cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jurnal.bulletincsr@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Computer Science Research
ISSN : -     EISSN : 27743659     DOI : -
Core Subject : Science,
Bulletin of Computer Science Research covers the whole spectrum of Computer Science, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, Fault analysis, and Diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data • Cryptography • Model and Simulation • Image Processing
Articles 210 Documents
Penerapan Algoritma Outguess dalam Penyembunyian Pesan Pada Citra Berwarna Yusni Elis Saragih
Bulletin of Computer Science Research Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i2.157

Abstract

The storage or circulation of secret messages is vulnerable to being accessed or wiretapped by parties who do not have legal authority. Therefore, to avoid this and also to secure a secret message known an encryption process called cryptography. In order for the message to be kept confidential, the message is inserted into the image object. Inserting a message in an image or more commonly known as steganography is the development of previously known cryptographic methods. The method with steganography can be said to be better than the previous cryptography. To secure secret messages from unauthorized third parties, steganography is used
Analisis Tingkat Kepuasan Pelanggan dengan Menerapkan Algoritma C4.5 Reza Fauzy; Riki Winanjaya; Susiani
Bulletin of Computer Science Research Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i2.162

Abstract

Furniture is currently a secondary item that is quite needed among the community to support their daily activities. In its use, furniture becomes an item that really helps human activities in their daily lives. But now furniture marketing is not only in terms of use, but now people have their own assessment of the aesthetic value of a furniture. So this is a demand for furniture business people to make variations on each product to be marketed. Customer satisfaction is one of the most important things in assessing the level of service provided by the company to its customers. The purpose of this study was to determine the level of satisfaction of CV. Karinda customers. at the company CV. This aspect of Karinda has not been measured, so CV. Karinda finds it difficult to determine which aspects must be improved. The method used in this study is the C 4.5 algorithm, where the data source used is a questionnaire/questionnaire technique given to CV. Karinda customers. the process of testing this research using RapidMinner software to create a decision tree. From the results of the analysis is expected to improve the company's performance in providing services to customers CV. Karinda to be better
Penerapan Data Mining dengan Algoritma C.45 Dalam Memprediksi Penjualan Tempe Yusuf Maulana; Riki Winanjaya; Fitri Rizki
Bulletin of Computer Science Research Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i2.163

Abstract

Many people talk about business, benefits of business and the many different types of businesses that definitely have one purpose, financial profit or profit. With so many types of business as well as the benefits that can be taken from business, often we definitely feel we feel quickly to pave in the world of business to get profit or more specifically is income. One example of business is selling tempe. Sales is the activity of selling a product or service that needs business authorities or business acknowledgments of a kind of business selling tempe at mandiri ac. In selling of course we have a very many collection of sales information why we should be able to digest the sales information to become new data. In this issue the c4.5 algorithm is a procedure that can help digest or predicate the value of sales at the time to arrive. This research was tested in order to help sellers to predict the sales of their merchantability so that they can prepare or stock materials which is predicted to face an increase in their sales at the time of getting the information between supplied information. From this research can be conclusioned if using the c4.5 algorithm the sales of tempe can be predicted with a quite high accuracy
Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio Rezky M. Nasution
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.140

Abstract

Audio file is a means of information from one person to another. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, this can be done by using cryptographic techniques. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA stands for Secure Hash Algorithm is a standard hash function published by NIST (National Institute of Standards and Technology). SHA is published with a digest size of 512 bits. SHA-1 will output 160 bits of the string and the output string is called a message digest. The length of the message digest can range from 160 to 512 bits depending on the algorithm. This study describes the security process for detecting the authenticity of audio files using the SHA-1 method in the form of detection so that confidential audio sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of audio files.
Penerapan Metode Servqual Untuk Menganalisa Kualitas Layanan Aplikasi Talenta di SLB-G Rawinala Meyna Endah Lestari; Eva Zuraidah
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.165

Abstract

The quality of service is a priority, it is hoped that employees will make work easier so that they can meet the expectations of employees. Problems occur that the quality of service is still lacking in attendance order, absenteeism has not gone well, and not on time in attendance at SLB-G Rawinala. The research objective of measuring service quality affects the level of employee satisfaction with the Servqual method. Measurement of employee satisfaction was carried out with 50 respondents. The measurement of the level of customer satisfaction on the 5 dimensions of service quality service, namely Tangible, Reliability, Responsiveness, Assurance, and Empathy, obtained the results of the perception gap and employee expectations of 0.02. From the gaps grouped by questions with an IPA diagram (Importance Performance Analysis) with Tangible dimension results, the gap value is 0.03 modern equipment used to support services and Talent Applications in official applications, Reliability with a gap value of 0.03 includes prioritized questions, namely employee attendance in the application. running well, Responsiveness gap value of 0.05 SLB-G Rawinala improves and maintains service quality to be able to meet employee expectations, Assurance with a gap of -0.02 which is prioritized and improved makes customers feel confident using the talent attendance system, and Empathy with a gap value 0.01 Stable Internet network for the convenience of employees in using the Talent Application.
Penerapan Metode Kuantitatif untuk Mengetahui Peningkatan Kepuasan Customer Pada E-Commerce Tokopedia PT Lerys Pet Yuliana Trisna; Eva Zuraidah
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.166

Abstract

The purpose of this study was to determine the factors that influence the satisfaction of Tokopedia customers of PT Lerys Pet and to analyze the obstacles and how to overcome them. Especially with regard to the problems that occurred at PT Lerys Pet, namely customer ratings and opinions which greatly affect the rating on E-Commerce Tokopedia PT Lerys Pet, this negative review can tarnish the store's good name and lose trust. If this happens, it shows customer dissatisfaction with the store. So low sales cause small income, and low ratings in E-Commerce thereby reducing customer trust and satisfaction for shopping. This research was conducted by examining 4 variables including price, trustworthiness, product quality, and purchasing decisions. The research uses quantitative methods with data collection techniques carried out by literature studies and distributing questionnaires. While the data analysis technique is done by testing the validity and reliability test. Based on the results of the study, it was found that the validity test of the t arithmetic value of each variable was greater than t table (t arithmetic > t table) thus the data was declared valid with the lowest validity value of 3.410 and the highest 4.765. And the reliability test results Cronbach's Alpha value of 0.875 is greater than 0.70 with a total of 11. Because Cronbach's Alpha 0.875> 0.70 then the data is declared reliable.
Aplikasi Diagnosa Epliepsi dengan Metode Certainty Factor pada Rumah Sakit Umum Daerah Kota Pinang Febrianti Mandasari; Antoni; Tasliyah Haramaini
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.171

Abstract

In the development of computer technology, computer technology has become an inherent part of human life when it comes to solving a more complex problem in various areas, including education, health, etc. One of the applications of information technology in the health field is an expert system for the identification of epilepsy. An expert system is a computer system that wants to replicate the decision making ability of an expert in all aspects. Epilepsy is the second most common neurological disorder in humans following stroke. The shortage of epilepsy specialists and the lack of tools to deal with epilepsy requires a system that can help the problem in the form of an expert system using certainty factor method to ensure that there are no misdiagnosis and to assist doctors in diagnosing epilepsy in patients quickly. As a research type, explanatory research is used using primary and secondary data types, the data collection method used is the method of interviewing and literature studies and the method of certainty factor with front chain reasoning techniques. This application requires data on disease symptoms, certainty factors of expert value and certainty factors of patients to get a confidence level for epilepsy diagnosis. Based on the results of the study, it can be concluded that the system is capable of providing confidence values, can diagnose epilepsy based on the symptoms entered by the user, and can provide a solution for epilepsy.
Penerapan String Matching Menggunakan Algoritma Boyer-Moore Pada Pengembangan Sistem Pencarian Buku Online Yusuf Faqih; Yuri Rahmanto; Ahmad Ari Aldino; Budi Waluyo
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.172

Abstract

The Bayer Moore algorithm can be applied in online book searches with the aim of making it easier for elementary school students to high school students to find books they want to study or find out which subjects are being sought. In developing an online book search using the Bayer Moore algorithm, several stages of research are needed in a planned, regular, and systematic way. This research stage is the development of a research framework that will determine the success of a system. The stages of the Research and Development (R&D) method. The data collection used in this study is a collection of data obtained from crawling results using the PHP programming language. The Crawling data will later become a searchbox about a book that will be able to use Shopee, Tokopedia, and Gramedia links. The systematic procedure used to collect data is quantitative research methods. The implementation of quantitative research methods focuses on the use of numbers, tables, data, codes, rules and to display the results of the data obtained and will be used for data analysis materials on book search websites using the Boyer-Moore algorithm. Based on the results of research and testing results from the book search website using the Boyer-Moore method in php, the results obtained indicate that the program is declared feasible to use, because the associative rules formed and the resulting search value are the same as the output of the developed program.
Penentuan Siswa Berprestasi Dengan Penerapan Metode Analytical Hierarcy Process Feqo Putra Ajiansya; Ani Oktarini Sari
Bulletin of Computer Science Research Vol. 2 No. 3 (2022): Agustus 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i3.174

Abstract

Education plays a very important role in improving the quality of human resources and improving the standard of living of the Indonesian people, as well as the role of students. SDN Malaka Sari 04 (Elementary School) is a coaching task for students from the age of 7 years to help the development of students so that they are ready to go to the next level. SDN Malaka Sari 04 is an elementary school that also has good achieving students. Determining outstanding students at SDN Malaka Sari 04 using the criteria of knowledge value, skill value and attitude value. The problem in selecting outstanding students is that there is no method to determine the priority of many criteria and there is no weighting for each criterion. This results in inaccurate assessment results. SDN Malaka Sari 04 uses these criteria to determine whether the student is advancing to a grade or not. The system used is the analytical hierarchy process (AHP) method. Data was collected by means of interviews, observations and literature studies. From these results, it is obtained that the ranking scores for outstanding students include: Kelvin Apriansyah ranks 1 with a value (25.17%), Achmad Ibrahim ranks 2nd with a value (21.37%), Putri Fauziah occupies ranked 3rd with a value of (19.21%), Iftikhoirul Akhyar ranked 4th with a value of (18.16%), and lastly Tisya Farista ranked 5th with a score (16.09%). Data processing was carried out using one of the, namely the Analytical Hierarchy Process (AHP) method, with the result that Kelvin Apriansyah was determined as the best achieving student.
Perancangan Aplikasi Pengelolaan Keuangan Desa Melalui E-Village Budgeting Chairul Rizal; Supiyandi; Muhammad Amin
Bulletin of Computer Science Research Vol. 3 No. 1 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v3i1.181

Abstract

Bad governance or poor governance by some economic actors is one of the causes of the economic crisis in Indonesia. So that the emergence of public mistrust of government performance. To restore public confidence to the government, good governance is needed, one of which is the application of e-government. E-government is a form of information and communication technology by the government which can provide information and services to the public, business affairs, and matters relating to government. One of the results of the development of e-government is e-Village Budgeting. E-village budgeting is an online-based village budget management application in order to increase transparency and accountability of the village budget. One of the problems that often arises in the administration of village governance is related to the administrative system of village financial management that is not orderly, so that not a few that cause problems of irregularities in the use of the budget. This research will be designed a web-based application that can help make financial reporting easier. The application was made so that budgeting and development monitoring in remote villages are more transparent.

Page 3 of 21 | Total Record : 210