Adithya Kusuma Whardana, Parma Hadi Rentelinggi, Hezkiel Dokta Timothy
{"title":"Diabetic Retinopathy Blood Vessel Detection Using CNN and RNN Techniques","authors":"Adithya Kusuma Whardana, Parma Hadi Rentelinggi, Hezkiel Dokta Timothy","doi":"10.30996/jitcs.8716","DOIUrl":"https://doi.org/10.30996/jitcs.8716","url":null,"abstract":"This research aims to detect diabetic retinopathy using Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). The main objective is to compare these two methods in detecting the condition. Based on the study’s result after training 10 times on each method, the accuracy results were 92% for the CNN method and 50% for the RNN method. These results show, this study with the dataset used, the CNN method is much more effective in detecting diabetic retinopathy than the RNN method. The CNN method is better due to its ability to extract spatial features from images, which is important in image classification tasks.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139591342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age","authors":"Akinul Islam Jony, Sultanul Arifeen Hamim","doi":"10.30996/jitcs.9715","DOIUrl":"https://doi.org/10.30996/jitcs.9715","url":null,"abstract":"In this contemporary digital age, cybersecurity stands as a crucial linchpin amid the expanding role of technology in our lives, encountering numerous challenges. This review addresses the imperative need for robust cybersecurity measures as malicious actors continually innovate methods to exploit vulnerabilities in computer systems, networks, and data. The exploration delves into the multifaceted realm of cybersecurity attacks, unveiling the evolving threat landscape and their profound implications. From cybercriminals utilizing phishing attacks to the covert tactics of malware and the disruptive potential of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, including Phishing, Zero-Day Exploits, Man-in-the-Middle, and SQL Injection Attacks, the cybersecurity battleground is ever-expanding. The study systematically categorizes cyber threats, scrutinizes their distinctive characteristics, and elucidates the modus operandi of each attack type. Through a meticulous dissection of cybercriminal methods and motivations and a comprehensive evaluation of countermeasure efficacy, this review offers indispensable insights for securing our digital future in an era marked by escalating interconnectivity and technological dependence.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"16 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Task-Technology Fit on the Design and Use of a Hotel Management System","authors":"Intan Dzikria, Muhammad Lutfi Syahindra Solihin","doi":"10.30996/jitcs.8712","DOIUrl":"https://doi.org/10.30996/jitcs.8712","url":null,"abstract":"Hotels have many problems regarding how to improve their service performance by using technologies, especially when the hotels have a bit of understanding the importance of their employees’ tasks and the technology fitness. This study designed a hotel management system based on the tasks that the employees use to provide services. The purpose of this research is to investigate the influence of task-technology fit on the intention to use the designed hotel management system. In addition, statistical testing methods are also carried out on the system by measuring the impact of task-technology fit on the suitability between user task needs and technology, on user perceptions of technology and how these perceptions affect user intentions and behavior in accepting and using technology. The results of this study indicate that task-technology fit has a significant impact in facilitating its use. The results of this study contribute to the academic implementation of task-technology fit theory in the hotel reservation management system.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Utilization of Information System for Crime Rate Modelling in Surabaya Using K-means","authors":"S. Supangat, M. M. Sholiq","doi":"10.30996/jitcs.7676","DOIUrl":"https://doi.org/10.30996/jitcs.7676","url":null,"abstract":"This study aims to model the crime rate in the city of Surabaya using the k-means clustering method. The data used is crime data that occurred in Surabaya in previous years, which includes the type of crime, location of crime, and crime rate. The k-means clustering method is used to classify crime data in the Surabaya area for 2020-2022 consisting of cluster 3, namely areas with moderate crime rates covering 6 sub-districts (1,260 cases), cluster 1 with areas with high crime rates, namely 12 sub-districts with 2,363 cases, and cluster 2 areas with low crime rates consisting of 13 districts with 2,178 cases based on data on the number of crimes. The geospatial visualization system is used to visually display modeling results, making it easier for interested parties to identify the location of a crime. The results of this study are expected to provide useful information for interested parties, such as the police and the community, in taking preventive action regarding crime rates in Surabaya.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Child Growth and Development Evaluation Using Weighted Product Method","authors":"Ardy Januantoro, F. Mandita","doi":"10.30996/jitcs.7613","DOIUrl":"https://doi.org/10.30996/jitcs.7613","url":null,"abstract":"Child development is one of the factors that must be considered in improving a country's education. The level of maturity of human resources is able to maximize starting from childhood. The guidebook of the Ministry of Education and Culture of the Republic of Indonesia (Kemendikbud RI) in 2018 contained six indicators to assess children's learning ability, namely: 1) Moral, 2) Social, 3) Language, 4) Cognitive, 5) Motor, and 6) Art. This study implements these indicators to evaluate children's growth and development. The evaluation method uses the Weighted Product Method (WPM). WPM provides a ranking of the result of the evaluation. In addition, WPM also has an assessment of Beneficial and non-beneficial as a more relevant assessment between indicators. Data were collected by questionnaire at kindergarten schools with the respondents' age average of 5-6 years. The results will be calculated with indicators criteria weights given. The test results recommended for students between 0.65 to 0.62 are as follows: Mahmud, Diko, Cindy, Denny, and Riko. The kindergarten manager can use these recommendations to increase the student's aptitude.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delivery Route Estimation on a Web-Based Restaurant Delivery System Using Greedy Algorithm","authors":"Carmelita Margaretha Jawa Wando, Intan Dzikria","doi":"10.30996/jitcs.7611","DOIUrl":"https://doi.org/10.30996/jitcs.7611","url":null,"abstract":"Food delivery application services have been significantly developed in Indonesia. However, several areas have not received application services like this. Orders made by several restaurants still use social media such as Whatsapp, Facebook, and cell phones. Traditional ordering does not have sufficient means to calculate the cost of delivery of orders resulting in cost-efficiency problems. In addition, order delivery routes are a problem for couriers who have to deliver several orders at once. This research builds a web-based restaurant delivery system by applying a greedy algorithm to optimize routes and shipping costs. The results of this study indicate that the greedy algorithm can determine the best route for couriers to make deliveries so that shipping costs become lower. This research contributes as one proof of the application of the greedy algorithm to business problems and restaurants may use the resulting system to increase the effectiveness of order delivery.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ammar Fauzan, Dania Gusmi Rahayu, A. Handayani, Imam Tahyudin, D. Saputra, P. Purwadi
{"title":"Sales Forecasting Analysis Using Trend Moment Method: A Study Case of a Fast Moving Consumer Goods Company in Indonesia","authors":"Ammar Fauzan, Dania Gusmi Rahayu, A. Handayani, Imam Tahyudin, D. Saputra, P. Purwadi","doi":"10.30996/jitcs.7572","DOIUrl":"https://doi.org/10.30996/jitcs.7572","url":null,"abstract":"The market of Fast-Moving Consumer Goods (FMCG) companies in Indonesia is enormous. Unilever has 400 brands in more than 190 countries, making it a global business that is as influential in the consumer product market as it is in Indonesia. Sales forecasting at this company is very useful for planning expenses and the company's total costs on the business strategy. This study uses trend moment method to forecast the sales and earnings of Unilever Indonesia companies at the end of the year. This article aims to test the performance of the trend moment method calculation on the prediction of net sales and profits in FMCG companies. At the end of the analysis process, it can be concluded that forecasting using trend moment method is going very well. This indicator of success is shown by the error level of MAPE, which is below 10%.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation System Using the K-Nearest Neighbor Approach: A Case Study of Dual Camera Quality as a Smartphone Selection Criterion","authors":"Parcelliana Binar Pasha, Yusrida Muflihah","doi":"10.30996/jitcs.7559","DOIUrl":"https://doi.org/10.30996/jitcs.7559","url":null,"abstract":"Many smartphones today need to be more precise about choosing one that suits the user's needs. In fact, smartphone sellers sometimes need help recommending smartphones that suit buyers' needs. Generally, buyers search for smartphone specifications with keywords they desire, but the results appear different from what they expected. Users need the main specifications, such as Random Access Memory (RAM) and Read Only Memory (ROM) capacity, battery, and high camera quality. This research aims to implement the K-Nearest Neighbor (KNN) algorithm for recommendation smartphone selection based on the criteria mentioned. The data test results show that the combination of KNN with four criteria has good performance, as indicated by the accuracy, precision, recall, and f-measure values of 95%, 94%, 97%, and 95%, respectively.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116849244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}