{"title":"Changing Data Image Into Numeric Data on Kiln Manufacture Machinery Use Optical Character Recognition (OCR)","authors":"Agustia Hananto, Elfina Novalia, Goenawan Brotosaputro","doi":"10.36805/bit-cs.v3i2.2766","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i2.2766","url":null,"abstract":"In the process of making ceramic tiles, there is a combustion process using a kiln manufacture or oven. To ensure the combustion process goes well, 39 parameters are monitored on the kiln engine which must be monitored manually based on the data generated by the image on the kiln engine. The process of monitoring these parameters is ineffective due to human error or negligence and other human traits that result in losses for the company. Therefore, a system is needed to store the parameter data of the ceramic tile combustion engine which can be stored in a database. After analyzing the kiln, the sensor recorder that displays parameter data can be accessed via a LAN (Local Area Network), but the data generated is in the form of an image, not in the form of alphanumeric digital data. The image data obtained need to be translated into alphanumeric data as a data source. Through the introduction of optical character recognition (OCR) with the template matching method, the image is converted into alphanumeric data so that it can be stored in a database. From the results of this study, the prototype system made obtained an accuracy of 100.00% for the conversion of image data to alphanumeric data.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Signal Quality, Voice Service, and Data Access on Telkomsel And Indosat Providers in Pakisjaya District","authors":"Arip Solehudin, Nono Heryana, Agustia Hananto","doi":"10.36805/bit-cs.v3i2.2764","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i2.2764","url":null,"abstract":"Quality in communication is very important in activities in this modern era. It is expected that the expected network quality against network quality is actually not expected. Measurement of network performance is important to refer for users to choose the right operator for service providers to improve the quality of their service Drive Test Method is a method used to measure cellular network performance. The purpose of this study is to study the results of research between service providers. The parameters used in this analysis are Receive Signal Code Power (RSCP), Cell ID, Signal Noise Ratio (SNR), Upload Rate, and Download Rate. This parameter is used for the measurement process of the Drive Test method. While the tool used to collect the value of each Drive Test parameter by using an Android-based application, GNet Track Pro. The measurement results with GNet Track Pro are then processed with the Google Earth application as a measurement area. Research data collected in this analysis were 60 cases, with each village 20 data collected to continue processing with the Drive Test method. In this study, Telkomsel chose to excel in voice services with 150 successful numbers of 150 attempted calls. While Indosat excels in providing data access services and special signals in the village of Tanjungbungin.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134215700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signature Verification Using The K-Nearest Neighbor (KNN) Algorithm and Using the Harris Corner Detector Feature Extraction Method","authors":"Aang Alim Murtopo, B. Priyatna, Rini Mayasari","doi":"10.36805/bit-cs.v3i2.2763","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i2.2763","url":null,"abstract":"The security of the transaction process is very important in this day and age. Signatures can be used as a means of guaranteeing the security of a transaction other than fingerprints. However, the threat of signature forgery for those who use signatures as security is still very high and frequent. In this research, we will verify the authenticity of a signature and test it using the K-Nearest Neighbour (KNN) algorithm and the Harris Corner feature extraction method. There are two kinds of distance calculations that will be used in the K-NN algorithm, namely by calculating the distance from Euclidean Distance and Manhattan Distance. The k value at KNN taken is at k = 1, k = 3, and k = 5.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Face Mask Detection On Gates To Combat Spread Of Covid-19","authors":"Musa","doi":"10.36805/bit-cs.v3i2.2759","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i2.2759","url":null,"abstract":"The COVID-19 pandemic has spread across the globe, hitting almost every country. To stop the spread of the COVID-19 pandemic, this article introduces face mask detection on a gate to assure the safety of Instructors and students in both class and public places. This work aims to distinguish between faces with masks and without masks. A deep learning algorithm You Only Look Once (YOLO) V5 is used for face mask detection and classification. This algorithm detects the faces with and without masks using the video frames from the surveillance camera. The model trained on over 800 video frames. The sequence of a video frame for face mask detection is fed to the model for feature acquisition. Then the model classifies the frames as faces with a mask and without a mask. We used loss functions like Generalize Intersection of Union for abjectness and classification accuracy. The datasets used to train the model are divided as 80% and 20% for training and testing, respectively. The model has provided a promising result. The result found shows accuracy and precision of 95% and 96%, respectively. Results show that the model performance is a good classifier. The successful findings indicate the suggested work's soundness.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Money Check Result Data Management Application Section Verbasar By Web-Based (Case Study : Perum Peruri)","authors":"Topan Setiawan, Nono Heryana, B. Priyatna","doi":"10.36805/bit-cs.v3i1.2060","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2060","url":null,"abstract":"The use of computer technology and information systems in the 20th century has been widely used, including companies. The advantage of using an information system in the company is that it can provide data management media in the company's business processes where it is very necessary for effectiveness to be achieved. The Verbasar section is one of the sections in Perum Peruri which is in charge of checking the printouts of banknotes, with around 100 employees. There are still problems in the management and storage of data on the results of money checks in the Verbasar Section. The problem is the use of Microsoft Excel as a media for data management and storage which is considered not optimal. Therefore, a web-based application for data management results from Verbasar Section money checks was built as a substitute for the old system so that data management and storage became more optimal in the process and reports. In making this application, researchers used data collection methods such as observation, interviews, and literature studies. SDLC (System Development Life Cycle) Waterfall model is used for system development method with UML (unified modeling language) as modeling tools to develop information system design. The expected result is that the management of money audit results data can provide a better system than the old system in terms of data management","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-based public complaints information system for Subang City","authors":"Emy Lenora Tatuhey, Tukino, Irpan Hilmi","doi":"10.36805/bit-cs.v3i1.2072","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2072","url":null,"abstract":"The media currently limit public complaints, and some people find it difficult to convey or report events in the area. Complaints are still not fully using information technology media. This makes it difficult for the public to provide suggestions or submit complaints. The authors developed an information system for the public complaint process using the waterfall method from these problems. This system aims to create a Jatibaru village website and create a complaint website for the community so that complaints in the community can be conveyed properly through the complaints website. The public can review the complaints to determine whether the complaints have been processed or not. System development using the PHP and HTML programming languages. The final result of this study resulted in a public complaint information system so that the aspirations of the community were properly conveyed to the village government, all complaints would be discussed by the village apparatus to minimize complaints from the community, and with this system, it can also help monitor complaints submitted by the community.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sales System Using Apriori Algorithm to Analyze Consumer Purchase Patterns","authors":"Elfina Novalia, Apriade Voutama, Syahri Susanto","doi":"10.36805/bit-cs.v3i1.2049","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2049","url":null,"abstract":"This study aims to create a sales system to get order data on time, not too late to result in days, and the data becomes structured. As well as develop solutions to process sales transaction data which will increasingly use a priori algorithms to find out consumer buying patterns so that they can be output for decision making or knowledge. This study uses a qualitative method to deepen understanding of the phenomena currently happening as profoundly as possible. This shows the importance of depth and detail of the data studied. The system development uses the waterfall method because it fits perfectly with the needs of the system to be built. From the results of the study, calculating a sample of transaction data with a total of 12 data on August 7-8, 2021, using the Tanagra tools resulted in a rule association that if you buy a vortex, you will buy a Caraco with a support value of 58% and a confidence value of 100%, having a lift ratio value of 1.3 stated that the two products have a solid attachment to each other. Followed by if you buy Faraco, you will purchase a vortex. If you believe in a crystal, you will buy an arco that meets the specified parameter criteria with a minimum support value of 20% and minimum confidence of 50%.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128682980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
April Lia Hananto, Shofa Sofiah Hilabi, Detrie Noviani
{"title":"Design of Customer Satisfaction Application at BCA Kcp Rengasdengklok Using C.45 Algorithm Method","authors":"April Lia Hananto, Shofa Sofiah Hilabi, Detrie Noviani","doi":"10.36805/bit-cs.v3i1.2048","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2048","url":null,"abstract":"Bank BCA always improves service quality by the slogan \"Always By Your Side\". The assessment consists of 4 attributes (time, accuracy, focus, and satisfaction). Each attribute has a weighted value of 1 (very dissatisfied) to 5 (very satisfied). The assessment is still done manually (using paper), therefore the authors in this study used the C.45 algorithm with 3 tests carried out to produce a classification obtained that the accuracy value reached 88.75% with an AUC value of 0.744 and testing on the application that was made resulted in 0.722. It can be concluded that service assessment at BCA KCP Rengasdengklok belongs to a fairly good classification group because its AUC value is between 0.70-0.80.","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Of Recapitulation And Staff Performance Assessment Using Standard Working Method","authors":"Agustia Hananto, E. Pramono, Baenil Huda","doi":"10.36805/bit-cs.v3i1.2047","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2047","url":null,"abstract":"Employee performance evaluation or appraisal is needed to assess company employees' work achievement or work performance against the given target within a specific time. The purpose of the study was to analyze the method of recapitulation and staff performance appraisal and create a design model for the application of recapitulation and staff performance appraisal. The research method used is qualitative research, where data collection is done using observation and interviews. Application development based on the iterative waterfall method accommodates the recapitulation process and employee performance appraisal. The benefits of the research carried out are to determine the impact of information delays and speed up the recapitulation process and the performance appraisal itself. Every month, information regarding work achievements is presented in an application that each employee can see. The final results of the recapitulation and assessment in the form of total values and ratios of work achievement are expected to facilitate the head of the department in making decisions","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)","authors":"Fahmi Basya, M. Hardjanto, Ikbal Permana Putra","doi":"10.36805/bit-cs.v3i1.2046","DOIUrl":"https://doi.org/10.36805/bit-cs.v3i1.2046","url":null,"abstract":"This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The results showed that the Vulnerability Assessment and Penetration Testing (VAPT) method was proven to be able to identify the level of security vulnerability in the Reconciliation Application at the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi with a vulnerability level score of 5.3 in the SHA512 environment with a medium rating and 7.5 in the MD5 environment. with high ratings. So, it can be concluded that the best algorithm for implementing OTP is SHA512","PeriodicalId":389042,"journal":{"name":"Buana Information Technology and Computer Sciences (BIT and CS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}