cover
Contact Name
Muhamad Muslihudin
Contact Email
muslihudinstmikpsw@gmail.com
Phone
-
Journal Mail Official
lppm@stmikpringsewu.ac.id
Editorial Address
-
Location
Kab. pringsewu,
Lampung
INDONESIA
IJISCS (International Journal Of Information System and Computer Science)
ISSN : 25980793     EISSN : 2598246x     DOI : -
Core Subject : Science,
The International Journal Information System and Computer Science (IJISCS) is a publication for researchers and developers to share ideas and results of software engineering and technologies. These journal publish some types of papers such as research papers reporting original research results, technology trend surveys reviewing an area of research in software engineering and technologies, survey articles surveying a broad area in software engineering and technologies. The scope covers all areas of software engineering methods and practices, object-oriented systems, rapid prototyping, software reuse, cleanroom software engineering, stepwise refinement/enhancement, ambiguity in software development, impact of CASE on software development life cycle, knowledge engineering methods and practices, formal methods of specification, deductive database systems,logic programming, reverse engineering in software design, expert systems, knowledge-based systems, distributed knowledge-based systems, knowledge representations, knowledge-based systems in language translation & processing, software and knowledge-ware maintenance, Software Specification and Modeling, Embedded and Real-time Software (ERTS), and applications in various domains of interest.
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)" : 6 Documents clear
IMPLEMENTATION OF PUSH NOTIFICATION TECHNOLOGY DURING THE GENERAL ELECTION PERIOD (PEMILU) TO SUPPORT E-GOVERNMENT Endang Lestari Ruskan; Rahmat Izwan Heroza; Apriansyah Putra; Rudi Sanjaya
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1113

Abstract

Since 2019, simultaneous regional head elections in Indonesia. Elections elect governors and deputy governors, regents and deputy regents, mayors and deputy mayors, members of provincial councils, and members from regency/municipal councils simultaneously. With the increase in the number of pairs of candidates selected, the information about the profiles of spouses, and the schedule of activities of the employee implementation team increases. So far, schedules obtained from banners, posters, television, radio, and others. With the development of technology, people are increasingly familiar with using the web, and gadgets information is received more quickly through social media. The purpose of this study is to apply push notification technology as a schedule reminder system for the team and the community during the election period, whether the incoming messages are read. The development method used is the waterfall: 1) analysis; 2) design; and 3) Implementation; and 4) Maintenance. The web-based notification system supports government services to employees (G2E) and government to the public (G2C) to make it easier to remember campaign schedules and other election activities, accurately and up-to-date so that they can get to know more about the profiles of candidate pairs. 
DATA LOSS PREVENTION USING POST QUANTUM CRYPTOGRAPHY: OVERVIEW OF ROUND-3 ALGORITHMS Augustine Chidiebere Onuora; Prince Ana; Anthony O Otiko; Chibuike Ezeocha Madubuike
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1061

Abstract

The current hype of quantum computing has necessitated the need for computer security stakeholders to call for the design of security algorithms that will be quantum efficient when quantum computers finally grace our computing sphere. Recent advancements in quantum computing have made cryptographic schemes more vulnerable to quantum attacks like Shor’s algorithm and Grove’s algorithm. Therefore NIST call for a new set of algorithms known as Post-Quantum cryptography that would be quantum proof is imminent.  Many Post quantum algorithms have been designed and tested. But only few of them made it to the round 3 (the final round). This paper reviewed these post quantum candidates. Literatures highlighting their scheme, properties, implementation and areas of security coverage was reviewed. Recommendations on future research areas in this field was itemized for this novel security paradigm as we await the final standardization of this cryptosystems.
STOCK MARKET FORECASTING: A REVIEW OF LITERATURE Srivatsa Maddodi; K. G. Nandha Kumar
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1064

Abstract

Prediction of stock markets is a complex and challenging task due to price data generated is huge in volume, changes every second, sensitive to human emotions (fear), actions (Wars) and natural disasters (floods, famine, earthquake). Many Methods have been used to predict the stock price like Technical Analysis, Time Series, Fundamental analysis, etc. Prediction of stock price provides knowledgeable information about the status of the stock price and will also help in decision making for the investors. Much research has been carried out in prediction of stock prices using different approaches of Machine Learning techniques, Deep Learning, Sentiment Analysis etc. This paper explores and reviews some of the recent works carried out in predicting stock prices. 
DECISION SUPPORT SYSTEM DETERMINATION OF CUSTOMER SATISFACTION LEVEL OF ORIFLAME PRODUCTS WITH ANALYTIC HIERARCHY PROCESS METHOD Muhamad Muslihudin; Nur Latifah; Trisnawati Trisnawati
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1075

Abstract

In order to improve customer satisfaction with Oriflame products, customer satisfaction was studied. Find out how Oriflame can satisfy customers through its products, services, finances, delivery, and company conditions. In this research, information marketing research is needed to understand how customers behave and the criteria that are very important when deciding how customers make decisions about Oriflame products. At this stage of research, researchers analyze existing systems by conducting library research and direct observation. In order to calculate the customer satisfaction level, the AHP (Analytic Hierarchy Process) method is used. By using this decision support system, it is expected to make it easier for companies and sellers to determine customer satisfaction with Oriflame products.
FEATURE EXTRACTION AND K-MEANS CLUSTERING APPROACH TO CLASSIFY THE COVID-19 LUNG CT-SCAN IMAGE Karina Auliasari
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1109

Abstract

Feature extraction is the most important step in the classification process. Feature extraction is a method to obtain some statistical features about the image. The level of accuracy in the classification depends on the feature extraction. For detecting COVID-19, there are many features that can be used to classify them, including morphological feature extraction, first-order and second-order textures (GLCM). In this research, some features are used such as eccentricity, metric, mean, variance, skewness, contrast, correlation, energy, and homogeneity, which are then classified by the K-Means Method. The morphological feature data for cluster 1 is 98 data points and cluster 2 is 32 data points. The first-order texture feature data for cluster 1 is 88 data points, and cluster 2 is 42 data points. The last one uses GLCM data for cluster 1, and there are 75 data points, while cluster 2 has 55. From the calculation of accuracy, sensitivity, specificity, precision, and recall, the highest value is 50% for first-order texture extraction data, while the morphological feature extraction and GLCM data are 49.23% and 47.69%.
NETWORK SIZE SIMULATION-BASED STUDY OF ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORK Augustine Chidiebere Onuora; Eyo Edmund Essien; Felix U Ogban
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1060

Abstract

The extensive potential of wireless ad hoc networks in many different fields has recently gained significant research attention. Multihop routing is an important aspect that determines the overall network performance to a large extent. Several routing protocols for wireless ad hoc networks have been proposed with the aim of optimizing various aspects of network routing. As networks grow in size, computer network performance analysis becomes increasingly necessary. A simulation approach is often very useful. This research studies three common routing protocols for wireless ad hoc networks to compare the performance as it relates to the network size. Protocols considered in this study are; Ad hoc On-Demand Distance Vector (AODV), Destination-Sequenced Distance Vector (DSDV), and Optimized Link-State Routing Vector (OLSR) classified as reactive routing protocol (AODV) and proactive routing protocol (OLSR and DSDV). These protocols were simulated using the Network Simulator 3 (NS3) using a performance-compared based on the size of the network. Varying network sizes of 30, 60 and 100 nodes were simulated. The result showed that AODV performed better as the network size increases.

Page 1 of 1 | Total Record : 6


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 7, No 1 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 1 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 2 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 2 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 3 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 3 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 2 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 1 (2017): IJISCS (International Journal of Information System and Computer Science) More Issue