Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Electrical and Computer Engineering

Optimisation towards Latent Dirichlet Allocation: Its Topic Number and Collapsed Gibbs Sampling Inference Process Bambang Subeno; Retno Kusumaningrum; Farikhin Farikhin
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.186 KB) | DOI: 10.11591/ijece.v8i5.pp3204-3213

Abstract

Latent Dirichlet Allocation (LDA) is a probability model for grouping hidden topics in documents by the number of predefined topics. If conducted incorrectly, determining the amount of K topics will result in limited word correlation with topics. Too large or too small number of K topics causes inaccuracies in grouping topics in the formation of training models. This study aims to determine the optimal number of corpus topics in the LDA method using the maximum likelihood and Minimum Description Length (MDL) approach. The experimental process uses Indonesian news articles with the number of documents at 25, 50, 90, and 600; in each document, the numbers of words are 3898, 7760, 13005, and 4365. The results show that the maximum likelihood and MDL approach result in the same number of optimal topics. The optimal number of topics is influenced by alpha and beta parameters. In addition, the number of documents does not affect the computation times but the number of words does. Computational times for each of those datasets are 2.9721, 6.49637, 13.2967, and 3.7152 seconds. The optimisation model has resulted in many LDA topics as a classification model. This experiment shows that the highest average accuracy is 61% with alpha 0.1 and beta 0.001.
Enhancing system integrity with Merkle tree: efficient hybrid cryptography using RSA and AES in hash chain systems Fauzi, Irza Nur; Farikhin, Farikhin; Jie, Ferry
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 6: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i6.pp5679-5689

Abstract

An analysis is conducted to address the growing threats of data theft and unauthorized manipulation in digital transactions by integrating \structures within hash chain systems using hybrid cryptography techniques, specifically Rivest-Shamir-Adleman (RSA) and advanced encryption standard (AES) algorithms. This approach leverages AES for efficient symmetric data encryption and RSA for secure key exchanges, while the hash chain framework ensures that each data block is cryptographically linked to its predecessor, reinforcing system integrity. The Merkle tree structure plays a crucial role by allowing precise and rapid detection of unauthorized data changes. Empirical analyses demonstrate notable improvements in both the efficiency of cryptographic processes and the robustness of data validation, underscoring the method’s applicability in high data throughput environments such as educational institutions. This research makes a substantive contribution to information security by offering a sophisticated solution that strengthens data protection practices, ensuring greater resilience against increasingly sophisticated data threats.
Co-Authors A. Haris A. Rusgiyono Acep Irham Gufroni Adi Ariyo Munandar Adi Suliantoro Ahmad Abdul Chamid Ahmad Lubis Ghozali Aprilia, Maita Aris Sugiharto Arnelli Arnelli B. Raharjo Bambang Irawanto Bambang Irawanto Bambang Subeno Bayu Surarso Bayu Surarso Beta Noranita Bibit Waluyo Aji Budi Warsito Carolin Carolin Catur Edi Widodo D. Ispriyanti Didik Setiyo Widodo Dinar Mutiara Kusumo Nugraheni Djuwandi Djuwandi DONNY IRAWAN MUSTABA Dwinta Rahmallah Pulukadang, Dwinta Rahmallah E. Setiawati Erikha Feriyanto Erlin Dwi Endarwati, Erlin Dwi Esti Wijayanti, Esti F. Ariyanto Faozi, Safik Faudin, Arif Nur Fauzi, Irza Nur Feriyanto, Erikha Ferry Jie, Ferry Fitika Andraini H. Sutanto Heny Maslahah, Heny I. Marhaendrajaya Iswahyudi Joko Suprayitno J. E. Suseno Kartono . Keszya Wabang Kusworo Kusworo Laily Rahmania, Laily LM Fajar Israwan, LM Fajar M. Izzati M. Nur Madani, Faiq Mansur Mansur Meryta Febrilian Fatimah, Meryta Febrilian Mustafid Mustafid Neza Zhevira Septiani Nikken Prima Puspita Nikken Prima Puspita Nur Khasanah Oky Dwi Nurhayati Pangestika, Vidya Dwi Pradana, Fadli Dony Prantiastio Prastio, Wahyu Tedi Priyono Priyono Purwanto Purwanto R. Hariyati R. Hastuti Rachmat Gernowo Ratri Wulandari Retno Kusumaningrum Rezki Kurniati, Rezki Rineka Brylian Akbar Satriani Rinta Kridalukmana Robertus Heri Sulistyo Utomo S. Tana Safik Faozi, Safik Satriani, Rineka Brylian Akbar Siti Khabibah Siti Khabibah Sri Wahyuni Sugito Sugito Suhartono Suhartono Sunarsih . Suparti Suparti T. Windarti Titi Udjiani SRRM Toni Prahasto Udjiani , Titi Udjiani S.R.R.M, Titi Usman, Carissa Devina Uswatun Khasanah W. H. Rahmanto Wahyul Amien Syafei Wardani, Novita Koes Wardianto, Wardianto Warsito , Budi Wicaksono, Mahad Wyne Mumtaazah Putri Yosza Dasril Yully Estiningsih Z. Muhlisin