cover
Contact Name
Dadang Priyanto
Contact Email
dadang.priyanto@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 22 Documents
Plume Detection System Based Internet of Things I Nyoman Susila Astraning Utama; Sirojul Hadi; I Putu Hariyadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (808.285 KB) | DOI: 10.30812/ijecsa.v1i1.1698

Abstract

Security is one of the important aspects in a system or environment. Residential, office, tourist and industrial areas are places that are prone to fires because they contain flammable objects. Slow handling when a gas leak occurs can trigger a fire. The solution that can be used to minimize the occurrence of fires is to build tools that work to monitor the condition of the room or environment that is prone to leakage of gas or other flammable liquids. The design and manufacture of a system to detect LPG and alcohol gas leaks can be useful for providing information in the event of a gas or alcohol leak so that it can be handled quickly and minimize fire damage. This system combines an plume detection system with an internet of things system so that it can provide information when a gas or flammable liquid leak occurs. The gas leak information is sent as a notification to the telegram from the operator. The design and manufacture of this system uses the Waterfall methodology with the following stages: analyzing (covering the need for system creation), system design (including designing electronic circuits and web monitoring interfaces), implementing system design and testing the system as a whole. The result of this research is that an electronic detection system has been successfully built that can distinguish gases and can provide information via telegram and web if gas is detected in the sensor environment. In the LPG gas leak test, the results show that the characteristics of LPG gas, namely the sensor output voltage, have an average of 4.17 volts with an average Part Per Million (PPM) of 8340 and the characteristics of alcohol gas, namely the sensor output voltage, have an average of 0, 13 volts with an average Part Per Million (PPM) of 254.
Prediction of Electricity Usage with Back-propagation Neural Network Anthony Anggrawan; Hairani Hairani; M. Ade Candra
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (785.334 KB) | DOI: 10.30812/ijecsa.v1i1.1722

Abstract

The use of electricity has become a need that is increasing day by day. So it is not surprising that the problem of using electricity has attracted the attention of many researchers to research it. Electricity users make various efforts and ways to save on the use of electrical energy. One of them is saving electricity usage by electricity users using electrical energy-efficient equipment. That is why the previous research confirms the need for interventions to reduce the use of electrical energy. Therefore, this study aims to predict electricity use and measure the performance of the anticipated results of electricity use. This study uses the back-propagation method in predicting the use of electricity. This study concluded that the backpropagation architectural model with better performance is the six hidden layer architecture, 0.4 learning rate, and the Root Means Square Error (RMSE) value of 0.203424. Meanwhile, the training data test results get the best architectural model on hidden layer 8 with a learning rate of 0.3 with an RMSE performance value of 0.035811. The prediction results show that the prediction of electricity consumption is close to the actual data of actual electricity consumption.
Home Security Voice Notification System With Arduino Sensor, PIR based SMS Gateway Muh Thariq Ali Mujitomo; Heroe Santoso; Lilik Widyawati; Dadang Priyanto
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.189 KB) | DOI: 10.30812/ijecsa.v1i1.1793

Abstract

The level of crime that afflicts households such as theft and robbery is still common. Many thefts occur when the homeowner is away and the house is staying for a long time. Although some residential neighborhoods already have security officers, human limitations can be a gap for perpetrators of theft. To overcome this, we need a guard who is always there to monitor the house to avoid theft. In this case the risk of guards on duty to guard the house is very large, such as acts of theft accompanied by violence. The design and manufacture of this system uses the Network Development Life Cycle (NDLC) method. NDLC is a method that relies on previous development processes such as business strategy planning, application development lifecycle, and data distribution analysis. There are 6 stages in the Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.
Optic Disk Segmentation Using Histogram Analysis Bambang Krismono Triwijoyo
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (597.789 KB) | DOI: 10.30812/ijecsa.v1i1.1799

Abstract

In the field of disease diagnosis with ophthalmic aids, automatic segmentation of the retinal optic disc is required. The main challenge in OD segmentation is to determine the exact location of the OD and remove noise in the retinal image. This paper proposes a method for automatic optical disc segmentation on color retinal fundus images using histogram analysis. Based on the properties of the optical disk, where the optical disk tends to occupy a high intensity. This method has been applied to the Digital Retinal Database for Vessel Extraction (DRIVE)and MESSIDOR database. The experimental results show that the proposed automatic optical segmentation method has an accuracy of 55% for DRIVE dataset and 89% for MESSIDOR database
Ensemble Implementation for Predicting Student Graduation with Classification Algorithm Ria Rismayati; Ismarmiaty Ismarmiaty; Syahroni Hidayat
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.941 KB) | DOI: 10.30812/ijecsa.v1i1.1805

Abstract

Graduating on time at the higher education level is one of the main targets of every student and university institution. Many factors can affect a student's length of study, the different character of each student is also an internal factor that affects their study period. These characters are used in this study to classify data groups of students who graduated on time or not. Classification was chosen because it is able to find a model or pattern that can describe and distinguish classes in a dataset. This research method uses the esemble learning method which aims to see student graduation predictions using a dataset from Kaggle, the data used is a IPK dataset collected from a university in Indonesia which consists of 1687 records and 5 attributes where this dataset is not balanced. The intended target is whether the student is predicted to graduate on time or not. The method proposed in this study is Ensemble Learning Different Contribution Sampling (DCS) and the algorithms used include Logistic Regression, Decision Tree Classifier, Gaussian, Random Forest Classifier, Ada Bost Classifier, Support Vector Coefficient, KNeighbors Classifier and MLP Classifier. From each classification algorithm used, the test value and accuracy are calculated which are then compared between the algorithms. Based on the results of research that has been carried out, it is concluded that the best accuracy results are owned by the MLPClassifier algorithm with the ability to predict student graduation on time of 91.87%. The classification model provided by the DCS-LCA used does not give better results than the basic classifier of its constituent, namely the MLPClassifier algorithm of 91.87%, SVC of 91.64%, Logistic Regression of 91.46%, AdaBost Classifier of 90.87%, Random Forest Classifier of 90.45% , and KNN of 89.80%.
Implementation Of The Simple Additive Weighting Method At Universitas Terbuka Mataram For New Employee Recruitment Husain Husain; Heroe Santoso; Helna Wardhana; Muhammad Irwan Ardiasyah; Nurul Fitriani
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.698 KB) | DOI: 10.30812/ijecsa.v1i1.1814

Abstract

An agency will thrive if it is supported by qualified employees. So that employees are certainly one of the most important assets in an institution, both private and public institutions, so that agencies are required to recruit prospective contract employees who have competence and talent to support the implementation of work at the Open University of Mataram City. Skilled workers who can bring institutions forward and compete with other agencies so that they can keep up with the times, and the recruitment aspect is starting to get a special view, because the recruitment process is not in accordance with the needs at the Mataram Open University so that it can hinder the rate of development of the agency itself. Therefore, a decision support system is needed for the contract employee recruitment process at the Universitas Terbuka Mataram. Therefore, a decision support system is needed for the contract employee recruitment process at universitas Terbuka Mataram campus. This decision support system uses the Simple Additive Weighting SAW method. In this case, prospective employees are compared with one another so as to provide an output value of priority intensity which results in a system that provides an assessment of each employee. This decision support system helps evaluate each employee, make changes to the criteria, and changes the weight values. This is useful to facilitate decision making related to employee selection issues, so that the most appropriate employees will be received in the company. The purpose of this study was to select the best candidate for employees at the Universitas Terbuka Mataram. The results of this study indicate that the SAW method is appropriate for selecting the best prospective employees because it can obtain qualified employees in accordance with the expectations of the company and the leadership.
Augmented Reality in Indonesia's Primary School: Systematic Mapping Study Dian Syafitri Chani Saputri; Dyah Susilowati
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.319 KB) | DOI: 10.30812/ijecsa.v1i1.1817

Abstract

Augmented reality is an increase trending technology in education. Research in the field of AR for Education is increasing every year. A large number of research reviews have focused on the use of AR in education worldwide and at all levels of education, but there have not been many reviews of the use of AR at the elementary school level in Indonesia. This study aims to determine the trends of using AR in elementary school in Indonesia. This research used a Systematic Mapping Study approach, which consists of the stages of definition research question, conduct research, screening papers, keywording using abstract, and data extraction and mapping process. Subjects of elementary education, grade, type of AR application, and research method and facets, have been used in classifying AR. Inclusion and exclusion criteria were used in determining the relevant papers. This study examining 42 articles containing “augmented reality”, “elementary school” and “Indonesia” in their titles, abstracts, and keywords. Articles were published between 2017 and 2021. The results have shown that science learning is the most subject to be the object of AR research, followed by mathematics, language, and culture. Most of the AR implementations are implemented in class IV, V and VI. The most widely used type of AR application is marker-based AR. The most widely used research method is R&D which focuses on developing AR products.
Visualization of Gastric Acid Reflux Using Mobile-Based Augmented Reality Ahmat Adil; Bambang Krismono Triwijoyo; Miftahul Madani; Lalu Riyandi Damar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.328 KB) | DOI: 10.30812/ijecsa.v1i2.2370

Abstract

Interactive information media has many benefits in the process of conveying information, one of which is by visualizing objects in real time. Socialization activities at the Rensing Health Center in conveying information on gastric diseases still do not use visual aids as a medium for delivering counseling. Therefore, this study aims to develop information media in the form of an android application by utilizing Augmented reality (AR) technology to show the stomach acid process in real time which is visualized in the form of 3D animation. The method used in application development is Multimedia Development Life Cycle (MDLC). Where this method consists of 6 (six) stages of development, namely concept, design, Material Collecting, Assembly, testing and distribution. The results of this study are a visualization application of gastric acid reflux using mobile-based augmented reality built using Unity 2017.3.1f1 and the Vuforia Software Development Kit (SDK), with several stages of the process, namely entering the database and all assets into unity, lighting, creating a user interface, scripting and finally build the application to the android platform Based on the results of application trials that have been carried out at the Rensing Health Center, it shows that mobile-based augmented reality has succeeded in assisting officers in visualizing gastric acid reflux. The satisfaction of health officers in using the application can be seen from the results of the questionnaire to the respondents, where the results of the questionnaire 32% stated strongly agree, 59% agreed, 6% disagreed and 2% disagreed.
Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency Usman Ibnu Affan; Khairan Marzuki; Lalu Zazuli Azhar Mardedi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.979 KB) | DOI: 10.30812/ijecsa.v1i2.2379

Abstract

VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
Web-Based Application for Toddler Nutrition Classification Using C4.5 Algorithm Hairani Hairani; Lilik Nurhayati; Muhammad Innuddin
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.653 KB) | DOI: 10.30812/ijecsa.v1i2.2387

Abstract

Health is something that is important for everyone, from year to year various efforts have been developed to get better and quality health. Good nutritional status for toddlers will contribute to their health and also the growth and development of toddlers. Fulfillment of nutrition in children under five years old (toddlers) is a factor that needs to be considered in maintaining health, because toddlerhood is a period of development that is vulnerable to nutritional problems. There are more than 100 toddler data registered at the Integrated Healthcare Center in Peresak Village, Narmada District, West Lombok Regency. The book contains data on toddlers along with the results of weighing which is carried out every month. However, to classify the nutritional status of toddlers, they are still going through the process of recording in a notebook by recording the measurement results and then looking at the reference table to determine their nutritional status. This method is still conventional or manual so it takes a long time to determine the nutritional status. Therefore, the solution in this study is to develop a web-based application for the classification of the nutritional status of children under five using the C4.5 method. The stages of this research consisted of problem analysis, collection of 197 instances of nutritional status datasets obtained from Integrated Healthcare Center Presak, analysis of system requirements, use case design, implementation using the C4.5 method, and performance testing based on accuracy, sensitivity, and specificity. The results of this study are a website-based application for the classification of the nutritional status of children under five using the C4.5 method. The performance of the C4.5 method in the classification of the nutritional status of toddlers using testing data as much as 20% gets an accuracy of 95%, sensitivity of 100%, and specificity of 66.6%. Thus, the C4.5 method can be used to classify the nutritional status of children under five, because it has a very good performance.

Page 1 of 3 | Total Record : 22