item: #1 of 48 id: bitcs-1025 author: Solehudin, Arip; Angga Putra , Aldi; Prihandani , Kamal; Heryana , Nono title: Design of Reminder Information Last Contract (RILC) Applications Using Web-Based Sms Gateway date: 2020-07-10 words: 2656 flesch: 56 summary: Employee contract data checking is only done by looking at employee contract data in Microsoft Excel to see the expiration date of the employee contract so that sometimes the data is often missed plus there is no reminder information in checking the employee contract data. In practice, the processing of employee contract data still uses Microsoft Excel as the main archive material which still experiences several obstacles namely difficulties in checking employee contracts, often even one of the employees who should have finished the contract or the contract will be ignored. keywords: application; contract; data; employee; gateway; information; kontrak; reminder; ril; sms; user cache: bitcs-1025.pdf plain text: bitcs-1025.txt item: #2 of 48 id: bitcs-1072 author: Agung, Agung; Heryana, Nono; Solehudin, Arip title: Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security date: 2020-07-10 words: 2308 flesch: 76 summary: The method used in this study is the Caesar Cipher and Hill Cipher method for the process cryptography on data security exam questions, to combine the two methods there are several process that must be done. The cryptographic process of Caesar Cipher and Hill Cipher In Figure 1 can be seen the cryptographic process of Caesar Cipher and Hill Cipher methods. keywords: caesar; cipher; hill; key; method; process; 𝑀𝑜𝑑 cache: bitcs-1072.pdf plain text: bitcs-1072.txt item: #3 of 48 id: bitcs-1074 author: Susanto, Syahri; P. Manurung , Julifer; Wnditya Setyawan , Feddy title: Information System Design COVID-19 with Prototype Model date: 2020-07-10 words: 1953 flesch: 57 summary: Following are the results of COVID-19 information system design: A. Use case Diagram of COVID-19 Information System In this discussion, the activities that will be carried out by users on the system to be built are made in this discussion. B. Activity Diagram of COVID-19 Information System keywords: case; covid-19; data; design; diagram; fig; figure; information; prototype; system cache: bitcs-1074.pdf plain text: bitcs-1074.txt item: #4 of 48 id: bitcs-1236 author: Setiawan, Topan; Priyatna, Bayu title: Implementation of Simple Additive Weighting (SAW) Method To Determine Exemplary PKH Social Worker (Case Study: PPKH Garut Regency) date: 2021-01-15 words: 3129 flesch: 78 summary: Keywords: Decision Support System, PKH Social Worker, PPKH Garut Regency. The Vi with the largest preference value is the chosen worker, so that worker 17 is the recommended worker to become an exemplary PKH Social Worker in PPKH X Sub- district. keywords: b b; b worker; criteria; ppkh; social; value; worker cache: bitcs-1236.pdf plain text: bitcs-1236.txt item: #5 of 48 id: bitcs-1241 author: Tukino; Masruroh, Siti; Herdiana, Daryanto title: Applying the Prototype Model into the Electronic Reporting System for the Elementary School Student Base on Android date: 2021-01-15 words: 1835 flesch: 57 summary: Keywords: Student assessment, E-Report Card, Prototype Method, Application. The following is the class diagram design shown in Figure 5. Figure 5 Class diagram of student assessment D. System Implementation System implementation is an explanation of how a program that has been made is run into a piece of hardware [13]. keywords: admin; diagram; figure; information; learning; prototype; student; system; use cache: bitcs-1241.pdf plain text: bitcs-1241.txt item: #6 of 48 id: bitcs-1243 author: Huda, Baenil; shofia Hilabi, Shofa; Rahayuningsih, Maya title: Android Based Employee Absence and Leaving Application Information System date: 2021-01-15 words: 2713 flesch: 52 summary: Implementation of employee attendance pages employee attendance page where employees only click check- in when entering or check out when leaving then the data will be stored in the database, and employees can view attendance history or can print it if needed [12]. Use case diagrams are pictures of some or all actors and use cases to recognize their interactions in a system a. Use case diagram of employee attendance system 13 | Vol.2 No.1, January 2021 Figure 1. keywords: admin; application; attendance; data; design; employee; figure; leave; page; system cache: bitcs-1243.pdf plain text: bitcs-1243.txt item: #7 of 48 id: bitcs-1246 author: Pramono, Eko; Aripiyanto, Saepul ; Lia Hananto, April title: Futsal Field Management Information System based on Android in 212 Galuh Mas Karawang date: 2021-01-15 words: 2901 flesch: 55 summary: Figure 3.6 Admin Data Sequence Diagram D. User Interface Website On this website, to manage data in the futsal area, especially managing futsal field bookings or futsal field reservations and providing futsal shoes rental, namely by ordering online via an android-based mobile futsal application There are several menus on the admin website, namely. Figure 3.13 Member Module page G. Booking List Module page This Booking List Module page is to find out orders or bookings for futsal fields that have been booked by tenants or futsal members, and the admin gets edits and deletes if they don't or are canceled by the tenants. keywords: admin; android; application; data; design; field; figure; futsal; information; module; page; schedule; system; website cache: bitcs-1246.pdf plain text: bitcs-1246.txt item: #8 of 48 id: bitcs-1262 author: shofia Hilabi, Shofa; Solehudin, Arip; Susanto, Syahri title: Application for Submission of Research Recommendations and Practice Work Web Based date: 2021-01-15 words: 2238 flesch: 46 summary: however, the recommendation letter must be signed by the Head of Kesbangpol Karawang, which sometimes the head of Kesbangpol has duties outside the office so that when asked to sign it is quite difficult to contact and difficult to ask mailto:shofa.hilabi@ubpkarawang.ac.id mailto:arip.solehudin@staff.unsika.ac.id 23 | Vol.2 No.1, January 2021 for free time to sign recommendation letters that have been submitted by students or institutions. Therefore, the author will design a Application for Submission of Recommendations for Submission of Research and Job Training Case studies at the Office of National Unity and Politics of Karawang Regency so that students or institutions that will make recommendation letters do not have to come to the office directly and it is easier and more efficient. time. II. keywords: dan; data; figure; karawang; letter; recommendation; research; system; waterfall; work cache: bitcs-1262.pdf plain text: bitcs-1262.txt item: #9 of 48 id: bitcs-1272 author: Suhada, Karya; Setiyani , Lila; Aisyah , Siti; Nurapriani , Fitria title: Analysis of the Effect Quality Service on Telkomsel Customer Satisfaction in Karawang with the Servqual Method date: 2021-01-15 words: 3194 flesch: 49 summary: Because with customer service, they will evaluate then consider whether they will be loyal to the service provider. Abstract—This study aims to determine the effect of service quality an important factor of the service business is the assessment of service quality which is strongly influenced by the perceptions and expectations of each customer. keywords: assurance; customer; data; quality; reliability; research; satisfaction; service; study; telkomsel cache: bitcs-1272.pdf plain text: bitcs-1272.txt item: #10 of 48 id: bitcs-1417 author: Rohana, Tatang; Priyatna, Bayu title: Performance Evaluation of Adaptive Neuro-Fuzzy Inference System (ANFIS) In Predicting New Students (Case Study : UBP Karawang) date: 2021-07-17 words: 4465 flesch: 58 summary: New student data used as the source of data in this study were taken from new students from the 2015/2016 academic year to the 2019/2020 academic year. New student data from 2015 to 2018 is used as training data, while new student data for 2019 is used as testing data. keywords: anfis; backpropagation; data; error; hybrid; mean; new; process; students; system; technique; training; university; value cache: bitcs-1417.pdf plain text: bitcs-1417.txt item: #11 of 48 id: bitcs-1868 author: Sentosa, Jimmy; Maharina, Maharina; Zonyfar, Chandra title: E-Ticketing System and Integration with Third Parties Scrum-Based date: 2021-07-20 words: 4672 flesch: 59 summary: Bluetooth printer settings 5 Mobile Developer T17 Bluetooth printer settings 4 Backend Developer 1 T17 Print the printer if the url contains the word print_ticket 8 Mobile Developer 41 | Vol.2 No.2, July 2021 T18 Function to get sales data 2 Backend Developer 1 T18 Function to export sales data 2 Backend Developer 1 Total 19 Frontend Developer 1 20 Frontend Developer 2 20 Backend Developer 1 20 Backend Developer 2 19 Mobile Developer TABLE 4 DEPOSIT SPRINT AND CASH INFLOW ID Description Days Programmer S01 Ticket claim function 2 Backend Developer 1 S01 Ticket claim display 2 Frontend Developer 1 S02 Close sales function and create manifest 4 Backend Developer 2 S02 Display close sales and manifest strook 3 Frontend Developer 2 S03 Deposit function 2 Backend Developer 2 S03 Agent deposit display 2 Frontend Developer 2 S04 Function get deposit list for resume 1 Backend Developer 1 S04 Display of deposits via resume 3 Frontend Developer 1 S05 Function get deposit data 2 Backend Developer 1 S05 Display of deposit print and autoprint 3 Frontend Developer 1 S06 Printer format API for manifest 1 Backend Developer 1 S06 Print manifest if the url contains the word print_manifest 5 Mobile Developer S07 Printer format API for deposits 1 Backend Developer 1 S07 Print the deposit if the url contains the word print_setoran 5 Mobile Developer S08 Function to get deposit and resume data 1 Backend Developer 1 S08 Function to export deposit and resume data 1 Backend Developer 1 S08 Display for deposit data reports and resumes 2 Frontend Developer 2 S09 Function to get commission data 2 Backend Developer 2 S09 Function to export commission data 2 Backend Developer 2 S09 Display for commission data report 2 Frontend Developer 1 S10 Function to get passenger data 1 Backend Developer 1 S10 Function to export passenger data 1 Backend Developer 1 S10 Display for passenger data reports 2 keywords: application; backend; backend developer; dan; data; developer; development; frontend; function; master; method; product; scrum; sprint; system; team; ticketing cache: bitcs-1868.pdf plain text: bitcs-1868.txt item: #12 of 48 id: bitcs-1870 author: Suhada, Karya; Setiyani, Lila; Setiadi Sukardi, Damas title: Analysis of E-Commerce Adoption Level on Culinary Micro, Small and Medium Enterprises (Umkm) in Karawang Regency Using Smart Pls date: 2021-07-31 words: 2432 flesch: 52 summary: , it can be concluded that the factors that influence the adoption of e-commerce UMKM in the culinary field are technological, organizational and environmental factors. The method used is a qualitative approach by measuring technology, environmental, organizational, and e-commerce adoption variables on the performance of UMKM. keywords: adoption; business; commerce; karawang; performance; results; study; umkm; value cache: bitcs-1870.pdf plain text: bitcs-1870.txt item: #13 of 48 id: bitcs-1871 author: Aripiyanto, Saepul ; Muhyiddin, Abdul; Huda, Baenil title: Web-Based Teacher Performance Assessment Information System Using Simple Additive Weighting Method date: 2021-07-31 words: 3778 flesch: 53 summary: Smp IT Nurul Huda Batujaya as a private school, also carries out teacher performance assessments, as a guarantee of the quality of educators honing their teaching skills. In the implementation of teacher performance assessment towards the end of the lesson. keywords: assessment; dan; data; diagram; information; method; penilaian; performance; students; system; teacher; use; weighting cache: bitcs-1871.pdf plain text: bitcs-1871.txt item: #14 of 48 id: bitcs-1872 author: Hasan Basri, Moh; Lia Hananto, April; Masruroh, Siti title: Implementation Location-Based Service (LBS) on Mobile Application for Searching Dormitory date: 2021-07-31 words: 3689 flesch: 52 summary: 3. Haversine Formula The Harvesine method is used to calculate the longitude of two points on the earth's surface based on latitude and longitude. Haversine Formula requires inputting the longitude and latitude of the user's location. keywords: application; distance; dormitory; formula; haversine; latitude; location; longitude; mobile; page; point; system cache: bitcs-1872.pdf plain text: bitcs-1872.txt item: #15 of 48 id: bitcs-1873 author: Solehudin, Arip; Heryana, Nono; Retnosary, Rieke title: The use of Usability Tests in Website-Based Student Report Value Processing Information Systems date: 2021-07-31 words: 3105 flesch: 55 summary: In addition, by being web-based, data information can be accessed at any time. The software used does not match the wishes of consumers as a result, it causes consumers to have difficulty in working on student report cards. keywords: card; dan; data; design; diagram; information; processing; report; student; system; usability; use; website cache: bitcs-1873.pdf plain text: bitcs-1873.txt item: #16 of 48 id: bitcs-2046 author: Basya, Fahmi; Hardjanto , Mardi; Permana Putra, Ikbal title: SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS) date: 2022-01-19 words: 2578 flesch: 49 summary: VAPT Framework Based on Figure 1, this testing phase begins with the scope step (determining the focus of the test, namely information technology assets belonging to the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi, namely the Reconciliation Application), reconnaissance (at this stage information is collected as a basis for targets related to the system will be tested for vulnerability , such as ip address and hosting using domain tools), vulnerability detection (at this stage the process of finding information about security vulnerabilities in the Reconciliation Application using the burp suite tools on the OTP that has been applied is carried out. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. keywords: application; md5; otp; penetration; sha512; testing; vulnerability cache: bitcs-2046.pdf plain text: bitcs-2046.txt item: #17 of 48 id: bitcs-2047 author: Hananto, Agustia; Pramono, Eko; Huda, Baenil title: Application Of Recapitulation And Staff Performance Assessment Using Standard Working Method date: 2022-01-20 words: 3004 flesch: 51 summary: The developed web-based application can simplify evaluating staff performance at the Contact Center of PT. XYZ. Evaluation or assessment of work performance is a routine program carried out by an organization, both government and private agencies, to determine steps in fostering or developing employees or employees following the results obtained from the evaluation or assessment. keywords: application; assessment; design; figure; information; method; month; performance; results; staff; system; work cache: bitcs-2047.pdf plain text: bitcs-2047.txt item: #18 of 48 id: bitcs-2048 author: Lia Hananto, April; Sofiah Hilabi, Shofa; Noviani, Detrie title: Design of Customer Satisfaction Application at BCA Kcp Rengasdengklok Using C.45 Algorithm Method date: 2022-01-20 words: 2794 flesch: 54 summary: The flowmap of the proposed system for customer satisfaction applications is: Figure 3 FLowmap System 1. The hope of every bank is customer satisfaction to develop the long-term sustainability of a company. keywords: algorithm; c4.5; customer; data; diagram; figure; page; results; satisfaction; service; system cache: bitcs-2048.pdf plain text: bitcs-2048.txt item: #19 of 48 id: bitcs-2049 author: Novalia, Elfina; Voutama, Apriade; Susanto, Syahri title: Sales System Using Apriori Algorithm to Analyze Consumer Purchase Patterns date: 2022-01-20 words: 3119 flesch: 55 summary: After that admin inputs consumer orders, several problems are found, including the sales data being not on time, and sales data is still often carried by sales and not stored in a structured manner. From sales data that is increasingly piling up, a solution can be made to be processed as well as possible using apriori algorithm data mining to find out consumer purchasing patterns, namely the itemset pattern 23 | Vol.3 No.1, January 2022 to determine the attachment of one item pattern to another item that can produce information that can be used for decision making. keywords: association; data; figure; information; minimum; mining; process; results; sales; support; system; tanagra; transaction; vol cache: bitcs-2049.pdf plain text: bitcs-2049.txt item: #20 of 48 id: bitcs-2060 author: Setiawan, Topan; Heryana, Nono ; Priyatna, Bayu title: Money Check Result Data Management Application Section Verbasar By Web-Based (Case Study : Perum Peruri) date: 2022-01-21 words: 3400 flesch: 59 summary: Money damage data page This page will display data on cash damage collected from the results of money checks by employees. a. Admin: managing employee data, checking group data, managing user data, managing group data, managing goods data, managing damage type data, managing damage data, and managing reports. keywords: application; checks; data; design; group; information; management; money; page; results; section; system; verbasar cache: bitcs-2060.pdf plain text: bitcs-2060.txt item: #21 of 48 id: bitcs-2072 author: Lenora Tatuhey, Emy; Tukino; Hilmi, Irpan title: Web-based public complaints information system for Subang City date: 2022-01-20 words: 2338 flesch: 59 summary: 2. Software Requirements Analysis This stage is to collect the required needs with incentives to be understood by users, these needs are intended for users as system users later. Kata Kunci : Pengaduan Masyarakat, Keluhan, Sistem Informasi Abstract—The media currently limit public complaints, and some people find it difficult to convey or report events in the area. keywords: community; complaint; diagram; figure; information; jatibaru; masyarakat; pengaduan; system; village cache: bitcs-2072.pdf plain text: bitcs-2072.txt item: #22 of 48 id: bitcs-2426 author: Abuya, Teresa; Priyatna, Bayu title: Retraction: Time Series Based Gene Expression Profiling Algorithm for Stomach Cancer Diagnosis date: 2022-09-01 words: 6428 flesch: 48 summary: The contributions of this paper include the derivation of mathematical parameters that were shown to help in the generations of gene profiles over a limited duration of time. Euclidean distance Correlation distance between gene profiles 4. keywords: algorithm; cancer; correlation; data; expression; figure; gene; maximum; model; model profiles; number; points; profiles; profiling; time; value cache: bitcs-2426.pdf plain text: bitcs-2426.txt item: #23 of 48 id: bitcs-2759 author: Musa title: Automatic Face Mask Detection On Gates To Combat Spread Of Covid-19 date: 2022-07-31 words: 4074 flesch: 63 summary: A deep learning algorithm You Only Look Once (YOLO) V5 is used for face mask detection and classification. To stop the spread of the COVID-19 Pandemic, this article introduces face mask detection at university gates. keywords: algorithm; classification; deep; detection; face; image; learning; mask; model; yolo cache: bitcs-2759.pdf plain text: bitcs-2759.txt item: #24 of 48 id: bitcs-2762 author: Gunawan; Shabrina, Wilda; Andriani, Wresti title: Systematic Literature Review Implementation of the Internet of Things (IoT) in Smart City Development date: 2022-08-31 words: 3210 flesch: 53 summary: The most popular Deep Learning methods, especially in smart city research: RNN, CNN, DBN and SAE c. There are 4 types of RNN: Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Bi-directional RNN and RNN encoder-decoder. [2] Creating integration, synchronization, and synergy between smart city development planning at the central and regional levels, encouraging an effective, efficient, inclusive and participatory smart city development process There are 5 factors that support smart cities in Temanggung Regency, namely nature factors, structural factors, infrastructure factors, superstructure factors, cultural factors. keywords: cities; city; development; internet; iot; research; smart; study; things; vol cache: bitcs-2762.pdf plain text: bitcs-2762.txt item: #25 of 48 id: bitcs-2763 author: Alim Murtopo, Aang; Priyatna, Bayu; Mayasari, Rini title: Signature Verification Using The K-Nearest Neighbor (KNN) Algorithm and Using the Harris Corner Detector Feature Extraction Method date: 2022-07-31 words: 3102 flesch: 53 summary: Signature verification is divided into two forms, namely on-line and off-line signature verification. Signature verification is a way to find out if the signature is genuine or fake. keywords: accuracy; distance; euclidean; image; signature; verification cache: bitcs-2763.pdf plain text: bitcs-2763.txt item: #26 of 48 id: bitcs-2764 author: solehudin, Arip; Heryana, Nono; Hananto, Agustia title: Analysis of Signal Quality, Voice Service, and Data Access on Telkomsel And Indosat Providers in Pakisjaya District date: 2022-07-31 words: 2868 flesch: 54 summary: While Integrity is the degree of measurement when the service is successfully obtained by the user.[3] 2.4 Drive Test One method of measuring network data is the Drive test. In addition, this application can also be used to determine the quality of voice services with voice sequences, data services with sequence data and test data, and SMS services with SMS sequences. keywords: data; drive; indosat; network; quality; rate; service; telkomsel; test; village cache: bitcs-2764.pdf plain text: bitcs-2764.txt item: #27 of 48 id: bitcs-2766 author: Hananto, Agustia Hananto; Novalia, Elfina; Brotosaputro, Goenawan title: Changing Data Image Into Numeric Data on Kiln Manufacture Machinery Use Optical Character Recognition (OCR) date: 2022-07-31 words: 2889 flesch: 48 summary: From the results of this study, the prototype system made obtained an accuracy of 100.00% for the conversion of image data to alphanumeric data, Keywords: Digital Image, Optical Character Recognition Numerical Data, Kiln Manufacture. Based on the identification of problems obtained in the field observation process, literature study and interviews, namely during the combustion process in the kiln engine, so an application system was created to convert image data into alphanumeric data, using the Optical Character Recognition (OCR) method based on template matching, which then results the conversion can be saved into a database. keywords: character; data; image; kiln; machine; ocr; parameter; process; recognition; results cache: bitcs-2766.pdf plain text: bitcs-2766.txt item: #28 of 48 id: bitcs-2770 author: Tohari, Hamim; Kudhori, Ahmad; Pandowo, Hedi title: The Critical Path Method In Management Information System of Contractor Service Company Using Incremnetal Model date: 2023-01-31 words: 3642 flesch: 48 summary: The results of his research stated that information systems can be built using an incremental model consisting of requirements, specifications, architecture design, code, and test stages, while this study resulted in system design, CDM, and UI. XYZ Surabaya is a contractor service company, that does not yet have an information system that can be used as a control tool in project management. keywords: characters; data; date; ime; information; input; management; page; process; project; system; time cache: bitcs-2770.pdf plain text: bitcs-2770.txt item: #29 of 48 id: bitcs-2929 author: Genemo , Musa title: Detecting Harmful Activity in Pilgrimage Using Deep Learning date: 2023-01-31 words: 2565 flesch: 60 summary: The trained network is then used for feature extraction on action recognition datasets and the FC_18 layer is chosen for features extraction. We used the CIFAR-100 dataset to train the proposed model, as well as feature extraction from the action recognition dataset using the proposed CNN architecture, feature selection using Ant Colony Optimization (ACO), and predic-tion using a variety of algorithms. keywords: activity; feature; layer; model; recognition; video; vol cache: bitcs-2929.pdf plain text: bitcs-2929.txt item: #30 of 48 id: bitcs-3040 author: Lusweti, Samuel; Odoyo, Collins ; Rambim, Dorothy title: An Enhanced Bio-Inspired Aco Model For Fault-Tolerant Networks date: 2023-01-31 words: 5605 flesch: 61 summary: O Odoyo 2 Masinde Muliro University of Science and Technology Email: codoyo@mmust.ac.ke ‹β› Dorothy A Rambim 3 Masinde Muliro University of Science and Technology Email: drambim@mmust.ac.ke Abstract—This research mainly aimed at establishing the current functionality of computer network systems, evaluating the causes of network faults, and developing an enhanced model based on the existing ACO model to help solve these network issues. There exists a necessity to employ bio-inspired systems in computer networks because 12 | Vol.4 No.1, January 2023 living organisms like the ant colonies look better organized in their daily activities than the current internet [4]. keywords: aco; algorithm; ants; computer; figure; loop; model; network; optimization; packets; problems; research; routing; systems cache: bitcs-3040.pdf plain text: bitcs-3040.txt item: #31 of 48 id: bitcs-3060 author: Pandey, Shivam title: The Cardiovascular Disease Prediction Using Machine Learning date: 2023-01-31 words: 2352 flesch: 47 summary: ML method for cardiovascular disease diagnosis. In accordance with the WHO, around 18 million people die from cardiovascular disease each and every year. keywords: cardiovascular; data; disease; ecg; electrocardiogram; heart; learning; machine; model cache: bitcs-3060.pdf plain text: bitcs-3060.txt item: #32 of 48 id: bitcs-3241 author: Mayasari, Rini; Heryana, Nono; Hananto, Agustia title: Village Government Readiness Toward the Adoption of E-Government date: 2023-01-03 words: 3341 flesch: 43 summary: This can make it easier for the community to access government services, particularly for those who may not be able to afford fees. As the population increases, the demand for government services is likely to grow as well. keywords: community; government; information; initiatives; organization; public; services; technology; village; village government cache: bitcs-3241.pdf plain text: bitcs-3241.txt item: #33 of 48 id: bitcs-3342 author: Wresti Andriani; Gunawan; Anandianskha, Sawaviyya title: Coastal Batik Motifs Identification Using K-Nearest Neighbor Based on The Grey Level Co-occurrence Method date: 2023-01-03 words: 3315 flesch: 61 summary: In this paper, the researcher hopes to help facilitate the millennial generation and related parties to become more familiar with motifs so that they can love these traditional products more, especially Tegal batik, Pekalongan batik, and Cirebon batik. It can be concluded data from the training data obtained, after being tested was more predicted as Pekalongan batik, then followed by Cirebon batik. keywords: batik; cirebon; data; distance; euclidean; image; manhattan; matrix; motifs; pekalongan cache: bitcs-3342.pdf plain text: bitcs-3342.txt item: #34 of 48 id: bitcs-3712 author: J, Valarmathi; V T, Kruthika title: A Philosophical Study of Agricultural Image Processing Techniques date: 2023-07-27 words: 2444 flesch: 39 summary: This research examines how image processing technology is used in agriculture on the basis of that information. This study first examines how image processing technology is used in the world of agriculture. keywords: agriculture; crop; detection; growth; image; image processing; processing; processing technology; technology cache: bitcs-3712.pdf plain text: bitcs-3712.txt item: #35 of 48 id: bitcs-4332 author: Ibam, Emmanuel; Boyinbode, Olutayo K.; Aladesiun, Helen title: IOT-Based Farmland Intrusion Detection System date: 2023-07-27 words: 5043 flesch: 54 summary: Therefore, the development of an Internet of Things farmland intrusion detection system with automatic facial recognition module for effective security and safety of both crops and farm owners aimed at tackling the shortcomings pointed in the reviewed literatures has become imperative. They showed how digital image processing system was built up by the use of power spectral in trying to test animal presence in the image, Fourier transform by transforming from spatial domain to frequency domain, Animal Detection Based on Thresholding Segmentation Method in which if the threshold is greater than a pixel of gray that value is set to white and others are set to black. keywords: animal; crops; detection; farm; farmland; figure; image; intrusion; no.2; recognition; rfid; sensor; system; technology cache: bitcs-4332.pdf plain text: bitcs-4332.txt item: #36 of 48 id: bitcs-5165 author: Lusweti, Samuel; Omieno, Kelvin title: Using I-Hubs for Bridging The Gap of Digital Divide in Rural Kenya date: 2023-07-27 words: 4439 flesch: 52 summary: Due to establishment of the 300 innovation hubs in the country with at least once I-Hub per constituency, many youths in rural Kenya are also able to access computers and internet. The following are some of the renowned I-Hubs started in Kenya that are harnessing technical knowledge and ICT innovation from Kenyan youths to enhance technological advancements up to rural areas of the country. keywords: access; areas; countries; digital; divide; hubs; ict; innovation; internet; kenya; online; technology; vol cache: bitcs-5165.pdf plain text: bitcs-5165.txt item: #37 of 48 id: bitcs-5235 author: G.H.T.R. Irushika; K.V.M. Wijesinghe; P.K.I. Udeshika; J.J. Sathsara; D. I. De Silva; R.R.P. De Zoysa title: Saubhagya: An Online Food Donation Platform for Ending Hunger and Malnutrition in Sri Lanka date: 2023-07-27 words: 5136 flesch: 58 summary: Unique feature of Saubhagya Web application The real-time tracking feature in Saubhagya uses GPS and Google Maps to track the food collection and delivery process. A growing body of research indicates that digital platforms can play a crucial role in addressing these challenges by facilitating efficient food donation systems. keywords: application; donation; figure; food; hunger; lanka; people; platform; saubhagya; sri; system; user; web cache: bitcs-5235.pdf plain text: bitcs-5235.txt item: #38 of 48 id: bitcs-5361 author: Rio, Afrioni Roma; Siahaan, Berton Maruli title: Agglomerative Clustering of 2022 Earthquakes in North Sulawesi, Indonesia date: 2023-07-27 words: 3351 flesch: 56 summary: Keywords: Earthquake clustering; earthquakes data, machine learning; agglomerative clustering Abstrak Artikel ini membahas analisis klasterisasi pada data gempa bumi di sekitar Sulawesi Utara, Indonesia. Results And Discussion In this section, we will delve into the findings derived from the analysis of earthquake clusters in the Sulawesi Utara region of Indonesia for the year 2022. keywords: cluster; clustering; data; earthquakes; gempa; method; rata; sulawesi; vol cache: bitcs-5361.pdf plain text: bitcs-5361.txt item: #39 of 48 id: bitcs-5565 author: jaddoa, ahmed sami; J. Saba, Samah; A.Abd Al-Kareem, Elaf title: Liver Disease Prediction Model Based on Oversampling Dataset with RFE Feature Selection using ANN and AdaBoost algorithms date: 2023-07-27 words: 3827 flesch: 57 summary: Then applied RFE feature selection specifies the number of characteristics to be chosen is used for achieving better performance and for achieving an enhanced result, we have applied ANN and AdaBoost algorithms. [11] S. Afrin et al., “Supervised machine learning based liver disease prediction approach with LASSO feature selection,” Bull. keywords: accuracy; adaboost; ann; classification; data; disease; feature; learning; liver; model; prediction; rfe; selection; vol cache: bitcs-5565.pdf plain text: bitcs-5565.txt item: #40 of 48 id: bitcs-677 author: Solehudin, Arip; Heryana, Nono; Cahyana, Yana title: Designing and Building Client-Server Based Student Admission Applications date: 2020-01-01 words: 1079 flesch: 50 summary: The development of information technology currently plays an important role in the development of information, especially internet users because the results of the information technology make communication limited by time and space to make communication without space and time restrictions. New Student Admission Applications can media for publication and also to develop information technology, so that information got is fast and efficient. keywords: admission; application; information; students; waterfall cache: bitcs-677.pdf plain text: bitcs-677.txt item: #41 of 48 id: bitcs-678 author: Hananto, Agustia; Muhamad Mammun ; Nurhayati title: Implementation of the Futsal Field Ordering Platform using the UCD Method date: 2020-01-01 words: 1821 flesch: 58 summary: Information that is accurate and can be accessed by anyone, anywhere and anytime, with information systems using computers as a medium that makes it easier for someone to manage data. Keywords—Information systems, computerized, futsal. keywords: booking; field; futsal; information; page; system cache: bitcs-678.pdf plain text: bitcs-678.txt item: #42 of 48 id: bitcs-679 author: Susanto, Syahri; Priyatna, Bayu title: Teacher Monitoring Application in Teaching Based on CodeIgniter Framework in High Schools date: 2020-01-01 words: 1338 flesch: 52 summary: Activity diagram application proposal for access rights to the Monitoring and Evaluation Section 2. Activity diagram application proposal for teacher picket access rights. Activity diagram application proposal for access rights to the Monitoring and Evaluation Section C. Class Diagram Application Proposal Class diagrams are used to describe the relationship between classes of a system. keywords: application; design; diagram; monitoring; teacher; teaching cache: bitcs-679.pdf plain text: bitcs-679.txt item: #43 of 48 id: bitcs-681 author: Tukino; Shofia Hilabi , Shofa ; Romadhon, Heri title: Production RAW Material Inventory Control Information System at PT. SIIX EMS Indonesia date: 2020-01-01 words: 1872 flesch: 53 summary: If raw material inventory is not available with the required amount or raw material is late until the company, then it will have a bad influence on the company that is affecting the company's profits, this is because of costs incurred for the company running out of inventory which results in lost opportunities benefit because consumer demand cannot be served and the production process is interrupted. With the problems that occur in controlling the residual and the need for the use of raw material production, the author intends to analyze the system design Information System Inventory Control Material Production Row in P.T. SIIX EMS Indonesia. II. keywords: information; material; process; production; raw; system cache: bitcs-681.pdf plain text: bitcs-681.txt item: #44 of 48 id: bitcs-682 author: Huda, Baenil; Nurapriani, Fitri; Amanda, Helga title: Academic Application Design WEB-based on junior high schools date: 2020-01-01 words: 1378 flesch: 55 summary: CONCLUSION The conclusion that can be drawn from the making of Information Systems academics at Purwasari one junior high school are as follows; This web-based academic information system can assist in the processing and archiving of academic data, namely; student data, teacher data, lesson data, class data, lesson schedules, and student grades. junior high schools one Purwasari in processing academic data processing student data, teacher data, lesson schedules, and others are still using a manual system. keywords: academic; application; data; information; system cache: bitcs-682.pdf plain text: bitcs-682.txt item: #45 of 48 id: bitcs-683 author: Lia Hananto, April ; Priyatna, Bayu; Haris, Asep title: Application of Prototype Method on Student Monitoring System Based on WEB date: 2020-01-01 words: 1776 flesch: 43 summary: One of the problems that often occur in high school level education environments is monitoring student attendance, the process of delivering information from school to student guardians in addition to internal problems such as the flow of data that is processed quite a lot every day, there are also problems caused by external factors such as manipulation data or cheating done by students in terms of attendance, this must be addressed immediately because it is very disruptive to the learning process at school. Main page of the program F. Attendance Data Input Page This student attendance page is the page that appears after the teacher fills in the attendance form, and clicks the show button, in this form the teacher can do student attendance, the data will be displayed in the default settings present, so the teacher can change the attendance status of students who are not present course, the following appearance of the user interface page design attendance (Student Attendance); Fig. 6. keywords: attendance; data; information; page; school; student; system cache: bitcs-683.pdf plain text: bitcs-683.txt item: #46 of 48 id: bitcs-840 author: Heryana, Nono; Mayasari, Rini; Aprianto, Rudi title: The Role of Financial Technology in The Creative Industries in Indonesia date: 2020-07-10 words: 2674 flesch: 49 summary: Financial technology in Bank Indonesia Regulation Number 19/12 / PBI / 2017 is the use of financial system technology that produces new products, services, technology or business models and can have an impact on monetary stability, financial system stability, efficiency, smoothness, security and payment system reliability. The purpose of this study is to determine the role of financial technology and its constraints in the creative industry in Indonesia. keywords: companies; dan; fintech; indonesia; industry; research; role; services; technology; vol cache: bitcs-840.pdf plain text: bitcs-840.txt item: #47 of 48 id: bitcs-886 author: Sutan Faisal, Sutan Faisal; Sutan Faisal, Nurhayati title: Implementation of K-Nearest Neighbor Algorithm for Customer Satisfaction date: 2020-07-10 words: 3970 flesch: 53 summary: 4. Testing the dataset: contains new data classifications based on the Model built on, and classifications that are accurate (model performance) so they can be evaluated [6]. If the accuracy is accepted, the model is applied to find out the predicted results of new data. keywords: classification; customer; data; information; knn; method; mining; model; number; puas; records; results cache: bitcs-886.pdf plain text: bitcs-886.txt item: #48 of 48 id: bitcs-980 author: Priyatna, Bayu; Lia Hananto, April title: Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13 date: 2020-07-10 words: 2133 flesch: 65 summary: Selain kelebihan MD5 juga memiliki berbagai macam kekurangan diantaranya; sangat mudah di pecahkan karena MD5 memiliki hasil enkripsi yang tetap, dengan menggunakan generator pengubah MD5 akan dengan mudah ditebak, dan MD5 kurang bagus karena rentan terhadap serangan collision attack. In this article, the hash function that is used by MD5 algorithm [9]. keywords: algorithm; bit; data; letter; md5; message; password; plaintext; sample cache: bitcs-980.pdf plain text: bitcs-980.txt