Bulletin of Computer Science and Electrical Engineering

Journal Information
EISSN : 2722-7324
Current Publisher: Indonesian Scientific Journal (10.25008)
Total articles ≅ 10
Filter:

Latest articles in this journal

Rachmat Rachmat, Suhartono Suhartono
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 80-86; doi:10.25008/bcsee.v1i2.8

Abstract:
The quality health service is one of the basic necessities of any person or customer. To predict the number of goods can be done in a way predicted. The comparison method of Single Exponential Smoothing and Holt's method is used to predict the accuracy of inpatient services will be back for the coming period. Single Exponential Smoothing the forecasting methods used for data stationary or data is relatively stable. Holt's method is used to test for a trend or data that has a tendency to increase or decrease in the long term. The outcome of this study is the Single Exponential Smoothing method is more precise than Holt's method because of the history of hospitalized patients who do not experience an increase or no trend. In addition, the percentage of error (the difference between the actual data with the forecast value) and Mean Absolute Deviation (MAD) to calculate the forecast error obtained from the Single Exponential Smoothing method is smaller compared to Holt's method.
I Putu Agus Eka Pratama
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 63-72; doi:10.25008/bcsee.v1i2.7

Abstract:
TCP SYN Flood as one kind of Denial of Service (DoS) attack, still popular to flood the server connection, by sending SYN packets to the target. Because of the risk caused by this attack, there is a need for a network security mechanism. In this paper, one of the security mechanisms proposed is using Stateful Packet Inspection (SPI) method on Configserver Security and Firewall (CSF). By using SPI method, CSF has capabilities to responsible for separating packets of data, that may be entered with data packets that should not be entered into the server. For example: port to be opened, port closed, and IP Address that may access the server for anywhere. This paper combines both of CSF and SPI method to prevent TCP SYN Flood (DoS) with Proof of Concept (PoC) at the Linux operating system. The security process is done in 3 ways: configuring a maximum connection from an IP Address to a server, securing an incoming SYN packet per second, and counting how many times an IP Address violates the minimum SYN packet rule per second before being blocked by a firewall.
Arnawan Hasibuan, Widyana Verawaty Siregar, Elvy Sahnur Nasution, Rohana Ismail
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 73-79; doi:10.25008/bcsee.v1i2.1124

Abstract:
Evaluation of energy utilization and identification become energy saving opportunities, as well as recommendations for increasing efficiency, on energy use and use of energy sources in the context of energy conservation This paper aims to describe the audit of electrical energy in the Lido Graha Lhokseumawe Hotel room, by taking samples in different room types and conducting an electrical energy audit on the use of installed lights and air conditioners. The method used in this study is data collection, interviews, observations and direct measurements on the use of lights and AC (Air Conditioning). The data analysis technique used is to determine the estimated value of electricity consumption and how much it will cost for electricity. From the results of calculations and analysis obtained total electricity consumption needs based on the type of room with various types of loads used 855.62 kWh/days with costs that must be spent per day is Rp. 1,190,574.96, 25,668.6 kWh/month with a monthly cost of Rp. 35,087,608.60. Whereas for a year electricity demand is 308,494.8 kWh/year with a cost of Rp. 421,051,305.24.
Syamsyarief Baqaruzi, Surya Tarmizi Kasim
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 54-62; doi:10.25008/bcsee.v1i2.1123

Abstract:
A transformer is an important device in electrical processes, as we know static electricity that involves magnetically coupled coils to increase or decrease the voltage. In three-phase transformer, there are various winding connections such as delta-delta (?, ?), wye-wye (Y, Y), wye-delta (Y, ?), delta-wye (?, Y), zig-zag (Z, Z), etc. And of the many often used connection are Yy0, Yd11, Dd0, and Dy5. From these various connections, each connection has different efficiency, losses, and voltage regulation. If they are connected with resistive, inductive, or capacitive loads. This paper method has discussed a transformer connection used are Yy0, Dd0, Yd11, and Dy5 in Laboratory Konversi Energi USU to see how the influence of load changes, on voltage regulation Where a state of balance load using are resistive, inductive, capacitive, and RLC combination. The result analysis of the experiment show, the best efficiency is at Dd0 connection, when loaded condition using capacitive is average 97.87%, and the best voltage regulation is obtained at Dy5, when loaded condition using resistive is average 28.35%
Setiyono Setiyono, Bambang Dwinanto
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 42-53; doi:10.25008/bcsee.v1i2.9

Abstract:
This paper presents how to harmonic disturbance reduce on single phase power system. One of the most popular method is harmonic signal extraction with instantaneous power p q theorm. This algorithm implemented to harmonic cencellation by active power filter circuit be paralled with the non linier load. This filter generates of current compensation that are injected into the grid to improve power quality. This Filter is built by an inverter circuit that consists of a mosfet switch array and capasitor mounted on DC link side. Two types of loads are resitive inductive and resistive capasitive produce of current source wave form that close pure sinusoid. Simulation results show the THD index fell to the level of 2.7% in accordance with IEEE 519 standard rules which states that the harmonics content of the power system may occur below 4%, indicating that the power system can be categorized as having good quality.
Adrian Fathurohman, R. Wahjoe Witjaksono
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 1-11; doi:10.25008/bcsee.v1i1.2

Abstract:
The Department of Communication and Information (Diskominfo) of the Bandung City Government is an agency that has the responsibility of carrying out several parts of the Regional Government in the field of communication and informatics. Based on the composition of the regional service organization Bandung City Diskominfo has five fields and two UPTs which are part of the Bandung City Diskominfo. Bandung City Diskominfo in implementing work programs has IT as a supporter of business processes in government agencies. Based on the results of research conducted that IT management in Bandung City Government Diskominfo found several clauses that were still unfulfilled in this Diskominfo impact on the management of government information security institutions that can affect the performance of Bandung City Government. Therefore, there is a need for standardization that needs to be implemented as a guide that examines the direction in safeguarding information or assets that are considered sensitive to an organization. With the existence of these problems pushed to design information security recommendations based on ISO 27001: 2013 standards at Diskominfo. Also makes the design of IT information security systems that are focused on the control of Annex Information Security Policies, Human Resource Security, Operational Security, Communication Security and Asset Management so that business IT processes can run in accordance with the objectives of the organization. The results of this study are expected to help in securing IT information at the Bandung Diskominfo City and can also improve the goals of an organization.
Risky Novendri, Annisa Syafarani Callista, Danny Naufal Pratama, Chika Enggar Puspita
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 26-32; doi:10.25008/bcsee.v1i1.5

Abstract:
Netflix has produced many TV series, one of which is Money Heist. This series has four seasons with a total of 38 episodes. The fourth season was released on April 3, 2020, which has eight episodes. The fourth season of Money Heist is 31.73 times more demand than the average series around the world. However, despite the many requests for the fourth season of the Money Heist series, there are still some negative comments made by the connoisseurs of the Money Heist series. In the YouTube comments column on the Netflix channel, there are still many who comment neutral and provide positive comments on this series. Therefore, there needs to be a method in which viewers' comments or opinions can be analyzed in order to be able to classify the opinions they make about this series by conducting sentiment analysis using the Naïve Bayes algorithm. Based on the results of research conducted, Naive Bayes can be said to be successful in conducting sentiment analysis because it achieves results of 81%, 74.83%, and 75.22% for accuracy, precision, and recall, respectively.
Kahfi Ahadian Mutaqin, Edi Sutoyo
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 19-25; doi:10.25008/bcsee.v1i1.3

Abstract:
At present, the use of ICT is growing very rapidly. This has led to changes in processes, functions, and policies in various sectors, including the public service sector managed by the government. e-Government is a new mechanism between the government and the community and stakeholders, which involves the implementation of information technology, and aims to improve the quality (quality) of public services. Bandung City is one of the cities that is very intensive in developing the use of ICT in implementing e-Government. The focus of the city government of Bandung is the Government to Citizen (G2C) application model. The application that is still lacking in use is the e-punten application. One important factor for the success of e-Government services is the acceptance and willingness of people to use e-Government services. E-punten application services provided by the Bandung city government will not run perfectly if no people are using it. To assess what factors influence the use of e-punten applications in the city of Bandung, the UTAUT model is used. To analyze the factors that influence the acceptance of e-punten applications SEM analysis is used. In this study, the PLS-SEM approach is used to solve multiple regression when specific problems occur in the data, such as the small sample size of the study. The PLS evaluation is carried out by evaluating the measurement model and the structural model that best suits the UTAUT model. Factors that influence the use of e-punten applications are effort expectancy for behavioral intention, facilitating conditions for use behavior, and behavioral intention for use behavior. The factors that have the most influence are performance expectancy and effort expectancy.
Frisca Febriyani Kurniawan, Fauzan Radifan Shidiq, Edi Sutoyo
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 33-41; doi:10.25008/bcsee.v1i1.6

Abstract:
Symptoms and signs of mental disorders depend on the type of disorder experienced. Patients can experience interference with emotions, thought patterns, and behavior. Ways to determine the diagnosis and check whether you have a mental illness, there are several ways in the form of physical examination through a doctor, laboratory tests, psychological evaluation. There is also therapy as a healing process and recovery of the soul that is healthy. In Indonesia, many people experience mental health problems, but most are not aware of and care about these problems. Even in the worst cases, many cases lead to suicide. One factor that triggers suicide is, people who experience mental health problems do not have a place to talk about the problems they are facing, because in each city itself not all the availability of psychologist services that can help sufferers of mental health problems, let alone remember the price of psychologist services offered is quite expensive. Therefore, by taking into account these considerations, the WeCare project proposes developing a web-based platform for online psychologist consultation. In general, this platform has three main actors namely, admin, user, and psychologist. This platform is expected to be a media liaison between users (patients) with psychologists in conducting consultations.
Halim Mudia
Bulletin of Computer Science and Electrical Engineering, Volume 1, pp 12-18; doi:10.25008/bcsee.v1i1.4

Abstract:
A well-prepared abstract enables the reader to identify the basic content of the level and flow control in tanks is the heart of all chemical engineering systems. The control of liquid level in tanks and flow between tanks is a basic problem in the process industries. Many times the liquids will be processed by chemical or mixing treatment in the tanks, but always the level of fluid in the tanks must be controlled and the flow between tanks must be regulated in presence of non-linearity. Therefore, in this paper will use neural network based on backpropagation (BP) to control of level 2 in the tank 2 with the setpoint of 10 centimeters and can follow the setpoint changes to 8 centimeters given in 225 seconds. The results show that a neural network based on backpropagation can follow setpoint given with steady-state error is 0 cm, overshoot is 0%, the rising time is 49 seconds, settling time is 52 seconds and can follow setpoint changes in 51 seconds.
Back to Top Top