cover
Contact Name
Muhamad Muslihudin
Contact Email
ijiscs@ftikomibn.ac.id
Phone
+6272922240
Journal Mail Official
ijiscs@ftikomibn.ac.id
Editorial Address
Editor IJISCS (International Journal of Information System and Computer Science) Bakti Nusantara Institute Street Wisma Rini No.09 Pringsewu, Lampung Phone: 0729-22240
Location
Kab. pringsewu,
Lampung
INDONESIA
IJISCS (International Journal of Information System and Computer Science)
ISSN : 25980793     EISSN : 2598246X     DOI : -
The IJISCS (International Journal of Information System and Computer Science) is a publication for researchers and developers to share ideas and results of software engineering and technologies. These journal publish some types of papers such as research papers reporting original research results, technology trend surveys reviewing an area of research in software engineering and technologies, survey articles surveying a broad area in software engineering and technologies. The scope covers all areas of software engineering methods and practices, object-oriented systems, rapid prototyping, software reuse, cleanroom software engineering, stepwise refinement/enhancement, ambiguity in software development, impact of CASE on software development life cycle, knowledge engineering methods and practices, formal methods of specification, deductive database systems,logic programming, reverse engineering in software design, expert systems, knowledge-based systems, distributed knowledge-based systems, knowledge representations, knowledge-based systems in language translation & processing, software and knowledge-ware maintenance, Software Specification and Modeling, Embedded and Real-time Software (ERTS), and applications in various domains of interest.
Articles 115 Documents
ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG Arif Hidayat
IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v3i2.742

Abstract

Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
DIAGNOSIS OF SKIN DISEASES IN TODDLERS USING NAÏVE BAYES AND FORWARD CHAINING METHODS Sidik Rahmatullah; Rima Mawarni
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i1.954

Abstract

The Center for Public Health is a functional organizational unit that implements health care that is thorough, integrated, evenly acceptable, and affordable to the community. The purpose of this research is to create an Expert System Application to detect skin diseases in toddlers according to the data in the public health center. The system development method used is the Extreme Programming (XP) method with working stages including planning, design, coding, and testing. The system is designed using Unified Modeling Language (UML) which includes use cases, activity diagrams, and chart classes, the software used is PHP (Hypertext Preprocessor) with MySQL databases and uses the Naïve Bayes and Forward Chaining methods. The end result of the creation of this App is to make it easier for users or the public in detecting skin diseases for toddlers.
DISEASE PREDICTION FROM COVID-19 MEDICAL DATA USING DATA MINING ALGORITHM Nafis Md Zawad
IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v6i3.1312

Abstract

The study was designed to introduce a technique for disease prediction by using a data mining algorithm. Here in this paper, a significant discussion has been made on the Novel Corona Virus and the creation of a model for disease prediction. The novel Coronavirus (COVID-19) pandemic has created chaos in the world. People from both developed and developing countries are facing many death tolls due to insufficient ways to prevent COVID-19. It is observed that the environment requires a quick and effective way to control the spread of COVID-19 across the globe. The use of non-clinical methods like data mining techniques can be an effective way to combat the spreading of Covid-19. To minimize the immense pressure on the healthcare system, improved ways of patients’ detection and diagnosis of the nature of the Covid-19 pandemic need to be ensured. In this study, an epidemiological dataset, and data mining models were applied for forecasting the extent of Covid-19 patients. To construct the models, the decision tree and logistic regression were used. Besides, a random forest algorithm was applied to the dataset by using ‘Python Programming Language’. The results reveal that the model created with a ‘Random Forest Data Mining Algorithm’ is more effective in predicting the likelihood of Covid virus-infected patients with the correctness (accuracy) of up to eighty percent (80%).
OPTIMIZING RISK MANAGEMENT IN THE INSURANCE SECTOR: LEVERAGING THE COBIT 5 FRAMEWORK Pratama, Kenny; Fianty, Melissa Indah
IJISCS (International Journal of Information System and Computer Science) Vol 7, No 3 (2023): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v7i3.1591

Abstract

A vehicle insurance company is grappling with a critical issue amid its efforts to integrate information technology into its operations. The problem revolves around the absence of documented procedures related to IT service management and infrastructure resources, impacting various operational facets, including business processes, staff management, applications, infrastructure, facilities, and vendor relationships. To address these concerns, the company has taken measures, including identification, analysis, control, and mitigation of IT-related risks. However, these measures have proven insufficient for optimal risk management, prompting the need for a comprehensive evaluation of their IT risk management capabilities. This assessment focuses on evaluating the implementation of IT risk management using a qualitative approach within the COBIT 5 framework. Specifically, it assesses the company's performance in two closely related processes: APO 12 (Manage Risk) for identifying IT-related risks and DSS 05 (Manage Security Services) for understanding the role of information security and monitoring security aspects. The assessment results indicate that the company's IT risk management capability is at level 3 (Established) for both processes. However, the company aspires to reach level 4 (Predictable) and improve their risk management. Furthermore, a critical discovery is the absence of Standard Operating Procedures (SOPs) related to data encryption, which is vital for information security. While some monitoring methods for information security service design have been effective, there is a need for enhanced data security through the development of encryption-related SOPs. The company plans to implement improvements based on COBIT 5 framework recommendations to achieve a higher level of risk management capability. These enhancements aim to better align IT-related risk management with the company's business objectives and improve the overall effectiveness of the processes.
SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS M Geetha; K Akila
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i3.708

Abstract

With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;
QUALITY ANALYSIS OF THE JAKARTANOTEBOOK.COM WEBSITE USING WEBQUAL 4.0 Megantari Putri Gunadinnusa; Dani Hamdani
IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v4i3.931

Abstract

E-commerce has become a fairly developed concept in the field of technology today. In addition to providing convenience and advantages compared to conventional shopping concepts, including all the desired information, consumers can be accessed in more detail, quickly without being limited by place and time, and the transaction process can be done more easily. Competition among competitors in the field of e-commerce has been overwhelming and competing with each other in innovation to be superior in the market. This study will conduct a quality test of one e-commerce company using the WebQual method. In its implementation with this method to measure quality on a website based on the observation of the questionnaire to the user as a source of data. The results of this study will conclude a number of factors that are very important to customer satisfaction to be evaluation advice for the company.
APPLYING MULTIDIMENSIONAL CANONICAL PARTITIONING (MCP) APPROACH TO DESIGN URBAN DECISION-SUPPORT SYSTEM Apollinaire Bamana Batoure; Michel Tchotsoua; Kolyang Kolyang
IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v6i2.1217

Abstract

The design of decision-support systems remains a challenge because no method has yet been approved, although several approaches have been proposed. Multidimensional Canonical Partitioning (MCP) is a supply-driven approach to design decision-support systems, previously proposed. In this approach, decision systems are designed from Entity/Relationship (E/R) schema. The schema provided as input is reduced to a flat relation, if it is not already the case, by using universal relations assumption. The design approach uses two main algorithms. The first is a greedy type heuristic algorithm, and the second a matching algorithm. The approach has six steps. In this paper, we implement algorithms used in the design approach. We then propose a graphical interface as a tool for implementing the approach. The tool, called PaCaM, is intended to be used by decision-support systems designers. We after all apply the design approach on urban transactional systems.
IS/IT Strategic Planning At STMIK Dian Cipta Cendikia Kotabumi Ferly Ardhy
IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v2i1.550

Abstract

The purpose of this research is to know how big function of business environment and IS / IT that exist in STMIK Dian Cipta Cendikia Kotabumi. In this research will pass several stages and methods applied in this research are questionnaires, interviews and the use of Strategic Planning IS / IT (Ward Peppard). From the results of this study will get output in the form of long-term strategy especially in the field of IS / IT, namely what applications will be needed to support every business process and supporting technology needs in the environment STMIK Dian Cipta Cendikia Kotabumi in the future. From the results of this study can be a reference by the development team in order to implement the Development of IT / IT to support existing business processes on STMIK Dian Ciptta Cendikia. 
DESIGNING CHATBOT FOR COLLEGE INFORMATION MANAGEMENT Herry Derajad Wijaya; Wawan Gunawan; Reza Avrizal; Sutan M Arif
IJISCS (International Journal of Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v4i1.826

Abstract

Information plays an important role in human daily life in which it is expected to be more understood, fast, clear and accurate. In line with technology development and the mission of Informatics study program to develop its services for college students, that is, information is derived through information systems and chat. Students in this case is whom study at the university, institution or academy. This study aims to create Chatbot as Virtual Assistant that provides information for college students through data stored on the system which contains Informatics study program and new information if the data is not founded. Chatbot is a computer program designed to socialize interactive conversations or communication to users (humans) through a text, sound and visual. Through this application, they are able to communicate for various pratical purposes such as customer service, information acquisition and a value of digital campus with integrated information system. Thus, Chatbot with artificial intelligence eases users to obtain information quickly and precisely. 
DECISION SUPPORT SYSTEM DETERMINATION OF CUSTOMER SATISFACTION LEVEL OF ORIFLAME PRODUCTS WITH ANALYTIC HIERARCHY PROCESS METHOD Muhamad Muslihudin; Nur Latifah; Trisnawati Trisnawati
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1075

Abstract

In order to improve customer satisfaction with Oriflame products, customer satisfaction was studied. Find out how Oriflame can satisfy customers through its products, services, finances, delivery, and company conditions. In this research, information marketing research is needed to understand how customers behave and the criteria that are very important when deciding how customers make decisions about Oriflame products. At this stage of research, researchers analyze existing systems by conducting library research and direct observation. In order to calculate the customer satisfaction level, the AHP (Analytic Hierarchy Process) method is used. By using this decision support system, it is expected to make it easier for companies and sellers to determine customer satisfaction with Oriflame products.

Page 10 of 12 | Total Record : 115


Filter by Year

2017 2025


Filter By Issues
All Issue Vol 9, No 2 (2025): IJISCS (International Journal of Information System and Computer Science) Vol 9, No 1 (2025): IJISCS (International Journal of Information System and Computer Science) Vol 8, No 3 (2024): IJISCS (International Journal of Information System and Computer Science) Vol 8, No 2 (2024): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 3 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 2 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 7, No 1 (2023): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 3 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 2 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 6, No 1 (2022): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 2 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 5, No 1 (2021): IJISCS (International Journal of Information System and Computer Science) Vol 4, No 3 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 2 (2020): IJISCS (International Journal Information System and Computer Science) Vol 4, No 1 (2020): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 3 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 2 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 3, No 1 (2019): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 3 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 2 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 2, No 1 (2018): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 3 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 2 (2017): IJISCS (International Journal of Information System and Computer Science) Vol 1, No 1 (2017): IJISCS (International Journal of Information System and Computer Science) More Issue