cover
Contact Name
Hairani
Contact Email
ijecsa@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Jurnal: International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 6 Documents
Search results for , issue "Vol. 4 No. 1 (2025): March 2025" : 6 Documents clear
Analyze Threats in a Virtual Lab Network Using Live Forensic Methods on MetaRouter Firmansyah, Firmansyah; Wibisana, Bayu; Jordan, Muhammad
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4784

Abstract

This research identified critical network anomalies in the MetaRouter virtual environment, focusing on IP activity related to routers, networks, and client devices. Suspicious interactions were observed between IP 192.168.1.100 (router) and IP 172.16.205.53 (client), including reused TCP port numbers and incomplete SYN sessions, indicating potential spoofing attempts. Invalid route information involving 192.168.1.100 highlights malicious modifications to the routing table, indicating an attempt to manipulate the routing information. Packet inconsistencies, such as “TCP Previous segment not captured” and “Spurious Retransmission,” revealed interference between the client and router, possibly caused by an external attacker exploiting network protocol vulnerabilities. The aim of this research is to analyze threats in virtual lab networks using live forensic methods on MetaRouter to detect anomalies, with a focus on Border Gateway Protocol (BGP) and TCP deviations in MetaRouter. This research method is a controlled prototype experimental setup in a virtual laboratory consisting of two routers and two client devices. This method simulates real-world network operations to identify malicious activities. Wireshark is used for real-time packet-level monitoring and analysis because it has powerful visualization and filtering capabilities, surpassing tools like tcpdump. This research integrates live forensic techniques to collect and analyze routing logs, packet data, and protocol behavior. The results of this research are the identification of suspicious behaviors, such as reused TCP port numbers, incomplete SYN sessions, and unauthorized route announcements, indicating potential spoofing and BGP hijacking attempts. Packet data irregularities, including “Out-Of-Order” messages and abrupt session terminations, are also detected, revealing disruptions in traffic flow caused by malicious activities. The results of this research are highlighting the effectiveness of the forensic framework in identifying and documenting network anomalies in virtual environments have significant implications for improving security in cloud-based and hybrid networks. This research provides a scalable and replicable methodology that can improve real-time anomaly detection and response, paving the way for future advances in network security.
Optimization of Renewable Energy From Solar Panels For Environmental Monitoring Using Arduino Sugianta Nirawana, I Wayan; Romisa, Fahmi; Karang Komala Putra, I Gede; Aulia Rahman, Nouval; Rahmadani Fitria, Ayisa
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4828

Abstract

Renewable energy is an alternative energy in the midst of the issue of fossil-based energy running out. One of these alternative energies is solar panels that generate electricity to achieve environmentally friendly energy. The problem researched in this study is the need to optimize or energy efficiency of solar panels. The type of research is development research with a prototype model. The purpose of this study is to optimize the efficiency of the solar panel tracking system equipped with artificial intelligence and sensors to monitor the environment based on the internet of things. This research method is an integration of fuzzy logic internet of things for tracking solar panels based on light sensor input. The use of solar panels using polycrystalline types, and the addition of temperature and humidity sensors is important to utilize. The result of this study is that the highest efficiency is obtained at 9.96%, meaning that the energy received by the system is 9.96% into useful power that is lost. In conclusion, solar panels are highly dependent on weather conditions and the focal point of solar energy capture. The implication of this study is that the improvement of environmentally friendly energy efficiency, although not too high, can be further developed. Recommendations for further research suggest that data collection be carried out in sunny weather, and improved using solar panels with a larger capacity and energy storage from batteries. The use of machine learning algorithms can be an alternative to study large amounts of solar panel data.
Comparison of Lexicon-Based Methods and Bidirectional Encoder Representations for Transformers Models in Sentiment Analysis of Government Debt Market Movements Rachmawati, Firda; Azmi, Ulil; Azwarini, Rahmania
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4832

Abstract

The State Budget of Indonesia (APBN) is the main tool for implementing fiscal policies and serves as a budgeting guideline for development execution in Indonesia. One of the funding sources in budget financing is Debt Financing, which consists of Government Securities (SBN) issuance and Loans. Overall, SUN contributes IDR 5,824.34 trillion, highlighting its significant proportion in debt financing. Understanding public sentiment toward SUN is essential in developing effective government policies. This research conducts sentiment analysis on tweets from the social media X over the past 7.75 years to assess public perception and propose strategic recommendations. The aim of this research is to compare the BERT model and the Lexicon-Based method to determine which achieves the highest accuracy in sentiment analysis. The findings can help the government develop strategies for issuing SUN, especially in improving public involvement and investor trust. This research method is based on a deep learning pre-trained Bidirectional Encoder Representations from Transformers (BERT) model, specifically IndoBERT, with fine-tuning, and a Lexicon-Based approach utilizing the InSet lexicon. The results of this research are as follows: on the overall tweet dataset, the BERT model with optimal hyperparameters outperformed the Lexicon-Based method, achieving an accuracy of 70.28% compared to 55.77%. Similarly, on an annual basis, BERT exhibited higher accuracy than the Lexicon-Based method, except in 2021. Public sentiment on SUN in social media X is categorized as 49% positive, 30% neutral, and 21% negative. These findings indicate a generally favorable perception of SUN but also highlight areas for improvement in public communication. Overall, the BERT model demonstrates superior performance over the Lexicon-Based method. Considering the opportunities available, the government could leverage social media through Key Opinion Leaders and enhance transparency in explaining policies such as Tapera. This approach could maximize public participation in investing in SUN in Indonesia.
Analysist of User Satisfaction of the High School Student Admissions Website using the User Experience Questionnaire Method Prabowo, Ardian Adi; Fathoni, Ahmad; Nugroho, Anjis Sapto; Nugroho, Kristiawan; Farooq, Omar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4841

Abstract

In the era of digitalization of public services, web-based student registration systems have become an important instrument in the education sector. The Website for New Student Admission (PPDB) of Senior High Schools (SMA) and Vocational High Schools (SMK) in Central Java Province has been implemented as a single platform for new student registration, but the main problem identified is the lack of a comprehensive evaluation of the level of user satisfaction with the quality of interaction experience with this platform, especially after the emergence of several complaints on the official PPDB social media regarding the system flow, services, and website appearance. The purpose of this study is to measure and analyze the level of user satisfaction with the PPDB website of SMA/SMK in Central Java Province using the User Experience Questionnaire (UEQ) approach which covers six aspects of user experience. This research method is descriptive quantitative with a survey approach using a standardized UEQ instrument consisting of 26 question items, involving 30 respondents of class X students of SMA Negeri 1 Karanganyar Demak selected using a 10% sampling technique from the population. The results of this study are indicate that the efficiency criteria obtained the highest score of 1.125, while the novelty criteria received the lowest score of 0.792, with the benchmark comparison diagram indicating a position below average (poor) in the criteria of attractiveness (1.061), clarity (1.092), accuracy (0.983), and stimulation (0.992), while in the criteria of efficiency and novelty, they are in a position above average (quite good). The implication of these findings underlines the need for further development in the aspects of visual appeal, clarity of information, accuracy of functions, and interaction stimulation to improve the overall quality of the user experience of the PPDB website.
Bidirectional Encoder Representations from Transformers Fine-Tuning for Sentiment Classification of Cek Bansos Reviews Haerani, Erna; Rahmatulloh, Alam; Elmeftahi, Souhayla
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4981

Abstract

Social assistance programs are essential government initiatives aimed at supporting underprivileged communities. One such program is facilitated through the Cek Bansos application, which enables users to check their eligibility for social aid. However, user experiences with the application vary, leading to various sentiments in their reviews. Understanding these sentiments is crucial for improving the application’s functionality and user satisfaction. This study focuses on sentiment analysis of user reviews of the Cek Bansos application by leveraging a fine-tuned Indonesian-language Bidirectional Encoder Representations from Transformers (BERT) model. This research aims to evaluate the BERT model's effectiveness in classifying sentiments in user reviews and provide insights that could improve the Cek Bansos application. This research method is the BERT model was fine-tuned using hyperparameters such as a learning rate of 3e-6, batch size of 16, and 9 epochs. The dataset consisted of 8,000 reviews, divided into training (70%), validation (20.1%), and test (9.9%) sets. Review scores were manually categorized, where ratings of 1 to 2 were classified as negative sentiment, 3 as neutral, and 4 to 5 as positive. The results of this research are as follows: the fine-tuned model achieved an accuracy of 77%, with additional evaluation metrics such as precision, recall, and F1 score, demonstrating the model's effectiveness in identifying positive, negative, and neutral sentiments separately. This study concludes that the BERT model provides a reliable method for sentiment classification of user reviews, which could support developers and policymakers in refining the Cek Bansos application to enhance user experience. Additionally, a web-based application developed using Streamlit allows government officials to visualize sentiment trends in real time, improving their understanding of user feedback. Future research could further explore alternative machine learning models and additional linguistic features to improve sentiment classification accuracy and the overall user experience.
Prediction of Student Major Selection at High School Using a Machine Learning Approach Sany, Nasril; Dody, Dody; Muchlis, Esa Firmansyah; Hasanudin, Muhaimin; Berlinton, Budi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4983

Abstract

The primary objective of this research was to develop and evaluate a machine learning prediction system that matches Senior High School (SMA) Nusa Putra Kota Tangerang students with their potential school majors based on their academic interests and performance levels. This research method employs machine learning algorithms, including Random Forest, Support Vector Machine (SVM), logistic regression, K-Nearest Neighbor (K-NN), and Naive Bayes, using academic records, interest tests, and questionnaires for data collection. The data was processed and analyzed to train and test the algorithm. The findings of this study indicate that the Random Forest algorithm achieved the best performance among the models, with an accuracy of 85%, a precision of 82%, a recall of 88%, and an AUC score of 0.92. The factors that affected the prediction of major selection were Grade XII Mathematics scores and Science Interest Test results. The research implications suggest that Random Forest technology within Machine Learning (ML) enhances major selection accuracy while promoting fairness, providing superior educational choices and increased student satisfaction. Future studies should investigate additional factors that influence this phenomenon.

Page 1 of 1 | Total Record : 6