cover
Contact Name
Eman Sulaiman
Contact Email
emans.aero@gmail.com
Phone
+6285222147610
Journal Mail Official
admin@ptbegin.com
Editorial Address
Jl. Pekalipan Selatan No 16. Cirebon
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Journal of Computation Science And Artificial Intelligence
ISSN : -     EISSN : 30324653     DOI : https://doi.org/10.58468/
The Journal of Computation Science and Artificial Intelligence (JCSAI) is a double-blind peer-reviewed journal devoted to publishing original scientific articles on research and development in all fields of Computer Applications. Computational Science is a rapidly growing multi- and interdisciplinary field. It develops mathematical and computational models and uses advanced computing techniques to simulate these models, driven by data. Its overarching goal is to understand and solve complex problems. It has reached a level of predictive and interventional capability that now firmly complements the traditional pillars of experimentation and theory. The recent advances in experimental techniques have opened up new windows into physical and biological processes at many levels of detail. The resulting data explosion allows for detailed data-driven modeling and simulation which is no longer feasible using traditional analytical approaches alone. This new discipline in science combines computational thinking, modern computational methods, devices and collateral technologies to address problems far beyond the scope of traditional numerical methods. Journal of Computation Science and Artificial Intelligence (JCSAI) is a fully open access, international journal that aims to provide academia and industry with a venue for rapid publication of research manuscripts reporting innovative computational methods and applications to achieve a major breakthrough, practical improvements, and bold new research directions within a wide range of Computer applications. The objective of this journal is to communicate recent and projected advances in computer-based engineering techniques, with an emphasis on research and development leading to practical problem-solving. It will reflect the significant advances that are currently being made in computer science. The multidisciplinary character of this field will be typified by providing the readers with a broad range of articles. The Journal also provide an active forum for the dissemination of results in both research and advanced practice in computational engineering, to promote rapid communication and exchange between computer scientists, computational engineers and software developers. The journal especially encourages papers from new emerging and multidisciplinary areas, as well as papers reflecting the international trends of research and development aimed at a general computer science audience seeking a full and expert overview of the latest developments across computer science research. The journal is to keep related researchers updated on the developments in a wide range of topics reporting experiments, techniques and ideas that advance the understanding of various areas of computer science. Papers are solicited from, but not limited to the following topics: Ad-hoc, Mobile, Wireless Networks Approaches for Cloud/Fog/Edge computing Artificial Intelligence Automation and Mobile Robots Biometrics Communication Protocol Computational Intelligence Computer Application and Information Technology Computer Graphics and Computer Aided design Computer Networks and Communications Computer Vision and Pattern Recognition Cryptography and Computer Security Data Science & Machine Learning Data Warehouse & Data Mining Database Management Systems Design & Analysis of Algorithms Distributed computing Engineering software development Evolutionary Computing Expert and Decision Support Systems Fuzzy Computing Fuzzy Logic and Approximate Reasoning Genetic Algorithms and Modelling Hardware and architecture High-Performance Computing Human-Computer Interaction Human-Machine Interface IDS/Firewall, Anti-Virus Issues Image Processing and Computer Vision Systems Information and Communication Technology Information security Information Systems Intelligent Systems Internet of Things (IOT) Language and Search Engine Design Mobile Computing Multimedia and graphics Network Evolution Network Optimization Neuro Computing Parallel & distributed computing Quantum and Cloud Computing Signal/Image Processing Soft Computing Security Software Engineering education Software Engineering for AI systems Stochastic Models & Reinforcement Learning Systems Integration Virtual Reality Virtualized systems Vision/Pattern Recognition Visualization techniques Wireless Sensor Networks Computational science typically unifies three distinct elements: Modeling, Algorithms and Simulations (e.g. numerical and non-numerical, discrete and continuous); Software developed to solve science (e.g., biological, physical, and social), engineering, medicine, and humanities problems; Computer and information science that develops and optimizes the advanced system hardware, software, networking, and data management components (e.g. problem solving environments). The topics are included but are not necessarily restricted to:- Full-length original research papers of significant contributions Comprehensive and in-depth reviews on emerging techniques and methodologies Short communications on novel perspectives and breaking advancements in Computer applications. Tutorial survey type papers reviewing some fields of Computer Science and Engineering. Technical notes on projects, codes and standards are also welcomed.
Articles 6 Documents
Search results for , issue "Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)" : 6 Documents clear
PENGAMANAN FILE DIGITAL MENGGUNAKAN METODE ALGORITMA KRIPTOGRAFI RIJNDAEL Muhammad Erwanto; Sandi Fajar Rodiansyah; Yudha Pradita Putra
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/aabjbs17

Abstract

Rijndael termasuk dalam jenis algoritma kriptografi yang sifatnya simetri dan cipher block. Dengan demikian algoritma ini mempergunakan kunci yang sama saat enkripsi dan dekripsi serta masukan dan keluarannya berupa blok dengan jumlah bit tertentu. Rijndael mendukung berbagai variasi ukuran blok dan kunci yang akan digunakan. Namun Rijndael mempunyai ukuran blok dan kunci yang tetap sebesar 128, 192, 256 bit. Pemilihan ukuran blok data dan kunci akan menentukan jumlah proses yang harus dilalui untuk proses enkripsi dan dekripsi.  Blok-blok data masukan dan kunci dioperasikan dalam bentuk array. Setiap anggota array sebelum menghasilkan keluaran ciphertext dinamakan dengan state. Setiap state akan mengalami proses yang secara garis besar terdiri dari empat tahap yaitu, AddRoundKey, SubBytes, ShiftRows, dan MixColumns. ABSTRACT Rijndael, including the type of cryptographic algorithms that are symmetry and  block cipher. Thus these algorithms use the same key when the encryption and decryption as well as inputs and outputs in the form of a block with a certain number of bits. Rijndael supports a wide variety of block sizes and key to be used. However Rijndael block size and the key has fixed at 128, 192, 256 bits. Selection of data block size and the key will determine the number of processes that must be passed to the encryption and decryption process. Blocks of data input and key operated in the form of an array. Each member of the array before generating the output ciphertext is called the state. Each state will undergo a process generally consists of four phases, namely, AddRoundKey, SubBytes, ShiftRows, and MixColumns.
IMPLEMENTASI JARINGAN VPN METODE L2TP SEBAGAI JARINGAN PENUNJANG PEKERJA LAPANGAN PT ALBANY CORONA LESTARI CABANG CIREBON Apan Apriyadi; Faisal Akbar; Mukidin
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/sws42642

Abstract

PT Albany Corona Lestari merupakan anak perusahaan dari PT Indomarco Prismatama yang berfokus pada support toko Indomaret dalam hal kelistrikan, jaringan, perangkat keras, dan pelatihan karyawan toko. PT Albany Corona Lestari memiliki pekerja di kantor dan lapangan. Dalam bekerja, pekerja lapangan berpatokan pada website Complaint Online untuk memeriksa daftar komplain yang masuk, dan ESS (Employe Self Service) untuk absen, input izin, dan cuti. Permasalahan dalam akses ke website Complain Online dan ESS menjadi penghambat dalam bekerja, karena website hanya tersedia dalam jaringan lokal kantor dan jaringan lokal toko Indomaret, sehingga tidak dapat diakses melalui jaringan publik (internet). Masalah tersebut dapat diatasi dengan menggunakan VPN (Virtual Private Network) agar perangkat pekerja lapangan seperti laptop dan smartphone dapat mengaksesjaringan lokal kantor dan membuka website Complaint Online dan ESS (Employe Self Service) dari mana saja dan kapan saja. VPN yang digunakan pada penelitian ini adalah L2TP (Layer 2 Tunneling Protocol) dengan ditambah IPSec (Internet Protocol Security) sebagai keamanan tambahan. Jaringan VPN L2TP yang telah terpasang dianalisa dengan parameter Quality of Service (Qos) untuk menilai Throuhput, Delay, Jitter, dan Packet Loss. Hasil dari penelitian ini adalah koneksi VPN yang stabil dan aman serta mendapatkan nilai Quality of Service yang baik. ABSTRACT PT Albany Corona Lestari is a subsidiary of PT Indomarco Prismatama which focuses on Indomaret store support in terms of electricity, network, hardware, and store employees. PT Albany Corona Lestari has workers in the office and field. In working, field workers rely on the Complaint Online website to check the list of incoming complaints, and ESS (Employe Self Service) for absences, input permits, and leave. Problems in accessing the Complain Online and ESS websites are an obstacle in working, because the website is only available in the local office network and the local Indomaret store network, so it cannot be accessed via the public network (internet). This problem can be overcome by using a VPN (Virtual Private Network) so that field worker devices such as laptops and smartphones can access the local office network and open the Complaint Online and ESS (Employe Self Service) websites from anywhere and anytime. The VPN used in this study is L2TP (Layer 2 Tunneling Protocol) with the addition of IPSec (Internet Protocol Security) as additional security. The installed L2TP VPN network is analyzed with Quality of Service (Qos) parameters to assess Throuhput, Delay, Jitter, and Packet Loss. The results of this study are a stable and secure VPN connection and get a good Quality of Service value.
SISTEM INFORMASI GEOGRAFIS PEMETAAN WILAYAH PEMBUDIDAYAAN IKAN PADA KABUPATEN CIREBON MENGGUNAKAN METODE ALGORITMA A* (A STAR) Fahmi; Igen Meyasha; Syahdan Gymnastiar
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/mn1ebz66

Abstract

Sistem Informasi Geografis merupakan sistem informasi yang modern yang efektif digunakan untuk membuat peta dan memberikan informasi, sehingga mudah dalam pengambilan keputusan. SIG pada penelitian ini digunakan dalam memetakan persebaran wilayah pembudidayaan ikan yang terdapat di Kabupaten Cirebon. Tujuan SIG ini adalah untuk mengetahui informasi akan letak wilayah pembudidayaan ikan di Kabupaten Cirebon, sehingga dapat membantu pemerintah khususnya Dinas Kelautan dan Perikanan Kabupaten Cirebon dalam melakukan kegiatan penyuluhan. Dalam hal ini SIG yang digunakan adalah metode Algoritma A* dimana metode ini memberikan keputusan jarak terdekat ke suatau tujuan yang kita inginkan. Abstract D Geographical Information System is a modern information system that is effectively used to make maps and provide information, making decision making easy. GIS in this study was used in mapping the distribution of fish cultivation areas in Cirebon Regency. The purpose of this GIS is to find out information about the location of fish cultivation areas in Cirebon Regency, so that it can help the government, especially the Office of Marine and Fisheries of Cirebon Regency in conducting extension activities. In this case the GIS used is the A * Algorithm method where this method provides the closest decision to the destination we want.
SMART CCTV UNTUK MEMONITORING KEMANAN RUANGAN MENGGUNAKAN RASPBERRY PI DI RUMAH MAKAN WAROENG KAMPOENG JEPUN KOTA CIREBON Ilman Kadori; Asep Kosasih; Bagus Pamungkas
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/hs7s7e20

Abstract

Penelitian ini di buat bertujuan untuk memudahkan pihak rumah makan dalam meningkatkan pelayanan maupun keamanan untuk memberikan rasa nyaman kepada pelanggan, serta diharapkan mampu menghemat waktu maupun tenaga. Sistem ini menggunakan  Raspberry Pi dimana raspberry merupakan mikro komputer yang memiliki spesifikasi seperti komputer pada umumnya, sehingga mampu menciptakan suatu sistem pemantau keamanan yang canggih namun dengan biaya yang sangat terjangkau. Dari uraian masalah diatas, penulis mengkaji sebuah sistem yang diharakan mampu memberikan solusi terbaik sebagai sistem pemantau keamanan menggunakan Raspberry Pi, dimanan Raspberry Pi  merupakan komputer papan tunggal (single-board circuit; SBC) yang seukuran dengan kartu kredit yang dapat digunakan untuk menjalankan program perkantoran, permainan komputer, dan sebagai pemutar media hingga video beresolusi tinggi. Hasil dari penelitian ini adalah sistem Smart CCTV yang dapat memfoto dan merekam secara otomatis ketika terjadi gerakan pada suatu area yang dipantau di R.M Waroeng Kampoeng Jepun Kota Cirebon. Sistem ini diharapkan mampu meningkatkan sistem keamanan dan meningkatkan rasa nyaman bagi pelanggan.   ABSTRACK This Research aims to make it easier for the restaurant to improve service and security to provide comfort to the customer, and is expected to save time and effort. The system uses a Raspberry Pi micro-computer where raspberries that have specifications such as computers in general, so as to create a sophisticated security monitoring system but at a very affordable cost. From the description above problems, the authors examine a system that diharakan able to provide the best solutions as the system monitors the safety of using Raspberry Pi, where N Raspberry Pi is a single board computer (single-board circuit; SBC) which is about the size of a credit card that can be used to run office programs , computer games, and as a media player up to high-resolution video. The results of this study are Smart CCTV system that can capture and record automatically when motion occurs in an area that is monitored in R.M Waroeng Kampoeng Japanese city of Cirebon. The system is expected to improve system security and improve comfort for customers.
ALGORITMA NAÏVE BAYES CLASSIFIER UNTUK MENGETAHUI PREDIKSI PENGGUNAAN KARTU INTERNET INDOSAT PADA PT. SAKALAGUNA SEMESTA Susi Widyastuti; Kosim; Nurul Renita Febrisya
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/tcp39749

Abstract

Kartu perdana internet pada saat ini menjadi hal yang populer di berbagai kalangan masyarakat Dalam menghasilkan suatu produk yang sama atau sejenis dengan kualitas dan mutu yang baik, hal ini yang membuat perusahaan berlomba-lomba untuk mengetahui keinginan dan kebutuhan para konsumen agar menghasilkan kartu perdana internet yang banyak diminati konsumen. Prediksi penggunaan kartu internet dengan minat konsumen akan sangat penting bagi perusahaan, dimana dengan adanya prediksi penggunaan minat konsumen perusahaan dapat mengambil suatu keputusan atau strategi yang benar dan tepat bagi konsumennya. Proses memprediksi menggunakan perhitungan metode algoritma naïve bayes classifier. Hasil output dalam aplikasi ini berupa visualisasi informasi pengelompokan jenis kartu internet indosat berdasarkan data kartu internet Indosat, diharapkan mampu untuk menentukan prediksi penggunaan serta dapat menentukan produk kartu internet indosat terunggul. Abstract Internet starter cards are currently popular among various groups of people. In producing the same or similar products with good quality and quality, this is what makes companies compete to find out the desires and needs of consumers in order to produce internet starter cards that are in great demand by consumers. Predicting the use of internet cards with consumer interest will be very important for the company, where with the prediction of consumer interest usage, the company can make a decision or strategy that is right and appropriate for its consumers. The prediction process uses the naïve bayes classifier algorithm method calculation. The output results in this application are in the form of visualization of information on grouping types of Indosat internet cards based on Indosat internet card data, which is expected to be able to determine usage predictions and determine the best Indosat internet card products.
KOMBINASI ALGORITMA BASE64 DAN CAESAR CHIPHER UNTUK KEAMANAN DATA PENYANDANG DISABILITAS PADA DINAS SOSIAL PEMBERDAYAAN PEREMPUAN DAN PERLINDUNGAN ANAK (DSPPPA) KOTA CIREBON Wahyu Ariandi; Yuhano; Naufal Imaanullah
Journal of Computation Science and Artificial Intelligence (JCSAI) Vol. 2 No. 1 (2025): Journal of Computation Science And Artificial Intelligence (JSCAI)
Publisher : PT. Berkah Digital Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58468/hmcjj597

Abstract

Keamanan merupakan aspek penting dari suatu data atau informasi, dimana pengiriman data atau informasi membutuhkan keamanan yang tinggi. ada beberapa cara untuk melakukan pengamanan data ataupun pesan, diantaranya adalah dengan menggunakan teknik kriptografi. Kriptografi merupakan seni dan ilmu memproteksi data atau informasi. terdapat dua konsep yang sangat penting yaitu, enkripsi dan dekripsi. Dinas Sosial, Pemberdayaan Perempuan dan Perlindungan Anak (DSPPPA) Kota Cirebon merupakan organisasi perangkat daerah. penelitian ini dilakukan untuk mengolah data disabilitas, dimana pengolahan data masih menggunakan cara manual dan belum data sistem untuk keamanan data disabilitas, yang dimana dalam hal ini yang akan diamankan yaitu berupa nama dan NIK. sistem keamanan data pada penelitian ini menggunakan metode Base64 dan Caesar Chipher. Algoritma Base64 merupakan teknik enkripsi suatu data ke format ASCII yang didasarkan pada bilangan 64, sedangkan algoritma Caesar Chipher merupakan teknik enkripsi yang berjenis subtitusi pengimplementasian pengamanan data tersebut dapat memproteksi data yang dimiliki oleh Dinas Sosial, Pemberdayaan Perempuan dan Perlindungan Anak (DSPPA) Kota Cirebon dari tindak kejahatan siber. Data yang telah melewati 2 kali proses enkripsi akan menghasilkan data acak berupa kombinasi huruf, angka, dan simbol. Abstract-Security is an important aspect of data or information, where sending data or information requires high security. There are several ways to secure data or messages, including using cryptography techniques. Cryptography is the art and science of protecting data or information. There are two very important concepts, namely, encryption and decryption. The Office of Social Affairs, Women's Empowerment and Child Protection of Cirebon City is a regional apparatus organization. This research was conducted to process disability data, where data processing still uses manual methods and there is no system data for disability data security, which in this case will be secured in the form of names and NIK. The data security system in this study uses the Base64 and Caesar Chipher methods. The Base64 algorithm is a data encryption technique to ASCII format which is based on the number 64, while the Caesar Chipher algorithm is an encryption technique that is of the substitution type for implementing data security to protect data owned by the Cirebon City Social, Women's Empowerment and Child Protection Service from cyber crime. Data that has passed 2 times the encryption process will generate random data in the form of a combination of letters, numbers, and symbols.

Page 1 of 1 | Total Record : 6