cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
Designing Time and Running Text With LED Matrix P 10 Using Arduino Uno Microcontroller Rima Tamara Aldisa; Mohammad Aldinugroho Abdullah; Muhammad Furqon Sofyan
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (462.926 KB) | DOI: 10.30645/ijistech.v5i6.193

Abstract

A running text is one of the media for promotion or we can call it advertising media where the writing will run and repeat. This running message or running text is very useful and helpful for someone who wants to promote a business that is running. For that date, it can be needed and a tool that is easily assembled is needed. The author made it entitled Design of Time and Running Messages with LED Matrix P 10 Using Arduino Uno. With this tool, it can be easier to promote something by displaying a running message, and this tool can also display the desired day, date, month, year
Prosodic Analysis of Pupuh Pucung using Mbrola Speech Synthesis Application I Gusti Agung Indrawan; I Putu Eka Giri Gunawan
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (726.729 KB) | DOI: 10.30645/ijistech.v5i5.187

Abstract

Pupuh Pucung is one part of the sekar alit which is part of the Balinese song. Sekar alit/pupuh has a rule in writing lyrics called padalingsa, which consists of guru wilangan, namely the number of syllables in each line, guru dingdong, which is the vowel in the last word of each line and guru gatra, which is the number of lines in one stanza. This study discusses how the text-to-speech application can help in developing pupuh pucung. Text to speech is an application that converts text into sound. In this research, an application design that can sing Pupuh Pucung's lyrics was developed with the concept of text to sing. This study uses the mbrola application as a text-to-speech converter. The analysis results, namely the frequency of the fundamental tone, aim to determine each phoneme's initial frequency in Pupuh Pucung. With the initial frequency, it will shorten the range of subsequent prosodic observations. The use of pupuh pucung's fundamental tone as a guide for the formation of prosody can be used as an initial guide in forming pupuh pucung's prosody.
The Relationship of Technology Advancement, Company Management, and Manager Knowledge on the Effectiveness of Accounting Information Systems Eel Susilowati; R Rofi'ah; Silvia Avira
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.371 KB) | DOI: 10.30645/ijistech.v5i6.200

Abstract

The background of this research is how to find the variables related to the accounting information system in a company, by knowing these variables, it can be seen which variables significantly affect the accounting information date variable. In this study, the method applied in this research is the literature review method and uses a survey tool to 100 employees at a company, with a survey conducted, it can be seen the data in the field, so that the data can be proven validly so that the data can be used now or in the future. The problem raised in this study is that there are three hypotheses, namely the first hypothesis is there a relationship between advanced technology and the effectiveness of the accounting information system, the second hypothesis is there a relationship between company management and the effectiveness of the accounting information system. The third hypothesis is there a relationship between managers' knowledge and the effectiveness of accounting information systems. The purpose of this study is how to find out the variables that are significantly involved in the effectiveness of the accounting information system variable which can be seen from the independent variables directed at this research. The independent variable is the sophistication of the company's management technology from the manager. Significant in influencing the effectiveness of the accounting information system
The Effectiveness of Cloud Simacreditation as A Supplement Instrument for Accreditation Value Conversion (ISK) (Case Study: University of Lancang Kuning) Bayu Febriadi; Febrizal Alfarasy Syam; Pandu Pratama Putra; Ahmad Zamsuri
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (798.48 KB) | DOI: 10.30645/ijistech.v5i6.194

Abstract

SIM Accreditation Cloud is a media accreditation simulation facility that is used by the Study Program and BPM in implementing and monitoring the feasibility of the study program whether it is in accordance with the standards that should be in creating a quality culture. Lancang Kuning University has 21 Study Programs consisting of 9 Faculties, in implementing an internal quality assurance system, Lancang Kuning University has a Quality Assurance Agency in charge of managing a quality culture, but in the implementation of accreditation with IAPS 4.0 this has not been effective, this is proven to be absent from the study program. who are ready to apply with IAPS 4.0, because there are still obstacles in the preparation of accreditation instruments, while the need for accreditation ratings is very much needed by study programs so that they are able to compete and realize the vision and mission of the study program. Sim Akreditasi Cloud 0.7776 koefesien Berpengaruh terhadap nilai instrumen Suplemen Konversi (ISK).
Reducing Data Social Network Utilizing Greedy Randomized Method Muhammad Rizqy Alfarisi; Andry Fajar Zulkarnain; Andry Alamsyah
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (691.993 KB) | DOI: 10.30645/ijistech.v5i6.188

Abstract

There are many complex data in social networks that can be combined into large data sets which can be accessed. Large amounts of data require more storage and increase the computed summary costs. The need to know how to use data effectively and to extract information from reduced data that has the same information as super data before being reduced. the first thing to do is to convert any unstructured data into structured data utilizing the greedy randomized method, the data can be grouped and combined with other data in its vicinity, and the size of the data can be reduced because the node (user) grouping as a linked pair and is formed the best node around it. This paper presents how to use the minimum description length, as information theory to provide solutions in the model selection problem and apply it in a greedy randomized algorithm that can group unstructured data to reduce data size and provide visualization of the relationship between nodes and how accurate and faster greedy randomized would reduce and combined data into simple link nodes
Weather Determination Prediction Using Expert Fuzzy Logic Mamdani Method Intan Utnasari; Narti Eka Putria
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (777.054 KB) | DOI: 10.30645/ijistech.v5i4.172

Abstract

The current climate and weather patterns are very extreme. This kind of weather condition can harm many people. In recent years, heavy rains have resulted in flooding. So far, computers can be used to help people solve problems. The smarter the system and the higher the level of information handling, the more active the role played by the Weather computer is the condition of the air at a certain time and in a certain area that is relatively narrow and in a short period of time. The weather is formed from a combination of weather elements and the weather period can only be a few hours. For example morning, afternoon, or evening, and the situation can be different for each place and every hour. The purpose of this research is to help predict the weather as information. This research uses the Mamdani method. This Mamdani method uses 4 stages to produce an output value, namely, determining the input value (fuzzification), determining the value of x (implication function application), Combination of Rules (Rules), and finally determining the final value or (Defuzzification). This research produces an output value of 35 which is located in the Panas range.
The Vocal Patterns Recognition In Artificial Neural Network By Using The Hebb Rule Algorithm Sestri Novia Rizki; Yopy Mardiansyah
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (836.93 KB) | DOI: 10.30645/ijistech.v5i6.205

Abstract

ArtIficial network recognition Pattern Recognition is a branch of Artificial Intelligence that is better known as artificial neural networks. This method is growing rapidly at this time because it has a more accurate security system and has information that has a devised system that can be blocked with an attached system and embedded in a pattern recognition feature, such as pattern recognition that can be detected including signature patterns, facial patterns, and fingerprints. The problem that often occurs is the lack of information and securing data and confidentiality to produce information so that it can be used by authorized people only. The algorithm used in this study is the Hebb Rule algorithm. The Hebb Rule algorithm is an algorithm that has similarities to the McCulloch Pitts network architecture by using the concept of input units combined directly with output units, plus a bias value. The results of Pattern A = after being tested, the value is 4, Pattern I is recognized as -12, Pattern U is recognized as 13, Pattern E is recognized as much as 16, and Pattern O is recognized as much as 18. The final result of the research on recognizing vowels A, I, U, E, and O is unable to recognize patterns because they have different values in each vowel.
Steepest Ascent Hill Climbing Algorithm To Solve Cases In Puzzle Game 8 S Silvilestari
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (535.186 KB) | DOI: 10.30645/ijistech.v5i4.153

Abstract

The 8th puzzle compiling game is part of searching. Puzzle 8 is an implementation of the steepest ascent hill climbing algorithm by following the established rules. The working process of this algorithm is by looking at the initial position of the puzzle arrangement, after carrying out the process, the results of the shift are seen, whether it is approaching the correct arrangement position. The problem that often occurs is the lack of knowledge in solving game cases quickly so that it takes a long time to obtain the final state. The main purpose of this study is to provide information so that it is easy to solve puzzle game cases using an algorithm. The final result is a puzzle arrangement that is in accordance with the rules by using the concept of an algorithm so as to obtain a decision-making system to complete the puzzle game correctly.
Sentiment Analysis of Public Transportation Services on Twitter Social Media Using the Method Naïve Bayes Classifier Rima Tamara Aldisa; Pandu Maulana; Muhammad Aldinugroho
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (818.822 KB) | DOI: 10.30645/ijistech.v5i4.166

Abstract

Public transportation services in Indonesia, especially Jabodetabek, have used social media, especially Twitter, as a way to improve services. Currently, the use of online transportation services is like a need; it is necessary to conduct a sentiment analysis of online transportation to find out how people respond to these online transportation services. This research was made to analyze community responses with data analysis in the form of tweets that filtered with a public transportation-related keyword then classified into positive and negative classes using the Naïve Bayes Classifier method. Based on the system built, the total sentiment results for the percentage of the occurrence of positive words were 0.507843137, and the sentiment results for the percentage of negative word occurrences were 1.4132493. The results show that the level of negative sentiment from public tweets is greater than the level of positive sentiment.
Fp-Growth Algorithm For Searching Book Borrowing Transaction Patterns And Study Program Suitability Lisna Zahrotun; Anna Hendri Soleliza Jones
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.693 KB) | DOI: 10.30645/ijistech.v5i5.180

Abstract

The current development of data has reached a sizeable amount. This is due to the development of the world of information technology which consists of data in it. One technique that can handle abundant data is data mining. Data mining methods are widely used to perform large amounts of data analysis. In the academic field, analysis can be used to determine the patterns of students and lecturers. Whereas in library transactions, analysis can be carried out to determine the patterns of existing book borrowing. This is done to determine the tendency of students with certain study programs to borrow any uku transactions. In this study, the aim of this research is to analyze the patterns of borrowing books from the Ahmad Dahlan University library, which includes borrowing transaction data and the book owner's study program. In addition, in this study, a percentage analysis of the suitability of the book borrower study program and the book owner's study program was also carried out. The stages in this research include data collection, data cleaning, data selection, data transformation, searching for association patterns using the FP-Growth method and pattern evaluation. The test used in this research is the lift ratio. The results of this study are publications in international journals that are in the draft process. Apart from that, the results of this study provide information on the analysis of patterns of lending books in libraries using the FP-Growth method. The resulting pattern is 103 patterns with a support count value of 5 and a confident 10% with the 2 itemset rule, this means that the level of book borrowing is still low. While the results of the analysis of the suitability of books in the study program with the borrower were 31% in accordance with the study program, namely Pharmacy and Public Health Sciences, meaning that there were 69% of students who borrowed books from the library that were not in accordance with their study program.