cover
Contact Name
Heri Nurdiyanto
Contact Email
Heri Nurdiyanto
Phone
-
Journal Mail Official
internationaljournalair@gmail.com
Editorial Address
-
Location
Kota metro,
Lampung
INDONESIA
International Journal of Artificial Intelligence Research
Published by STMIK Dharma Wacana
ISSN : -     EISSN : 25797298     DOI : -
International Journal Of Artificial Intelligence Research (IJAIR) is a peer-reviewed open-access journal. The journal invites scientists and engineers throughout the world to exchange and disseminate theoretical and practice-oriented topics of Artificial intelligent Research which covers four (4) majors areas of research that includes 1) Machine Learning and Soft Computing, 2) Data Mining & Big Data Analytics, 3) Computer Vision and Pattern Recognition, and 4) Automated reasoning. Submitted papers must be written in English for initial review stage by editors and further review process by minimum two international reviewers.
Arjuna Subject : -
Articles 621 Documents
E-Commerce Online Buying and Selling Transactions in the Perspective of Islamic Law Dedi, Dedi
International Journal of Artificial Intelligence Research Vol 6, No 1.2 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (180.058 KB) | DOI: 10.29099/ijair.v6i1.365

Abstract

E-Commerce has created a new phenomenon in modern society's commercial dealings. Due to the novelty of the transaction model, the inheritance law of scholars has not yet been codified in any traditional fiqh text. In light of this fact, scholars must use ijtihad to discover Islamic law. The purpose of this study is to examine e-commerce online buying and selling transactions from an Islamic law standpoint. This study is a literature review using a standard legal research paradigm. It is a research model whose purpose is to establish the connection between legal structures and legal norms or principles. According to this study's findings about the deployment of online purchasing and selling, consumers chose to purchase things from the seller's website. The customer deposits multiple payments to the seller's account, and the seller provides the consumer the merchandise. The review of Islamic law pertaining to online purchasing and selling is permissible so long as there are no prohibited aspects in Islamic law that prohibit and clash with the idea of muamalah
Food Security Policy: A Model Line of Food Security Policy in Indonesia Irawan, Bambang; Kertati, Indra; Salam, Rahmat; Wicaksono, Muhammad Bagus Adi; Maruf, Irma Rachmawati
International Journal of Artificial Intelligence Research Vol 6, No 1.1 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.265 KB) | DOI: 10.29099/ijair.v6i1.391

Abstract

This research was carried out to see how food security policy is by looking at how much per capita consumption is carried out by lowland rice farmers within one year. With this, it can be known when rice farmers experience rice shortages and cannot afford to buy rice and how to overcome this food security policy problem. This study will collect quantitative and qualitative data relating to food production. Analysis of data utilizing both quantitative and qualitative methods. Food Security policy Lines and Farmers' Fear Ratio: Quantitative and Qualitative Modeling Using this Food Security policy Line Model, rice farmer families' food security policy will be characterized as either robust or weak. Calculating the Farmer Fear Ratio in order to evaluate if farmers are pessimistic or optimistic about the fulfillment of rice consumption needs. This study found that the amount of rice consumption in village X for rice farmers reached 121 kg of rice per capita per year, while in village Y, it reached 185 kg per capita per year. In the meantime, when rice farmers face rice shortages and cannot afford to purchase rice in the market, they borrow rice from mills. In village X, the food security policy line is over 1, while in village Y it is below 1. This indicates that village X has a higher level of food security policy than village Y.
Analysis of the SIKEPO Application During the Covid-19 Pandemic Ramaini Ramaini; Eko Priyo Purnomo; Suswanta Suswanta
International Journal of Artificial Intelligence Research Vol 6, No 1.2 (2022)
Publisher : International Journal of Artificial Intelligence Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v6i1.419

Abstract

ABSTRACTThe purpose of this study was to analyze and describe the effect of the electronic application SIKEPO (Online Employee Attendance Information System) from the rule set 2 times a day attendance then changed to 4 times. This study uses explanatory research with a mix-method approach. The data collection process was carried out by distributing questionnaires and also direct interviews with respondents who were selected by random sampling—testing the data using SEM-PLS. The measurement model is studied through two subs, namely the first: through the outer model. The external model with measurements was assessed through Cronbach alpha and composite reliability. Second, the inner model is studied through the Coefficient of determination (R2 )and the path coefficient. After the 2 sub-tests were carried out, was continued hypothesis testing as well. The results of this hypothesis test indicate that the SIKEPO electronic presence variable has a positive and significant effect on improving the performance of civil servants during the Covid-19 pandemic, so the hypothesis is accepted. Furthermore, the application of electronic SIKEPO does not have a positive and significant effect on improving the work discipline of civil servants during the Covid-19 pandemic, so the hypothesis is rejected. Where the work discipline variable has a T statistic of 0.403 where the value is lower than the standard T statistic of 1.96, besides the P value of 0.687, the hypothesis is rejected.Keywords: SIKEPO; Performance; Work Discipline; Civil Servants; and Covid-19 
The Relationship Between The Role Of Parents And Children In The Prevention Of Pneumonia To Toddlers At Rejosari Health Center Pekanbaru City Siregar, Pinondang Hotria
International Journal of Artificial Intelligence Research Vol 6, No 1.2 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (92.971 KB) | DOI: 10.29099/ijair.v6i1.385

Abstract

This study aims to determine the relationship between the role of parents and children in the prevention of pneumonia in children under five at the Rejosari Health Center, Pekanbaru City. Research results Based on the results of the analysis showed that there was a relationship between parental behavior and the rate of recurrence of pneumonia in toddlers, so it can be said that if parents behaved well then pneumonia experienced by toddlers tended not to recur and vice versa if the behavior of parents was lacking then pneumonia experienced by toddlers tend to recur. Researchers argue that the condition of toddlers is still vulnerable to health problems and is still very dependent on parents to prevent pneumonia. One of the behaviors of parents in preventing pneumonia recurrence is the habit of opening windows, this will make it easier for light and air circulation into the house. Other parental actions that can play a role in preventing a recurrence of pneumonia include keeping toddlers away from someone who smokes. The air pollution released prevents the recurrence of pneumonia by someone who smokes, for example opening a window every day. As a respondent, it is necessary to further improve behavior in toddlers with pneumonia to avoid recurrence and consult health workers so that it does not get worse so that it can be prevented as early as possible. For health workers to provide counseling and counseling, especially to parents about good behavior in caring for toddlers with pneumonia at home. Other parental actions that can play a role in preventing the recurrence of pneumonia include keeping toddlers away from someone who smokes. The air pollution released prevents the recurrence of pneumonia by someone who smokes, for example opening a window every day. As a respondent, it is necessary to further improve behavior in toddlers with pneumonia to avoid recurrence and consult health workers so that it does not get worse so that it can be prevented as early as possible. 
Effect of Return on Assets, Current Ratio and Degree of Leverage on Debt To Equity Ratio Mixed Private Banking Sector Listed On The Indonesia Stock Exchange 2016-2020 Hasanudin, Hasanudin
International Journal of Artificial Intelligence Research Vol 6, No 1.2 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.79 KB) | DOI: 10.29099/ijair.v6i1.380

Abstract

The objective of this study is to examine the impact of profitability, liquidity, and business risk on the capital structure of private mixed banks listed on the Indonesia Stock Exchange (IDX). The population of this study consists of all banks registered on the Indonesia Stock Exchange between 2016 and 2020. Purposive sampling was used to determine the sample for this study, which consisted of 25 Private Banks. Using the website www.idx.co.id as a documentation source, secondary data was used as the data source. Using the Eviews ten application, a panel data regression analysis is employed as the analytical method. The results indicate that profitability, as measured by return on assets, has a positive and statistically significant effect on capital structure (DER). In contrast, liquidity, as measured by current assets, has a negative and statistically significant result. on capital structure (DER), whereas business risk, as approximated by the degree of operating leverage (DOL), has no meaningful impact on capital structure (DER).
Adaptive and Digital Marketing: A Sustainable Strategy for Developing Culinary SME Business (Law of the Republic of Indonesia. Number 20 of 2008) Post-Pandemic Rini Rahayu Kurniati; Fitri Hidayat
International Journal of Artificial Intelligence Research Vol 6, No 1.2 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (139.066 KB) | DOI: 10.29099/ijair.v6i1.370

Abstract

When situations and conditions in the small, medium and large-scale environments change, these changes have an impact on every activity, even the most pronounced post-pandemic areas of business. The SME-class culinary business in the city of Batu can survive and some are growing in the pandemic situation and conditions, and this is an interest to be researched to develop a post-pandemic business. This study uses a qualitative type with data collection namely observation, interviews, and documentation then analyzed using an interactive model. The results of this study prove that the Adaptive Strategy (SA) contributes to providing solutions to survive and or develop, it should be noted that being adaptive requires various maturity steps by examining various internal and external aspects. At least it needs a concept or strategy of "landscape, learning, leadership", which is strengthened by considerations and policies in efficiency, utilization, flexibility, timeliness, value, or cost. So that it can increase the ability to survive and even develop in various situations. In addition to Adaptive Strategies, Culinary SMEs use digital marketing strategies through social media. Social media is effective for business activities because it can bring together a brand/company/business with the target audience/market. Thus increasing revenue and being able to grow the business.
Implementation of Talent Management as a Strategy for Achieving Company Competitive Advantage Hady Siti Hadijah
International Journal of Artificial Intelligence Research Vol 6, No 1.1 (2022)
Publisher : International Journal of Artificial Intelligence Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (136.596 KB) | DOI: 10.29099/ijair.v6i1.379

Abstract

The challenges of the times and the talent shortage have compelled businesses to develop and implement effective human resource management methods. Talent management is one of the successful human resource management tactics applied. If a company or organization is able to recruit individuals who are superior to its competitors, it will be able to create a superior organization. The implementation of talent management will fail if it is not supported by a selection system, specifically a system for identifying attainable performance results. With the implementation of talent management, the objective of this study. This study employs a qualitative approach using the literature review method. In the era of globalization, the achievement of organizational goals in terms of productivity may always be accomplished with high-quality products that meet market demand. For this reason, the Company must be able to secure the availability of the required talent in a timely manner, in a number and diversity commensurate with current demands, and with qualities that can be realized within the constraints of the organization's competitive advantage. It may be claimed that the organization's survival is highly contingent on the effectiveness of this process in attaining its vision, mission, and strategic objectives.
Detection of SQL Injection Attack Using Machine Learning Based On Natural Language Processing Triloka, Joko; Hartono, Hartono; Sutedi, Sutedi
International Journal of Artificial Intelligence Research Vol 6, No 2 (2022): Desember 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (673.401 KB) | DOI: 10.29099/ijair.v6i2.355

Abstract

There has been a significant increase in the number of cyberattacks. This is not only happening in Indonesia, but also in many countries.  Thus, the issue of cyber attacks should receive attention and be interesting to study.  Regarding the explored security vulnerabilities, the Open Web Application Security Project has published the Top-10 website vulnerabilities. SQL Injection is still become one of the website vulnerabiliteis which is often exploited by attacker. This research has implemented and tested five algorithms. They are Naïve Bayes, Logistic Regression, Gradient Boosting, K-Nearest Neighbor, and Support Vector Machine. In addition, this study also uses natural language processing to increase the level of detection accuracy, as a part of text processing. Therefore, the main dataset was converted to corpus to make it easier to be analyzed. This process was carried out on feature enginering stage. This study used two datasets of SQL Injection. The first dataset was used to train the classifier, and the second dataset was used to test the performance of classifier. Based on the tests that have been carried out, the Support Vector Machine get the highest level of accuracy detection. The accuracy of detection is 0.9977 with 0,00100 micro seconds per query time of process. In performance testing, Support Vector Machine classifier can detect 99,37% of second dataset. Not only Support Vector Machine, the study have also revealed the detection accuracy level of further tested algorithms: K-Nearest Neighbor (0,9970), Logistic Refression (0,9960), Gradient Boosting (0,99477), and Naïve Bayes (0,9754).
Digital Forensic Process via Parallel Data Acquisition Technic: Experimental Case Study Sarjimin, Sarjimin; Yudhana, Anton
International Journal of Artificial Intelligence Research Vol 6, No 1 (2022): June 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.703 KB) | DOI: 10.29099/ijair.v6i1.354

Abstract

Digital Forensics (DF) is an essential tool for solving cases of crimes committed. Based on the type of action performed, DF is classified into static forensics and live forensics. The limitations of static forensics in this method are that data collection is carried out on permanent storage media, while processes in the running system are not obtained. On the other hand, live forensics provides an opportunity to perform data retrieval on the ongoing process. Generally, live forensics is used to acquire Volatile Memory (RAM) data but can be extended on mobile devices, internet/LAN networks, and cloud systems. Browsing in private mode leaves no traces and information about what the user has done during the browsing session. This feature is often used by criminals to hide the crimes committed or at least to slow down the forensic process. To overcome this problem, it is important to do forensics on RAM and Network Forensics to obtain evidence of these crimes. This study aims to conduct DF to obtain potential evidence in criminal cases of misuse of private browsing. The evidence is expected to be used as evidence in court. The parties involved in the crime can be prosecuted in court through such evidence. This research offers Digital Forensics Process Via Parallel Data Acquisition Technic. Parallel data acquisition is a method for retrieving data on a computer or other smart device when the computer or other smart device is on through two different data sources. The first source is RAM and the second is Network Traffic. A case study on a criminal case of misuse of private browsing with Digital Forensics Process Via Parallel Data Acquisition Technic was able to obtain evidence in the form of the website visited, URL, traffic timestamp performed, source address, destination address, transmission protocol, length (size of the packet transmitted), source last node mac address, destination last node mac address, source port, destination port, and detail information. The evidence is expected to be used to reconstruct a crime of misuse of private browsing.
TWO BUY AND SELL IN ONE BUY AND SELL : HADITH PERSPECTIVE Supriatna, Ade; Zulkarnaen, Wandy; Suparjiman, Suparjiman
International Journal of Artificial Intelligence Research Vol 6, No 1.1 (2022)
Publisher : STMIK Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.619 KB) | DOI: 10.29099/ijair.v6i1.374

Abstract

This article discusses the Hadith narrated by Hannad bin As Sariy bin Mush’ab about Two Buy and Sell in One Buy and Sell in Ṣunan al-Tirmidzi. This article was written using the Takhrīj al-Ḥadīts method. The data source is in the form of a narration of the Hadith in Ṣunan al-Tirmidzi about Two Buy and Sell in One Buy and Sell. The type of data is in the form of hadith text in Ṣunan al-Tirmidzi about Two Buy and Sell in One Buy and Sell complete sanad and matn. The data collection technique is done by tracing the Hadith narration about Two Buy and Sell in One Buy and Sell  in Ṣunan al-Tirmidzi. The data analysis technique was carried out by applying the Sharḥ al-Ḥadīth method, both in the sanad and matn aspects. This article reveals that the hadith narrated by Hannad bin As Sariy bin Mush’ab about Two Buy and Sell in One Buy and Sell in Ṣunan al-Tirmidzi relates to the concept of Hybrid Contract in Sharia Bank.