cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
User Acceptance Test For Digital Signature Application In Academic Domain To Support The Covid-19 Work From Home Program Irawan Afrianto; Andri Heryandi; Alif Finandhita; Sufa Atin
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.593 KB) | DOI: 10.30645/ijistech.v5i3.132

Abstract

The user acceptance test (UAT) is the final stage in the production of the application. This is intended to see the degree to which the system can function and satisfy the needs of its users. The objectives of this research is to test the function and user acceptance of the digital signature application in the academic environment to support the covid-19 work from home program. The approach used in the user acceptance test is to use the black box method and the Likert scale questionnaire to figure out the functional scope of the program, as well as the acceptance of system by users while using the application. The results of the test show that the digital signature application that has been designed, functionally can run well and generates a user acceptance value of 82.07%. It can be concluded that the application that was developed has been accepted by users and fulfills the needs of its users, it is an alternative solution, especially in signing academic documents during the current Covid-19 pandemic.
Forensic Whatsapp Investigation Analysis on Bluestack Simulator Device Using Live Forensic Method With ACPO Standard Kurniadin Abd. Latif; Rifqi Hammad; Tomi Tri Sujaka; Khairan Marzuki; Andi Sofyan Anas
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (751.201 KB) | DOI: 10.30645/ijistech.v5i3.148

Abstract

This study aims to conduct a forensic analysis of the WhatsApp application on the Bluestacks android simulator device. BlueStacks App Player is designed to allow Android apps to run on PCs running Microsoft Windows and Apple's macOS. In this study, the scenario was carried out using two devices as Whatsapp communication media. The first device is a laptop device that uses the Bluestacks android simulator with the SM-G955F device type, and the second is a smartphone device as opposed to communication. This study uses the ACPO standard which consists of several stages such as Plan, Capture, Analysis, Present. Pada tahap Capture, teknik yang digunakan dalam melakukan  pencarian bukti pada aplikasi BlueStacks adalah live forensik. Hasil penelitian ini menunjukan bahwa analisis forensik pada perangkat android simulator Bluestacks dapat dilakukan sesuai prosedur ACPO. From the procedure carried out, information related to communication on the WhatsApp application was obtained. The source of this information is obtained from the WhatsApp database file msgstore.db.crypt12 which has been decrypted using the SQLite Browser application with a combination of the WhatsApp Key file contained in the cloned digital evidence. From the results of the decryption that has been carried out, then an explanation is carried out through the WhatsApp viewer application to make it easier to understand from the display side.
Analysis of The Quality of The Eskanusa.Com Website on User Satisfaction with the Webqual 4.0 Method Mochammad Lazzuardi Effendi; Nurajijah Nurajijah; Siti Nurlela
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (672.769 KB) | DOI: 10.30645/ijistech.v5i3.134

Abstract

Information technology is currently growing rapidly, one of which is the use of the internet. PT. Eskanusa Putraco is one of the companies that use the internet as a medium to sell goods online on their website, namely eskanusa.com. User satisfaction with the use of the website will affect employee performance. This study aims to analyze how satisfied users are in their activities on the escanusa.com website using the webqual 4.0 method with 3 independent variables, namely Usability, Information Quality, Interaction Quality, Service (Service Interaction Quality), and 1 dependent variable, namely Overall (Overall Impression) / User Satisfaction. Data collection techniques used questionnaires that were distributed to 44 respondents. Data management is carried out using descriptive statistics to calculate the overall data obtained, which is then tested for validity and reliability tests to find out the data obtained are valid and reliable, followed by classical assumption tests using 3 tests, namely normality, multicollinearity, and heteroscedasticity to determine if symptoms occur. or not on the data, and multiple linear regression analysis to determine the independent variable has an influence with the dependent variable with the F test and T test. It is known that the variables (usability), information quality (information quality), interaction quality, service (service interaction quality) affect user satisfaction, the results obtained are 40% or not good enough because the variables of information quality and interaction quality, which are known to have not good enough influence on users.
Implementation of Cloud Accreditation as Accreditation Assessment Simulation in Lancang Kuning University Bayu Febriadi; Adi Rahmat; Pandu Pratama Putra
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1015.288 KB) | DOI: 10.30645/ijistech.v5i3.149

Abstract

SIM Accreditation Cloud is a media accreditation simulation facility that is used by the Study Program and BPM in implementing and monitoring the feasibility of the study program whether it is in accordance with the standards that should be in creating a quality culture. In the face of the Regulation of the Minister of Education and Culture (PERMENDIKBUD) No. 5 of 2020 and the regulation of the National Accreditation Board for Higher Education (BANPT) No. 1 of 2020, related to the mechanism for extending the accreditation of universities and study programs that already use the Higher Education Accreditation Instrument (IAPT 3.0) and Study Program Accreditation Instrument (IAPS 4.0), so We need a system that can help Lancang Kuning University in the preparation and implementation of accreditation assessment simulations for both universities and study programs in order to be able to adjust the implementation and preparation of the mechanism for extending the validity period of accreditation for colleges and study programs. However, the fact is that until now there has been no study program that has proposed an extension of the accreditation period using the Study Program accreditation instrument. Lancang Kuning University has 21 Study Programs consisting of 9 Faculties, in implementing an internal quality assurance system, Lancang Kuning University has a Quality Assurance Agency in charge of managing a quality culture, but in the implementation of accreditation with IAPS 4.0 this has not been effective, this is proven to be absent from the study program. who are ready to apply with IAPS 4.0, because there are still obstacles in the preparation of accreditation instruments, while the need for accreditation ratings is very much needed by study programs so that they are able to compete and realize the vision and mission of the study program.
Image Captioning Approach for Household Environment Visual Understanding Dhomas Hatta Fudholi
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (579.127 KB) | DOI: 10.30645/ijistech.v5i3.135

Abstract

Image captioning task generates a description from an image in a form of a sentence. It holds various critical usage in different applications and domains, such as indexing in retrieval system, by capturing semantic information within the images. In the area of live quality support system, an image captioning model may be used by visual impaired people to achieve visual understanding of their surroundings. In this paper, we present a novel image captioning model that aims to give visual understanding on household environment. To develop the model, we use five different household objects (sinks, chairs, tables, beds, couches) from MS COCO datasets. We create three new captions, in Bahasa Indonesia, for the selected data. The captions describe the name, the color, the position/location, the size, and the type/characteristic of the related object and its close surrounding. InceptionV3 and LSTM architecture is used to train the model with GloVe as the word embedding. In this study, our developed image captioning model can generate caption well and achieved BLEU-1 score of 0.502033, BLEU-2 score of 0.312539, BLEU-3 score of 0.193333, BLEU-4 score of 0.106111, METEOR score of 0.183193, ROUGE-L score of 0.358339, and CIDEr score of 0.348903.
Developing The Concepts & Strategy of Smart Regional: How to Increase Tourism & Investors (Smart city 4.0) Sendi Novianto; Farrikh Alzami; Indra Gamayanto
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (638.493 KB) | DOI: 10.30645/ijistech.v5i3.140

Abstract

Smart city 4.0 is a development of the three previously published articles, namely smart city 1.0,2.0 and 3.0. The smart city article that we created is a long process in research, so we have to make it gradually and make it into several parts. Smart city 1.0 and 2.0 we designed a big picture of a smart city and how the maturity level understood. Next, in smart city 3.0, our focus is on how smart education can be applied in collaboration between each educational institution so that a high-quality level of education achieved in the area. In smart city 4.0, we focus on designing a concept that focuses on developing tourists and how to get investors interested in investing. Factors such as culture, infrastructure/facilities, human resource development in the community, safety and comfort, profit sharing, development of tourist attractions, innovation in improving people's lives and many other factors are our main concern in this article. The methods used in smart city 4.0 are PDCA & USEPDASA, which are both appropriate methods for developing a special framework for tourists and investors. The stages in smart city 4.0 are mapping in terms of culture, human resources, facilities, information technology, security and comfort. These divided into two parts: on the side of increasing tourists and the side of increasing investors. The result of smart city 4.0 is a framework to be able to connect all activities in a smart city to generate profits for the area.
Analysis of Back-End Requirements of a Web-Based Application to Identify Damage for Building Structures A Anisya; Fajar Nugroho
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (456.512 KB) | DOI: 10.30645/ijistech.v5i4.162

Abstract

The need for well-maintained facilities can certainly affect activities in the building. To meet these needs, a building maintenance work program is needed to achieve the planned life of the building. The problem with contractors is that they still use telephone communication to receive reports of any damage to the building. This paper discusses the needs analysis in the construction of a building damage reporting system from the back-end side. The application is built on a web-based basis and provides information about the building in terms of the structural aspect as well as grouping the damage based on the damage criteria. The results of this study are obtained in the form of 10 tables that will compile a system database and transaction analysis that can be done in the system, namely generating building damage data reports where there are four categories of damage, namely light damage, moderate damage , severe damage, total damage and this application can later be used by building managers in reporting building damage through applications and contractors can monitor through applications
Implementation of A Decision Making System of Giving Bonus To Employees Using Fuzzy Logic Method Y Yendrizal
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (709.847 KB) | DOI: 10.30645/ijistech.v5i5.176

Abstract

Each company has its own standards in giving bonuses to outstanding employees in accordance with the company's rules. So we need a system that is able to solve the problem so that the bonus is given according to the performance of each employee. The problem that often occurs today is in the form of a lack of user knowledge in providing bonuses according to employee performance, so that this research can be used as a reference in giving bonuses to each employee according to performance. The solution for giving this bonus uses a decision-making system using Sugeno's Fuzzy Logic. The Sugeno method is to determine the input variable and the output variable which is a firm set, the second step is to change the input variable to a fuzzy set with a fuzzification process, then the third step is to process the fuzzy set data with the minimum method. And the last or fourth step is to change the output into a firm set with a defuzzification process using the centroid method, so that the desired result will be obtained on the output variable. Solving production problems using a comparison of the Sugeno and Mamdani methods. This method uses constants or mathematical functions of the input variables, and in the defuzzification process uses the centralized average method.
E-Teach : Mobile Application Teaching Administrative System Using Near Field CommunicationN (NFC) F Ferry; Dedy Prasetya Kristiadi; S Sutrisno
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (545.143 KB) | DOI: 10.30645/ijistech.v5i4.156

Abstract

Teaching administration is a teacher's needs that are recorded or recorded into files stored by the school curriculum section. Teaching administration is in the form of lesson plans per semester made by the teacher to be applied based on the planned subject matter. Archiving of learning outcomes data and teaching materials is often ignored so that teachers do not provide subject matter according to the study plan and evaluation of learning outcomes is not satisfactory. In addition, the teacher administration file is a need for school accreditation which is a benchmark for the education office's assessment, which is a serious concern for schools in making reports in their work units. To reduce administrative errors, loss of data and the effectiveness of teaching services and assist teachers in managing lesson plans and evaluating learning outcomes, a tool that is able to provide solutions is needed. Near Field Communication, abbreviated as NFC, is a development tool for Bluetooth and RFID. NFC allows the phone to store important data securely and sent to other phones equipped with NFC or read by an NFC reader. In addition, this NFC allows mobile phones to be developed for the administration of school payments as well as giving class schedules to students. In this study, a teaching administration system based on Near Field Communication (NFC) has been developed using the Raspberry Pi as a microcontroller as well as a computer capable of applying web-based programs. Electronic teaching administration with NFC is expected to replace conventional teaching administration. The advantages of NFC-based E-Teach are that it takes a short time to use, does not depend on internet access and is easy in delivering teacher administration to those in need. Study plan data processing and evaluation of student learning outcomes are faster, more accurate and integrated with the management of education providers.
Home Security And Access System Prototype Using Fingerprint Muh. Fahrurrozi; Lalu Puji Indra Kharisma
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.978 KB) | DOI: 10.30645/ijistech.v5i4.169

Abstract

A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.