cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Query : Jurnal Sistem Informasi
ISSN : -     EISSN : 25795341     DOI : -
Arjuna Subject : -
Articles 69 Documents
Perencanaan dan Pembuatan Aplikasi Pengerjaan Ujian Nasional Tingkat SMP Berbasis Android M. Diarmansyah Batubara; Evta Indra
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.99 KB)

Abstract

This study attempts to apply based program as a means of interactive mobile link between students with the national examination, at the school. The implementation of national exam junior high school in Medan especially the National Examination Based a Computer (NEBC) are still in a bad condition, because the implementation of infrastructure NEBC facilities have not been accepted, the facts just a few schools that had facilities able to NEBC participates and most schools use the National Exam Paper Pencils (NEPP). Information technology very important as the expansion of learning opportunities and the community information in Indonesia. This research uses mobile technology is an information and communication technology that can be used in the world of Indonesian education. Based on the observations, the solution offered is planning and making an Android-based junior high school national exam application.Keywords:  National Examination Based a Computer, Mobile, Android
Potensi Interoperabilitas Sistem Informasi Rumah Sakit Untuk Penerapan Standar Pertukaran Data HL7 Syauqie Muhammad Marier
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1392.837 KB)

Abstract

The use and application of Information Technology (IT) at the hospital has been widely applied. However, the interoperability, an ability to exchange patient information between the information systems, is limited. During its development in the health field, the data exchange standard of the Health Level 7 (HL7) becomes one of the most widely used approaches in the world. It is likely to be true that in this globalization era, the patient information exchange can be conducted between hospitals from different countries. Therefore, this study proposes steps to analyze the potential of the interoperability hospital information system in applying the data exchange standard of HL7 which, according to the literature review found by the researcher, almost all of the research related to data exchange in the hospital employs web service and XML methods. The steps conducted in this research include: studying the mapping between the availability of the field in the proprietary information system and the element of the messages structure of HL7; identifying and analyzing each field and element so that the potential of the mapping result can be found and the data richness of the messages structure of HL7 can be calculated; and trying out step which is conducted in one of the hospitals in Yogyakarta. The problems found during the implementation is then analyzed to obtain the results. Keywords: Potential of Interoperability, HL7, Interoperability hospital information system
Rancang Bangun Sistem Informasi Inventory Obat Pada Rumah Sakit Jiwa Tampan Berbasis Web Siti Monalisa; E. Denni Prima Putra; Fitra Kurnia
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (379.34 KB)

Abstract

Mental Hospital of Tampan is the Pekanbaru City Government Agency which deals with health and psychiatric problems, such as excessive stress, psychiatric disorders, services to people with HIV / AIDS and the service of child development. The mental hospital of Tampan has a large drug supply system with different specifications in the pharmacy department. However, in the process of drug supply, there are still obstacles, namely recording drug supplies and managing transaction data, still using ledgers. In addition, employees often make mistakes in recording and checking as well as inventory of drugs that often occur excess drug orders. The focus of this research is to create a web-based drug inventory information system. System design method uses Object Oriented Analysis and Design (OOAD) method. Drug inventory system employees can manage drug supplies, record, sell, order medicines to suppliers and make reports through a web-based inventory system.Keywords:  Inventory system, Mental Hospital of Tampan, OOAD 
Optimasi Penjadwalan Menggunakan Metode Algoritma Genetika di Sekolah Menengah Kejuruan Annuqayah - Sumenep Nirwana Haidar Hari; Fauzan Prasetyo Eka Putra; Hamdlani Hamdlani
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (307.691 KB)

Abstract

The problem faced by the Annuqayah Vocational School curriculum is the same schedule and is taught by the same teacher. Such problems are quite complex problems because they relate to the number of teachers available. The lesson schedule is presented in the form of day and class hours tables. The subject can be seen that every day schedule divided into time slots. Each time slot has a list of subjects taught by the teacher in a particular room. To optimize the lesson schedule in Annuqayah Vocational School, Genetic Algorithm is used. This algorithm is a computational approach to the principle of natural selection, Charles Darwin's theory of evolution and the theory of Mendel's inheritance [1]. The optimization process in Genetic Algorithms includes individual generation, evaluation of fitness values, determination of probability values, Roulette Wheel selection, crossover, mutations, and new individual generation. Scheduling optimization using the Genetic Algorithm approach was declared successful because it was able to find the right combination of scheduling with optimal fitness values in 10 attempts, and no violations of the established rules from the curriculum were found so that it could assist in the preparation of subject schedules in Annuqayah Vocational High School.Keywords: curriculum, Vocational High School, scheduling, Genetic Algorithm, optimization. 
Sistem Informasi Akreditasi Program Studi di Fakultas Ilmu Komputer dan Teknologi Informasi Universitas Mulawarman Putut Pamilih Widagdo; Ramadiani Ramadiani; Septya Maharani; Eko Junirianto
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (541.135 KB)

Abstract

The study program is organized based on the curriculum so that students capable the knowledge, attitudes, and behavior accordingly. Accreditation is a comprehensive process of evaluation and assessment of commitment to the quality and capacity of implementing a tertiary Tridarma program, to determine the feasibility of a study program to hold its academic program. Decisions regarding quality are based on evaluation and assessment of various evidence with the standards set by Accreditation from National Accreditation Board for Higher Education (BAN-PT). Accreditation is a reflection of the totality of conditions and input characteristics, processes, outputs, results, and impacts, or performance. Study Program Accreditation Information System of Mulawarman University's Faculty of Computer and Information Technology (FKTI) is an application that is used to facilitate assessment based on BAN-PT forms standards and effort to readily implement study program accreditation to improve the quality value of accreditation. This research developed information system accreditation study program that facilitates the assessment and preparation of data internally as well as being able to store, distribute and adjust evidence according to quality standards BAN-PT forms instruments. With existence of an accreditation information system, it is expected to increase productivity, effectiveness and efficiency to achieve good quality accreditation numbers. Keywords:  information system, accreditation, study program,  quality, BAN-PT 
Analisis Layanan Teknologi Komunikasi Klinik Fisioterapi Siti Hajar Era Revolusi Industri 4.0 Lagut Sutandra; Sulaiman Sulaiman
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (137.54 KB)

Abstract

Communication technology 4.0 industrial revolution is an era where the wider community has become accustomed to the use of the internet and digital as an instrument facilitates daily activities. This research uses the SWOT analysis, where the object of research is the clinic manager and information obtained through interview techniques which are then processed to determine EFAS and IFAS. This research aims to look at the role of the intended communication technology for health services in the Physiotherapy Clinic of Siti Hajar. The results of this research are based on the SWOT analysis carried out in this study, which found that Physiotherapy Clinics must carry out Weakness - Treath (WT) strategies or defensive strategies, namely trying to suppress weaknesses in internal clinics and avoid threats to external clinics. The conclusion of this research is that the program must focus on improving the clinical management of human resources in terms of industrial revolution 4.0 communication technology and implementing education or learning for physiotherapy service users.Keywords:  Communication Technology, Revolution Industry 4.0, Physiotherapy Clinic 
Implemetasi Jaringan Saraf Tiruan Untuk Mendeteksi Serangan DDoS Pada Forensik Jaringan Muhammad Aziz; Rusydi Umar; Faizin Ridho
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (507.719 KB)

Abstract

Network attacks that are often carried out including using Distributed Denial of Service (DDoS) have caused significant financial losses and require very large recovery costs to reach double. Activities that damage, interfere with, steal data, and anything that harms the system owner of a computer network is illegal and can be legally sanctioned in court. Network forensics mechanism to find criminals in order to be ensnared by law. Investigators usually use network monitoring systems such as Intrusion Detection System (IDS) for forensics purposes. The use of IDS allows the detection of errors or changes in traffic and new types of attacks because attacks are carried out using syn packages, where the syn protocol is considered legal because it is needed in the authentication process of communication between devices in the Internet network. Signature-based detection and notification systems are also not strong enough to be used as evidence in the trial. An analysis mechanism is needed to test the accuracy of DDoS attacks that have been detected by the intrusion detection system. Testing the accuracy of DDoS attacks can be done using the neural network classification method using statistical calculations. Based on the results of the analysis and testing carried out found an accuracy value of 95.23%. These results can be used to support and strengthen the evidence of findings in the trial.Keywords: DDoS, IDS, network forensics, JST 
Aplikasi Penentuan Penerbit Buku Sekolah Terbaik Dengan Menggunakan Metode Topsis Berbasis Web Yenny Ratna Sari; Gusvina Fransiska; M. Diarmansyah Batubara
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.318 KB)

Abstract

The book is the result of analysis of knowledge made in writing. Books are important for students who are studying in school, so it is important for schools choose the right books so that students can be given the right knowledge. In this era of modern times as many books are spread with all kinds and kinds of topics and of course with different publishers as well, therefore choosing a quality book is a key to bringing students to become qualified students. Because of the large number of book publishers available, schools find it difficult to determine a quality standard book. So in this problem the Topsis method was created to determine the best school book publishers. This Topsis method can help the school to make the right and accurate results, so that it can reduce the problems that exist in the school. Using web based application, it is certainly easier to access, to choose the best school books publishers.Keywords:  Web, Best Book Publishers, Topsis, Decision Support Systems.
Aplikasi Edit Foto Background Dengan Menggunakan Metode K-Means Clustering Ihsan Lubis; Herlina Andriani Simamora; Sayuti Rahman; Rosyidah Siregar; Husni Lubis
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (442.693 KB)

Abstract

Background photos become one of the most important things in every human activity. Where each background color contains its own meaning, depending on when the conditions where we use the background color. The background color is indispensable in the interests of humans in all matters relating to administration, for example, in the scope of work, school, and others. The background color change can be done by clustering the image. The initial stage done in changing the background color is to cluster the image first so that the background object can be found. In this study, the authors apply the k-means method to divide the objects into several parts. In this application before changing the background color we have to determine the number of clusters first, then the background color is changed according to the desired cluster. This application is designed using Matlab version 2010a. Test results ten images can be concluded that the success of background color changes can be done with a background that has one color while the background that has different colors can not change.Keywords: Image, Background, K-means, Clustering, Processing Image, Matlab 2010a 
Penerapan QR Code dan Vigenere Cipher Dalam Sistem Pelaporan Juru Parkir Ilegal Ade Zulkarnain Hasibuan; Munjiat Setiani Asih; Herlina Harahap
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.172 KB)

Abstract

The number of illegal parking attendants creates problems around us, especially the losses received by the regional government. Parking money that should have contributed to regional income, but because of the presence of illegal parking attendants did not make the slightest contribution to the local government. Another problem is that the parking attendant often gives tariffs outside the normal tariff, so that the people are harmed. Therefore, with the development of current technology, it can help the public to report the illegal parking attendants, the system created in this study provides a solution where the parking lot business card will be given a QR Code marker, the public can scan the QR Code on the id card the parking attendant. If the parking attendant is indicated to be illegal, the public can report it directly using the application on their smart phone. In addition, the information contained in the QR Code is encrypted using vigenere cipher cryptography, it is intended that the information is guaranteed authentic and cannot be falsified by certain parties that aim to take advantage.Keywords:  QR Code, Parking Attendant, Smart Phone, Cryptography, Vigenere Cipher