's identity through pattern of retinal blood vessels. The processes of this system divided into two stages that are training stages and testing stage. The identification process begins with prepocessing retinal photo. Biometric features extracted by using Discrete Orthonormal S Transform (DOST). Biometric classification by using Adaptive Resonance Theory 2 (ART 2) with unsupervised learning process that can recall previously learned patterns . The results obtained from this study showed 65% of accuracy  for the right retina image and 50% of accuracy for the left retina image. Computing time is about 6 seconds. Further development is needed to improve the accuracy of the system as a security and access control systems.
Applying Design Thinking to the Internet Cafe Booking Application Prototype Ramadhana, Muhammad Wira; Irvan, Irvan; Nurjamiyah, Nurjamiyah
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 1 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i1.17753

Abstract

Stream Cyber Café is one of the icafe in Medan, categorized as mid-high end due to its excellent services, facilities, and PC specifications for playing various online games. As a result, this icafe, founded by the STREAM UNIVERSE company, has a significant number of customers. The high number of customers often leads to a crowded and full environment, causing some customers to feel disappointed when they visit but cannot play because there are no available PCs. Therefore, this research aims to address the issues faced by internet cafe customers by designing a Prototype Internet Cafe Booking Application using the Design Thinking method. This prototype application will make it easier for internet cafe customers to check PC availability and book PCs using their smartphones. It will also provide valuable insights to the STREAM UNIVERSE company regarding an application that can enhance the quality of service at their icafe.
Forecasting The Number of Health Center Patient Arrivals Using Cheng’s Fuzzy Time Series Method Aisyah, Aisyah; Rakhmawati, Fibri
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 5, No 2 (2024)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v5i2.20943

Abstract

Forecasting is the science and art of estimating future events. Forecasting is useful in predicting events covering the short, medium and long term.  In the historical data that will be taken and project it into the future so that it involves a forecast, the forecasting involvement uses the amount of data that has been taken. The number of patient arrivals at the health center has increased and decreased every month, this increase and decrease can affect the facilities provided by the health center, so this study intends to do forecasting on the number of health center patient arrivals to meet the service facilities that must be provided. This study was carried out from January 2022 to December 2023 at the Medan Amplas Health center by utilizing Cheng's Fuzzy Times Series method, therefore the results of this calculation were 70,464 patients by getting a MAPE value of 8%.

Page 7 of 13 | Total Record : 128