cover
Contact Name
Rijois Iboy Erwin Saragih
Contact Email
rijoissaragih@gmail.com
Phone
+6282163892782
Journal Mail Official
rijoissaragih@gmail.com
Editorial Address
Jl. Karya Bakti Gg. Dame No. 95, kelurahan Indra Kasih, Kecamatan Medan Tembung, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
International Journal of Information System and Innovative Technology
ISSN : -     EISSN : 29647207     DOI : https://doi.org/10.63322/ijisit
Core Subject : Science,
IJISIT (International Journal of Information System and Innovative Technology) is a peer-reviewed journal in Applied Information Technology published twice a year in June and December and organized by the PT Geviva Edukasi Trans Teknologi. Focus & Scope International Journal of Information System & Innovative Technology aims to publish original research results on the implementation of the information systems. International Journal of Information System & Innovative Technology covers a broad range of research topics in information technology. The topics include but are not limited to avionics. 1. Artificial Intelligence and Soft Computing 2. Computer Science and Information Technology 3. Telecommunication System and Security 4. Digital Signal, Image and Video Processing 5. Automation, Instrumentation and Control Engineering 6. Internet of Things, Big Data and Cloud Computing
Articles 5 Documents
Search results for , issue "Vol. 2 No. 1 (2023): June" : 5 Documents clear
Improve Student Learning Environment with MyClassRoom (MCR) and Cloud Storage Collaboration Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/sa56ab22

Abstract

Pandemic has changed the process of education in the world, it leads to a better approach of learning through an online environment. Unfortunately, most educational institutions are still using conventional approaches in their learning system, in fact, information technology has been growing continuously nowaday, especially mobile applications. This paper presents a collaboration between myclassroom application and google drive to improve student learning environment, especially in providing materials, attendance, assignments and grades based on mobile. This study used a design-based research methodology with a waterfall application development process and a questionnaire to collect feedback from one hundred and twenty-one students on the features and content of myclassroom. The myclassroom application was successfully developed using the Model View Controller concept with databases and google drive collaboration. The application testing has confirmed that myclassroom has been successfully developed and works properly. The result shows that the student learning environment has improved by up to 95%.
Analysis Quality of Service (QoS) on Ad Hoc Networks with Network Simulator Version 3 (NS-3) Rahmadani, Rahmadani; Supiyandi, Supiyandi; Lia Kristina , Manalu
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/d45hd543

Abstract

QoS (Quality of Service) results for throughput, packet loss and delay as well as data transfer process performance tests were carried out with the NS-3 simulator based on the number of nodes that are continuously added according to the scenario on the ad hoc network. The scenario of adding nodes is carried out in stages starting from 10 nodes, increasing to 20 nodes, up to 40 nodes. The results of the analysis and measurements obtained for throughput produce an average value of 3.1872 Kbps so that it is included in the good category. The packet loss parameter produces an average value of 3.48% which is included in the good category and the delay parameter produces an average value of 6,824 ms which is also included in the good category. The final results of the ad hoc network simulation process with NS-3 are presented in graphical view
Analysis of 5G-Enabled Internet of Things (IoT) with AI: Enabling Smart and Connected Environments Silitonga, Joe Laksamana; Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/4rnsxz08

Abstract

The convergence of 5G technology and artificial intelligence (AI) has the potential to reshape the landscape of the Internet of Things (IoT), paving the way for innovative applications in smart and con-nected environments. This research paper explores the synergy be-tween 5G and AI in the context of IoT, focusing on the transforma-tive impact on various sectors such as healthcare, industrial auto-mation, and smart cities. Through a comprehensive review of exist-ing literature and empirical analysis, this paper highlights the key challenges, opportunities, and technical advancements that arise when integrating 5G and AI technologies within IoT ecosystems. The study contributes to a deeper understanding of the implications of this convergence and offers insights into the future direction of research and development in this dynamic field
Anticipating Cybersecurity on Artificial Intelligence Simanjuntak, Thandy
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/273wdm25

Abstract

As artificial intelligence (AI) continues to revolutionize various sectors, the intersection of AI and cybersecurity has emerged as a critical frontier. This paper delves into the realm of "Anticipating Cybersecurity on Artificial Intelligence," exploring the challenges, opportunities, and strategies inherent in safeguarding AI systems against an evolving landscape of cyber threats. With AI playing an increasingly pivotal role in decision-making, automation, and data analysis, the security of AI systems becomes paramount to ensuring the integrity and trustworthiness of their outcomes. This paper investigates various dimensions of anticipating cybersecurity concerns in AI, including identifying potential vulnerabilities, developing proactive defense mechanisms, and fostering collaboration between AI and cybersecurity experts. Through an in-depth analysis of recent case studies and trends, we highlight the importance of pre-emptive measures to thwart adversarial attacks, data poisoning, and model manipulations. Moreover, we explore the role of explainable AI in enhancing cybersecurity transparency and the potential for leveraging AI techniques to enhance intrusion detection and threat mitigation. By delving into these interconnected aspects, this paper not only underscores the urgency of addressing cybersecurity within AI but also emphasizes the necessity of anticipating future threats to ensure the continued success and trustworthiness of AI technologies. In sum, this study contributes to the discourse surrounding AI cybersecurity, shedding light on strategies to anticipate and counteract threats, and fostering a holistic approach to secure the AI-driven future.
CCTV-Based Safety Monitoring in family Environments Sutanto, Yulius
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/ebcbqv53

Abstract

The proliferation of Closed-Circuit Television (CCTV) systems has ushered in a new era of safety monitoring, extending its reach beyond public spaces into private family environments. This research paper delves into the emerging trend of CCTV-based safety monitoring within family settings. With the primary objective of enhancing household safety, this study investigates the implementation, effectiveness, ethical considerations, and potential implications of integrating CCTV technology into the domestic sphere. The paper begins by exploring the motivations behind adopting CCTV systems for family safety, addressing concerns such as child supervision, elder care, home security, and accident prevention. It examines the range of available CCTV technologies tailored for residential use, from basic monitoring setups to advanced features like real-time alerts, two-way communication, and facial recognition. A critical analysis of the effectiveness of CCTV-based safety monitoring in family environments is conducted, focusing on its impact on crime prevention, accident mitigation, and overall situational awareness. This analysis takes into account both quantitative data, such as crime statistics and accident rates, as well as qualitative data through surveys and interviews with households employing CCTV systems. Ethical considerations are a central theme of this research, as the intrusion into personal privacy is a significant concern when implementing surveillance technology within the family setting. The paper discusses the ethical implications of constant monitoring, potential breaches of trust, and the challenges of striking a balance between safety and individual autonomy. The legal frameworks surrounding CCTV use within homes are explored, highlighting the varying regulations across different jurisdictions. Furthermore, the study explores the psychological and social implications of introducing surveillance technology within the familial context. It examines the effects on family dynamics, communication patterns, and the mental well-being of household members, including children and teenagers. Ultimately, this research paper aims to provide a comprehensive overview of the growing trend of CCTV-based safety monitoring in family environments. By examining its benefits, challenges, and broader impacts, it contributes to the ongoing discourse on the integration of surveillance technology into private spaces. The findings of this study can guide policymakers, technology developers, and families in making informed decisions about the implementation of CCTV systems while upholding the values of safety, privacy, and familial harmony.

Page 1 of 1 | Total Record : 5