cover
Contact Name
Dadang Priyanto
Contact Email
dadang.priyanto@universitasbumigora.ac.id
Phone
+6287839793970
Journal Mail Official
ijecsa@universitasbumigora.ac.id
Editorial Address
Universitas Bumigora Jl. Ismail Marzuki-Cilinaya-Cakranegara-Mataram 83127
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
International Journal of Engineering and Computer Science Applications (IJECSA)
Published by Universitas Bumigora
ISSN : -     EISSN : 28285611     DOI : https://doi.org/10.30812/ijecsa.v1i2
Core Subject : Science,
Description of Journal : The International Journal of Engineering and Computer Science Applications (IJECSA) is a scientific journal that was born as a forum to facilitate scientists, especially in the field of computer science, to publish their research papers. The 12th of the 12th month of 2021 is the historic day of the establishment of the IJECSA International Journal. The initial idea of ​​forming the IJECSA Journal was based on the thoughts and suggestions of Experts and Lecturers of Computer Science at Bumigora University Mataram-Lombok. This journal covers all areas of computer science research, and studies literature including hardware, software, computer systems organization, computational theory, information systems, computational mathematics, data mining and data science, computational methodology, computer applications, machine learning, and learning technologies. computer. The initial publication of the IJECSA journal is 2 editions in one year, and this will continue to be reviewed based on the number of submitted papers and will increase the number of editions based on the number of submitted papers. Incoming papers will be reviewed by experts in the field of computer science from various countries. We, on behalf of the Editors, ask researchers from all fields of computer science to contribute to the publication of the IJECSA Journal. Topics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer InteractionTopics covered include Computational Mathematics Data Science Computer Applications Information Systems Learning Science And Technology Network Architectures And Protocols Computer Network Education Computer Distance Learning Cloud Computing Cluster Computing Distributed Computing E-Commerce Protocols Automata Theory Game Theory. E-Health Biometric Security And Artificial Intelligence Cryptography And Security Protocols Authentication And Identification Modulation/Coding/Signal Processing Network Measurement And Management Bayesian Networks, Fuzzy And Rough Set Biometric Security And Artificial Intelligence Cryptography And Security Protocols Image Processing And Computer Vision Authentication And Identification Bayesian Networks Fuzzy And Rough Set Mobile System Security Ubiquitous Computing Security Sensor And Mobile Ad Hoc Network Security Security In Social Networks Security For Web Services Security In Wireless Network Security For Grid Computing Security For Web Services Security For Personal Data And Databases Management Of Computing Security Intelligent Multimedia Security Service Computer Applications In Engineering And Technology Computer Control System Design Cad/Cam, Cae, Cim And Robotics Computer Applications In Knowledge-Based And Expert Systems Computer Applications In Information Technology And Communication Computer-Integrated Material Processing (Cimp) Computer-Aided Learning (Cal) Computer Modelling And Simulation Man-Machine Interface Software Engineering And Management Management Techniques And Methods Human Computer Interaction
Articles 5 Documents
Search results for , issue "Vol 1 No 2 (2022): September 2022" : 5 Documents clear
Visualization of Gastric Acid Reflux Using Mobile-Based Augmented Reality Ahmat Adil; Bambang Krismono Triwijoyo; Miftahul Madani; Lalu Riyandi Damar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.328 KB) | DOI: 10.30812/ijecsa.v1i2.2370

Abstract

Interactive information media has many benefits in the process of conveying information, one of which is by visualizing objects in real time. Socialization activities at the Rensing Health Center in conveying information on gastric diseases still do not use visual aids as a medium for delivering counseling. Therefore, this study aims to develop information media in the form of an android application by utilizing Augmented reality (AR) technology to show the stomach acid process in real time which is visualized in the form of 3D animation. The method used in application development is Multimedia Development Life Cycle (MDLC). Where this method consists of 6 (six) stages of development, namely concept, design, Material Collecting, Assembly, testing and distribution. The results of this study are a visualization application of gastric acid reflux using mobile-based augmented reality built using Unity 2017.3.1f1 and the Vuforia Software Development Kit (SDK), with several stages of the process, namely entering the database and all assets into unity, lighting, creating a user interface, scripting and finally build the application to the android platform Based on the results of application trials that have been carried out at the Rensing Health Center, it shows that mobile-based augmented reality has succeeded in assisting officers in visualizing gastric acid reflux. The satisfaction of health officers in using the application can be seen from the results of the questionnaire to the respondents, where the results of the questionnaire 32% stated strongly agree, 59% agreed, 6% disagreed and 2% disagreed.
Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency Usman Ibnu Affan; Khairan Marzuki; Lalu Zazuli Azhar Mardedi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.979 KB) | DOI: 10.30812/ijecsa.v1i2.2379

Abstract

VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
Web-Based Application for Toddler Nutrition Classification Using C4.5 Algorithm Hairani Hairani; Lilik Nurhayati; Muhammad Innuddin
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.653 KB) | DOI: 10.30812/ijecsa.v1i2.2387

Abstract

Health is something that is important for everyone, from year to year various efforts have been developed to get better and quality health. Good nutritional status for toddlers will contribute to their health and also the growth and development of toddlers. Fulfillment of nutrition in children under five years old (toddlers) is a factor that needs to be considered in maintaining health, because toddlerhood is a period of development that is vulnerable to nutritional problems. There are more than 100 toddler data registered at the Integrated Healthcare Center in Peresak Village, Narmada District, West Lombok Regency. The book contains data on toddlers along with the results of weighing which is carried out every month. However, to classify the nutritional status of toddlers, they are still going through the process of recording in a notebook by recording the measurement results and then looking at the reference table to determine their nutritional status. This method is still conventional or manual so it takes a long time to determine the nutritional status. Therefore, the solution in this study is to develop a web-based application for the classification of the nutritional status of children under five using the C4.5 method. The stages of this research consisted of problem analysis, collection of 197 instances of nutritional status datasets obtained from Integrated Healthcare Center Presak, analysis of system requirements, use case design, implementation using the C4.5 method, and performance testing based on accuracy, sensitivity, and specificity. The results of this study are a website-based application for the classification of the nutritional status of children under five using the C4.5 method. The performance of the C4.5 method in the classification of the nutritional status of toddlers using testing data as much as 20% gets an accuracy of 95%, sensitivity of 100%, and specificity of 66.6%. Thus, the C4.5 method can be used to classify the nutritional status of children under five, because it has a very good performance.
Potential of Cari Rumah Software to Brings House Product Consumer and Digital Marketing Tool Agus Pribadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (583.643 KB) | DOI: 10.30812/ijecsa.v1i2.2400

Abstract

Growth of residential areas in the city of Mataram and its surroundings has a tendency to continue to increase. The growth of residential areas is in line with population growth which reaches 1,842%. Emergence of new residential areas in the city of Mataram and its surroundings involve a lot of amount of housing developer companies. Wide distribution of new residential/housing areas has in potential consumers having to make special efforts to obtain information on the purchase of new house. Cari Rumah software provides online search services for new residential products to the public using smartphone devices. The software makes it easier for prospective consumers to get information on new residential products without having to go to the marketing office of housing developer companies one by one. On the other hand, Cari Rumah software can also function as a means of marketing new residential house products by housing developer companies. Cari Rumah software offers convenience in finding new residential house product provided by housing developer companies. The content owned by the Cari Rumah software has the possibility as a means of digital marketing in addition to the function of helping potential consumers. This search study aims to find out the potential of the Cari Rumah software to meet the information needs of potential consumers and possibilities be used as a means of digital marketing. Method used is an impression test of the Cari Rumah software. The main stages of this method are gathering information, impression test, and potential conclusion. Results obtained indicate that the Cari Rumah software is not sufficient to meet the information needs for users / potential consumers of residential house product. However, 83.94% of users of the Cari Rumah software recommend to developer criteria features. Potential use of the Cari Rumah software as a digital marketing tool only reaches 20.15%.
Designing a Honey Quality Tool Based on Gas Sensor and Color Sensor Al Bima; Sirojul Hadi; M. Najmul Fadli; Nurul Hidayah; Lalu Danu Prima Arzani
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (578.267 KB) | DOI: 10.30812/ijecsa.v1i2.2407

Abstract

Honey has many benefits. Thus, honey counterfeiting often occurs with the ever-increasing demand. However, many do not know how to distinguish between real and fake honey, even honey breeders and hunters find it difficult to tell the difference. The honey used to test the quality of honey is honey produced by Apis dorsata bees or wild bees, the nectar consumed by these bees is the kesambi tree, the kesambi tree that grows a lot on the slopes of Mount Tambora, Bima district. Honey contains a lot of antioxidants such as vitamin C, pinocembrin, chrysin, pinobaksin, catalase, and many other ingredients that are very beneficial for the health of the body. Testing the authenticity of honey using two sensors, namely a gas sensor and a color sensor, the tool has been connected to a database and web application to display test data. The web application can be accessed from any location as long as it is connected to the internet network. The results of the research are the ideal distance for measurements is carried out as far as 2 cm. The success rate in testing pure honey with a mixture of honey has different values, such as the value of pure honey has a gas sensor voltage of 3.3 volts while the value of mixed honey with 50% pure honey and 50% sugar, the value of the gas sensor voltage is 2.54 volts. Mixed honey has a voltage below 3 volts. The results of the color sensor test, namely the sensor output have different values, the RGB value for pure honey is red 206, green 246, and blue 182 while the RGB value for mixed honey is for 20% pure honey and 80% sugar mixture produces an RGB value of Red 156, Green 210, Blue 171. The color sensor can distinguish between real honey and mixed honey for trigona honey.

Page 1 of 1 | Total Record : 5