cover
Contact Name
Hindarto
Contact Email
joincs@umsida.ac.id
Phone
+6282336441637
Journal Mail Official
joincs@umsida.ac.id
Editorial Address
https://joincs.umsida.ac.id/index.php/joincs/about/editorialTeam
Location
Kab. sidoarjo,
Jawa timur
INDONESIA
JOINCS (Journal of Informatics, Network, and Computer Science)
ISSN : -     EISSN : 25415123     DOI : https://doi.org/10.21070/joincs
Core Subject : Science,
JOINCS publishes original research papers in computer science and related subjects in system science, with consideration to the relevant mathematical theory. Applications or technical reports oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions. JOINCS also welcomes research contributions on the traditional subjects such as : Theory of automata, algorithms and its complexity. But not limited to contemporary subjects such as: • Big Data • Internet of thing (IoT) • Parallel & distributed computing • Computer networks and its security • Neural networks • Computational learning theory • Database theory & practice • Computer modelling of complex systems • Decentralized Systems • Information Management in the Enterprise Context • Database related technical solutions for Information Quality • Information Quality in the context of Computer Science and Information Technology • Game Techology • Information System
Articles 5 Documents
Search results for , issue "Vol 4 No 1 (2021): April" : 5 Documents clear
Design of an Alphabet to Braille Letter Conversion Board Android based Ferry Yoga Pratama; Miftachul Ulum; Haryanto; Deni Tri Laksono
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (834.848 KB) | DOI: 10.21070/joincs.v4i1.1576

Abstract

A blind person is someone who has problems in terms of vision. This can occur due to congenital factors or disease factors that can affect the eye. To be able to replace the role of the eye to read something, blind people are known as a writing system known as Braille. Braille letters are letters specially designed for blind people. The introduction of Braille letters has been carried out since the beginning by special school teachers using Braille cards. Due to the large number of characters, the card arrangement often seems to take time to find the desired character. The arrangement of cards like this means that learning can only be done in a special school environment and cannot be done by someone who is not a special school teacher. To assist teachers in teaching and to help ordinary people teach Braille to the blind, a tool called the Android-based conversion board for the alphabet to Braille is made.
Securing Input and Output Processes on The Web to Minimize SQL-Injection and XSS Attacks Using IDS and IPS Methods Herlian Alyasa Almaj Duddin; Arif Senja Fitrani
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1259.263 KB) | DOI: 10.21070/joincs.v4i1.1577

Abstract

Some of the gaps that exist in web applications are often encountered, such as input both in the input form and input in the url. One of the attacks that are often found in data input is SQL-injection and XSS. Therefore one of the precautions is to carry out data security measures in the input and output process. Here the author uses the IDS and IPS methods as security of input forms from SQL-injection and XSS attacks. IDS is used as a detection and recording of attacks while IPS functions as a blocking access to the website if SQL-injection and XSS attacks are detected. In this case filtering uses the preg_match () function where the writer inserts the word into preg_match () as a rule which later if the user inputs what is in the preg_match () rule then the user is trying to do an injection attack. The data retrieved by the IDS script are ip_address, injected files, scripts, browsers used. IPS uses ip_address as a rule to block access from users when doing injection. It is hoped that the IDS and IPS scripts created will help secure the input output process that is on the web in order to minimize the occurrence of SQL-injection and XSS attacks.
Image-Based Banana Detection Application using K-Nearest Neighbor Achmad Fathoni; Hindarto
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (776.654 KB) | DOI: 10.21070/joincs.v4i1.1578

Abstract

Banana is a fruit that is very beneficial for the human body, because it contains a lot of nutrients needed by the human body. One serving of banana contains about 110 calories, 30kg carbohydrates and 1 gram of protein. At harvest time, farmers will sort the bananas according to their type, then they will be sorted according to quality (for example, level of maturity, type of banana, suitable for consumption). The sorting process is still done manually by banana farmers in the Lumajang area. Therefore, the results of the sorting process will be less accurate because there are differences in opinion on the quality value of each farmer. This study aims to provide standard values for Lumajang banana farmers. So that each banana that has been harvested by the farmer can be grouped according to predetermined standard values. In this study using 5 color features. The results of the feature extraction process will be processed again using the k-nearest neighboor method. The results of this study are an application that can identify the type of banana and the ripeness of the banana. The identification of banana types and the ripeness of bananas were obtained from the extraction process of color features and continued with the k-nearest neighboor method. The results of accuracy using the K-NN method are 68% accurate K3 and 32% inaccurate.
Air Pullution Monitoring and Detection System Design Using Fuzzy Method Based on IoT Firga Deman Samudra; Miftachul Ulum; Koko Joni; Diana Rahmawati
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (890.248 KB) | DOI: 10.21070/joincs.v4i1.1580

Abstract

The large amount of air pollution that occurs in the community is caused by the increase in the number of motorized vehicles and human activities, as well as the limited sense of sight and smell of humans so that they cannot feel the presence of pollutant gases that are harmful to health, so we need a tool that can detect and monitor pollutant gases so they don't exceed the threshold. In this study, a monitoring system and air pollution detection using the fuzzy Sugeno method based on the Internet of Things (IoT) is designed. In this system the MQ-7, MQ-135 and MQ-131 sensors are used to detect CO, CO2 and Ozone gases, while the Sharp GP2Y1010AU0F sensor functions to detect dust. The results of these sensor readings are processed by the Arduino Uno and NodeMCU microcontrollers to be displayed on the P10 panel and sent to the Antares IoT Cloud server which can be accessed in real time. The results of this study have an accuracy rate of approximately 97% for gas sensors, both CO, CO2, and Ozone gas sensors. As for the dust sensor, the accuracy rate is 93.83%.
The Effect of Thesis on Thesis Failure Using Linear Regression Muhammad Rijal Yahya; Dihin Muriyatmoko; Triana Harmini
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.746 KB) | DOI: 10.21070/joincs.v4i1.1582

Abstract

The process of writing scientific papers of Informatics Engineering students, determining the title or theme is one of the success and failure factors of students in their thesis. Failure in the thesis in this study means that the thesis that has been completed by students is not used or is not published in the form of a scientific paper. Since January 2018-2020 there have been 40 titles / themes at Darussalam Gontor University published by students. Of the total of all theses, 23 themes experienced failures. The purpose of this research was held to analyze the relationship to thesis failure between themes. This study uses quantitative data research with linear regression data analysis techniques, the independent variable in this study is the thesis theme and the dependent variable in thesis failure. The results of this study indicate that the value of multipleiRi = 0.9938 indicates that the correlation is very strong, while the value ofiR squarei = 0.9876 indicates that the effect of themes is 98.76% on thesis failure, while the remaining 1.24% is influenced by other factors.

Page 1 of 1 | Total Record : 5