cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282365336853
Journal Mail Official
jurnal.bulletinds@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Data Science
ISSN : -     EISSN : 28079493     DOI : -
Bulletin of Data Science journal publishes manuscripts within the fields of: 1. Soft Computing, 2. Experts System, 3. Decision Support System, 4. Cryptography, 5. Big Data, 6. Data Mining, 7. Artificial Inteligence, and etc
Articles 5 Documents
Search results for , issue "Vol 3 No 3 (2024): June 2024" : 5 Documents clear
Pengamanan Pesan Teks Terenkripsi Algoritma AES yang Disembunyikan kedalam Citra Menggunakan Algoritma Gifhsuffle Octariza, Hary
Bulletin of Data Science Vol 3 No 3 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletinds.v3i3.6323

Abstract

The advancement of information systems in the field of computer science and telecommunications is growing and advancing rapidly. Computer technology is needed for office or personal work to be faster, data exchange is easier to do. Data can be in the form of messages in the form of text, images, audio or video. Data that is private and confidential cannot be known by the public or published. The combination of cryptographic techniques and steganographic techniques can increase the security of text messages so as to minimise the occurrence of text message damage that can be done by irresponsible parties and harm the owner of the text message. The AES algorithm is an algorithm that can perform cryptographic techniques, while the Gifhsuffle algorithm is an algorithm that can perform steganographic techniques. This research uses the AES algorithm for the encryption and decryption process and uses the Gifhsuffle algorithm for the encoding and decoding process. A file containing a message will be encrypted using the AES algorithm to produce a ciphertext followed by hiding it in a GIF-formatted image file using the Gifhsuffle algorithm encoding process to produce a Stego Image. This process can increase the security of the message and make it difficult for irresponsible parties to find the message.
Penerapan Metode Moora Pada Sistem Pendukung Keputusan Pemilihan Leader SPG Br. Gm, Merry Oktaviani
Bulletin of Data Science Vol 3 No 3 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletinds.v3i3.6325

Abstract

To improve the performance of companies engaged in services or manufacturing where companies can compete well at regional, national and even international levels by having competitive human resources (HR). Competitive HR employees who can work productively and professionally to achieve the vision, mission and goals of the company. The quality of SPG leader selection is recorded in the employee performance track record, the results of the track record are in the form of SPG leader selection results that have an important role for the company in making decisions in improving the company's HR including identifying the needs of educational development, training, recruitment, selection, promotion, mutation, demotion, leader, reward and punishment. The solution to the above problems is to use a Decision Support System to help determine the selection of SPG leaders, the method used to support solving the above problems is the Multi-Objective Optimization on the basis of Ratio Analysis (MOORA) method, namely by giving weight to each existing alternative. Decision Support System is an interactive system, helping decision making through the use of data and decision models to solve problems that are semi-structured or unstructured. In solving the above problem, you can use Visual Basic programming to determine the weight value of all the SPG leader selection criteria.
Implementasi Teknik Enkripsi Menggunakan Algoritma XXTEA (Corrected Block Tiny Encryption Algorithm) Untuk Penyandian Record Data Pada Database Rahmadani, Cici
Bulletin of Data Science Vol 3 No 3 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletinds.v3i3.6328

Abstract

In this computer era, many schools still implement conventional exam systems or exams using leaflets for their students, not a few of the teachers still make their answer keys using paper or put them in files, of course this will be very vulnerable to leaks and anyone will easily find out. Seeing the vulnerability of the answer key, the school or teachers must act so that there are no unwanted incidents, therefore the answer key sheets that are easy to find out must be immediately secured from irresponsible people by using cryptography techniques. Security techniques using cryptography are very appropriate for this, because cryptography is the science or art of security in cryptography there are many algorithms that can change clear text into ciphertext or encrypted messages that are only known by certain people so that the answer key cannot be easily read by irresponsible people.
Kombinasi Metode SAW dan WASPAS dalam Menentukan Mekanik Terbaik Surianto, Dedi
Bulletin of Data Science Vol 3 No 3 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletinds.v3i3.6329

Abstract

The problem that occurs in the Arena workshop is that the process of selecting the best mechanics still uses conventional methods, namely by looking at the performance of the entire mechanic without calculating the values ​​or weights of each selected mechanic criteria. Of course, this method makes the selection process less accurate and less fast. Therefore, to facilitate the Arena Workshop in the process of selecting the best mechanic, a system is needed that can select and determine decisions quickly and accurately. A reliable system is the Decision Support System. The decision support system uses the SAW and WASPAS methods. The combination of the SAW method is carried out to find the matrix normalization value, and the WASPAS method is used to find the best mechanic ranking. Based on the test results with 10 samples of mechanic names, it was found that the mechanic with the A4 alternative managed to get the highest ranking value, which was 49.054 and the lowest was A10 with a value of 30.75.
Optical Character Recognition Menggunakan Jaringan Syaraf Tiruan dengan Algoritma Perseptron Rambe, Gusni Sari
Bulletin of Data Science Vol 3 No 3 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletinds.v3i3.6330

Abstract

The development of technology today has greatly influenced the development of science, one of which is in the recognition of letter, number and character patterns (pattern recognition). The problem that arises is that each character in the computer or the result of a pattern scan entered into the computer must have a different character pattern recognition, this results in limited human ability to clarify or describe a pattern based on quantitative measurements of the main features or properties of a pattern of letters, numbers and characters. To overcome existing problems, Artificial Neural Networks (ANN) are a tool for solving problems, especially in areas involving grouping and pattern recognition, in general, Artificial Neural Networks have a system that is able to think, consider the actions to be taken, and make decisions like humans. Through the process of character pattern recognition using the Perceptron algorithm, it is hoped that in the future this character recognition system can have a major impact on character recognition that is not in the computer and can make it easier for users to recognize characters and it is also hoped that this algorithm can be used for other objects that will be pattern recognition.

Page 1 of 1 | Total Record : 5