https://epublikasi.digitallinnovation.com/index.php/mcs/issue/feed Media of Computer Science 2026-01-14T07:23:29+00:00 Mutmainnah Muchtar ejournal@digitallinnovation.com Open Journal Systems https://epublikasi.digitallinnovation.com/index.php/mcs/article/view/239 ETL Implementation with Pentaho for Sales Data Visualization: A Case Study of Lunabit Beauty Bar 2025-08-26T19:58:44+00:00 I Gde Eka Dharsika ekadharsika@instiki.ac.id Ni Kadek Ayu Sulistiawati ayusulistiawati@gmail.com Ida Bagus Gede Sarasvananda sarasvananda@unud.ac.id <p><em>The rapid growth of information technology has encouraged businesses to optimize their data management through data warehousing and visualization. This study presents the implementation of the Extract, Transform, Load (ETL) process using Pentaho Data Integration (PDI) for the development of a sales data visualization dashboard at Lunabit Beauty Bar. The ETL process was carried out on sales transaction data originally stored in CSV format and later structured into a MySQL-based data warehouse. The stages of ETL include data extraction, transformation involving cleaning, integration, and validation to ensure consistency, and loading into the warehouse for further analysis. The visualization dashboard displays several analytical perspectives, including sales trends over time, sales performance by treatment, customer contributions, and treatment ranking from highest to lowest. To evaluate system performance and usability, a User Acceptance Test (UAT) was conducted involving 16 respondents, including the owner and staff. The results showed a satisfaction rate of 94%, indicating that the system met the company's needs in providing valid, clear, and easy-to-understand information. This research demonstrates that the integration of ETL processes with data visualization tools can support business decision-making, particularly in monitoring sales performance and designing promotional strategies.</em></p> 2025-12-26T00:00:00+00:00 Copyright (c) 2025 I Gde Eka Dharsika, Ni Kadek Ayu Sulistiawati, Ida Bagus Gede Sarasvananda https://epublikasi.digitallinnovation.com/index.php/mcs/article/view/241 Preprocessing Image for License Plate Detection: A Systematic Literature Review 2025-10-22T01:56:35+00:00 Riyan Bagas Dwi Prasetyo riyan_bdp@gmail.com Vugar Abdullayev abdulvugar@mail.ru Nurcahya Pradana Taufik Prakisya nurcahya.ptp@staff.uns.ac.id Yudianto Sujana yudianto.sujana@staff.uns.ac.id Rahmat Siswanto s24e0566f@siswa.umk.edu.my <p><em>Rapid population growth contributes to an increase in the volume of vehicles, creating major challenges in their management. One potential solution is the application of deep learning-based artificial intelligence technology for automatic detection of vehicle license plates. This research uses a Systematic Literature Review (SLR) approach to evaluate the performance of various deep learning architectures in the detection process. Out of 125 articles identified, 20 articles were selected based on specific selection criteria. The analysis revealed that preprocessing techniques, such as HE, AHE, ECHE, CLAHE, and ECLACHE, have significant contributions in the processing of vehicle license plate datasets. These techniques were able to improve the visual quality of the images, thus supporting the detection process with an accuracy rate of more than 95%. This research also identified challenges, such as high computational requirements and large-scale data processing. Further research is recommended to apply preprocessing on standardized datasets to develop a reliable, efficient and sustainable detection system.</em></p> 2026-01-14T00:00:00+00:00 Copyright (c) 2025 Riyan Bagas Dwi Prasetyo, Vugar Abdullayev, Nurcahya Pradana Taufik Prakisya, Yudianto Sujana, Rahmat Siswanto https://epublikasi.digitallinnovation.com/index.php/mcs/article/view/249 Implementation of Blockchain Technology for Securing Data Point Transactions in an IoT-Based Waste Sorting System 2025-10-29T03:32:32+00:00 Naufal Raihan Elriza h1051211094@student.untan.ac.id Kasliono Kasliono kasliono@siskom.untan.ac.id Hirzen Hasfani hirzenhasfani@siskom.untan.ac.id <p><em>An Internet of Things (IoT) based waste sorting device awards points to users who dispose of waste through it, as long as the user is registered in the system. However, despite these benefits, this system is vulnerable to various forms of cybercrime. One such challenge is the rise of data manipulation and cyberattacks such as sql injection and threats from internal parties (Insider Threats). This research aims to secure point data transactions in an Internet of Things (IoT) based waste sorting system integrated with blockchain technology to improve security in recording user point data. Tests were conducted to ensure that point data sent from IoT devices were successfully recorded on the blockchain network permanently and verified through transaction hashes in etherscan and to prevent sql Injection and Insider Threat attacks in attempts to illegally alter data. The results of the data transmission test to the blockchain network, which was carried out 30 times, showed that each transaction was successfully recorded and provided a transaction hash. In addition, the attack test, which was carried out 30 times, each attack resulted in a notification with the text “[PERINGATAN] Terjadi Percobaan Pengubahan Poin " in red. Using the blockchain network, both attacks failed to alter user points</em></p> 2025-12-27T00:00:00+00:00 Copyright (c) 2025 Naufal Raihan Elriza, Kasliono Kasliono, Hirzen Hasfani https://epublikasi.digitallinnovation.com/index.php/mcs/article/view/247 Driver Drowsiness Bracelet Using Heart Rate Sensor and Arduino Uno 2026-01-14T07:23:29+00:00 Lesmana Dwi Prayudha h1051211048@student.untan.ac.id Uray Ristian eristian@siskom.untan.ac.id Hirzen Hasfani hirzen.hasfani@siskom.untan.ac.id <p><em>Traffic accidents are incidents on the road that result in material losses or fatalities, and approximately 69.7% of them are triggered by human error. One of the dominant factors is reduced alertness due to drowsiness, which can develop into microsleep—a brief loss of consciousness that often goes unnoticed by drivers. Since microsleep is associated with physiological changes such as a decrease in heart rate during the early phase before falling asleep, heart-rate signals serve as an important indicator for monitoring drowsiness. This study develops a driver drowsiness monitoring system based on a heart-rate sensor packaged in a wristband and controlled by an Arduino Uno. A pulse sensor operating on the Photoplethysmography (PPG) principle is used as the main input, while a signal-filtering mechanism is incorporated to reduce noise caused by hand movement, ensuring stable data quality. The system implementation successfully produced clean and consistent heart-rate signals that can be processed to identify drowsiness indicators without significant interference. Testing results show that the designed system is capable of monitoring heart-rate activity effectively and providing valid indicators of drowsy conditions. Overall, the device demonstrates strong potential as a practical solution to help prevent accidents caused by microsleep.</em></p> 2026-02-02T00:00:00+00:00 Copyright (c) 2025 Lesmana Dwi Prayudha, Uray Ristian, Hirzen Hasfani https://epublikasi.digitallinnovation.com/index.php/mcs/article/view/258 Implementation of the Advanced Encryption Standard (AES) Algorithm on Access Code QR Codes in a Smart Door System 2025-12-05T07:55:12+00:00 Ihsan Azhar Rhamadan h1051211115@student.untan.ac.id Kasliono kasliono@siskom.untan.ac.id Syamsul Bahri syamsul.bahri@siskom.untan.ac.id <p><em>This research aims to design a smart door system based on QR codes with increased security using the AES-256-CBC algorithm. With AES-256-CBC encryption, the access code data sent from the device to the server is no longer in plaintext form, making it more secure from Man-in-the-Middle (MitM) attacks such as sniffing. The system utilizes ESP32-CAM to read QR codes and NodeMCU ESP32 to encrypt access data using a key hashed with SHA-256 and a 16-byte IV before being sent to the server for verification. Performance testing shows that the average delay increased from 66.4 ms to 67.46 ms after AES implementation, with a maximum value of 82 ms which is still in accordance with the TIPHON standard. On the throughput side, without AES the average is only 5.23 kbps due to shorter data, while with AES it increases to 7.30 kbps with a peak of 8 kbps due to the longer ciphertext size. The response time test recorded an average of 3830.76 ms and a maximum of 6086 ms, spanning the process from sending the code to opening the solenoid. Despite variations due to internet connection quality, delay spikes do not significantly impact system performance, indicating that the system remains secure and stable for IoT-based access control.</em></p> 2026-02-02T00:00:00+00:00 Copyright (c) 2025 Ihsan Azhar Rhamadan, Kasliono, Syamsul Bahri