cover
Contact Name
Taqwa Hariguna
Contact Email
taqwa@amikompurwokerto.ac.id
Phone
+62895422720524
Journal Mail Official
contact@ijiis.org
Editorial Address
Puri Mersi Baru, Jl.Martadireja II, Gang Sitihingil 3 Blok A No 2, Purwokerto Timur, Jawa Tengah
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
IJIIS: International Journal of Informatics and Information Systems
Published by Bright Publisher
ISSN : -     EISSN : 25797069     DOI : https://doi.org/10.47738/ijiis
Core Subject : Science,
The IJIIS is an international journal that aims to encourage comprehensive, multi-specialty informatics and information systems. The Journal publishes original research articles and review articles. It is an open access journal, with free access for each visitor (ijiis.org/index.php/IJIIS/); meanwhile we have set up a robust online platform and use an online submission system to ensure the international visibility and the rigid peer review process. The journal staff is committed to a quick turnaround time both in regards to peer-review and time to publication.
Articles 6 Documents
Search results for , issue "Vol 6, No 2: March 2023" : 6 Documents clear
Research on Safety and Integrated Disaster Prevention System Based on Big Data Technology Zhongyang Sun; Danhui Fang; Zeshuai Zhou
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.162

Abstract

Safety integrated disaster prevention system, as a guarantee of national safety, especially to reduce the serious consequences of disasters, promote the steady development of the economic and social level, has important practical value for the comprehensive study of safety and disaster prevention system. However, the current application and update of such systems by relevant government agencies and the social level cannot effectively follow the development needs of the society and the industry, and there is an urgent need for effective reform. Based on this, this paper first analyzes the problems existing in the research and construction system of big data technology in the security and integrated disaster prevention system, and then gives the construction strategy of the research system of safety and disaster prevention in view of these problems.
Application of Big Data Mining Technology in Blockchain Computing Zejian Dong
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.164

Abstract

Big data in the modern science and technology and social activities play an important role, on the one hand, a large number of new applications and technology into our lives, in the use of these new technologies to produce a large amount of data, on the other hand, big data as one of the most important digital assets, many of the development of new technologies also rely on large data as support. This paper focuses on the research and application of big data mining technology in blockchain computing. Firstly, this paper extracts the corresponding transaction data according to the Bitcoin address and constructs the transaction features to get the Bitcoin data set. Then, the data features are processed. Then, three algorithm models, SVM, Adaboost and Random Forest, are selected to model and analyze the preprocessed data combined with different sampling strategies. According to the comprehensive performance of the model and its shortcomings, the model is selected and improved.
Utilizing Internet Analysis Technology to Conduct Data Analysis of Student Attitude Survey Yongcheng Cao; Quanguo Liu; Huajie Chen
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.146

Abstract

Language attitude is people’s understanding and evaluation of languages, which has an important effect on language learning. Based upon investigation into 605 Tibetan college students from 5 colleges in Tibet areas, and combined with network data, this paper mainly analyzes their attitude towards Tibetan, Chinese and English from four dimensions: recognizing, instrumental, integrative and transferring attitude. This paper also discusses the relationship between students’ language attitude and their gender and grade. This study utilizes internet analysis technology to analyze data obtained from a student attitude survey. The survey was conducted to examine the attitudes of students towards a particular educational program. The study includes a description of the survey instrument and the method used to collect data. The data collected was analyzed using various statistical techniques, including frequency analysis and correlation analysis. The findings reveal important insights into student attitudes towards the program and highlight areas of improvement for the program. The use of internet analysis technology proved to be an efficient and effective method of data analysis in this study. The study contributes to the growing body of knowledge on data analysis in educational research and provides useful information for educators and policymakers.
Comparison of Three Time Series Forecasting Methods on Linear Regression, Exponential Smoothing and Weighted Moving Average Ajiono Ajiono; Taqwa Hariguna
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.165

Abstract

The purpose of this study is to compare the 3 forecasting methods Linear Regression, Exponential Smoothing and Weighted Moving Average based on the smallest error value or close to zero. From the results of this study, the Linear Regression method was obtained as the correct method with a predicted value of 502 students, the smallest error value was MAD 27.83, MSE 1152.1 MAPE 8.1%. The Tracking Signal value moves between 1 and -1, the movement is within the control limits of the tracking signal standard deviation distribution 4 and -4, meaning that the method is correct. The Moving Range value moves between 68 and -46, this value is within the MR control limits of 117.83 and -117.83, this result shows that this means that this method has been tested for truth and can be accepted as well. Thus, indicating that the Linear Regression method as a forecasting method is appropriate and acceptable as a basis for future decision making. The level of accuracy of the error and the value in control shows that there is a time series data relationship between the x variable, namely time, and the variable y, namely actual data. In addition, it produces trending data movement patterns, meaning that data movements experience a significant increase over a long period of time or for 7 periods.
Exploring the Effectiveness of Web Crawlers in Detecting Security Vulnerabilities in Computer Software Applications Biao Wan; Chunmei Xu; Jahoon Koo
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.158

Abstract

With the rapid development of the Internet, the World Wide Web has become a carrier of a large amount of information. In order to effectively extract and use this information, web crawlers that crawl various web resources have emerged. The interconnectedness, openness, and interactivity of information in the World Wide Web bring great convenience for information sharing to the society and they also bring many security risks. To protect resource information, computer software security vulnerabilities have become the focus of attention. This article is based on the method of computer software security detection under a web crawler simply analyzes the basic concepts of computer software security detection and analyzes the precautions in the process of security detection. Finally, combined with the computer software security vulnerability problems in the web crawler environment, its security detection technology Application for further analysis.
Research on Network Data Algorithm Based on Association Rules Rui Wang
International Journal of Informatics and Information Systems Vol 6, No 2: March 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i2.159

Abstract

The network data algorithm on account of association can effectively describe the development process of historical data and predict the development trend of data. Draw support from the corresponding data algorithm to ameliorate the mining efficiency and execution efficiency of association, more users pay more attention to the rules, so it has important research and utilization value. On account of this, this paper first analyses the concept and mining process of data association, then studies the mining algorithm of data association, and finally gives the structure and utilization effect of cyber data algorithm on account of association.

Page 1 of 1 | Total Record : 6