cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 313 Documents
Implementation of Simple Multi Attribute Rating Technique Method using Decision Support System Concept (Case Recommendation of Salon Place in Pematangsiantar City) Rahadjeng, Indra Riyana; Windarto, Agus Perdana
IJISTECH (International Journal of Information System & Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.703 KB) | DOI: 10.30645/ijistech.v3i1.29

Abstract

The purpose of the research is to determine the ideal salon place considering the salon is a place visited by women to beautify themselves. This research can also be used as recommendations in the form of information in deciding whether consumers visit the salon or not based on research results. The method used in decision making is the SMART (Simple Multi Attribute Rating Technique) method. To determine the evaluation of the salon, researchers used 5 assessment criteria, among others: service (C1), facilities (C2), products (C3), price (C4) and Purchase Decision (C5). For alternatives used as a salon, among others: salon Sukim (A1), Necis (A2), Endah (A3), Crown (A4) and Chan Dhai (A5). The results obtained by Sukim (A1) with a final value of 0.8835 as the first rank, Endah Salon (A2) with a final score of 0.5530 as the second rank and Chan Dai (A5) with a final value of 0.45 as the third rank.
Internal Quality Audit Administration Information System In Badan Penjaminan Mutu (Case Study: Universitas Lancang Kuning) Bayu Febriadi
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.078 KB) | DOI: 10.30645/ijistech.v2i2.24

Abstract

Lancang Kuning University Mapping and Implementation of the Internal Quality Assurance System (SPMI) was implemented from 2008 with the establishment of the Quality Assurance Agency (BPM) and Quality Assurance Unit (UPM) at the Faculty level with the aim of creating a quality culture in the Lancang Kuning University Academic Community, in the process of implementing the internal quality assurance system at the quality assurance agency, it has also carried out Monitoring and Evaluation (Monev) once a year to guarantee the quality culture that has been implemented, but in the implementation of Monitoring and Evaluation the Quality Assurance Agency always experiences obstacles such as technical, technical and recording data during activities and also in document archiving because there is no media that can be utilized in managing monitoring and evaluation while the application of information technology and resources already exists. With the use of information technology in the application of computerized based applications for filing and presenting data needs, it is expected to help the academics more quickly and precisely in processing data monitoring and evaluation as well as a means of implementing accreditation by the National Accreditation Board of Higher Education (BAN-PT). It is expected that with the development of applications in the management of monitoring and evaluation by completing the System Development Lyfe Cycle (SDLC) method in the problem analysis phase, the application that is built can improve the quality of monitoring and evaluation in data processing that is well integrated and can be utilized at any time by Lancang Kuning University academic community.
Disk-Less Network Implementation using Cyberindo Program (Case: BAHONET2 Siantar Game Center) Tama Rudia Naibaho; Sumarno Sumarno; Zulaini Masruro Nasution; Indra Gunawan; Bahrudi Efendi Damanik
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (203.609 KB) | DOI: 10.30645/ijistech.v3i1.35

Abstract

The hard disk device used on the personal computer (pc) client at the game center, however, must have decreased durability because it is used continuously as in the BAHONET2 Siantar game center. This problem can be overcome with various solutions, but the authors prefer the diskless network method using the Cyberindo program as a solution to the problem. The author begins to design the diskless network in question, which is a windows-based application that is used to run, configure, and perform diskless processes through the server. Before the design is done, the authors identify problems that arise in the system that was previously used. This is done in order to avoid various errors on the old system in system implementation so that the results obtained are more optimal. After being implemented, the authors conclude that the diskless system using the Cyberindo program can reduce the use of local hard disks and also faster client performance, the client can be operated properly like using a local hard disk. Also there is no need to update the game manually on each client, we only need to update the game on the server so that all clients can automatically play the updated game.
Implementation of AHP and WASPAS (Weighted Aggregated Sum Product Assessment) Methods in Ranking Teacher Performance Mesran Mesran; Suginam Suginam; Dito Putro Utomo
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1217.465 KB) | DOI: 10.30645/ijistech.v3i2.43

Abstract

The performance of a teacher is an outcome that is demanded by the School Principal in awarding a teacher who is at a formal level of education. In producing effective decisions on performance ratings, it is, of course, necessary to use a computer-based information system, this is known as the Decision Support System. In order for the resulting decisions to be better, using methods that can process existing data so that the method used is able to produce a final report in the form of a decision. At SD IT Al-Munadi Marelan-Medan, so far not using computer applications to help decision-makers to rank teacher performance. Although all this time the needs of the school principal are reports on the performance of teachers in schools. In the research that the authors conducted using a combination of AHP and WASPAS methods which are expected to improve the results of decisions on teacher performance ranking.
Cryptographic Symmetry Analysis with AES Algorithm for Safeguarding Data at Government Agencies Muhammad Rizal; Elviawaty Muisa Zamzami; Muhammad Zarlis
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (764.476 KB) | DOI: 10.30645/ijistech.v3i1.42

Abstract

Data is very confidential information because it contains important information about the company or agency. Therefore it is necessary to secure these important data, in order to avoid misuse, theft of information or manipulation by certain parties who are not responsible. To avoid theft and manipulation of data it is necessary to implement a computer-based security system. One of them is by using cryptography. Cryptography is the study of how to change information from a normal (understandable) state / form into an incomprehensible form. One method that can be used to secure messages or information is the Advanced Encryption Standard (AES). AES is a part of symmetry cryptography. The application of AES cryptographic algorithms in securing data at government agencies can produce encryption that cannot be understood by humans and produce decryption that is exactly the same as the initial plaintext inputted, so that important government data can be secured in such a way. This research will produce a program that can encrypt and decrypt data using the AES (Advanced Encryption Standard) algorithm which will be used to secure data at Government Agencies.
Numerical Techniques for Underwater Topographic Measurement with GPS and Echo Sounder Satoshi Iwakami; Masahiko Tamega; Shuji Jimbo; Masaji Watanabe
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (370.036 KB) | DOI: 10.30645/ijistech.v3i1.37

Abstract

This study demonstrates numerical techniques for a topographic study of a water area. Data obtained by a GPS unit and an echo sounder were combined, and three dimensional data were generated. A problem to find a surface that contains those data points was reformulated to a problem to find a piecewise linear continuous function defined over a triangular mesh. An iterative method led to an approximation of a fixed point. Those techniques are illustrated, and numerical examples are introduced.
An Android-Based Vocabulary Model For Autism Riyan Maulana; Bahruni B
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.627 KB) | DOI: 10.30645/ijistech.v3i2.53

Abstract

>The characteristics of autistic children that tend to focus on their world encourage the writer to conduct this research. Their communication weaknesses have become a problem that faced by parents and teachers. This fact is reasonable because autistic children often create their own ways to communicate, such as using a word that has unique meaning for them or by making their own words to convey their needs or convey their intentions. The development of the world of technology and information is considered solve the learning problems for autism community, especially to improve the mastery of a foreign language (English language). An Android-based learning software/ application or learning model create for autistic children is one of examples that the author believe can help autistic students in their communication skills through a special language learning media or method that based on mobile learning / android app. A learning innovation that aims to help communication / improve foreign language mastery in this case vocabulary for autism children is one of the language learning innovations that want to be designed through this research as a guide or learning guide for them because autistic children prefer to do something based on their own way with a media or tool that have responsive value to attracts their attention.
Design of Internet/Iptv Television System Web-Based On Local Community Network Ari Waluyo
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1168.173 KB) | DOI: 10.30645/ijistech.v3i2.48

Abstract

>Internet Protocol Television / IPTV is a system used to transmit multimedia data over an Internet Protocol (IP) based network. This technology is changing the way humans communicate with television to be more interactive. IPTV is a technology that is being developed in various countries, including Indonesia, which will soon implement it. The existing broadcast system on Kebumen TV still uses analog transmitters using UHF frequencies, so broadcasts cannot reach large areas and are still limited by broadcast time schedules. The development of a TV transmitter system made is a solution to solve existing problems. The TV transmitter system created will utilize the Internet Protocol (IP) network so that Kebumen TV viewers who are outside the broadcast range can enjoy Kebumen TV broadcasts. Internet Protocol Television (IPTV) is a method of channeling television images and sound through the Internet Protocol (IP). The feature of IPTV is that it can broadcast live or pre-recorded digital video and can transmit programs from various sources. From the research results of television transmitters using the Internet Protocol (IP) network have several advantages compared to analog tv transmitters, among others nois produced far less, is cheaper, and allows for broadcasting more functions and broadcast content.
Prototype of Blind Aid Tool With The Haar Like Feature Ade Bastian; Dony Susandi; Usup Suparma
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1248.911 KB) | DOI: 10.30645/ijistech.v3i2.44

Abstract

Every human being is born perfectly but not all humans are born perfect, some of us are born have a deficiency in blindness. Blind people are someone whose vision is impaired from birth or because of an illness that causes their vision to be disrupted. Blind people need tools for their daily activities usually in carrying out blind activities using tools as a tool. Tools that are now widely circulating only as a detector can not yet identify objects, for that blind people neeed a tool that can identify the object. To make this happen, a prototype design research is done. Blind assitive devices use the haar like feature and extreme contour methods. Prototyping method is chosen so that users can play an active role during the process of designing, testing and implementing tolls. Contour is a curve or image that has similarities with objects or objects with functions using OpenCv. The conclusion of the detection results using the haar like feature method is the form of a string then processed using pygame so that the blind are able to know the object in fron of it.
Method of TOPSIS in Recipients of Home Improvement Assistance in South Siantar District at Pematangsiantar Tarukim Office Fikri Yatussa'ada; Muhammad Zarlis; Sumarno Sumarno
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (590.987 KB) | DOI: 10.30645/ijistech.v3i1.38

Abstract

The construction of uninhabitable houses is a government program especially from the Social Service to provide housing development assistance for the poor. However, in its realization, funding assistance from the government is often still lacking and even not on target. Therefore this study aims to build a decision support system that has the ability to analyze in determining the community that is eligible to receive housing repairs. The SPK method used in this study is the TOPSIS method. This method uses the principle that the chosen alternative must have the shortest distance from the positive ideal solution and the farthest from the negative ideal solution from a geometric point of view by using the Euclidean distance to determine the relative proximity of an alternative to the optimal solution. Research data obtained from the Department of public housing and residential areas pematangsiantar city using interviews, observation and literature study methods needed to help solve problems. This study uses 10 alternatives and 7 criteria. After calculating the analysis, families who are entitled to help with house repairs are alternative 7 on behalf of the Piatur Siringgo-Ringgo.

Page 4 of 32 | Total Record : 313