cover
Contact Name
Adi Widarma
Contact Email
adiwidarma@unimed.ac.id
Phone
+6285275945045
Journal Mail Official
journal_cess@unimed.ac.id
Editorial Address
UPT TIK Universitas Negeri Medan Jl. Willem Iskandar pasar V Medan Estate, Medan 20221
Location
Kota medan,
Sumatera utara
INDONESIA
CESS (Journal of Computer Engineering, System and Science)
ISSN : 25027131     EISSN : 2502714X     DOI : https://doi.org/10.24114/cess
Core Subject : Science,
CESS (Journal of Computer Engineering, System and Science) contains articles on research results and conceptual studies in the fields of informatics engineering, computer science and information systems. The main topics published include: 1. Information security 2. Computer security 3. Networking & Data communication 4. Cloud & grid computing 5. Mobile Computing & Applications 6. Artificial Intelligence 7. Decision Support System 8. Data Minig 9. Other topics related to information technology
Articles 515 Documents
Comparasion KNN, Decision Tree and Naïve Bayes for Sentimen Analysis Marketplace Bukalapak Elisa Nathania Halim; Baenil Huda; Anggi Elanda
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.41385

Abstract

The number of platforms currently makes it easier for users to provide reviews, one of which is the Bukalapak application on the Google Play Store. While both negative and positive reviews can influence the value of the app, users can also be affected by the app's sentiment reviews. Therefore it is necessary to carry out sentiment analysis to classify negative and positive reviews. This research uses review data of 1000 reviews and then classifies them using the RapidMiner application using three methods, namely KNN, Naive Bayes, and also the Decision Tree. The results of the KNN method obtained accuracy values of 85.03%, precision of 84.98%, and recall of 100.00%, then for the Naive Bayes method obtained accuracy values of 73.95%, precision of 100.00%, and recall of 69.26%, and for the Decision Tree method obtained 89.12% accuracy value, 88.62% precision, and 100.00% recall. this can prove that the Decision Tree method is superior to the KNN method and also the Naive Bayes method.
Activation Control System in Motorized Vehicles Using the Global Positioning System (GPS) Aris Budiyarto; Abdur Rohman Harits Martawireja; Mohammad Harry Khomas Saputra; Gun Gun Maulana
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.39663

Abstract

In Indonesia, the theft rate is still quite high. According to Bappeda data, cases of theft still tend to be high. In 2019, there were 362,000 cases of theft. CCTV use is still ineffective because at the time of the theft of goods, we only know the goods taken and the perpetrators. In order to catch the perpetrators and return the goods, it is necessary to process them first and find the location of the perpetrators themselves. Therefore, we propose an idea entitled "Activation Control System in Motorized Vehicles Using GPS". Where this tool will detect the position of a vehicle so that this vehicle remains in a restricted area. When this vehicle leaves the restricted area, the GPS system will send a signal explaining that the vehicle is leaving the area. So, if there is a theft, when the vehicle has moved away from about 50 meters from the area that has been locked, a notification will appear which will be displayed on the web application. The research stages that we will work on are first identifying the equipment and systems that will be used and conducting a study of the technology literature that will be developed, then identifying the theoretical and empirical system design and knowing the basic elements. Then master and understand the characterization of components and analyze the main functions so that they can work properly. Then do modelling and simulation and ensure that the components to be developed can work properly. And the final stage is to ensure that the system equipment is valid and reliable. Based on the results of the study, it shows that the system is active when the actual position away from the locked position/area as far as 100 meters has successfully functioned. Where the information changes to "Out of reach" from the previous "Within Reach" and there are notifications in the form of sound and vibration to increase security from theft.
Application of Virtual Assistant in Information System for Student Practicum Case Study Laboratory Informatics Department Siliwangi University Cecep Muhamad Sidik Ramdani; Andi Nur Rachman; Euis Nur Fitriani Dewi
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.39365

Abstract

Practical activities are carried out in an orderly and timely manner and require systematic recording of activities. The implementation of practicum activities takes place in the Siliwangi University laboratory, to create conducive conditions for practicum activities, a system must be able to support academic success. Not only that, due to the COVID-19 pandemic, previous practicum lectures were held offline and campus policy required online learning. These problems can be overcome by building a logbook information system that can record and keep records of laboratory activities automatically. This information system was created using the Extreme Programming system development method. Starting from database design, system design with UML, system development with Visual Studio. NET 2021. This technology can be used by universities for practical activities at the Siliwangi University Laboratory. The application will remind students to complete each activity in each session by displaying notifications in each practicum schedule, rewards, announcements, and other information related to practicum activities. All activities must be recorded in the application. Based on the results of black box testing, the system can run according to the system test design that the response from each student to the application used is 75.68% which can be concluded that the application of virtual assistant is in the interesting category.  
Implementation of the Association Rule Method using Apriori Algorithm to Recognize The Purchase Pattern of Pharmacy Drugs “XYZ” Fadhila Putri Utami; Arief Jananto
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40377

Abstract

XYZ Pharmacy is a Special Health Service Point for employees and retirees of the XYZ company. This pharmacy carries out the process of buying and selling drugs by providing various types of drugs. The number of sales transactions in each day, resulting in sales data will increase over time. If the data is left alone, the pile of data will only become archives that are not utilized. By carrying out the data mining process, this data can be used to produce information that can be used to increase sales transactions at XYZ Pharmacy. The method used in this study is the Association Rule which functions to analyze the most sold and purchased drugs simultaneously, this analysis will be reviewed from drug sales transaction data at the XYZ Pharmacy. The application of the a priori algorithm in this study succeeded in finding the most item combinations based on transaction data and then formed an association pattern from the item combinations. By knowing the types of drugs that are often purchased together through identification of purchasing patterns, it is very useful for the XYZ Pharmacy to maintain the availability of the drugs.
Forecasting COVID-19 Cases in Indonesia, Malaysia, Philippines, and Vietnam Using ARIMA and LSTM Marina Wahyuni Paedah; Fergyanto E. Gunawan
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.41209

Abstract

COVID-19 has severely impacted the global economy, including ASEAN countries. Various plans and strategies are still needed during the pandemic-to-epidemic transition period to minimize the risk of COVID-19 transmission. The research focuses on the total number of confirmed cases of COVID-19 in Indonesia, Malaysia, the Philippines, and Vietnam, which are among the ASEAN countries with the highest number of cases in Southeast Asia. Those countries have cultural similarities, where gathering with friends and family is an important part of social life. This research evaluates the ability of ARIMA and LSTM to predict COVID-19 cases in each country, using daily data from January 23, 2020 to October 22, 2022. Datasets published by Johns Hopkins University (JHU) and Our World in Data (OWID) are used, which are accessible through Github. Compared to ARIMA with  R2 of 0,8883 for Indonesia, 0,8353 for Malaysia, 0.97291 for the Philippines, and -3.105 for Vietnam, LSTM model can predict better in the four sampled ASEAN countries, with an R2 of 0.9996 for Indonesia, 0.9707 for Malaysia, 0.97291 for the Philippines, and 0.9200 for Vietnam.
SARS-CoV-2 Detection from Lung CT-Scan Images Using Fine Tuning Concept on Deep-CNN Pretrained Model Simeon Yuda Prasetyo
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40897

Abstract

The problem of the spread of COVID-19 (SARS-CoV-2) is spreading fleetly and worldwide. Beforehand discovery and opinion of complaint is veritably important to ensure the right remedy so that it needs to be enforced through various practical approaches. In former studies, complaint discovery through medical imaging has started to appear and get a good delicacy of around 80 to 90 percent using machine learning. In the deep learning era, some trials get better accuracy of 95 percent using the traditional deep learning approach. Now, deep learning has developed more fleetly, especially for image classification. therefore, it's necessary to experiment with a pretrained model approach to medical images. In addition, the fine tuning approach will also be an aspect of the approach that will be carried out in this trial to be compared and to find out its effect, specifically on CT-Scan images of the lungs for the discovery of COVID 19. The results of this experiment showed that the pretrained model approach can get high accuracy. Relatively high accuracy, the smallest testing accuracy in this trial reached 94.78 percent of the Xception without fine tuning phase, this result has beaten the machine learning approach which is didn't reach 90 percent of accuracy. The best experiment testing accuracy get 97.59 percet on the VGG 16 by applying fine tuning. The results of this trial also show that the fine tuning stage (for the top 10th layers) can increase the accuracy of the model.
Implementation of Digital Libraries in Book Management and Donation in the Nyala Aksara Community Saut Pintubipar Saragih; Mesri Silalahi
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.41698

Abstract

Web Based Applications has been implemented to organize bookstore and it is reuired to handle a wider library system, especially in a non-profit organization such as Nyala Aksara community library in Batam City. All library sources especially book collections come from donations from the community or charity, with this situation it is expected for the commitee to be able provide a system to reach more people to donate with easiness. The E-library Web application is expected to be able to provide solutions for the Nyala Aksara organization management. The main problems is the donations systems that have not been systematically organized, and then borrowing and returning system for users. E-library application will be built using web-based programming like HTML PHP, MySQL database and designing method with UML Method. The e-library will provide services for those who want to donate books, this application will also provide a system that is able to manage borrowers and how to process the book returning. The results of this research is producing a solution for the organization called E-libarary which is a web-based library management.
Immunization E-Book Application Using Web-Based Object Oriented Method Muhammad Rizki; Boni Oktaviana Sembiring; Eka Rahayu
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40707

Abstract

The digital era, where all activities can be done using technology. Including about books that can turn printed books into digital books or E-books. Immunization is the process of making a person immune or immune to a disease. The type and schedule of immunizations will determine the health of their toddlers both now and in the future. Parents' ignorance of the type and stage of the immunization schedule is an obstacle for parents. To find out the types and stages of the immunization schedule, parents should read a guide book containing information on immunizations. With immunization books that are still conventional, books become less effective due to carelessness, such as being easily damaged and lost. To prevent and reduce these problems the author wants to design an E-book application or a web-based digital version of a book that can be used as a source of immunization information. In designing this application, the author uses the Object Oriented method, namely Object Oriented Analysis and Design (OOAD) for the system development method and Oriented Programming (OOP) for making the application. With the Immunization E-book Application using the Web-based Object Oriented Method, it is hoped that the general public, especially parents with toddlers, doctors and nurses can find out information about Immunization data quickly anytime and anywhere.
Comparison of Machine Learning Algorithms in Analyzing Public Opinion Sentiments Against Fuel Price Increases Hanif Wira Saputra; Rahmaddeni Rahmaddeni; Fazri Fazri
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.41911

Abstract

Twitter is a social media platform that is quite widely used by the world community, especially people in Indonesia. Twitter is one of the social media that provides information, one of which is the increase in the price of crude oil which was recorded at 105 US dollars per barrel. The increase in fuel prices has a negative impact on society, causing pros and cons. Based on these problems, the authors aim to compare the performance of the artificial neural network and naïve Bayes algorithms to determine the best model for sentiment analysis of fuel price hikes. The data used amounted to 1000 datasets in the form of text documents with labeling using the lexicon and split data 90:10, 80:20, 70:30 and 60:40 as a comparison of precision values. The application of word vectorization utilizes TF-IDF in assigning a weight value to each word. Based on the results of the experiments that have been carried out, it is found that the best algorithm using an artificial neural network is capable of producing an accuracy value of 87% for 1000 data on public opinion sentiment on fuel price hikes. Based on the evaluation results, the model built can categorize public opinion sentiment into positive sentiment, negative sentiment, and neutral sentiment automatically and the polarity of public sentiment tends to be positive towards the issue of the fuel price increase that occurred.  
Implementation of IPS (Intrusion Prevention System) Fail2ban on Server for DDoS and Brute Force Attacks Fazar Dawamsyach; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40259

Abstract

Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, ports 22 and 80 were the top ports with the most attacks. One of the attacks on port 22 is brute force and an attack on port 80 is Distributed Denial of Service (DDoS). To solve this problem, a study was conducted to implement fail2ban IPS (Intrusion Prevention System) to increase server security. The attacks tested focused on brute force attacks on port 22 and DDoS attacks on port 80 using the TCP protocol. The fail2ban system is equipped with a website interface and notifications via telegram. The test results show that DDoS attacks have more impact on CPU performance with the highest increase in CPU being 92%, while brute force attacks have more impact on server memory performance with the highest increase in memory by 100%. The increase in server performance results in slowed server performance. The system managed to prevent DDoS attacks with an average speed of 0.5 seconds while brute force attacks were 6.1 seconds. The system managed to prevent DDoS attacks with a total of 88 attacks and brute force attacks with a total of 864 attacks.