cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282365336853
Journal Mail Official
jurnal.bulletinds@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Data Science
ISSN : -     EISSN : 28079493     DOI : -
Bulletin of Data Science journal publishes manuscripts within the fields of: 1. Soft Computing, 2. Experts System, 3. Decision Support System, 4. Cryptography, 5. Big Data, 6. Data Mining, 7. Artificial Inteligence, and etc
Articles 57 Documents
Kombinasi Metode ROC dan Metode MAUT dalam Pemilihan Guru pada Madrasah Ibtidaiyah II, Ramadani; Pristiwanto, Pristiwanto; Hasan, Yasir
Bulletin of Data Science Vol 2 No 1 (2022): October 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Madrasah Ibtidaiyah Nurul Hidayah, Bandar Khalipah District, is one of the formal education infrastructure under the guidance of the Minister of Religion whose learning process is based on Islam at the elementary school level. This school is in need of Indonesian language teachers. The teacher is a teacher of a science and the teacher in general is a professional educator who has the main task of educating, directing, guiding, training, assessing, and evaluating his students, so in this case the author wants to help the school in the selection of Indonesian language teachers in Madrasah schools. Ibtidaiyah Nurul Hidayah, whose recruitment is still fairly manual. In this study the author has a solution and will solve the problem by applying the Rank Order Centroid (ROC) method and the Multy Attribute Utility Theory (MAUT) method, the author will combine the two methods to determine the best alternative in the selection of Indonesian language teachers in Madrasahs. Ibtidaiyah Nurul Hidayah. The results of the algorithm on the combination of the two methods show that Alternative 5 (A5) has the highest score of 0.832 and ranks 1, thus A5 is the best alternative that will be recommended for teacher selection at Madrasah Ibtidaiyah Nurul Hidayah. The application by combining the Rank Order Centroid (ROC) method and the Multi Attribute Utility Theory (MAUT) method can determine the best alternative in terms of teacher selection.
Sistem Pendukung Keputusan Seleksi Penerimaan Karyawan Baru dengan Menerapkan Kombinasi Metode ANP-TOPSIS Butar Butar, Roi Martin; Murdani, Murdani; Utomo, Dito Putro
Bulletin of Data Science Vol 2 No 1 (2022): October 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Acceptance of new employees at PT Exprvet Nasuba Medan is one of the routine activities carried out every year, in order to find reliable candidates. The problem that occurs is that the selection is still random, not objective and impure, because it is caused by a third party in the recruitment of new employees. So that the decisions taken can trigger a tendency towards subjectivity in one of the prospective registrants which results in brokering at the selection stage. To overcome this problem, a Decision Support System (DSS) was developed that used a combination of the ANP-TOPSIS method in selecting and accepting new employees by finding the best solution based on that method. In this study, the ANP was used to assign a weight to each criterion. The weight is calculated by the TOPSIS method of ranking. Based on the results of the ranking calculations obtained using a combination of the ANP-TOPSIS method. The highest score obtained based on alternative criteria and data, showing the highest preference value is Sukur Jaya Sinaga with an average score of 0.9182 as a rank 1, Hemansyah with an average value of 0.6666 as a rank 2. And Rudi Kesuma with an average score The average is 0.6648 ranking 3. So that it can be concluded from the results of the calculations of the two combinations of the ANP-TOPSIS method, that Sukur Jaya Sinaga is ranked first and the highest value is based on the results of the weighting of the ANP method and then calculated by the Topsis method for ranking.
Implementasi Metode MD2 Untuk Autentikasi Hasil Citra Rontgen (Ronsen) Harahap, Mahanum
Bulletin of Data Science Vol 2 No 2 (2023): February 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Implementation is considered as the main form and a crucial stage in the policy-making process or the implementation of a carefully and detailed plan, that without effective implementation, policy decisions will not be successfully executed. Implementation can also be interpreted as a series of actions carried out by various policy implementers with supporting means based on established rules to achieve predetermined goals. Authentication can also be interpreted as a very important thing in delivering information, both in the form of data or text messages. This is because authentication is needed for the authenticity of the contents of the data, with the existence of authentication, the use of authentication systems is expected to form a specific system in that field, one example is the implementation of X-ray image results where the authenticity of the data must be truly real with the results diagnosed by the doctor on the patient. The Message Digest Algorithm 2 (MD2) method can be interpreted as a cryptographic hash function developed by Ron Rivest in 1989, this algorithm is optimized using an 8-bit computer. MD2 is actually specified in RFC 1319 and the MD2 algorithm produces a hash value that is 18 bits in size and accepts input messages with an unspecified length. With this method, it is expected to solve problems that often occur in X-ray results so that the process of applying X-ray image results with doctor's diagnosis is tested for its authenticity value based on the MD2 method, then an application is built using the "Hasher Lite" application to prove the results of the whole process.
Penerapan Syaraf Tiruan Untuk Memprediksi Persediaan Barang Menerapkan Algoritma Elman Recurrent Neural Network Sitinjak, Tiur Dahlia
Bulletin of Data Science Vol 2 No 2 (2023): February 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Inventory management is an operational issue frequently faced by minimarkets. If the inventory level is too low and demand cannot be met due to insufficient stock, it will lead to customer disappointment, and there is a possibility that customers may not return. Similarly, if the inventory level is too high, it will result in losses for the minimarket, as they need to allocate more space, face potential depreciation of the value of goods, and incur additional costs related to inventory, such as maintenance and accounting expenses. The inventory problem at PT. Indomarco Prismatama arises from the current system used, which is based on the daily sales of each store. The daily sales data is sent to PT. Indomarco Prismatama through a link every day. As a result, the goods sent by the warehouse are based on the daily sales data provided. This needs to be improved to maximize the warehouse's performance in providing goods, especially items that need to be sent to each store with varying buying patterns specific to each store. To address the inventory management issues, a robust system is required to optimize the inventory at the warehouse. The proposed system is expected to accurately calculate the inventory at PT. Indomarco Prismatama by utilizing an artificial neural network employing the Elman Recurrent Neural Network (ERNN) algorithm.
Kombinasi Metode Discrete Cosine Transform Dan Convolutional Neural Network Dalam Mengidentifikasi Tingkat Kematangan Buah Mangga Berdasarkan Warna Purba, Riski Arnol; Pristiwanto, Pristiwanto; Sihite, A. M. Hatuaon
Bulletin of Data Science Vol 2 No 2 (2023): February 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The classification of mango fruit ripeness levels is currently predominantly done manually, which unfortunately has several drawbacks. One of the primary shortcomings is the lack of consistency in accuracy, often resulting in differences among operators conducting the sorting. On the other hand, in image classification processes, a combination of the Discrete Cosine Transform (DCT) and Convolutional Neural Network (CNN) methods is utilized. DCT is a technique commonly used in image processing, especially for image pictures. In this research, there is a proposal to merge the Discrete Wavelet Transform method with the Convolutional Neural Network (CNN). Currently, CNN is one of the methods that provides the most significant results in image recognition. CNN attempts to mimic the image recognition system in the human brain, particularly the visual cortex, allowing it to efficiently process image information. The DCT method is used to transform image data into a frequency image form, which is subsequently employed in feature extraction in the Deep Neural Networks classification method. The research results indicate that the combined method of Discrete Cosine Transform and Convolutional Neural Network achieves the highest accuracy rate of 93.33% in classifying mango fruit ripeness levels. This outcome demonstrates significant potential for automating the mango ripeness classification process with high accuracy, overcoming the inconsistencies associated with manual approaches.
Deteksi Ketinggian Air Pada Citra Screenshot Dengan Menerapkan Metode Template Matching Purwati, Rima
Bulletin of Data Science Vol 2 No 2 (2023): February 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The current development of digital technology significantly impacts our daily lives. One prominent change is the digitization of image data, altering how we interact with the world around us. Digital technology enables digital media users to utilize image processing as an intelligent solution to tackle various challenges. A critical aspect of this technological application pertains to water level detection, particularly relevant in household water storage. Water storage serves as a pivotal element in storing clean water reserves to meet daily needs. Ensuring an adequate and high-quality water supply within these storage systems is a top priority. However, difficulties arise when attempting to monitor water levels, especially at night when illumination is minimal. To overcome this obstacle, innovative techniques for water detection and recognition are employed to accurately measure water levels during nighttime, aided by easily deployable IP camera technology. One efficient method involves template matching techniques. This innovation serves as a tangible example of how technological advancements, particularly in image processing, can bring about positive changes in managing and monitoring water availability in a household context. Consequently, technology plays a crucial role in meeting daily water needs more effectively, ensuring an ample water supply within the household environment.
Penerapan Algoritma SHA-384 Pada Aplikasi Duplicate Video Scanner Hanafiah, Muhammad
Bulletin of Data Science Vol 2 No 2 (2023): February 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cryptography is used to maintain the security of private information from anyone except those with the authority or secret keys to access encrypted information. However, with the rapid advancement of computer technology, challenges to information security are increasing. Video manipulation is one of the serious threats in the digital world today. Video manipulation is a common phenomenon where individuals can easily manipulate videos with harmful intent or to confuse others. One of the most dangerous types of video manipulation is the duplicate video scanner, in which a fake video is created to resemble the original video in many aspects, including color, shape, objects, and content, without significant changes from other parties. This can deceive many viewers and cause significant losses. In this research, the author proposes the use of the SHA-384 algorithm as a method to detect duplicate video scanners. This algorithm is used to generate a unique signature or hash from video data, which is then used to verify the authenticity of the video. The results of this research have great potential in addressing serious issues related to video manipulation. The ability to distinguish real videos from fake ones has a significant impact in various fields, including law, security, and information integrity. This research provides an effective solution to ensure video authenticity and can help combat the increasing fraud and manipulation in a complex digital environment.
Sistem Pendukung Keputusan Pemilihan Pembersih Wajah Terbaik Dengan Menerapkan Metode ELECTRE Handayani, Tuti
Bulletin of Data Science Vol 2 No 3 (2023): Juni 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Facial cleanser is one type of skincare product used to remove residual dirt and dust that adheres to the skin. Additionally, it serves to cleanse and refresh the skin. The face is an external part of the body that never escapes the attention of individuals, especially women, who are concerned with beauty. The face is a source of attraction and boosts the confidence of anyone with beautiful and appealing skin. Various skincare products, with a wide range of choices, are preferred by many women to achieve radiant, beautiful, and fair skin. The use of a decision support system to make informed choices is expected to address the challenges faced by both women and men when selecting facial cleansers. In this Decision Support System, the researcher applies the Electre method. Based on the calculation of recommended assessment criteria fed into the system, the selection of the best facial cleanser is determined by calculating the priority weights for alternative choices of facial cleansers.
Implementasi Algoritma Multi Group Huffman Untuk Kompresi File Video Nurjanah, Nisa
Bulletin of Data Science Vol 2 No 3 (2023): Juni 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technology is developing very rapidly along with the needs of society in obtaining information quickly. Information and communication technology has become an important part in processing data. Activities that were once manual, can now be processed using a computer so that it can save time and the resulting level of accuracy is much higher. One example of using a computer is processing video file data, this video file has a size large enough to require large storage media, for that data compression is very important because it reduces data storage requirements, speeding up data transmission. So the author developed a new system as an alternative with the help of a computer that has been equipped with the system. The author also uses Microsoft Visual Studio 2010 programming as a data processor in the compression process. In the research, the implementation process was carried out using this method for the video file compression process, this method will also help alleviate the challenges of using video files when storing or distributing in large capacities, this of course will greatly burden the computer in memory capacity, even when distribution becomes difficult. very slow and ineffective.
Penerapan Algoritma Block Cipher Odd-Even Confusing Key (OE-CK) Pada Aplikasi Pengamanan Video Kartini, Dian Wahyuni; Ginting, Garuda; Ndururu, Eferoni
Bulletin of Data Science Vol 2 No 3 (2023): Juni 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem that exists in the scope of the video is where the video that is privacy in nature can be watched by unauthorized people if the video file is without security. If there is a breach and theft of information on an important data in a video file, it will be detrimental to the interested parties. Therefore, an application system is needed to be able to secure the video file. To minimize this, a second level of security is needed, namely by scrambling the video so that visual information from the video cannot be seen by people without keys. Then the information in the video file is changed in the form of a code or signal where this code will be manipulated. Through the process of securing video files using the odd-even confusing key (OE-CK) block cipher algorithm, it is hoped that in the future this system can have a major effect on the security of video files from unauthorized breaches.