cover
Contact Name
Hairani
Contact Email
ijecsa@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Jurnal: International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 5 Documents
Search results for , issue "Vol. 3 No. 2 (2024): September 2024" : 5 Documents clear
Thesis Topic Modeling Study: Latent Dirichlet Allocation (LDA) and Machine Learning Approach Hairani, Hairani; Janhasmadja, Mengas; Tholib, Abu; Ximenes Guterres, Juvinal; Ariyanto, Yuri
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 3 No. 2 (2024): September 2024
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v3i2.4375

Abstract

The thesis reports housed in the campus repository have yet to be analyzed to reveal valuable knowledge patterns. Analyzing trends in thesis research topics can facilitate the selection of research topics, aid in mapping research areas, and identify underexplored topics.Therefore, this research aims to model and classify thesis topics using Latent Dirichlet Allocation (LDA) and the Naïve Bayes and Support Vector Machine (SVM) methods. This study employs the LDA method for thesis topic modeling, while SVM and Naïve Bayes are used for classifying these topics. The research results show that LDA successfully modeled five of the most popular thesis topics, namely two related to computer networks, two on software engineering, and one on multimedia. For thesis topic classification, the SVM method demonstrated higher accuracy than Naïve Bayes, reaching 92.80% after the data was balanced using Synthetic Minority Oversampling Technique (SMOTE). The implication of this study is that the topic modeling approach using LDA is able to identify dominant thesis topics. In addition, the SVM classification results obtained better accuracy than Naïve Bayes in the thesis topic classification task.
Enhancing Mental Illness Predictions: Analyzing Trends Using Multiple Linear Regression and Neural Network Backpropagation Riosatria, Riosatria; Hairani, Hairani; Anggrawan, Anthony; Syahrir, Moch.
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 3 No. 2 (2024): September 2024
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v3i2.4391

Abstract

The increasing number of mental health cases caused by various factors such as social changes, economic pressures, and technological advancements has made it difficult to accurately predict the number of cases, hindering prevention and early intervention efforts. Therefore, developing more accurate, data-driven predictive models is necessary to improve the effectiveness of prevention and intervention. This study aims to develop a predictive model for the number of mental health cases using Multiple Linear Regression and Neural Network Backpropagation methods. The study employs two predictive methods, Multiple Linear Regression and Neural Network Backpropagation to forecast future trends in the number of mental health cases. The findings reveal that the Neural Network Backpropagation method provides more accurate predictions than Multiple Linear Regression in forecasting mental health case trends. Specifically, the Neural Network Backpropagation method resulted in an MAE of 111.39 and a MAPE of 1.77%, while the Multiple Linear Regression method produced an MAE of 115.24 and a MAPE of 1.83%. Thus, the implication of this study is that the Neural Network Backpropagation method can be utilized to predict trends in the number of mental health cases due to its ability to provide highly accurate predictions.
Website-Based Expert System for Diagnosing Epilepsy in Children Using the Forward Chaining Method Nasser, Rahmawati; Subhan, Subhan; putri, iin karmila
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 3 No. 2 (2024): September 2024
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v3i2.4524

Abstract

Information technology has been used in various sectors of life, including the health sector. One of them is the use of expert systems in diagnosing disease. Disease diagnosis carried out by an expert has weaknesses along with the expert's biological weaknesses. One technology that can be a solution is an expert system. This research aims to build a web-based expert system for diagnosing epilepsy in children, along with things that parents can do when treating epilepsy patients. The method used in this research is forward chaining, and system testing is carried out using the Black Box method. From the system design that has been created and tested, a web-based expert system application for diagnosing epilepsy in children has been produced. The black-box testing results show that all menus function well and as expected. The results of expert testing and user testing results obtained a final score of 3.8, which means the assessment is in the very suitable category. Apart from that, it will provide information and education to the public, in this case, the parents of epilepsy patients, regarding the type of epilepsy the child suffers from and how to treat it, which can be accessed anywhere and at any time.
Clustering Analysis of Umrah Pilgrim Data Based on the K-Medoid Method Huda, Dias Nabila; Anggrawan, Anthony; Hairani, Hairani
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 3 No. 2 (2024): September 2024
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v3i2.4601

Abstract

The Umrah pilgrimage is becoming increasingly popular among Indonesians, with millions of participants yearly. This trend creates a need for service providers to understand the characteristics of pilgrims to improve service quality, marketing strategies, and competitiveness. Analyzing data on pilgrims helps service providers develop more effective strategies and tailor packages to match their needs, ensuring competitiveness in a growing market. This study aims to clusters Umrah pilgrims based on age, gender, district, and chosen package using the K-Medoid clustering method. This research uses the K-Medoid method for the reason that it is more resistant to noise and outliers compared to other clustering methods. The most centrally located point in the data set is called a ”medoid,” which is an object in a cluster that has the lowest difference to all other objects in the cluster. The results of this study are that the K-Medoid method successfully grouped pilgrims into three clusters: Cluster 1 with 63 members, Cluster 2 with 25 members, and Cluster 3 with 25 members. The findings indicate that the Milad Mastour package is preferred by older pilgrims, primarily from Mataram and West Lombok. The Arbain package is favored by younger pilgrims from the same regions, while adult pilgrims mostly choose the Regular package. The implication of this research is that it can provide insights for service providers to design more specific programs that align with the profiles of pilgrims based on age and district.
Design of a Quick Response Code-Based Infrastructure Management Information System Sukron, Moh.; Ramadhan, M. Raihan; Sihabillah, Ahmad
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 3 No. 2 (2024): September 2024
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v3i2.4653

Abstract

The management of infrastructure and facilities at MTs Mambaul Hasan Sumberrejo Paiton Probolinggo is currently conducted manually, resulting in significant issues such as data inaccuracies, misplacement of items, and difficulties in tracking asset movements. These challenges reduce efficiency and hinder effective inventory management. The aim of this research is to design and develop a Quick Response (QR) Code-based management information system to enhance the efficiency and effectiveness of infrastructure and facilities management at MTs Mambaul Hasan. This research method is based on Research and Development (R&D) with a quantitative approach and a case study framework. The process includes system requirements analysis through direct observation and interviews with school staff, followed by system design using the Object-Oriented Analysis and Design (OOAD) approach. A prototype is then developed and tested to gather user feedback, and system evaluation is conducted to refine the system before full implementation. The results of this research are a QR Code-based infrastructure and facilities management information system that simplifies asset registration, enhances tracking accuracy, and reduces manual workload. Usability testing with school staff revealed an 82,67% satisfaction rate, indicating a significant improvement in efficiency and traceability of assets. The implementation of this system provides a practical and effective solution for managing infrastructure and facilities at MTs Mambaul Hasan. This study concludes that the QR Code-based system improves efficiency, accuracy, and traceability in inventory management. The implications of these findings suggest that other educational institutions can adopt similar technological solutions to modernize their management processes, with potential future integration of mobile and cloud technologies for enhanced usability and scalability.

Page 1 of 1 | Total Record : 5