T. Moses, A. Othman, U. Aisha, A. Gital, B. Souley, B. T. Adeleke
{"title":"Big data indexing: Taxonomy, performance evaluation, challenges and research opportunities","authors":"T. Moses, A. Othman, U. Aisha, A. Gital, B. Souley, B. T. Adeleke","doi":"10.36596/jcse.v3i2.548","DOIUrl":"https://doi.org/10.36596/jcse.v3i2.548","url":null,"abstract":"In order to efficiently retrieve information from highly huge and complicated datasets with dispersed storage in cloud computing, indexing methods are continually used on big data. Big data has grown quickly due to the accessibility of internet connection, mobile devices like smartphones and tablets, body-sensor devices, and cloud applications. Big data indexing has a variety of problems as a result of the expansion of big data, which is seen in the healthcare industry, manufacturing, sciences, commerce, social networks, and agriculture. Due to their high storage and processing requirements, current indexing approaches fall short of meeting the needs of large data in cloud computing. To fulfil the indexing requirements for large data, an effective index strategy is necessary. This paper presents the state-of-the-art indexing techniques for big data currently being proposed, identifies the problems these techniques and big data are currently facing, and outlines some future directions for research on big data indexing in cloud computing. It also compares the performance taxonomy of these techniques based on mean average precision and precision-recall rate.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128108867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ebtesam Shadadi, Shama Kouser, Latifah Alamer, P. Whig
{"title":"Novel approach of Predicting Human Sentiment using Deep Learning","authors":"Ebtesam Shadadi, Shama Kouser, Latifah Alamer, P. Whig","doi":"10.36596/jcse.v3i2.533","DOIUrl":"https://doi.org/10.36596/jcse.v3i2.533","url":null,"abstract":"Due to its interactive and real-time character, gathering public opinion through the analysis of massive social data has garnered considerable attention. Recent research have used sentiment analysis and social media to do this in order to follow major events by monitoring people's behavior. In this article, we provide a flexible approach to sentiment analysis that instantly pulls user opinions from social media postings and evaluates them. As time passed, an increasing number of people shared their opinions on social media. More individuals can now communicate with one another as a result. Along with these advantages, it also has certain drawbacks that cause resentment in some people. Hate speech is another possibility. Hate speech impacts the community when it contains insulting or threatening language. Before it spreads, this kind of speech has to be identified and deleted from social media platforms. The process of determining whether a text's feelings reflect hatred or not involves sentiment analysis. Python language was used to analyze the Twitter dataset. There were 5000 Tweets in total in this dataset, and we used deep learning to improve the machine learning model's accuracy. The experimental outcome in both cases of the Twitter dataset uses the Random Forest approach, which has a 99 percent accuracy rate.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shafa Salsabila Khansa, Della Novia Ramadhan, Ahmad Fadil Alfarisy, Fitroh Fitroh
{"title":"Perkembangan Evaluasi Tata Kelola Teknologi Informasi: Literature Review","authors":"Shafa Salsabila Khansa, Della Novia Ramadhan, Ahmad Fadil Alfarisy, Fitroh Fitroh","doi":"10.36596/jcse.v3i2.521","DOIUrl":"https://doi.org/10.36596/jcse.v3i2.521","url":null,"abstract":"Information technology is an important organizational asset to be managed and maximized so that its use can be aligned with business needs, thus helping to improve the achievement of the organization's vision and mission. Therefore, the implementation of information technology governance in every organization needs to be monitored for its implementation, this makes the organization more mature and immediately makes improvements to its management of its IT assets. Various studies have been conducted to evaluate IT governance in organizations using various frameworks. This study aims to conduct a review of previous studies related to the development of IT governance evaluation in reviewing research activities carried out in a certain period, analyzing the framework used and why the framework is used. The results show that research to evaluate IT governance peaked in 2014 which was dominated by the institutional sector using the COBIT 5 framework and the various reasons for using COBIT 5 are discussed further in this study.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Computational Psychometrics Analysis Motivational Level in Learner’s using Different Parameters through Deep Learning Algorithm","authors":"A. B. Bhatia, Kavita Mittal","doi":"10.36596/jcse.v3i2.529","DOIUrl":"https://doi.org/10.36596/jcse.v3i2.529","url":null,"abstract":"Learning is an ongoing process irrespective of age, gender and geographical location of acquiring new understanding, knowledge, behaviours, skills, values, attitudes, and preferences. Formative assessment methods have emerged and evolved to integrate learning, evaluation and education models. Not only is it critical to understand a learner's skills and how to improve and enhance them, but we also need to consider what the learner is doing; we need to consider navigational patterns. The extended learning and assessment system, a paradigm for doing research, captures this entire view of learning and evaluation systems. The function of computational psychometrics is to facilitating the translation from raw data to meaningful concepts. In this research study, several factors are considered for psychometric analysis of different kinds of learners, and based on a motivational level, many interesting conclusions have been drawn and presented in the result section at the end of the paper. Deep learning model Ludwig Classifier used to calculate, motivational Level is obtained for 100 number of epochs and it is found that the loss is decreasing and in other words, the accuracy of the machine goes on increasing. Each of the categories discussed here has new capabilities, or at the very least expansions of current ones.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gbolagade Morufat D, M. A. Hambali, O. H. Abdulganiyu, E. Lawrence
{"title":"Enhance Facial Biometric Template Security using Advance Encryption Standard with Least Significant Bit","authors":"Gbolagade Morufat D, M. A. Hambali, O. H. Abdulganiyu, E. Lawrence","doi":"10.36596/jcse.v3i2.527","DOIUrl":"https://doi.org/10.36596/jcse.v3i2.527","url":null,"abstract":"Security of data has been a major issue for many years which has lead to several challenges; loss of data and also allure hackers to where data are been stored. Biometric system to some extend has helped in combating these security issues, the major issues with the biometric system is how to properly secure the template been generated from hackers and unauthorized users. In this paper we combine cryptography and steganography to enhance security of biometric templates using the advance encryption standard (AES) and the least significant bit (LSB) technique to encrypt these templates and secure it from hackers, Cryptography and Steganography are the two widely employed techniques for securing and hiding data. The center of attention of this paper is the potency of combining cryptography and stenography techniques to improve the security of biometric templates.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Oladunjoye, M. Timothy, Okpor James, Baku Agyo Raphael
{"title":"Performance study of the Memory Utilization of an Improved Pattern Matching Algorithm using Bit-Parallelism","authors":"J. Oladunjoye, M. Timothy, Okpor James, Baku Agyo Raphael","doi":"10.36596/jcse.v3i1.460","DOIUrl":"https://doi.org/10.36596/jcse.v3i1.460","url":null,"abstract":"The strategy of packing several data values in a single computer word and refreshing them all in a solitary operation is referred to bit parallelism. It assumes a significant part in pattern matching because it can handle in parallel the length of pattern sizes. In this paper, an Improved Pattern Matching model (IPM) proposed, which makes searching process quicker and decreases how much memory used in processing input data. C# was used for the development of the model. With a computer word size of 64bits and pattern length ranging from 8 characters to 72 characters, the system decides how much memory is used. The developed model was evaluated and contrasted with the existing model using 64bits computer word size (cws) and the pattern length of 72 characters. The assessment showed that the IPM had minimal worth of MU contrasted with the existing model (BNDM, SBNDM, and FSBNDM). This IPM model can be embraced for improvement of the size of string data stored in computer word because of its capacity to diminish memory space usage. w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pengunaan Metode Scrum Dalam Pengembangan Perangkat Lunak: Literature Review","authors":"Muhamad Rizky, Y. Sugiarti","doi":"10.36596/jcse.v3i1.353","DOIUrl":"https://doi.org/10.36596/jcse.v3i1.353","url":null,"abstract":"Abstrack: The use of scrum in software engineering as a system development method is considered effective and quite easy to apply in application development. Many Start-up industries as well as IT companies use this method. In software development, Scrum has an iterative and incremental nature that makes this company able to continue to compete in improving its products in the market. Scrum itself is a method that is not rigid, but a framework whose application can be used in various tools and techniques. The purpose of this research is to find out how to use the scrum method in software development and to find out how to deal with the problem of using scrum which has a complex process. The methodology used in this research is literature study. The results of this study are the use of Scrum in software development can be utilized according to the need to both help and solve existing problems in the framework of software development. In solving problems that exist in Scrum related to such a complex process, the step that needs to be done is to identify the cause of the problem. Which is then continued by discussing the right solution with the team in order to find a way out of every problem that exists in each process.Abstrak: Penggunaan scrum dalam rekayasa perangkat lunak sebagai metode pengembangan sistem dianggap efektif dan cukup mudah diterapkan dalam pengembangan aplikasi. Banyak industri Star-up maupun juga perusahaan TI menggunakan metode ini. Dalam pengembangan perangkat lunak Scrum ini memiliki sifat yang iterative dan juga incremental yang menjadikan perusahaan ini bisa terus bersaing dalam meningkatkan produknya dipasaran. Scrum sendiri merupakan metode yang tidak kaku, melainkan framework yang penerapannya ini bisa digunakan dalam berbagai tools maupun juga teknik. Tujuan penelitian ini adalah untuk mengetahui bagaimana penggunaan metode scrum dalam pengembangan perangkat lunak dan mencari bagaimana langkah menangani permasalahan penggunaan scrum yang memiliki proses yang kompleks. Metodologi yang digunakan dalam penelitian ini adalah studi literatur. Hasil penelitian ini adalah penggunan scrum dalam pengembangan perangkat lunak dapat dimanfaatkan sesuai dengan kebutuhan baik membantu maupun menyelesaikan permasalahan yang ada dalam rangka pengembangan perangkat lunak. Dalam menyelesaikan permasalahan yang ada pada scrum terkait proses yang begitu kompleks, langkah yang perlu dilakukan adalah dengan mengidentifikasi penyebab masalah. Yang kemudian dilanjutkan dengan mendiskusikan solusi yang tepat dengan tim agar mencari jalan keluar dari setiap permasalahan yang ada dalam setiap prosesnya.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128247223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhamad Rizky, Faaza Bil Amri, Ani Rosidah, Nanda Putri Styaningrum, Fitroh Fitroh
{"title":"Usulan Perencanaan Enterprise Architecture Aplikasi Flip.id Menggunakan TOGAF ADM","authors":"Muhamad Rizky, Faaza Bil Amri, Ani Rosidah, Nanda Putri Styaningrum, Fitroh Fitroh","doi":"10.36596/jcse.v3i1.367","DOIUrl":"https://doi.org/10.36596/jcse.v3i1.367","url":null,"abstract":"ABSTRACT: Financial Technology is used as a tool to accelerate and facilitate financial services arising from innovations in the financial services industry. One of the fintechs in the field of fund transfer services that is well known to many people is Flip.id. The problems that often occur in the process of interbank money transfer transactions are a consideration for users to use the Flip.id application or prefer to use other platforms. The problems that occur with Flip.id are the refund system, unsatisfactory service, and speed in transactions. This can be born from a bad corporate architecture. The purpose of this study is to provide suggestions about enterprise architecture planning on the Flip.id application. The method used in problem solving is using the TOGAF ADM framework based on previous research literature studies. This research will produce an IT Blueprint for users to feel comfortable and have loyalty for future evaluations of the Flip.id company.ABSTRAK: Financial Technology digunakan sebagai alat untuk mempercepat dan memudahkan pelayanan keuangan yang timbul akibat inovasi pada industri jasa keuangan. Salah satu fintech dalam bidang jasa transfer dana yang sudah dikenal banyak orang adalah Flip.id. Permasalahan yang banyak terjadi pada proses transaksi pengiriman uang antarbank menjadi pertimbangan untuk para pengguna akan menggunakan aplikasi Flip.id atau lebih memilih menggunakan platform lain. Masalah yang terjadi pada Flip.id yakni sistem pengembalian dana, pelayanan yang kurang memuaskan, serta kecepatan dalam transaksi. Hal tersebut bisa lahir dari arsitektur perusahaan yang kurang baik. Tujuan dari penelitian ini untuk memberikan usulan tentang perencanaan enterprise architecture pada aplikasi Flip.id. Metode yang digunakan dalam pemecahan masalah yakni menggunakan framework TOGAF ADM berdasarkan studi literatur penelitian sebelumnya. Penelitian ini akan menghasilkan IT Blueprint untuk para pengguna agar mendapatkan kenyamanan dan memiliki loyalitas untuk evaluasi perusahaan Flip.id kedepannya.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Loan Behaviour with Machine Learning Models for Secure Banking","authors":"Mayank Anand, Arun Velu, P. Whig","doi":"10.36596/jcse.v3i1.237","DOIUrl":"https://doi.org/10.36596/jcse.v3i1.237","url":null,"abstract":"Given loan default prediction has such a large impact on earnings, it is one of the most influential factor on credit score that banks and other financial organisations face. There have been several traditional methods for mining information about a loan application and some new machine learning methods of which, most of these methods appear to be failing, as the number of defaults in loans has increased. For loan default prediction, a variety of techniques such as Multiple Logistic Regression, Decision Tree, Random Forests, Gaussian Naive Bayes, Support Vector Machines, and other ensemble methods are presented in this research work. The prediction is based on loan data from multiple internet sources such as Kaggle, as well as data sets from the applicant's loan application. Significant evaluation measures including Confusion Matrix, Accuracy, Recall, Precision, F1- Score, ROC analysis area and Feature Importance has been calculated and shown in the results section. It is found that Extra Trees Classifier and Random Forest has highest Accuracy of using predictive modelling, this research concludes effectual results for loan credit disapproval on vulnerable consumers from a large number of loan applications","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121766167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of the Accuracy of Sentiment Analysis on the Twitter of the DKI Jakarta Provincial Government during the COVID-19 Vaccine Time","authors":"Adi Winanto, Cahyani Budihartanti","doi":"10.36596/jcse.v3i1.249","DOIUrl":"https://doi.org/10.36596/jcse.v3i1.249","url":null,"abstract":"Currently, the Government is intensively utilizing social media, one of which is Twitter as a place of interaction with the community. The results of these interactions can be used as feedback to determine whether public opinion on public policies is positive or negative. Tweets from users can be a supporting parameter for the government in evaluating future policies and decision making by applying the sentiment analysis method. This study aims to determine positive or negative sentiments on user tweets against the official twitter account of the DKI Jakarta Provincial Government during the COVID19 vaccine period. The data obtained are 1658 lines from March 30 to April 5, 2021 with queries on tweets containing words or mentioning the username @dkijakarta, which will be grouped by sentiment class, namely negative and positive using the TF-IDF Vectorizer for word weighting and classification using several methods, namely, nave Bayes with accuracy values. 82.50% with class recall on positive sentiment 88% and negative 77% and in class precision showing positive at 79.28% and negative at 86.52% in the rapid miner application then k-NN with an accuracy value of 81.50% with class recall on positive sentiment 85% and negative 78% and class precision shows positive at 79.44% and negative at 83.87% in the rapid miner application. And the accuracy value of the best method in this training data classification comparison is nave Bayes, the results the end of testing the sample dataset using the nave Bayes method with 84.80% accuracy with class recall at 85.01% positive sentiment and 84.59% negative sentiment and at c lass precision shows positive at 85.21% and negative at 84.38% in rapid mining applications.","PeriodicalId":354823,"journal":{"name":"Journal of Computer Science and Engineering (JCSE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}