cover
Contact Name
Taqwa Hariguna
Contact Email
taqwa@amikompurwokerto.ac.id
Phone
+62895422720524
Journal Mail Official
contact@ijiis.org
Editorial Address
Puri Mersi Baru, Jl.Martadireja II, Gang Sitihingil 3 Blok A No 2, Purwokerto Timur, Jawa Tengah
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
IJIIS: International Journal of Informatics and Information Systems
Published by Bright Publisher
ISSN : -     EISSN : 25797069     DOI : https://doi.org/10.47738/ijiis
Core Subject : Science,
The IJIIS is an international journal that aims to encourage comprehensive, multi-specialty informatics and information systems. The Journal publishes original research articles and review articles. It is an open access journal, with free access for each visitor (ijiis.org/index.php/IJIIS/); meanwhile we have set up a robust online platform and use an online submission system to ensure the international visibility and the rigid peer review process. The journal staff is committed to a quick turnaround time both in regards to peer-review and time to publication.
Articles 157 Documents
The Application of Computer BIM Technology in Prefabricated Construction Project Management Nan Li
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.138

Abstract

The construction industry is a pillar industry of the national economy, and it occupies a pivotal position in our country's economic development. With the rapid development of the construction industry today, traditional construction methods can no longer satisfy the use of information, data and resources in the management of construction projects. It is necessary for BIM technology to be applied to the management of prefabricated construction projects. In order to expand the scope of application of BIM technology in construction projects and enhance people's trust, this paper studies the application of computer BIM technology in prefabricated construction project management. This article mainly uses theoretical analysis, comparative analysis and statistics to deepen the understanding of BIM technology, discovers the characteristics of traditional construction methods and construction methods supported by BIM technology, and studies the application in construction project management. The survey results show that the scope of application of BIM technology in our country's construction industry is becoming wider and wider. After five years of development, the application rate of BIM in most areas has increased by more than 10%.
Integrating Technology and Legal Strategies to Combat Evolving Money Laundering Tactics Hananto, Andhika Rafi
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v3i1.93

Abstract

Money laundering has significantly advanced with the aid of technology, enabling perpetrators to exploit technological tools for criminal ease. This trend is compounded by the use of cross-border cash couriers, increasingly favored as a method for laundering illicit funds. International conventions and multilateral agreements acknowledge the vulnerability of cash courier operations to money laundering, yet current frameworks primarily offer detection guidelines rather than precise methods for direct recognition. Given that money laundering involves proceeds of crime, authorities must scrutinize and assess transactions to determine if criminal activity constitutes money laundering, distinct from customs violations.Moreover, the proliferation of innovative financial products and payment systems, including cryptocurrencies like Bitcoin, Litecoin, and other virtual currencies, as well as bearer negotiable instruments, has further facilitated money laundering opportunities. Research indicates that criminal tactics are outpacing legal frameworks, with technology infiltrating the strategies of money launderers and potentially overshadowing regulatory controls. Despite technology's neutral intent, its misuse challenges the traditional role of law enforcement.This qualitative study aims to analyze how legal frameworks can collaborate with technology to combat money laundering effectively. The hypothesis posits that the law can provide crucial guidance amid technological developments, while technology can prompt legal systems to adapt swiftly. By integrating these approaches, the research suggests that combating the evolution of money laundering becomes more formidable when law and technology converge.
Interior Design of Smart Home Based on Intelligent 3D Virtual Technology Wei Liu
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.139

Abstract

With the development of society and the continuous advancement of technology, people's research on smart home products is gradually deepening. Compared with the past, smart homes are no longer out of reach, but actually penetrate into our lives. However, while continuously exploring the technology of smart home products, designers have not conducted in-depth research on the interactive mode of the control interface of smart home products. Based on this, the purpose of this article is to study the smart home interior design based on intelligent three-dimensional virtual technology. This article first analyzes the development and current situation of smart homes, and on this basis, combines three-dimensional virtual reality technology to research and analyze smart home systems (S H S). This article systematically elaborates the design of functional modules of the S H S based on intelligent 3D virtual reality technology and the method of converting 2D plane to 3D space coordinate. And use comparative analysis method, interview method and other research methods to carry out experimental research on the theme of this article. The research shows that compared with the traditional S H S, the S H S based on 3D virtual technology studied in this paper has higher feasibility.
A Systematic Review on Image Data Protection Methods Faraj Ali Alyaqobi; Nor Adnan Bin Yahaya
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.136

Abstract

Securing data is the main goal of any data security system (DSS). Valuable data must be protected all the time and stored in a very highly secure data storage device. This need has become more critical due to the continuous growth of data size.  Furthermore, non-text data in the form of images, audio, and videos can now be transferred and processed easily and thus become part of sensitive data that needs to be protected. Since there is a need to secure and protect data in any form in order to keep them private and valid, it is expected that there would be many attempts already that have been proposed in the literature for this purpose. This paper reviews a group of these proposed strategies and methods that have been applied to different kinds of DSSs. Challenges and future trends of DSSs are also discussed. A number of main findings are grouped and organized as follows: (1) there are many different kinds of security techniques, each of which offers varying degrees of performance in terms of the amount of data and information that can be managed securely, (2) depending on the architecture of the proposed method, the tactics or strategies of the security system, the kinds of DSSs, as well as a few other factors, some methods are more appropriate for the storage of certain categories of data than others.
Comparison of Data Normalization for Wine Classification Using K-NN Algorithm Chandra, Rohitash; Chaudhary, Kaylash; Kumar, Akshay
International Journal of Informatics and Information Systems Vol 5, No 4: December 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i4.145

Abstract

The range of values that are not balanced on each attribute can affect the quality of data mining results. For this reason, it is necessary to pre-process the data. This preprocessing is expected to increase the accuracy of the results from the wine dataset classification. The preprocessing method used is data transformation with normalization. There are three ways to do data transformation with normalization, namely min-max normalization, z-score normalization, and decimal scaling. Data that has been processed from each normalization method will be compared to see the results of the best classification accuracy using the K-NN algorithm. The K used in the comparisons were 1, 3, 5, 7, 9, 11. Before classifying the normalized wine dataset, it was divided into test data and training data with k-fold cross validation. The division of the data using k is equal to 10. The results of the classification test with the K-NN algorithm show that the best accuracy lies in the wine dataset which has been normalized using the min-max normalization method with K = 1 of 65.92%. The average obtained is 59.68%.
Software Defect Fault Intelligent Location and Identification Method Based on Data Mining Yang, Fan
International Journal of Informatics and Information Systems Vol 5, No 4: December 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i4.105

Abstract

With the advancement of the times, computer technology is also constantly improving, and people's requirements for software functions are also constantly improving, and as software functions become more and more complex, developers are technically limited and teamwork is not tacitly coordinated. And so on, so in the software development process, some errors and problems will inevitably lead to software defects. The purpose of this paper is to study the intelligent location and identification methods of software defects based on data mining. This article first studies the domestic and foreign software defect fault intelligent location technology, analyzes the shortcomings of traditional software defect detection and fault detection, then introduces data mining technology in detail, and finally conducts in-depth research on software defect prediction technology. Through in-depth research on several technologies, it reduces the accidents of software equipment and delays its service life. According to the experiments in this article, the software defect location proposed in this article uses two methods to compare. The first error set is used as a unit to measure the subsequent error set software error location cost. The first error set 1F contains 19 A manually injected error program, and the average positioning cost obtained is 3.75%.
The Combined Application Technology of the Bank's TwoDimensional Aggregate Payment Code and the Vegetable Field Traceability System Zhang, Luyi
International Journal of Informatics and Information Systems Vol 5, No 4: December 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i4.142

Abstract

With the rapid development of social economy, people's living standards and quality of life are getting better and better, and food safety is getting more and more attention. Aiming at the problem of vegetable traceability, this paper analyzes the bank's QR code scan code aggregation payment model. Secondly, it designs a green food traceability system and elaborates the realization of the main functions of the system. Practice has proved that the traceability system of green food can allow consumers to consume with confidence, and at the same time, it is convenient for the competent government departments to trace the source in time and control the quality.
Selection of Suppliers of Building Materials Using the Analytical Hierarchy Process (AHP) Method at PT. Cipta Nuansa Prima Tangerang Handayanir, Rani Irma
International Journal of Informatics and Information Systems Vol 5, No 4: December 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i4.143

Abstract

Supplier is one of the most important parts of a construction services provider company. PT. Nuance Prima Cipta Tangerang is a contracting company that offers construction services. Since the number of suppliers, PT. Nuance Prima Cipta Tangerang difficulty in choosing suppliers with their respective advantages. Therefore, use AHP (Analytical Hierarchy Process) for supplier selection process to make it more objective. Broadly speaking, AHP (Analytical Hierarchy Process) is the process of comparing criteria into alternatives, the greater the value is generated, then the main well to the supplier selected. By using the AHP method obtained the final value for each akternatif Lead A 39%, 12% and Supplier B Supplier C 49%
Analysis of Recommended Mobile Selection Using the Weighted Product Method Yi, Sora; Jang, Yong-Chul
International Journal of Informatics and Information Systems Vol 5, No 4: December 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i4.144

Abstract

Mobile is an electronic telecommunications device that has become a major requirement at this time, which is equipped with the advantages of the features of each device. The number of outputs or new breakthroughs from mobile phone manufacturers makes consumers have to be observant in choosing the right cellphone to use in their activities. Ignorance of the advantages and disadvantages of selected mobile phones can cause harm to consumers who use them based on their respective levels of interest. In this study, an analysis of the calculation of several alternative cell phone data will be carried out based on the criteria/attributes determined using the weighted product method which can solve the problem by multiplying to connect the attribute rating with the weighted attribute in question. It is hoped that this calculation analysis concept can become the foundation of knowledge about the weighted product method, especially in terms of selecting recommendation cellphones, as well as a basic sketch for developing the implementation of the weighted product method into future decision support system application programs.
Establishment and Application of Spatial Distribution Model of Roof Greening Based on GIS Technology Pi, Ling
International Journal of Informatics and Information Systems Vol 6, No 1: January 2023
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v6i1.147

Abstract

The stage from the beginning of the 21st century to now is the stage of the scale development of roof greening(RG) in China. With the continuous progress of urban construction, on the one hand, the ecological environment is deteriorating, on the other hand, the available green space in the urban center area becomes more and more scarce. The development of this contradiction promotes the rapid development of RG. RG plays an important role in enriching urban landscape, increasing urban green quantity, reducing urban heat island effect, conserving rainwater and reducing temperature, and creating a new green space for the city, including leisure, entertainment and ecology, and improving urban ecological landscape. This paper mainly studies the establishment and application of spatial distribution(SD) model of RG Based on GIS technology. Through understanding the SD design of RG, the paper investigates and analyzes the status quo of green space of roof, macro layout and the integration of multiple functional spaces. This paper studies and establishes a multiobjective optimization model of SD of RG, and analyzes the purification effect of RG on rainwater pollutants and the overall performance of ecosystem service equity. The results show that 26.31% of the people think that the degree of RG is insufficient, and 5.14% think that RG is scarce. In the cognition of the status of RG space, 12.41% of people don't care about RG, 8.69% think it is face engineering, and even 9.31% think it is waste of resources, which indicates that the promotion of RG needs to be improved.

Page 9 of 16 | Total Record : 157