+62 813-8532-9115 info@scirepid.com

 

Article indexed DOI

International Journal of Information Engineering and Science

Tahun , Volume , Issue .
 
The Role of Evaloexam in Fostering Technological Innovation and Entrepreneurship in Education (Ekky Mulia Lasardi, Saniyyah Wafa Nurjihan, Dimas Akbar Tama, Wien Kuntari)
DOI : 10.62951/ijies.v2i1.132 - Volume: 2, Issue: 1, Sitasi : 0
10-Dec-2024 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Comparative Investigation of Activity Rendering Utilizing Eevee, Cycles, and Radeon ProRender Procedures in Blender Applications (Ira Zulfa, Richasanty Septima, Iryana Rezeki, Rayuwati Rayuwati)
DOI : 10.62951/ijies.v2i1.147 - Volume: 2, Issue: 1, Sitasi : 0
28-Jan-2025 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Information System Audit on the Catatmak Application on the Web and Playstore Using the Cobit Framework for Financial Recording (Fariz Nur Fikri Zaki, Putri Awaliatuz Zahra, Vidia Alma Cyrilla, Wahyu Latifatun, Jeffri Prayitno Bangkit Saputra)
DOI : 10.62951/ijies.v2i1.135 - Volume: 2, Issue: 1, Sitasi : 0
13-Jan-2025 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Optimizing Shortest Job First (SJF) Scheduling through Random Forest Regression for Accurate Job Execution Time Prediction (Aditya Putra Ramdani, Achmad Solichan, Basirudin Ansor, Muhammad Zainudin Al Amin, Nova Christina Sari, Kilala Mahadewi)
DOI : 10.62951/ijies.v1i3.138 - Volume: 1, Issue: 3, Sitasi : 0
31-Aug-2024 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Black Box Testing on the Wingpos Website Using the Equivalence Partitioning Technique (Jauza Nadhifah, Muhammad Al Amin, Capriandika Putra Susanto, Muhammad Galuh Gumelar, Anka Luffi Ramdani, Gema Parasti Mindara, Aditya Wicaksono)
DOI : 10.62951/ijies.v1i4.128 - Volume: 1, Issue: 4, Sitasi : 0
30-Nov-2024 | Abstrak | PDF File | Resource | Last.13-Aug-2025
Automatic Passenger Counting System on Public Buses Using CNN YOLOv8 Model for Passenger Capacity Optimization (Ari Dian Prastyo, Sharfina Andzani Minhalina, Surya Agung, Denty Nirwana Bintang, Muhammad Yordi Septian, Endang Purnama Giri, Gema Parasti Mindara)
DOI : 10.62951/ijies.v1i4.121 - Volume: 1, Issue: 4, Sitasi : 0
22-Nov-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Parking Slot Scanning for Maximum Efficiency Using Python (Algyon Faras, Gany Andisa, Nakula Bintang Nashwandra, Jauza Nadhifah, David Reza Widhiwipati, Endang Purnama Giri, Gema Parasti Mindara)
DOI : 10.62951/ijies.v1i4.122 - Volume: 1, Issue: 4, Sitasi : 0
23-Nov-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Expert System for Autoclave Damage Detection Using the Fuzzy Logic Method (Ilham M Rusdiyanto, Sri Arttini Dwi Prasetyowati, Eka Nuryanto Budisusila)
DOI : 10.62951/ijies.v1i4.124 - Volume: 1, Issue: 4, Sitasi : 0
23-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Enhancing Cybersecurity Posture: A Framework for Anomaly Detection in Cloud Computing Environments (David Jackson, Barbara Harris, Richard Clark)
DOI : 10.62951/ijies.v1i3.66 - Volume: 1, Issue: 3, Sitasi : 0
30-Aug-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security (Wahyu Wijaya Widiyanto, Rizka Licia)
DOI : 10.62951/ijies.v1i4.48 - Volume: 1, Issue: 4, Sitasi : 0
15-Oct-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
An Enhanced Machine Learning Model for Real-Time Anomaly Detection in Cyber-Physical Systems (Karen Robinson, Nancy Allen, Christopher Young)
DOI : 10.62951/ijies.v1i3.67 - Volume: 1, Issue: 3, Sitasi : 0
30-Aug-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Natural Language Processing For Automatic Sentiment Analysis In Social Media Data (Siti Rahmawati, Dewi Anggraini, Rizki Kurniawan)
DOI : 10.62951/ijies.v1i1.54 - Volume: 1, Issue: 1, Sitasi : 0
29-Feb-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Optimizing the Transmission of Church Information Through the Design Thinking-Based Church News Application (Gunawan Prayitno, Jenny Tandi)
DOI : 10.62951/ijies.v1i3.44 - Volume: 1, Issue: 3, Sitasi : 0
15-Aug-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
A Comparative Analysis of Cryptographic Algorithms for Secure Data Transmission in 5G Networks (Rajesh Kumar, Neha Gupta, Arun Mehta)
DOI : 10.62951/ijies.v1i2.88 - Volume: 1, Issue: 2, Sitasi : 0
30-May-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Literature Review on Histogram-Based Image Forensics for Recaptured Image Detection (Nathanael David Christian Barus, Nayem Kibriya, Natasha Fedora Barus)
DOI : 10.62951/ijies.v1i3.35 - Volume: 1, Issue: 3, Sitasi : 0
01-Jul-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
A Comparative Study of Edge and Cloud Computing Architectures for Industrial IoT Applications (Muhammad Arifin, Ali Ramadhan, Hendra Wijaya)
DOI : 10.62951/ijies.v1i1.52 - Volume: 1, Issue: 1, Sitasi : 0
29-Oct-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Optimizing Energy Consumption in Data Centers Using Machine Learning-Based Predictive Analytics (James Wilson, Patricia Taylor, Elizabeth Thomas)
DOI : 10.62951/ijies.v1i1.51 - Volume: 1, Issue: 1, Sitasi : 0
29-Feb-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Blockchain-Based Secure Data Sharing Framework For Healthcare Information Systems (David Williams, Jessica Taylor, William Thompson)
DOI : 10.62951/ijies.v1i1.55 - Volume: 1, Issue: 1, Sitasi : 0
29-Oct-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Using Natural Language Processing to Enhance Customer Sentiment Analysis in Ecommerce (Andi Prasetyo, Rina Dwi Lestari, Rudi Hartono)
DOI : 10.62951/ijies.v1i2.90 - Volume: 1, Issue: 2, Sitasi : 0
30-May-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Online Class UI/UX Design Using Design Thinking Method in Virtual Reality Environment (Bosya Perdana, Tata Sutabri)
DOI : 10.62951/ijies.v1i4.114 - Volume: 1, Issue: 4, Sitasi : 0
20-Nov-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
Application of Edge Computing for RealTime Data Processing in Smart Cities (Agus Supriyanto, Joko Santoso)
DOI : 10.62951/ijies.v1i2.89 - Volume: 1, Issue: 2, Sitasi : 0
30-May-2024 | Abstrak | PDF File | Resource | Last.27-Jul-2025
IoT, Anomaly Detection, Machine Learning, K-Nearest Neighbors, Random Forest, Real-Time Detection (James Anderson, Emily Johnson, Michael Brown)
DOI : 10.62951/ijies.v1i1.50 - Volume: 1, Issue: 1, Sitasi : 0
29-Feb-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Blockchain-Based Data Integrity Management System for Decentralized Cloud Computing (Juan Pablo Azzollini, María Elena García, Nicolás L. Zubeldía)
DOI : 10.62951/ijies.v1i2.87 - Volume: 1, Issue: 2, Sitasi : 0
30-May-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Enhancing Cybersecurity Through AI-Driven Intrusion Detection Systems in Industrial Control Systems (Alikhan Bekzhanov, Aizada Sadykova, Yerzhan Mukhamedi)
DOI : 10.62951/ijies.v1i2.91 - Volume: 1, Issue: 2, Sitasi : 0
30-May-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Utilization Application and System Geographical Information Website: Systematic Literature Review (Muhamad Rizky)
DOI : 10.62951/ijies.v1i4.101 - Volume: 1, Issue: 4, Sitasi : 0
12-Nov-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Processing Student Comments on Understanding of Lecture Materials Using Rule Based Automata Finite State Model (Febri Febri, Suharmanto Suharmanto)
DOI : 10.62951/ijies.v1i3.45 - Volume: 1, Issue: 3, Sitasi : 0
23-Aug-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025
Implementation of IT Governance in the Design of Expert Systems for Improving Library User Services (Muhammad Wahyudi, Darmeli Nasution)
DOI : 10.62951/ijies.v1i2.117 - Volume: 1, Issue: 4, Sitasi : 0
21-Nov-2024 | Abstrak | PDF File | Resource | Last.06-Aug-2025