cover
Contact Name
-
Contact Email
ijconsist@upnjatim.ac.id
Phone
+6281999471017
Journal Mail Official
ijconsist@upnjatim.ac.id
Editorial Address
https://ijconsist.org/index.php/ijconsist/about/editorialTeam
Location
Kota surabaya,
Jawa timur
INDONESIA
International Journal Of Computer, Network Security and Information System (IJCONSIST)
ISSN : -     EISSN : 26863480     DOI : https://doi.org/10.33005/ijconsist.v3i1
Core Subject : Science,
Focus and Scope The Journal covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 7 Documents
Search results for , issue "Vol 1 No 2 (2020): March" : 7 Documents clear
Wireless LAN Network Authentication Captive Portal Nita Rosa Damayanti; Sobri, Muhammad
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1023.109 KB) | DOI: 10.33005/ijconsist.v1i2.13

Abstract

The development of wireless networks is needed to improve security and comfort when using it because of the current management of the hotspot network at PT. Tri Sapta Jaya which uses the old system has many shortcomings because there is no monitoring system and the use of the same password for each user and there are no data restrictions. To overcome these shortcomings, a new system is needed, using the Mikrotik Routerboard-based Captive portal authentication system that can be used to create an account for each different user to log in to the portal that will appear in the browser when connected to the network and the administrator can monitor devices that are connected to the network. hot spot. In research to develop the Captive portal system several stages are carried out using the waterfall system development method, namely analysis, design, implementation, testing and maintenance, in which case the research can produce a security system that runs optimally, safely, comfortably and efficiently.
Mathematical Formulas Application For Elementary School Students Using Framework Codeigniter Rayhan Aulia
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.299 KB) | DOI: 10.33005/ijconsist.v1i2.14

Abstract

Mathematics is one of the many sciences that are utilized in everyday life. Both in general and specifically. By using a basic mathematical formula, here, the author tries to review the formulas that have been studied by students from elementary school through high school. This web-based application uses codeigniter which contains 30 basic mathematical formulas.
Smart Parking System using Android and QR Code for Widyatama University Faza, Yuqbal Faza Aula Dipa
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.403 KB) | DOI: 10.33005/ijconsist.v1i2.15

Abstract

With so many vehicle users, a new problem arises, namely the unorganized parking lot with the lack of a proper parking management system. These create various problems for vehicle users who want to park their vehicles, such as losing much time to find an empty parking space, besides that a manual parking payment system can result in long queues at payment counters and this happened at Widyatama University because it needs the right solution to overcome these problems. With the concept of a smart parking system that uses the QR Code for user convenience. This system can run on cellular platforms with a visual display that makes it easy for users. Besides, users can reserve a parking space before parking their vehicle. With additional features of the automatic payment system (E-money). This system can streamline time and efficiency. The research method was carried out using a prototype method in the method of making the system a structured process and has several stages that must be passed. Therefore this method aims to design cellular applications, "Parkirin Aja!".
Planning Of Solar Power Plant With On-Grid System At The Fourth Building University Of PGRI Semarang Kusmantoro, Adhi
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.342 KB) | DOI: 10.33005/ijconsist.v1i2.16

Abstract

The on-grid system is a system that is used by PLTS directly connected to an existing electricity grid (PLN). Therefore, the on-grid system does not use a battery storage system or supercapacitor. By using this on-grid system, the community has helped the government in reducing PLN's electricity burden. The main objective in this study was to plan an on-grid system using photovoltaics in the four buildings of the University of PGRI Semarang. The research method carried out in the study was collecting data as supporting research including hourly electric load identification data and on-grid system inverter and photovoltaic specifications used, determining the amount of power to be generated in the on-grid system, calculating the number of solar panels will be used, determine the arrangement of solar panels. Based on the load data of Building four, it can be planned to have a capacity of 200 Wp solarland monocrystaline solar panels 166 units of PV modules. In the installation of PV modules there are connected in series or parallel and depending on the size of the on-grid inverter input voltage used. Based on the Sunny Tripower 60 inverter specifications, the inverter input voltage is 685 V to 800 V DC. Based on the calculation of the PV area, a value of 254.19 m2 was obtained. If the strings are arranged then the total power generated by the PV area is 33.15 KWP. The choice of location is based on the consideration that the solar panel faces north with a slope angle of 17.45⁰ and is close to the building installation room.
Profile Matching Based Business Incubator Tenant Acceptance System Sugiarto; Pratama Wirya Atmaja
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.105 KB) | DOI: 10.33005/ijconsist.v1i2.19

Abstract

Abstract — Business incubator is an institution that is currently more needed to improve all types of entrepreneurs and startups. Tenant is the name of the fostered partners in the Business Incubator, the performance of the Business Incubator is improved, so the tenants who enter the registration in the Business Incubator also increase. The criteria to be a tenant has many variables, so it takes a long time during the calculation process, with the matching profile that can be customized with several variables needed in this business incubator, it becomes a shorter process and provides a recommendation value for the business incubator director in deciding whether the tenant is accepted or rejected. In table 2 in this paper it is explained that the validity test value of the tenant registration information system using the profile matching algorithm gets values above 0.6 of 1, so that the matching profile matching with the case study registration can be applied to the determination of technopark business incubator fostered tenants. Keywords — profile matching, business incubator, validity test;
Student Activities Proposal Evaluation System Planning Using Barcode Scanner Technology Rizqi Chandra Pramana
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.405 KB) | DOI: 10.33005/ijconsist.v1i2.24

Abstract

Student Creativity Program (PKM) is an activity formed by Ministry of Research and Technology of the Republic of Indonesia. This activity was formed to facilitate the various potentials possessed by students to apply and develop the knowledge gained in lectures to the wider community. PKM Center is the agency that manages student creativity program proposals in Universitas Pembangunan Nasional “Veteran” Jawa Timur enviroment. However, the management of student proposal data carried out by the PKM Center is still done manually. So it is difficult to evaluate the history of student proposals. Because of these problems, information systems need to be developed to ensure that these problems can be resolved. So that the management of student proposal data can be carried out properly. Making a student proposal evaluation system has several stages that are carried out, such as a literature study to get a reference to the features used in the proposal evaluation system. After that, it is continued with business process design to application design. Barcode scanners as supporting technology are used in the system to improve data accuracy. The final result of this research is a web-based system for evaluating proposals that have been submitted by the proposing students, so that the proposal data can be used by the center in determining which proposals can qualify for the next stage.
Design and Building of Android Based Room Facility Lending Application Dicky Giancini
IJCONSIST JOURNALS Vol 1 No 2 (2020): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (276.589 KB) | DOI: 10.33005/ijconsist.v1i2.27

Abstract

Android is a platform that is currently used by many users, so that almost every application created uses the Android platform because it is easy to use and also effective. The Faculty of Computer Science UPN "Veteran" East Java has 2 buildings and lots of rooms and other facilities such as laboratories, seminar rooms, and there are loans for equipment that can help the course of events whether in lectures or non- academics. Until now, the process of borrowing rooms and facilities at the Faculty of Computer Science is still done manually, such as using letters and several other processes. This also causes waste of paper and time because it is not necessarily the space or equipment that will be borrowed first by someone else. The purpose of designing and building a room facility loan application is to improve or optimize TU (Administration) services to room borrowers. The research methodology was carried out by collecting data such as interviews, literature study, observation and system design using the waterfall model. The results of this study are to facilitate services, be comfortable and safe in borrowing space.

Page 1 of 1 | Total Record : 7