cover
Contact Name
Rizky Jumansyah
Contact Email
rizky.jumansyah@email.unikom.ac.id
Phone
+62222504119
Journal Mail Official
injiiscom@email.unikom.ac.id
Editorial Address
Jl. Dipati Ukur No.112-116, Lebakgede, Kecamatan Coblong, Kota Bandung, Jawa Barat 40132
Location
Kota bandung,
Jawa barat
INDONESIA
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)
ISSN : 28100670     EISSN : 27755584     DOI : https://doi.org/10.34010/injiiscom
FOCUS AND SCOPE INJIISCOM cover all topics under the fields of Computer Engineering, Information system, and Informatics. Informatics and Information system IT Audit Software Engineering Big Data and Data Mining Internet Of Thing (IoT) Game Development IT Management Computer Network and Security Mobile Computing Security For Mobile Decision Support System Web and Cloud Computing Accounting Information system Electrical and Computer Engineering Sensors and Trandusers Signal, Image, Audio and Video processing Communication and Networking Robotic, Control and Automation Fuzzy and Neural System Artificial Intelligent
Articles 119 Documents
Enhanced Wearable Strap for Feminine using IoT Kumar, Sathish; Nandhini, S; Sujitha, R
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.7910

Abstract

Women are increasingly experiencing a slew of security difficulties while traveling alone at night, particularly in the IT industry. Despite the benefits of new technologies, the rate of crime against women continues to rise. Despite the fact that numerous security gadgets are available on the market, women are unaware of them and do not use them. We are going to develop a prototype design using IoT. The term "physical objects” that are outfitted with sensors, computing power, software, and other technologies that enable them to connect and exchange data with other devices and systems over the Internet or other communication networks are referred to as the Internet of Things. Our project's ultimate goal is to give protection to working women and children. The majority of crimes occur as a result of a person's lack of awareness. We plan to keep the person aware throughout by administering a VIBRATION. The device comprises components such as the Start button, Arduino UNO, Panic Button, GSM Neo 6 m, GPS, Pulse Sensor, Vibration Motor, 6V Transformer, and Touch Sensor. The current location is determined using GPRS and GSM Neo 6 m. In emergency cases, a Pulse Sensor detects the person's actual pulse rate. The person must use a Touch Sensor to stop the vibration. If the vibration does not stop within the specified time, it is assumed that the person is not in an active state. The Emergency alert is then sent to the predefined contacts stored on the Arduino board. The transformer with a voltage range of 6v supplies power to the entire device. The future scope of this project is we can collect datasets of all hospitals for emergency purpose, creating offline maps to locate the victim without internet connection. Then the device can also contain Mic and camera to live monitor the consequences
Association Analysis with Apriori Algorithm for Electronic Sales Decision Support System Syafariani, R. Fenny
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.8089

Abstract

The purpose of this study was to determine the level of dependence of various items in order to dig up information on what items are dependent on other items. The method used in this research is descriptive analysis with a qualitative approach through a priori algorithm. The results show that the association analysis of the 26 transactions taken is 76.47%. A consumer who buys a laptop electronic device has the possibility to also buy an electronic mouse
BTS Application: Online Thesis Consultation Hardiyana, Bella
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.8091

Abstract

The learning process at universities is hindered by the Covid-19 pandemic, so activities that should be carried out face-to-face must be done online. One of the activities that are hampered is thesis consultation. Thesis consultation should be done directly, face to face, and verified on the attendance card, and it cannot be carried out as usual. The consultation can only be done online by sending files to the supervisor and then reviewing the results of the work. However, by doing it online, it will not be easy to fill out the attendance card that must be signed in person. The signing process becomes online, by sending the digital version of attendance card to the supervisor, then be signed by the supervisor and sent again to the student. The purpose of this research is to design a thesis consultationinformation system in which everything is centralized and documented in one platform. This research usedqualitative descriptive analysis method and system development method using prototype. The results showed that the system design that was built could help become a medium for exchanging files between supervisors and students. The output of this system will be documented. The history of each counsel carried out will be recorded so that the attendance card will be filled automatically
Design and Implementation of a Cloud Based Decentralized Cryptocurrency Transaction Platform Kommey, Benjamin; Tchao, Eric Tutu; Osae-Addo, Emmanuel; Kofi Yeboah, Asiedu Biney; Biney, Derick
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.8359

Abstract

Trading in the crypto-currency market has seen rapid growth and adoption, as well as the interest in crypto related technologies like blockchain and smart contracts. Smart contracts have gained popularity in building so called Decentralized Applications (dApps) and Decentralized Finance (DeFi) apps, mainly because they are more secure, trustworthy, and largely distributed (removes centralized control). DeFi applications run on the blockchain technology and are secured by blocks (nodes) connected by cryptographical hash links. DeFi applications have a great potential in the crypto-currency trading domain, providing more secure and reliable means of trading, and performing transactions with crypto-currencies. Only verified transactions are added to the blockchain after being approved by miners through a consensus mechanism and then it is replicated (distributed) among the nodes on the blockchain network. This research paper proposes a DeFi Crypto Exchange by integrating a numerous-signature stamp with a crypto API. A numerous-signature stamp solves the issue of transaction verifiability and authenticity. A crypto API provides the data about each crypto currency with which trades and transactions will be performed. This paper also discusses the technical background of the technology and a few related works. Decentralization of transactions through smart contracts on the blockchain will improve trust, security and reliability of transactions and trades.
A Simple, Low-cost, Efficient and Smart Consumer Gas Leakage Detection System Kommey, Benjamin; Opoku, Daniel; Lartey, Jessica; Kumah, Kirston; Tantuo, Mark
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.8371

Abstract

Liquefied Petroleum Gas is used for a wide range of both domestic and industrial purposes. Its use has seen a significant increase over the years. Unfortunately, there have also been many casualties resulting from gas explosions in recent times. Often, there is a news report of a gas explosion occurring somewhere, whether at home, in the marketplace or in an industry. Although these accidental explosions are sometimes beyond human control, some are due to ignorance, negligence, or improper care of gas cylinders. Most explosions are caused by undetected gas leakages which are then set off to explode with the slightest ignition. Apart from explosions, fires at homes can also be caused by gas leakages. This usually results in serious injuries, loss of property and even sometimes, loss of lives. This project seeks to provide a smart, budget friendly and easy to use gas leakage detector system, a better alternative to relying on the natural way of using the nose, which may fail and in effect, incur undesirable consequences. The system employs an MQ2 sensor interfaced with an ESP8266 Wi-Fi module for sensing the gas in the atmosphere and displaying an alert message on the lcd. The Wi-Fi in combination with the microcontroller module acts as the transmission and processing unit, allowing for communication over wireless medium. This way, a user can receive notifications on a mobile device depending on changes the hardware system detects in the atmosphere. There is also a buzzer to alert nearby persons by sound so that they can take the necessary precautions and actions
2-D Attention Based Convolutional Recurrent Neural Network for Speech Emotion Recognition C, Akalya Devi; D, Karthika Renuka; Winy, Aarshana E; Kruthikkha, P C; P, Ramya; S, Soundarya
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 2 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i2.8409

Abstract

Recognizing speech emotions is a formidable challenge due to the complexity of emotions. The function of Speech Emotion Recognition(SER) is significantly impacted by the effects of emotional signals retrieved from speech. The majority of emotional traits, on the other hand, are sensitive to emotionally neutral elements like the speaker, speaking manner, and gender. In this work, we postulate that computing deltas for individual features maintain useful information which is mainly relevant to emotional traits while it minimizes the loss of emotionally irrelevant components, thus leading to fewer misclassifications. Additionally, Speech Emotion Recognition(SER) commonly experiences silent and emotionally unrelated frames. The proposed technique is quite good at picking up important feature representations for emotion relevant features. So here is a two dimensional convolutional recurrent neural network that is attention-based to learn distinguishing characteristics and predict the emotions. The Mel-spectrogram is used for feature extraction. The suggested technique is conducted on IEMOCAP dataset and it has better performance, with 68% accuracy value.
Impact of Number of Artificial Ants in ACO on Network Convergence Time: A Survey Lusweti, Samuel W; Odoyo, Collins O; A Rambim, Dorothy
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 1 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i1.8431

Abstract

Due to the dynamic nature of computer networks today, there is need to make the networks self-organized. Selforganization can be achieved by applying intelligent systems in the networks to improve convergence time. Bio-inspired algorithms that imitate real ant foraging behaviour of natural ants have been seen to be more successful when applied to computer networks to make the networks self-organized. In this paper, we studied how Ant Colony Optimization (ACO) has been applied in the networks as a bio-inspired algorithm and its challenges. We identified the number of ants as a drawback to guide this research. We retrieved a number of studies carried out on the influence of ant density on optimum deviation, number of iterations and optimization time. We found that even though some researches pointed out that the numbers of ants had no effect on algorithm performance, many others showed that indeed the number of ants which is a parameter to be set on the algorithm significantly affect its performance. To help bridge the gap on whether or not the number of ants were significant, we gave our recommendations based on the results from various studies in the conclusion section of this paper
Unique Aspects of Usage of the Quadratic Cryptanalysis Method to the GOST 28147-89 Encryption Algorithm Akhmedov, Bardosh; Aloev, Rakhmatillo
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 2 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i2.8445

Abstract

In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given. For example, the role of the bit gains in the application of the quadratic cryptanalysis method, which is formed in the operation of addition according to mod232 used in this algorithm is described. In this case, it is shown that the selection of the relevant bits of the incoming plaintext and cipher text to be equal to zero plays an important role in order to obtain an effective result in cryptanalysis
Potential Security Issues in Implementing IaaS and PaaS Cloud Service Models Erlangga, Wishnu Kusumo Agung; Ramadhan, Muhammad Rheza
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 2 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i2.8446

Abstract

As the digital world evolves, so does potential problem that computer users encounter. Cybersecurity threats are still evolving and expanding. Unfortunately, most computer users do not understand this properly. The cloud models offered by various public cloud providers remain concentrated on infrastructure resources, application platforms, and software services despite the recent increase in the popularity of cloud computing. The first step in this study will be a literature review to get an understanding of accessible cloud service models. The papers chosen for the study spans 2010 to 2020. All data was gathered from pertinent and related literature on cyber security and cloud computing. The following tenets serve as the foundation for this architecture. First, in the described architecture, the perimeter scanner serves as the first entry point for external cyberattacks. Firewall and other security layers become next barriers if the attack can get past first layer. On the other side, the machine learning system will detect every successful assault that gets past the security layers. As a result, there are numerous viewpoints and categorization systems for diverse attacks. It is possible to advance cyber security research in the context of cloud technology by merging the results of existing studies and developing international guiding standards
New Modern Approach to Predict Users’ Sentiment Using CNN and BLSTM Kumar, R. Sathish
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 3 No. 2 (2022): International Journal of Informatics, Information System and Computer Engineeri
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/injiiscom.v3i2.8452

Abstract

In Today’s world social network play a vital role and provides relevant information on user opinion. This paper presents emotional health monitoring system to detect stress and the user mood. Depending on results the system will send happy, calm, relaxing or motivational messages to users with phycological disturbance. It also sends warning messages to authorized persons in case a depression disturbance is detected by monitoring system. This detection of sentence is performed through convolution neural network (CNN) and bi-directional long-term memory (BLSTM). This method reaches accuracy of 0.80 to detect depressed and stress users and also system consumes low memory, process and energy. We can do the future work of this project by also including the sarcastic sentences in the dataset. We can also predict the sarcastic data with the proposed algorithm

Page 4 of 12 | Total Record : 119