cover
Contact Name
KARONA CAHYA SUSENA
Contact Email
karona.cs@unived.ac.id
Phone
+6281541234500
Journal Mail Official
karona.cs@unived.ac.id
Editorial Address
Jl. Meranti Raya No. 32, Sawah Lebar, Kota Bengkulu
Location
Kota bengkulu,
Bengkulu
INDONESIA
Jurnal Media Computer Science
ISSN : -     EISSN : 28280490     DOI : https://doi.org/10.37676/jmcs
Core Subject : Science,
Jurnal Media Computer Science merupakan jurnal nasional yang diterbitkan oleh Universitas Dehasen Bengkulu sejak tahun 2022. Jurnal Media Computer Science memuat artikel hasil-hasil penelitian di bidang Komputer, Sistem Informasi dan Teknologi. Jurnal Media Computer Science berkomitmen untuk menjadi jurnal nasional terbaik dengan mempublikasikan artikel berbahasa Indonesia yang berkualitas dan menjadi rujukan utama para peneliti.
Articles 74 Documents
A Comparative Analysis Of Simple Additive Methods Weighting With Preference Selection Index In The Selection Of The Best Sales Rahmat Budianto; Dewi Suranti; Reno Supardi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2741

Abstract

PT. Tunas Dwipa Matra Branch of Putri Hijau is a company engaged in the sale of motorcycles by cash and credit which is located in North Bengkulu Regency, Bengkulu Province. PT. Tunas Dwipa Matra needs a decision support system that can correct the weaknesses of the current system, namely data collection and sales selection which is still manual, namely by using a book, as a result, selecting the best salesperson takes a very long time. In fact, for the assessment of the best sales selection, accuracy and precision are needed, so that the results can be accepted by all sales and employees at PT. Tunas Dwipa Matra. The method used is Simple Additive Weighting and Preference Selection Index Method to assist company management in assessing the best sales performance of employees in the company. Besides that, PT. Tunas Dwipa Matra strives to improve various service facilities that are friendly to consumers so that sales targets can be achieved every year. Based on the results of system testing at P.T Tunas Dwipa Matra, it can be concluded that the application made is as expected and can help the process of selecting the best salesperson. And the best sales in 2021 is Fitri with SAW value: 79 and PSI value: 0.832597
The Implementation Of Modern Cryptography On Document Data Security Triza Randes Syafutra; Khairil Khairil; Eko Suryana
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2742

Abstract

The aspect of data security has become a very important aspect of an information system. Many people start looking for ways to secure data or information, because global computing has become insecure and often escapes the attention of computer users and is starting to become a very serious issue. So, we need a way to secure confidential and important data. One of the cryptography methods that can be used is the RSA method. The RSA algorithm is one of the most popular public key algorithms used and is still used today. The strength of this algorithm lies in the exponential process, and factoring a number into 2 prime numbers which until now has taken a long time to factorize. The implementation of the system used the Visual Basic 2010 programming language and the method used in this research is an applied research method. Where the results of the tests that have been carried out are obtained where the RSA Algorithm can provide additional security to the document, this is because the text data owned by the user will be encrypted and replaced with a row of numbers that does not represent the contents of the original data.
The Basis Of Ratio Analysis For The Selection Of Majors At SMA Negeri 1 In Kepahiang Regency Epan Susandi; Liza Yulianti; Eko Suryana
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2744

Abstract

SMA Negeri 1 is one of the schools in Kepahiang regency which annually routinely conducts major selection for the students. This major is intended so that later students can complete school according to their interests and abilities before continuing to a higher level. The current major selection process has weaknesses, including taking a long time and also the results obtained are less accurate because there could be many mistakes because there is no special application to support these calculations. In addition, the element of subjectivity is quite high because the criteria used are still few and less relevant. To overcome this problem, a decision support system is made to determine the selection of majors. This study used the method of multi-objective optimization on the basis of ratio analysis (MOORA) with the criteria of the value of report cards for science subjects, social studies scores, mathematics scores, Indonesian language scores, and the average value of report cards. The implementation of the system uses the Visual Basic 2010 programming language and the method used in this research is the Waterfall method. The final result was that the decision support system with the MOORA method was able to overcome problems in the process of selecting majors at SMA Negeri 1 Kepahiang Regency.
Online-Based Information System For Short Semester At Information System Study Program With PHP My SQL Fakhri Ardiansyah; Indra Kanedi; Herlina Latipa Sari
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2745

Abstract

Improvement of grades is a lecture process carried out in a short time outside the regular schedule which is intended to provide opportunities for students to improve their poor grades. In this era of globalization, it is very important that the need for accurate, precise and fast information in presenting very complete data is one of the important goals. For this reason, computers play an active role in all fields, especially in the Information System study program and computers make information will make things easier. The internet is a series or network of interconnected computers which comes from the word interconnected networking. Internet is a global network that connects a network with other networks around the world.
Virtual Private Network Analysis Point To Point Tunneling Protocol Adiman Adiman; Indra Kanedi; Reno Supardi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2746

Abstract

This research aims to conduct a network analysis of the Virtual Private Network Point To Point Tunneling Protocol at the UPTD of the Bengkulu Province Cooperatives and SMEs Training Center. to carry out activities that occur on the wifi network at the UPTD Cooperatives and UKM Training Center Bengkulu Province and also as one of the requirements for obtaining a bachelor's degree in the Department of Informatics, Dehasen Bengkulu University. The research method used is the Network Development Life Cycle (NDLC) method which aims at the process of making and designing a Virtual Private Network Point To Point Tunneling Protocol using a mikrotik RB951Ui-2HnD. The process of making and designing is how to connect the proxy with a computer then by making a remote access remote from the mikrotik location using the Winbox application. Mikrotik can configure a network that is needed on the UPTD network of the Bengkulu Province Cooperatives and SMEs Education and Training Center by applying remote access remotely, the remote results and security when logging in to the Mikrotik connection can be done by applying the network login and password display so that it is secure when connecting to the mikrotik. and can make it easier for us to operate the mikrotik network remotely and safely.
Rainfall Prediction In Bengkulu City Fuzzy Logic-Based Yessi Mardiana; Toibah Umi Kalsum; Yoli Andi Rozzi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2853

Abstract

The purpose of this study is to predict the rainfall in the city of Bengkulu using fuzzy logic . The boundary problem in this research is a fuzzy method used is Fuzzy Method Sugeno , testing was conducted using the software Matlab version 2013a , the data used in this study is the rainfall data from October to December 2015 were taken from the Meteorology , Climatology and Geophysics , the Center for Meteorology , Climatology and Geophysics ( BMKG ) Bengkulu. Of a series of studies conducted with reference to the design of the block diagram of the results obtained in the form of cuara on the day or the future (tomorrow) with Sugeno mentode this is to conduct experiments for 7 days with accuracy levels of over 60%. From 7 days forecasting error occurred as much as 2 days
Value Processing Information System in SMAN 09 Bengkulu City Surya Ade Saputera; Vike Juzeplin; Monsya Juansen
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2910

Abstract

Value is one important component in teaching and learning activities in schools that will be input into output is expected to be offset even develop each student’s grades. One is starting measuring student learning outcomes assessment that is usually handled by each homeroom brackish. Conducted a thorough assessment and continuous on the process and learning outcomes in accordance with the characteristics of subjects and majors they choose to obtain complete information value, from the way the values processing still done using a program that has not been integrated with the database. Problems that occur in the processing of report cards in SMAN 09 KOTA BENGKULU is still writeen in the book report cards, and delivering value is still using paper media, so a lot of time and effort required to process the value. This reserch has resulted in a processing systems that helps the value of the work of the teachers and homeroom, Web-Based Information Systems that use assistive technologies such as PHP and the MySQL database to provide convenience for the admin in this case the class teacher / teachers and students to access the device through for any network connected to the internet. This is done to bulid a system that helps in the processing and presentation of student data information. With the aim of processing the value that can be processed effectively and efficiently, so that it can directly access and information can be conveyed properly.
Design and Implementation of Intrusion Detection System (IDS) for Wireless Local Area Network (WLAN) Security at SMKN 5 Bengkulu City Pohaja Syahrul Fat; Khairil Khairil; Eko Prasetyo Rohmawan
Jurnal Media Computer Science Vol 2 No 1 (2023): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i1.3339

Abstract

The network at SMK Negeri 5 Bengkulu City at this time often has complaints such as a decrease in internet network performance which in turn affects all computers connected to the network. Intrusion Detection System (IDS) whose job is to monitor networks and suspicious activities in a network system. The research method that the authors use is a linear sequential process model. The life cycle of implementing a network system is defined in a number of phases, namely: Problem Identification and Formulation, Literature Study, Testing, Implementation, System Design, System Requirements Analysis. The author uses Snort, Telegram Bot on Ubuntu based IDS sensor engine. The results of this thesis research conclude that the applied IDS system can function to detect intruders or intruders on the IDS sensor machine, which is displayed in the form of notifications to telegrams.
Application of the Certainty Factor Method in Diagnosing Expert Systems of Oyster Fungus Pests and Diseases Ronaldi Ronaldi; Asnawati Asnawati; Prahasti Prahasti
Jurnal Media Computer Science Vol 2 No 1 (2023): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i1.3340

Abstract

The Department of Agriculture and Food Security of Bengkulu Province is one of the government agencies that annually conducts outreach to farmer cultivators to increase crop yields. Therefore, in this study an expert system application was developed that can be used by cultivators to find out pests and diseases that attack plants based on the symptoms they experience. The expert system for diagnosing oyster mushroom pests and diseases at the Agriculture and Food Security Service of Bengkulu Province can be used as a tool to help diagnose oyster mushroom pests and diseases by entering the symptoms experienced by the oyster mushroom. This expert system for diagnosing pests and diseases of oyster mushrooms was created using the Visual Basic .Net programming language (IDE Visual Studio 2010). The expert system for diagnosing pests and diseases of oyster mushrooms has been applied to the Certainty Factor Method which is used to obtain a percentage level of certainty for pests and diseases of oyster mushrooms based on the symptoms experienced by oyster mushrooms. Based on the results of the tests that have been carried out, the functional application of the expert system for diagnosing oyster mushroom pests and diseases is running as expected and can provide information on the results of consultations in the form of a diagnosis of oyster mushroom pests and diseases
Design And Implementation Of Network Security System Using Network Management System (NMS) And Firewall On SMA N 1 Bengkulu City Tommy Ade Saputra; Khairil Khairil; Eko Prasetiyo Rohmawan
Jurnal Media Computer Science Vol 2 No 1 (2023): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i1.3341

Abstract

This research is entitled Design and Implementation of Network Security System Using Network Management System (NMS) and Firewall at SMA N 1 Bengkulu City. Aims to build a computer network system using linux ubuntu server by setting squid and webmin as a graphical user interface (GUI). Where in doing network management Squid works well including being able to limit accessible website addresses, IP Address management of network users and ports that can or cannot be accessed. The GUI is being used by webmin, because the webmin interface is easy to use. In limiting website addresses, network users' IP addresses and ports that cannot be accessed are done manually via Squid. Linux operating system ubuntu server 20.04 is very good in running Network Management System (NMS) and Firewall because it can be installed or added other tools such as squid and webmin, linux ubuntu server 20.04 in running Network Management System (NMS) and Firewall does not require resources great hardware.