cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jurnal.bulletincsr@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Computer Science Research
ISSN : -     EISSN : 27743659     DOI : -
Core Subject : Science,
Bulletin of Computer Science Research covers the whole spectrum of Computer Science, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, Fault analysis, and Diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data • Cryptography • Model and Simulation • Image Processing
Articles 5 Documents
Search results for , issue "Vol. 1 No. 3 (2021): Agustus 2021" : 5 Documents clear
Perbandingan Algoritma RC4+ dan RC4a dalam Pengamanan File Teks Lisa Oktasari
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of technology, documents that are supposed to be confidential can be accessed by unauthorized people. So safeguards are needed to prevent information from reaching unauthorized hands. The security of a text becomes reduced or insecure in terms of storage. It does not cover the possibility of a third party changing or taking the text, then the text is encoded into codes that are not understood, so that if there is a third party who wants to change it will have difficulty translating the actual content of the text and must decrypt it first. The security of encrypting text files, to avoid this problem, it is necessary to carry out a process of hiding or disguising information in such a way that it does not fall to other unauthorized parties. In this study, comparing the RC4 + Algorithm and the RC4A Algorithm in securing text files. Text file security application to help solve security problems of data created or stored using files that are formatted such as doc, txt
Sistem Pendukung Keputusan Seleksi Atlet Pon Cabang Pencak Silat Menerapkan MOOSRA Fitri Meilida
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Selection of pencak silat athletes at IPSI Deli Serdang is used to determine athletes who qualify to enter PON. Those who have good strength and technique in accordance with the criteria determined by IPSI Deli Serdang, so that athletes can be selected to enter the PON athletes in the pencak silat branch. The selection system for pencak silat athletes carried out in this research uses the Multi-Objective Optimization method on the basis of simple Ratio Analysis (MOOSRA). The MOOSRA method is used to calculate the criteria and weight values that have been determined by IPSI Deli Serdang to rank alternative pencak silat athletes.
Sistem Pendukung Keputusan Pemilihan Pembawa Acara Berita Terbaik Menerapkan Metode OCRA Naomi Titania L.Toruan
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The selection process of the news presenter is still subjective where the assessment may not be based on criteria that have been set or without an objective look so that the selection process is done less precisely and the decision is are produced less satisfactory for prospective news hosts. In this study, authors used a decision support system with the OCRA method to find the value of weights and criteria, and to search for the final value or to find the value of the best news show carrier. Thus, the decision support system is needed to help the TVRI Medan in determining the best news host. Addressing the problem, it is necessary to build the application of the decision support system for the selection of the best news presenter by using OCRA method so that it can help and facilitate the TVRI Medan in decision making choose The best news presenter with a satisfactory decision
Implementasi Algoritma Massey-Omura Cryptosistem Dalam Pengamanan Dokumen Irma Wahyuni
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A data transmission security system (secure data communication) is installed to prevent theft, damage, and misuse of data sent via computer networks. In practice, data theft takes the form of reading by unauthorized parties usually by tapping public channels. Computer network technology has been able to reduce and even eliminate the possibility of data damage due to poor physical connectivity, but interference can still occur because there is an element of intent that leads to misuse of the system from certain parties. This cryptosystem is an algorithm that provides a fairly high security which is not based on the secrecy of the algorithm (restricted algorithm), but is more emphasized on the security/confidentiality of the key used (modern cryptographic algorithms). The restricted algorithm is usually used by a group of people to exchange messages with each other, they create an encryption algorithm that is only known to members of that group, so that every time a group member leaves, the restricted algorithm must be replaced because of the possibility that group members who leave the group can leaking the algorithm. So every time a group member leaves, the algorithm used does not need to be changed, but only changes the key. Therefore, the author tries to use the Massey-Omura Algorithm whose implementation uses the ThreePass Protocol to generate prime numbers because the Massey-Omura algorithm is one of the asymmetric algorithms that factorizes large numbers to get the private key
Rancang Bangun Bel Otomatis pada STIKOM Tunas Bangsa Berbasis Arduino dengan Output Suara Fachrul Hasby; S Sumarno; Fitri Anggaini; Iin Parlina; Zulaini masruro Nasution
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The bell is certainly no stranger to the world of education. In general, the bell still uses human power to ring it. It is still rare in the world of education to use an automatic bell that can work alone according to the specified time in the teaching and learning process. The purpose of designing the automatic bell at STIKOM Tunas Bangsa Pematangsiantar is to simplify the work of picket officers and optimize the right time for the teaching and learning process. The work process of this tool is to input the predetermined class hours into the Arduino Uno Microcontroller using the C language in the Arduino IDE Software. After that the Microcontroller will read the schedule program for lessons that have been input into the Microcontroller. If the input program matches today's class time schedule, the bell will automatically issue the output in the form of an information notification sound. This tool also has a 16x2 Keypad Shield for manual setting in a matched test mode within the current exam time and automatically generates a notification sound output, where this automatic buzzer is fully controlled by the Arduino Uno Microcontroller command and the timing that has been set in the RTC ( Real Time Clock) as a time saver

Page 1 of 1 | Total Record : 5