cover
Contact Name
Edi Sutoyo
Contact Email
edisutoyo53@gmail.com
Phone
+6281381694837
Journal Mail Official
edisutoyo53@gmail.com
Editorial Address
Indonesian Scientific Journal (Jurnal Ilmiah Indonesia) Jl. Pasar Atas No 3, Kompleks Setramas Kota Cimahi, Bandung
Location
Unknown,
Unknown
INDONESIA
Bulletin of Computer Science and Electrical Engineering (BCSEE)
ISSN : -     EISSN : 27227324     DOI : https://doi.org/10.25008/bcsee
Bulletin of Computer Science and Electrical Engineering (BCSEE) is a biannually peer-reviewed open access journal that covers the leading edge subjects and matters in the computer science, information systems and electrical engineering disciplines. The Journal stresses on academic excellence, research rigidity, knowledge distribution, and reciprocated scholarly efforts in order to endorse theoretical, experimental and practical research at national and international levels. The BCEE publishes research articles, review articles, short communications, letters, and technical notes that meet the broad-spectrum criteria of scientific excellence in the following research areas (but not limited to): Computer Science and Engineering Electronics and Communication Engineering Electrical and Electronics Engineering and Technology Information Technology Computer Applications Bioinformatics Instrumentation and Control Engineering Medical Electronics Engineering Mobile and Pervasive Computing Software Engineering VLSI Design Optical Communication Multimedia Technology Biomedical Engineering Communication and Networking Digital Signal Processing Biometrics and Cyber Security Embedded System Technologies Power Electronics and Drives Power Systems Engineering Electrical Drives and Embedded Control Big Data Analytics and Cloud Computing Computer Networks Engineering Database Technologies Robotics and Artificial Intelligence Techniques Soft Computing Techniques Ad-hoc and Sensor Networks Parallel, Distributed and Grid Computing Data Warehousing and Data Mining Machine Learning Algorithms Image, Signal and Video Processing Mobile Computing and Application Development Wireless Technologies Web Technologies Wind, Solar, and Renewable Energy Ubiquitous Computing and Embedded Systems U And E-service, Science and Technology System Security and Security Technologies Software Testing & Analysis Integrated Circuits & Systems Radio Frequency (RF), Microwave, An Millimeter-Wave Circuits Remote Sensing and Space Systems Space Plasma Electro-Dynamics Wave Propagation Social Networking and Analysis Hardware Engineering Computer Architecture and Organization Electrical Machines XML Web Services Electromagnetic Materials for RF and Microwave Applications Antennas Open Source Technologies in Operating System Enterprise Computing Information Security Bio-Inspired Computing Computer Science Applications Nano-Electro-Mechanical System Internet of Things (IoT) Photonics and Optoelectronics Information Engineering Cryptography and Network Security MEMS and Microsystems Solid-State Devices and Nanotechnology Computer Vision Electromagnetics & Acoustics Channel Coding Theory and Applications Energy Systems Digital Signal Processing Control, Intelligent Systems Design, Modeling, and Analysis (DMA) Integrated Circuits Micro/Nano Electro Mechanical Systems (MEMS) Physical Electronics Signal Processing Human-Computer Interaction (HCI) Information Storage Management Compiler Design Invisible Computing Biotechnology Fuzzy Logic and rough set theory E-Commerce Evolutionary algorithm Knowledge Management Artificial Neural Networks (ANNs) Simulation Techniques Solid-State Device Modelling and Simulation Analysis and Design of Analog Integrated Circuits Programming Languages Graphics and Visualization Computational Biology 3D Modelling and Rendering Audio Video Broad Casting Systems Nano-Scale Transistors Analog and Mixed Mode VLSI Design Genetic Algorithms and its Applications Particle Swarm Optimization Ant Colony Optimization Any other relevant topics.....
Articles 41 Documents
Analysis and Design of Information Security Management System Based on ISO 27001: 2013 Using ANNEX Control (Case Study: District of Government of Bandung City) Adrian Fathurohman; R. Wahjoe Witjaksono
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 1 (2020): June 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (543.455 KB) | DOI: 10.25008/bcsee.v1i1.2

Abstract

The Department of Communication and Information (Diskominfo) of the Bandung City Government is an agency that has the responsibility of carrying out several parts of the Regional Government in the field of communication and informatics. Based on the composition of the regional service organization Bandung City Diskominfo has five fields and two UPTs which are part of the Bandung City Diskominfo. Bandung City Diskominfo in implementing work programs has IT as a supporter of business processes in government agencies. Based on the results of research conducted that IT management in Bandung City Government Diskominfo found several clauses that were still unfulfilled in this Diskominfo impact on the management of government information security institutions that can affect the performance of Bandung City Government. Therefore, there is a need for standardization that needs to be implemented as a guide that examines the direction in safeguarding information or assets that are considered sensitive to an organization. With the existence of these problems pushed to design information security recommendations based on ISO 27001: 2013 standards at Diskominfo. Also makes the design of IT information security systems that are focused on the control of Annex Information Security Policies, Human Resource Security, Operational Security, Communication Security and Asset Management so that business IT processes can run in accordance with the objectives of the organization. The results of this study are expected to help in securing IT information at the Bandung Diskominfo City and can also improve the goals of an organization.
Analysis of Citizens Acceptance for e-Government Services in Bandung, Indonesia: The Use of the Unified Theory of Acceptance and Use of Technology (UTAUT) Model Kahfi Ahadian Mutaqin; Edi Sutoyo
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 1 (2020): June 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.571 KB) | DOI: 10.25008/bcsee.v1i1.3

Abstract

At present, the use of ICT is growing very rapidly. This has led to changes in processes, functions, and policies in various sectors, including the public service sector managed by the government. e-Government is a new mechanism between the government and the community and stakeholders, which involves the implementation of information technology, and aims to improve the quality (quality) of public services. Bandung City is one of the cities that is very intensive in developing the use of ICT in implementing e-Government. The focus of the city government of Bandung is the Government to Citizen (G2C) application model. The application that is still lacking in use is the e-punten application. One important factor for the success of e-Government services is the acceptance and willingness of people to use e-Government services. E-punten application services provided by the Bandung city government will not run perfectly if no people are using it. To assess what factors influence the use of e-punten applications in the city of Bandung, the UTAUT model is used. To analyze the factors that influence the acceptance of e-punten applications SEM analysis is used. In this study, the PLS-SEM approach is used to solve multiple regression when specific problems occur in the data, such as the small sample size of the study. The PLS evaluation is carried out by evaluating the measurement model and the structural model that best suits the UTAUT model. Factors that influence the use of e-punten applications are effort expectancy for behavioral intention, facilitating conditions for use behavior, and behavioral intention for use behavior. The factors that have the most influence are performance expectancy and effort expectancy.
Back Propagation Neural Network for Controlling Coupled Water Tank Halim Mudia
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 1 (2020): June 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.128 KB) | DOI: 10.25008/bcsee.v1i1.4

Abstract

A well-prepared abstract enables the reader to identify the basic content of the level and flow control in tanks is the heart of all chemical engineering systems. The control of liquid level in tanks and flow between tanks is a basic problem in the process industries. Many times the liquids will be processed by chemical or mixing treatment in the tanks, but always the level of fluid in the tanks must be controlled and the flow between tanks must be regulated in presence of non-linearity. Therefore, in this paper will use neural network based on backpropagation (BP) to control of level 2 in the tank 2 with the setpoint of 10 centimeters and can follow the setpoint changes to 8 centimeters given in 225 seconds. The results show that a neural network based on backpropagation can follow setpoint given with steady-state error is 0 cm, overshoot is 0%, the rising time is 49 seconds, settling time is 52 seconds and can follow setpoint changes in 51 seconds.
Sentiment Analysis of YouTube Movie Trailer Comments Using Naïve Bayes Risky Novendri; Annisa Syafarani Callista; Danny Naufal Pratama; Chika Enggar Puspita
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 1 (2020): June 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.869 KB) | DOI: 10.25008/bcsee.v1i1.5

Abstract

Netflix has produced many TV series, one of which is Money Heist. This series has four seasons with a total of 38 episodes. The fourth season was released on April 3, 2020, which has eight episodes. The fourth season of Money Heist is 31.73 times more demand than the average series around the world. However, despite the many requests for the fourth season of the Money Heist series, there are still some negative comments made by the connoisseurs of the Money Heist series. In the YouTube comments column on the Netflix channel, there are still many who comment neutral and provide positive comments on this series. Therefore, there needs to be a method in which viewers' comments or opinions can be analyzed in order to be able to classify the opinions they make about this series by conducting sentiment analysis using the Naïve Bayes algorithm. Based on the results of research conducted, Naive Bayes can be said to be successful in conducting sentiment analysis because it achieves results of 81%, 74.83%, and 75.22% for accuracy, precision, and recall, respectively.
WeCare Project: Development of Web-based Platform for Online Psychological Consultation using Scrum Framework Frisca Febriyani Kurniawan; Fauzan Radifan Shidiq; Edi Sutoyo
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 1 (2020): June 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (768.107 KB) | DOI: 10.25008/bcsee.v1i1.6

Abstract

Symptoms and signs of mental disorders depend on the type of disorder experienced. Patients can experience interference with emotions, thought patterns, and behavior. Ways to determine the diagnosis and check whether you have a mental illness, there are several ways in the form of physical examination through a doctor, laboratory tests, psychological evaluation. There is also therapy as a healing process and recovery of the soul that is healthy. In Indonesia, many people experience mental health problems, but most are not aware of and care about these problems. Even in the worst cases, many cases lead to suicide. One factor that triggers suicide is, people who experience mental health problems do not have a place to talk about the problems they are facing, because in each city itself not all the availability of psychologist services that can help sufferers of mental health problems, let alone remember the price of psychologist services offered is quite expensive. Therefore, by taking into account these considerations, the WeCare project proposes developing a web-based platform for online psychologist consultation. In general, this platform has three main actors namely, admin, user, and psychologist. This platform is expected to be a media liaison between users (patients) with psychologists in conducting consultations.
TCP SYN Flood (DoS) Attack Prevention Using SPI Method on CSF: A PoC I Putu Agus Eka Pratama
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1439.085 KB) | DOI: 10.25008/bcsee.v1i2.7

Abstract

TCP SYN Flood as one kind of Denial of Service (DoS) attack, still popular to flood the server connection, by sending SYN packets to the target. Because of the risk caused by this attack, there is a need for a network security mechanism. In this paper, one of the security mechanisms proposed is using Stateful Packet Inspection (SPI) method on Configserver Security and Firewall (CSF). By using SPI method, CSF has capabilities to responsible for separating packets of data, that may be entered with data packets that should not be entered into the server. For example: port to be opened, port closed, and IP Address that may access the server for anywhere. This paper combines both of CSF and SPI method to prevent TCP SYN Flood (DoS) with Proof of Concept (PoC) at the Linux operating system. The security process is done in 3 ways: configuring a maximum connection from an IP Address to a server, securing an incoming SYN packet per second, and counting how many times an IP Address violates the minimum SYN packet rule per second before being blocked by a firewall.
Comparative Analysis of Single Exponential Smoothing and Holt's Method for Quality of Hospital Services Forecasting in General Hospital Rachmat Rachmat; Suhartono Suhartono
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (732.951 KB) | DOI: 10.25008/bcsee.v1i2.8

Abstract

The quality health service is one of the basic necessities of any person or customer. To predict the number of goods can be done in a way predicted. The comparison method of Single Exponential Smoothing and Holt's method is used to predict the accuracy of inpatient services will be back for the coming period. Single Exponential Smoothing the forecasting methods used for data stationary or data is relatively stable. Holt's method is used to test for a trend or data that has a tendency to increase or decrease in the long term. The outcome of this study is the Single Exponential Smoothing method is more precise than Holt's method because of the history of hospitalized patients who do not experience an increase or no trend. In addition, the percentage of error (the difference between the actual data with the forecast value) and Mean Absolute Deviation (MAD) to calculate the forecast error obtained from the Single Exponential Smoothing method is smaller compared to Holt's method.
Single Phase Power Factor Improvement Based Instantaneous Power P Q Theorm Setiyono Setiyono; Bambang Dwinanto
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (972.008 KB) | DOI: 10.25008/bcsee.v1i2.9

Abstract

This paper presents how to harmonic disturbance reduce on single phase power system. One of the most popular method is harmonic signal extraction with instantaneous power p q theorm. This algorithm implemented to harmonic cencellation by active power filter circuit be paralled with the non linier load. This filter generates of current compensation that are injected into the grid to improve power quality. This Filter is built by an inverter circuit that consists of a mosfet switch array and capasitor mounted on DC link side. Two types of loads are resitive inductive and resistive capasitive produce of current source wave form that close pure sinusoid. Simulation results show the THD index fell to the level of 2.7% in accordance with IEEE 519 standard rules which states that the harmonics content of the power system may occur below 4%, indicating that the power system can be categorized as having good quality.
Comparison of Effect Efficiency and Voltage Regulation Between Three-Phase Transformer Winding Connections Syamsyarief Baqaruzi; Surya Tarmizi Kasim
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (989.242 KB) | DOI: 10.25008/bcsee.v1i2.1123

Abstract

A transformer is an important device in electrical processes, as we know static electricity that involves magnetically coupled coils to increase or decrease the voltage. In three-phase transformer, there are various winding connections such as delta-delta (?, ?), wye-wye (Y, Y), wye-delta (Y, ?), delta-wye (?, Y), zig-zag (Z, Z), etc. And of the many often used connection are Yy0, Yd11, Dd0, and Dy5. From these various connections, each connection has different efficiency, losses, and voltage regulation. If they are connected with resistive, inductive, or capacitive loads. This paper method has discussed a transformer connection used are Yy0, Dd0, Yd11, and Dy5 in Laboratory Konversi Energi USU to see how the influence of load changes, on voltage regulation Where a state of balance load using are resistive, inductive, capacitive, and RLC combination. The result analysis of the experiment show, the best efficiency is at Dd0 connection, when loaded condition using capacitive is average 97.87%, and the best voltage regulation is obtained at Dy5, when loaded condition using resistive is average 28.35%
Calculation of Consumption and Expenditures for Electricity Energy Costs at Lido Graha Hotel Lhokseumawe City Based on Electrical Power Measurement Arnawan Hasibuan; Widyana Verawaty Siregar; Elvy Sahnur Nasution; Rohana Ismail
Bulletin of Computer Science and Electrical Engineering Vol. 1 No. 2 (2020): December 2020 - Bulletin of Computer Science and Electrical Engineering
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (516.913 KB) | DOI: 10.25008/bcsee.v1i2.1124

Abstract

Evaluation of energy utilization and identification become energy saving opportunities, as well as recommendations for increasing efficiency, on energy use and use of energy sources in the context of energy conservation This paper aims to describe the audit of electrical energy in the Lido Graha Lhokseumawe Hotel room, by taking samples in different room types and conducting an electrical energy audit on the use of installed lights and air conditioners. The method used in this study is data collection, interviews, observations and direct measurements on the use of lights and AC (Air Conditioning). The data analysis technique used is to determine the estimated value of electricity consumption and how much it will cost for electricity. From the results of calculations and analysis obtained total electricity consumption needs based on the type of room with various types of loads used 855.62 kWh/days with costs that must be spent per day is Rp. 1,190,574.96, 25,668.6 kWh/month with a monthly cost of Rp. 35,087,608.60. Whereas for a year electricity demand is 308,494.8 kWh/year with a cost of Rp. 421,051,305.24.