Al'Adzkiya International of Computer Science and Information Technology Journal
Computer Science, Computer Engineering and Informatics: Data Science Artificial Intelligence, Machine Learning, Neural Network, Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modelling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modelling, Performance Modelling, Dependable Computing, High Performance Computing, Computer Security, , Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Cognitive Systems. Management Informatics, Information System and developmental economics : Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Smart City, e-Learning, Business Intelligence, Information Retrieval, Business Process, Financial Technology (Fintech). Telecommunication and Information Technology: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network. Instrumentation and Mathematics: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modelling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems.
Articles
52 Documents
Decision Support System For Recognizing Student Interests in School Extracurricular Fields With Topsis Method
Nasution, Ismail Saleh
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 3, No 1 (2022)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v3i1.238
So far, the condition of children's development during the school period tends to choose the wrong choice or just follow along in choosing something, especially in terms of choosing an extracurricular field at school, which is basically not due to their own desire or interest in choosing an extracurricular field. So it is necessary to build a system that can help provide appropriate and appropriate decisions to help determine in recognizing the extracurricular interests of students.One method that can be used for decision support systems is to use the TOPSIS method. In this research, a case will be raised, namely finding the best alternative based on predetermined criteria using the TOPSIS method to perform calculations on the case. This method was chosen because it is able to select the best alternative from a number of alternatives, in this case the intended alternative is the extracurricular field based on the specified criteria. The results of the implementation process can sort alternatives from the largest value to the smallest value.
Utilization of the RSA Algorim in Business Communication in Making e-Commerce Applications
Fauzi, Fauzi;
Fachry, Muhammad
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 1, No 1 (2020)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v1i1.7
Cryptography is a science or art of securing messages and is carried out by cryptographers. Data that is secured includes several aspects such as message security such as confidentiality, data integrity, and authentication. One cryptographic algorithm that is often used in the process of data security is the RSA algorithm. RSA is short for the names of the inventors of this algorithm, namely Ron, Shamir and Adleman. RSA is an algorithm that uses the concept of public key creation (the asymmetry / key used to encrypt is different from that used to decrypt). Where the applications made with Webbase in their security are still often using the MD5 and Sha algorithms so that additional security is needed in securing the existing education in making e-Commerce. Keyword : RSA, Business, Communication, e-Commerce.
Implementation of the K-Nearest Neighbor (KNN) Algorithm in Making a Web-Based Article Topic System
Ramadhani, Fanny
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 3, No 1 (2022)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v3i1.223
This study aims to apply the K-Nearest Neighbor algorithm in making an article topic determination system. The K-Nearest Neighbor algorithm is one of the oldest and most popular NN-based methods for categorizing text. In determining class label predictions on test data it is determined by the value of k which represents the number of nearest neighbors. Of the k closest neighbors selected, voting is carried out by selecting the class with the most number as the predicted class label on the test data. Classification is considered the best method in processing when the training data is closest to the object. The way the KNN works requires determining the input in the form of training data, test data and k values.
Implementation of a Web-Based Academic and Non-Academic Achievement Information System at the Student Affairs and Alumni Office of Universitas Muhammadiyah Sumatera Utara Using the Rapid Application Development (RAD) Method
Dhillon, Ravindra Singh
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 5, No 2 (2024)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v5i2.322
This research discusses the implementation of a web-based academic and non-academic achievement information system at the Student Affairs and Alumni Office of Universitas Muhammadiyah Sumatera Utara. The system is designed to address issues in managing student achievement data, which was previously handled manually, often resulting in data inaccuracies, delayed reporting, and a lack of convenience in accurately monitoring student achievements. Using the Rapid Application Development (RAD) methodology, the system development is conducted quickly and iteratively through planning, design, and prototype construction phases that allow users to test it directly. RAD was chosen because it enables results that meet user needs in a relatively short time and facilitates adjustments throughout the development process. This information system allows the student affairs office to record, process, and report student achievement data more efficiently. Additionally, the system includes features for searching and tracking achievements, assisting the university in analyzing and evaluating student accomplishments in both academic and non-academic areas. The results of this research show that the developed system can provide accurate, real-time data and contributes to the improvement of service quality at the Student Affairs and Alumni Office. It is expected that this system will enable more transparent, effective student achievement data management and support the enhancement of graduate quality.
E-Commerce AF Parfum System Website Based Using Design Thinking Method
Ritonga, Alda Kharisma;
Dewi, Arie Rafika;
Rahayu, Eka
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 2, No 1 (2021)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v2i1.96
Perfume is a fragrance that is produced from the extraction process of aromatic ingredients that are used to provide a fragrant aroma to the human body. E-commerce that develops in the field of information technology that provides convenience and advantages, if compared to conventional sales such as consumers can buy goods online and make it easier for consumers to transact and sellers get large profits because the merchandise is more familiar with the public and can manage data systematic sales.The development method in building AF Perfume E-commerce System is based on the theory of model design thinking. Design thinking is a software development methodology that proposes approaches to solve problems and gather ideas in order to get solutions. The purpose of research writing is to produce a Website-Based AF Perfume E-Commerce System. With the application of this system will facilitate and benefit many parties both consumers and sellers. Keywords: E-Commerce, Parfume, Design Thinking, Website
Design of Internet of Things (IoT)-Based Boarding Room Security System Using Wemos D1 Mini and Door Sensor, and Integration of Notification Via Telegram
Ikhsan, Muhammad Khairul
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 4, No 2 (2023)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v4i2.312
The advancement of Internet of Things (IoT) technology presents significant opportunities to enhance security in various aspects of daily life, including in residential environments such as boarding rooms. This research aims to design a boarding room security system based on IoT that uses the Wemos D1 Mini as the main controller and a door sensor to detect entry and exit access at the room‟s door. The system operates by detecting changes in the door's status and sending real-time notifications via the Telegram application when unexpected access occurs. When the door opens, the door sensor sends data to the Wemos D1 Mini, which then processes the information and delivers a notification to the user through Telegram. Telegram was chosen as the notification medium due to its high accessibility and ability to support instant messaging across various devices. Testing shows that the system has a high level of accuracy in detecting door activity and can send notifications in less than one second after access occurs. This IoT-based security system is thus expected to be an effective and affordable solution to enhance boarding room security and provide peace of mind to resident.
Office Inventory Processing Information System at PT. Dian Ratna Abadi
Prananda, Ade Tya;
Hadinata, Edrian;
Sinaga, Tantri Hidayati
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 1, No 2 (2020)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v1i2.87
PT. Dian Ratna Abadi is a company engaged in human resource services. At this time, inventory data collection is still done manually using Microsoft Office applications. Data collection in this way can make it difficult for employees to collect data and produce reports, so that it is not effective and efficient. The research method used is a descriptive method using observation data collection techniques, interviews and literature studies. This research is an Applied Research. The purpose of this research is to design a goods inventory application to provide convenience in processing data to obtain the desired information. From the research conducted, it produces an inventory system that can be used without any errors or errors in the system
K-Nearest Neighbor Algorithm for Predicting Land Sales Price
Harahap, Tua Holomoan
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 3, No 2 (2022)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v3i2.235
Until now, there are still many people who have difficulty making choices in choosing strategic land at a price according to their abilities due to lack of knowledge about land prices based on market prices. Based on these problems, the design and manufacture of applications that can be used to predict the selling price of land with the K-Nearest Neighbor (KNN) algorithm approach. This application is expected to provide more accurate and efficient information about the selling price of land and help prospective buyers or sellers of land to predict the value of land according to the specified criteria. The data collected is secondary data. The method used is a combination of data mining stages known as the Cross-Industry Standard Process for Data Mining (CRISP-DM) and the Waterfall Model software development method. Overall, this application is able to predict land value with a fairly long processing because the KNN algorithm is basically comparing testing data (new data) with training data (old data) one by one. The accuracy of the testing data prediction is 80%.
SPK Recommendations for Selection of Candidates for Structural Officers Using the Profile Matching Method
Jannah, aulia
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 2, No 2 (2021)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v2i2.224
Through the State Civil Apparatus Law, the Government is making efforts to reduce nepotism by creating an open competition system among civil servants in the process of filling positions. The Tarakan Regional Civil Service Agency (BKD) already has an employee database and a decision support system that can combine the available databases with assessment models to obtain candidate profiles that match the vacant position profiles needed to support more objective performance. The application of the profile matching method in this decision-making system is expected to assist in the process of recommending candidates for structural officials within the Tarakan City Government according to the capabilities of the fields required in a position. From the results of the study it was concluded that changes in candidate profile values, and the number of sub-criteria used for position criteria, can affect the closeness of candidates to available positions and the use of the profile matching method for cases where the highest score is the best value requires that the ideal value used is the highest score. maximum so that there are no expectations that exceed the ideal value.Keywords— Decision Making, System Profile Matching, City of Tarakan
The Application of the Forward-Backward Chaining Method in Analyzing Oil Palm Plant Diseases at PT. Fajar Agung
Salsabila, Intan Salwa
Al'adzkiya International of Computer Science and Information Technology (AIoCSIT) Journal Vol 5, No 1 (2024)
Publisher : Al'Adzkiya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.55311/aiocsit.v5i1.318
Bengabing Plantation is a pure plantation managed by a national private company, PT. Fajar Agung, which operates in the oil palm and rubber plantation sector. A frequent decline in harvest yields has been observed, caused by pests and diseases affecting the oil palm plants. Therefore, a medium is needed to help address this issue—namely, an expert system for diagnosing oil palm diseases. The aim of this research is to develop an expert system that can replicate the knowledge of plantation experts, particularly in the field of oil palm cultivation, into a computerized system by applying the forward-backward chaining method.