cover
Contact Name
Muhamad Muslihudin
Contact Email
muslihudinstmikpsw@gmail.com
Phone
-
Journal Mail Official
lppm@stmikpringsewu.ac.id
Editorial Address
-
Location
Kab. pringsewu,
Lampung
INDONESIA
IJISCS (International Journal Of Information System and Computer Science)
ISSN : 25980793     EISSN : 2598246x     DOI : -
Core Subject : Science,
The International Journal Information System and Computer Science (IJISCS) is a publication for researchers and developers to share ideas and results of software engineering and technologies. These journal publish some types of papers such as research papers reporting original research results, technology trend surveys reviewing an area of research in software engineering and technologies, survey articles surveying a broad area in software engineering and technologies. The scope covers all areas of software engineering methods and practices, object-oriented systems, rapid prototyping, software reuse, cleanroom software engineering, stepwise refinement/enhancement, ambiguity in software development, impact of CASE on software development life cycle, knowledge engineering methods and practices, formal methods of specification, deductive database systems,logic programming, reverse engineering in software design, expert systems, knowledge-based systems, distributed knowledge-based systems, knowledge representations, knowledge-based systems in language translation & processing, software and knowledge-ware maintenance, Software Specification and Modeling, Embedded and Real-time Software (ERTS), and applications in various domains of interest.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)" : 5 Documents clear
DESIGN OF DATA COLLECTION SYSTEM OF LECTURER’S RESEARCH AT INSTITUTE INFORMATICS AND BUSINESS DARMAJAYA LAMPUNG Sutedi Sutedi; Melda Agarina
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (267.264 KB) | DOI: 10.56327/ijiscs.v2i3.709

Abstract

In order to spur the quantity and quality of research is one of the basic tasks of the lecturer, Institute Informatics and Business Darmajaya Lampung facilitate the professors to be able to participate in a range of grants to help financing research lecturer.  With a growing number of studies professors proposed then it should be when logging the lecturer research done in a better. Utilization of information technology is the right information to perform data management information can be either information related to it or also as tool of checking data in order to reduce plagiarism practices and publishing redundancy title research
E-COMMERCE IMPLEMENTATION IN CAKE STORE MBA WATI IN SUKARAJA 2 GEDONGTATAAN Nova Puspitasari
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.738 KB) | DOI: 10.56327/ijiscs.v2i3.706

Abstract

KueMbaWati is a small business that is engaged in selling cakes at this time. The sales system in the Cake Shop MbaWati in sales and purchases is still manual or the customer comes directly to the location. Meanwhile, in promoting its products to customers, KueMbaWati still uses brochures. Such a promotion system is felt to be less than optimal, due to the lack of information provided regarding the product details offered. The development of E-Commerce Applications in the MbaWati Cake Shop is a step to increase sales and facilitate product promotion, so that it can provide benefits for business owners. With this E-Commerce application, customers can order products online. E-Commerce at the MbaWati Cake Shop designed using modeling with the SDLC method (Systems Development Life Cycle) is expected to increase sales and facilitate the making of its implementation.E-Commerce, MbaWati Cake Sho
ANDROID-BASED LECTURE ROOM SCHEDULING APPLICATION (CASE STUDY : STMIK PRINGSEWU CAMPUS) Dela Jemirnia; Angger Purno Nugroho; Sucipto Sucipto
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.332 KB) | DOI: 10.56327/ijiscs.v2i3.707

Abstract

Technological developments are increasingly rapid and fast, especially and communication technology. For all fields, starting the fields of buying and selling, education, health, and others. The communication and information technology very helpful in various ways from the word of lecturers, campus staff, and students. STMIK Pringsewu still use manual, student still have to see schedule of waiting room of STMIK Pringsewu. Application development using php script. The method used to develop this system is by System Development Life Cycle approach with stages and design using Data Flow Diagram modelling. Based on the results of system testing, Application and Scheduling Applications are designed in accordance with the expected, it can be concluded that the application design courses and lecture room based on Android is work and function. 
SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS M Geetha; K Akila
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (281.174 KB) | DOI: 10.56327/ijiscs.v2i3.708

Abstract

With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;
APPLICATION OF E-TRANSPORT TROUGHT DESIGNING TIKETING INFORMATION SYSTEM USING DIAGRAM ACTIVITIES Andri Sihata Sitanggang
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (267.929 KB) | DOI: 10.56327/ijiscs.v2i3.710

Abstract

E-Transport is a form of service / facility provided to the public in the field of transfer using electronic media. E-transport itself can be in the form of a guide to route use services on transportation, road monitoring services to transportation users in real time, services such as booking tickets for a transportation service provider, services such as gps guiding vehicles for travel and other security services. One of the services that is currently developing in the community is travel services, where travel services provide transportation services based on the destination location. In the city of Bandung itself travel services have been very much, but the problem that occurs is how to provide maximum service to the community, especially in booking tickets, not only fixated on the convenience of transportation services, but travel booking service services are also very important . Travel booking services should have been greatly paid attention to by travel service providers, so that people are accustomed to and believe in using travel services rather than having to use private vehicles so as to reduce the amount of transportation in the city of Bandung. So this research is based on improving the quality of service providers in the city of Bandung.

Page 1 of 1 | Total Record : 5


Filter by Year

2018 2018


Filter By Issues
All Issue Vol 7, No 1 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 1 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 2 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 2 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 3 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 3 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 2 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 1 (2017): IJISCS (International Journal of Information System and Computer Science) More Issue