cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
Application of Data Mining For Clustering Car Sales Using The K-Means Clustering Algorithm Hutasoit, Michael Nico; Fa’rifah, Riska Yanu; Andreswari, Rachmadita
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.307

Abstract

In the digital era, data is at the core of business continuity. The need for fast, precise and accurate information is needed. Cars are one of the tertiary needs. This means of transportation is a relatively fast development and innovation business. Car sales in Indonesia recorded a reasonably high number in 2014 - 2018, namely 4.157.580 units sold. The highest sales were MPV car types being the most popular type of car, and there are many types of cars in Indonesia, including Sedans, SUV, 7 Seater SUV, and City Car types, and the enthusiasts need to play more. Hence, it is exciting to study. The variety of car brands with competing prices makes it difficult for consumers to choose the right car to buy according to their needs. This can be solved by applying data mining to cluster car sales using the k-means clustering algorithm. The goal is to know the characteristics of the car from each attribute. The k-Means algorithm is used for cluster formation based on five attributes: CC, Tank Capacity, GVW (Kg), Seater, and Door. The elbow and silhouette score methods determine the optimal number of clusters (k). The result is 4 clusters, cluster 0 (High-Performance Heavy Car), cluster 1 (Small Family Car), cluster 2 (High-Performance Small Car), and cluster 3 (Medium Performance Car). The 4 Cluster results are based on the evaluation/validation of the Elbow Method and Silhouette.
Implementation Of Simple Linear Regression Algorithm In The Alumni Tracer Application Based on A Website at SMK Negeri 1 Sanaman Mantikei Languju, Indri Kristin; Yusuf, Mohamad
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.308

Abstract

SMK Negeri 1 Sanaman Mantikei is one of the state vocational schools which has been standing for a long time and is well-known in Central Kalimantan. Therefore, it has many students from various regions, both within Kalimantan Island and outside the island. Of course, an impact on the increased number of graduates annually. Who are in different positions and roles. The existence of this Alumni Tracer application based on a website can be a solution for the school's need to collect data on its Alumni. This Tracer Alumni application is planned by Apex App Builder of a website application, employing the Rapid Application Development (RAD) method and utilizing Linear Regression Algorithm. The results of this research can predict the number of Alumni who have a job, providing estimations based on data within a specific time frame. The accuracy testing, conducted through manual Excel calculations, resulted in 336, while the accuracy testing with RapidMiner yielded a similar value of 336. This indicates that both manual and machine learning can be considered consistent.
Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
The Application of the MOORA Method on Recommendations for Selection of Promotional Media for Nurul Izzah Kindergarten Siregar, Annisa Fadillah
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.303

Abstract

Nurul Izzah Kindergarten is one of the kindergartens located in Deli Tua District, Deli Serdang Regency, North Sumatra. Nurul Izzah Kindergarten has an educational concept of learning either religion or other general education without losing the playful children's world. However, the Deli Tua District community in Deli Serdang Regency is not very familiar with Nurul Izzah Kindergarten, therefore promotion is needed. In this matter, a decision support system is necessary on aiming to recommend the priority of media promotions using the MOORA method. The MOORA method is used to calculate the weight value of each attribute, then the process of which alternative ranking is the most recommended according to the results of the highest Yi calculation, some of these alternatives are Tiktok, Instagram, Facebook, Brochures, and Posters. For recommendations for promotional media, several criteria are required such as the cost, reach, attractiveness, and completeness of information. Based on the calculation of the MOORA (Multi-Objective Optimization based on Ratio Analysis) method for each alternative, the highest Yi is Tiktok with 0.3306 and the second highest Yi is Instagram with 0.2956.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.
The Concepts of Gamification Profiling to Generate Smart City Maturity Level Mapping & Social Profiling (Smart Society) Gamayanto, Indra; Maulana, Herman Try; Sirait, Tamsir Hasudungan; Prasetyo, Lusi Noviani
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.304

Abstract

Gamification is an extraordinary phenomenon of how we can engage users to understand our Business. Users can get many interesting things from gamification offered by business owners, ranging from games, bonuses, discounts, and many other things that can make users or consumers more loyal and have a close relationship with the Business. This research is developing the concept of innovation profiling, which describes seven types of innovation. Here, gamification is one of the innovations we will discuss. This study divides gamification into three important parts, units that should not be separated. The first part concerns the big picture of gamification profiling and the Formula GMF = P. B2. E2. Ps2.F2. In the second stage, there are four types of gamification- open Gamification (OP), specific Gamification (SG), innovative Gamification (IG), and undeveloped Gamification (UG). The third stage, the final stage, is Business Gamification profiling (BG), Education gamification profiling (EG), Psychology gamification profiling (PG), and Future gamification profiling (FG). This research results in the gamification profiling framework and its application in education as the main case study in implementing this. Furthermore, Smart city and social profiling are two things that cannot separate from each other. Therefore, in building a smart city & social profiling, several important things must be considered, including investors, people, culture, supervision, customers, data, mapping, mentors, capabilities, commercials and leadership. This article will develop Business Model Mapping 101 (Smart City Maturity Level Mapping), an innovation in shaping and producing social profiling. Problems such as implementing smart cities in human resources, technology, and other factors are the main concerns. Therefore, Smart City Maturity Level Mapping is a social profiling development concept that focuses on building something from what the area already has. It is to increase the level of a more stable economy but remain flexible in dealing with certain situations. Furthermore, this article complements the previous article, namely smart city 5.0 (Human resource, Technology, marketing). These three things then developed into Smart City Maturity Level Mapping, which later became social profiling, which is useful for measuring smart cities' performance and implementation in a more structured, systematic and detailed manner in terms of profiles. The final result is the maturity level to measure a smart city's performance, which also connected to the defender, extender, dodger, contender.
Design of a Web-Based Truck Maintenance Information System Using Web Engineering Methods at PT. POS Logistics Indonesia Palembang Branch Office Nugraha, Adriansyah
IJISTECH (International Journal of Information System and Technology) Vol 7, No 3 (2023): The October edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i3.313

Abstract

PT Pos Logistics Indonesia Palembang Branch Office as a logistics company faces challenges in maintaining a fleet of trucks for optimal operations. The lack of a truck maintenance information system causes efficiency and effectiveness to be hampered. Therefore, this research designs a web-based truck maintenance information system with the aim of improving the management and performance of truck fleets. The development method used is web engineering with integration of truck, driver, mechanic and spare parts data. This system also supports data archiving to maintain good historical documentation. By implementing this system, it is hoped that truck maintenance information will become more accurate, complete and efficient.
Utilization of Microcontroller Technology as A Food and Beverage Menu Ordering for Service at The Cafe Ashari, Mohammad Ibrahim; Artiyani, Anis
IJISTECH (International Journal of Information System and Technology) Vol 7, No 3 (2023): The October edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i3.314

Abstract

The cafe service system in this modern era still uses manual labor. This is less effective in terms of service speed and of course will increase operational costs due to the need for a large number of waiters. For this reason, an electronic food and beverage ordering device is needed. This is useful for speeding up the service process and also reducing service personnel, of course, also reducing operational costs. This research will present the use of the ESP 8266 module as a minimum system design for ordering menus on consumer tables. Input from the dining table containing the menu code and number of menus will be displayed on the LCD. Furthermore, data will be sent from ESP 8266 to the kitchen to mix food and drinks ordered by consumers. The data is also transferred to the cashier's PC, whereupon the cashier prints invoices for consumers. From the test results on the LCD can already display a menu of food and drinks. The cashier PC and kitchen PC have also displayed the food and drink data ordered. Cashiers can also print bills for consumers.
The Influence of Actual Usage in Using QRIS on Payment Methods Sefrika, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 3 (2023): The October edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i3.315

Abstract

Along with technological developments, one of the features used by many users is electronic money. QRIS as an electronic payment method is currently widely used by citizens to carry out payment transactions. However, more in-depth research needs to be done to find out the factors that influence the use of QRIS. This research aims to determine the background that underlies users in using the QRIS method. This research method uses the Technology Acceptance Model or TAM. TAM is a method that can be used to find out how technology is accepted by users with valid measurement results. The research results show that the majority of users use the QRIS payment method because of the perception of convenience, thereby generating interest among users
Geographic Information System For Infrastructure Damage Handling at Perumdam Tirta Anom Nurdin, Arif Muhamad
IJISTECH (International Journal of Information System and Technology) Vol 7, No 3 (2023): The October edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i3.316

Abstract

Perumdam Tirta Anom Banjar city has services to meet the needs of clean water and drinking water for the people of Banjar City. In meeting the needs of clean water Perumdam Tirta Anom has several water treatmen infrastructure, piping, reservoir, pipes and office buildings. Perumdam Tirta Anom Banjar City has the responsibility to handle infrastructure damage based on reports of damage from the community as well as on schedule of periodic maintenance of infrastructure. Monitoring of Perumdam Tirta Anom infrastructure is conducted based on monthly report and grouping of location is still in general in Banjar City area only, so that there are constraints in the accuracy of handling damage. Head of Distribution Section requires a system that can monitor all activities handling infrastructure damage, and assist Head of Sub Division of Planning in determining the main priority of handling infrastructure damage. The proposed solution based on the problems that have been described is building a geographic information system that handles damaged infrastructure of Perumdam Tirta Anom Banjar City. The software development analysis approach used is object-oriented analysis, and geographic information system is built on the website, and for the determination of the main priority of handling infrastructure damage using TOPSIS method.