cover
Contact Name
Jumanto
Contact Email
jumanto@mail.unnes.ac.id
Phone
+6281339762820
Journal Mail Official
josre@shmpublisher.com
Editorial Address
Jl. Karanglo No. 64 Gemah, Pedurungan, Kota Semarang
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Student Research Exploration
Published by shm publisher
ISSN : 29641691     EISSN : 29648246     DOI : https://doi.org/10.52465/josre.v1i1
The Journal of Student Research Exploration aim publishes articles concerning the design and implementation of computer engineering, information system, data models, process models, algorithms, and software for information systems. Subject areas include data management, data mining, machine learning, information retrieval coordinated with structured data, internet and cloud data management, business process management, web semantics, visual and audio information systems, scientific computing, and data science. We welcome system papers that focus on application domains, Internet of Things, which present innovative, high-performance, and scalable solutions to data management problems for those domains.
Articles 6 Documents
Search results for , issue "Vol. 1 No. 1: January 2023" : 6 Documents clear
Increasing package delivery efficiency through the application of the prim algorithm to find the shortest route on the expedition route Lestari, Apri Dwi; Pertiwi, Dwika Ananda Agustina; Muslim, Much Aziz
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.105

Abstract

One of the changes is in terms of shopping. Previously, people shopped through physical stores, but since the emergence of online shopping platforms, people have started to switch to using the marketplace as a place to make buying and selling transactions. This platform utilizes expedition services to send packages in the form of ordered goods from sellers to buyers. This activity presents a new problem, which is related to the efficiency of package delivery by courier services so that goods can arrive as quickly as possible in the hands of buyers. Graph modeling to solve a problem related to the shortest path and the fastest path is adapted in this paper. The algorithm used is Prim's Algorithm, which is an algorithm to determine the minimum spanning tree of a connected weighted graph. The test results show that the algorithm is suitable for increasing packet delivery efficiency by determining the shortest path based on the minimum spanning tree concept. By taking a sample of travel routes on the island of Java, the best route was obtained with a total distance of 1,771 kilometers connecting cities from the city of Jakarta to the city of Banyuwangi.
Analysis of quality of service (QoS) wi-fi network in UNNES digital center building using wireshark Rianto, Nur Aziz Kurnia; Salsabila, Halimah; Jumanto, Jumanto
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.108

Abstract

The need for the internet is a very absolute target in today's all-digital era. The traffic of information that is so dense and always dynamic every second makes everyone want speed in capturing information circulating. The speed in gathering information in this all-digital era cannot be separated from the internet and networks. UNNES Digital Center is one of the facilities owned by Semarang State University which is used as a digital-based learning center to support the realization of the Smart Digital Campus. The availability of qualified network services at the UNNES Digital Center is needed to support the all-digital-based student learning process. This research was done to find out how fast and good the quality of the internet network provided by the UNNES Digital Center is. In the research conducted, the network analysis step uses the Quality of Service (QoS) method. In obtaining research data that will be used as a basis for analyzing throughput, packet loss, delay, and network jitter, Wireshark software is used as a tool. The research results show that the quality of the Digital Center's internet network is very good and very adequate for digital learning activities. This is evidenced by a network throughput value of 6122.37 /kbits/s, a packet loss value of 0.7%, a delay of 214 ms with a moderate or quite good value and jitter = 0.511 ms.
Analysis and recommendations for business process improvement for retail companies using the business process improvement (BPI) method Raihan, Ahmad; Kanza, Adam Satrio; Rohmah, Ahlam Umniyatur; Khairani, Dina Zhafira
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.109

Abstract

Retail companies are businesses that involve direct interaction between sellers of goods or services and consumers, meaning that retail businesses do not have a processing process from raw materials to finished products. In the process of editing and recapping goods data, there are 2 main businesses, namely editing data, sending copies of goods data, and storing new data in the cashier’s GIS database. After the evaluation, it was found that simplification could be made to make it more efficient. Based on the results of the evaluation of the business process, it was found that the root cause of the editing time and recap of goods data was long. Business process recommendations are made and the results are obtained, eliminating the process of providing a copy of new item data to the warehouse clerk and storing new item data in the cashier’s GIS database.
Artificial intelligence (AI) imaging for enhancement of parking security Dwiantoro, Arko; Maulana, Ilham; Damayanti, Nabila Putri; Al Zahra, Reyhan Nandita
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.110

Abstract

Parking is a public facility found in an agency or office that is used to store vehicles. There are lots of vehicles that can enter the parking area. Therefore, we need an area management and parking system. Artificial Intelligence (AI) is the knowledge that makes computers able to imitate human intelligence so that computers can do things that humans do. This research is motivated by crime cases that often occur in parking lots. This is because there is still a lack of security in the place. The purpose of this study is to increase security and ease of scanning on motorcycle license plates to get parking tickets automatically and face scans. That way, if a crime occurs in the monitoring area, the camera can easily recognize the face of the perpetrator, which makes the incident process easy.
Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes Rohmah, Ahlam Umniyatur; Djuniadi, Djuniadi
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.111

Abstract

Data security is one of the main factors in the world of information technology. The human need for information is increasing along with the changing times today. To maintain the authenticity of the information presented, it is necessary to have a high level of security. In this study, a data security simulation will be designed using the TEA (Tiny Encryption Algorithm) algorithm which includes a block cipher encryption algorithm and includes a symmetric key cryptography algorithm with the advantage of being on the Feistel network. The practicum was analyzed based on the process of encrypting and decrypting messages in text format. The software used to simulate the TEA (Tiny Encryption Algorithm) algorithm using Cryptool2 software which is open source software is used to explain the concept of cryptography. This research is used to decipher, schema, and implement the TEA (Tiny Encryption Algorithm) algorithm in the form of simulating encryption and decryption of text messages (both text and text files) so that text messages are sent in the safest way from the sender to the recipient.
Application of the greedy algorithm to maximize advantages of cutting steel bars in the factory construction Muzayanah, Rini; Tama, Endi Adika
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.112

Abstract

Indonesia is one of the countries that is currently exuberant with development issues in order to balance the ongoing process of global modernization. In the infrastructure development process, the developer will enter into a contract with the contractor. This study aims to analyze the performance of the greedy algorithm in optimizing steel cutting with maximum profit to construction companies. The methods used include literature studies, program design, and program trials where the algorithm used is a greedy one. From the results obtained, it is evident that the Greedy algorithm can provide optimal steel cutting solutions because it works by calculating and deviating from all available separation settings, so there is no need to recalculate if the program performs that step.

Page 1 of 1 | Total Record : 6