cover
Contact Name
Muqorobin
Contact Email
ijcis.aas@gmail.com
Phone
+6285702302019
Journal Mail Official
ijcis.aas@gmail.com
Editorial Address
http://ijcis.net/index.php/ijcis/about/editorialTeam
Location
Kab. sukoharjo,
Jawa tengah
INDONESIA
International Journal of Computer and Information System (IJCIS)
ISSN : -     EISSN : 27459659     DOI : https://doi.org/10.29040/ijcis
The aim of this journal is to publish quality articles dedicated to all aspects of the latest outstanding developments in the field of informatics engineering. Its scope encompasses the applications of (but are not limited to) : 1. Artificial Intelligence 2. Software Engineering 3. System Design Methodology 4. Data mining and Big Data 5. Human and Computer Interaction 6. Mobile Computing 7. Soft Computing 8. Animation 9. Multimedia and Image Processing 10. Parallel/Distributed Computing 11. Machine Learning 12. Computational Lingustics 13. Data Comunication 14. Networking
Articles 188 Documents
Promotion Media Through System Design Using Technology Khirdany, Elvin Nury
International Journal of Computer and Information System (IJCIS) Vol 5, No 4 (2024): IJCIS : Vol 5 - Issue 4 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i4.186

Abstract

As information technology continues to advance, it drives a wave of innovations that transform various industries and business practices. This evolution has led to significant diversification in product offerings and pricing strategies, resulting in heightened competition among businesses. In this competitive environment, both producers and consumers must navigate a myriad of choices, making effective product promotion essential. Gosako, an emerging online motorcycle taxi service in Sampang District, has established a solid reputation among local residents due to its reliable service and competitive pricing. Despite its popularity, Gosako's promotional efforts are currently limited to WhatsApp, which presents challenges for customers seeking information about ongoing promotions and services. This limitation restricts the company's ability to reach a broader audience and fully capitalize on its market potential. To address these challenges, this research proposes the development of a dedicated website as a comprehensive promotional platform for Gosako. The website aims to enhance customer access to information about services, promotions, and pricing, thereby fostering increased engagement and awareness among potential users. Data for this study will be collected through a combination of observation, interviews with stakeholders, and analysis of existing documentation. The research aims to achieve two primary objectives: (a) to expand promotional outreach, thereby enhancing brand visibility and increasing sales turnover; and (b) to streamline the purchasing process for customers, facilitating smoother transactions when utilizing Gosako's services. By leveraging digital platforms, this initiative seeks not only to strengthen Gosako's market position but also to improve customer satisfaction and loyalty, ultimately contributing to the service's long-term success.
Combination of Filtering and Switching Methods for Network Security from Pornographic Content Hakim, Yunif Lukman; Wijayanto, Hendro
International Journal of Computer and Information System (IJCIS) Vol 5, No 3 (2024): IJCIS : Vol 5 - Issue 3 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i3.173

Abstract

The internet provides convenience in various aspects of human life. Internet penetration in Indonesia has grown by 66.5% of the total population of 278.7 million people. This shows that 185.3 million people are active internet users. Based on the report of the Ministry of Communication and Information (Kemenkominfo), it has handled negative content since 2016 to 2023 with a total of 1.9 million contents. With the most access through website media. MikroTikRouter Os as a tool used to support computer network communication, is expected to minimize access to this negative content. Configuration in MikroTik devices with Layer7 Protocol and Firewall Rules is used to prevent access to negative content from the client side. A firewall is a network security tool that monitors incoming and outgoing network traffic. The application layer that acts as a liaison between applications and network functions, manages how applications access the network, and regulates the creation of error messages is called Layer 7 Protocol. The Layer 7 Protocol configuration and firewall rules are effectively applied to Mikro Tik RB941-2ND to ward off negative pornographic content on local networks with a percentage of 87% of the 91 websites that have been tested. In particular, the test results show that this method is an effective scheme using unwanted travel with global internet usage and without using a Virtual Private Network (VPN). By using this filtering and switching technique, negative site access restrictions can be minimized. At least it can be a pioneer of a healthy internet.
Expert System for Diagnosing Gout and Cholesterol Using Forward Chaining Method Wakdomi Sapari, Mega Christin E; Hasan, Patmawati; S. Irjanto, Nourman
International Journal of Computer and Information System (IJCIS) Vol 5, No 2 (2024): IJCIS : Vol 5 - Issue 2 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i1.161

Abstract

This study aims to address challenges in gout and cholesterol diagnostic services at Puskesmas Elly Oyu, South Jayapura, which faces significant working time and patient limitations. With only 4 medical personnel, this study proposes the use of forward chaining methods in expert systems to improve the quality of diagnosis at an affordable cost. This method allows combining factors and evidence with appropriate levels of confidence, managing uncertainty in medical diagnoses. Observations and projections show an increase in the number of patients, and with forward chaining methods, diagnosis becomes more accurate, providing a solid basis for effective intervention planning, especially in the elderly group. Furthermore, this study designed a website-based system to detect early symptoms of early childhood delay in the disease. This approach aims to ease awareness of the importance of 4 healthy 5 perfect and prevent delays in diagnosis. Waterfall development and structured design methods are used to build systems with structured stages of analysis, design, coding, and testing. Using the blackbox test method, the sustainability of the system's functionality is emphasized without regard to the details of the internal implementation. This development is expected to provide an efficient, accurate, and affordable solution in diagnosing gout and cholesterol at the Elly Oyu Health Center.
A Deep Reinforcement Learning Approach for Network-on-Chip Layout Verification and Route Optimization Chen, Jingyi; Wang, Shikai
International Journal of Computer and Information System (IJCIS) Vol 5, No 1 (2024): IJCIS : Vol 5 - Issue 1 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v6i1.206

Abstract

This paper introduces a deep reinforcement learning approach for optimizing network-on-chip layout verification and route optimization. The proposed method addresses the challenges of increasing design complexity and traditional verification limitations in modern VLSI circuits. A novel three-headed policy gradient network architecture is developed to handle layout verification and routing optimization tasks simultaneously. The framework integrates feature extraction networks for topology analysis, policy networks for decision-making, and value networks for performance evaluation. The system employs a complex-valued reinforcement learning model to capture both spatial and temporal dependencies in NoC designs. Experimental results demonstrate significant improvements across multiple performance metrics: a 23.4% reduction in average packet latency, a 23.6% increase in network throughput, and a 20.8% decrease in power consumption compared to conventional methods. The verification accuracy achieves 98.7% with a false positive rate below 0.5%. The framework maintains consistent performance across various network sizes and traffic patterns, demonstrating robust scalability and practical applicability in real-world chip designs. Implementation results on ISPD 2005 benchmarks validate the effectiveness of the proposed approach, showing superior performance in both verification accuracy and optimization efficiency compared to existing state-of-the-art methods.
Implementation of Inventory Checking System Using Finite State Machine in Role Playing Game Kusuma, Ahmad Fauzi Anggi Ariesta; Handayani, Riska Dwi
International Journal of Computer and Information System (IJCIS) Vol 5, No 4 (2024): IJCIS : Vol 5 - Issue 4 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i4.197

Abstract

This study aims to implement an inventory checking system combined with Finite State Machine (FSM) in the Role Playing Game (RPG) game genre using Arnold Hendrick's Game Development Life Cycle (GDLC) development method. In RPG games, inventory management is a crucial aspect that affects the gameplay, especially in the management of quests and item crafting features. The FSM approach is used to manage state and state transitions in randomly completed quests, providing more flexible dynamics in the completion of in-game tasks. The GDLC method was chosen to ensure that system development is carried out in a structured manner, starting from planning, design, implementation, to testing. This research integrates FSM in  the RPG Maker MV game engine, which allows developers to dynamically set various quest variables and optimize the item crafting process. By implementing FSM, items can be combined based on predefined state conditions, creating a more complex and interactive gameplay experience. The results of this study show that the application of FSM in the inventory checking system has a significant impact on flexibility in quest management and crafting. Quest variables that can be completed freely according to the player's choice, Overall, Finite State Machine can provide interactivity and depth of gameplay in RPGs with various quests that are tiered with each level, especially in the use of RPG Maker MV as an engine to apply various supporting variables to create flexibility in completing missions.
Web Based He Live Doc Application System Design Analysis Muqorobin, Muqorobin; Indriastiningsih, Erna
International Journal of Computer and Information System (IJCIS) Vol 5, No 3 (2024): IJCIS : Vol 5 - Issue 3 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i3.181

Abstract

This research focuses on the design and development of the He Live Doc application, a web-based document management platform that supports real-time collaboration. Using a prototyping method with a user-centered design approach, this research aims to create a solution that increases productivity and efficiency in document management. The research methodology involves user needs analysis, system design, prototype development, and user evaluation. Results show a 30% increase in efficiency compared to traditional methods, with user satisfaction levels reaching 85%. The app offers a responsive interface, secure authentication system, real-time collaboration features, version control, and cloud storage integration. The main challenge identified was performance optimization for simultaneous editing by multiple users. This research contributes to the development of document collaboration technology and opens opportunities for further research in performance optimization and integration of artificial intelligence
Plagiarism Detection Using Artificial Intelligence Sadhin, Ismail Hossain; Hassan, Tanvir; Nayim, MD. Al Muzahid
International Journal of Computer and Information System (IJCIS) Vol 5, No 2 (2024): IJCIS : Vol 5 - Issue 2 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i2.170

Abstract

Abstract—Presently available plagiarism detection technologies are primarily restricted to string-level comparisons between potentially original texts and suspiciously plagiarized materials. The objective of this research is to enhance the precision of plagiarism identification by integrating Natural Language Processing (NLP) methods into current methodologies. Our proposal is an external plagiarism detection framework that uses various natural language processing (NLP) approaches to examine a set of original and suspicious papers. The techniques not only analyze text strings but also the text's structure, taking text relations into consideration. Preliminary findings using a corpus of short paragraphs that have been plagiarized demonstrate that NLP approach increase the correctness of current methods.
Integrating Zero Trust Architecture with Service Mesh for Enhanced Cloud Security in DevOps Workflows Dindigala, Raju; Dandyala, Sai Surya Mounika
International Journal of Computer and Information System (IJCIS) Vol 5, No 4 (2024): IJCIS : Vol 5 - Issue 4 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i4.213

Abstract

The increasing adoption of cloud-native architectures and DevOps workflows has revolutionized software development and deployment but has also introduced complex security challenges. To address these challenges, Zero Trust Architecture (ZTA) has emerged as a critical paradigm, emphasizing the principle of "never trust, always verify." When combined with service mesh technology, which provides granular control over service-to-service communication, ZTA can create a robust security framework for cloud environments.This paper builds on the foundational work of Sandeep Pochu, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram, as outlined in their paper "Enhancing Cloud Security with Automated Service Mesh Implementations in DevOps Pipelines." Their research highlights the value of automated service mesh deployments in securing cloud-native environments within DevOps pipelines. Extending this work, we explore the integration of ZTA principles into service mesh implementations to further enhance security.We propose a framework that leverages service mesh telemetry, mutual TLS (mTLS), and advanced access control mechanisms to enforce ZTA principles at the microservices level. By embedding Zero Trust policies directly into the communication fabric of cloud-native applications, this approach ensures end-to-end security, minimizes attack surfaces, and reduces the risk of lateral movement by attackers. Additionally, we examine how this integration can be automated within DevOps workflows, ensuring that security configurations remain consistent and scalable in dynamic cloud environments. Through case studies and experimental evaluations, we demonstrate the effectiveness of this framework in detecting and mitigating threats while maintaining the agility of DevOps processes. The results show significant improvements in access control, anomaly detection, and response times, underscoring the potential of combining ZTA with service mesh technology. This paper aims to provide actionable insights for organizations seeking to enhance cloud security by integrating these cutting-edge technologies.
Point of Sale (POS) Application in Plastic Shops in Bumdes Ngarum Village, Sragen District Based on Website Utomo, Ihsan Cahyo; Priyawati, Diah; Abas, Novel Idris; Ummah, Khanun Roisatul; Septa Riani, Lencia Putri
International Journal of Computer and Information System (IJCIS) Vol 5, No 1 (2024): IJCIS : Vol 5 - Issue 1 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i1.157

Abstract

Transaction sell buy at the shop plastic in village BUMDES Ngarum happen every day with large amount.  In transactions sell buy during This Still carried out manually with _ write on note paper, then new do recap on the book transaction every the day. In doing data collection goods, shops Plastic in BUMDES Ngarum Village during This Still done manually, that is with write goods that come in and goods that go out in a book. System ongoing management _ done manually, create management goods become not enough effective and efficient, so needed something more system _ as effective as it can be accessed with fast and easy that is with develop Point of Sale (POS) application in stores plastic in village BUMDES Ngarum Regency Sragen Website based. Application Point of Sales (POS) cashier created use waterfall method. The waterfall method has 5 stages in construction, that is analysis requirements, design, development (coding), testing, and implementation. Results obtained that is web based Point Of Sales application that can make it easier recording, managing and storing data on goods and transactions carried out. The system also helps minimize possible errors  occurs in the calculation transactions and make it easier in search for the desired data.
The Main Success Factors of Smart Branding: A Systematic Literature Review Sabilaturrizqi, Mashudah; Susanto, Tony Dwi
International Journal of Computer and Information System (IJCIS) Vol 5, No 4 (2024): IJCIS : Vol 5 - Issue 4 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i4.202

Abstract

Many countries around the world have now adopted smart branding. However, the implementation of smart branding in some cities still has obstacles or challenges. This paper aims to contribute to formulating a conceptual model for smart branding. A literature review from 2017 to 2024 used the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-analyses) method to examine the term smart branding. From the literature review, ten dominant factors influence the success of smart branding, namely government support, creativity and innovation, the power of social media, stakeholders involvement, city residents, culture, economic development, technology advances, tourism development goals, and efficient public transport. These findings enrich the theoretical exploration of smart branding.