cover
Contact Name
Hanis Amalia Saputri
Contact Email
editor.ijcshai@binus.edu
Phone
+6221-5345830
Journal Mail Official
editor.ijcshai@binus.edu
Editorial Address
https://journal.binus.ac.id/index.php/ijcshai/about/editorialTeam
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
International Journal of Computer Science and Humanitarian AI
ISSN : 30644372     EISSN : -     DOI : https://doi.org/10.21512/ijcshai.v2i2.14418
International Journal of Computer Science and Humanitarian AI (IJCSHAI) is an international journal published biannually in February and October. The Journal focuses on various issues: Computer Science, Artificial Intelligence (AI), Fuzzy Systems, Expert Systems, Geo-AI, Machine Learning, Deep Learning, Humanitarian AI, Data Science, Computer Vision, Natural Language Processing (NLP), Information Systems, Psychoinformatics, Computational Intelligence, Recommender Systems, Robotics, Robot Vision and Control Systems
Articles 6 Documents
Search results for , issue "Vol. 1 No. 1 (2024): IJCSHAI" : 6 Documents clear
Development of Telegram-Based Home Automation and Data Acquisition System Widodo Budiharto; Heri Ngarianto
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/ijcshai.v1i1.12030

Abstract

Home automation and data acquisition system using Telegram application makes us able to automate tasks related to control and monitoring through a system installed at home or building. In this research, we propose an algorithm and architecture used for Telegram-based home automation and data acquisition with environmental sensors such has temperature, humidity, CO2, and Volatile Organic Compounds (VOC) measurement (air quality) as indicator of good air quality. Based on experiment, we can detect the condition of environment, control the relay and the system able to give information about the quality of air from smartphone.
User Requirement Analysis on Sales Information System at PT. MITRA INDOLINK Mochamad Naufal Akbar; Deddy Purba Pratama; Kevin Alexander; Suzanna Suzanna
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/ijcshai.v1i1.12135

Abstract

The era is developing very quickly and dynamically, creating many changes that result in tight competition in the business world. The business world needs to follow the progress of information systems. Analysis of user needs in the business world needs to be done in order to find out the various needs of the company. The purpose of this study is to find out the results of the analysis of user requirements that are needed and that can support sales operations in the sales information system of PT. Mitra Indolink Grosir supports the company's sales operations. The research method used is by interviewing users of the information system which is then processed using the System Usability Scale (SUS) technique. The results of the analysis show that the sales information system with the TikTok shop application can be used efficiently and meets user needs (user requirements) with a value of 69.65 which is included in grade C.
Assessing University Website Performance: A Comparative Analysis Using GTmetrix Davin Nayaka Pandya; Doddy Suryadharma; Lili Ayu Wulandhari; Islam Nur Alam
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/ijcshai.v1i1.12152

Abstract

As the reliance on websites to disseminate information increases, universities are no exception, using websites as an important platform for their information systems. However, ensuring optimal website performance is imperative, as slow or unresponsive websites can lead to decreased user satisfaction and affect the university's reputation. This study aims to analyze and compare the performance of university information system websites from Indonesia’s top five universities against the world’s leading institutions in Computer Science and Information Systems based on QS World University Rankings by Subject 2023. Utilizing GTmetrix, a comprehensive performance assessment tool, key performance metrics such as First Contentful Paint (FCP), Speed Index (SI), Largest Contentful Paint (LCP), Time to Interactive (TTI), Total Blocking Time (TBT), and Cumulative Layout Shift (CLS) were evaluated. The findings reveal a significant performance gap between the top universities globally and in Indonesia. While global universities demonstrate good performance across various metrics, Indonesian universities exhibit areas in need of improvement, particularly in metrics like FCP, SI, LCP, TTI, and CLS. Nevertheless, Indonesian universities excel in blocking time, suggesting strategic strengths that can be leveraged for overall performance enhancement. This study underscores the importance of regular attention to website performance to enhance user experience and maintain the university's reputation within the academic community.
Implementation of IoT Edge Computing for Control and Monitoring System of Hydroponic Plant Water Quality Using Raspberry Pi Cahya Lukito; Rony Baskoro Lukito; Endang Ernawati
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/ijcshai.v1i1.12153

Abstract

Hydroponics involves cultivating plants using a water-based medium mixed with mineral nutrients, continuously supplied to the roots 24/7. Factors such as water reserve height, temperature, nutrient content, and pH are crucial considerations in hydroponic farming. Connectivity issues to the internet-based cloud system can disrupt the monitoring and control system. To ensure the effective operation of the hydroponic plant control and monitoring system, IoT edge computing within the Local Area Network is necessary as an extension of the cloud system. Periodically, the system will transmit calculation results from water quality sensors to the cloud-based system through IoT edge computing, enabling decision-making within the Local Area Network and subsequent transmission to Internet of Things devices within the hydroponic system for optimal plant growth.
A Systematic Literature Review: Cyber Attack: Phishing Environments, Techniques, and Detection Mechanism Cindy Natasya; Irvin Irvin; Alexander Agung Santoso Gunawan
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/ijcshai.v1i1.12155

Abstract

In this digital era, phishing has attacked many platforms such as email, website, message, link form. Phishing is an act of creating a website that is exactly like the original website that is used to take someone's personal data. Phishing causes loss of customer confidence to use any application or website. Most of the victims of phishing are people who do not understand phishing or an organization. This kind of cyber-attacks consist of various types and countermeasures that need to be considered for the public user to prevent phishing based on phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques. This paper consists of types of phishing and awareness to wary of phishing to overcome them. Therefore, the goal of this study is to identify the most typical environments for phishing attacks in order to ascertain the most popular media and technique. The authors of this study plan to conduct a Systematic Literature Review (SLR) of studies that have been done on the subject that was just described. The authors come to the overall conclusion that a website is the ideal option for phishing attacks using social engineering techniques. Additionally, the authors offer numerous suggestions for preventing phishing with various techniques. However, the most effective defense against phishing attacks is identification of phishing attempts through education and training.
Editorial, Foreword, and Table of Content Widodo Budiharto
International Journal of Computer Science and Humanitarian AI Vol. 1 No. 1 (2024): IJCSHAI
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Page 1 of 1 | Total Record : 6