cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 7, No 2 (2023): The August edition" : 8 Documents clear
Evaluation of The South Sumatra Samsat E-Dempo Application using the System Usability Scale Method Agustina, Merry; Aqdi, Syahanan
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.311

Abstract

E-Dempo Samsat South Sumatra is an online vehicle tax payment application from the South Sumatra Regional Revenue Agency (Bapenda). Through the E-Dempo Samsat application, users can make tax payments without having to make payments to the local Samsat, as well as in the application, users can check vehicle data and the total tax value, and can make complaints related to vehicle tax. This study aims to determine the usability level of the E-Dempo Samsat application at which level from the user's point of view. Using the system usability scale (SUS) method, this study provides evaluation results to ascertain the level of usability of the South Sumatra Samsat E-Dempo application. Data analysis with a usability scale system (SUS) was used as the research method, and questionnaires were distributed as part of the quantitative approach. The results of this study are in the form of a score of the method (SUS) of 39 which states that the quality of the level of use of the E-Dempo Samsat application is still low.
Improve Accuracy in The Process of Diagnosing Various Types of Lung Diseases by Using The Naïve Bayes Classifier Firmansyah, Moch
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.305

Abstract

In the humans’ body, there are several organs that function to support humans’ life, one of these organs is lungs, in its development, many things happen to these organs, for examples, infected by various diseases, including the lungs. There are many types of diseases that can infect the lungs including Asthma, Dyspnea, Tuberculosis, COPD, Pneumonia, Bronchitis, Hemoptysis, Hemoptoe, and these diseases can be diagnosed based on the symptoms, but unfortunately there are difficulties in the classification process, because it has similar symptoms experienced by people with the disease. The purpose of this study is to be able to classify lung disease based on symptoms experienced using the navies bayes classification method. This method doesn’t use much training data in determining the estimated parameters used in the classification process. This is what makes researchers use this method. This study used patient medical records as many as 200 patient data. Data collection is carried out from February to May. Data testing using rapid miner tools resulted in 90.22% accuracy for lung disease diagnosis.
UI/UX Design of a Production Information System at PT Belitang Panen Raya Using the Design Thinking Method Faizi, Nur; Purwaningtias, Fitri; oktarina, Tri
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.306

Abstract

The people of Asia, especially Indonesia, have a staple food, namely rice. Rice is a major and strategic food commodity whose availability needs to be guaranteed. To provide the best in inputting incoming and outgoing goods data as well as available goods data, Belitang Harvest Raya designed a new application product. In this study using the Design thinking approach. The Design thinking method is an innovation-based software product design method that is based on finding solutions to solve certain problems. After successfully finding and understanding the problems obtained through the process of Identify the problem, Describe Solution, Empathize to Users, Appeal to Business, Lock in Agreement (IDEAL) and Prototype and Test. So that the BPR application is able to solve problems that occur in a company at this time.
Application of Data Mining For Clustering Car Sales Using The K-Means Clustering Algorithm Hutasoit, Michael Nico; Fa’rifah, Riska Yanu; Andreswari, Rachmadita
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.307

Abstract

In the digital era, data is at the core of business continuity. The need for fast, precise and accurate information is needed. Cars are one of the tertiary needs. This means of transportation is a relatively fast development and innovation business. Car sales in Indonesia recorded a reasonably high number in 2014 - 2018, namely 4.157.580 units sold. The highest sales were MPV car types being the most popular type of car, and there are many types of cars in Indonesia, including Sedans, SUV, 7 Seater SUV, and City Car types, and the enthusiasts need to play more. Hence, it is exciting to study. The variety of car brands with competing prices makes it difficult for consumers to choose the right car to buy according to their needs. This can be solved by applying data mining to cluster car sales using the k-means clustering algorithm. The goal is to know the characteristics of the car from each attribute. The k-Means algorithm is used for cluster formation based on five attributes: CC, Tank Capacity, GVW (Kg), Seater, and Door. The elbow and silhouette score methods determine the optimal number of clusters (k). The result is 4 clusters, cluster 0 (High-Performance Heavy Car), cluster 1 (Small Family Car), cluster 2 (High-Performance Small Car), and cluster 3 (Medium Performance Car). The 4 Cluster results are based on the evaluation/validation of the Elbow Method and Silhouette.
Implementation Of Simple Linear Regression Algorithm In The Alumni Tracer Application Based on A Website at SMK Negeri 1 Sanaman Mantikei Languju, Indri Kristin; Yusuf, Mohamad
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.308

Abstract

SMK Negeri 1 Sanaman Mantikei is one of the state vocational schools which has been standing for a long time and is well-known in Central Kalimantan. Therefore, it has many students from various regions, both within Kalimantan Island and outside the island. Of course, an impact on the increased number of graduates annually. Who are in different positions and roles. The existence of this Alumni Tracer application based on a website can be a solution for the school's need to collect data on its Alumni. This Tracer Alumni application is planned by Apex App Builder of a website application, employing the Rapid Application Development (RAD) method and utilizing Linear Regression Algorithm. The results of this research can predict the number of Alumni who have a job, providing estimations based on data within a specific time frame. The accuracy testing, conducted through manual Excel calculations, resulted in 336, while the accuracy testing with RapidMiner yielded a similar value of 336. This indicates that both manual and machine learning can be considered consistent.
Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.
The Concepts of Gamification Profiling to Generate Smart City Maturity Level Mapping & Social Profiling (Smart Society) Gamayanto, Indra; Maulana, Herman Try; Sirait, Tamsir Hasudungan; Prasetyo, Lusi Noviani
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.304

Abstract

Gamification is an extraordinary phenomenon of how we can engage users to understand our Business. Users can get many interesting things from gamification offered by business owners, ranging from games, bonuses, discounts, and many other things that can make users or consumers more loyal and have a close relationship with the Business. This research is developing the concept of innovation profiling, which describes seven types of innovation. Here, gamification is one of the innovations we will discuss. This study divides gamification into three important parts, units that should not be separated. The first part concerns the big picture of gamification profiling and the Formula GMF = P. B2. E2. Ps2.F2. In the second stage, there are four types of gamification- open Gamification (OP), specific Gamification (SG), innovative Gamification (IG), and undeveloped Gamification (UG). The third stage, the final stage, is Business Gamification profiling (BG), Education gamification profiling (EG), Psychology gamification profiling (PG), and Future gamification profiling (FG). This research results in the gamification profiling framework and its application in education as the main case study in implementing this. Furthermore, Smart city and social profiling are two things that cannot separate from each other. Therefore, in building a smart city & social profiling, several important things must be considered, including investors, people, culture, supervision, customers, data, mapping, mentors, capabilities, commercials and leadership. This article will develop Business Model Mapping 101 (Smart City Maturity Level Mapping), an innovation in shaping and producing social profiling. Problems such as implementing smart cities in human resources, technology, and other factors are the main concerns. Therefore, Smart City Maturity Level Mapping is a social profiling development concept that focuses on building something from what the area already has. It is to increase the level of a more stable economy but remain flexible in dealing with certain situations. Furthermore, this article complements the previous article, namely smart city 5.0 (Human resource, Technology, marketing). These three things then developed into Smart City Maturity Level Mapping, which later became social profiling, which is useful for measuring smart cities' performance and implementation in a more structured, systematic and detailed manner in terms of profiles. The final result is the maturity level to measure a smart city's performance, which also connected to the defender, extender, dodger, contender.

Page 1 of 1 | Total Record : 8