cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 6 Documents
Search results for , issue "Vol 13 No 1 (2024)" : 6 Documents clear
Point of Interest (POI) Recommendation System using Implicit Feedback Based on K-Means+ Clustering and User-Based Collaborative Filtering Sulis Setiowati; Teguh Bharata Adji; Igi Ardiyanto
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.388

Abstract

Recommendation system always involves huge volumes of data, therefore it causes the scalability issues that do not only increase the processing time but also reduce the accuracy. In addition, the type of data used also greatly affects the result of the recommendations. In the recommendation system, there are two common types of data namely implicit (binary) rating and explicit (scalar) rating. Binary rating produces lower accuracy when it is not handled with the properly. Thus, optimized K-Means+ clustering and user-based collaborative filtering are proposed in this research. The K-Means clustering is optimized by selecting the K value using the Davies-Bouldin Index (DBI) method. The experimental result shows that the optimization of the K values produces better clustering than Elbow Method. The K-Means+ and User-Based Collaborative Filtering (UBCF) produce precision of 8.6% and f-measure of 7.2%, respectively. The proposed method was compared to DBSCAN algorithm with UBCF, and had better accuracy of 1% increase in precision value. This result proves that K-Means+ with UBCF can handle implicit feedback datasets and improve precision.
Optimization of Distributed RSA Encryption and Decription Processing Using Process Scheduling Method In Single Board Computer Cluster Architecture (SBC) Sofyan Nur Arief; Vipkas Al Hadid Firdaus; Arief Prasetyo
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.389

Abstract

Data security is still a major issue regarding the need for data confidentiality. The encryption process using the RSA algorithm is still the most popular method used in securing data because the complexity of the mathematical equations used in this algorithm makes it difficult to hack. However, the complexity of the RSA algorithm is still a major problem that hinders its application in a more complex application. Optimization is needed in the processing of this RSA algorithm, one of which is by running it on a distributed system. In this paper, we propose an approach with a FIFO process scheduling algorithm that runs on a single board computer cluster. The test results show that the allocation of resources in a system that uses a FIFO process scheduling algorithm is more efficient and shows a decrease in the overall processing time of RSA encryption.
Analysis and Implementation of Blowfish and LSB Algorithm on RGB Images using SHA-512 Ilham Firman Ashari; Mugi Praseptiawan
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.450

Abstract

The growth of the internet globally keeps increasing as time goes. There's a big amount of data type saved there too. Those data need to be secured so anyone who doesn't have the right to access them can access it. The purpose of this article is to secure text information into image media using the Blowfish method for encrypting text information and securing it using the Hash function SHA-512 and then embedded it in image media using the Least Significant Bit (LSB) method. The result of implementing those methods using image media sized 138Kb and 39.85Kb with plaintext measuring 27 and 85 characters shows that integrity data is secured with SHA-512 method. The test result using PSNR method to get the score of image quality after embedding information to the image shows that the average number of PSNR’s score is 70,74 dB which means the quality is good and has less difference from the original image.
Comparison of Naive Bayes and Support Vector Machine (SVM) Algorithms Regarding The Popularity of Presidential Candidates In The Upcoming 2024 Presidential Election Fadli Nurrizky; Saruni Dwiasnati
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.459

Abstract

This study aims to compare the effectiveness of two classification algorithms, Naive Bayes and Support Vector Machine (SVM), in analyzing the popularity of presidential candidates for the 2024 Presidential Election (Pilpres). The popularity of presidential candidates plays a crucial role in campaign strategies and political decision-making in the modern political era. This research utilizes data from social media, encompassing public sentiment towards presidential candidates and related political issues. The research results indicate that SVM achieves an accuracy rate of 97%, while Naive Bayes achieves 95%, demonstrating the superiority of SVM in predicting the popularity of presidential candidates. In conclusion, the selection of the appropriate algorithm for analyzing complex political data has a significant impact, and the high accuracy rates of both algorithms provide valuable guidance for political decision-makers and campaign teams in preparation for the upcoming 2024 Pilpres.
A Hybrid of Fuzzy C-Means for the segmentation in CT scan and X-ray images for screening the COVID-19 patients Nitit WangNo
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.460

Abstract

In this paper, using CT scan and X-ray images, we present a hybrid approach, based on combining fuzzy C-means with k-means clustering, to evaluate and determine pneumonia infection caused by the coronavirus disease (COVID-19). To achieve this objective, we introduce a hybrid method that combines fuzzy C-means clustering with K-means clustering. This hybrid approach is designed to effectively segment object boundaries within medical images, enabling the precise identification of pneumonia-related features. In addition to our hybrid method, we compare its performance with two other segmentation approaches: the Expectation Maximization (EM) algorithm and 2D Entropy segmentation. Which, the method we propose uses a comparison between the performances of the based on a database of medical imaging test. Experimental results showed that the proposed approach outperforms, it was found that the hybrid fuzzy C-means algorithm segmentation images methods give better performance in terms of accuracy, precision, and F-measure, which is effective in boundaries segmentation. Comparative results of the accuracy and image quality index demonstrate the robustness of AI. It also helps to improve work efficiency with accurate analysis of COVID-19 infection on CT scan and X-rays. In addition, the approach helps radiologists make clinical decisions for diagnosis, follow-up, and prognosis.
Video Annomaly Classification Using Convolutional Neural Network Rachmatullah, Muhammad Naufal; Sutarno, Sutarno; Isnanto, Rahmat Fadli
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.468

Abstract

The use of surveillance videos is increasingly popular in city monitoring systems. Generally, the analysis process in surveillance videos still relies on conventional methods. This method requires professional personnel to constantly monitor and analyze videos to identify abnormal events. Consequently, the conventional approach is time-consuming, resource-intensive, and costly. Therefore, a system is needed to automatically detect video anomalies, reducing the massive human resource utilization for video monitoring. This research employs deep learning methods to classify anomalies in videos. The video anomaly detection process involves transforming the video into image format by extracting each frame present in the video. Subsequently, a Convolutional Neural Network (CNN) model is utilized to classify anomalous events within the video. Testing results using the CNN architectures DenseNet121 and EfficientNet V2 yielded performance accuracies of 99.89 and 98.24, respectively. The testing results indicate that the DenseNet121 architecture outperforms the EfficientNetV2 architecture in terms of performance.

Page 1 of 1 | Total Record : 6