cover
Contact Name
Muhammad Wali
Contact Email
muhammadwali@amikindonesia.ac.id
Phone
+6285277777449
Journal Mail Official
ijsecs@lembagakita.org
Editorial Address
Jl. Teuku Nyak Arief No. 7b 23112, Kota Banda Aceh, Banda Aceh, Provinsi Aceh
Location
,
INDONESIA
International Journal Software Engineering and Computer Science (IJSECS)
ISSN : 27764869     EISSN : 27763242     DOI : https://doi.org/10.35870/ijsecs
Core Subject : Science,
IJSECS is committed to bridge the theory and practice of information technology and computer science. From innovative ideas to specific algorithms and full system implementations, IJSECS publishes original, peer-reviewed, and high quality articles in the areas of information technology and computer science. IJSECS is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of information technology and computer science applications..
Articles 284 Documents
Implementation of A Blood Donor Information System Using Mobile Applications Gunung Kidul District Sebastian, Danny; Sejati, Rr.Hajar Puji
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1762

Abstract

Blood donation is a common charitable activity in many communities. Consequently, the Indonesian Red Cross (PMI) in the Gunung Kidul district frequently organizes such humanitarian events across various locations. However, not everyone is aware of these events or is able to participate in blood donation. The lack of information dissemination and blood donation events are significant factors contributing to the low community participation. The existing system for searching, processing, and creating data is still manual, which hinders the efficiency of administrative tasks. Addressing these issues, the aim of this research is to develop an Android-based blood donation information application. This initiative is particularly vital as the PMI in Gunung Kidul lacks the necessary infrastructure to disseminate information about the availability of blood bags efficiently. In the current era of digital advancement, the slow pace of information distribution is notably ineffective, thus integrating the system with Android technology is a strategic solution. sThis blood donation application is designed for donors who lack information about blood donation activities and for organizations wishing to conduct such events. The development of this Android application system involves experimental data collection methods, including observation, interviews, literature study, and documentation. The unit testing employs the Waterfall methodology. The application is developed using the Kotlin programming language, with the aid of Android Studio software
Comparative Analysis VGG16 Vs MobileNet Performance for Fish Identification Hindarto, Djarot
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1763

Abstract

This research aims to conduct a comparative evaluation of the efficacy of two neural network architectures in the field of fish identification through the utilization of supervised learning techniques. The evaluation of VGG16 and MobileNet, which are prominent deep learning architectures, has been conducted about their speed, accuracy, and efficiency in resource utilization. To assess the classification performance of both architectures, we employed a dataset encompassing diverse fish categories. The findings indicated that the VGG16 model demonstrated superior accuracy in fish classification, albeit due to increased computational time and resource utilization. On the contrary, MobileNet exhibits enhanced speed and efficiency, albeit at a marginal cost to its accuracy. The findings of this study have the potential to inform the selection of deep learning models for fish recognition scenarios, considering the specific requirements of the task, such as prioritizing accuracy or efficiency. The findings mentioned above offer significant insights that can be utilized in the advancement of Artificial Intelligence (AI)-based applications within the domains of fisheries resource management and environmental monitoring. These applications specifically necessitate precise and effective fish recognition capabilities. The comparison findings indicate that the accuracy achieved by VGG16 was 0.99, whereas MobileNet also attained an accuracy of 0.99.
Deploying SMS Gateway in the Design and Development of Web and Mobile Academic Information Systems using the Waterfall Method Al Fansyah, Fajar; Widodo, Tri
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1770

Abstract

: The integration of technology in various sectors, beyond its common application in the gaming industry, has extended to the field of education. This evolution mandates parallel progress in academic institutions to keep pace with technological developments. A significant challenge identified was the reliance on manual accounting methods at SMAN 1 Kejobong, which includes teacher management, staff, and assistant administration, as well as processing student learning data. Outdated practices often lead to inaccuracies and inefficiencies, resulting in time-consuming data collection and potential losses for all stakeholders. To overcome this problem, it is proposed to implement a comprehensive information system or e-learning platform. However, the implementation of e-learning in educational institutions often encounters obstacles due to user discomfort or incompatibility with the institution's needs. This study validated all system features through Black box Testing and user satisfaction assessments, resulting in an average satisfaction level of 73.7%. The expected outcome is increased efficiency and accuracy in academic processes and student management, thereby facilitating a more effective learning and teaching environment.
Development of A QR Code-Based Attendance System for Factory Employees Nuralif, Ikhwan; Fachrie, Muhammad
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1774

Abstract

Employees are the most asset for any company. Achieving the best results from employees should be accompanied by a comfortable working environment. Whether working in an office or in the field, attendance is of utmost importance. Attendance is a crucial factor that can support and motivate every work activity. In this advanced era, many companies still rely on manual attendance systems. The use of manual systems often leads to errors caused by both administrators and employees, such as inefficient paper usage, failure to report absences, delayed submission of monthly reports, or loss of paper records. These issues can lead to employee carelessness, as there is a risk of attendance manipulation with manual (paper-based) attendance systems, resulting in attendance data falsification. By implementing QR codes, employees only need to scan the code using their smartphones. This research employs Unified Modeling Language (UML) for modeling. The application is then developed using Kodular and Firebase. The purpose of this application is to simplify attendance reporting for business owners or company managers, eliminating the need for manual attendance data recording, and making the attendance system of the company or factory more efficient.
Design and Implementation of An Efficient Information System for Broiler Chicken Rearing: A Case Analysis VR Broiler Farm Kusumawati, Marhani Wiji Ayu; Fachrie, Muhammad
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1775

Abstract

With the rapid advancements in information technology, there is a corresponding increase in the competitiveness of business enterprises. In this context, the utilization of computerized business management administration is recommended to streamline business operations, thereby enhancing efficiency and effectiveness, ultimately leading to increased profitability. VR Broiler Farm, a specialized broiler chicken farming business, currently records its broiler chicken maintenance data manually. This practice, stemming from a lack of utilization of contemporary technology, leads to longer data recording processes and potential data inconsistencies. Given this scenario, there is a clear need for an information system tailored for poultry farmers to facilitate faster and more efficient data recording. This system would cover various aspects including scheduling identification, chicken feed requirements, mortality rates, total chicken count, and other data relevant to broiler chicken farming. Therefore, the implementation of an information system for managing broiler chicken farming can provide valuable insights into the developmental trends of broiler chicken production.
Revolutionizing Automotive Parts Classification Using InceptionV3 Transfer Learning Hindarto, Djarot
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1784

Abstract

This study presents a novel methodology for classifying automotive parts by implementing the Transfer Learning technique, utilizing the InceptionV3 architecture. We use a proprietary dataset encompassing diverse categories of automotive components for training and evaluating the model. The experimental findings demonstrate that this approach attains a performance accuracy level of 93.78% and a loss rate of 0.2938. The efficacy of InceptionV3 Transfer Learning in addressing the intricacies associated with automotive parts classification is demonstrated through its utilization of pre-existing knowledge from diverse domains. The resultant model reflects a capacity to accurately discern spare parts, thereby enhancing the efficiency of the automotive inventory management process. Utilizing InceptionV3 Transfer Learning in this scenario yields a notable and favorable outcome, thereby revolutionizing the traditional framework of automotive parts categorization. The model's efficacy in enhancing the efficiency and accuracy of automotive inventory management is evidenced by its achievement of a notable precision level and a minimal loss rate. The implications of these findings are significant in addressing intricate classification challenges within the automotive industry. They pave the way for utilizing intelligent technologies to optimize parts identification and management processes. This study establishes a foundation for a novel approach to comprehending and applying categorization systems for automotive components. This is achieved by harnessing the capabilities of Transfer Learning using the InceptionV3 model.
Design of Website-Based Tourism Travel Information System (Case Study : Tenta Tour) Kawi, R. Gibranto; Suprihadi
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1788

Abstract

The Information System Design for the Tenta Tour Application, hosted on a website, is a critical component of modern tourism services. This research employs the rigorous Black Box Testing methodology to comprehensively evaluate the application's functionality, disregarding its internal structure. The study focuses on identifying potential errors and areas for improvement to enhance the quality and reliability of the system in delivering travel services to users. Through systematic Black Box Testing, the research investigates the Tenta Tour Application Information System on the web platform, with a primary emphasis on functionality rather than delving into the intricacies of the internal system structure. Test data is meticulously analyzed to uncover potential errors and opportunities for enhancements, all aimed at elevating the reliability and quality of travel services. The research findings successfully meet established criteria by effectively identifying potential functional errors within the Tenta Tour Application Information System when deployed on a website. The application of the Black Box Testing methodology has proven instrumental in uncovering functional issues that can be proactively addressed. These discoveries constitute a substantial contribution to enhancing the reliability and overall quality of travel services accessible through the application. In conclusion, this research underscores the efficacy of the Black Box Testing method in assessing the Tenta Tour Application Information System hosted on a website. The test results have proficiently identified potential functional errors and provided invaluable insights to enhance the application's reliability. The implementation of improvements informed by these findings is anticipated to significantly raise the standard of travel services rendered through this platform.
Implementation of Flower Recognition using Convolutional Neural Networks Hindarto, Djarot; Amalia, Nadia
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1808

Abstract

The recognition of flowers holds significant importance within the realms of ecological research, horticulture, and diverse technological applications. This study presents "Blossom Insight," an innovative methodology for flower identification that employs Convolutional Neural Networks within the Keras framework. This study aims to examine the necessity of precise and effective flower categorization, considering the extensive range of floral species. The methodology encompasses a rigorous procedure of data preprocessing, utilizing sophisticated techniques to augment the model's capacity to distinguish intricate characteristics of flowers. The crux of the study revolves around the amalgamation of a Convolutional Neural Network, a robust deep learning methodology, with Keras, a user-accessible open-source framework for machine learning. The integration of these components enables the development of a resilient flower recognition model that possesses the ability to acquire complex patterns and characteristics from input images. The training of the model encompasses exposure to a wide range of flower datasets, which enhances its ability to generalize across different species and environmental conditions effectively. The findings illustrate the effectiveness of "Blossom Insight" in attaining a notable level of precision in tasks related to the identification of flowers. The implementation not only contributes to the advancement of the field of computer vision but also offers a valuable resource for researchers, horticulturists, and enthusiasts seeking a comprehensive understanding and accurate identification of floral species. The development of "Blossom Insight" signifies a notable advancement in utilizing deep learning techniques to augment our understanding and admiration of the wide variety present in the realm of flowers.
Efficiency and Effectiveness: Enterprise Architecture Strategies for Healthcare Service Alwi, Muchamad Nurdin; Hindarto, Djarot; Marina, Anna; Yudhakusuma, Dudi
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1813

Abstract

In a globally evolving health landscape, attaining maximum efficiency and efficacy is of the utmost importance. The present study investigates the utilization of Enterprise Architecture tactics to enhance healthcare services, specifically by streamlining operations and boosting overall effectiveness. Through an examination of organizational processes, patient care, information management, and healthcare delivery, this study sheds light on the transformative potential of EA as a framework. This research investigates the strategic alignment of health systems through the application of EA principles to establish an infrastructure that is both harmonious and interoperable. The present study investigates the significance of digital transformation within the healthcare sector, with a particular focus on the ways in which EA strategies can enable the smooth incorporation of technological advancements to enhance patient outcomes. This study emphasizes the need for patient-specific health systems. It highlights the significance of a patient-centered approach in the context of EA. By conducting an exhaustive examination of the implementation of EA in the healthcare sector, this study intends to provide organizations with direction on how to enhance their service provision. Empirical evidence indicates that by utilizing EA to harmonize business objectives, technological progress, and patient-centric methodologies, significant enhancements in efficiency and efficacy can be achieved, thereby culminating in elevated benchmarks of healthcare provision. In conclusion, the study urges the extensive implementation of EA strategies within health systems, acknowledging its capacity to transform service frameworks and foster a health ecosystem that is more attentive to patients and proactive.
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks Judijanto, Loso; Hindarto, Djarot; Wahjono, Sentot Imam; Djunarto
International Journal Software Engineering and Computer Science (IJSECS) Vol. 3 No. 3 (2023): DECEMBER 2023
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v3i3.1816

Abstract

Enterprise Architecture plays a critical role in reducing business risks holistically and ensuring a company's resilience to cyber security threats. This abstract emphasizes the significance of Enterprise Architecture in contemporary organizational structures and its influence on these matters, particularly at a time when cybersecurity threats are becoming more prevalent in the global business arena. By integrating Human Resources, Governance Frameworks, Technology, and Processes, Enterprise Architecture offers a holistic perspective of the Information Technology environment within an organization. By means of a methodical governance framework, Enterprise Architecture conducts comprehensive examinations of interdependencies among components, detects susceptibilities, and establishes robust groundwork for enhanced threat prevention. Enterprise Architecture is not only a proactive risk management tool, but it also contributes significantly to the overall business strategy. The integration of cybersecurity and enterprise architecture entails not only fortifying the technological infrastructure but also integrating it into the overarching business strategy. This enables the correlation of cybersecurity endeavors with the objectives of the organization, thereby connecting technological aspirations with business strategy. This study emphasizes the potential of incorporating adaptive and agile responses to threats into corporate culture to foster innovation. By functioning as a strategic catalyst, it assists organizations in adjusting to cyber threats, safeguarding business interests, and optimizing operations within an ever-evolving digital environment. By integrating governance and enterprise architecture frameworks, organizations can proactively mitigate business risks and cybersecurity threats, thereby fostering resilience and sustainability in the dynamic digital environment.

Page 6 of 29 | Total Record : 284