JITCE (Journal of Information Technology and Computer Engineering) http://jitce.fti.unand.ac.id/index.php/JITCE <p><strong>JITCE (Journal of Information Technology and Computer Engineering)</strong>&nbsp;is a scholarly periodical. JITCE will publish research papers, technical papers, conceptual papers, and case study reports. This journal is published by<a href="http://sk.fti.unand.ac.id"> Computer System Department</a> at&nbsp;<a href="http://www.unand.ac.id/" target="_blank" rel="noopener">Universitas Andalas</a>, Padang, West Sumatra, Indonesia.</p> <p>One volume of JITCE consisted of two editions, which are published in March and September each year. Articles are written in Bahasa Indonesia (Indonesian language) OR English. Abstracts&nbsp;<strong>must be in English</strong>.</p> Universitas Andalas en-US JITCE (Journal of Information Technology and Computer Engineering) 2599-1663 <div id="copyright"> <p>Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).</p> </div> <p>1. License</p> <p style="text-align: center;"><a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" target="_blank" rel="license noopener"><img style="border-width: 0;" src="https://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png" alt="Creative Commons License"></a></p> <p>&nbsp;</p> <p>The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on&nbsp;<a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>.&nbsp;</p> <p>2. Author(s)’ Warranties</p> <p>The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).</p> <p>3. User Rights</p> <p>JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.</p> <p>4. Rights of Authors</p> <p>Authors retain the following rights:</p> <ul> <li>Copyright, and other proprietary rights relating to the article, such as patent rights,</li> <li>the right to use the substance of the article in future own works, including lectures and books,</li> <li>the right to reproduce the article for own purposes,&nbsp;</li> <li>the right to self-archive the article.</li> <li>the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).</li> </ul> <p>5. Co-Authorship</p> <p>If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.&nbsp;</p> <p>7. Royalties</p> <p>By submitting the articles, the authors agreed that no fees are payable from JITCE.</p> <p>&nbsp;</p> <p>8. Miscellaneous</p> <p>JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may&nbsp;adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.&nbsp;</p> Robot Pembersih Lantai Menggunakan Sensor LM393 dan Ultrasonik Berbasis Arduino Uno http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/163 <p>Pada era zaman modern saat ini teknologi robot mengalami kemajuan yang sangat pesat khususnya pada robot pembersih lantai. Robot pembersih lantai ini berguna untuk meringankan pekerjaan manusia di bidang rumah tangga. Pada penelitian ini dikembangkan sebuah prototipe robot pembersih lantai dengan menggunakan sensor LM393 dan sensor ultrasonik. Robot ini memiliki fitur alat pembersih sebagai vakum dan alat pel. Sensor ultrasonik digunakan sebagai alat pendeteksi jarak, sedangkan sensor LM393 digunakan sebagai penghitung putaran motor sehingga kecepatan motor stabil sesuai dengan yang diprogramkan pada mikrokontroler arduino uno. Input yang digunakan pada sistem ini adalah jarak dari sensor samping kanan, kiri dan depan yang diperoleh dari sensor ultrasonik. Sementara itu, output dari sistem ini adalah PWM motor DC kiri, PWM motor DC kanan, dan LCD yang menampilkan posisi gerakan robot. Pada penelitian ini dilakukan beberapa pengujian meliputi pengujian modul sensor ultrasonik dan sensor LM393, pengujian kinerja fitur vacum, pengujian kinerja alat pel, serta pengujian sistem secara keseluruhan.&nbsp; Berdasarkan hasil pengujian yang dilakukan terhadap sensitifitas jarak pantul sensor ultrasonik memiliki nilai selisih error 0,898% yang menandakan sensor ini berfungsi dengan baik. Hasil dari pengujian vacum diperoleh bahwa vacum dapat menghisap debu rata-rata 2,4 gram dari lima percobaan yang menunjukkan kinerja vacum cukup baik. Hasil pengujian alat pel dan pengujian keseluruhan menunjukan bahwa selisih error kemampuan robot membersihkan ruangan berukuran 2 m x 2 m dengan bahan kain pel greenwoll ditempuh dalam waktu 4,036 menit sedangkan menggunakan bahan katun adalah 4,31 menit.</p> Rina Mardiati Nur Aziz Edi Mulyana Teddy Yusuf ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2022-05-30 2022-05-30 6 01 29 34 10.25077/jitce.6.01.29-34.2022 ADBR: Accelerated Depth-Based Routing for Underwater Sensor Networks http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/112 <p>It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networks (UWSNs) in terms of packet delivery ratio, end-to-end delay of packet delivery from the source to the destination, and energy consumption. The reasons of that are UWSNs have unique characteristics (e.g. using acoustic channels instead of radio channels for communications), and they have dynamic topology due to the movement of the sensor by the water flow. Depth-Based Routing (DBR) considers one of the well-known algorithms in this context. DBR is a very simple algorithm; however, it is inefficient in terms of packet delivery rate, end-to-end delay, and energy consumption. This study we developed DBR by adding an accelerated routine to it to improve its efficiency, the proposed algorithm; called Accelerated Depth-Based Routing (ADBR). In ADBR, a simple probabilistic mechanism is used to accelerate packet forwarding and provide more multi-path to the destination. In ADBR, each node immediately delivers received packet to the destination with a probability of and follows the DBR routine with a probability of 1 – <em>P<sub>f</sub></em>. The performance of ADBR is evaluated via a set of experiments by using J-SIM simulator. Experimental results indicate the superiority of the ADBR over the DBR algorithm.</p> Abdolreza Andalib Fariba Abbasi Nia Mojtaba Jamshidi Abdusalam Abdulla Shaltooki Mehdi Esnaashari ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2022-03-31 2022-03-31 6 01 19 28 10.25077/jitce.6.01.19-28.2022 Rekomendasi Strategi Sosialisasi Program Studi Melalui Jalur Undangan Menggunakan Algoritma ID3 dan K-Means http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/80 <p>Based on data obtained from SPAN-PTKIN registrants in 2018 and 2019, the number of interested people through the invitation path who chose the study program at UIN Alauddin as the first choice was 30523 records. Analysis using the ID3 algorithm found that those who interested in the study of religions were more dominant from vocational students. While analysis using the K-Means shows the regions / regencies from which those interested in study programs of religions are spread in 35 regencies / cities. It can be concluded that the socialization of study programs of religions through the invitation path is recommended to be more focused on SMAs that are located in 33 districts / cities as identified in cluster 3. The study programs of religions are prioritized, because these study programs experienced the lowest number of registrants. It is expected that by implementing this recommended strategy, the number of interested prospective new students will draw a significant increase in the future.</p> Muhammad Azhar Hairudin Hazriani Zainuddin Yuyun Wabula ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2022-03-31 2022-03-31 6 01 14 18 10.25077/jitce.6.01.14-18.2022 The Smart Agriculture based on Reconstructed Thermal Image http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/141 <p>The utilization of thermal image in supporting precision agriculture is tremendous nowadays. There are many applications of thermal images in agricultural fields, such as detecting crop water stress, monitoring of free-range rabbits, measuring of crop canopy temperature and so on. Furthermore, the importance of thermal camera became the urgent need of perform the smart agriculture. Otherwise, the price of thermal camera is very expensive todays. Then, this kind of camera is not easy to find in the market. Therefore, it makes the utilization of implementation thermal images difficult. In order to handle this problem, the proposed method intends to generate thermal image from visible images. Further, the thermal information concerning with the agriculture, especially the fertility of leaves in paddy fields and the water stress can be monitored. The proposed method uses deep learning architecture to learn the thermal and visible image dataset. It applies Generative Adversarial Network architecture. This GAN pre-trained model trained using 150 images of training dataset and tested using many images of testset. The obtained model is used for generating thermal images from visible images. The results show the constructed thermal image has high accuracy. The assessment metric uses SSIM and PSNR methods. Their indexes show that the results have the high accuracy. The visual assessment shows the reconstructed thermal images also have high precision. Finally, the constructed thermal images can be implemented in smart agriculture purposes.</p> Ismail Ismail ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2022-03-31 2022-03-31 6 01 8 13 10.25077/jitce.6.01.8-13.2022 Automatic Ceiling Fan Control Using Temperature and Room Occupancy http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/165 <p>This paper presents the design and implementation of an automatic ceiling fan speed regulator using web camera and a temperature sensor. Fans have become a very important aspect of our daily lives to present us with comfort especially in hot climates. However, they come with some attendant issues such as a person having to move to where the fan regulators are placed to be able to adjust the speed of the fan. This can be difficult as temperatures change during the day as well as at night when one is asleep. This also poses a problem for physically challenged individuals with mobility difficulties. This project seeks to design a solution that involves automatic fan regulation. This was achieved using a temperature sensor, a camera that captures images, and a system intelligent unit that processes the captured images to detect occupancy. The speed of the fan is then automatically adjusted based on the room temperature and occupancy. The system was implemented on a raspberry pi, a resource constrained edge computing environment.</p> Benjamin Kommey ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2022-03-31 2022-03-31 6 01 1 7 10.25077/jitce.6.01.1-7.2022