cover
Contact Name
Muhamad Muslihudin
Contact Email
ijiscs@ftikomibn.ac.id
Phone
+6272922240
Journal Mail Official
ijiscs@ftikomibn.ac.id
Editorial Address
Editor IJISCS (International Journal of Information System and Computer Science) Bakti Nusantara Institute Street Wisma Rini No.09 Pringsewu, Lampung Phone: 0729-22240
Location
Kab. pringsewu,
Lampung
INDONESIA
IJISCS (International Journal of Information System and Computer Science)
ISSN : 25980793     EISSN : 2598246X     DOI : -
The IJISCS (International Journal of Information System and Computer Science) is a publication for researchers and developers to share ideas and results of software engineering and technologies. These journal publish some types of papers such as research papers reporting original research results, technology trend surveys reviewing an area of research in software engineering and technologies, survey articles surveying a broad area in software engineering and technologies. The scope covers all areas of software engineering methods and practices, object-oriented systems, rapid prototyping, software reuse, cleanroom software engineering, stepwise refinement/enhancement, ambiguity in software development, impact of CASE on software development life cycle, knowledge engineering methods and practices, formal methods of specification, deductive database systems,logic programming, reverse engineering in software design, expert systems, knowledge-based systems, distributed knowledge-based systems, knowledge representations, knowledge-based systems in language translation & processing, software and knowledge-ware maintenance, Software Specification and Modeling, Embedded and Real-time Software (ERTS), and applications in various domains of interest.
Articles 4 Documents
Search results for , issue "Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)" : 4 Documents clear
APPLICATION OF E-TRANSPORT TROUGHT DESIGNING TIKETING INFORMATION SYSTEM USING DIAGRAM ACTIVITIES Andri Sihata Sitanggang
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i3.710

Abstract

E-Transport is a form of service / facility provided to the public in the field of transfer using electronic media. E-transport itself can be in the form of a guide to route use services on transportation, road monitoring services to transportation users in real time, services such as booking tickets for a transportation service provider, services such as gps guiding vehicles for travel and other security services. One of the services that is currently developing in the community is travel services, where travel services provide transportation services based on the destination location. In the city of Bandung itself travel services have been very much, but the problem that occurs is how to provide maximum service to the community, especially in booking tickets, not only fixated on the convenience of transportation services, but travel booking service services are also very important . Travel booking services should have been greatly paid attention to by travel service providers, so that people are accustomed to and believe in using travel services rather than having to use private vehicles so as to reduce the amount of transportation in the city of Bandung. So this research is based on improving the quality of service providers in the city of Bandung.
E-COMMERCE IMPLEMENTATION IN CAKE STORE MBA WATI IN SUKARAJA 2 GEDONGTATAAN Nova Puspitasari
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i3.706

Abstract

KueMbaWati is a small business that is engaged in selling cakes at this time. The sales system in the Cake Shop MbaWati in sales and purchases is still manual or the customer comes directly to the location. Meanwhile, in promoting its products to customers, KueMbaWati still uses brochures. Such a promotion system is felt to be less than optimal, due to the lack of information provided regarding the product details offered. The development of E-Commerce Applications in the MbaWati Cake Shop is a step to increase sales and facilitate product promotion, so that it can provide benefits for business owners. With this E-Commerce application, customers can order products online. E-Commerce at the MbaWati Cake Shop designed using modeling with the SDLC method (Systems Development Life Cycle) is expected to increase sales and facilitate the making of its implementation.E-Commerce, MbaWati Cake Sho
ANDROID-BASED LECTURE ROOM SCHEDULING APPLICATION (CASE STUDY : STMIK PRINGSEWU CAMPUS) Dela Jemirnia; Angger Purno Nugroho; Sucipto Sucipto
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i3.707

Abstract

Technological developments are increasingly rapid and fast, especially and communication technology. For all fields, starting the fields of buying and selling, education, health, and others. The communication and information technology very helpful in various ways from the word of lecturers, campus staff, and students. STMIK Pringsewu still use manual, student still have to see schedule of waiting room of STMIK Pringsewu. Application development using php script. The method used to develop this system is by System Development Life Cycle approach with stages and design using Data Flow Diagram modelling. Based on the results of system testing, Application and Scheduling Applications are designed in accordance with the expected, it can be concluded that the application design courses and lecture room based on Android is work and function. 
SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS M Geetha; K Akila
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i3.708

Abstract

With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;

Page 1 of 1 | Total Record : 4


Filter by Year

2018 2018


Filter By Issues
All Issue Vol 9, No 3 (2025): IJISCS (International Journal of Information System and Computer Science) Vol 9, No 2 (2025): IJISCS (International Journal of Information System and Computer Science) Vol 9, No 1 (2025): IJISCS (International Journal of Information System and Computer Science) Vol 8, No 3 (2024): IJISCS (International Journal of Information System and Computer Science) Vol 8, No 2 (2024): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 3 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 2 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 1 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 1 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 2 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 2 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 3 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 3 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 2 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 1 (2017): IJISCS (International Journal of Information System and Computer Science) More Issue