https://journal.lembagakita.org/index.php/ijsecs/issue/feedInternational Journal Software Engineering and Computer Science (IJSECS)2024-08-01T00:00:00+07:00Muhammad Waliijsecs@lembagakita.orgOpen Journal Systems<div class="journal-description mb-4"><header> <p><strong>International Journal Software Engineering and Computer Science (IJSECS)</strong>, e-ISSN: <a href="https://issn.brin.go.id/terbit/detail/20210418032364208" target="_blank" rel="noopener">2776-3242</a> and p-ISSN: <a href="https://issn.brin.go.id/terbit/detail/20210421162353415" target="_blank" rel="noopener">2776-4869</a>, is a free and open-access journal published by the Lembaga Komunitas Informasi Teknologi Aceh (KITA), Indonesia. <strong>IJSECS</strong> is a peer-reviewed, twice-annually published international journal that focuses on innovative, original, previously unpublished, experimental, or theoretical research concepts. IJSECS is committed to bridging the theory and practice of information technology and computer science. From innovative ideas to specific algorithms and full system implementations, IJSECS publishes original, peer-reviewed, and high-quality articles in the areas of information technology and computer science. IJSECS is a well-indexed scholarly journal and is indispensable reading and reference for people working at the cutting edge of information technology and computer science applications. All published article URLs will have a digital object identifier (DOI).</p> <p> To submit your article to International Journal Software Engineering and Computer Science (IJSECS)<strong> </strong>;</p> <ul> <li class="show">You have to <a class="label label-info" href="http://journal.lembagakita.org/index.php/ijsecs/user/register">Register</a> or <a class="label label-success" href="http://journal.lembagakita.org/index.php/ijsecs/login">Login</a> to submit your or.</li> <li class="show">You can access the manuscript format from the author guidelines.</li> <li class="show">Download <a class="label label-warning" href="https://drive.google.com/file/d/1qnxvhIzW4aHmSWUw4VKzHLpTnBFJ9tcN/" target="_blank" rel="noopener">Template (English)</a></li> </ul> </header></div>https://journal.lembagakita.org/index.php/ijsecs/article/view/2986Implementation of a Web-Based Village Information System Using the Waterfall Method in Hegarmukti Village2024-07-26T09:36:18+07:00Febby Ferdiansyahsuwaryoniko@gmail.comAbdul Halim AnshorAnshor@gmail.comEdy Widodoeddy@gmail.com<p>The dissemination of information at the village level is crucial for ensuring transparency to the residents. To facilitate the quick and easy communication of such information, a web-based village information system was developed. This system can be accessed by all community members, both within and outside the village, as long as they have an internet connection. Currently, Hegarmukti Village does not have an effective web-based information system, leading to delays in information delivery and a lack of accuracy. Moreover, the potential of the village remains under-promoted. This study aims to design and implement a web-based village information system for Hegarmukti Village using the Waterfall method. The system is developed using HTML for programming and MySQL for the database, with the goal of enhancing transparency and the efficiency of information dissemination. The system provides features such as village profiles, news updates, and population data searches, improving the accessibility and reliability of village information.</p>2024-08-01T00:00:00+07:00Copyright (c) 2024 Febby Ferdiansyah, Abdul Halim Anshor, Edy Widodohttps://journal.lembagakita.org/index.php/ijsecs/article/view/2936Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung2024-07-18T21:41:55+07:00Tasya Saldira Putri Supriadisaldira24@gmail.comYuda Syahidinyudasya@gmaim.comYuyun Yunengsihyoen1903@gmail.com<p>This study aims to implement a digital signature system for filling out Integrated Patient Progress Notes (CPPT) using QR-Code technology. The research method employed is the waterfall development model. The stages of the study include requirements analysis, data collection from various sources, system design, implementation according to the design, testing, and reporting. The study was conducted at XYZ Hospital in Bandung, where it was found that the CPPT signing process is still manually done using a pen, which is considered inefficient as it takes a long time for authorization and is prone to manipulation, thereby reducing the document's validity. The implementation of a digital signature aims to simplify the document signing process quickly without the need for printing, sending, or waiting for physical documents, allowing it to be done digitally and automatically, thereby increasing speed and efficiency. This system also provides authentication assurance by the rightful owner, ensures document security, reduces the risk of damage or loss, and minimizes the possibility of manipulation, thus providing convenience for staff and doctors in terms of time and data accuracy.</p>2024-08-30T00:00:00+07:00Copyright (c) 2024 Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsihhttps://journal.lembagakita.org/index.php/ijsecs/article/view/2926Implementation of a Web-Based Raw Material Inventory Information System Using the Prototype Method: A Case Study at PT. XYD2024-07-18T09:56:14+07:00Dede Agus Susantodede23agus@gmail.comAndri Firmansyahandrifirmansyah@pelitabangsa.ac.idIsmasari Nawangsihismasari.n@pelitabangsa.ac.id<p>PT. XYD is a manufacturing company in the automotive industry and serves as a key vendor for the Wuling car brand, producing parts for models such as Confero, Cortez, Almaz, Air Ev, and Alvez. As production volume and the complexity of managing raw materials have increased, PT. XYD faces challenges in maintaining the accuracy of inventory data, particularly in the warehouse. Errors in data entry can disrupt the production process, leading to delays in product delivery to customers. To address this issue, this study developed and implemented a web-based raw material inventory information system using the prototype method. This method was chosen for its ability to accelerate the development process through iterative improvements based on user feedback. The system was designed using Unified Modeling Language (UML) to illustrate the system’s model and structure. The implementation of this system aims to enhance efficiency and accuracy in managing inventory data, ultimately minimizing the risk of errors, increasing productivity, and ensuring smooth company operations. The results of the study demonstrate that the system successfully facilitates the digitalization of ordering and inventory reporting processes, reducing reliance on manual processes and improving the speed and accuracy of data processing at PT. XYD.</p>2024-08-01T00:00:00+07:00Copyright (c) 2024 Dede Agus Susanto, Andri Firmansyah, Ismasari Nawangsihhttps://journal.lembagakita.org/index.php/ijsecs/article/view/2887Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography2024-07-09T16:18:04+07:00Adel Abidullahabidullahadel111@gmail.comKhoshal Rahman Rahmanikhoshalrahman.rahmani@gmail.comWali Mohammad Wadeedwadeed.walid@gmail.comMusawer Hakimimusawer@adc.edu.in<p>Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security characteristics that promise promising results for identifying security breaches in IoT. This paper proposes attribute-based elliptical curve cryptography (ATB_ECC) to improve security in IoT communication. IoT devices perform communication to overcome security issues in IoT based on defined attributes of access points. Attributes are involved in the characteristics of trusted nodes in the network. The cryptography technique utilizes Elliptical Curve Cryptography (ECC) to transmit messages securely in the IoT environment. Through integrating attribute factors and cryptography techniques, the IoT network can distinguish variations in the active data communication and threats in the IoT network. Simulation performance is examined for different critical structures, such as low, medium, and high. The proposed ATB_ECC is examined for attack prediction scenarios considering real-time servers. The examined results stated that the proposed ATB_ECC has effectively prevented attacks, especially brute force attacks. Analysis of results stated that low-key structure exhibits minimal complexity, but the security level is minimal. A high-key structure consumes vast energy and has increased complexity, but the security is significantly improved. The comparative analysis of various key structure results illustrated that the proposed attributes-based ECC exhibits improved performance at 15% for throughput.</p>2024-08-01T00:00:00+07:00Copyright (c) 2024 Adel Abidullah, Khoshal Rahman Rahmani, Wali Muhammad Wadid, Musawer Hakimihttps://journal.lembagakita.org/index.php/ijsecs/article/view/2881Sentiment Analysis of BMKG Weather Information Service Using K-Nearest Neighbor Method2024-07-09T11:13:00+07:00Muhamad Fajar Sodiqmuhamadfajarsodiq@mhs.unisbank.ac.idFatkhul Aminfatkhulamin@edu.unisbank.ac.id<p>The Meteorology, Climatology, and Geophysics Agency (BMKG) is a government institution that provides information related to air quality, climate, dry days, satellite imagery, wave forecasts, wind forecasts, and fire potential. This information is disseminated not only through BMKG's official website but also via the social media platform X, making it easier for the public to access up-to-date information. This study aims to classify user sentiment towards the weather information services provided by BMKG using the K-Nearest Neighbor (KNN) method. Data was collected through a web crawling technique, resulting in 1,031 data points analyzed in this research. The data processing stages included Pre-Processing and sentiment calculation using Vader's Sentiment and Random Forest. The classification results using the KNN algorithm showed an accuracy rate of 96%, with an average precision of 96%, an average recall of 96%, and an average f-measure of 96%. These findings indicate that the KNN model can effectively classify user sentiment towards BMKG's services.</p>2024-08-30T00:00:00+07:00Copyright (c) 2024 Muhamad Fajar Sodiq, Fatkhul Amin