cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 22 Documents
Search results for , issue "Vol 5, No 4 (2021): December" : 22 Documents clear
Analysis of Back-End Requirements of a Web-Based Application to Identify Damage for Building Structures Anisya, A; Nugroho, Fajar
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.162

Abstract

The need for well-maintained facilities can certainly affect activities in the building. To meet these needs, a building maintenance work program is needed to achieve the planned life of the building. The problem with contractors is that they still use telephone communication to receive reports of any damage to the building. This paper discusses the needs analysis in the construction of a building damage reporting system from the back-end side. The application is built on a web-based basis and provides information about the building in terms of the structural aspect as well as grouping the damage based on the damage criteria. The results of this study are obtained in the form of 10 tables that will compile a system database and transaction analysis that can be done in the system, namely generating building damage data reports where there are four categories of damage, namely light damage, moderate damage , severe damage, total damage and this application can later be used by building managers in reporting building damage through applications and contractors can monitor through applications
E-Teach : Mobile Application Teaching Administrative System Using Near Field CommunicationN (NFC) Ferry, F; Kristiadi, Dedy Prasetya; Sutrisno, S
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.156

Abstract

Teaching administration is a teacher's needs that are recorded or recorded into files stored by the school curriculum section. Teaching administration is in the form of lesson plans per semester made by the teacher to be applied based on the planned subject matter. Archiving of learning outcomes data and teaching materials is often ignored so that teachers do not provide subject matter according to the study plan and evaluation of learning outcomes is not satisfactory. In addition, the teacher administration file is a need for school accreditation which is a benchmark for the education office's assessment, which is a serious concern for schools in making reports in their work units. To reduce administrative errors, loss of data and the effectiveness of teaching services and assist teachers in managing lesson plans and evaluating learning outcomes, a tool that is able to provide solutions is needed. Near Field Communication, abbreviated as NFC, is a development tool for Bluetooth and RFID. NFC allows the phone to store important data securely and sent to other phones equipped with NFC or read by an NFC reader. In addition, this NFC allows mobile phones to be developed for the administration of school payments as well as giving class schedules to students. In this study, a teaching administration system based on Near Field Communication (NFC) has been developed using the Raspberry Pi as a microcontroller as well as a computer capable of applying web-based programs. Electronic teaching administration with NFC is expected to replace conventional teaching administration. The advantages of NFC-based E-Teach are that it takes a short time to use, does not depend on internet access and is easy in delivering teacher administration to those in need. Study plan data processing and evaluation of student learning outcomes are faster, more accurate and integrated with the management of education providers.
Home Security And Access System Prototype Using Fingerprint Fahrurrozi, Muh.; Kharisma, Lalu Puji Indra
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.169

Abstract

A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.
Implementation of Logging Feature in Android Payment SDK using Scrum Method Rifai, Ardian Dwi; Ramadhani, Erika
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.150

Abstract

Electronic money or e-money is a technological innovation that allows payment transaction processing to be easier and more practical. PT Aino Indonesia is a payment gateway company that serves payment processes using this technology for various business segments. To satisfy the requirements of each business segment, Aino needs to develop a wide range of applications. These applications require a standard for the payment system to make it faster to integrate and maintain. The payment team at Aino has developed a module or SDK that provides a standard payment system for Android-based applications. Two new features will be added to this SDK, the logging feature and log file upload. The logging feature will record the data generated by each transaction process into a log file. Next, the SDK will upload the log files to the server to help retrieve transaction data uploaded from the device. Both features will help the process of tracking issues and problems that may arise during the transaction process. The development of the two features in this SDK uses the Scrum method to ensure it stays on track.
Prediction of Rainfall Intensity as Early Warning Information on Potential Landslides using Fuzzy Logic (Case Study West Lampung Regency) Rinaldi, Daniel; Kesuma, Rahman Indra; Fahmi, M. Yafi; Yulita, Winda; Praseptiawan, Mugi; Afriansyah, Aidil
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.163

Abstract

Landslides always happened in West Lampung Regency yearly, which makes early warning information of landslides is needed. There are many factors which can cause landslide, one of the important factors is rainfall intensity, which can be predicted. The prediction of rainfall intensity can be obtained by using fuzzy logic. The fuzzy logic used in this research is Mamdani, and this research show the similar result for most data which means that fuzzy logic might not be suitable to be used to forecast the rainfall if the obtained data has lots of missing values.
Decision Support System To Choose The Best Social Media Platform For Product Marketing Using Topsis Method Putri, Dwi Andini; Alawiah, Enok Tuti
IJISTECH (International Journal of Information System & Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.157

Abstract

Currently, many content creators use social media to conduct product reviews or testimonials. This often attracts followers to make purchases of the same product. Marketing of products with social media is mostly done by the industry to attract buyers. However, in-depth research is needed to analyze which social media is most appropriate to use to market their products. This study uses the TOPSIS method, which is a multi-criteria selection method that uses a positive and negative ideal solution distance approach to obtain a valid final preference value. The results showed that as many as 0.31 social media youtube, 0.24 for social media tiktok, 0.20 for social media instagram and 0.11 for social media facebook. The results of the study can be used by policy makers to decide the selection of the right social media for marketing their products
Implementation of The AHP And MOORA Methods For Admission Selection of Stmik Lecturers Syaikh Zainuddin NW Lalu Puji Indra Kharisma; Muh. Fahrurrozi; I Gede Iwan Sudipa
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.170

Abstract

STMIK Syaikh Zainuddin NW Anjani always strives to improve quality or internal quality sustainably as a strategy to be able to compete with other universities. The institution itself realizes that to achieve educational goals and maintain the quality of education and produce good outputs, it requires commitment, strategies, appropriate methods, and adequate human resources in the process of achieving it. One way to improve the quality of a university is to select teaching staff or lecturers because the quality of lecturers will greatly determine the high and low quality of a university. Based on the problems that arise, a decision support system is needed that can handle the influence relationship between parameters for the selection process for lecturer acceptance. In this study, the Analytical Hierarchy Process (AHP) method and the Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA) method were used to determine alternative priorities for prospective lecturers. The AHP method is used to determine the weight of the criteria, sub-criteria, and scoring data, while the MOORA method is used to calculate the final score and ranking.
Fuzzy Inference System In Predicting Unemployment Rate In City X Using Sugeno Method Yosdarso Afero
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.151

Abstract

Unemployment in Indonesia is currently increasing. This can be seen from the number of unemployed and workers who are looking for job vacancies either directly or through applications. The problem in this study is the lack of understanding of job applicants about the terms or criteria for applying for a job so that they are not accepted in a company. There are five criteria that must be considered in applying for a job, namely, education, vacancies, age, opportunities and knowledge. The purpose of this study is to help job seekers to complete and understand the criteria that have been set. This study uses the Sugeno method with the final result in the form of linear or constant. The working process of the Sugeno method is fuzification, inference engine, application of implication and defuzzification functions to obtain results in accordance with the decision-making system.
Comparison of Algorithms on Machine Learning For Spam Email Classification Hery Iswanto; Erni Seniwati; Yuli Astuti; Dina Maulina
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.164

Abstract

The rapid development of email use and the convenience provided make email as the most frequently used means of communication. Along with its development, many parties are abusing the use of email as a means of advertising promotion, phishing and sending other unimportant emails. This information is called spam email. One of the efforts in overcoming the problem of spam emails is by filtering techniques based on the content of the email. In the first study related to the classification of spam emails, the Naïve Bayes method is the most commonly used method. Therefore, in this study researchers will add Random Forest and K-Nearest Neighbor (KNN) methods to make comparisons in order to find which methods have better accuracy in classifying spam emails. Based on the results of the trial, the application of Naïve bayes classification algorithm in the classification of spam emails resulted in accuracy of 83.5%, Random Forest 83.5% and KNN 82.75%
Utilization of Asmuth-Bloom Algorithm In Data Security Using Secret Sharing Protocol Heri Santoso; Aidil Halim Lubis; Ali Darta
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.158

Abstract

Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertexts because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message). In this case, a cryptographic protocol can be applied, namely the Asmuth-Bloom secret sharing protocol. The methodology used to analyze and design application software and learning the Asmuth-Bloom secret sharing protocol is the Waterfall method. This research is intended to produce a learning software that is able to display the working process of the Asmuth-Bloom secret sharing protocol and the application of the Asmuth-Bloom secret sharing protocol. The working procedure described by the software includes the key formation process, the shadow formation process and the shadow merge process. The software also provides an interface to do the process of splitting a text file into n shadow files and merging m shadow files into the original text file. In addition, the software also provides basic theories related to the two cryptographic protocols and reports the results of the calculation process are stored in a text file with *.txt extension

Page 1 of 3 | Total Record : 22