cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jurnal.bulletincsr@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Computer Science Research
ISSN : -     EISSN : 27743659     DOI : -
Core Subject : Science,
Bulletin of Computer Science Research covers the whole spectrum of Computer Science, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, Fault analysis, and Diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data • Cryptography • Model and Simulation • Image Processing
Articles 74 Documents
Sistem Pendukung Keputusan Pemilihan Pembawa Acara Berita Terbaik Menerapkan Metode OCRA Naomi Titania L.Toruan
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The selection process of the news presenter is still subjective where the assessment may not be based on criteria that have been set or without an objective look so that the selection process is done less precisely and the decision is are produced less satisfactory for prospective news hosts. In this study, authors used a decision support system with the OCRA method to find the value of weights and criteria, and to search for the final value or to find the value of the best news show carrier. Thus, the decision support system is needed to help the TVRI Medan in determining the best news host. Addressing the problem, it is necessary to build the application of the decision support system for the selection of the best news presenter by using OCRA method so that it can help and facilitate the TVRI Medan in decision making choose The best news presenter with a satisfactory decision
Implementasi Algoritma Massey-Omura Cryptosistem Dalam Pengamanan Dokumen Irma Wahyuni
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A data transmission security system (secure data communication) is installed to prevent theft, damage, and misuse of data sent via computer networks. In practice, data theft takes the form of reading by unauthorized parties usually by tapping public channels. Computer network technology has been able to reduce and even eliminate the possibility of data damage due to poor physical connectivity, but interference can still occur because there is an element of intent that leads to misuse of the system from certain parties. This cryptosystem is an algorithm that provides a fairly high security which is not based on the secrecy of the algorithm (restricted algorithm), but is more emphasized on the security/confidentiality of the key used (modern cryptographic algorithms). The restricted algorithm is usually used by a group of people to exchange messages with each other, they create an encryption algorithm that is only known to members of that group, so that every time a group member leaves, the restricted algorithm must be replaced because of the possibility that group members who leave the group can leaking the algorithm. So every time a group member leaves, the algorithm used does not need to be changed, but only changes the key. Therefore, the author tries to use the Massey-Omura Algorithm whose implementation uses the ThreePass Protocol to generate prime numbers because the Massey-Omura algorithm is one of the asymmetric algorithms that factorizes large numbers to get the private key
Rancang Bangun Bel Otomatis pada STIKOM Tunas Bangsa Berbasis Arduino dengan Output Suara Fachrul Hasby; S Sumarno; Fitri Anggaini; Iin Parlina; Zulaini masruro Nasution
Bulletin of Computer Science Research Vol. 1 No. 3 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The bell is certainly no stranger to the world of education. In general, the bell still uses human power to ring it. It is still rare in the world of education to use an automatic bell that can work alone according to the specified time in the teaching and learning process. The purpose of designing the automatic bell at STIKOM Tunas Bangsa Pematangsiantar is to simplify the work of picket officers and optimize the right time for the teaching and learning process. The work process of this tool is to input the predetermined class hours into the Arduino Uno Microcontroller using the C language in the Arduino IDE Software. After that the Microcontroller will read the schedule program for lessons that have been input into the Microcontroller. If the input program matches today's class time schedule, the bell will automatically issue the output in the form of an information notification sound. This tool also has a 16x2 Keypad Shield for manual setting in a matched test mode within the current exam time and automatically generates a notification sound output, where this automatic buzzer is fully controlled by the Arduino Uno Microcontroller command and the timing that has been set in the RTC ( Real Time Clock) as a time saver
Sistem Pendukung Keputusan Dalam Menentukan Kepala Bengkel Terbaik Menggunakan Metode AHP dan WSM Ramadina Pertiwi; Natalia Silalahi; Fince Tinus Waruwu
Bulletin of Computer Science Research Vol. 2 No. 1 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The selection of workshop heads requires an interactive computer-based system that helps decision makers to use data and various models in solving structured problems. One of the selections for the Head of the Workshop is the Decision Support System. Decision Support System is an interactive information system that provides information, modeling and manipulating data. There are many methods used in making decisions in every important data in the form of the number of units per year, the number of services per year, the number of sales of spare parts per year, years of service and discipline, one of which is the AHP and WSM method. AHP is a functional hierarchy with human perceptual input, WSM is a general model, it has been used for different applications such as robotics, processors, and others. The AHP method is used to find the criteria for selecting the best workshop head and the WSM method is used to find the final result of the selection of the workshop head. The results show that the best workshop heads will get rewards in the form of traveling abroad with their families. Thus, the results of the designed system will assist the Company in conducting the selection process for the best workshop heads. however, the calculation only produces the largest value which will be selected as the best alternative
Sistem Pendukung Keputusan Pemilihan JSK di Ramayana Menerapkan Metode DEMATEL dan ARAS Nova Yanti Saragih
Bulletin of Computer Science Research Vol. 2 No. 1 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

JSK(Junior Supervisor cashier) is a person who has good experience, knowledge and skills to lead and manage finances every day. JSK also plays a role in regulating and coordinating cashiers on duty, starting from managing shifts, taking capital, and minimizing losses caused by cashiers. Decision Support System is a computer-based system consisting of several components, namely language system components, knowledge system components, and problem processing system components that are interrelated with one another, in making decisions through the use of data. -data and decision models in order to solve a problem. DEMATEL (Decision Making Trial And Evaluation Laboratory) aims to find direct (dependency) in a system of variables. The Additive Ratio Assessment (ARAS) method is a method used for ranking criteria, in carrying out the ranking process, the ARAS method has several steps that must be done to calculate and this method is very suitable for use in the selection of JSK candidates where the highest value is the best value of the final result
Implementasi Metode Apriori Pada Sistem Persediaan Bahan Kimia Di Laboraturium Forensik Medan Niken Aprilia; Mesran; Fince Tinus Waruwu
Bulletin of Computer Science Research Vol. 2 No. 1 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data mining is a term used to describe the discovery of knowledge in databases. Data mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques to extract and identify useful information and related knowledge from large databases. With data mining, a gem in the form of knowledge will be obtained in a large number of data sets. The Apriori (RF) method is a method that can improve accuracy results, because generating child nodes for each node is done randomly. This method is used to build a decision tree consisting of root nodes, internal nodes, and leaf nodes by taking attributes and data randomly according to the applicable provisions. The root node is the node located at the top, or commonly referred to as the root of the decision tree. The solution for determining chemical stock inventories at the Medan Branch Forensic Laboratory, by applying the Apriori method to determine the correlation coefficient level of frequently used products so that more frequently needed products can be provided to avoid chemical vacancies at the Medan Branch Forensic Laboratory
Implementasi Algoritma C5.0 Untuk Memprediksi Kondisi Kelahiran Bayi Siti Sahara Nasution; Natalia Silalahi; Abdul Karim
Bulletin of Computer Science Research Vol. 2 No. 1 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The condition of birth is the condition of the birth of a baby is one of the main problems in the health sector that is currently happening in Indonesia. In health, there are several indicators of birth conditions, namely normal and caesarean. Determining the degree of condition of the baby's birth is a reflection of the current status of the baby's birth. Children as the nation's successor are closely related to the growth and development of babies today. However, the implementation to improve infant growth and development is still not optimal. This study produces a decision tree of the cases raised showing that there are several attributes that influence the determination of birth conditions. A list of gain values for each attribute will be displayed. The position of the attribute that has the highest gain value displayed indicates the determination of which attribute is the determination of eligibility
Penerapan JST Backpropagation Untuk Memprediksi Data Penerimaan Mahasiswa Baru Pada Universitas Simalungun Choiril Ichsan Damanik; Dedy Haratama; Heru Satria Tambunan
Bulletin of Computer Science Research Vol. 2 No. 1 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The growing era of globalization makes people continue their education to a higher level. The greater the interest of prospective students, each year the number of prospective students will increase. The increase has made the university can manage and know the estimated number of prospective students each year. So we need a method to help the university so that the number of prospective students can be predicted quickly and accurately. In predicting the data of prospective new students at Simalungun University the backpropagation method is used, this study is expected to predict the number of new students with smaller error results. The data used was obtained from the Simalungun university administration from 2015 to 2018. Backpropagation is one method that is often used in solving complex problems. Its application researchers conducted the test using the Matlab application. This study uses 5 architectural models: 2-5-1, 2-10-1.2-15-1, 2-25-1, 2-3-5-1, the best accuracy is obtained from architectural models 2-3-5-1 with values accuracy of 86%, epoch 8406 iteration, and MSE namely 0, 0778011336
Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text Nurul Hapifah Purba
Bulletin of Computer Science Research Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i2.155

Abstract

Currently the use of information technology as a medium of information exchange is growing very widely. Various types of information such as text, images, sound and video can be converted into digital media that allows it to be reproduced or transmitted through various media. One of them is the internet, through the internet we can easily exchange information with other people in various places. However, there are times when information/messages are confidential, where no other party may know the contents of this information other than the sender and recipient. So we need a security against the message. Cryptography is a technique and art to encode messages or information in a medium, such as text, images, audio or video which aims to avoid suspicion from unauthorized people. For that we need a software that can encode confidential information in a text file. However, in hiding messages in text files using cryptography alone is not necessarily safe, so a useful algorithm is needed to improve security, therefore Cipher Block Chaining and Triangle Chain Cipher algorithms are needed. The research objective is to apply the Cipher Block Chaining and Triangle Chain Cipher algorithms for text file encoding applications. This is necessary because it often happens that the text message sent is a secret message that should not be known to just anyone. Block Chaining Ciphers and Triangle Chain Ciphers are useful algorithms to provide an advantage in terms of increased security in text files.
Implementasi Algoritma Set Partitioning in Hierarchical Trees (SPIHT) dan Algoritma Huffman Untuk Kompresi File Citra Lubis Irsan
Bulletin of Computer Science Research Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v2i2.156

Abstract

As technology develops, the process of sending files no longer needs to be done manually. Data or files can be sent electronically via email. The image file size is sometimes very large, where the better the quality of the resulting image, the bigger the pixel size needed to record the image. With a very large image file size, the transfer process may fail, because the media storage space exceeds its limit. The solution to this problem is how the image file can be compressed in order to speed up the transfer and storage of image files. Image compression is done by reducing the size of the image file by reducing the bits in the image file, but not eliminating the information data in it. By compressing, large data will be reduced in size so as to save storage space. In this study, the algorithm used is the Swiss army knife data compression, using this method, the compression results from the value of k have different compression results for each value, and the compression results will be beneficial in sending and moving image files more easily