Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : International Journal of Engineering, Science and Information Technology

Emarketplace Performance Analysis Using PIECES Method Munirul Ula; Rizal Tjut Adek; Bustami Bustami
International Journal of Engineering, Science and Information Technology Vol 1, No 4 (2021)
Publisher : Master Program of Information Technology, Universitas Malikussaleh, Aceh Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (360.5 KB) | DOI: 10.52088/ijesty.v1i4.138

Abstract

E-Marketplace is a place in cyberspace where prospective buyers meet each other to conduct transactions electronically through the internet medium. Like the market in the conventional sense, namely a meeting place for sellers and buyers, in the E-Marketplace, various companies in the world also interact without being limited by the territory of space (geography) and time. Therefore, an analysis of the performance of the website is needed to ensure the performance of the Bireuen emarketplace (meukat.com) website can run effectively in the future. The role of this emarketplace is very important, therefore in building emarketplace we must pay attention to several factors, namely: performance, information, economic, control, efficiency, and service, which is better known as the PIECES method. To analyze the performance of our self-developed emarketplace, was done by PIECES method. While the testing method in the performance analysis of the website uses the GTMetrix and Google Transparency applications. The results of the PIECES questionnaire on the dimensions of Information, Economy, Efficiency, and Service. The average score for the all dimensions is moderate, it is ranging from 42.8% to 51.45% and is in line with the expectations. The GTMetric test results of the Emarketplace website, shows that the average performance grade is 66% or grade D. This means that the quality of the Emarketplace website based on the index generated by Google is still low. It should be improved to provide good quality of service for users in future. The Emarketplace are also being analyzed by the Google transparency report, the result is “no unsafe content” was found, means this website is safe to visit. There are no applications that harm the users.
Performance Analysis Algorithm Classification and Regression Trees and Naive Bayes Based Particle Swarm Optimization for Credit Card Transaction Fraud Detection Afridah, Rita; Ula, Munirul; Rosnita, Lidya
International Journal of Engineering, Science and Information Technology Vol 4, No 3 (2024)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v4i3.523

Abstract

With the advancement of technology, credit cards have become a popular tool for transactions, both physically and online, due to their ease of use and seamless integration with banking systems. However, with the increasing use of credit cards, the cases of fraud have also risen, resulting in financial losses for both cardholders and banks. To address this issue, effective and efficient credit card transaction fraud detection has become a top priority. Using machine learning algorithms is one of the techniques that can be employed to detect fraud in credit card transactions. The purpose of this research is to determine the performance and find the best method of the CART algorithm, Naive Bayes, and their combination with Particle Swarm Optimization (PSO) in detecting fraud in credit card transaction histories. The data used consists of 568,630 big data entries with parameters including id, V1-V28, amount, and class. The research results obtained are as follows: the accuracy of the Naive Bayes algorithm is 93.15%, precision is 94%, recall is 93%, and AUC is 0.99. For the CART algorithm, the accuracy is 99.96%, with precision and recall at 100%, and AUC at 1.00. Additionally, the Naive Bayes algorithm combined with PSO achieved an accuracy of 98.50%, precision and recall of 98%, and AUC of 1.00. Lastly, the CART algorithm combined with PSO reached an accuracy of 99.97%, with precision and recall at 100%, and AUC at 1.00. It can be concluded that the best method resulting from the tests conducted is the Classification and Regression Trees method combined with Particle Swarm Optimization.
Mobile Learning Application Tahsin Al-Quran Using Dynamic Time Warping Method Based on Adroid Nasution, Wahidatunnisa; Ula, Munirul; Rosnita, Lidya
International Journal of Engineering, Science and Information Technology Vol 4, No 3 (2024)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v4i3.512

Abstract

This research aims to design and build an Android-based Quran tahsin learning mobile application using the Dynamic Time Warping (DTW) method. This application offers tajweed learning features and voice exercises to find out the readings of Al-Quran readers. The DTW method is used to analyze the similarity between the user's voice pattern and the reference voice pattern in the application. The research methods used include reference collection, direct observation, and literature study. The application is designed with a user-friendly interface and equipped with an accurate ability evaluation feature, so that users can find out their weaknesses and strengths in learning Qur'an tahsin. Based on the test results, out of 42 voice data tested, 38 data were successfully recognized correctly and 4 data had errors. The average accuracy rate of this application reached 90.47%. This application is designed to overcome some of the main problems in learning Quran tahsin: lack of understanding of basic tahsin techniques, lack of appropriate learning tools, difficulty in evaluating skills, and lack of motivation to learn. With this application, users can learn Quran tahsin more easily and effectively through interactive and varied methods. Evaluation of users' ability to recite Quranic verses can also be done accurately, so that users can know their strengths and weaknesses in tahsin learning. The implementation of this application is expected to make a significant contribution in improving the quality of Quran tahsin learning among the wider community.
Application of Fuzzy C-Means and Borda in Clustering Crime–Prone Areas and Predicting Crime Rates Using Long Short Term Memory in Northern Aceh Regency Lubis, Syahrul Andika; Ula, Munirul; Retno, Sujacka
International Journal of Engineering, Science and Information Technology Vol 5, No 1 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i1.747

Abstract

North Aceh is a district with diverse geographical conditions, ranging from vast lowland areas in the north stretching from west to east, to mountainous areas in the south. The average altitude in North Aceh is 125 meters. The district covers an area of 2,694.66 km² with a population of 614,640 people in 2022. The issue of crime in North Aceh District has caused significant discomfort among the community. According to data from the Central Bureau of Statistics (BPS) of Aceh Province, the number of criminal cases increased from 6,651 cases in 2022 to 10,137 cases in 2023. Using the Fuzzy C-Means clustering method, the data was grouped into three clusters: cluster 1 represents safe areas, cluster 2 represents moderately vulnerable areas, and cluster 3 represents vulnerable areas. For ranking using the Borda method, the Dewantara Police Sector ranked first for the physical aspect, while the Muara Batu Police Sector ranked first for the item aspect. As for predictions using the LSTM model, almost all subdistricts achieved MAPE values below 20%, indicating that the LSTM model is quite effective in predicting crime-prone areas. For example, Baktiya District recorded a MAPE value of 15.85% for the physical aspect, while the best result was achieved by Simpang Keramat District for the item aspect with a MAPE value of 0.00%. However, in Syamtalira Bayu District, the item aspect reached a MAPE value of 20.07%. Although the MAPE value for the item aspect in Syamtalira Bayu is relatively high, it is still considered acceptable as it remains below 50%.
Measuring the Level of Security Awareness of Smartphone Users Among Universitas Malikussaleh Students Using the Fuzzy Analytical Hierarchy Process Method Andreansyah, Sabda; Ula, Munirul; Afrillia, Yesy
International Journal of Engineering, Science and Information Technology Vol 5, No 2 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i2.861

Abstract

Technology is developing rapidly; its benefits are manifold. The development of technology, especially smartphones, Has become a part of everyday life that cannot be distinguished anymore. The increasing number of smartphone users has also impacted the rising information security and privacy cases caused by a lack of awareness of spam, malware, and phishing. Many users upload personal information such as photos, phone numbers, and addresses without antivirus protection. This study aims to identify security and privacy challenges in smartphone use by measuring problems in the dimensions of attitude (knowledge), knowledge (attitude), and behavior (behavior). There are five focus areas: Backdoor, hardware, and AndroidOS, which is still low compared to applications and permissions. The method used the Analytical Hierarchy Process (AHP) with the Fuzzy concept to measure the level of information security awareness of Malikussaleh University students who use Android phones. The results showed that the overall level of understanding was good (80%). Although the attitude and behavior dimensions showed good awareness, the knowledge dimension was moderate. This may be why information security breaches still often occur among Android phone users. Faculty of Economics, Less Aware: 23 people Unaware: 1 person. Faculty of Social and Political Sciences, Less Aware: 24 people. Faculty of Teacher Training and Education, Less Aware: 21 people. Faculty of Law, Less Aware: 24 people. Faculty of Medicine, Less Aware: 27 people and Aware: 3 people. Faculty of Agriculture, Less Aware: 30 people. Faculty of Informatics Engineering, Less Aware: 70 people and Aware: 5 people. Total Awareness, Less Aware: 199 people, nine people, and Unaware: 1 person.
Firewall Analytics in DNS and SYN Flood Protection on Mikrotik CCR in the North Aceh District Government Imanda, Nanda; Abdullah, Dahlan; Fajriana, Fajriana; Nurdin, Nurdin; Ula, Munirul
International Journal of Engineering, Science and Information Technology Vol 5, No 4 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i4.1791

Abstract

This study investigates the implementation of an analytical firewall on the Mikrotik Cloud Core Router (CCR) device for network protection against Domain Name System (DNS) and Synchronise Flood (SYN Flood attacks in the information technology infrastructure of the North Aceh Regency Government. DNS-based attacks and SYN Flood have demonstrated a significant disruptive capacity for the continuity of electronic public services, illustrating the urgency of robust security protocols on government infrastructure. The study implemented a quantitative-experimental approach, with methodological triangulation in empirical data acquisition through controlled attack simulations, firewall log analysis, and semi-structured interviews with technical personnel. Experiments are designed with variations in attack intensity to evaluate system resilience thresholds, while firewall log analysis facilitates the identification of anomalous patterns through detection algorithms. The analytics process applies parametric evaluation to temporal mitigation metrics, packet processing capacity, and operational implications on network performance, complemented by descriptive statistical analysis that explores data distribution and temporal trends. The results indicate the differential effectiveness of the specific firewall configuration against a specific attack typology, with an empirical determination of optimisation parameters for real-time mitigation. This research contributes to the corpus of knowledge regarding the security of government networks through the derivation of protective models that are adaptive to the operational characteristics of public infrastructure. The findings have substantive implications for cybersecurity policy formulation in the administrative context of local governments, with extensive significance for the implementation of network architectures that are resilient to volumetric attacks and protocol exploitation.