JITCE (Journal of Information Technology and Computer Engineering) http://jitce.fti.unand.ac.id/index.php/JITCE <p><strong>JITCE (Journal of Information Technology and Computer Engineering)</strong>&nbsp;is a scholarly periodical. JITCE will publish research papers, technical papers, conceptual papers, and case study reports. This journal is published by<a href="http://sk.fti.unand.ac.id"> Computer System Department</a> at&nbsp;<a href="http://www.unand.ac.id/" target="_blank" rel="noopener">Universitas Andalas</a>, Padang, West Sumatra, Indonesia.</p> <p>One volume of JITCE consisted of two editions, which are published in March and September each year. Articles are written in Bahasa Indonesia (Indonesian language) OR English. Abstracts&nbsp;<strong>must be in English</strong>.</p> en-US <div id="copyright"> <p>Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).</p> </div> <p>1. License</p> <p style="text-align: center;"><a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" target="_blank" rel="license noopener"><img style="border-width: 0;" src="https://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png" alt="Creative Commons License"></a></p> <p>&nbsp;</p> <p>The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on&nbsp;<a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>.&nbsp;</p> <p>2. Author(s)’ Warranties</p> <p>The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).</p> <p>3. User Rights</p> <p>JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.</p> <p>4. Rights of Authors</p> <p>Authors retain the following rights:</p> <ul> <li>Copyright, and other proprietary rights relating to the article, such as patent rights,</li> <li>the right to use the substance of the article in future own works, including lectures and books,</li> <li>the right to reproduce the article for own purposes,&nbsp;</li> <li>the right to self-archive the article.</li> <li>the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).</li> </ul> <p>5. Co-Authorship</p> <p>If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.&nbsp;</p> <p>7. Royalties</p> <p>By submitting the articles, the authors agreed that no fees are payable from JITCE.</p> <p>&nbsp;</p> <p>8. Miscellaneous</p> <p>JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may&nbsp;adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.&nbsp;</p> jitce@fti.unand.ac.id (Editor JITCE) derisma@fti.unand.ac.id (Derisma) Mon, 30 Mar 2020 11:55:50 -0400 OJS http://blogs.law.harvard.edu/tech/rss 60 Ultrasonic Sensor-Based Automated Water Dam Shutter http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/47 <p>Monitoring the level of water in dams is necessary to ensure optimal operation and safety. Water level monitoring is normally done manually by a full-time operator. This results mostly in a waste of water due to the inability of the operator to accurately determine the quantity of water to release from the dam gate. The aim of this paper is to present the design of a system to automatically open and close dam gates based on the level of water in the dam. The system is based on a low-cost microcontroller and an ultrasonic sensor to read water level in the dam. SMS messages are sent to nearby residents to warn them of the opening of the dam gate. An alarm is also sounds before the eventual opening of the dam gate.</p> Benjamin Kommey, Seth Djanie Kotey, Daniel Opoku ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/47 Mon, 30 Mar 2020 00:00:00 -0400 Enhancing Approach for Information Security in Hadoop http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/49 <p>Using the Hadoop package, a proposed secure cloud computing system was designed. Hadoop would use the area to establish and enhance the security for saving and managing user data. Apache had also produced a software tool termed Hadoop to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data. Hadoop has no strategy to assure the security and privacy of the files stored in Hadoop distributed File system (HDFS).&nbsp; As an encryption scheme of the files stored in HDFS, an asymmetric key cryptosystem is advocated. Thus before saving data in HDFS, the proposed hybrid based on (RSA, and Rabin) cipher would encrypt the data. The user of the cloud might upload files in two ways, non-safe or secure upload files.</p> Yogesh Awasthi, Ashish Sharma ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/49 Mon, 30 Mar 2020 00:00:00 -0400 Analysis and Prediction of Student Academic Performance Using Machine Learning http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/51 <p>Analyzing the academic performance of students is of utmost importance for academic institutions and educationists, so as to know the ways of improving individual student’s performance. The project analyzed the past results of students including their individual attributes including age, demographic distribution, family background and attitude to study and tests this data using machine learning tools. Three models which are; Linear regression for supervised learning, linear regression with deep learning and neural network were tested using the test and train data with the Linear regression for supervised learning having the best mean average error (MAE).</p> Ajibola Oluwafemi Oyedeji, Abdulrazaq M Salami, Olaolu Folorunsho, Olatilewa R. Abolade ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/51 Mon, 30 Mar 2020 00:00:00 -0400 Peningkatan Network Lifetime Menggunakan Cluster Based Pada Wireless Sensor Network http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/52 <p>This series of research activities are in the form of a routing simulation using the LEACH protocol as a cluster-based mechanism method that can improve Network Lifetime in the Wireless Sensor Network protocol, using the Network Simulator 2 application device that describes data transmission, remaining nodes, and energy used. Determination of the performance and power consumption of the wireless sensor network by testing scenario one to scenario five due to the influence of the cluster to be applied, such as scenario 1 using 1 cluster (C1) consumes an average of the energy of 0.155 joules and the data sent or obtained is 72,848 bytes. Barriers or disruptions to the clusterhead affect the performance of LEACH, so there is a need for criteria or conditions to determine which nodes should be used as clusterhead.</p> muhammad hibrian wiwi, Wardi Wardi, Agussalim Agussalim ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/52 Mon, 30 Mar 2020 00:00:00 -0400 Prototype Sistem Monitoring Volume Bak Sampah Online Berbasis Arduino Nano dan Orange Pi http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/53 <p>This research aims to develop trash volume monitoring based on Arduino nano and orange pi. This prototype detected trash volume in the trash can, and send the information through the monitoring server via a cellular network in real-time. So that the trash management, in this case, Dinas Kebersihan, could be efficient. In which the trash can located in various places could be easily monitored through the website. The results show, optimum range for the sensor that installed in the trash can is maximal 25 cm, in which for every trash that detected by sensor must be in range of 0 cm between 4.5 cm, where the position of the sensor does not face to face so that the sensor detects more accurately in determining the volume of free space in the trash.</p> Andi Mappatoba, Ilham Haruna, Agussalim Agussalim ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 http://jitce.fti.unand.ac.id/index.php/JITCE/article/view/53 Mon, 30 Mar 2020 00:00:00 -0400