cover
Contact Name
Hairani
Contact Email
ijecsa@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Jurnal: International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 75 Documents
Visualization of Gastric Acid Reflux Using Mobile-Based Augmented Reality Ahmat Adil; Bambang Krismono Triwijoyo; Miftahul Madani; Lalu Riyandi Damar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2370

Abstract

Interactive information media has many benefits in the process of conveying information, one of which is by visualizing objects in real time. Socialization activities at the Rensing Health Center in conveying information on gastric diseases still do not use visual aids as a medium for delivering counseling. Therefore, this study aims to develop information media in the form of an android application by utilizing Augmented reality (AR) technology to show the stomach acid process in real time which is visualized in the form of 3D animation. The method used in application development is Multimedia Development Life Cycle (MDLC). Where this method consists of 6 (six) stages of development, namely concept, design, Material Collecting, Assembly, testing and distribution. The results of this study are a visualization application of gastric acid reflux using mobile-based augmented reality built using Unity 2017.3.1f1 and the Vuforia Software Development Kit (SDK), with several stages of the process, namely entering the database and all assets into unity, lighting, creating a user interface, scripting and finally build the application to the android platform Based on the results of application trials that have been carried out at the Rensing Health Center, it shows that mobile-based augmented reality has succeeded in assisting officers in visualizing gastric acid reflux. The satisfaction of health officers in using the application can be seen from the results of the questionnaire to the respondents, where the results of the questionnaire 32% stated strongly agree, 59% agreed, 6% disagreed and 2% disagreed.
Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency Usman Ibnu Affan; Khairan Marzuki; Lalu Zazuli Azhar Mardedi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2379

Abstract

VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
Web-Based Application for Toddler Nutrition Classification Using C4.5 Algorithm Hairani Hairani; Lilik Nurhayati; Muhammad Innuddin
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2387

Abstract

Health is something that is important for everyone, from year to year various efforts have been developed to get better and quality health. Good nutritional status for toddlers will contribute to their health and also the growth and development of toddlers. Fulfillment of nutrition in children under five years old (toddlers) is a factor that needs to be considered in maintaining health, because toddlerhood is a period of development that is vulnerable to nutritional problems. There are more than 100 toddler data registered at the Integrated Healthcare Center in Peresak Village, Narmada District, West Lombok Regency. The book contains data on toddlers along with the results of weighing which is carried out every month. However, to classify the nutritional status of toddlers, they are still going through the process of recording in a notebook by recording the measurement results and then looking at the reference table to determine their nutritional status. This method is still conventional or manual so it takes a long time to determine the nutritional status. Therefore, the solution in this study is to develop a web-based application for the classification of the nutritional status of children under five using the C4.5 method. The stages of this research consisted of problem analysis, collection of 197 instances of nutritional status datasets obtained from Integrated Healthcare Center Presak, analysis of system requirements, use case design, implementation using the C4.5 method, and performance testing based on accuracy, sensitivity, and specificity. The results of this study are a website-based application for the classification of the nutritional status of children under five using the C4.5 method. The performance of the C4.5 method in the classification of the nutritional status of toddlers using testing data as much as 20% gets an accuracy of 95%, sensitivity of 100%, and specificity of 66.6%. Thus, the C4.5 method can be used to classify the nutritional status of children under five, because it has a very good performance.
Potential of Cari Rumah Software to Brings House Product Consumer and Digital Marketing Tool Agus Pribadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2400

Abstract

Growth of residential areas in the city of Mataram and its surroundings has a tendency to continue to increase. The growth of residential areas is in line with population growth which reaches 1,842%. Emergence of new residential areas in the city of Mataram and its surroundings involve a lot of amount of housing developer companies. Wide distribution of new residential/housing areas has in potential consumers having to make special efforts to obtain information on the purchase of new house. Cari Rumah software provides online search services for new residential products to the public using smartphone devices. The software makes it easier for prospective consumers to get information on new residential products without having to go to the marketing office of housing developer companies one by one. On the other hand, Cari Rumah software can also function as a means of marketing new residential house products by housing developer companies. Cari Rumah software offers convenience in finding new residential house product provided by housing developer companies. The content owned by the Cari Rumah software has the possibility as a means of digital marketing in addition to the function of helping potential consumers. This search study aims to find out the potential of the Cari Rumah software to meet the information needs of potential consumers and possibilities be used as a means of digital marketing. Method used is an impression test of the Cari Rumah software. The main stages of this method are gathering information, impression test, and potential conclusion. Results obtained indicate that the Cari Rumah software is not sufficient to meet the information needs for users / potential consumers of residential house product. However, 83.94% of users of the Cari Rumah software recommend to developer criteria features. Potential use of the Cari Rumah software as a digital marketing tool only reaches 20.15%.
Designing a Honey Quality Tool Based on Gas Sensor and Color Sensor Al Bima; Sirojul Hadi; M. Najmul Fadli; Nurul Hidayah; Lalu Danu Prima Arzani
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i2.2407

Abstract

Honey has many benefits. Thus, honey counterfeiting often occurs with the ever-increasing demand. However, many do not know how to distinguish between real and fake honey, even honey breeders and hunters find it difficult to tell the difference. The honey used to test the quality of honey is honey produced by Apis dorsata bees or wild bees, the nectar consumed by these bees is the kesambi tree, the kesambi tree that grows a lot on the slopes of Mount Tambora, Bima district. Honey contains a lot of antioxidants such as vitamin C, pinocembrin, chrysin, pinobaksin, catalase, and many other ingredients that are very beneficial for the health of the body. Testing the authenticity of honey using two sensors, namely a gas sensor and a color sensor, the tool has been connected to a database and web application to display test data. The web application can be accessed from any location as long as it is connected to the internet network. The results of the research are the ideal distance for measurements is carried out as far as 2 cm. The success rate in testing pure honey with a mixture of honey has different values, such as the value of pure honey has a gas sensor voltage of 3.3 volts while the value of mixed honey with 50% pure honey and 50% sugar, the value of the gas sensor voltage is 2.54 volts. Mixed honey has a voltage below 3 volts. The results of the color sensor test, namely the sensor output have different values, the RGB value for pure honey is red 206, green 246, and blue 182 while the RGB value for mixed honey is for 20% pure honey and 80% sugar mixture produces an RGB value of Red 156, Green 210, Blue 171. The color sensor can distinguish between real honey and mixed honey for trigona honey.
The Application of the Fletcher-Reeves Algorithm to Predict Spinach Vegetable Production in Sumatra Mhd. Zoel Ardha; Verdi Yasin; Solikhun Solikhun
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 2 No. 1 (2023): March 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i1.2417

Abstract

Determination of spinach plant predictions is one of the most critical decision-making processes. In predicting spinach plants in each period, it depends on each period, both the previous and subsequent periods. The production of spinach plants that change every period causes uncertainty in predicting. The method used to indicate the data is the Fletcher-Reeves algorithm, it is an appropriate development technique compared to the backpropagation strategy because this strategy can speed up the preparation time to arrive at the minimum convergence value. This paper does not discuss the prediction results. Still, it discusses the ability of the Fletcher-Reeves algorithm to make predictions based on the spinach production dataset obtained from the Central Statistics Agency. The purpose of this research is to see the accuracy and performance measurement of the algorithm in the search for the best results to solve the prediction of spinach plants in Sumatra. The research data used are spinach vegetable production data in North Sumatra. Based on this data, a network architecture model will be formed and determined, including 2-20-1, 2-30-1, 2-35-1, 2-45-1, and 2-50-1. After training and testing, these five models show that the best architectural model is 2-20-1 with an MSE value of 0.00608399, the lowest among the other four models. So the model can be used to predict spinach plants in Sumatra.A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety.
The Implementation Of The Fletcher-Reeves Algorithm In Predicting The Growth Of Forest Plant Cultures Dwi Ramahdhani; Solikhun Solikhun
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 2 No. 1 (2023): March 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i1.2418

Abstract

Forest protection and development are essential because forests are the world's lungs. In addition, the HTI organization (modern manor backwoods) began to hide again. However, due to the great interest in wood to be used as raw material for material and property production lines, large organizations started to develop hamlet wood which was then marketed abroad, such as pressed wood, rattan, sawn timber, and done jobs for individuals in the area around the hamlet. By making a prediction, knowledge about the growth of forest plants can be known so that they can anticipate or minimize the risks that may arise. They can assist in determining policies and making decisions. This study aims to predict the growth of forest plants in the following year using an Artificial Neural Network Algorithm. The information used in this study is from the Central Bureau of Statistics from 2011 to 2022. The method of implementing this research uses the Fletcher-Reeves Algorithm, one of the Artificial Neural Network methods using 5 models, including 7-10-1, 7-15- 1, 7-20-1, 7-25-1, and 7-30-1. Of the five models, the structural model is 7-20-1 with an MSE value of 0.00037397. It can be said that this model can be used because it produces a fast combination and a short period of time.
The Performance Machine Learning Powel-Beale for Predicting Rubber Plant Production in Sumatera Siska Rama Dani; Solikhun Solikhun; Dadang Priyanto
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 2 No. 1 (2023): March 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i1.2420

Abstract

This study aims to predict rubber plants in Sumatra; rubber plants have a relatively high economic value; rubber sap must be cultivated because it is a product of the rubber plant, which is the raw material for the rubber industry, so in large quantities. Therefore, rubber sap, the selling value will increase so that it can increase farmers' income. Rubber production in Sumatra experiences ups and downs; therefore, this study aims to predict rubber plants using the Powell-Beale algorithm method, one of the Artificial Neural Network methods often used for data prediction, implemented using Matlab software. That supports it. This study does not discuss the prediction results. Still, it discusses the ability of the Powell-Beale algorithm to make predictions based on datasets of rubber plant production in recent years obtained from the Central Statistics Agency. Based on this data, a network architecture model will be formed and determined, including 6-10-1, 6-15-1, 6-30-1, 6-45-1 and 6-50-1. The best architecture is 6-15-1, with the lowest Performance/MSE test score of 0.00791984.
The Utilization Of The Conjugate Gradient Algorithm For Predicting School Year Expectations By Province Astri Rismauli Simbolon; Solikhun Solikhun
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 2 No. 1 (2023): March 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i1.2426

Abstract

Expected Length of School (HLS) is the length of school (in years) that is expected to be felt by children at a certain age in the future. It is assumed that the probability that the child will remain in school at the following ages is the same as the probability of the population attending school per total population for the current age. Length of School is also a benchmark for evaluating government programs in improving Human Resources that excel in the competition of technological advances. The purpose of this study is to apply the Conjugate Gradient Algorithm with the Best Performance for Predicting School Life Expectancy in Indonesia. Research data on the Expectation of Schooling in Indonesia consists of 10 Provinces obtained from the Central Statistics Agency from 2016 to 2021. This study uses 5 architectural models, namely 2-10-1, 2-15-1, 2-20-1, 2-25-1 and 2-30-1. Of the five architectural models used, the best architectural model is 2-3-1 with an MSE of 0.000000002 in two seconds. Based on this best architectural model, it will be used to predict the Expectation of Old Schools in Indonesia for the next five years, namely from 2022 to 2026.
Analysis of Vulnerability Assessment Technique Implementation on Network Using OpenVas Muhammad Muharrom; Afif Saktiansyah
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 2 No. 2 (2023): September 2023
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v2i2.3297

Abstract

Vulnerability Assessment is an important method for identifying and analyzing security vulnerabilities within a network system. This research aims to identify security vulnerabilities within the PT. Dutakom Wibawa Putra network using OpenVAS as a research tool. In the vulnerability analysis phase, OpenVAS is utilized to scan the PT. Dutakom Wibawa Putra network and identify existing vulnerabilities. Subsequently, an evaluation is conducted on the identified vulnerabilities, including risk assessment and necessary mitigation recommendations. The outcomes of this study provide a clear overview of the security vulnerabilities present in the PT. Dutakom Wibawa Putra network. This research using method analysis of vulnerability assessment technique implementation on network using OpenVas, several significant vulnerabilities that could impact the security of the network and systems have been identified. The findings of this analysis report can serve as a foundation for developing improved security strategies and implementing effective mitigation measures. In conclusion, this study successfully applies Vulnerability Assessment techniques to the PT. Dutakom Wibawa Putra network using OpenVAS. The identified vulnerability analysis results offer valuable insights into security weaknesses that need to be addressed. It is hoped that this research can serve as a reference for PT. Dutakom Wibawa Putra and similar organizations in enhancing their network security through the implementation of effective Vulnerability Assessment techniques.