Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : IJISTECH

Home Security And Access System Prototype Using Fingerprint Muh. Fahrurrozi; Lalu Puji Indra Kharisma
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.169

Abstract

A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.
Implementation of The AHP And MOORA Methods For Admission Selection of Stmik Lecturers Syaikh Zainuddin NW Lalu Puji Indra Kharisma; Muh. Fahrurrozi; I Gede Iwan Sudipa
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.170

Abstract

STMIK Syaikh Zainuddin NW Anjani always strives to improve quality or internal quality sustainably as a strategy to be able to compete with other universities. The institution itself realizes that to achieve educational goals and maintain the quality of education and produce good outputs, it requires commitment, strategies, appropriate methods, and adequate human resources in the process of achieving it. One way to improve the quality of a university is to select teaching staff or lecturers because the quality of lecturers will greatly determine the high and low quality of a university. Based on the problems that arise, a decision support system is needed that can handle the influence relationship between parameters for the selection process for lecturer acceptance. In this study, the Analytical Hierarchy Process (AHP) method and the Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA) method were used to determine alternative priorities for prospective lecturers. The AHP method is used to determine the weight of the criteria, sub-criteria, and scoring data, while the MOORA method is used to calculate the final score and ranking.
Development of Mobile-Based Illegal Cigarette Data Management Using Rapid Application Model Adam Bachtiar Maulachela; Jian Budiarto; Ahmad Ashril Rizal; Lalu Puji Indra Kharisma
IJISTECH (International Journal of Information System and Technology) Vol 6, No 2 (2022): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i2.234

Abstract

Indonesia is one of the highest cigarette-consuming countries in the world. Therefore, the government is trying to control this through various efforts. One of them is by increasing the excise rate on tobacco products yearly with an average increase of 10.92 percent per year. However, this effort has not been able to reduce the number of smokers in Indonesia, which has increased by 8.8 million in the last ten years. This raises the fact that there is an increase in the circulation of illegal cigarettes in Indonesia. Therefore, the central and local governments formed task forces to control illegal cigarettes. This study aims to assist the task force in managing data on the circulation of illegal cigarettes by creating a data management application. This application was developed by implementing the Rapid Application Development (RAD) method. This method consists of four main stages: requirements engineering, system design, development, and implementation. This research has produced an Android-based mobile application that can assist the task force in managing illegal cigarette data. Based on the test results, this application has been declared successful through quality and functionality tests, so it is ready for use by the task force