{"title":"E-COMMERCE IMPLEMENTATION IN CAKE STORE MBA WATI IN SUKARAJA 2 GEDONGTATAAN","authors":"N. Puspitasari","doi":"10.56327/ijiscs.v2i3.706","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i3.706","url":null,"abstract":"KueMbaWati is a small business that is engaged in selling cakes at this time. The sales system in the Cake Shop MbaWati in sales and purchases is still manual or the customer comes directly to the location. Meanwhile, in promoting its products to customers, KueMbaWati still uses brochures. Such a promotion system is felt to be less than optimal, due to the lack of information provided regarding the product details offered. The development of E-Commerce Applications in the MbaWati Cake Shop is a step to increase sales and facilitate product promotion, so that it can provide benefits for business owners. With this E-Commerce application, customers can order products online. E-Commerce at the MbaWati Cake Shop designed using modeling with the SDLC method (Systems Development Life Cycle) is expected to increase sales and facilitate the making of its implementation.E-Commerce, MbaWati Cake Sho","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48828820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APPLICATION OF E-TRANSPORT TROUGHT DESIGNING TIKETING INFORMATION SYSTEM USING DIAGRAM ACTIVITIES","authors":"A. S. Sitanggang","doi":"10.56327/ijiscs.v2i3.710","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i3.710","url":null,"abstract":"E-Transport is a form of service / facility provided to the public in the field of transfer using electronic media. E-transport itself can be in the form of a guide to route use services on transportation, road monitoring services to transportation users in real time, services such as booking tickets for a transportation service provider, services such as gps guiding vehicles for travel and other security services. One of the services that is currently developing in the community is travel services, where travel services provide transportation services based on the destination location. In the city of Bandung itself travel services have been very much, but the problem that occurs is how to provide maximum service to the community, especially in booking tickets, not only fixated on the convenience of transportation services, but travel booking service services are also very important . Travel booking services should have been greatly paid attention to by travel service providers, so that people are accustomed to and believe in using travel services rather than having to use private vehicles so as to reduce the amount of transportation in the city of Bandung. So this research is based on improving the quality of service providers in the city of Bandung.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48200377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey: Cryptography Optimization Algorithms","authors":"M. Geetha, K. Akila","doi":"10.56327/ijiscs.v2i3.708","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i3.708","url":null,"abstract":"With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46838364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN OF DATA COLLECTION SYSTEM OF LECTURER’S RESEARCH AT INSTITUTE INFORMATICS AND BUSINESS DARMAJAYA LAMPUNG","authors":"Sutedi Sutedi, Melda Agarina","doi":"10.56327/ijiscs.v2i3.709","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i3.709","url":null,"abstract":"In order to spur the quantity and quality of research is one of the basic tasks of the lecturer, Institute Informatics and Business Darmajaya Lampung facilitate the professors to be able to participate in a range of grants to help financing research lecturer. With a growing number of studies professors proposed then it should be when logging the lecturer research done in a better. Utilization of information technology is the right information to perform data management information can be either information related to it or also as tool of checking data in order to reduce plagiarism practices and publishing redundancy title research","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45236950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANDROID-BASED LECTURE ROOM SCHEDULING APPLICATION (CASE STUDY : STMIK PRINGSEWU CAMPUS)","authors":"Dela Jemirnia, Angger Purno Nugroho, S. Sucipto","doi":"10.56327/ijiscs.v2i3.707","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i3.707","url":null,"abstract":"Technological developments are increasingly rapid and fast, especially and communication technology. For all fields, starting the fields of buying and selling, education, health, and others. The communication and information technology very helpful in various ways from the word of lecturers, campus staff, and students. STMIK Pringsewu still use manual, student still have to see schedule of waiting room of STMIK Pringsewu. Application development using php script. The method used to develop this system is by System Development Life Cycle approach with stages and design using Data Flow Diagram modelling. Based on the results of system testing, Application and Scheduling Applications are designed in accordance with the expected, it can be concluded that the application design courses and lecture room based on Android is work and function. ","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48407733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION VOICE OVER INTERNET PROTOCOL (VOIP) AS A COMMUNICATION MEDIA BETWEEN UNIT AT UNIVERSITY MUHAMMADIYAH METRO","authors":"A. Hidayat, Ismail Puji Saputra","doi":"10.56327/ijiscs.v2i2.603","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i2.603","url":null,"abstract":"VOIP (Voice over Internet Protocol) is the theology that makes the intranet network even the internet to be able to do voice communications remotely directly. Analog voice signals, such as those heard when communicating on the phone is converted into digital data and transmitted over the network in the form of data packets in real time. In VoIP communications, the user makes a phone connection through a terminal in the form of a PC or a regular telephone (smartphone). With telephones using VoIP, many benefits can be taken include: 1) in terms of cost obviously cheaper than traditional phone rates, 2) network-free, if the internet network is broken VOIP can still be used with notes connected to wifi or wired network, 3) maintenance costs can be pressed due to voice and network data apart, so IP Phone added, moved and changed. In this research, VOIP is implemented at UM Metro. UM Metro has 3 campuses (Campus 1, Campus 2 and Campus 3) are different areas of location, but still in one City. The result of Voice Over Internet Protocol (VOIP) as communication media between units at UM Metro shows the result of 85, 7% (Strongly Agree) and 14, 3 (Agree), it can be concluded with the existence of VOIP is very feasible for use as a medium of communication.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47023349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF E-GOVERNMENT AS A PUBLIC SERVICE IN WARINGINSARI TIMUR VILLAGE","authors":"Lailatul Istikomah, R. Rinawati, Desi Handayani","doi":"10.56327/ijiscs.v2i2.684","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i2.684","url":null,"abstract":"Based on the results of the Indonesian e-government rating (PeGI) at the provincial level at the end of 2015, Lampung province received the title of 17 out of 20 under the category of less. E-government for government institutions is useful to improve the quality of public services in providing information to the public, improving relations between government, community empowerment and implementing a more efficient government. Waringinsari Timur Village is a village that needs to be answered by government agencies in carrying out its functions, namely improving the quality of public services and a wealth of potential villages that are income-generating such as livestock, plantations, agriculture, small industries / homes. Researchers conducted a study by building a website application with the theme \"Implementation of E-Government as a Public Service in East Waringinsari Village\".System development is carried out based on the System Development Life Cycle (SDLC) method approach which includes the stages of system planning, analysis, design and implementation. Data collection methods are carried out by means of observation, interviews, and literature studies. Of the 30 respondents who answered the questionnaire and conducted a website test that was made, 73.3% of the respondents answered \"YES\" and were satisfied with the website of East Waringinsari village. While 26.7% answered \"NO\" and were not satisfied with the website of East Waringinsari village. With a website in Waringinsari Timur village, it will be easier to search information quickly, precisely, accurately, and without limits because it can be accessed anywhere and anytime.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47848882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siti Lamunah, Kasmi Kasmi, Keny Puspita Sari, S. Sucipto
{"title":"DECISION SUPPORT SYSTEM FOR DETERMINING QUALITY BANANA CHIPS USING THE WEIGHTED PRODUCT METHOD","authors":"Siti Lamunah, Kasmi Kasmi, Keny Puspita Sari, S. Sucipto","doi":"10.56327/ijiscs.v2i2.685","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i2.685","url":null,"abstract":"Decision support system is part of computer-based information commonly used to support decision making in an organization or decision support system can be generated using several methods, one of which is the weighted product (WP) method. This method is chosen because of its completion method by using multiplication to associate attribute values, where the value must be raised first with the attribute weights in question. There are four types of banana samples that can be used for making banana chips, namely kepok banana, ambon banana, jackfruit banana, horn banana. Of four bananas are selected kepok banana and horns banana are good to be made with chips with an alternative value 0.270118051.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43235757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uning Lestari, Erfanti Fatkhiyah, Andung Febi Prakoso
{"title":"APPLICATION OF HOME LIGHT CONTROL SYSTEM USING ARDUINO WITH MOBILE BASED WIFI MEDIA","authors":"Uning Lestari, Erfanti Fatkhiyah, Andung Febi Prakoso","doi":"10.56327/ijiscs.v2i2.606","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i2.606","url":null,"abstract":"Nowadays, technology development encourage people to think creatively, not not only to explore new discoveries, but also to maximize existing technological performance to ease human work in everyday life. The need for an automatic control system is needed with the increasing activity of each individual community with various erratic activities and times. As a result, many activities in the household are delayed, such as turning on or turning off the lights in every room at night and in the morning. Smart home system is one solution that suits the needs of the current automatic controllers. Smart home system is a home or building is equipped with an integrated technology with the help of the tool/tools which can be a computer or other device, for example a smartphone to provide all the comfort, safety, security and energy saving is automatic and programmed. The smart home system can be used to control almost all equipment and equipment at home, from lighting settings to various household appliances, which can be done only by using sound, infrared light or remote control. In this study, a smart home system was created for home light control system applications using Arduino Uno microcontroller via mobile-based wifi media. With this application the user can control the home lights by turning off or turning on the home lights remotely through the mobile media. Thus the efficiency of electricity use becomes more maintained.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47063278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGNING SMARTHOME THROUGH INTERNET NETWORKING USING RASPBERRY PI COMPUTER","authors":"Tri Aristi Saputri, S. Rofiq","doi":"10.56327/ijiscs.v2i2.689","DOIUrl":"https://doi.org/10.56327/ijiscs.v2i2.689","url":null,"abstract":"Human activity is now increasing rapidly, causing human beings to often leave home. With such busy activities, someone will have difficulty communicating with his/her electronical equipment at home. Electronical equipment at home can be controlled using internet network and through website called smarthome. The smarthome can facilitate the users in controlling their home electronical appliances such as lights, fans, and so forth. So as to reduce the waste of electricity when users forget to turn off their electronical equipment when they are outside the home or wherever the users are. Smarthome uses a raspberry pi computer that serves as a server that will connect between hardware and software controlled through the website as an interface that users use to enter input and generate output. The making of this web uses Raspbian operating system where the software used is python and HTML. The method used in developing software is waterfall method according to Sommerville. The features on this website are 16 buttons, if the button is green then the electronic equipment is on, and if the button is black then the electronic equipment is off.","PeriodicalId":32370,"journal":{"name":"IJISCS International Journal of Information System and Computer Science","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43053663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}