International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)
FOCUS AND SCOPE INJIISCOM cover all topics under the fields of Computer Engineering, Information system, and Informatics. Informatics and Information system IT Audit Software Engineering Big Data and Data Mining Internet Of Thing (IoT) Game Development IT Management Computer Network and Security Mobile Computing Security For Mobile Decision Support System Web and Cloud Computing Accounting Information system Electrical and Computer Engineering Sensors and Trandusers Signal, Image, Audio and Video processing Communication and Networking Robotic, Control and Automation Fuzzy and Neural System Artificial Intelligent
Articles
119 Documents
Pandawa App: Student Guide Application after the Covid-19 Pandemic
Rafdhi, Agis Abhi;
Bachtiar, Adam Mukharil;
Hayati, Euis Neni;
Mega, Raiswati Untsa
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 4 No. 2 (2023): INJIISCOM: VOLUME 4, ISSUE 2, DECEMBER 2023
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v4i2.13895
The purpose of this research is to design a mobile-based application that functions as a pre-lecture socialization platform so that the post-Covid-19 transition period can be maintained and carried out well. The research method used in this research is descriptive analysis with a qualitative approach. We used an object-oriented approach with the System Development Life Cycle Prototyping in the application development process. The results show that the Pandawa application development can provide lecture guidance properly using a digital platform that can be accessed via smartphone. The main concept of this application is to contain procedures or guidelines for implementing face-to-face lectures during the transition period from the Covid-19 pandemic in the New Normal era. In addition, this application also has a feature integrated with the local government for reporting if there are residents who test positive for Covid-19. Therefore, it can be followed up directly and quickly. In the end, this application is present as an information medium to adapt new habits in the world of education, especially at the tertiary level.
Project Management and File Management in Multimedia Applications Version of ActionScript 2.0
Hardiyana, Bella;
Effendi, Diana
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 4 No. 2 (2023): INJIISCOM: VOLUME 4, ISSUE 2, DECEMBER 2023
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v4i2.13897
Multimedia is a key focus within the Information Systems Study Program at Universitas Komputer Indonesia. With increasing student interest and certification from the National Professional Certification Agency, more students are producing quality multimedia theses. However, many lack understanding of theoretical principles such as project and file management, which this research aims to address for both academic and real-world applications. This research was conducted at PS-SI UNIKOM. The research data was taken from the collection of thesis students of the UNIKOM PS-SI even semester academic year 2019/2020. The focus of this research is using the Adobe Flash CS 6 version ActionScript 2.0 approach. This study expects students to understand multimedia scientific principles and implement them in a real thesis and multimedia project. Implementing project management and file management in the multimedia field will help developers develop multimedia application products effectively and efficiently.
Locus of Control as Determinants of Online - Dating Behaviour Among Graduates in Kwara – State
Ibraheem, Islamiyyah Olajire;
Esere, Mary O
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 5 No. 2 (2024): INJIISCOM: VOLUME 5, ISSUE 2, DECEMBER 2024
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v5i2.14029
This study investigated locus of control as a determinant of online dating among university students in Kwara State. A descriptive survey design with a correlational approach was adopted. The study's respondents were 380 university students from four universities in Kwara State. Instruments for data collection were the Online Dating Behaviour Scale adapted from the Tinsel (2019) Survey and the locus of control scale adapted from Rotter (1966). Three null hypotheses were generated and tested at .05 alpha levels. Pearson Product Moment Correlation was used. Result showed a significant relationship between online dating and internal locus of control of university students in Kwara State (r. calculated = 0.41, df = 378 and p < 0.05); a significant relationship between online dating and powerful others locus of control of university students in Kwara State (r. calculated = -0.62, df = 378 and p < 0.05); a significant relationship between online dating and chance locus of control of university students in Kwara State (r. calculated = -0.26, df = 378 and p < 0.05). Recommendations based on the findings of the study were proffered.
Locus of Control as Determinants of Online - Dating Behaviour Among Graduates in Kwara – State
Olajire, Ibraheem Islamiyyah;
Ogechi, Esere Mary
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This study investigated how locus of control influences online dating behaviors among university students in Kwara State. A descriptive survey design with a correlational method was utilized. The participants included 380 students from four different universities in Kwara State. Data collection tools included the Online Dating Behaviour Scale, adapted from the Tinsel (2019) Survey, and Rotter's (1966) locus of control scale. Three null hypotheses were developed and tested at a 0.05 significance level. Data analysis was conducted using the Pearson Product Moment Correlation. The findings revealed a significant positive correlation between online dating and an internal locus of control among university students in Kwara State (r = 0.41, df = 378, p < 0.05). Additionally, there was a significant negative correlation between online dating and the powerful others locus of control (r = -0.62, df = 378, p < 0.05), as well as a significant negative correlation between online dating and the chance locus of control (r = -0.26, df = 378, p < 0.05). The study provided recommendations based on these findings
Preventing Man in The Middle Attack on E-voting System Using Multi-layer Security Protocol
Sunday, Uzoma
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Intelligent technologies, most notably the growth of the World Wide Web, are used to improve human life. In comparison to prior eras, an increasing number of jobs may now be accomplished swiftly and efficiently thanks to the Internet's spectacular development. One relatively new field that has been identified is e-voting. There are several ways to vote, including online, using a mobile application, and in person at a polling station. The internet's rapid expansion means that application security cannot be ignored. I developed an Android application with a 5-step security process—user authentication, fingerprint authentication, captcha, OTP verification, and cryptography—before voting in order to thwart phishing attempts. With a mobile device, voters may now cast their ballots online at any time and from any place. The application is created and deployed using Android Studio. The software development life cycle is followed in this research when developing the voting application. The outcome of this study is the development of a voter-friendly mobile application that functions as a useful tool to enable voters to cast ballots with five security levels.
Enhancing Water Sustainability with AI methods: Analysis and Prediction of Seasonal Water Quality of Nepal Using Machine Learning Approach: Prediction of Seasonal Water Quality of Nepal Using Machine Learning Approach
Paneru, Biplov;
Paneru, Bishwash;
Sapkota, Sanjog Chhetri
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Water quality is a crucial concern worldwide, including in Nepal, where efficient monitoring is essential for safe drinking water and preventing waterborne illnesses. This study employs machine learning to analyze and forecast the seasonal water quality index (WQI) of Nepalese well water. Hybrid models with nested cross-validation were introduced, using methods like CatBoost, Decision Tree, Logistic Regression, MLP-GRU, and LSTM-GRU hybrids. Performance metrics included R², accuracy, and RMSE. CatBoost achieved the highest classification accuracy (99.35%), while the LSTM-GRU hybrid excelled in capturing complex temporal patterns. Nested cross-validation demonstrated 96.13% accuracy with low standard deviation. Additionally, SHAP analysis identified key predictive factors using the SVM model. This research highlights machine learning’s potential in predicting and managing water quality effectively
AI-Based Chatbot System for Education and Recommendations on the Use of Native Papuan Herbal Plants using the Large Language Models method
Aras, Suhardi;
Kelian, Maya Nurliati;
S, Ilham;
Faridah, Alfiyyah
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v6i1.13575
This study develops an AI-based chatbot to provide education and recommendations for using Papuan herbal tea. The goal is to raise awareness and dispel traditional knowledge about Papuan herbal tea, which has historically been weak in local communities. The methods used include problem analysis, literature review, data collection, system testing using Large Language Models (LLM), and implementation using Google Generative AI (Gemini-Pro). This system is designed to analyze text queries and provide relevant answers using text-based query syntax. Pengujian is carried out using the BERTScore method to assess the system's adherence to the reference data. The study's results indicate very good performance, with a rata-rata Precision of 0.58357/58 %, a Recall of 0.66781/66%, and an F1-Score of 0.62205/62. %. More precise recall indicates that the system can capture a lot of pertinent information, even when there are performance differences between questions. This study demonstrates the potential of AI technology to improve understanding between local communities and the general public as well as to support local Papuan kearifan events
Improving Sentiment Classification using Ensemble Learning
Abdullah, Sherwan A;
Salih, Mohammed I;
Ahmed, Omar M
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 2 (2025): INJIISCOM: VOLUME 6, ISSUE 2, DECEMBER 2025 (ONLINE FIRST)
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v6i2.13921
This paper presents an ensemble learning-based approach to improve sentiment classification accuracy in the IMDB movie reviews dataset. To this end, we tap three diversified models: Logistic Regression, Random Forest, and a Bidirectional Long Short-Term Memory neural network. Each one contributes its unique strengths to the ensemble, enhancing the overall performance. The text data has been processed using a statistical formula that converts the text document into a vector from the relevancy of the word with bigrams; data have been transformed to make it useful for Logistic Regression and Random Forest classifiers. The LSTM neural network is designed to capture sequential dependencies through an embedding layer followed by a bidirectional LSTM and dense layers with dropout regularization. The ensemble method then combines predictions of these models by majority voting, thus the interpretability and robustness of conventional classifiers are preserved, while advanced capabilities from neural networks are maintained. Our experiments prove that this ensemble approach does obtain an accuracy of 89.2% on the test dataset, which outperforms individual models. This study realizes some possible ways to combine traditional machine learning techniques with deep learning models in sentiment analysis tasks.
Security Service Monitoring Using Face Recognition, Near Field Communication and Geolocation Technology
Setiawan, Eko Budi;
Wijaksono, Rizky Milan Alpasya
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v6i1.13976
In a company that provides security services, monitoring, and field control activities are carried out daily to ensure that all designated checkpoints are properly supervised. This research aimed at facilitating the management in summarizing the field control activity reports and enhancing the supervision of the field security personnel conducting field control. The application is developed using Golang, JavaScript, and Kotlin programming languages and utilizes PostgreSQL as its database. The application is web-based for administrative personnel and mobile-based for field security personnel. The technology used in building this application includes face recognition, GPS, and location-based service and NFC reader. Based on the implementation and testing results, it is found that the developed application functions according to the established workflow. The fastest face recognition detection time was 1.22 seconds, and the RFID tag was successfully detected at a distance of less than 4 cm and an average time of 0.378 seconds, and the use of geolocation provides accurate position results.
Design and construction of a smart lock system using Internet of Things (IoT)
Aniru, Muhammed Abudu;
Osasenaga, Enoma Victor;
Emmanuel, Osamwonyi Efosa;
Gerald, Matthew Onyeka;
Melody, Emede Oghenekome
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34010/injiiscom.v6i1.14127
This paper aims to design and construct a smart door lock system using the Internet of Things (IoT), WiFi module, relay module and other peripheral devices to provide people with an incomparable level of control and accessibility over their home’s entry points. Traditional door lock systems are slow, insecure and with high vulnerability and they require human intervention to lock and unlock them. Thus, an IoT-based smart door lock system offers a proper lock protection mechanism with better performance. The system comprises a microcontroller (NodeMCU ESP8266), solenoid lock, DC battery(12V), 5V 3A buck converter (LM7805), WiFi module and a switching device (Relays). The setup of the system was tested with 3 independent devices for 10 trials. All of the trials accurately interpreted the received commands and transmitted the corresponding signals to the interfaced relay module. Subsequently, the relay module effectuated the lock/unlock operation on the integrated solenoid lock mechanism, thus accomplishing the intended objective of the study.