cover
Contact Name
Hairani
Contact Email
ijecsa@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Jurnal: International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 5 Documents
Search results for , issue "Vol 2 No 2 (2023): September 2023" : 5 Documents clear
Analysis of Vulnerability Assessment Technique Implementation on Network Using OpenVas Muhammad Muharrom; Afif Saktiansyah
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 2 No 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3297

Abstract

Vulnerability Assessment is an important method for identifying and analyzing security vulnerabilities within a network system. This research aims to identify security vulnerabilities within the PT. Dutakom Wibawa Putra network using OpenVAS as a research tool. In the vulnerability analysis phase, OpenVAS is utilized to scan the PT. Dutakom Wibawa Putra network and identify existing vulnerabilities. Subsequently, an evaluation is conducted on the identified vulnerabilities, including risk assessment and necessary mitigation recommendations. The outcomes of this study provide a clear overview of the security vulnerabilities present in the PT. Dutakom Wibawa Putra network. This research using method analysis of vulnerability assessment technique implementation on network using OpenVas, several significant vulnerabilities that could impact the security of the network and systems have been identified. The findings of this analysis report can serve as a foundation for developing improved security strategies and implementing effective mitigation measures. In conclusion, this study successfully applies Vulnerability Assessment techniques to the PT. Dutakom Wibawa Putra network using OpenVAS. The identified vulnerability analysis results offer valuable insights into security weaknesses that need to be addressed. It is hoped that this research can serve as a reference for PT. Dutakom Wibawa Putra and similar organizations in enhancing their network security through the implementation of effective Vulnerability Assessment techniques.
Combination of Smote and Random Forest Methods for Lung Cancer Classification Christopher Michael Lauw; Hairani Hairani; Ilham Saifuddin; Juvinal Ximenes Guterres; Muhammad Maariful Huda; Mayadi Mayadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 2 No 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3333

Abstract

Lung cancer is a network of cells that grow abnormally in the lungs. Lung cancer has four severity levels, namely stages 1 to 4. If lung cancer is not treated quickly, it is at risk of causing death. This research aimed to combine Synthetic Minority Over-sampling (Smote) and Random Forest methods for lung cancer classification. The method used was a combination of Smote and Random Forest. Smote was used to balance the data, while Random Forest was used to classify lung cancer data. The results showed that the combination of Smote and Random Forest methods obtained an accuracy of 94.1%, sensitivity of 94.5, and specificity of 93.7%. Meanwhile, without Smote, the accuracy is 89.1%, sensitivity is 55%, and specificity is 94.5%. The use of Smote can improve the performance of the Random Forest classification method based on accuracy and sensitivity. There was an increase of 5% in accuracy and a 39% increase in sensitivity.
Comparison of C4.5 and Naive Bayes for Predicting Student Graduation Using Machine Learning Algorithms Abu Tholib; M Noer Fadli Hidayat; Supri yono; Resty Wulanningrum; Erna Daniati
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 2 No 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3364

Abstract

Student graduation is a very important element for universities because it relates to college accreditation assessment. One of them is at the Faculty of Engineering Nurul Jadid University, which has problems completing the study period within a predetermined time. So that it can be detrimental because accreditation is less than optimal, and the number of active students makes it less ideal in teaching and learning activities. This study aimed to compare the level of accuracy using the C4.5 algorithm and Naïve Bayes method in predicting graduation on time. The C4.5 and Naïve Bayes algorithms are one of the methods in the algorithm for classifying. Tests were carried out using the C4.5 and Naïve Bayes algorithms using Google Colab with Python programming language, then validated using 10-fold cross-validation. The results of this study indicate that the Naïve Bayes method has a higher accuracy value with an accuracy rate of 96.12%, while the C4.5 algorithm method is 93.82%.
Electric Vehicle Sales-Prediction Application Using Backpropagation Algorithm Based on Web Ramadhanti Ramadhanti; Hairani Hairani; Muhammad Innuddin
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 2 No 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3388

Abstract

The accuracy of predicting future product sales is needed to minimize losses and gain profits. Inventory of goods carried out manually or improper product inventory planning causes the number of goods to accumulate due to the small number of requests, so the goods are damaged. Therefore, a sales prediction system with high accuracy is needed to assist in stocking electric vehicles. This research aimed to predict electric vehicle sales using the web-based backpropagation method. This study uses the backpropagation method to predict electric vehicle sales data from 2015 to 2022. The data is divided into 84 instances as training data and 12 instances as testing data. The result of this study was that the backpropagation method obtained a MAPE error rate of 6.25%. Thus, the backpropagation method can be used for predicting electric vehicle sales because it has a very accurate performance level.
Sentiment Analysis and Topic Modeling of Kitabisa Applications using Support Vector Machine (SVM) and Smote-Tomek Links Methods I Nyoman Switrayana; Diki Ashadi; Hairani Hairani; Afrig Aminuddin
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 2 No 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3406

Abstract

Kitabisa is an Indonesian application that functions to raise funds online. Users can easily support various types of campaigns and donate funds to various social causes through the app. User reviews of the application are very diverse, and it is not sure whether user reviews of the application tend to be positive, neutral, or negative. This research aimed to analyze the sentiment of the Kitabisa application by modeling topics using Latent Dirichlet Allocation (LDA) and classifying user reviews using a Support Vector Machine (SVM). The scrapped dataset showed imbalanced dataset problems, so the SMOTE-Tomek Links oversampling technique was proposed. The results of this study show that using LDA produces five topics often discussed in 750 reviews. Then, the performance of SVM without using SMOTE-Tomek Links was 72% accuracy, 76% precision, 72% recall, and 64% f1 score. Meanwhile, using SMOTE-Tomek Links could significantly improve the performance, namely 98% accuracy, 98% precision, 98% recall, and 98% f1 score. Based on this research, the application of SVM achieved high performance for user sentiment classification, especially when the dataset was in a balanced state. Therefore, the SMOTE-Tomek Links oversampling technique is recommended for dealing with unbalanced sentiment datasets.

Page 1 of 1 | Total Record : 5