International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)
FOCUS AND SCOPE INJIISCOM cover all topics under the fields of Computer Engineering, Information system, and Informatics. Informatics and Information system IT Audit Software Engineering Big Data and Data Mining Internet Of Thing (IoT) Game Development IT Management Computer Network and Security Mobile Computing Security For Mobile Decision Support System Web and Cloud Computing Accounting Information system Electrical and Computer Engineering Sensors and Trandusers Signal, Image, Audio and Video processing Communication and Networking Robotic, Control and Automation Fuzzy and Neural System Artificial Intelligent
Articles
83 Documents
Enhanced the Weighted Centroid Localization Algorithm Based on Received Strength Signal in Indoor Wireless Sensor Network
Medhav Kumar Goonjur;
Irfan Dwiguna Sumitra;
Sri Supatmi
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (512.36 KB)
|
DOI: 10.34010/injiiscom.v1i1.4016
A challenging problem that arises in the Wireless Sensor Network (WSN) is localization. It is essential for applications that need information about target positions, are inside an indoor environment. The Localization scheme presented in this experiment consists of four anchor nodes that change their position coordinates and one target node that is used to control the distance. The Localization algorithm designed in this paper makes use of the combination of two algorithms; the Received Strength Signal Indication (RSSI) and Weight Centroid Localization Algorithm (WCLA), called the RSSI-WCLA algorithm. The laboratory results show that the fusion between the RSSI-WCLA algorithm is outstanding than RSSI and WCLA algorithms itself in terms of localization accuracy. However, our proposed algorithm shows that the maximum error distance is less than 0.096m.
Computer & Network Equipment Management System (CNEMAS) Application Measurement
Imelda Pangaribuan;
A Rahman;
S Mauluddin
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (434.571 KB)
|
DOI: 10.34010/injiiscom.v1i1.4019
ABC is one of the state-owned enterprises in Indonesia. PT. ABC has policy to give some equipment for employees to rent. Application use to control all equipment that rent by employee named as CNEMAS (Computer & Network Equipment Management System Nasional). There are some problems faced by PT. ABC in using CNEMAS, such as accuracy and its roles at PT. ABC business process. Objective of this research is to measure maturity of CNEMAS. Method used in this research are structured approach method as analysis method and Information Technology Assurance Framework (ITAF) used as measurement method. Tools such as Flowcharts, Context Diagram and Data Flow Diagram used to describe the process in CNEMAS. The result of this research are gap found at AC2 (awareness and Communication Component) where the gap is 0.71. The conclusion is CNEMAS needs improvement in accuracy, equipment location, on time report production, and consistency.
Air Quality Prediction in Smart City's Information System
Ivan Kristianto Singgih
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (903.463 KB)
|
DOI: 10.34010/injiiscom.v1i1.4020
The introduction of new technology and computational power enables more data usages in a city. Such a city is called a smart city that records more data related to daily life activities and analyzes them to provide better services. Such data acquisition and analysis must be conducted quickly to support real-time information sharing and support other decision-making processes. Among such services, an information system is used to predict the air quality to ensure people's health in the city. The objective of this study is to compare various machine learning techniques (e.g., random forest, decision tree, neural network, naïve Bayes, etc.) when predicting the air quality in a city. For the comparison, we perform the removal of records with empty values, data division into training and testing datasets, and application of the k-fold cross-validation method. Numerical experiments are performed using a given online dataset. The results show that the three best methods are random forest, Gradient Boosting, and k-nearest neighbors with precision, recall, and f1-score values more than 0.63.
A Paradigm Shift from Optimal Play to Mental Comfort: A Perspective from the Game Refinement Theory
Hiroyuki Iida;
Mohd Nor Akmal Khalid
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (808.759 KB)
|
DOI: 10.34010/injiiscom.v1i1.4021
The game refinement theory focuses on the game designer perspective, where its application in various types of games provides evidence of the occurring paradigm shift. Utilizing the logistical model of game outcome uncertainty, it provides a platform for incorporating gamified experience observed in games to be adopted in domains outside of game while retaining the context of the game. Making games as a testbed, the implications of the game refinement theory have been observed in the educational and business perspective, while further explored its utility in interpreting some states of the human mind. In addition, a holistic view of design in games and in the real-world environments was discussed, where the prospects of the game refinement theory were also highlighted.
Fog Computing Architecture for Indoor Disaster Management
Asep Id Hadiana
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (611.229 KB)
|
DOI: 10.34010/injiiscom.v1i1.4022
Most people spend their time indoors. Indoors have a higher complexity than outdoors. Moreover, today's building structures are increasingly sophisticated and complex, which can create problems when a disaster occurs in the room. Fire is one of the disasters that often occurs in a building. For that, we need disaster management that can minimize the risk of casualties. Disaster management with cloud computing has been extensively investigated in other studies. Traditional ways of centralizing data in the cloud are almost scalable as they cannot cater to many latency-critical IoT applications, and this results in too high network traffic when the number of objects and services increased. It will be especially problematic when in a disaster that requires a quick response. The Fog infrastructure is the beginning of the answer to such problems. This research started with an analysis of literature and hot topics related to fog computing and indoor disasters, which later became the basis for creating a fog computing-based architecture for indoor disasters. In this research, fog computing is used as the backbone in disaster management architecture in buildings. MQTT is used as a messaging protocol with the advantages of simplicity and speed. This research proposes a disaster architecture for indoor disasters, mainly fire disasters.
Dimensional Speech Emotion Recognition from Acoustic and Text Features using Recurrent Neural Networks
Bagus Tris Atmaja;
Masato Akagi;
Reda Elbarougy
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (566.864 KB)
|
DOI: 10.34010/injiiscom.v1i1.4023
Emotion can be inferred from tonal and verbal information, where both features can be extracted from speech. While most researchers conducted studies on categorical emotion recognition from a single modality, this research presents a dimensional emotion recognition combining acoustic and text features. A number of 31 acoustic features are extracted from speech, while word vector is used as text features. The initial result on single modality emotion recognition can be used as a cue to combine both features with improving the recognition result. The latter result shows that a combination of acoustic and text features decreases the error of dimensional emotion score prediction by about 5% from the acoustic system and 1% from the text system. This smallest error is achieved by combining the text system with Long Short-Term Memory (LSTM) networks and acoustic systems with bidirectional LSTM networks and concatenated both systems with dense networks.
SWOT Analysis of Lending Platform from Blockchain Technology Perspectives
Wisnu Uriawan
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (419.845 KB)
|
DOI: 10.34010/injiiscom.v1i1.4024
Blockchain Technology become phenomenal issue in the world, emerging with bitcoin and IoT. It had been implemented in many areas in human activity. Advantages of blockchain technology is distributed ledger where resources distributed to all member in network. Loans or credit as part of human activity in their life. When we need cash for a major expense, it might be tempting to borrow from a payday lender or max out a credit card or similar, but you have other options that will not harm your credit or put you in a cycle of debt, even if your credit record is not all that great. Collateral loans could be a way to borrow the money as you need. One of which is the lending platform. Blockchain technology has been implemented in many lending platforms, but there are still any weaknesses that can be refined and optimized. Tool of analysis is SWOT, describes of four analysis, as follow: Strength, Weakness, Opportunity and Threats. This paper purpose to analyzed lending platform measured by look for the weaknesses variable and how to optimize that system performance that can improve for helping people in lending process. In addition, the result of this analysis can use for enhancement recommendation the system based on the weaknesses are found and opportunity for make a lending platform robust.
Modeling Traffic Flows with Fluid Flow Model
Paulus Setiawan Suryadjaja;
Maclaurin Hutagalung;
Herman Yoseph Sutarto
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 1 No 1 (2020): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (714.467 KB)
|
DOI: 10.34010/injiiscom.v1i1.4860
This Research presents a macroscopic model of traffic flow as the basis for making Intelligent Transportation System (ITS). The data used for modeling is The number of passing vehicles per three minutes. The traffic flow model created in The form of Fluid Flow Model (FFM). The parameters in The model are obtained by mixture Gaussian distribution approach. The distribution consists of two Gaussian distributions, each representing the mode of traffic flow. In The distribution, intermode shifting process is illustrated by the first-order Markov chain process. The parameters values are estimated using The Expectation-maximization (EM) algorithm. After The required parameter values are obtained, traffic flow is estimated using the Observation and transition-based most likely estimates Tracking Particle Filter (OTPF). To Examine the accuracy of the model has been made, the model estimation results are compared with the actual traffic flow data. Traffic flow data is collected on Monday 20 September 2017 at 06.00 to 10.00 on Dipatiukur Road, Bandung. The proposed model has accuracy with MAPE value below 10%, or falls into highly accurate categories.
An Information Sharing System for Multi-Professional Collaboration in the community-based integrated healthcare system
Hideaki Kanai;
Akinori Kumazawa
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 2 No 1 (2021): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (695.428 KB)
|
DOI: 10.34010/injiiscom.v2i1.4862
Currently, Japan is rapidly aging. Japanese government agencies report that the percentage of elderly people whose ages are at least 65 years will increase by up to about 30 percent in 2025. As one of the measures towards this situation, the community-based integrated healthcare system will be introduced in Japan. The system aims to provide elderly people living at home with appropriate health, medical, and welfare services. We focus on the burden of sharing information on the situation of the elderly at home among health, medical, welfare staffs, and neighbors. We have been developing a supporting system for sharing information on the situation of the elderly at home and conducted a field test around one year. We consider that various stakeholders involved in the community comprehensive health care system could recognize the importance of information sharing and collaboration with them through this kind of social implementation
Implementation of Information System in Indonesian Traditional Beverage Businesses
Hadi Purnomo;
F R Fitrah;
R Maulana;
M M Pratadina
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol 2 No 1 (2021): International Journal of Informatics, Information System and Computer Engineering
Publisher : Universitas Komputer Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1019.069 KB)
|
DOI: 10.34010/injiiscom.v2i1.4863
This study aims to apply the information system to every business owner who can inform businesses beverage container business through information technology. The function of this information system's application is for business owners and customers interested in buying products business. This study is an application of information systems in the Indonesian Traditional Beverage Business. This study's method was conducted using qualitative descriptive writing method of collecting data through literature study and observation to the growing beverage business owners. Information system development is conducted using the waterfall method. The results of this study show an overview of how the information system is expected by the business owner as well as the beverage business impact that can provide the quality of the business product beverage business is being run. The conclusion is that there is a large information container such as a website application applied to the Indonesian traditional beverage business so that website visitors can see, buy, or provide suggestions or comments regarding the already available products