Journal of Information Technology and Computer Science <p><strong>The Journal of Information Technology and Computer Science (JITeCS)</strong> is a peer-reviewed open access journal published by Faculty of Computer Science, University of Brawijaya (UB), Indonesia that has been published online since 2016. This journal currently is indexed and abstracted by SINTA 3. JITeCS publishes original research finding and high quality scientific articles that present cutting-edge approaches including methods, techniques, tools, implementations and applications. The journal is an archival journal serving the scientist and engineer involved in all aspects of information technology computer science, computer engineering, information systems, software engineering and education of information technology.<br /><br />Online ISSN : 2540-9824 <br />Print ISSN : 2540-9433<br /><br />JITeCS accepting manuscript at anytime during the year without time restraints <br />Publication frequency: <strong>April</strong>, <strong>August</strong>, <strong>December<br /></strong>Contact us by email:</p> en-US <p><span><a href="" rel="license"><img src="" alt="Creative Commons License" /></a>Â <a title="CC BY-SA 3.0" href="">Creative Common Attribution-ShareAlike 3.0 International (CC BY-SA 3.0)</a></span></p><p>Authors who publish with this journal agree to the following terms:</p><ol type="a"><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed <a href="">under a Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="" target="_new">The Effect of Open Access</a>).</li></ol> (Journal of Information Technology and Computer Science) (JITeCS) Fri, 15 Dec 2023 14:51:52 +0700 OJS 60 COVID-19 Detection on Chest X-Ray Images Using Modified VGG-19 <p>A global pandemic infecting human respiratory system identified as COVID-19 emerged in 2019 has been a critical issue concerning worldwide, including Indonesia. The massive and relatively easy spread of the virus requires COVID-19 patients to be separated from other patients to avoid hospitals being the major source of the virus spread. The gold standard in COVID-19 testing known as rRt-PCR was established to help detecting the virus. This method, however, is found to be less time-efficient due to the sample examination taking 5-7 hours to conduct. Another COVID-19 testing method called Rapid Antigen Test is claimed to be more practical since the sample examination only takes 5-30 minutes to complete. One disadvantage of this testing method is its sensitivity, which is believed to be relatively low. Further supporting examinations are needed in diagnosing COVID-19 when using the Rapid Antigen Test, one of which is chest imaging. Most hospitals in Indonesia are type C hospitals, which means radiology specialists’ availability is limited and sometimes not available. Therefore, it is necessary to develop an automation system for detecting COVID-19 disease on chest X-ray images using the Convolutional Neural Network method to help doctors interpreting chest X-rays of patients effectively faster in determining whether the patient is potentially infected with COVID-19 or not. The algorithm proposed in this study was modified VGG-19, with ADAM optimization method and categorical cross-entropy loss function. This algorithm resulted in a model accuracy rate of 81%, a precision/recall model of 62%, and a specificity model of 87%. The area under the curve in the Receiver Operatic Characteristic Curve indicates that the accuracy level of the test is below the Excellent curve, suggesting that the model created successfully serves as a screening test tool.</p> Muhammad Irfan Yusuf, Agus Wahyu Widodo, Viera Wardhani Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Application of Process Mining in the Process of IT Incidents Management by Utilizing Kaggle’s Dataset <p>The application of process mining in Information Technology (IT) incident management has been carried out. In the face of the increasing complexity of IT systems and a surge of incidents, traditional incident management is no longer effective. This study uses Kaggle's dataset on IT incident management to analyze event logs, identify process bottlenecks, and compare process flows seen in event logs with expected flows. Process mining techniques, such as process discovery and conformance, are applied using PM4PY and Celonis tools. The analysis results with process mining produce a new model process that can be applied in practice with a conformance rate of 81%.</p> Anggraeni Xena Paradita, Fakhri Arya Fadhillah, Kanza Azzahra, Michael Christensen Bonar Kasparov, Rachmadita Andreswari Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Bottleneck and Rework Analysis of the Budget Approval at University with Process Mining <p>Process mining is a new science that focuses on the transparency of an existing process. Especially in a world full of digitalization, of course, many companies, education, health are immediately competing in presenting the most efficient and effective processes to do. in this study the authors used Request for Payment data owned by a university. These requests will later be checked by the travel administration, this budget approval can be done by supervisors, directors, or fund owners. the author uses Celonis tools and algorithms in Celonis to identify bottlenecks and rework in the process. We also attempted to analyze where new insights could be drawn from the resulting process model. The result of this research is to pay special attention to several activities, as well as to provide explanations of the criteria related to the application to be submitted.</p> Barajati Syakurnia, Bryan Ronald Talisman, Sahra Bilqis Fauziyyah, Faturrahman, Rachmadita Andreswari Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Low Packet Latency Using New Radio Duty-Cycle Scheduling Method <p>As energy conservation in Wireless Sensor Networks is crucial, the scheduling methods are required to ensure that sensor nodes operate for a longer period. Duty cycle scheduling can be accomplished using synchronous, asynchronous, or on-demand methods with additional radio channels. This study has integrated the on-demand method with an asynchronous scheduling mechanism for the wake-up radio. Model simulation results with random placements showed that the Wake-up Asynchronous On-demand Radio Duty-Cycle (WAORDC) method was able to achieve the latency value of 3.3 seconds, better than the CXMAC asynchronous method, and the total energy required was approximately 4% only, to activate the sensor node.</p> Onny Setyawati, Abdur R. Muhammad; Achmad Basuki Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 HiroPoseEstimation: A Dataset of Pose Estimation for Kid-Size Humanoid Robot <p>Pose estimation is a field of computer vision research that involves detecting, associating, and tracking data points on body parts. It is used for health monitoring, sign language understanding, human gesture control, elderly activities, sports, and humanoid robot pose estimation. The anatomy of a humanoid robot is similar to a human, which forms the basis for utilizing humanoid robot pose estimation. The Humanoid League is a major domain of the RoboCup competition, featuring soccer matches between humanoid robots. Pose estimation is used to measure the robot’s performance. Nevertheless, there have not been many research done on this subject. A new dataset model needs to be developed to solve the proposed problem. This work introduces HiroPoseEstimation, a kid-size humanoid robot dataset with several types of robots used in various poses based on movements in a soccer game. It is evaluated with both bottomup and top-down approaches using keypoint mask R-CNN and single-stage encoder-decoder model. Both methods demonstrate good performance on the proposed dataset.</p> Amik Rafly Azmi Ulya, Nathanael Hutama Harsono, Eko Mulyanto Yuniarno, Mauridhi Hery Purnomo Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Performance Evaluation of Tilt-based Vehicle Accident Report System Using Triple Modular Redundancy <p>A vehicle accident report system was designed to detect accidents accurately and send message to related person. However, after accident, some components or modules can be damaged and it may cause failure of accident detection. Therefore, Triple Modular Redundancy (TMR) method was implemented in the system to mask faults within the modules and ensure the system to continue working. TMR is one of passive hardware redundancy methods. The system includes three MPU-6050 sensors functioning as vehicle tilt sensors to provide hardware redundancy, a TC9548A module serving as an I2C multiplexer, an Arduino Nano acting as a microcontroller and voter, and a NodeMCU ESP8266 responsible for transmitting message. Based on experiment results, the TMR system has a reliability value of 0.9928, a failure rate value of 0.0004/cycle, and accuracy of 3 sensor value of 85%. While, the non-redundancy system has a reliability value of 0.9286, a failure rate value of 0.0053/cycle, and accuracy of single sensor value of 57%. The results of the system process were sent to and displayed via an e-mail. It can be concluded that the TMR system has better performance than the non-redundancy one.</p> Rakhmadhany Primananda, Bayu Bagus Prabowo, Agung Setia Budi, Mahardeka Tri Ananta, Zainul Abidin Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Data Delivery Implementation on River Flow Control System Prototype Using HTTP <p>Data transmission is one of the most essential components in a critical system. One of them is to control the river water canal. Previous research related to water canal monitoring has been carried out, but the data is still local. This research implements a water canal with one main river with three tributaries/river branches where the three tributaries have different area conditions. In this research, the process of sending data from the sensor node (Control Flow System) to the master node (Control station) to the cloud server to be displayed on a website. The microcontroller used for the main processor and as a data-sending device is the ESP8266 and the cloud server used is ThingSpeak. This research succeeded in implementing HTTP for the process of sending data. The HTTP protocol is suitable for the process of data delivery. Sending data on the Control Flow System to the Control Station was successfully sent optimally at a distance of 3 meters with the "Good" classification according to the TIPHON standard. Meanwhile, the average data is sent from the Control Station to the cloud server in about 44 seconds.</p> Mochammad Hannats Hanafi Ichsan, Sabriansyah Rizqika Akbar, Hamdan Malik Satriyo Aji, Eko Setiawan, Othman Mirizi Batubara Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Implementation of Lora and CoAP Protocol in Hydroponic Plant Water Pump Control <p>Hydroponics is the cultivation of plants without using soil media, but using water media that contains nutrients and minerals. To observe the growth parameters of hydroponic plants, it is still necessary to come directly to the hydroponic site and provide the nutrients needed manually. In time efficiency, the use of Internet of Things (IoT) is needed so that there is no need to come directly to the hydroponic site. LoRa is a Low Power Wide Area Network (LPWAN) communication system. This research uses sensor nodes, middleware, and client nodes as well as the Constrained Application Protocol (CoAP) protocol for clients to access the value of sensors to control automatic pumps so that nutrients for plants can be given directly without the need to come to the hydroponic site. The result of the implementation is that the water pump control can run properly until the plants can be harvested. The performance testing is done so that LoRa can transmit data at a distance of 1 km with an RSSI value of -114 dBm.</p> Heru Nurwarsito, Kevin Dion Andre Pradana Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Evaluation of the Success Nutrition Fulfillment Campaigns Through Diet in People with Autistic Disabilities Based on Prototyping Tasks in Design Thinking <p>Consideration of people, problems, and context is part of the design thinking approach to problem solving. Redefining complicated problems effectively can benefit greatly from this method. Specifically in this study, the development of the nutrition fulfillment application program for autistic children. The calculation of the percentage of test participants who successfully completed the task was 94.3%. The prototype provides high effectiveness based on the assigned task related to the daily diet food menus for autism. The results of the evaluation of the efficiency aspect present a value of 0.085 goals/sec which means that test participants completed 1 task in about 11.76 seconds and is more efficient than the manual process. The result of satisfaction evaluation based on SUS shows that average of the result of the questionnaire is 72 from 100 means that the user easily operates the prototype.</p> Silfiatul Ulumiyah, Mochamad Chandra Saputra, Retno Indah Rokhmawati Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Architectural Design of Representational State Transfer Application Programming Interface with Application-Level Base64-Encoding and Zlib Data Compression <p>Representational State Transfer (REST) is an architectural style that underlies the protocol of HyperText Transfer Protocol (HTTP)<br>and is used by web applications. The implementation of REST principles in web services is often known as RESTful API. The standard communication used in RESTful APIs uses HTTP without involving data compression. There are quite a lot of RESTful API clients in the form of mobile applications that use metered networks. Thus, reducing the required bandwidth during transmission is suggested to be beneficial. The data compression technique is widely known to reduce data size, but this additional step may yield side effects such as increased memory usage and processing time. This study aims to investigate how the data compression process, which specifically uses Zlib and Base64 encoding, may put additional load on the whole process of delivering content to a RESTful API. The performance and characteristics in terms of bandwidth saved when distributing JSON data from a RESTful API in compressed format are also be investigated. According to the experiment result, it is suggested that the compression process can reduce network bandwidth by up to 66% with negligible additional memory usage for the compression and decompression processes.</p> Aryo Pinandito, Agi Putra Kharisma, Eriq Muhammad Adams Jonemaro Copyright (c) 2023 Journal of Information Technology and Computer Science Fri, 15 Dec 2023 00:00:00 +0700 Cover and Table of Content <p>Cover and Table of Content</p> Lina Purbosari Copyright (c) 2024 Journal of Information Technology and Computer Science Mon, 29 Jan 2024 00:00:00 +0700