IJISTECH (International Journal Of Information System & Technology)
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Articles
13 Documents
Search results for
, issue
"Vol 6, No 5 (2023): February"
:
13 Documents
clear
Exploratory Analysis Design and Development of Fantastic Fighting Scene For Promoting Indonesian Martial Arts
Muhammad Rizqiansyah Haqiqi Ali;
Surya Tjahyadi
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.282
This research aims to explore, analyze, and develop a fantastic fight scene to promote Indonesian martial arts. The purpose of this research is to introduce and promote Indonesian martial arts to the wider community by using available technology and media. The research method used in this study is the initial stage of research and development, followed by the ADDIE method in developing fantastic battle videos. The result of this research is a fantastic fighting video that showcases the skills and aesthetics of Indonesian martial arts. This video will present spectacular and mesmerizing actions that show the rich culture and traditions of Indonesian martial arts. This video will be published via the YouTube channel and is expected to be able to promote Indonesian martial arts to the wider community and provide an appreciation for the richness of Indonesian culture. This research is expected to contribute to the world of Indonesian martial arts and introduce Indonesian martial arts to the wider community.
Data Mining to Predict Gojek's Consumer Satisfaction Level Using Naive Bayes Algorithm
Rudika Rahman;
Felix Andreas Sutanto
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.276
Gojek is an application that is very popular and in demand as a means of transportation because it is practical and fast. Consumer satisfaction is where the expectations, desires and needs of consumers are met. To assess whether the company provides quality service to consumers, it is necessary to evaluate consumers to determine the level of consumer satisfaction when using the Gojek application. This study aims to build a system for predicting satisfaction levels from Gojek Driver services to consumers using the Naive Bayes algorithm, as well as to determine the level of accuracy in classifying customer satisfaction using Gojek services. questionnaire is the method used in collecting data on Gojek consumer satisfaction. In this study, 120 questionnaires were distributed to respondents, namely Gojek service users, and these questionnaires would later become training data. Researchers use the survey method as a direct observation of the process of using Gojek services to identify the services provided to consumers. Researchers use the waterfall method as a system development model. This model is the oldest software development model paradigm, and the most widely used. The process of calculating the accuracy of the system uses the Naive Bayes method by testing based on training data taken from the questionnaire. The calculation results on the level of accuracy obtained from the training data are equal to 88.9%. The calculation is processed and divided by the system as much as 70% training data and 30% testing data or as many as 84 training data and 36 testing data. This consumer satisfaction prediction system can assist an admin in determining the classification of consumer satisfaction with web-based Gojek services by applying the Naive Bayes method. In this study, researchers only calculated the level of accuracy and predictive value, for further research it is hoped that they can try to calculate the precision value and recall value calculations.
Fuzzy Logic Controller Implementation for Motor DC Control Position With Real-Time Operating System
M Martin;
Dodi Budiman Margana;
Endang Habinuddin
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.283
A fuzzy Logic Controller (FLC) is a control system that expresses in linguistics, there are several ways to defuzzification such as Sugeno. This paper proposes FLC to control the Motor DC Module position within -180 to 180 degrees using Real-Time Operating System (RTOS) running in the microcontroller. The FLC design based on input errors and changes of errors get from the feedback module, and defuzzification uses Sugeno rules. The FLC design simulates in the simulator program with the motor dc ideal model to show the output response transient. Experimental is done by using step input and variable inputs, step input is used to calculate the output response transient, and variable input to show the reliability of the control scheme. The output response shows that the motor DC control position has 0% of overshoot, 0.9 seconds of settling time, and 2.7769 rise time from position -80 to 0. The FLC success controls the position motor, and RTOS can be implemented in a microcontroller based on ATMega 2560 series.
Exploratory Study and Analysis on Color Grading Technique for Horror Short Movie
Rayden Vebrianto;
Jimmy Pratama
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.277
Horror is a movie genre where the main purpose is to convey fear, anxiety, suspense, and such to the audiences. On ensuring the success of a horror movie, there is one big factor that decides it, which is color grading. Color grading is one of movies editing technique which main purpose is to change color in a video, useful to build or support a desired atmosphere. Color grading is important in horror movies because if the applied technique does not fit with the movie concept, the desired message to convey will fail to deliver. In this study, a two version of horror short movie will be produced, with one version using a darker color grading tone (A) and the other one uses brighter color grading tone (B). The method used in this study is Research & Development, with Research using semiotic analysis and Development using Multimedia Development Life Cycle (MDLC) method. The semiotic analysis will focus on 10 horror movies with a rating of at least 7 based on IMDb US Box Office Rating, and the analyzed subject is the color grading technique used on each movies. The color grading analysis result then will be applied to the short movie production. After the short movie production has been finished, a blind test will be carried out to see which version of color grading suits better with the movie. The blind test is carried out with 53 participants, and the result is 39 participants choosing A and the other 14 choosing B. Due to the significance difference, a reasoning was asked to the participants. Most of the participants who chose A said A fits more with the movie concept and for them B does not really convey the horror from the movie, while those who chose B just gave personal preference as an answer.
Comparative Sentiment Analysis of Delivery Service PT.POS Indonesia and J&T Express on Twitter Social Media Using The Support Verctor Machine Algorithm
Euis Nur Fitriani Dewi;
Aldy Putra Aldya;
Andi Nur Rachman;
Ara Ramdani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.284
Based on a survey conducted by the Top Brand Award in the courier service category, the J&T Express company is in the highest position from 2018 to 2021 beating Pos Indonesia. Social media Twitter is a place often used by customers to submit complaints and opinions regarding the services of a company. The method used to determine the tendency of the views to contain positive or negative sentiments is sentiment analysis. Sentiment analysis will classify the polarity of the text in sentences or documents to determine whether the opinions expressed are positive or negative. This study uses the Support Vector Machine (SVM) algorithm. The results of the user tweet data used are as many as 1000 data with details of data 206 (20.6%) have positive sentiments and 794 (79.4%) have negative sentiments. In the Pos Indonesia tweet data, 110 positive sentiment data were obtained, while the positive sentiment data in the J&T Express tweet data was 96 data. This shows that the Pos Indonesia delivery service has better customer service than J&T Express. The highest level of accuracy using the SVM algorithm in classifying sentiment is 80.14% with a comparison of 70% training data and 30% test data with an average precision of 90%, an average recall of 51.74%, and an average f-measure of 47.80%.
Text Data Security Using Stream Cipher Algorithm
S Supiyanto;
Agung Dwi Saputro;
Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.278
The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
The Effect of Trust and Habit in Using Digital Technology on Online Shopping Intentions
Yohannes Vemberi;
Lucia Ika Fitriastuti
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.286
The development of digital technology in the world and Indonesia is growing rapidly. The advancement of digital technology has finally made people have the habit of doing online shopping. It is possible that trust and habits of using digital technology influence online shopping intentions. The purpose of this study was to examine the effect of trust and habits of using digital technology on online shopping intentions either partially or simultaneously. Methods of data collection using a questionnaire. The number of samples is 101. The analysis used is multiple linear regression. The tests used to test the hypothesis are the t-test, F test, R2 test. The main finding of this study is that the Trust Variable affects Online Shopping Intentions. Variables of Digital Technology Usage Habits Affect Online Shopping Intentions. The variables of trust and the habit of using digital technology simultaneously affect online shopping intentions. Adjusted R2 obtained by 0.647 means that Trust and Habits of Using Digital Technology affect online shopping intentions by 64.7%, and the remaining 35.3% is influenced by other variables. This research can be developed further by testing other variables such as digital literacy variables, price variables, convenience variables, and others.
Hydroponic Vegetable Product Advertisement Video Analysis and Development with MDLC Model
Jimmy Pratama;
Andry Ramadhansyah
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.279
Growing vegetables with a hydroponic system have the advantage of not requiring large areas of land and can produce good quality vegetable products continuously. The hydroponic system can be a solution for producing vegetables in areas that do not have large areas of land with soil conditions that make it impossible to grow vegetables conventionally, such as in the city of Batam. Hydroponic vegetables also have advantages over conventional vegetables such as longer shelf life, crunchier texture, and wider leaves. This research is expected to provide information to the public that hydroponic vegetables have advantages compared to conventional vegetables so that people's consumption of hydroponic vegetables increases. Media development was carried out using the MDLC method and media analysis was carried out using qualitative methods. The analysis was carried out by testing media experts and content experts using the Gregory formula with a validity coefficient of 1.00 and testing audience response using a Likert scale with a percentage of 93.25%.
Application of The Certainty Factor Method to Detect Android Based Rheumatoid Arthritis
Agus Iskandar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.287
A system designed to assist in providing the final knowledge of rheumatoid arthritis that occurs. the expert system here imitates or is similar to an expert in knowing and detecting the initial symptoms of what is happening. This system was built using Android which can be installed by the user, this system helps in dealing with conditions that occur in rheumatoid arthritis. From the research conducted to produce an android-based expert system for the final diagnosis of conditions using the Certainty Factor method, it can provide information about 5 types of rheumatoid arthritis diagnoses, 10 symptom data, and provide information about causes to suggestions for final treatment. The results of testing using the Alpha Test on 15 participants were obtained to install the expert system first on mobile phones, the answer option "Fit" was obtained which had a percentage value of 0.54 or 54%, and was also carried out where testing used Black Box testing which showed the result value according to the reference site.
The Impact of Employees’ Information Security Awareness on Information Security Behaviour
Melissa Indah Fianty
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i5.280
Internal threats have been a hot topic in information security for several years. According to a 2018 Insider Threat Reports survey, 51% of users are more concerned about internal carelessness and negligence than 47% about external attacks. The availability of information has a vital role for companies today, including confidentiality and integrity in supporting company performance. Users or employees are an essential factor in many information security breaches. This study aims to determine whether security education & training, information security awareness, employee relations, employee accountability, organizational culture, and national culture significantly affect Information System Security Behavior. The sample of this research is employees who work at PT Infracom Technology. Sampling was carried out using the Likert Scale method, and data collection was carried out using questionnaires distributed directly to employees as many as 72 respondents. The statistical method uses Linear Regression Analysis, with statistical tests to test the hypothesis. The results showed a direct and significant influence between security training and education factors, information security awareness, employee relations, and employee responsibility. The most influential variable was employee accountability.