cover
Contact Name
-
Contact Email
ijconsist@upnjatim.ac.id
Phone
+6281999471017
Journal Mail Official
ijconsist@upnjatim.ac.id
Editorial Address
https://ijconsist.org/index.php/ijconsist/about/editorialTeam
Location
Kota surabaya,
Jawa timur
INDONESIA
International Journal Of Computer, Network Security and Information System (IJCONSIST)
ISSN : -     EISSN : 26863480     DOI : https://doi.org/10.33005/ijconsist.v3i1
Core Subject : Science,
Focus and Scope The Journal covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 7 Documents
Search results for , issue "Vol 3 No 1 (2021): September" : 7 Documents clear
Brain Tumor Classification with Hybrid Algorithm Convolutional Neural Network-Extreme Learning Machine Wahid, Radical Rakhman; Anggraeni, Fetty Tri; Nugroho, Budi
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.543 KB) | DOI: 10.33005/ijconsist.v3i1.53

Abstract

Brain tumor is a disease that attacks the brains of living things in which brain cells grow abnormally in the area around the brain. Various ways have been done to detect this disease, one of which is through the anatomical approach to medical images. In this study, the authors propose a Convolutional Neural Network (CNN)-Extreme Learning Machine (ELM) hybrid algorithm through Magnetic Resonance Imaging (MRI). ELM was chosen because of its superiority in the training process, which is faster than iterative machine learning algorithms, while CNN was chosen to replace the traditional feature extraction process. The result is CNN-ELM, which has 8 filters in the convolution layer and 6000 nodes in the hidden layer, has the best performance compared to CNN-ELM another model which has different number of filters and number of nodes in the hidden layer. This is evidenced by the average value of precision, recall, and F1-score which is 0.915 while the accuracy of the test is 91.4%.
Traffic Sign Detection Using Region And Corner Feature Extraction Method Hendra Maulana; Yudha Kartika, Dhian Satria; Riski, Agung Mustika; Nurlaili, Afina Lina
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3139.835 KB) | DOI: 10.33005/ijconsist.v3i1.54

Abstract

Traffic signs are an important feature in providing safety information for drivers about road conditions. Recognition of traffic signs can reduce the burden on drivers remembering signs and improve safety. One solution that can reduce these violations is by building a system that can recognize traffic signs as reminders to motorists. The process applied to traffic sign detection is image processing. Image processing is an image processing and analysis process that involves a lot of visual perception. Traffic signs can be detected and recognized visually by using a camera as a medium for retrieving information from a traffic sign. The layout of different traffic signs can affect the identification process. Several studies related to the detection and recognition of traffic signs have been carried out before, one of the problems that arises is the difficulty in knowing the kinds of traffic signs. This study proposes a combination of region and corner point feature extraction methods. Based on the test results obtained an accuracy value of 76.2%, a precision of 67.3 and a recall value of 78.6.
Digital Image Segmentation Resulting from X-Rays of Covid Patients using K-Means and Extraction Features Method Dhian Satria Yudha Kartika; Anita Wulansari; Hendra Maulana; Eristya Maya Safitri; Faisal Muttaqin
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (970.953 KB) | DOI: 10.33005/ijconsist.v3i1.55

Abstract

The COVID-19 pandemic has significant impact on people's lives such as economic, social, psychological and health conditions. The health sector, which is spearheading the handling of the outbreak, has conducted a lot of research and trials related to COVID-19. Coughing is a common symptoms among humans affected by COVID-19 in earlier stage. The first step when a patient shows symptoms of COVID-19 was to conduct a chest x-ray imaging. The chest x-rayss can be used as a digital image dataset for analysing the spread of the virus that enters the lungs or respiratory tract. In this study, 864 x-rays were used as datasets. The images were still raw, taken directly from Covid-19 patients, so there were still a lot of noise. The process to remove unnecessary images would be carried out in the pre-processing stage. The images used as datasets were not mixed with the background which can reduce the value at the next stage. All datasets were made to have a uniform size and pixels to obtain a standard quality and size in order to support the next stage, namely segmentation. The segmentation stage of the x-ray datasets of Covid-19 patients was carried out using the k-means method and feature extraction. The Confusion Matrix method used as testing process. The accuracy value was 78.5%. The results of this testing process were 78.5% of precision value, 78% of recall and 79% for f-measure
Battery Power Control and Monitoring System with Internet of Things Technology Slamet Winardi; Dwi Suharso, Didik; Purnomo, Hendra; Budijanto, Arief
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (597.249 KB) | DOI: 10.33005/ijconsist.v3i1.56

Abstract

Along with the development of battery/ACCU technology, the ACCU charging and loading system has also developed manually or automatically. In this paper, the results of research on the manufacture of tools that function to monitor and control the charging and loading of electrical power will be explained from batteries that are burdened with lights and DC motors through a control panel or android smart phone with IoT technology. This tool is designed to monitor 2 ACCUs, namely ACCU1 and ACCU2. ACCU1 is loaded with lamp and parallel with DC motor load while ACCU2 is loaded with DC motor and parallel with lamp load. If ACCU1 and ACCU2 are full, ACCU1 is loaded with only one lamp and ACCU2 is only loaded with DC motor. For example, ACCU1's electrical power is still within the limits that can be loaded with lights and DC motors while ACCU2 can't be loaded because electric power is not capable of being loaded with DC motors, the DC motor's load will be transferred to ACCU1. So that ACCU1 is loaded with DC lamps and motors and ACCU2 is charging the electricity, as well as for the opposite condition. The design of this tool uses the main component of the ESP32 microcontroller, where this component has been integrated with the wifi module and other supporting circuit modules, namely the current sensor circuit, voltage sensor and OLED display. The software design consists of a program code designer for hardware using C++ and an android smart phone application design using MIT App Inventor. The results of this study are in accordance with the design specifications, namely the device can be used to control charging and loading as well as monitor ACCU1 and ACCU2 electrical power on OLED screens and on Android smart phones screens
Evaluation of the Hospital Information System (HIS ) using EUCS and PIECES Methods on the Medical Record Section of RSUD dr. Haryoto Lumajang Hanesya, Arini Farihatul; Novi Marchianti, Ancah Caesarina; Bukhori, Saiful
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (396.871 KB) | DOI: 10.33005/ijconsist.v3i1.57

Abstract

The use of HIS itself in Indonesia is 82.21% of hospitals have adopted HIS and only 15.79% have not adopted HIS. However, the use of SIMRS still uses paperless medical records because there are still several aspects of SIMRS that need to be developed according to user needs. The purpose of this study was to evaluate HIS using the PIECES and EUSC methods. The PIECES method is used to evaluate based on system performance consisting of performance, information, economy, control, efficiency and service variables. The EUSC method is used to evaluate user satisfaction using content, format, acurancy, timeliness and easy of use variables. This type of research is quantitative descriptive and analytic with a sample of 45 people. Descriptive data processing using scoring and analytical using chi square test. Descriptive data processing using scoring and analytical using chi square test. The results of descriptive research using the PIECES method: the performance variable is 69.0%, the information variable is 70.18%, the economy variable is 67.3%, the control variable is 71.4%, the efficiency variable is 72.3%, the service variable is 73. ,2% and all variables included in the good category. The results of analytical research using the End User Computing Satisfaction method found that there are 4 variables that affect user satisfaction, namely content, format, timeliness and easy of use, while the acurancy variable does not affect HIS user satisfaction.
Edmodo E-Learning Analysis using End-User Computing Satisfaction Method (Case Study: Senior High School 1 Sampang) Nur Rachmah, Khusnia; Nashirul Haq, Ahmad; Assobarry, Nur Hasan; Nanda Sabila, Fariza; Mardi Suryanto, Tri Lathif
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1284.235 KB) | DOI: 10.33005/ijconsist.v3i1.58

Abstract

The development of information technology that continues to grow in all aspects of life which makes human work more efficient and effective. The current COVID-19 pandemic is one of the conditions in which people's activities are hindered and limited in their daily activities. The application of Information Technology is a solution that can be applied for the sustainability of community activities in the midst of this pandemic, one of which is the education sector. Edmodo's E-Learning system is one of the most widely used e-learning systems for the teaching and learning process. The application of e-learning certainly changes the way students learn from offline to online. EUCS (end-user computing satisfaction) is one of the methods used to analyze user satisfaction of an information system, where this method has 5 variables, namely content, accuracy, format, ease of use, and timeliness. The case study of Senior High School 1 Sampang will be the object of this research, where the EUCS method is used to measure the satisfaction of end users of the Edmodo E-Learning system. Data was collected by distributing questionnaires to active students at Senior High School 1 Sampang by obtaining a sample of 80 respondents. From the results of the research conducted, it was found that the EUCS method can be applied to the Edmodo E-Learning system at Senior High School 1 Sampang because the data obtained from the respondents was declared valid and reliable so that it can be relied upon in measuring end user satisfaction with the Edmodo E-learning system, while the factors - the factors of the EUCS method that affect the satisfaction of the end user of the Edmodo E-Learning system at Srnior High School 1 Sampang are the content and accuracy factors.
Implementation Of Docker Container On Local Network By Applying Reverse Proxy Wahanani, Henni Endah; Idhom, Mohammad; Kristiawan, Kiki Yuniar
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3195.526 KB) | DOI: 10.33005/ijconsist.v3i1.59

Abstract

Virtualization is an implementation of a software. Virtualization technology has changed the direction of the computer industrial revolution by reducing capital costs and operating costs. The availability of a virtualization will also increase the availability of higher services and data protection mechanisms. Docker is configured to create multiple containers on a network, each container containing one image. The three containers will be created in one compose where each container is connected to each other for WordPress configuration and two composers will be created. Furthermore, from each compose a reverse proxy configuration is carried out which aims to set a different domain address. Lighten computer performance and can reduce the required storage so as to make hosting more effective and efficient. Containers also provide a security advantage over complete control over management running on separate, isolated containers.

Page 1 of 1 | Total Record : 7