Al'Adzkiya International of Computer Science and Information Technology Journal
Computer Science, Computer Engineering and Informatics: Data Science Artificial Intelligence, Machine Learning, Neural Network, Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modelling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modelling, Performance Modelling, Dependable Computing, High Performance Computing, Computer Security, , Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Cognitive Systems. Management Informatics, Information System and developmental economics : Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Smart City, e-Learning, Business Intelligence, Information Retrieval, Business Process, Financial Technology (Fintech). Telecommunication and Information Technology: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network. Instrumentation and Mathematics: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modelling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems.
Articles
57 Documents
Granting Credit In Cooperatives Using Profile Matching Method
Hariani, Pipit Putri
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 2, No 2 (2021)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v2i2.229
Cooperatives is an institution economic have function in the process of the increase in community welfare, Travel cooperatives not easy to reach position like now. The existence of movement cooperatives as an institution economic expected to act as propulsion engine national economic activity as well as soko teachers the country economy. Bhakti BPJS Kesehatan Service Cooperative is a cooperative engaged in services, forms of cooperative services to the community one is to lend funds (credit) to help resolve the financial problems in the community. In granting the credit cooperatives need to do proper research and calculations to prospective customers who will take credit cooperatives, to avoid mistakes in decision making required data processing is fast, precise and accurate. With the Application Profile Matching Method For Determining Eligibility Lending In BPJS Kesehatan Service Cooperative Bhakti is the best solution to solve the problems that exist in this company, because with this method the decision taken by the cooperative members have been more thorough and detailed than the previous.
Analysis and Comparison of the Performance of the K-Means Algorithm and the X-Means Algorithm in Clustering Disease Types in Mitra Medika Hospital
Afdilla, Herdawani
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 5, No 2 (2024)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v5i2.321
The system currently used by the hospital is still manual in managing patient data and information. What happens at Mitra Medika Hospital is that it is difficult to provide medical needs related to the diseases experienced by patients, considering that there are many types of diseases, so they provide many medical needs. Several inpatients have used BPJS facilities for various diseases suffered by the patient to carry out further examinations so that they can recover from the disease they are suffering from. Mitra Medika Hospital only looks at medical needs based on the disease suffered by the patient, however, seeing the large amount of patient history data makes it very difficult for Mitra Medika Hospital to find out the groups of diseases that patients often experience. This research uses a quantitative approach which starts from a theoretical framework, expert ideas, and researchers' understanding based on their experience, then developed into problems and solutions that are proposed to obtain justification (verification) or assessment in the form of empirical data support in the field. Here we apply a data mining pattern where data mining is extracting very large data (big data). Cluster 0: Of 245 Men (Suffering from 1-5 Diseases) Cluster 1: Of 255 Women (Suffering from 6-10 Diseases) Using the K-Means Algorithm and X-Means Algorithm can produce clustering. By using disease history data, you can apply the K-Means Algorithm and X-Means Algorithm methods to determine clusters. By using web programming, we can produce an analysis and comparison of the performance of the K-Means algorithm and the X-Means algorithm in clustering disease types in hospitals. Medika Partners.
Hours Meter Report System Application for Heavy Equipment at PT. Belawan Indah
Setiawa, Dimas Putra;
Hasdiana, Hasdiana;
Irwan, Dedy
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 2, No 1 (2021)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v2i1.95
Crane (heavy equipment) is one of the tools to unload and load containers from ships / depots. Because of its very important uses, each component of the crane must be checked every day before and after use. To improve the efficiency of the reporting process, an information system or additional feature is created which can be used by technicians in reporting cranes. The technology used in the form of Android-based applications so that it can be accessed mobile by anyone, anywhere, and anytime. This system uses the Waterfall method, the Waterfall Method is used aims to develop a system of crane usage reports, which is carried out sequentially or linearly. The system is made as easy and simple as possible so that the operator does not have trouble inputting reports. This system will provide information reports to Bosses / Pic who can monitor the condition of the crane only through logins to the system or sent emails. With this system all information will be captured clearly and neatly in accordance with the SOP in the company. Keyword : Heavy Equipment Crane, Android, Waterfall, Information System
Securing the Distribution of Personnel Data in the North Sumatera Personnel Agency by Utilizing an Asymetric Cryptography Algorithm
Syahputra, Noprian
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 4, No 2 (2023)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v4i2.315
In the context of this research, we will explore the implementation of the RSA algorithm to improve the security of personnel data distribution at BKPSU. This approach will provide additional protection to sensitive data, thereby increasing public trust and meeting established security standards. To overcome this problem, it is necessary to implement a strong and reliable security system. One suggested solution is to use the RSA (Rivest-Shamir-Adleman) asymmetric cryptographic algorithm. By implementing this algorithm, personnel data can be encrypted securely so that only authorized parties can read the information. By using the RSA algorithm, data security can be guaranteed because it is difficult for hackers to find out which private key corresponds to the public key used for encryption.
Analysis K-Nearest Neighbors (KNN) in Identifying Tuberculosis Disease (Tb) By Utilizing Hog Feature Extraction
Muhathir, Muhathir;
Sibarani, Theofil Tri Saputra;
Al-Khowarizmi, Al-Khowarizmi
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 3, No 2 (2022)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v1i1.11
Pulmonary tuberculosis is an infectious disease caused by Microbacterium tuberculosis, which is one of the lower respiratory tract disease, which is largely in the pulmonary tissue of the lung infection and then undergoes a process known as the primary focus of Ghon. Because the disease is difficult and takes a long time to decide the patient is affected by the disease Tuberkolusis, then the detection of the patient affects Tuberkolusis by utilizing the K-NN method as a classification and HOG as feature extraction. Results of the classification of positive diagnosis with a total of 234 samples from 330 samples or successfully recognizable Sebasar 70.90%, while the classification result is a negative diagnosis with the amount of 240 samples from 330 samples or successfully identified by 72.72%. The results of the study showed the image classification of the X-ray Set Tuberculosis using the method K-NN and HOG feature with cross-validation 5 folds with 71.81% accuracy. Keyword : tuberculosis, K-NN, HOG.
Design of Decision Support System for Selection of Outstanding Students Using AHP and Promethee Methods
Dachi, Surya Wisada
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 3, No 2 (2022)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v3i2.234
Student affairs often has difficulty in determining students that are sent to events because of many outstanding students at the institution. So far, the sending of students is still intuitive and subjective. Therefore, this research aims to design and build a decision support system that can provide advice to determine the best student that will be sent to the event. In this research, the method of decision support system that is used is a combination of AHP and Promethee. In implementation, AHP is executed to get criteria weight. After that, Promethee is executed to determine the order of candidates priority. The purpose of combination is to increase the quality of advice about the selection of students. The result of research shows that with the decision support system that is built, student affairs can choose the students that are sent to events more quickly, accurately, and objectively. Gist-The student affairs department often has difficulty in determining outstanding students who will be sent to events due to the large number of outstanding students in the institution. Due to the absence of a decision support system, sending students so far is still intuitive and subjective. Therefore, this research aims to design and build a decision support system that can provide advice to determine the best students to be sent to the event. In this case, the decision support system method used is a combination of Analytical Hierarchy Process (AHP) and Promethee. In its application, AHP is run first to get the weight of the criteria. After that, Promethee is run to determine the priority order of prospective event participants. The purpose of this combination is to improve the quality of student selection advice. The results showed that with this decision support system, the student affairs department can select students who are sent to an event more quickly, precisely, and objectively.
Expert System for Diagnosing Autism Spectrum Disorder (ASD) in Children Using the Forward Chaining Method (Case Study of the Bina Ananda Mandiri Foundation)
Evansyah, Muhammad
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 6, No 1 (2025)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v6i1.338
Autism Spectrum Disorder (ASD), more commonly known as autism, is a neurological disorder that can affect a child's development. ASD is one of five types of disorders, including: Autistic Disorder (AD), Asperger Syndrome (AS), Childhood Disintegrative Disorder (CDD), Pervasive Developmental Disorder, and Rett Syndrome. At the Bina Ananda Mandiri Foundation, psychologists only visit once a year to diagnose ASD symptoms. With advancements in technology and various new innovations, the limitations of expert personnel and their knowledge can be addressed through technological progress. One step to address the shortage of experts is through the development of an expert system. The purpose of creating this expert system is to diagnose ASD and provide information and solutions to parents who have children with autism. The process in this expert system begins with data collection using the forward chaining method. The data is then processed according to established rules to generate conclusions as solutions to the problem. Developed using the PHP programming language, the ASD diagnosis expert system has been tested for accuracy using real-world case data with a value of 80%. The system effectively detects early signs of autism and presents the likelihood that a child may have autism.
Implementation Data Mining For Level Analysis Traffic Violation By Algorithm Association Rule
Sulaiman, Oris Krianto
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 2, No 2 (2021)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v2i2.221
Police with regard to its function as a protector of society is expected able to take action in responding to traffic violations by conducting raid operations in uncovering violations that can be committed using analysis technique of habits how often traffic violations are committed. Detection Traffic violations that often occur simultaneously are called Association Rules.
Performance Analysis of RC4 Symmetric and RSA Asymmetric Cryptographic Algorithms In Securing Normal Text Messages
R, Renaldi
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 5, No 1 (2024)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v5i1.317
Information security plays a crucial role in the digital age, particularly in safeguarding text messages from unauthorized access. Cryptography serves as a means of data security by employing encryption algorithms that transform the original message into a format that is hard to comprehend. This thesis examines the performance evaluation of two cryptographic algorithms: RC4, a symmetric algorithm, and RSA, an asymmetric algorithm, in the protection of regular text messages. This research centers on comparing the two algorithms regarding their encryption and decryption speeds, along with their effectiveness in masking the character frequency pattern present in the original text message. Testing was conducted with various short, medium, and long text documents. The test outcomes indicate that RC4 excels in speed for both encryption and decryption processes, particularly when handling large texts. Nonetheless, RSA excels in security due to its capacity to generate a more random and unpredictable character frequency distribution.
Pharmacy Inventory System Design Using Agile Methods
Atika, Frisi;
Irwan, Deddy
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 1, No 2 (2020)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v1i2.91
Currently, the information system has been used by many companies / agencies in Indonesia. All activities will be properly managed by the system, so that they will be more effective and efficient. And now, pharmacies also need systems that can control data properly. Every day there are people who need medicine, therefore pharmacies can be used as a profitable business ingredient. The pharmacy business must have a good system, so that the business can move forward and get a large turnover. The purpose of this study is to assist the pharmacy in processing data on incoming and outgoing stock data so that it will make it easier for the warehouse admin to provide the information needed. In developing this system the researchers used the Agile Software Development method where this method is used to develop systems in the short term that require rapid adaptation and development to changes in any form. The result of this research is the development of sInventory information system at pharmacies that can display drug data, drug stock, sales, expenses, purchase of goods, profit and loss, reports in real time. Keyword : Information Systems, Pharmacy, Agile Method