cover
Contact Name
-
Contact Email
ijconsist@upnjatim.ac.id
Phone
+6281999471017
Journal Mail Official
ijconsist@upnjatim.ac.id
Editorial Address
https://ijconsist.org/index.php/ijconsist/about/editorialTeam
Location
Kota surabaya,
Jawa timur
INDONESIA
International Journal Of Computer, Network Security and Information System (IJCONSIST)
ISSN : -     EISSN : 26863480     DOI : https://doi.org/10.33005/ijconsist.v3i1
Core Subject : Science,
Focus and Scope The Journal covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 56 Documents
Android GIS-Based Information System Applying Dijkstra Algorithm For Finding The Nearest Tourist Spots in Sumenep District Khairil Anam; Muhammad Yunus
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (535.854 KB) | DOI: 10.33005/ijconsist.v1i1.4

Abstract

Abstract— Sumenep is listed in the eastern end of Madura Island. It takes more than four hours to reach Sumenep by bus or taxi from Surabaya. Sumenep has some interesting sites to visit. Besides historical sites like Kraton, Traditional Art and Cultural Attractions as Mask Dance and Bull Race, it also has beautiful beaches to see, such as; Lombang beach, Slopeng beach, Sembilan beach, Gili Labak and Gili Iyang which have the best oxygen levels in the world. However, mostly first visitors have a little bit difficulty to get information about it because the lack of detail information and schedule when the even held. In order to give brief information about it, researcher conduct the study which build an Android-based Geographic Information System using the Dijkstra Algorithm, which is expected to help them in displaying routes from one tourist spot to another. The Author applied the shortest route search algorithm, Dijkstra's algorithm, because this method can calculate the closest distance, both the distance between one tourist spot to another tourist spot, as well as the distance between the position of the user to the tourist place in the city of Sumenep.
Determination Of Traffic Lights Duration By Identification Of Vehicle Numbers Using IoT Slamet Winardi; Sandi Ifan Maulana; Sri Wiwoho Mudjanarko; Benediktus Anindito
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (966.367 KB) | DOI: 10.33005/ijconsist.v1i1.5

Abstract

Abstract— This research aimed to reduce the duration of time for quiet roads. Each motorized vehicle installed a WeMos chip as a client that contained each vehicle's license plate data. In the middle of the intersection, WeMos chip was installed as a traffic light controller to determine the duration and connect with cloud internet as a database server. It was installed at a distance of 50 meters as a scanner. It also detected the direction of arrival of motorized vehicles. Then, it would send the data to the cloud. It regulated the duration of the traffic light based on the data received and processed by the database server in each lane at the intersection. Determining the duration of traffic lights was based on sample time of motorcycles and cars, 1 second for motorcycles and 3 seconds for cars. This determination depended on the number of road junctions installed by this system. It was made standard, namely the total duration of time divided by the number of intersections. This time duration would run in a fixed order. If the number of vehicles on each track was as dense, it would skip certain paths. If one of the lanes did not have a vehicle, it would reduce the crowded of motorized vehicles from the other lanes because it would get a green light turn again without waiting for the time from the empty lane. In conclusion, it would be able to break down traffic density by giving priority time duration scale based on the calculation of the number of motorized vehicles by identifying the SSID of the vehicle license plate.
eNodeB Position Forecasting of LTE Based On BTS Existing Using Fuzzy C-Means and Harmony Search Methods I Kadek Susila Satwika; Made Hanindia Prami Swari
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1249.652 KB) | DOI: 10.33005/ijconsist.v1i1.6

Abstract

Abstract— Fourth generation technology that is 4G LTE (Long Term Evolution) on mobile network has been developed in Indonesia. These developments force telecommunication service providers to upgrade existing infrastructure to the latest technology. The service upgrade process to the latest generation in this 4G LTE service utilizes existing base stations as BTS with the latest technology called eNodeB. In fact, not all existing BTS will be upgraded to eNodeB in the time span until 2020 with consideration of the traffic conditions of 4G LTE users and the resulting coverage. Therefore, a plan is required with a method that can provide solutions in optimizing the utilization of existing base stations as new eNodeB 4G LTE in the city of Denpasar. This research has proposed Fuzzy C-Means method to get eNodeB cluster center point for clustering process followed by optimization process using Harmony Search method. This study uses several variables for the optimization process, including: Denpasar city traffic, number of eNodeB needs in 2020, and coverage of each existing BTS. The result of the planning simulation shows that the optimal existing base station is used as the 123 BTS eNodeB site of 211 BTS, and there are 41 new potential eNodeB points considered optimal with total path loss value of 136085,8338 dB.
Measurement of the Similarity of Indonesian Papers on One Journal Topic with the Naive Bayes Algorithm and Vector Space Model Ni Luh Wiwik Sri Rahayu Ginantra; Ni Wayan Wardani
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (718.078 KB) | DOI: 10.33005/ijconsist.v1i1.7

Abstract

Abstract— One way to maintain the quality of scientific work in Indonesia is by checking articles before they are published. Checking before the publication was done so that the similarity level is not high because the published papers can be quoted to cause a high level of similarity. The next problem is the importance of grouping topic papers, where papers to be checked should have the same category as comparative papers. In this study, to classify the topic of the journal using the Naïve Bayes algorithm and to measure the similarity of papers using the Vector Space Model method. Naïve Bayes algorithm can better classify the test data with the .docx file format than to the test data in the .pdf file format. The results of the calculation of text similarity detection by the Vector Space Model can reach 90% and above for test data with the .docx file format, while for test data with the .pdf file format the calculation results by the Vector Space Model are on average less than 90%. The results of the calculation of text similarity detection by the Vector Space Model method are also strongly influenced by training data. The more complete and complex of the training data, then more valid the results of the Vector Space Model performance testing
A Preliminary Study on Integrating Procedural Content Generation into Game Development Process Pratama Wirya Atmaja; Rizky Parlika; Sugiarto
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (620.573 KB) | DOI: 10.33005/ijconsist.v1i1.8

Abstract

Abstract— Digital game industry continues to grow and reap enormous profit. On the other hand, game development is still a risky and costly endeavor, and researches on reducing its risks and costs continue to be important. Procedural content generation or PCG is the state-of-the-art method to speed up and automate the production of various game contents, therefore reducing the said costs and risks. However, how to integrate the method into the lengthy process of game development is still not well understood. In this paper we present a preliminary study on the integration. For the development process, we combine MDA or Mechanics-Dynamics-Aesthetics framework with SCRUM-based Agile methodology. The PCG method for our study is for generating levels of platformer games. We study how the PCG method would be developed in pre-production and production phases with the help of two common development tools, Game Design Document (GDD) and user stories. We discuss our findings and possible directions of future researches.
Game Gatotkaca Adventure On Java’s Island Deni Rinaldi; Muchammad Naseer; Nova Agustina
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.902 KB) | DOI: 10.33005/ijconsist.v1i1.11

Abstract

Abstract— Indonesia has a variety of cultures and traditional arts spread from Sabang to Merauke with the uniqueness and characteristics of each culture itself. Wayang is one of the most prominent peaks of Indonesian culture and art among many other cultural works. Gatotkaca is an adaptation of Indian literature, namely Ramayana and Mahabarata. Game is one of the media that can be used in conveying a goal. The objectives contained in the game have various types of education, entertainment and simulation. At this time the game is growing and there are also many applications and libraries that are used to develop games. For example Construct 2, Game Maker: Studio, Unity, Godot Game Engine, Unreal Engine 4 and others. With this application, the authors hope this application becomes an interactive and interesting learning media so that it can help provide education, and preserve Indonesian culture, especially in Indonesian wayang.
Handwriting Character Recognition Javanese Letters Based on Artificial Neural Network Ariyono Setiawan; Achmad Setya Prabowo; Eva Y Puspaningrum
IJCONSIST JOURNALS Vol 1 No 1 (2019): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (528.699 KB) | DOI: 10.33005/ijconsist.v1i1.12

Abstract

Abstract— Javanese character is one of Indonesia's cultural heritages that must be preserved. Manuscript form of the Javanese character is one of the priceless inheritances. Javanese characters are often called the Hanacaraka font. The development of technology especially in the field of image processing is one method to preserve the culture. The development of image processing methods for detecting characters from images with fewer errors is a great task. The purpose of this research is to create a system of Javanese character recognition from the handwriting into Latin character, so that the young generation can learn the form of Javanese character easily. The method used in this research is back-propagation as a classification method. The trial result of this recognition is to have accuracy 74 %.
Wireless LAN Network Authentication Captive Portal Nita Rosa Damayanti; Muhammad Sobri
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1023.109 KB) | DOI: 10.33005/ijconsist.v1i2.13

Abstract

The development of wireless networks is needed to improve security and comfort when using it because of the current management of the hotspot network at PT. Tri Sapta Jaya which uses the old system has many shortcomings because there is no monitoring system and the use of the same password for each user and there are no data restrictions. To overcome these shortcomings, a new system is needed, using the Mikrotik Routerboard-based Captive portal authentication system that can be used to create an account for each different user to log in to the portal that will appear in the browser when connected to the network and the administrator can monitor devices that are connected to the network. hot spot. In research to develop the Captive portal system several stages are carried out using the waterfall system development method, namely analysis, design, implementation, testing and maintenance, in which case the research can produce a security system that runs optimally, safely, comfortably and efficiently.
Mathematical Formulas Application For Elementary School Students Using Framework Codeigniter Rayhan Aulia
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.299 KB) | DOI: 10.33005/ijconsist.v1i2.14

Abstract

Mathematics is one of the many sciences that are utilized in everyday life. Both in general and specifically. By using a basic mathematical formula, here, the author tries to review the formulas that have been studied by students from elementary school through high school. This web-based application uses codeigniter which contains 30 basic mathematical formulas.
Smart Parking System using Android and QR Code for Widyatama University Yuqbal Faza Aula Dipa Faza
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.403 KB) | DOI: 10.33005/ijconsist.v1i2.15

Abstract

With so many vehicle users, a new problem arises, namely the unorganized parking lot with the lack of a proper parking management system. These create various problems for vehicle users who want to park their vehicles, such as losing much time to find an empty parking space, besides that a manual parking payment system can result in long queues at payment counters and this happened at Widyatama University because it needs the right solution to overcome these problems. With the concept of a smart parking system that uses the QR Code for user convenience. This system can run on cellular platforms with a visual display that makes it easy for users. Besides, users can reserve a parking space before parking their vehicle. With additional features of the automatic payment system (E-money). This system can streamline time and efficiency. The research method was carried out using a prototype method in the method of making the system a structured process and has several stages that must be passed. Therefore this method aims to design cellular applications, "Parkirin Aja!".