CESS Journal of Computer Engineering System and Science最新文献

筛选
英文 中文
Comparasion KNN, Decision Tree and Naïve Bayes for Sentimen Analysis Marketplace Bukalapak Sentimen分析市场Bukalapak的KNN、决策树和朴素贝叶斯的比较
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-07 DOI: 10.24114/cess.v8i1.41385
Elisa Nathania Halim, Baenil Huda, Anggi Elanda
{"title":"Comparasion KNN, Decision Tree and Naïve Bayes for Sentimen Analysis Marketplace Bukalapak","authors":"Elisa Nathania Halim, Baenil Huda, Anggi Elanda","doi":"10.24114/cess.v8i1.41385","DOIUrl":"https://doi.org/10.24114/cess.v8i1.41385","url":null,"abstract":"The number of platforms currently makes it easier for users to provide reviews, one of which is the Bukalapak application on the Google Play Store. While both negative and positive reviews can influence the value of the app, users can also be affected by the app's sentiment reviews. Therefore it is necessary to carry out sentiment analysis to classify negative and positive reviews. This research uses review data of 1000 reviews and then classifies them using the RapidMiner application using three methods, namely KNN, Naive Bayes, and also the Decision Tree. The results of the KNN method obtained accuracy values of 85.03%, precision of 84.98%, and recall of 100.00%, then for the Naive Bayes method obtained accuracy values of 73.95%, precision of 100.00%, and recall of 69.26%, and for the Decision Tree method obtained 89.12% accuracy value, 88.62% precision, and 100.00% recall. this can prove that the Decision Tree method is superior to the KNN method and also the Naive Bayes method.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46313110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Activation Control System in Motorized Vehicles Using the Global Positioning System (GPS) 使用全球定位系统(GPS)的机动车辆激活控制系统
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.39663
Aris Budiyarto, Abdur Rohman Harits Martawireja, Mohammad Harry Khomas Saputra, G. Maulana
{"title":"Activation Control System in Motorized Vehicles Using the Global Positioning System (GPS)","authors":"Aris Budiyarto, Abdur Rohman Harits Martawireja, Mohammad Harry Khomas Saputra, G. Maulana","doi":"10.24114/cess.v8i1.39663","DOIUrl":"https://doi.org/10.24114/cess.v8i1.39663","url":null,"abstract":"In Indonesia, the theft rate is still quite high. According to Bappeda data, cases of theft still tend to be high. In 2019, there were 362,000 cases of theft. CCTV use is still ineffective because at the time of the theft of goods, we only know the goods taken and the perpetrators. In order to catch the perpetrators and return the goods, it is necessary to process them first and find the location of the perpetrators themselves. Therefore, we propose an idea entitled \"Activation Control System in Motorized Vehicles Using GPS\". Where this tool will detect the position of a vehicle so that this vehicle remains in a restricted area. When this vehicle leaves the restricted area, the GPS system will send a signal explaining that the vehicle is leaving the area. So, if there is a theft, when the vehicle has moved away from about 50 meters from the area that has been locked, a notification will appear which will be displayed on the web application. The research stages that we will work on are first identifying the equipment and systems that will be used and conducting a study of the technology literature that will be developed, then identifying the theoretical and empirical system design and knowing the basic elements. Then master and understand the characterization of components and analyze the main functions so that they can work properly. Then do modelling and simulation and ensure that the components to be developed can work properly. And the final stage is to ensure that the system equipment is valid and reliable. Based on the results of the study, it shows that the system is active when the actual position away from the locked position/area as far as 100 meters has successfully functioned. Where the information changes to \"Out of reach\" from the previous \"Within Reach\" and there are notifications in the form of sound and vibration to increase security from theft.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46913975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cover
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.43508
Admin Cess
{"title":"Cover","authors":"Admin Cess","doi":"10.24114/cess.v8i1.43508","DOIUrl":"https://doi.org/10.24114/cess.v8i1.43508","url":null,"abstract":"","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46545487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Virtual Assistant in Information System for Student Practicum Case Study Laboratory Informatics Department Siliwangi University 虚拟助手在学生实习信息系统中的应用——以斯里旺吉大学信息学系为例
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.39365
Cecep Muhamad Sidik Ramdani, A. Rachman, Euis Nur Fitriani Dewi
{"title":"Application of Virtual Assistant in Information System for Student Practicum Case Study Laboratory Informatics Department Siliwangi University","authors":"Cecep Muhamad Sidik Ramdani, A. Rachman, Euis Nur Fitriani Dewi","doi":"10.24114/cess.v8i1.39365","DOIUrl":"https://doi.org/10.24114/cess.v8i1.39365","url":null,"abstract":"Practical activities are carried out in an orderly and timely manner and require systematic recording of activities. The implementation of practicum activities takes place in the Siliwangi University laboratory, to create conducive conditions for practicum activities, a system must be able to support academic success. Not only that, due to the COVID-19 pandemic, previous practicum lectures were held offline and campus policy required online learning. These problems can be overcome by building a logbook information system that can record and keep records of laboratory activities automatically. This information system was created using the Extreme Programming system development method. Starting from database design, system design with UML, system development with Visual Studio. NET 2021. This technology can be used by universities for practical activities at the Siliwangi University Laboratory. The application will remind students to complete each activity in each session by displaying notifications in each practicum schedule, rewards, announcements, and other information related to practicum activities. All activities must be recorded in the application. Based on the results of black box testing, the system can run according to the system test design that the response from each student to the application used is 75.68% which can be concluded that the application of virtual assistant is in the interesting category.  ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46544167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transaction Data Security Using AES and RC4 使用AES和RC4的事务数据安全
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.41212
Puji Sari Ramadhan, Muhammad Syahril, Rini Kustini, H. Winata, Robin Darwis Gea
{"title":"Transaction Data Security Using AES and RC4","authors":"Puji Sari Ramadhan, Muhammad Syahril, Rini Kustini, H. Winata, Robin Darwis Gea","doi":"10.24114/cess.v8i1.41212","DOIUrl":"https://doi.org/10.24114/cess.v8i1.41212","url":null,"abstract":"This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the development of sales transactions or other services has used digital technology a lot. This situation causes the need to secure digital data from existing transactions, so that transaction data can be stored safely. Transaction data security is carried out by changing data into ciphers or codes that are difficult to read using the AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) algorithms. This research begins by collecting existing transaction data and then transforming it into ASCII code. The results of the transformation will be used to perform calculations using the AES algorithm. After completing the calculation process using the AES algorithm, then do the calculations using RC4. These results will be stored in the database so that the transaction data that has turned into these codes cannot be known by other parties. The combination of the AES and RC4 algorithms is carried out to strengthen data encryption because there are more and more rotation systems and double security is carried out so that digital data is not easily read and misused. With the presence of this research, it can be shown that the AES and RC4 algorithms are capable of encrypting existing transaction data with multiple levels of security. ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44564156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of the Association Rule Method using Apriori Algorithm to Recognize The Purchase Pattern of Pharmacy Drugs “XYZ” 用Apriori算法实现关联规则方法识别药店“XYZ”药品的购买模式
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.40377
Fadhila Putri Utami, Arief Jananto
{"title":"Implementation of the Association Rule Method using Apriori Algorithm to Recognize The Purchase Pattern of Pharmacy Drugs “XYZ”","authors":"Fadhila Putri Utami, Arief Jananto","doi":"10.24114/cess.v8i1.40377","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40377","url":null,"abstract":"XYZ Pharmacy is a Special Health Service Point for employees and retirees of the XYZ company. This pharmacy carries out the process of buying and selling drugs by providing various types of drugs. The number of sales transactions in each day, resulting in sales data will increase over time. If the data is left alone, the pile of data will only become archives that are not utilized. By carrying out the data mining process, this data can be used to produce information that can be used to increase sales transactions at XYZ Pharmacy. The method used in this study is the Association Rule which functions to analyze the most sold and purchased drugs simultaneously, this analysis will be reviewed from drug sales transaction data at the XYZ Pharmacy. The application of the a priori algorithm in this study succeeded in finding the most item combinations based on transaction data and then formed an association pattern from the item combinations. By knowing the types of drugs that are often purchased together through identification of purchasing patterns, it is very useful for the XYZ Pharmacy to maintain the availability of the drugs.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44507979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Point Tracking Technology in 360 Degree Panorama Virtual Tour Applications for Introduction to Siliwangi University Campus 点跟踪技术在360度全景虚拟旅游中的应用
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.39363
M. Anshary, Cecep Muhamad Sidik Ramdani, Euis Nur Fitriani Dewi, Andi Nur Rahman, Rezi Syahriszani
{"title":"Application of Point Tracking Technology in 360 Degree Panorama Virtual Tour Applications for Introduction to Siliwangi University Campus","authors":"M. Anshary, Cecep Muhamad Sidik Ramdani, Euis Nur Fitriani Dewi, Andi Nur Rahman, Rezi Syahriszani","doi":"10.24114/cess.v8i1.39363","DOIUrl":"https://doi.org/10.24114/cess.v8i1.39363","url":null,"abstract":"Most of the campus area introduction media use brochures to provide information to prospective students. This media among teenagers is no longer attractive. Most prospective students prefer information through multimedia such as short videos. Due to the limited time of video media, very little content is provided so that delivery will be very less. The use of Virtual Tour 360 multimedia technology will help to provide clear information in the form of text and the application of Point tracking technology will make it easier for users to feel like they are in a campus environment. The methodology used in making this application is the Luther-Sutopo version of the Multimedia Development Life Cycle (MDLC). The 360 Degree Panorama Virtual Tour Application Introduction to the Siliwangi University Campus is expected to make it easier to convey information that can be easily accepted by users. This application can see a real environment simulation on the Siliwangi University campus by representing information in the form of 360° panoramic images making it easy to display information visually. The test results obtained from the alpha test of the application of Point tracking can make it easier for users to run the application and the beta test results that the application functions very well get a score of 83.75%. ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43313565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sentiment Analysis on COVID-19 Vaccine using Naive Bayes Classifier, Support Vector Machine and K-Nearest Neighbors 基于朴素贝叶斯分类器、支持向量机和k近邻的COVID-19疫苗情感分析
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.40158
M. Rani, Dian Prawira, Nurul Mutiah
{"title":"Sentiment Analysis on COVID-19 Vaccine using Naive Bayes Classifier, Support Vector Machine and K-Nearest Neighbors","authors":"M. Rani, Dian Prawira, Nurul Mutiah","doi":"10.24114/cess.v8i1.40158","DOIUrl":"https://doi.org/10.24114/cess.v8i1.40158","url":null,"abstract":"Procurement of the COVID-19 vaccination has led to diverse opinions among Indonesian people on Twitter. Sentiment analysis on Twitter can be carried out to find out public opinion, especially among Twitter users. The data was used in the form of tweets with the topic of the COVID-19 vaccine using the keywords covid 19 vaccine, covid vaccine, AstraZeneca, Sinovac, Moderna, Pfizer, Novavax and Sinopharm. analysis of the performance of the Naive Bayes Classifier, Support Vector Machine and K-Nearest Neighbors algorithms to determine the results of the accuracy level between the algorithms. The highest classification test is using the Support Vector Machine with an accuracy rate of 0.701. The results of the comparison of algorithms tested using tweet data on the topic of the COVID-19 vaccine found that the Support Vector Machine was better than the Naive Bayes Classifier and K-Nearest Neighbors. From the classification test carried out using COVID-19 vaccine tweet data with 2500 data. The amount of data after going through the data processing process is 1052 data. Neutral sentiment results in as many as 645 positive sentiments as many as 250 and negative sentiments as many as 157.","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45541379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Table of Content 目录表
CESS Journal of Computer Engineering System and Science Pub Date : 2023-01-04 DOI: 10.24114/cess.v8i1.43964
Editor CESS
{"title":"Table of Content","authors":"Editor CESS","doi":"10.24114/cess.v8i1.43964","DOIUrl":"https://doi.org/10.24114/cess.v8i1.43964","url":null,"abstract":"","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135500444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Decision Support System for Determining the Best Posyandu Using the Simple Additive Weighting Method 用简单加性加权法确定最佳Posyandu的决策支持系统的实现
CESS Journal of Computer Engineering System and Science Pub Date : 2022-07-31 DOI: 10.24114/cess.v7i2.36336
Allsela Meiriza, M. R. Ali
{"title":"Implementation of Decision Support System for Determining the Best Posyandu Using the Simple Additive Weighting Method","authors":"Allsela Meiriza, M. R. Ali","doi":"10.24114/cess.v7i2.36336","DOIUrl":"https://doi.org/10.24114/cess.v7i2.36336","url":null,"abstract":"Posyandu adalah sebuah kegiatan dari contoh upaya kesehatan bersumberdaya masyarakat yang memberikan layanan kesehatan dasar untuk masyarakat yang dilaksanakan oleh masyarakat itu sendiri dalam memberdayakan dan memberikan keringanan kepada masyarakat dalam bidang kesehatan. Untuk menciptakan posyandu yang cerdas dan sehat, serta memajukan citra posyandu, Dinas Kesehatan, Kabupaten Banyuasin mengadakan lomba posyandu. Tujuan diadakannya lomba posyandu ini adalah untuk memaksimalkan kemampuan posyandu sebagai pionir melayani kesehatan bagi ibu dan anak. Namun penentuan posyandu terbaik masih belum efektif dan optimal, karena pihak Dinas Kesehatan mengalami kesulitan dalam menentukan posyandu terbaik, dikarenakan terdapat banyak posyandu yang harus dilakukan penilaian dan kerap kali terjadi kesalahan saat melakukan penilaian yang menyebabkan penentuan posyandu terbaik tidak tepat dan akurat. Penelitian ini memberikan solusi dengan mengimplementasikan sebuah sistem yang biasa dikenal dengan Sistem Pendukung Keputusan (SPK) sebagai teknologi informasi untuk meningkatkan kualitas keputusan bersumber pada pemakaian sistem serta untuk mempermudah pihak Dinas Kesehatan, Kabupaten Banyuasin dalam mengambil keputusan untuk penentuan posyandu terbaik di Kabupaten Banyuasin. Penelitian ini memberikan hasil suatu SPK Penentuan Posyandu Terbaik dengan menerapkan metode Simple Additive Weighting (SAW). Kata Kunci: Sistem Pendukung Keputusan, Posyandu, Simple Additive Weighting, Waterfall","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41464255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信