cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
Fuzzy Implementation in The Selection of A Chieving Employees at PT. Sumber Barkah using Matlab Software Sestri Novia Rizki
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (800.829 KB) | DOI: 10.30645/ijistech.v5i2.128

Abstract

A company must set a high standard of discipline so that the company can develop quickly. A good company cannot be separated from the performance of employees in the form of standard rules made. With the standard, the company can see employees who excel and can be used as examples for other employees. There are 3 generated criteria such as performance, target and absence. The main purpose of this study is to provide criteria for selecting outstanding employees in a company. This study uses mamdani which uses the lowest min value and uses the AND operator to get the results. There are four things in the Mamdani fuzzy process, the first is the fuzification of the determination of the input value, the second is the application of the implication function, the third is the inference rules and the last is defuzzification. The results of this study can be used as a standard in determining outstanding employees at PT Berkah
Implementation of the K-Medoids Algorithm for Data Clustering of Covid 19 Cases in West Java Ririn Restu Aria
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (645.115 KB) | DOI: 10.30645/ijistech.v5i1.109

Abstract

The Covid 19 pandemic has hit Indonesia for almost 15 months since March 2020. The virus has spread to all provinces in Indonesia. Various efforts were made to be able to reduce or prevent the spread of the coronavirus, including the implementation of the PSBB in various areas including in West Java province. In this study, the objective of this research is to cluster the data on cases of Covid 19 in West Java which are recapitulated daily based on districts/cities that occurred on May 20, 2021. For the clustering process, the K-medoids algorithm is used which determines 3 clusters based on the variables used, namely discarded close contact, suspects discarded, probable completed, probable died, totally positive, positive recovered, and positive died. For data processing, a calculation analysis was carried out using the stages in the K-medoids algorithm and the Rapidminer application with high cluster mapping of 6 districts/cities, medium clusters there were 19 districts/cities, while low clusters had 2 districts/cities. The results of the analysis are expected to provide information about the distribution and mapping of clusters in West Java province.  
New Normal After Education Game Design Pandemic Uses Approaches Agile Scrum Application of Finite State Machine (FSM) Method Tri Ferga Prasetyo; Ade Bastian; Lidya Tresna Wahyuni
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (929.249 KB) | DOI: 10.30645/ijistech.v5i2.122

Abstract

Game is an application that infers human behavior into software, and players who play the game feel they are entering the game world. Games can be used as a medium for information and education. The current rise of Covid-19 requires every individual to implement health protocols in their daily life. This term is called new normal. New normal is a change in behavior to continue carrying out normal activities but with the addition of implementing health protocols to prevent Covid-19 transmission. Unfortunately, in everyday life, the application of the new normal is less effective so that in one area, new cases have emerged and the PSBB must be re-applied. The new normal themed educational game can be a fun information medium for the community, with the New Normal After Pandemic educational game, it is hoped that it can educate the public in implementing health protocol rules. This game was created using Construct 2 software because it is based on HTML 5 which is specifically for 2D platforms. 2D designs are created using Corel Draw X7, Easy Paint Tools SAI and Adobe Photoshop. The final result of this study is a game application that applies the FSM (Finite State Machine) control system design method in each level rule and uses the Agile Scrum system development method with a process of 2x sprint iterations
Correlation of Ambiguity of Steganography with Cryptography in Text-Based Data Security R. Fanry Siahaan; Endra A.P. Marpaung; Gunung Juanda Tampubolon; Ayu Pelita Lumban Siantar
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1077.127 KB) | DOI: 10.30645/ijistech.v5i2.138

Abstract

The development of information technology began with advances in the field of computerization. The early use of computers to simply write, create graphics and images and store incredible data has been transformed into a communication tool with a soft network that can cover the entire world. With the advancement of technology, the process of interaction between humans can reach the layers of society in the back of any world becomes increasingly open. Along with the advancement of technology all the information needed can be obtained easily, not least information that is confidential or top secret. Because with the help of technology all confidential information is locked or stored properly even though it can be opened and accessed by irresponsible parties. The most popular methods today are steganography and cryptography. Steganography is where confidential data is hidden or pasted in other data such as images, text, audio, or video so as not to cause suspicion of others or steganalyst. Unlike the cryptographic method, where secret data messages are scrambled or encoded so that they cannot be understood by others. And this raises suspicions from the other party or often called cryptanalyst. Based on the results or outputs of a text-based steganography (stegoteks) process against a message, text steganography in Indonesian patterns can evoke a correlation of ambiguity with cryptography in avoiding disclosure of confidential messages with a 100% accuracy rate.
Implementation of Extreme Programming Method in Web Based Digital Report Value Information System Design Adi Supriyatna; Diah Puspitasari
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1004.242 KB) | DOI: 10.30645/ijistech.v5i1.116

Abstract

The process of data collection and processing of student scores that is carried out continuously from year to year is felt to be unable to produce fast, precise and accurate information, because it takes a long time. Computerized information system processing student grades is expected to be able to ease the work of homeroom teachers, so that they can produce valid information in a short time and can be accessed anywhere. With good processing and management, value data processing will be easier, faster, more accurate. The purpose of this research is to build a web-based digital report card information system as a solution offered to help solve problems faced by schools. The system development method used is Extreme Programming (XP) which has several stages, namely planning, designing, coding, testing and Software Increment. The results of this study are the creation of an information system that can provide several advantages as well as efficiency and effectiveness in processing information and managing value data up to the printing of student report cards.
Decision Support System to determine students who are eligible to receive the scholarship of Indonesian Smart Card (KIP) By Using Fuzzy Sugeno Nanda Jarti
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (587.166 KB) | DOI: 10.30645/ijistech.v5i2.129

Abstract

Smart Indonesia Card (KIP) Is a state guarantee card for the continuity of college by providing freedom of tuition fees, fees given to underprivileged students so that they can continue their education. The problem that occurs in the provision of kip scholarships is that it is difficult to analyze students who are entitled to receive the scholarship so that standard criteria are needed such as proof of kip card, photocopy of report card, certificate of graduation, photo of student's house and photocopy of family card so that the scholarship given is right on target for students who entitled to receive such assistance. This study uses the Sugeno method by taking the Max value (the highest value) and using the or operator. The benefits of this research can be used as a decision-making system.
Implementation of Simple Additive Weighting to Determine Priority for Handling Customer Complaints Yuwan Jumaryadi; Tedjo Nugroho
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (421.287 KB) | DOI: 10.30645/ijistech.v5i1.110

Abstract

The number of population is increasing, and the competition is getting tougher. It requires companies to remain able to survive and be able to compete with other companies, especially with companies that have the same line of business. The increasing use of the internet today has caused many changes in various fields. Many efforts are made by the company to survive, including by providing the best service to its customers. The use of existing technology for developing information systems for handling customer complaints is expected to help companies improve the quality of their products or services. In company management, it is important to provide good quality service in order to increase customer satisfaction. By determining the priority for handling customer complaints, it is expected to improve the Key Performance Indicator (KPI) of engineers. The decision-making process using the simple additive weighting method is carried out by weighting each criterion. This research is expected to determine the priority of handling customer complaints so that it can help engineers in determining the priorities for handling existing complaints.
E-business Startup Model using Canvas Business Model (case study: SiJasPro) Muhaimin Hasanudin; Dedy Prasetya Kristiadi; Budi haryanto
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (626.325 KB) | DOI: 10.30645/ijistech.v5i2.123

Abstract

With the rapid development of information technology today, more and more businesses are using the internet as a medium to disseminate information and choose the right business model in order to survive and develop. This study aims to determine the business model of a startup in the Project Services Information System (sijaspro) by conducting analysis and evaluation to determine the strengths, weaknesses, opportunities, and threats so that they can design a business model. The research method used is a qualitative method. This study uses the theory of the business model canvas and SWOT analysis. The results show that the company's business model requires several additional factors in each element of the e-business model in order to grow and develop better by providing building project features and services and applications to users
The Application of the MOORA Method in the Decision Making System for the Selection of the Best Employees at CV. Lautan Mas Dedi Candro Parulian Sinaga; Preddy Marpaung; Baringin Sianipar
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (665.217 KB) | DOI: 10.30645/ijistech.v5i2.139

Abstract

Employees are one of the important elements in the running of the activities of a company CV. Ocean Mas. Therefore, employees are always required to always provide the best quality service in their work to increase consumer confidence and maintain competitiveness between companies engaged in the same field. To motivate and determine the quality of service work from each employee, a method is needed to be applied in helping the company in the decision-making system to determine the best employees. Where the method applied in determining the best employees is the Multi-Objective Optimization method on the basis of Ratio Analysis Simple (MOORA). With the application of the MOORA method, it can produce good, effective, and professional decisions in accordance with the best value, which is ranked 1. So with the application of the MOORA method, it can assist the company in determining its best employees effectively and professionally every period.
Design and Development of Management Information System in Ma'had Huffadz Bilingual Darul Hikmah Malang Using Scrum Method S Supriyono
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (583.422 KB) | DOI: 10.30645/ijistech.v5i1.117

Abstract

The scrum method is the most important thing in building software. The following research builds a management information system on Ma'had Huffadz Bilingual Darul Hikmah under Darus-Sa'adah Al Mardliyah Foundation. The institution, which is one of the Boarding Schools Tahfidzul Qur'an located in the city of Malang, East Java. The following research uses the Scrum framework. The implementation of the scrum method in the following research uses three sprints. The process of working on each sprint takes no more than a month. The software development in this research is web-based. Work on application programs using the Laravel framework using the PHP programming language. The results showed that the scrum method is very effective in building a boarding school management information system. Scrum is more dynamic, and the results of this scrum implementation can be seen from the system that has been developed. So that by implementing Scrum can produce a system that suits the requirements of the user.