Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Soft Computing Exploration

Decision support system for choosing the best tourist attractions using simple additive weighting (SAW) method Nurdin, Alya Aulia
Journal of Soft Computing Exploration Vol. 2 No. 2 (2021): September 2021
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v2i2.43

Abstract

Every year, various regions in Indonesia always have many tourists both local and foreign so as to provide benefits for the government and the surrounding local community. However, due to the Covid-19 pandemic, the tourism sector has slumped. Therefore, to revive the tourism sector in the new normal due to Covid-19, there needs to be various considerations. One of them, namely decision support system for choosing tourist attractions with facilities that meet health protocol standards in the new normal/adaptation of new habits. In this study, a case was raised with the aim of choosing the best tourist attractions in Kendal Regency, Central Java with several criteria determined, especially regarding facilities that comply with health protocols. The calculation in this study was done by Simple Additive Weighting (SAW) method. The research was conducted by determining alternatives, criteria, and weight values on each criterion. Then the calculation of the value of preferences and stamps to get the best alternative. From the calculations that have been done, the result of the best tourist attractions in Kendal is Tirto Arum Baru with a preference value of 0.766. However, due to the dynamic nature of the criteria and weight data, it is possible that at any time the selected data may change.
Securing audio chat with cryptool-based twofish algorithm Nurdin, Alya Aulia; Djuniadi, Djuniadi
Journal of Soft Computing Exploration Vol. 3 No. 1 (2022): March 2022
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v3i1.65

Abstract

Technology and the internet are growing very rapidly in society making it easy for people to share information and communicate with each other. However, the security of such data or information is something that should be highlighted. The utilization of technology and the internet has many security gaps that can make data or information vulnerable to being stolen and even misused. Valuable data or information is very likely to be accessed by unauthorized people. On the other hand, data and information are prone to be illegally altered and even duplicated. In connection with various possible data or information security issues, it is necessary to do a data security. The purpose of this study is to secure audio chat using a Cryptool-based Twofish algorithm. Based on research conducted, the security process with encryption and decryption simulations was successfully carried out on audio chat. Audio chat sent via IP Address can be encrypted into ciphertext and can be decrypted back into audio at a speed of 15.78 kB/s and the resulting size is also still the same, which is 160 packets. This Twofish algorithm proved to be well usable because the size and quality of chat audio generated from decryption is still the same as audio chat before it is encrypted.
Business process modeling at steak restaurant using business process model and notation Nurdin, Alya Aulia; Pristanti, Aisyah Nungky; Samantha, Nikita
Journal of Soft Computing Exploration Vol. 3 No. 2 (2022): September 2022
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v3i2.84

Abstract

The complexity of business processes occurring today makes the company try to find ways to describe its business processes. Business processes are not only an operational standard but also become one of the determining factors for the smooth use of time and costs in a business unit to be more efficient. With good business processes, it makes the flow of information faster so that it can help in making the best decisions in the organization. The business process modeling that will be explained further in this study is the order and procurement business process at steak restaurant using the Business Process Model Notation (BPMN) approach. This research was conducted using a qualitative descriptive method with the aim of observing the business unit to help analyze and make improvements to its business processes. Several series of processes were carried out, namely business identification and modeling with bizagi modeler and process reengineering to produce recommended new business process models that could be beneficial for business units, namely the recommended automation in the form of the use of mobile applications, remote, and database systems to support the effectiveness of the order to cash and procure to pay processes.