cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. indragiri hilir,
Riau
INDONESIA
Sistemasi: Jurnal Sistem Informasi
ISSN : 23028149     EISSN : 25409719     DOI : -
Sistemasi adalah nama terbitan jurnal ilmiah dalam bidang ilmu sains komputer program studi Sistem Informasi Universitas Islam Indragiri, Tembilahan Riau. Jurnal Sistemasi Terbit 3x setahun yaitu bulan Januari, Mei dan September,Focus dan Scope Umum dari Sistemasi yaitu Bidang Sistem Informasi, Teknologi Informasi,Computer Science,Rekayasa Perangkat Lunak,Teknik Informatika
Arjuna Subject : -
Articles 21 Documents
Search results for , issue "Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi" : 21 Documents clear
Information System Strategic Planning DPMPTSP Riau Province using Ward and Peppard Method Sonya Meitarice; Mayang Sari; Meidiana Meidiana; Rosa Adhawiyah; Vira Febriyanti
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2101

Abstract

Appropriate application of information systems and information technology can increase efficiency and effectiveness and create a competitive advantage. Dinas Penanaman Modal dan Pelayanan Terpadu Satu Pintu (DPMPTSP) Riau Province is one of the agencies for providing integrated licensing services spread throughout the Provinces and Regencies/Cities in Indonesia. DPMPTSP is required to carry out the task of licensing services that are fast, accurate, in accordance with existing regulations and transparent costs to the entire community. Thus, it is necessary to design a strategic information system so that the implementation of IS/IT is in line with the vision and mission as well as the company's goals. This research uses the Ward and Peppard method because the method has a fairly clear and complete framework besides that it does not only focus on technology, but also focuses on the business needs of the organization. The result of this research are recommendations for future portfolio applications that can be used within the next four years.
Exploratory Data Analysis (EDA): A Study of Olympic Medallist Noviyanti T M Sagala; Fonggi Yudi Aryatama
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.1857

Abstract

Olympic games are one of the most popular international sports events in the world where thousands of athletes participate in different types of sports categories. The winner has rewarded a medal (Bronze, Silver, Gold) according to the rank. An analysis can be carried out on the Olympic data to understand the changes in medalists over time. Furthermore, it helps to determine the progress of participating countries and strategies that can be used in the future. Exploratory Data Analysis (EDA) is a method for analyzing and summarizing the properties of data, either in graphical or non-graphical, to get insights from the dataset being studied. The approaches can be classified as univariate, bivariate, or multivariate. EDA is widely used in various domains including sport. The main purpose of this study is to analyze the changes of Olympic Medalist data throughout the provided years in the form of univariate, bivariate, and multivariate analysis. This analysis provides detailed, statistical, and interesting information about the changes in medal winners from time to time.
Implementation of the Fisher-Yates Shuffle Game Algorithm in Learning Hijaiyah Letters Alvien Muhammad Kannabi; Norhikmah M.Kom (SCOPUS ID: 57216417658)
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2053

Abstract

In 2020 the Indonesian government and the world health agency (WHO) declared the Covid-19 virus a pandemic. As a result, some activities cannot be carried out offline, especially in learning activities. The government requires that learning activities be carried out online or online. The number of children who really need help to understand the learning material provided, for example, is a game which is one of the media in learning for children to make it more interesting in its delivery. With the aim of providing basic Koran education for early childhood with interactive and fun games and the application of the Fisher-Yates Shuffle algorithm in the quiz feature that is used to randomize hijaiyah letter questions. Stages of research 1). Collecting data using library studies, namely Iqra books and related research papers. 2). Game design using story board. 3). Application of the Fisher-Yates Shuffle algorithm. 4). Testing the Fisher-Yates algorithm, black box and question. The results obtained from 10 question and  96 respondents resulted in 89.5% concluding that the hijaiyah letter game uses the Android-based Construct 2 game engine. implementation of the Fisher-Yates Shuffle algorithm on the quiz feature is feasible to use.
TF-IDF Weighting to Detect Spammer Accounts on Twitter based on Tweets and Retweet Representation of Tweets Arif Mudi Priyatno; Lidya Ningsih
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.1995

Abstract

Twitter is a social media service that is often used (popular) as a means of communication between users. Twitter's popularity makes spammers spam for personal purposes and gains. Bot spammers are user abuse on Twitter social media. Spammers spread spam repeatedly to other users. This spam is done with the aim of achieving trending topics. Spam activity is carried out by imitating the behavior patterns of real users so that they are not detected as acts of Twitter abuse. in this paper proposed a TF-IDF weighting to detect spammer accounts on Twitter based on tweets and retweet representation of tweets. The purpose of this study is to detect Bot Spammers or Humans using a classification technique using the Naive Bayes algorithm. The best experimental results in the division of 70% training data and 30% test data obtained 92% accuracy with precision and recall of 100% and 87.5%, respectively. This shows that it has successfully detected spammer accounts on Twitter.
Survey of IT Governance Influence on Digital Transformation and Bank Organization Performance Nurul Afifah; Rahmat Mulyana; Lukman Abdurrahman
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2179

Abstract

The disruption of emerging technologies, startups, changes in stakeholders' behavior, and the COVID-19 pandemic acceleration have forced many companies to perform a digital transformation (DT). However, the facts show many related investment failures because of poor governance practices. Previous research has proven that IT governance (ITG) has a significant role in improving organizational performance. Unfortunately, few studies still show the ITG mechanisms, structures, processes, and relational influence on successful DT. Recent research has found the hybrid ITG influence on DT, but not their relationship to organizational performance. Therefore, we hypothesized the traditional and agile/adaptive ITG mechanisms influence DT and organizational performance. The survey method was used by distributing a questionnaire to the organization's three lines of defense, from the top-level and IT managers (planners, architects, developers, operations, services, security, and quality assurance) to risk managers and internal auditors. The model was analyzed using Structural Equation Modeling assisted by SmartPLS. Bank B was chosen because the banking industry is greatly affected in the digital era along with the rise of fintech. The results showed a significant correlation between agile/adaptive and traditional ITG mechanisms on DT and a positive impact on organizational performance. This manuscript contributes to researchers exploring the ITG mechanism details for successful DT and practitioners to implement them in related industries.
Proposed Business Continuity Plan Information Technology using ISO 22301 And ISO 27031 Ari Cahaya Puspitaningrum
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.1990

Abstract

Majority of organizations have a high dependence on the role of information technology (IT). IT has a very important role for a business, so IT implementation needs to be protected from various threats and disruptions to avoiding IT failures and the occurrence of IT risks that will poor impact to business activities of the organization. To ensure the sustainability of the business, an organization needs to have a business continuity planning (BCP) document. BCP is a complete set of procedures to respond to the disruption of business operations effectively and efficiently, so that business can continue continuously. During all this time, not many organizations have awareness to the importance of good BCP implementation. It is caused by the lack knowledge how to design BCP document with comprehensive, included business impact analysis and prioritize critical business processes. Organizations without BCP implementation, would potentially loss profit, because they did not have any preparation in case of disaster related to information technology which has crusial role in business organizations. This indicated that BCP is important to be implemented throughout the organization for business to continue continuously as it reduces the negative impact of business interruptions. The output of this research is the proposed BCP in the oil and gas industry using ISO 22301:2012, ISO 27031:2011 references related to business continuity in information technology, and previous research on BCP elements.
Comparison of Bagging and Adaboost Methods on C4.5 Algorithm for Stroke Prediction Nur Diana Saputri; Khalid Khalid; Dwi Rolliawati
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.1684

Abstract

Stroke is a non-communicable disease and is very dangerous because of functional disorders of the brain caused by blockage of blood circulation. This disease is classified as a cerebrovascular disease because it requires treatment for 24 hours, if not treated quickly it can cause death. The purpose of this research is to overcome this problem is to create a machine learning-based prediction model for medical experts in dealing with diseases to help reduce the risk of death. The method applied for this research is to apply the C4.5 algorithm classification method as well as the bagging and Adaboost methods from Ensemble Learning. Stroke data is processed using 2 stages of data processing, namely the data cleaning stage and the data transformation stage. In this study, a comparison will be made between the C4.5 algorithm, the bagging method + the C4.5 algorithm and the Adaboost method + the C4.5 algorithm using the confusion matrix, k-fold cross validation and validation test based on the values of TP, TN, FP, FN, recall, precision, F1-Score and accuracy. The results of the classification test using the Confusion Matrix and k-fold cross validation for the C4.5 algorithm resulted in an accuracy of 92.87%. Then the accuracy of the C4.5 algorithm with the bagging method increased to 95.02% and when combined with the Adaboost method the accuracy value also increased to 94.63%. From these results, it can be said that a single classifier algorithm, namely the C4.5 algorithm with the bagging and Adaboost methods, has been proven to improve classification performance.
Classification using the C4.5 Algorithm in Predicting Students Organizational Status Amikom University Yogyakarta Neni Firda Wardani Tan; Kusnawi Kusnawi
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2054

Abstract

Participation in an organization as a college student is an important way to self-improvement. This research analyzes students' learning in an organization and whether the student is active or not active in an organization using the Decision Tree C4.5 algorithm. Attributes analyzed were out-of-campus organization, previous organization experience, public speaking, problem-solving, confidence level, and personality. From a question from propagating on October 2021, the researcher collect 203 raw data, with 167 processes ones that were used in this research. The test conducted results in a tree or the decision tree that could be used to decide how active a student is in an organization. The accuracy value of this test using cross-validation resulted in a score of 59.27% or in comparison to the data training: data testing of 4:1 or 80%: 20%.
Evaluation of Usability Quality Between InDriver and Maxim Applications Using Usability Scale (SUS) and Usability Testing Methods Janet Livia Tuwanakotta; Andeka Rocky Tanaamah
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2001

Abstract

Indriver application and Maxim application are international companies engaged in Information Technology where the company provides a platform that brings drivers and customers together quickly. Both applications come from Russia. These two applications are growing rapidly so they have been downloaded more than 5 million times through the Google Play store. Although it has been downloaded more than 5 million times, some users complain about the two applications. From some of the user feedback, the InDriver application and Maxim application still have problems that occur in their users. This problem is part of the usability problems that exist in both applications. So it is necessary to dig into a more comprehensive problem to explore the problems that occur in both applications. You also need to know the level of usability of these two applications. The level of usability needs to be known to explain the usability of these two applications is already at which level from the user side. This study provides an evaluation to determine the usability problems and the level of usability that exist in both applications using the System Usability Scale (SUS) and Usability Testing methods. The results of this study indicate that the features of the Maxim application are still not accepted by users seen from the sus questionnaire score of 48.3 and on the rating scale including the F rating with a smaller score of 51 so that it can be concluded that the Maxim application is not included in the acceptable category but not acceptable and the InDriver application has a SUS score of 51.25. On the rating scale, the InDriver application is included in the F rating so it can be concluded that the InDriver application is not included in the acceptable category but the low category.
Identification of Barangan Banana Ripeness Treatment Types using k-Nearest Neighbor Abdullah Abdullah; Rendi Azrian
SISTEMASI Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v11i3.2281

Abstract

Bananas are favored by the public because bananas are rich in nutrients that our bodies need. One of the bananas that people are interested in is the Barangan. Bananas sold in the market have various types of ripeness that vary based on their treatment. This study aimed to identify the type of treatment for Barangan. Identification is carried out based on an analysis of the image of Barangan using color and texture features. The k-Nearest Neighbor (k-NN) method is used in the identification. The k-NN compares the similarity between the unknown data and the sample data. The k values used in this study are k=1, k=3, and k=5. The Euclidean Distance is used to measure the distance between 2 feature vectors. The classification test uses the holdout method, where the percentage of the amount of sample data and test data is 66.67% of training data and 33.33% of test data. The accuracy obtained at k=1 is 86.67%, at k=3 is 76.67%, and at k=5 is 80%. The best accuracy for identifying banana ripeness treatment types using the k-Nearest Neighbor method is obtained at k = 1, with accuracy reaching 86.67%.

Page 1 of 3 | Total Record : 21


Filter by Year

2022 2022


Filter By Issues
All Issue Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi Vol 11, No 2 (2022): Sistemasi: Jurnal Sistem Informasi Vol 11, No 1 (2022): Sistemasi: Jurnal Sistem Informasi Vol 10, No 3 (2021): Sistemasi: Jurnal Sistem Informasi Vol 10, No 2 (2021): Sistemasi: Jurnal Sistem Informasi Vol 10, No 1 (2021): Sistemasi: Jurnal Sistem Informasi Vol 9, No 3 (2020): Sistemasi: Jurnal Sistem Informasi Vol 9, No 2 (2020): Sistemasi: Jurnal Sistem Informasi Vol 9, No 1 (2020): Sistemasi: Jurnal Sistem Informasi Vol 8, No 3 (2019): Sistemasi: Jurnal Sistem Informasi Vol 8, No 2 (2019): Sistemasi: Jurnal Sistem Informasi Vol 8, No 1 (2019): Sistemasi Vol 8, No 1 (2019): Sistemasi: Jurnal Sistem Informasi Vol 7, No 3 (2018): Sistemasi: Jurnal Sistem Informasi Vol 7, No 2 (2018): Sistemasi: Jurnal Sistem Informasi Vol 7, No 2 (2018): SISTEMASI Vol 7, No 1 (2018): Sistemasi: Jurnal Sistem Informasi Vol 6, No 3 (2017): Sistemasi: Jurnal Sistem Informasi Vol 6, No 2 (2017): Sistemasi: Jurnal Sistem Informasi Vol 6, No 1 (2017): Sistemasi: Jurnal Sistem Informasi Vol 5, No 3 (2016): Sistemasi: Jurnal Sistem Informasi Vol 5, No 2 (2016): Sistemasi: Jurnal Sistem Informasi Vol 5, No 2 (2016): sistemasi Vol 5, No 1 (2016): Sistemasi: Jurnal Sistem Informasi Vol 4, No 3 (2015): Sistemasi: Jurnal Sistem Informasi Vol 4, No 2 (2015): Sistemasi: Jurnal Sistem Informasi Vol 4, No 1 (2015): Sistemasi: Jurnal Sistem Informasi Vol 3, No 4 (2014): SISTEMASI: Jurnal Sistem Informasi Vol 3, No 3 (2014): Sistemasi: Jurnal Sistem Informasi Vol 3, No 2 (2014): Sistemasi: Jurnal Sistem Informasi Vol 3, No 1 (2014): Sistemasi: Jurnal Sistem Informasi Vol 2, No 4 (2013): Sistemasi: Jurnal Sistem Informasi Vol 2, No 3 (2013): Sistemasi: Jurnal Sistem Informasi Vol 2, No 2 (2013): Sistemasi:Jurnal Sistem Informasi Vol 2, No 1 (2013): Sistemasi: Jurnal Sistem Informasi More Issue