cover
Contact Name
Adi Widarma
Contact Email
adiwidarma@unimed.ac.id
Phone
+6285275945045
Journal Mail Official
journal_cess@unimed.ac.id
Editorial Address
UPT TIK Universitas Negeri Medan Jl. Willem Iskandar pasar V Medan Estate, Medan 20221
Location
Kota medan,
Sumatera utara
INDONESIA
CESS (Journal of Computer Engineering, System and Science)
ISSN : 25027131     EISSN : 2502714X     DOI : https://doi.org/10.24114/cess
Core Subject : Science,
CESS (Journal of Computer Engineering, System and Science) contains articles on research results and conceptual studies in the fields of informatics engineering, computer science and information systems. The main topics published include: 1. Information security 2. Computer security 3. Networking & Data communication 4. Cloud & grid computing 5. Mobile Computing & Applications 6. Artificial Intelligence 7. Decision Support System 8. Data Minig 9. Other topics related to information technology
Articles 515 Documents
Implementation of Intrusion Prevention System (IPS) as a Website-Based Server Security System and Mobile Application Rayco William; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40258

Abstract

Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information about the attacks, and how to handle attacks on the server. In this research, a server security system was created by implementing an Intrusion Prevention System (IPS) based on website and mobile applications. Attack detection focuses on ICMP and TCP port attacks with the latency time when the system responds to an attack is 99,89 ms (very good). The attack handling system was successfully carried out using Iptables against the attacker's IP that detected by the Suricata system through the website and mobile applications, to be given action which is divided into Drop, Reject and Accept. Administrators can quickly take the necessary precautions after receiving an automatic notification when the server is under attack via Telegram with an average speed is 3.41second. The ping attack, port scanning and ping of death (DoS) attacks resulted in an increase in the performance load on the local server with the initial conditions of CPU performance ranging from 10-19%, increasing when a ping attack occurred to 21,6%, memory 41,7%, and disk 19,6%. Port scanning increased by 85,9% CPU, memory 41,9%, and disk 20,3%. Ping of death increased CPU 90,4%, memory 42,9%, and disk 20,8%. Based on the tests that have been done, an excessive increase is found in the ping of death attack which results in server performance increasing to 90,4%, if the attack occurs for a long time then the server condition will be hang (damaged).
Recommendations for the Best Contract Labor Handling Staff Using the Complex Proportional Assessment Method Adi Widarma; Dharyana Suryadijaya; Bagus Rizki Lubis; Ira Murni
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.42655

Abstract

Staff or commonly referred to as employees are an important part of a company/institution, especially those who have the quality and enthusiasm to maintain the progress of the agency. The purpose of this research is to find out decision making or problem solving in determining the best contract staff recommendations at SERGAI DISPORAPARBUD so that later these staff can be more motivated in their performance. To conduct this research, observational research methods, interviews and literature studies were carried out and the calculation process was carried out using the COPRAS method. In addition to determining the best contract labor recommendations, several criteria must be met by each alternative, namely discipline, honesty, communication, cooperation, and responsibility. The results of this study indicate that 10 alternatives get the top ranking, one of which is a staff named Jaliya SE with a utility value of 100 getting the first rank in the recommendation to become the best contract worker at DISPORAPARBUD SERGAI.
K-Means Cluster Analysis for District or City Clustering in Bengkulu Province based on The Number of Base Transceiver Stations and The Strength of Cell Phone Signal Anisa Rahmawati; Endah Setyowati
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40913

Abstract

The existence of a Base Transceiver Station (BTS) and the strength of cell phone signals in an area have greatly affected the ease of communication and exchanging information between people. This is one aspect to measure technological developments in a region. This study aims to use the K-Means algorithm to classify districts or cities in Bengkulu Province based on the proportion of BTS presence, the proportion of villages with strong telephone signals, and the proportion of villages with 4G internet signals. There are three clusters based on these three variables and there are still significant differences between districts or cities in Bengkulu Province. The output of this study becomes an input for the Bengkulu provincial government to be able to pay attention to the distribution of communication infrastructures in their province.
Comparative Analysis of CPU Performance on FreeBSD 64-bit and RedHat 64-bit Operating System Against Denial of Service (DoS) Using Hping3 Ihsan Fadli Tampati; Faizal Gani Setyawan; Wiyar Wilujengning Sejati; Aqwam Rosadi Kardian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.42824

Abstract

Denial of Services (Dos) attack is a type of attack against server traffic. DoS works by placing a heavy load on the server, so that the server cannot accommodate connections from other users and can cause system failure on the server. On the other hand, Denial of Services (DoS) attacks can be used to test server resilience. The servers to be tested are using RedHat Linux and FreeBSD operating systems. Testing is carried out by flooding the system with DoS attacks using the hping3 tool, then comparing the test results in the form of percentages of CPU consumption and memory consumption between operating systems to determine vulnerabilities in each operating system. Based on a comparison of test results between operating systems, the FreeBSD operating system has better CPU performance than the RedHat Linux operating system, but has a vulnerability in internal memory to DoS attacks. Meanwhile, the RedHat Linux operating system has better internal memory performance than the FreeBSD operating system, but has a vulnerability in CPU performance against DoS attacks.
Internet of Things based Control and Monitoring System for Koi Fish Cultivation Kevin William; Ikhwan Ruslianto; Irma Nirmala
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.40886

Abstract

Water quality is an important factor for fish koi cultivation. Poor water quality such as inappropriate temperature, pH, and turbidity can disrupt metabolic processes, inhibit growth and cause death in koi fish. Apart from that, feeding and checking water quality are still done manually. Because of this, we need a system that can monitor and control the feeding, temperature, and water quality according to the living environment of koi fish. In this study the system was built on an Android-based mobile application using the flutter framework. In addition, the system has a notification to provide information on changes in sensor readings in real time to users. The notifications are changes in temperature, pH, turbidity, water level, feed level and changes in control device modes. Testing the water temperature readings obtained a relative error value of 0,66%, water turbidity readings obtained an error value of 8,79%, water pH readings obtained a relative error value of 2,45%, water level readings obtained an error relative value of 1,57% and feed availability readings obtained an error value of 3,1%.
Implementation of Network Security and Anticipating Attackers Using pfSense Firewall Alhu Waladan Naufal Sholihan; Aan Restu Mukti; Suryayusra Suryayusra; Rahmat Novrianda Dasmen
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.42377

Abstract

At PT. PLN (Persero) UPDL Palembang uses routers from the Cisco 1900 series, hardware-wise this Cisco device is very old because it was released in 2009 according to a Cisco website source, using the Cisco 1900 series as a router is something that is very vulnerable to attack by attackers due to its backwardness. the times in terms of network security, and the lack of attention to network security is also a matter of concern in this regard. With these problems, routing is added for network security by designing a pc router firewall from pfSense, the pc router itself uses computer assets that are is no longer used but has sufficient specifications. Using the action research method, carrying out diagnoses, planning actions, following up, conducting evaluations, and learning materials. By designing a pc router firewall using pfSense it is hoped that the results will be quite good, because it uses the router firewall feature using pfSense to block attacks. Using pfSense as network security will certainly be safer because pfSense still regularly updates or improves its security and has an active forum community to date so that information can be exchanged.
Decision Support System for Determining Employee Movements Using the COPRAS Method Muhammad Dedi Irawan; Harold Situmorang; Rianto Sitanggang; Diah Sawitri
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.43002

Abstract

Employee mutation is one aspect that greatly affects the performance of employees in a company. However, employee mutations at PT. PLN (Persero) UPDL Tuntungan is still done manually, so determining the employees to be transferred takes quite a long time and the results are not optimal. The research aims to facilitate PT. PLN (Persero) UPDL Benefits in determining employee mutations in order to obtain maximum results. The stages of the research were carried out by collecting data by means of interviews then the data was inputted into the system to be calculated using the COPRAS method which was then stored into the database so that it would produce decisions with the final result ranking by the system by sorting the smallest to the largest values. The results of this study are based on the COPRAS method, namely the alternative of Ahmad Fauzy Hamdani Rahmat being the first alternative with a value of 100%. This is because Ahmad Fauzy Hamdani Rahmat's alternative meets almost all criteria ranging from age, years of service, education, position and status.
Aeroponic Media Potato Plant Monitoring and Control System Internet of Things Based Mella Geovanie; Ikhwan Ruslianto; Uray Ristian
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 1 (2023): January 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i1.42432

Abstract

Aeroponics is a farming method without soil media that works by spraying water and a nutrient solution in the form of a mist on plant roots. The use of the aeroponic method itself requires monitoring and controlling air temperature, air humidity, water temperature, and nutrient levels. Incorrect settings can cause plants to experience drought, root rot, and a lack of nutritional elements, which can cause plant death. Therefore, we need a system that can monitor and control air temperature, air humidity, water temperature, and nutrient content. This research builds an Internet of Things-based system that can assist in providing information regarding the values of air temperature, air humidity, water temperature, and nutrient content displayed on the website application. The system can also perform manual and automatic control functions. In the test results, the sensor value reading system has an accuracy of 98.56% for air temperature, 96.89% for accuracy of air humidity readings, 99.64% for accuracy of water temperature readings, 97.02% for accuracy of nutrient solution readings, and 99.86% for accuracy of water level readings. The test results from observing potato plants for 21 days showed an increase in growth in the highest plant height with an average of 4.36 cm and the lowest plant height growth with an average of 0.96 cm.
Fever Classification Using the Neighbor Weighted K-Nearest Neighbor Method Surayya Safira Milania; Cucu Suhery; Tedy Rismawan
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 2 (2023): July 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i2.43267

Abstract

Demam merupakan gejala atau reaksi tubuh terhadap suatu infeksi atau penyakit. Demam dapat disebabkan karena adanya infeksi virus, bakteri, dan parasit. Serta demam akibat gigitan nyamuk. Beberapa penyakit penyebab demam yang perlu diwaspadai antara lain Demam Berdarah Dengue (DBD), Demam Tifoid, dan Malaria dikarenakan gejala klinis dari ketiga penyakit tersebut sangat mirip dan sulit untuk dibedakan. Akibat dari gejala yang mirip, seringkali menyebabkan kesulitan dalam mendapatkan diagnosis awal sehingga kurang tepat dalam penanganan. Oleh karena itu, pada penelitian ini dibangun sebuah sistem yang dapat mengklasifikasikan demam menggunakan metode Neighbor Weighted K-Nearest Neighbor. Data yang digunakan berjumlah 300 data dengan komposisi rasio data latih dan data uji sebesar 70%:30% sehingga data latih yang digunakan berjumlah 210 data dan data uji berjumlah 90 data. Penelitian ini dilakukan dengan mengamati variasi nilai ketetanggaan (K) dan nilai exp (E) terhadap akurasi sistem klasifikasi demam. Hasil pelatihan menunjukkan bahwa nilai K dan E yang bervariasi tidak mempunyai pengaruh terhadap akurasi tersebut. Hasil pengujian yang dilakukan mendapatkan akurasi sebesar 100% pada setiap variasi nilai K dan E.Fever is a symptom of the body's reaction to an infection or disease. Fever can be caused by viral, bacterial, or parasitic infections. as well as fever due to mosquito bites. Several diseases that cause fever that need to be watched out for include dengue hemorrhagic fever (DHF), typhoid fever, and malaria because the clinical symptoms of these three diseases are very similar and difficult to distinguish. As a result of similar symptoms, it often causes difficulties in getting an early diagnosis, so treatment is not appropriate. Therefore, in this study, a system was developed that could classify fever using the neighbor weighted K-nearest neighbor method. The data used totaled 300, with a composition ratio of 70% training data to 30% test data, for a total of 210 training data and 90 test data. This research was conducted by observing the variation in the value of neighborliness (K) and the value of exp (E) on the accuracy of the fever classification system. The results of the training show that the varying K and E values have no effect on accuracy. The results of the tests carried out obtained an accuracy of 100% for each variation in the values of K and E. 
Design and Build a Travel Taxi Ordering Application Using the FIFO Algorithm and the Flutter Framework Susanto Susanto; Nurul Mutiah; Dian Prawira
CESS (Journal of Computer Engineering, System and Science) Vol 8, No 2 (2023): July 2023
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24114/cess.v8i2.43792

Abstract

Antrian merupakan suatu keadaan dimana seseorang harus menunggu gilirannya untuk mendapatkan pelayanan. Seringkali antrian menjadi suatu masalah bagi masyarakat ataupun sebuah perusahaan yang memberikan pelayanan. Hal ini terjadi pada PT. Citra Surya Sejati, dimana proses pemesanan taksi masih manual dan disana penumpang harus mengantri untuk mendapatkan pelayanan. Disisi lain PT. Citra Surya Sejati juga mengalami permasalahan dimana pencatatan laporan pemesanan taksi masih menggunakan cara manual dengan mencatatnya dibuku, sehingga diperlukan sebuah sistem untuk mengatasi masalah tersebut. Sistem yang akan dibuat oleh peneliti menggunakan algoritma First In First Out untuk konfirmasi pesanannya, sehingga penumpang yang pertama kali memesan akan pertama kali mendapatkan pelayanan. Hasil dari penelitian ini berupa aplikasi berbasis Mobile untuk penumpang, sedangkan admin berbasis Website. Sistem ini telah dilakukan pengujian dengan menggunakan metode black box testing. Seluruh fungsionalitas sistem berjalan sesuai dengan perancangan yang telah dibuat sebelumnya dan antarmuka sistem memperoleh persentase 81,64% yang masuk ke dalam kategori Baik Sekali.  Queuing is a situation where a person has to wait for his turn to get service. Often queues become a problem for the community or a company that provides services. This happened to PT. Citra Surya Sejati, where the taxi ordering process is where passengers have to queue to get service. On the other hand PT. Citra Surya Sejati also experienced a problem where the recording of taxi order reports still used the manual method by recording them in a book, so a system was needed to overcome this problem. The system that the researcher will create uses the First In First Out algorithm to confirm orders, so that passengers who order for the first time will receive service first. The results of this study are in the form of a Mobile-based application for passengers, while the Website-based admin. This system has been tested using the black box testing method. All system functionality goes according to the design that has been made before and the system interface gets a percentage of 81.64% which is in the Very Good category. Â