cover
Contact Name
Muhammad Wali
Contact Email
muhammadwali@amikindonesia.ac.id
Phone
+6285277777449
Journal Mail Official
ijsecs@lembagakita.org
Editorial Address
Jl. Teuku Nyak Arief No. 7b 23112, Kota Banda Aceh, Banda Aceh, Provinsi Aceh
Location
,
INDONESIA
International Journal Software Engineering and Computer Science (IJSECS)
ISSN : 27764869     EISSN : 27763242     DOI : https://doi.org/10.35870/ijsecs
Core Subject : Science,
IJSECS is committed to bridge the theory and practice of information technology and computer science. From innovative ideas to specific algorithms and full system implementations, IJSECS publishes original, peer-reviewed, and high quality articles in the areas of information technology and computer science. IJSECS is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of information technology and computer science applications..
Articles 284 Documents
Optimization of Bandwidth Management and Network Security Using PPPoE Method and Intrusion Detection Prevention System Arham, Muhammad; Akbar, Yuma
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5021

Abstract

Rural internet networks frequently struggle with unstable connections, bandwidth waste, and cyber vulnerabilities. We optimized bandwidth management and network security by implementing Point to Point Protocol over Ethernet (PPPoE) alongside Intrusion Detection and Prevention System (IDPS). PPPoE manages user authentication and dynamic bandwidth allocation, while IDPS identifies and blocks network threats. Our experimental research took place in Sukanegara Village network environment. Testing involved network load simulations and cyber-attack scenarios to evaluate system performance. We compared network metrics before and after implementation, focusing on bandwidth consumption, threat detection rates, and connection stability. PPPoE implementation reduced bandwidth consumption by 35% through controlled user access and fair distribution mechanisms. The IDPS successfully detected 92% of simulated attack attempts, including port scanning, flooding attacks, and unauthorized access attempts. Network latency dropped significantly during peak usage hours, while connection stability improved across all user categories. The combined PPPoE-IDPS solution effectively addresses rural network challenges. The system delivers cost-efficient bandwidth management while maintaining robust security protection. Implementation requires minimal additional hardware and allows management by local technical staff. Our findings support widespread adoption in community and village-scale networks seeking reliable internet infrastructure with adequate security measures.
Classification Optimization of Aedes albopictus and Culex quinquefasciatus Mosquito Larvae Using Vision Transformer Method Al Faruq, Abdullah; Mulyana, Dadang Iskandar; Adrianto, Sopan
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5120

Abstract

Mosquito-transmitted diseases like Dengue Hemorrhagic Fever and Filariasis pose serious health threats throughout tropical regions, particularly in Indonesia. Quick and accurate identification of mosquito larvae plays a crucial role in disease prevention, especially for Aedes albopictus and Culex quinquefasciatus species that act as main disease carriers. Manual identification methods using microscopes or visual guides often struggle with time constraints, accuracy issues, and dependence on trained specialists. Our research focuses on improving the classification of Aedes albopictus and Culex quinquefasciatus mosquito larvae using Vision Transformer (ViT) technology, a deep learning method that has shown strong results in image recognition tasks. We applied the Vision Transformer model to classify mosquito larvae from microscopic field images. The study also tested how different factors impact model performance, such as image clarity, lighting conditions, and image resolution. Our findings show that using Vision Transformer in classification systems produced excellent results, achieving 98.00% accuracy in recall, precision, and F1-score measurements. The research reveals that Vision Transformer methods deliver better accuracy than traditional approaches like Convolutional Neural Networks and can be adapted into working systems for technology and healthcare sectors.
Implementation of a Web-Based Booking and Monitoring Information System at Tirta Jawi Resort Using Laravel and Midtrans Payment Gateway Integration Fitriastuti, Della; Rahmawati, Annisa Zalzabilla; Nugroho, Muhammad Fahrudin Wahyu; Rahmawati, Zulaikha Hesty
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5135

Abstract

Information technology transformation has reshaped operational landscapes across industrial sectors, particularly tourism. Tirta Jawi Resort, operating as a local tourism destination, experiences operational bottlenecks in managing ticket and facility reservations through manual processes. The research develops a web-based information system to streamline reservation procedures, facility monitoring, and digital payment integration via the Midtrans platform. The system employs Laravel framework with prototyping methodology, enabling gradual user requirement validation. Primary functionalities include swimming pool ticket reservations, villa and pavilion bookings, restaurant menu orders, real-time transaction reporting, and Midtrans payment gateway integration. System evaluation utilizes PIECES analysis to measure operational performance improvements, process efficiency, and service quality enhancement. Implementation results demonstrate substantial improvements in transaction processing speed, operational monitoring ease, and manual recording error reduction. The system generates added value through round-the-clock service accessibility, automated reporting transparency, and digital market expansion, enabling the resort to strengthen competitive positioning within tourism digitalization trends.
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance Akbar, Yuma; Abdillah, Gipari Pradina; Mulyana, Dadang Iskandar; Sutisna, Sutisna
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5153

Abstract

The expanding adoption of cloud services, particularly Amazon Web Services (AWS), has intensified challenges in protecting encrypted data traffic within network security frameworks. SSL/TLS protocols, widely utilized for data encryption, have become exploitation vectors for cyber adversaries as conventional security solutions lack the capability to scrutinize encrypted traffic effectively. The research addresses such security gaps by implementing Full SSL Inspection through Fortigate Virtual Appliance deployment within AWS cloud environments. The study examines cloud-based network architecture integrated with Fortigate systems, employing methodologies that encompass virtual appliance installation, SSL/TLS inspection feature configuration, and assessment of system effectiveness alongside performance impact evaluation. Research instruments include simulated cyber-attack scenarios targeting encrypted traffic patterns. Findings demonstrate that Full SSL Inspection significantly enhances threat detection capabilities within network traffic, albeit with measurable increases in system latency and computational overhead. The implementation of Fortigate Virtual Appliance proves effective in strengthening AWS data security postures. Research outcomes emphasize the necessity for configuration optimization to maintain security-performance equilibrium, positioning the solution as viable for organizations prioritizing data protection strategies
Expert System for Student Talent and Interest Using Certainty Factor and Dempster-Shafer Methods Setiady, Teddy; Wibowo, Gentur Wahyu Nyipto; Kusumodestoni, R. Hadapiningradja
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5169

Abstract

Elementary education systems in Jepara Subdistrict currently lack standardized frameworks for identifying student capabilities, leaving educators and parents without reliable tools to recognize individual talents and interests. We developed a hybrid expert system that combines Certainty Factor and Dempster-Shafer methodologies to establish quantitative assessment protocols for elementary student aptitude evaluation. Our research employed a quantitative descriptive approach, gathering data through structured behavioral observations, educator interviews, validated questionnaires, and academic documentation from multiple elementary schools across the district. The system processes student behavioral patterns using Certainty Factor methods for initial inference, then applies Dempster-Shafer algorithms to combine evidence sources while managing assessment uncertainty and subjective evaluation parameters. Preliminary testing reveals the system can generate percentage-based aptitude measurements across various domains, with interest category evaluations reaching 37% in targeted areas. We evaluated performance through accuracy validation, expert correlation analysis, precision-recall calculations, response time measurement, and knowledge base quality assessment. The hybrid approach demonstrates measurable improvements in talent identification accuracy when compared to traditional subjective methods, establishing a quantitative foundation for evidence-based educational planning. The system offers schools a standardized capability assessment tool that reduces evaluation bias while optimizing resource allocation for personalized learning development. Educational institutions can implement the framework to support more objective decision-making in student guidance and curriculum planning, particularly valuable for Indonesia's evolving educational landscape that emphasizes individualized learning pathways
Evaluation and Improvement Recommendations for the Development of an Informal Job Seeker Application Using the Scrum Maturity Model: (Case Study of the ABC Application at PT XYZ) Dwinta, Salma Salsabila; Iskandar, Joko
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 2 (2025): AUGUST 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i2.5173

Abstract

PT XYZ developed the ABC application to support informal job seekers through Scrum framework implementation during redevelopment. Implementation obstacles including inadequate backlog management, ambiguous Definition of Done (DoD) criteria, and irregular Scrum event execution prevented optimal framework adoption. We assess Scrum practice maturity levels through the Scrum Maturity Model (SMM) while proposing specific enhancement strategies. Our mixed-methods investigation combined KPA-based questionnaires with semi-structured interviews across development teams. Results indicate the project operates at Maturity Level 2 (Managed), achieving an 81.8% average KPA rating. Software Requirements Engineering emerged as the sole Level 2 Key Goal reaching Fully Achieved status (86.25%), whereas goals spanning Levels 3-5 maintained Largely Achieved classifications. Strategic recommendations encompass DoD clarification, enhanced Product Owner engagement, standardized performance metrics implementation (burndown and velocity charts), Sprint Review optimization, and Work in Progress (WIP) limit application. Management validation at PT XYZ resulted in 62.5% recommendation acceptance, revealing that several practices existed pre-assessment yet lacked optimization. The research delivers practical guidance for Scrum adoption enhancement and process maturity advancement, specifically within software development projects serving informal labor markets.
Design of BPJS Patient Referral Information System Based on Python Tkinter at Mulia Medika Clinic Dewi, Piyyawati; Yunengsih, Yuyun; Abdussalaam, Falaah
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5168

Abstract

Digital transformation is still an ongoing process in health service delivery to improve operational performance and service quality. However, BPJS Kesehatan patient referrals are still trapped in administrative bottlenecks. At Mulia Medika Clinic, staff used to handle BPJS patient referrals manually, so that records were prone to errors and delays in obtaining information. We designed, implemented, and tested a desktop-based BPJS referral information system using Python and Tkinter for clinic operations. The development process followed the Waterfall methodology, which consisted of requirements analysis, system architecture design using Context Diagrams, Data Flow Diagrams, Entity-Relationship Diagrams as well as Flowcharts followed by implementation and black-box testing validation. The system will manage patient records, referral processing as well as user administration. Automated features include generating referral letters and producing reports. Testing has proven that this system is accurate and efficient—the manual workload has reduced, data traceability has improved, and continuity in the referral service has been maintained. Results prove operational readiness for clinic deployment to enhance administrative efficiency and precision of the referral data. Currently, it runs standalone without real-time database synchronization; hence workflow integration cannot be achieved. Future versions should have direct connections with both clinic management and BPJS databases to allow seamless data exchange without manual synchronization
Development of a Web-Based Educational Information System Using the RAD Method: A Case Study at Persahabatan Hospital Setiawan, Reza; Arinal, Veri
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5249

Abstract

RSUP Persahabatan operates as a teaching hospital supporting clinical education for medical professionals through Specialist Medical Education Programs (PPDS) and medical internships (Coass). The current registration infrastructure exhibits significant operational deficiencies, including recurring data entry errors, compromised information integrity, and dependence on manual reporting via Microsoft Excel. These limitations create administrative bottlenecks and reduce process reliability. To address these challenges, we developed a web-based student registration platform employing the Rapid Application Development (RAD) methodology. RAD facilitates accelerated development cycles through iterative prototyping and continuous stakeholder engagement. The platform incorporates automated document validation mechanisms and WhatsApp notification systems triggered upon registration approval. Implementation involved four RAD phases: planning, user design, construction, and cutover. Black-box testing and user acceptance testing validated functional integrity across all modules. Testing results demonstrated zero errors in registration workflows, document uploads, and verification processes. The platform achieved a maximum response time of 2.8 seconds per transaction while supporting concurrent user access. Results indicate measurable improvements in administrative efficiency, data accuracy, and processing speed compared to the previous manual system.
Decision Tree-Based Potential Athletics Athlete Selection System for PASI DKI Jakarta Sugiyono, Sugiyono; Arpinda, Arpinda
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5242

Abstract

Selection of athletes in competitive sports is mostly based on subjective judgments; therefore, it results in inconsistency. This research presents a classification model that will help to measure the potential of athletes using the Decision Tree algorithm by utilizing real competition data from PASI DKI Jakarta. The dataset used consists of 450 records of athletes with attributes such as race category, time records, and ranking information. The analysis was performed based on the CRISP-DM framework which comprises six stages: business understanding, data exploration, preparation, modeling, evaluation, and deployment. Development and testing of the model were carried out in RapidMiner software using a 10-fold cross-validation technique. It achieved an accuracy of classification equal to 92.22% with a standard deviation of ±5.37%. The performance metrics show precision rates at 96.88% for High, 78.95% for Medium, and 94.87% for Low classes; while recall values are 100%, 88.24%, and 88.10%, respectively. The decision tree model generated specifies ranking as the root node meaning that this attribute has the highest influence on class separation among other attributes in this dataset. There are three classification rules produced by this model: ranking ≤3.500 is classified into high potential; between 3.500-6.500 belongs to medium potential; otherwise greater than 6.500 will be classified into low potential which can be applied practically as a decision support system enabling coaches to perform objective systematic data-driven processes in selecting athletes
Implementation of Haar Cascade and K-Nearest Neighbors (KNN) Face Recognition for Optimizing Warehouse Access Control Security Mulyana, Dadang Iskandar; Ramadhan, Muhammad Adri
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5244

Abstract

Warehouse facility access control security represents a critical factor in maintaining operational integrity and preventing criminal activities. This research addresses the elevated security threat risks associated with physical surveillance systems that continue to rely on manual methods with suboptimal performance. The study develops an automated security system based on face recognition technology, implementing Haar Cascade and K-Nearest Neighbors Classifier methods to identify and verify warehouse user identities with precision and automation. The research object focuses on facial recognition systems for warehouse access control. The methodology applies Haar Cascade algorithms for facial detection and K-Nearest Neighbors Classifier for classifying detected faces against existing datasets. Implementation utilizes external webcams, computer hardware, and Python-based programming software. Results demonstrate that the developed system achieves facial recognition accuracy exceeding 90%, delivering superior security performance compared to manual systems. The research concludes that face recognition technology effectively enhances efficiency and security in warehouse access management. The study recommends implementing such systems in large-scale warehouse facilities to optimize security management protocols