cover
Contact Name
Muhamad Muslihudin
Contact Email
muslihudinstmikpsw@gmail.com
Phone
-
Journal Mail Official
lppm@stmikpringsewu.ac.id
Editorial Address
-
Location
Kab. pringsewu,
Lampung
INDONESIA
IJISCS (International Journal Of Information System and Computer Science)
ISSN : 25980793     EISSN : 2598246x     DOI : -
Core Subject : Science,
The International Journal Information System and Computer Science (IJISCS) is a publication for researchers and developers to share ideas and results of software engineering and technologies. These journal publish some types of papers such as research papers reporting original research results, technology trend surveys reviewing an area of research in software engineering and technologies, survey articles surveying a broad area in software engineering and technologies. The scope covers all areas of software engineering methods and practices, object-oriented systems, rapid prototyping, software reuse, cleanroom software engineering, stepwise refinement/enhancement, ambiguity in software development, impact of CASE on software development life cycle, knowledge engineering methods and practices, formal methods of specification, deductive database systems,logic programming, reverse engineering in software design, expert systems, knowledge-based systems, distributed knowledge-based systems, knowledge representations, knowledge-based systems in language translation & processing, software and knowledge-ware maintenance, Software Specification and Modeling, Embedded and Real-time Software (ERTS), and applications in various domains of interest.
Arjuna Subject : -
Articles 111 Documents
HIGH CAPACITY AND OPTIMIZED IMAGE STEGANOGRAPHY TECHNIQUE BASED ON ANT COLONY OPTIMIZATION ALGORITHM A Piya
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.117 KB) | DOI: 10.56327/ijiscs.v3i1.720

Abstract

The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embedding capacity.
ONLINE COOPERATIVE APPLICATION FOR COFFEE FARMER GROUP IN PAGAR ALAM CITY Heriansyah Heriansyah; Putri Maharani
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (236.412 KB) | DOI: 10.56327/ijiscs.v3i1.715

Abstract

The city of Pagar Alam with the commodity of coffee plants with an area of 8,323 ha with a total production of 7,465.50 tons. The coffee plants produced by 90% of robusta types are the result of export commodities and have become a mainstay of the city's economy. Harapan Jaya farmer group located in Pagar Alam Utara sub-district, Pagar Alam City has a system of selling and marketing carried out individually through middlemen and not through coffee farmer groups. Marketing of coffee products to various cities through middlemen unwittingly has eliminated the distinctive characteristics and quality of Pagar Alam coffee because it has been processed and mixed with coffee from outside the city of Pagar Alam. The Participatory Action Research (PAR) model is used in this study as a research method approach, where researchers invite and involve coffee farmer groups as active participants in a concrete action where they themselves experience problems in order to change, improve, build and use a system built . The online cooperative application was built by collecting data related to the coffee sales system in Harapan Jaya coffee farmer group in the city of natural fences, then the researchers analyzed and designed the system based on existing data. Features in online cooperative applications can run well after implementation and testing. Deepening cooperative concepts that are more detailed such as adding business and other cooperative activities can be applied to online cooperative applications to further perfect this application.
IMPLEMENTATION OF TOPSIS METHOD SELECTION OF STUDENT ACHIEVEMENT LANE STMIK PRINGSEWU Sucipto Sucipto; Deni Kurniawan Wibisono
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.508 KB) | DOI: 10.56327/ijiscs.v3i1.725

Abstract

New admissions is a routine activity carried out by all universities in Indonesia each year. These activities may be regarded as the starting point of the search process for new students STMIK Pringsewu quality. At this time the data processing for selecting new students achievement lane STMIK Pringsewu still using Microsoft Excel. The processing of value requires a long time, especially in the process of selection and ranking process. Decision support system is the right system to be implemented, because the decision support system can help make decisions based on the same criteria. The method used in this research is the method of TOPSIS (Technique for Order Preference by Similarity to Ideal Solution). Selection of new students STMIK Pringsewu using TOPSIS method. results of a decision support system using the method of TOPSIS (Technique for Order Preference by Similarity to Ideal Solution)to assist and facilitate Universities in determining which students are competent or not get into college STMIK Pringsewu use the path of achievement.
CUSTOMER COMPLAINT INFORMATION SYSTEM AT NATIONAL STANDARDIZATION AGENCY OF INDONESIA Yuwan Jumaryadi
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (261.997 KB) | DOI: 10.56327/ijiscs.v3i2.740

Abstract

Technological developments changes the flow of information, where anyone can receive information easily. BSN as an Indonesian non-ministerial government institution needs to think about customer satisfaction with the services that provided. Completion of customer complaint is an important thing in fulfillment customer satisfaction. At present, the delivery of information regarding complaints against BSN services is still done in a conventional manner, where each user submits a complaint directly to the Helpdesk. However, in this case the section head is difficult to monitor every complaint that exists to improve the SLA. By proposing an Customer Complaint information system that can monitor customer complaints, it is hoped that it can improve service to any complaints that exist. This research is expected to assist users so that any complaints submitted can be resolved immediately, and are expected to increase SLA.
ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG Arif Hidayat
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (358.537 KB) | DOI: 10.56327/ijiscs.v3i2.742

Abstract

Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS M Geetha; K Akila
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (281.174 KB) | DOI: 10.56327/ijiscs.v2i3.708

Abstract

With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;
DEVELOPMENT OF ELECTRIC CUSTOMER RELATIONSHIP MANAGEMENT FOR ACCELERATION OF CLAIM SERVICES AND COMPLETION FOR CUSTOMER COMPLAINTS IN LIFE INSURANCE COMPANY Riri Fajriah; Nia Rahma Kurnianda
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (66.16 KB) | DOI: 10.56327/ijiscs.v3i2.755

Abstract

Implementation of e-Customer Relationship Management (e-CRM) in financial services industry will give influence to increase customer loyalty. One indicator of this is the development of features in the e-CRM application that make access easy for customers. However, the development of the e-CRM model is generally applied to the banking sector, while customer service needs in other financial services sectors such as insurance company are equally important. One of the main problems in life insurance companies is the measurement of claims service level agreement. In this research we intend to design an e-CRM application that can facilitate the management of complaints and claims reports in a life insurance company more effectively. The e-CRM application can also facilitate measurement of customer service staff performance in serving customers. In this research we applied the Rapid Application Development (RAD) method for development e-CRM application. The results of this research are development of e-CRM application, complaint management and supporting daily operational of customer care staff in a life insurance company. 
DECISION SUPPORT SYSTEM OF ACHIEVED STUDENTS USING WEIGHTED PRODUCT METHOD Dewi Rahayu; Siti Mukodimah
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (268.03 KB) | DOI: 10.56327/ijiscs.v3i2.800

Abstract

Constitution of the Republic of Indonesia No. 12 of 2012 that part of the national education system has a strategic role in educating the life of the nation. Students are people who are trying to develop themselves through the process of education on the path, level and type of education. The Weighted Product method is chosen because the method is solved by using multiplication to connect the value of the attribute, where the value must be raised with the attribute weight value in question. Criteria that have been determined include: average value, discipline, attendance, extracurricular, and Non-Academic. The results of this study there are 6 alternatives, obtained the value of Agus = 0.1618 as the student with the lowest value and the value of Intan = 0.1748 as the best student
APPLICATION OF E-TRANSPORT TROUGHT DESIGNING TIKETING INFORMATION SYSTEM USING DIAGRAM ACTIVITIES Andri Sihata Sitanggang
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (267.929 KB) | DOI: 10.56327/ijiscs.v2i3.710

Abstract

E-Transport is a form of service / facility provided to the public in the field of transfer using electronic media. E-transport itself can be in the form of a guide to route use services on transportation, road monitoring services to transportation users in real time, services such as booking tickets for a transportation service provider, services such as gps guiding vehicles for travel and other security services. One of the services that is currently developing in the community is travel services, where travel services provide transportation services based on the destination location. In the city of Bandung itself travel services have been very much, but the problem that occurs is how to provide maximum service to the community, especially in booking tickets, not only fixated on the convenience of transportation services, but travel booking service services are also very important . Travel booking services should have been greatly paid attention to by travel service providers, so that people are accustomed to and believe in using travel services rather than having to use private vehicles so as to reduce the amount of transportation in the city of Bandung. So this research is based on improving the quality of service providers in the city of Bandung.
MOBILE-BASED APPLICATIONS DETERMINATION OF NETWORK COMPUTER TECHNIQUES FOR VOCATIONAL COMPETENCE TESTS OF VOCATIONAL SCHOOL OF PRINGSEWU DISTRICT Erma Dwiyani; Siti Mukodimah
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v3i1.753

Abstract

Quality Vocational High Schools are viewed from the feasibility of facilities and infrastructure that help develop students' skills in the learning process so that they can meet the standards of Vocational Competency Test. The purpose of this study is to find out the quality of the Computer Network Engineering laboratory facilities owned in Pringsewu Regency. In this study five alternatives were used as samples to be tested for the feasibility of the Network Computer Engineering laboratory to determine the quality of the laboratory owned by the Vocational High School related to using the calculation process manually and the process of calculating using the system. The due diligence process uses the system faster with accurate results compared to the manual calculation process which takes a long time. Based on the comparison of the due diligence process, it can be said that the due diligence process uses a faster, more precise and easier system.

Page 4 of 12 | Total Record : 111


Filter by Year

2017 2023


Filter By Issues
All Issue Vol 7, No 1 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 1 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 2 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 2 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 3 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 3 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 2 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 1 (2017): IJISCS (International Journal of Information System and Computer Science) More Issue