JOINCS (Journal of Informatics, Network, and Computer Science)
JOINCS publishes original research papers in computer science and related subjects in system science, with consideration to the relevant mathematical theory. Applications or technical reports oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions. JOINCS also welcomes research contributions on the traditional subjects such as : Theory of automata, algorithms and its complexity. But not limited to contemporary subjects such as: • Big Data • Internet of thing (IoT) • Parallel & distributed computing • Computer networks and its security • Neural networks • Computational learning theory • Database theory & practice • Computer modelling of complex systems • Decentralized Systems • Information Management in the Enterprise Context • Database related technical solutions for Information Quality • Information Quality in the context of Computer Science and Information Technology • Game Techology • Information System
Articles
78 Documents
The Effect Of Load Balancing And Failover Of Two Wide Area Networks With Per Connection Classifier Method On Qos Throughput, Packet Loss, Qos Delay, And Qos Jitter
Fajar Hariadi;
Pingky Alfa Ray Leo Lede;
Umbu Melvy Kalaway
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 2 (2021): November
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (935.175 KB)
|
DOI: 10.21070/joincs.v4i2.1502
This study discussed the design and implementation of load balancing of two WANs so that the traffic load and bandwidth provided by both WANs could be used equally. The methods used in this research were observation and identification, network topology design, implementation, and testing. This study found that load balancing could divide the network load to all available gateways so that there was no overload on the network used by visitors. After implementing load balancing, the network throughput parameter increased 1.51% compared to the Indihome 1 network and 7.5% compared to the Indihome 2 network. The packet loss parameter increased by 99% compared to the Indihome 1 network and increased 90% compared to the Indihome 2 network. Network delay decreased by 1.33% compared to the Indihome 1 network, and decreased by 1.5% compared to the Indihome 2 network. The Network jitter parameter decreased by 0.93% compared to the Indihome 1 network and decreased by 1.54% compared to the Indihome 2 network.
The Effect Of Queue Tree On Packet Loss In Bandwitch Management Online Based School Exam
Wellem Wila Dale;
Fajar Hariadi;
Raynesta Mikaela Indri Malo
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 2 (2021): November
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1354.951 KB)
|
DOI: 10.21070/joincs.v4i2.1515
Unequal bandwidth distribution between clients that are used for online tests will cause the quality connection among clients to differ. Especially when some client dominates the bandwidth. The other client will suffer to have a proper connection. Using Queue Tree bandwidth management with the type of Per Connection Queue (PCQ) the distribution of bandwidth can be done evenly among clients. The implementation of PCQ Queue Tree is able to reduce the length of ping time by 90% from 134 ms and 13 ms. Delay is decreased 47% from 17 ms to 9 ms with a very good category. Jitter decreased 41% from 17 ms to 7 ms with a very good category. Throughput increased 53% from 234.582 Kbps to 503.584 Kbps in the medium category. Meanwhile, in the packet loss parameter, there is no difference in conditions before and after the implementation of PCQ Queue Tree because there is no packet loss during the test, which means packet loss condition is in the very good category.
Design of an Alphabet to Braille Letter Conversion Board Android based
Ferry Yoga Pratama;
Miftachul Ulum;
Haryanto;
Deni Tri Laksono
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (834.848 KB)
|
DOI: 10.21070/joincs.v4i1.1576
A blind person is someone who has problems in terms of vision. This can occur due to congenital factors or disease factors that can affect the eye. To be able to replace the role of the eye to read something, blind people are known as a writing system known as Braille. Braille letters are letters specially designed for blind people. The introduction of Braille letters has been carried out since the beginning by special school teachers using Braille cards. Due to the large number of characters, the card arrangement often seems to take time to find the desired character. The arrangement of cards like this means that learning can only be done in a special school environment and cannot be done by someone who is not a special school teacher. To assist teachers in teaching and to help ordinary people teach Braille to the blind, a tool called the Android-based conversion board for the alphabet to Braille is made.
Securing Input and Output Processes on The Web to Minimize SQL-Injection and XSS Attacks Using IDS and IPS Methods
Herlian Alyasa Almaj Duddin;
Arif Senja Fitrani
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1259.263 KB)
|
DOI: 10.21070/joincs.v4i1.1577
Some of the gaps that exist in web applications are often encountered, such as input both in the input form and input in the url. One of the attacks that are often found in data input is SQL-injection and XSS. Therefore one of the precautions is to carry out data security measures in the input and output process. Here the author uses the IDS and IPS methods as security of input forms from SQL-injection and XSS attacks. IDS is used as a detection and recording of attacks while IPS functions as a blocking access to the website if SQL-injection and XSS attacks are detected. In this case filtering uses the preg_match () function where the writer inserts the word into preg_match () as a rule which later if the user inputs what is in the preg_match () rule then the user is trying to do an injection attack. The data retrieved by the IDS script are ip_address, injected files, scripts, browsers used. IPS uses ip_address as a rule to block access from users when doing injection. It is hoped that the IDS and IPS scripts created will help secure the input output process that is on the web in order to minimize the occurrence of SQL-injection and XSS attacks.
Image-Based Banana Detection Application using K-Nearest Neighbor
Achmad Fathoni;
Hindarto
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (776.654 KB)
|
DOI: 10.21070/joincs.v4i1.1578
Banana is a fruit that is very beneficial for the human body, because it contains a lot of nutrients needed by the human body. One serving of banana contains about 110 calories, 30kg carbohydrates and 1 gram of protein. At harvest time, farmers will sort the bananas according to their type, then they will be sorted according to quality (for example, level of maturity, type of banana, suitable for consumption). The sorting process is still done manually by banana farmers in the Lumajang area. Therefore, the results of the sorting process will be less accurate because there are differences in opinion on the quality value of each farmer. This study aims to provide standard values for Lumajang banana farmers. So that each banana that has been harvested by the farmer can be grouped according to predetermined standard values. In this study using 5 color features. The results of the feature extraction process will be processed again using the k-nearest neighboor method. The results of this study are an application that can identify the type of banana and the ripeness of the banana. The identification of banana types and the ripeness of bananas were obtained from the extraction process of color features and continued with the k-nearest neighboor method. The results of accuracy using the K-NN method are 68% accurate K3 and 32% inaccurate.
Air Pullution Monitoring and Detection System Design Using Fuzzy Method Based on IoT
Firga Deman Samudra;
Miftachul Ulum;
Koko Joni;
Diana Rahmawati
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (890.248 KB)
|
DOI: 10.21070/joincs.v4i1.1580
The large amount of air pollution that occurs in the community is caused by the increase in the number of motorized vehicles and human activities, as well as the limited sense of sight and smell of humans so that they cannot feel the presence of pollutant gases that are harmful to health, so we need a tool that can detect and monitor pollutant gases so they don't exceed the threshold. In this study, a monitoring system and air pollution detection using the fuzzy Sugeno method based on the Internet of Things (IoT) is designed. In this system the MQ-7, MQ-135 and MQ-131 sensors are used to detect CO, CO2 and Ozone gases, while the Sharp GP2Y1010AU0F sensor functions to detect dust. The results of these sensor readings are processed by the Arduino Uno and NodeMCU microcontrollers to be displayed on the P10 panel and sent to the Antares IoT Cloud server which can be accessed in real time. The results of this study have an accuracy rate of approximately 97% for gas sensors, both CO, CO2, and Ozone gas sensors. As for the dust sensor, the accuracy rate is 93.83%.
The Effect of Thesis on Thesis Failure Using Linear Regression
Muhammad Rijal Yahya;
Dihin Muriyatmoko;
Triana Harmini
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 4 No 1 (2021): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (399.746 KB)
|
DOI: 10.21070/joincs.v4i1.1582
The process of writing scientific papers of Informatics Engineering students, determining the title or theme is one of the success and failure factors of students in their thesis. Failure in the thesis in this study means that the thesis that has been completed by students is not used or is not published in the form of a scientific paper. Since January 2018-2020 there have been 40 titles / themes at Darussalam Gontor University published by students. Of the total of all theses, 23 themes experienced failures. The purpose of this research was held to analyze the relationship to thesis failure between themes. This study uses quantitative data research with linear regression data analysis techniques, the independent variable in this study is the thesis theme and the dependent variable in thesis failure. The results of this study indicate that the value of multipleiRi = 0.9938 indicates that the correlation is very strong, while the value ofiR squarei = 0.9876 indicates that the effect of themes is 98.76% on thesis failure, while the remaining 1.24% is influenced by other factors.
Design of Monitoring System Step Walking With MPU6050 Sensor Based Android
Diah Ayu Fitriani;
Wahyu Andhyka;
Diah Risqiwati
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 1 No 1 (2017): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (420.736 KB)
|
DOI: 10.21070/10.21070/joincs.v1i1.799
Walking is said to increase endurance, burn calories and improve cardiovascular health. To monitor the steps when walking, we need a tool that is a gyroscope sensor MPU6050. Making this tool uses a gyroscope sensor for monitoring footsteps because Gyroscope is used to measure or determine the orientation of an object based on the provisions of angular momentum. This tool has been tested by foot with a number of different steps. The device test carried out by one person testers.Data obtained from these tests resulting from the detection lower limit value and upper limit value of X axis angle data is used in data processing is the value of the X-axis is converted into a sine wave form chart. To detect footsteps, each wave has the upper value limit is 20o and the bottom value is -20o. Once the step is detected, these measures will be multiplied by the width of the foot when walking, then obtained distance
Educational Ball Labyrinth Game Using Accelerometer Sensor as a Media for Introducing National Capitals in the World
Ericka Sukma Putri Wilujeng;
Yulian Findawati
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 1 No 1 (2017): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (988.373 KB)
|
DOI: 10.21070/10.21070/joincs.v1i1.800
Learning through games is one of the good methods to reduce the students’ boredom during teaching and learning process. The android game,a maze, displays the capital city of the world. It will be useful for the learning process. The appearance of the capital used is only limited to Asia. The name of game is Maze, a unique game loved by many phone users. The applications use free software from google, namely inventor app and as a ball mover, we use an accelerometer censor in which we move the phone to move the ball. The application is presented with different challenges such as a poin deduction when it touches the wall, the enemies can move the player to start point, the wall hurdle moves. Therefore, from those obstacles are expected to add the excitement of the game.
Analysis of User Experience and Cognitive Psychology Approaches to the Convenience of KRS-Online Information System Users as Material for System Evaluation and Development
Kurnia Manggali Utamaningrum;
Wahyu Andhyka;
Evi Dwi Wahyuni
JOINCS (Journal of Informatics, Network, and Computer Science) Vol 1 No 1 (2017): April
Publisher : Universitas Muhammadiyah Sidoarjo
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (431.841 KB)
|
DOI: 10.21070/10.21070/joincs.v1i1.801
The implementation of the academic information services, UMM has been trying to present some system of academic services for the various students needs, one of the highlights is KRS-Online system because it is the most frequently used system of students in programming courses in each semester.Complaints and suggestions certainly are reasonable for the system services are used by many people.This study aimed to KRS-Online users’ convenience can be measured empirically based indicators of variable users’ experience and cognitive psychology to prove whether these two variables can affect the users’ convenience.Based on this research, it has been proved that the users’ experience and cognitive psychology significantly affect both users’ convenience variables partially tested individually or simultaneously or together.