cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 7 Documents
Search results for , issue "Vol 2, No 2 (2019): May" : 7 Documents clear
E-Commerce Design for Palembang Home Tailors Irma Salamah; Ciksadan Ciksadan; Riska Melyani
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.22

Abstract

Home tailors are SMEs that are business opportunities that are usually chosen by housewives because, being a home tailor can be a solution for housewives to keep earning even though they are at home. The problems faced are in marketing and promoting home tailoring services because usually the target customers are only the surrounding environment, therefore innovation in promotion strategies is needed, the use of modern technology such as E-Commerce can be a strategy in business, so that it can be known to the wider community. Responsive Web-based E-Commerce design for ordering and purchasing information systems in increasing the income of home-tailor SMEs, to design this information system The programming language that will be used is PHP, and MySql as a database.
Model Combination of Activation Functions in Neural Network Algorithms (Case: Retail State Sukuk by Group) Muhammad Noor Hasan Siregar
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.23

Abstract

This study aims to maximize the activation function used in backpropogation networks in finding the best architectural model. The case study used is the sale of state retail sukuk based on professional groups. The combination of activation functions used for training and testing is tansig-tansig, tansig-purelin and tansig logsig. The architectural model used is the architectural model 6-2-1 and 6-5-1. The evaluation parameters used are epoch, MSE training, MSE testing and accuracy level of truth. Data processing is assisted by using Matlab software. The results showed that the tansig-logsig activation function had more stable results than tansig-tansig and tansig-purelin.
Internal Quality Audit Administration Information System In Badan Penjaminan Mutu (Case Study: Universitas Lancang Kuning) Bayu Febriadi
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.24

Abstract

Lancang Kuning University Mapping and Implementation of the Internal Quality Assurance System (SPMI) was implemented from 2008 with the establishment of the Quality Assurance Agency (BPM) and Quality Assurance Unit (UPM) at the Faculty level with the aim of creating a quality culture in the Lancang Kuning University Academic Community, in the process of implementing the internal quality assurance system at the quality assurance agency, it has also carried out Monitoring and Evaluation (Monev) once a year to guarantee the quality culture that has been implemented, but in the implementation of Monitoring and Evaluation the Quality Assurance Agency always experiences obstacles such as technical, technical and recording data during activities and also in document archiving because there is no media that can be utilized in managing monitoring and evaluation while the application of information technology and resources already exists. With the use of information technology in the application of computerized based applications for filing and presenting data needs, it is expected to help the academics more quickly and precisely in processing data monitoring and evaluation as well as a means of implementing accreditation by the National Accreditation Board of Higher Education (BAN-PT). It is expected that with the development of applications in the management of monitoring and evaluation by completing the System Development Lyfe Cycle (SDLC) method in the problem analysis phase, the application that is built can improve the quality of monitoring and evaluation in data processing that is well integrated and can be utilized at any time by Lancang Kuning University academic community.
Implementation of Data Mining using the Clustering Method (Case: Region of the Actors of Theft Crime by Province) Frinto Tambunan
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.25

Abstract

Theft is a behavior that causes harm to victims who are targeted and cause casualties. This study aims to classify areas of theft crimes based on provision by using data mining techniques. Data was obtained from the Indonesian statistical center (Badan Pusat Statistik) consisting of 34 provinces. The grouping technique used is K-Means. Clusters are divided into 3 namely: C1: areas with high crime rates of theft, C2: areas with crime rates of ordinary theft and C3: areas with low theft crime rates. Data processing is done using the help of RapidMiner software. The results of the k-means analysis obtained 17 provinces in Indonesia have the highest theft crime rate (C1), namely: Aceh, North Sumatra, West Sumatra, Riau, Jambi, South Sumatra, Lampung, DKI Jakarta, West Java, Central Java, East Java, Banten, West Nusa Tenggara, East Nusa Tenggara, South Kalimantan, South Sulawesi and Papua. The results of the study concluded that more than 50% of regions in Indonesia still had high rates of crime of theft.
The Design of The TU Service Project Monitoring System in PT. GMF Aeroasia Tbk Erika Ramadhani; Handika Irawan
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.19

Abstract

To unit is one of the units in the GMF in the Information & Communication Technology division, one unit is the TOB has a Self Development Application (SDA) task. At present many requests for procurement of goods are submitted to the TU service. This is certainly very influential on TU services that become less optimal and irregular. So a system design was made to monitor the TU Service project. The research method is carried out by analyzing business requirements and business cases. After analyzing the two documents, then make a blueprint containing the system description starting from the explanation of each module or feature and appearance of the system. Then make the interactive prototype as a system simulation. After going through a number of these steps, a monitoring system for the Dinas TU project was developed which could be utilized by the TU Service in project management.
Implementation of Min Max Algorithm as Intelligent Agent on Card Battle Game Silvester Dian Handy Permana
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.20

Abstract

Information technology brings transformation from the physical world into the digital world. This transformation developed in various fields, especially games. In the past, games that are involving physical objects such as chess, cards, dominoes, and mahjong are popular for the publics. Card battle game is a game that pits strength between 2 cards. The game must have 2 players who will compete. However, if a player wants to practice before the match or wants to play alone, he needs Non Player Character (NPC). The NPC will be the opponent in card battle games. In order for NPCs to be able to fight players, a special algorithm is needed to make the NPCs compete with players. The algorithm that can be implemented into the NPC is the Min Max Algorithm. This algorithm is a responsive algorithm which can count every step of the player. The results of this study are expected to provide suitable opponents for players who want to practice or compete in Card Battle Game on their own.
Classification Analysis Using C4.5 Algorithm To Predict The Level of Graduation of Nurul Falah Pekanbaru High School Students Fana Wiza; Bayu Febriadi
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.21

Abstract

School as one of the processes for implementing formal education is required to carry out the learning process optimally to produce quality students. Regarding the research process carried out to predict the graduation rate of SMA Nurul Falah students by using the decision tree method. The data used in this study are student data using the criteria for student names, majors, average report cards from semester one (I), two (II), three (III), four (IV), five (V), and the average value of the National Standard School Examination (USBN). The data is then managed using Rapidminer 5.3 software to make it easier to predict student graduation rates. The application of data mining is used to predict the graduation rate by using the decision tree method and C4.5 algorithm as a supporter as well as to find out information on the graduation rate of Nurul Falah High School students. This study aims to predict student graduation rates in order to get useful information and the school can make policies in the coming year.

Page 1 of 1 | Total Record : 7