cover
Contact Name
Eko Arip Winanto
Contact Email
ekoaripwinanto@gmail.com
Phone
+6281367704735
Journal Mail Official
mjgcs@mase.or.id
Editorial Address
Contact Jl. R. Wijaya Lorong Akimar No.271, The Hok, Kec. Jambi Sel., Kota Jambi, Jambi 36138
Location
Kota jambi,
Jambi
INDONESIA
Media Journal of General Computer Science (MJGCS)
ISSN : -     EISSN : 30313651     DOI : https://doi.org/10.62205/mjgcs.v1i2.21
Media Journal of General Computer Science (MJGCS), e-ISSN: 3031-3651 is a peer-reviewed journal in Indonesian or English. The purpose of this publication is to disseminate high-quality articles that are devoted to discussing any and all elements of the most recent and noteworthy advancements in the field of computer science. The applications of information technology, applied computing, and computer science are all included in its purview. Skip to main contentSkip to main navigation menuSkip to site footer Open Menu Home / Aims and Scope Aims and Scope Computer Science: Computer Architecture, Parallel and Distributed Computing, Pervasive Computing, Computer Networks, Embedded Systems, Human-Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (covering Software Lifecycle, Management, Engineering Process, and Engineering Tools and Methods), Programming (encompassing Programming Methodology and Paradigm), and Data Engineering (involving Data and Knowledge Level Modeling, Information Management, Knowledge-Based Management Systems, and Knowledge Discovery in Data). This diverse landscape also includes Network Traffic Modeling, Performance Modeling, Dependable Computing, High-Performance Computing, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Distributed Computing Systems, Mobile Processing, Next-Generation Networks, Computer Network Security, Natural Language Processing, Business Process, and Cognitive Systems. Information Systems : Data Engineering (comprising Data and Knowledge Level Modeling, Information Management, Knowledge-Based Management Systems, and Knowledge Discovery in Data), Software Engineering (addressing Software Lifecycle, Management, Engineering Process, and Engineering Tools and Methods), Information Retrieval, IT Governance, Networking Technology, Business Process, Intelligent Systems, Multimedia Security, Information Search Engine, Distributed Computing Systems, Mobile Processing, Next-Generation Networks, Computer Network Security, Natural Language Processing, and Cognitive Systems. Signal Processing : Signal Theory, Digital Signal and Data Processing, Stochastic Processes, Detection and Estimation, Spectral Analysis, Filtering, Signal Processing Systems, Environmental Signal Processing, and various applications such as Image Processing, Pattern Recognition, Optical Signal Processing, Multi-dimensional Signal Processing, Communication Signal Processing, Biomedical Signal Processing, Geophysical and Astrophysical Signal Processing, Earth Resources Signal Processing, Acoustic and Vibration Signal Processing, Data Processing, Remote Sensing, Speech Processing, Signal Processing for Audio, Visual, and Performance Arts, Radar Signal Processing, Sonar Signal Processing, Seismic Signal Processing, Medical Imaging Equipment and Techniques, Biomedical Imaging and Image Processing, Video Processing, Industrial Applications, and New Applications. Telecommunication: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platforms, Communication Network and Systems, and Telematics Services and Security Network. Instrumentation & Control: Optimal, Robust, and Adaptive Controls, Nonlinear and Stochastic Controls, Modeling and Identification, Robotics, Image-Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligence and Expert Systems, Fuzzy Logic, and Neural Networks, and Complex Adaptive Systems.
Articles 10 Documents
MATLAB Modeling of Component in Electrical Discharge Machining (EDM) Pulses Betantya Nugroho; Azli Yahya; Abd. Rahim Mat Sidek; Trias Andromeda
Media Journal of General Computer Science Vol. 1 No. 1 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i1.6

Abstract

Electrical Discharge Machining (EDM), is a machining technique for working with conductive materials. During the EDM process, electrical discharge energy is transformed into thermal energy, leading to the erosion of the workpiece. The energy utilized by the EDM process is represented by the time-dependent current, which determines the energy density employed for workpiece erosion. Ideally, during a discharge event, the current pulse should exhibit a square wave shape. However, in practice, EDM circuits often incorporate parasitic components that lead to non-square waveforms or transient currents. In this paper, we describe the simulation of parasitic components using MATLAB, revealing that these components alter the signal waveform and affect the achievement of a square pulse wave in MRR. The presence of parasitic components results in transient current patterns during the discharge phase and, consequently, a reduction in MRR. The implementation of a square wave current, however, enhances the MRR value and increases the efficiency of the EDM process
Android Security: Malware Detection with Convolutional Neural Network and Feature Analysis Sharipuddin; Rafi Septiandi Putra; M. Farhan Aulia; Sayid Achmad Maulana; Pareza Alam Jusia
Media Journal of General Computer Science Vol. 1 No. 1 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i1.7

Abstract

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source tools. Due to its system efficiency and the multitude of features it offers to users, the Android operating system has taken a leading position in the technology market and often attracts the attention of cybercriminals. As malware continues to evolve, traditional methods for detecting Android malware, such as signature-based approaches, may not be sufficient to detect the latest malware threats. Therefore, this research proposes a deep learning algorithm, specifically Convolutional Neural Network (CNN) and Component Analysis (PCA), for feature extraction to enhance the accuracy of Android malware detection. The dataset used in this study is the CICAndMal2017 dataset. Testing results are evaluated using three parameters: accuracy, precision, and recall. Experimental results indicate that our deep learning approach outperforms many other methods with an accuracy of 91%.
Improvement Attack Detection on Internet of Thinks Using Principal Component Analysis and Random Forest Adrian Pirtama; Yuda Prasetia; Redho Irnindo Saputra; Eko Arip Winanto
Media Journal of General Computer Science Vol. 1 No. 1 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i1.8

Abstract

Network security has become crucial in facing increasingly complex and sophisticated attack threats. Network intrusion detection aids in identifying suspicious activities indicating unauthorized intrusions. This research aims to enhance the performance of advanced attack detection. The Random Forest method is an algorithm that leverages an ensemble of decision trees. This ensemble comprises several independent decision trees used to classify data. One characteristic of the Random Forest method is its ability to address overfitting issues and provide good predictive quality. One approach to improving RF's performance is through Principal Component Analysis (PCA). PCA is a statistical technique used to reduce feature dimensionality. PCA eliminates feature correlations and identifies essential features that can enhance the detection of attacks and normal traffic. This research will be tested with the CIC IoT 2023 dataset, encompassing various attack types. The model testing consists of four feature dimensions, namely 5, 8, 10, and 47. The detection results are promising, significantly improving attack detection performance, reaching up to 99.2%.
Analysis Of User Satisfaction On Edmodo And E-Learning In Higher Education Student Using Kano Method Erika Pranata; Mochammad Arief Hermawan Sutoyo; Sheila Veronica; Sherly Natalie; Tiara Vinsky Wijaya; Vimaladevie Mahendra
Media Journal of General Computer Science Vol. 1 No. 1 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i1.9

Abstract

The Edmodo application and E-learning are learning facilities at University Y in Jambi to anticipate face-to-face learning that has the potential to increase the spread of the virus through direct/face-to-face interactions between lecturer and student. The purpose is to present the value from user satisfaction, determine the effect of application quality and provide suggestions regarding the Edmodo application and university Y E-learning to increase user satisfaction. The method used by the author is the Kano method. Kano's method is a method that identifies user needs and expectations through preference classification techniques. The purpose of the Kano method is to classify the attributes of a product or service by looking at the level of satisfaction and fulfillment of customer needs for the product or services offered. The data was taken by distributing questionnaires made with google forms which have been distributed online and got 58 respondents who are users of the Edmodo application and university Y E-learning. The results of calculations between these two e-learning applications are in the Indifferent phase which means these customers are indifferent to the feature, and do not care about the presence of the feature so that it does not make a significant difference in product satisfaction reaction. In the Edmodo application, students were most satisfied in the easy-to-learn application category and most dissatisfied in the satisfactory display category. As for the university Y E-learning, students were most satisfied in the trustworthy privacy category and the least satisfied in the recommended category.
Development of Platformer Game “Adventure Drake” Using Finite State Machine Method Roby Setiawan; Agus Nugroho; Bima Redhy Putra
Media Journal of General Computer Science Vol. 1 No. 1 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i1.10

Abstract

Video game is one of the most popular hobbies out there, someone who have been played games always ended with fun experience and adrenaline rush. The people who enjoy this type of hobby so diverse starring with kids, teenager, and adult. With increasing technology playing game is not exclusive on desktop pc or game console, but now can be play on smartphone with android and IOS system operations, so they can play game wherever they want, and whenever they want. For that reason, the author with interested in designing game with the platformer genre using 2D technology and using finite state machine for controlling character animation Therefore author make research platformer game adventure drake using finite state machine, the itself game can be played by anytime at anywhere. The main reason to building this game therefore adding onto the collection Indonesia game’s and analyses the game with implementing finite state machine method. The result from building this game is great, the game success implementing both 2D technology and finite state machine.
Development of Smart Blind Stick using Global Positioning System Yamuna Mahadevan; Siti Haryanti Hairol Anuar
Media Journal of General Computer Science Vol. 1 No. 2 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i2.21

Abstract

The smart blind stick using Global Positioning System (GPS) is an assistive device designed to enhance the mobility and independence of visually impaired individuals. Traditional blind sticks provide basic obstacle detection and aid in navigation, but it lacks an advanced feature for precise location tracking and route guidance. This project aims to leverage GPS technology by developing a prototype of smart blind stick that can send information to the user's position and provide audio-based for alert. The proposed system incorporates a GPS module to acquire real-time coordinates and a microcontroller to process the data. The device is designed to be lightweight, portable, and user-friendly. The software component involves developing a user interface that allows the user to input their destination or select pre-defined routes. The system then calculates the optimal path based on the GPS coordinates and provides step-by-step directions, that include distance and directional cues. To enhance the functionality, additional features of obstacle detection using ultrasonic sensors have been integrated. These sensors can alert the user about potential obstacles in them path, further improving safety during navigation. The smart blind stick using GPS aims to offer a cost-effective and efficient solution for visually impaired individuals, enabling them to navigate unfamiliar environments with confidence. The success of this project will be evaluated through simple user testing and feedback collection.
Identification of Indonesian Sign Language System Using Deep Learning in Yolo-based Arahmad taupiq; Muhammad Wildan Fajri; Dannylee
Media Journal of General Computer Science Vol. 1 No. 2 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i2.22

Abstract

Deafness, or hearing impairment, refers to the loss of auditory capability in one or both ears. Deaf communities often develop sign languages to facilitate communication. Sign language, which employs hand movements, is commonly adopted by individuals with hearing impairments. In Indonesia, two primary sign languages are used: BISINDO (Bahasa Isyarat Indonesia) and SIBI (Sistem Isyarat Bahasa Indonesia). The main distinction between these languages is that BISINDO employs both hands for signing, whereas SIBI uses only one hand. Individuals with hearing impairments face significant communication challenges. This study focuses on the detection of alphabets in the Indonesian Sign Language System (SIBI) using YOLO v5. The objective is to recognize alphabetic characters through hand gesture signals. Experimental results indicate a detection success rate of 95.38%, accurately identifying 23 out of the 24 tested letters.
Analysis of Accreditation's Impact on Student Numbers in South Sumatra Private Universities Using K-Means Clustering Muhammad Sulkhan Nurfatih; Yusi Nurmalasari; Agustian Prakarsyah
Media Journal of General Computer Science Vol. 1 No. 2 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i2.23

Abstract

Private universities in Indonesia are essential in meeting the educational needs of the country's increasing number of students. Among the key determinants of student enrollment is the accreditation status of these institutions. This study investigates how accreditation status influences student numbers at private universities in South Sumatra, employing the K-Means clustering method for analysis. Data from various institutions across South Sumatra were collected and analyzed, revealing distinct patterns in how universities are grouped based on their accreditation and enrollment figures. The findings shed light on the significant relationship between accreditation status and student enrollment, offering valuable insights for policymakers and university administrators. These insights can inform the development of effective student admission strategies, ultimately contributing to the growth and success of private universities in the region. This research not only highlights the importance of accreditation but also provides a comprehensive understanding of the factors driving student growth at private universities in South Sumatra.
Detection of Hoax News Using TF-IDF Vectorizer and Multinomial Naïve Bayes and Passive Aggressive Rizky Adrian; Musaddam; Muhammad Ikhsan; M. Riza Pahlevi. B
Media Journal of General Computer Science Vol. 1 No. 2 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i2.24

Abstract

The website is a source of information, but not all information is guaranteed to be correct. Some news can beconsidered hoaxes or not based on facts. This research aims to build a hoax news detection system on English languagenews websites. The method used involves the multinomial Naive Bayes and Passive Aggressive approaches.Classification report analysis shows the superiority of the Passive Aggressive Classifier with significant improvementsin all evaluation metrics compared to Multinomial Naïve Bayes. The conclusion is based on the characteristics of thedataset, confirming the effectiveness of the Passive Aggressive Classifier in solving the task of classifying fake news inEnglish, with the highest accuracy reaching 93.74%.
Vehicle Police Number Detection Using Yolov8 Gilang Ramadhan; Revinda Dwi Artanti Khairiyah; Salwa Natania; Abdul Harris
Media Journal of General Computer Science Vol. 1 No. 2 (2024): MJGCS
Publisher : MASE - Media Applied and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62205/mjgcs.v1i2.25

Abstract

This research discusses the application of the YOLOv8 object detection model in recognizing and extracting vehicle license plate numbers from vehicle images. This method leverages deep learning technology to achieve accurate and efficient detection of license plates under various visual conditions. The proposed approach utilizes deep neural networks to identify and extract license plate information with high precision. Experiments and evaluations were conducted using a diverse vehicle dataset, demonstrating YOLOv8's capability to detect license plates quickly and reliably. The experimental results show a promising accuracy level, highlighting the significant potential of this approach for vehicle license plate detection applications. The achieved accuracy rate is 90%.

Page 1 of 1 | Total Record : 10