cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
Application of Prediction of Motorcycle Spare Part Sales with the Trend Moment Method Septiani, Noer Azni; Ramdhani, M Ronal
IJISTECH (International Journal of Information System and Technology) Vol 8, No 1 (2024): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i1.342

Abstract

One important aspect of running a successful motorcycle repair shop business is being able to control the inventory of motorcycle spare parts. Motorcycle spare parts in motorcycle workshops usually estimate stock by guessing only, which results in existing stock piling up unsold, because there is no calculation for the estimated sales stock of motorcycle spare parts for the next year, this is a constraint in the availability and need for spare parts stock. The author's purpose in this study is to determine the process of forecasting or forecasting the sales stock of motorcycle spare parts in a workshop, to design and make sales predictions in the workshop that are objective and measurable in accordance with past sales data, to apply sales predictions using the Trend Moment method in determining the estimated stock of spare part sales in each subsequent month. From the existing problems, the workshop will predict the sale of motorcycle spare parts. Application design that has been designed with a system that has been implemented using PHP programming language and database using MySQL, XAMPP using the process of forecasting motorcycle spare part sales using the Trend Moment method, starting from entering sales data in the previous period, to the forecasting process using the Trend Moment method to get results on how much stock of motorcycle spare part sales for the next month
IOT-Based Bengawan Solo River Water Discharge Increase Marker System (Internet of Things) Anggita, Febri Arif; Maulindar, Joni; Susanto, Rudi
IJISTECH (International Journal of Information System and Technology) Vol 8, No 2 (2024): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i2.359

Abstract

When the rainy season comes, the water in the Bengawan Solo river will experience an increase in water discharge and will result in the area being flooded in the watershed area so that the community will suffer material and life losses. So that a device to detect the increase in water discharge is injured remotely, to give a sign that the water has increased so that the community can save valuable goods. So that the community does not suffer many losses and can immediately evacuate goods and souls to a safe place. This research aims to create a device to detect the increase in water discharge in the Bengawan Solo river remotely. In making the tool, the author uses the prototype development method, the author searches for data with various sources and types of data. The author collected data from interviews with local residents and related agencies. From this study, the author produced a system to detect the increase in water discharge and type of rain by using a water level sensor, rain sensor and ESP 32 microcontroller which can be monitored through a telegram application remotely using an internet connection. The tool made by the author can detect the river water level from level 3, level 2 and level 1 and also detect the type of rain that occurs around the river.
Website Usage Analysis as a Provider of Information and Promotions Agustina, Merry; Kurniawan, M. Rizky; Ariantoro, Tri Rizqi
IJISTECH (International Journal of Information System and Technology) Vol 7, No 4 (2023): The December edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i4.321

Abstract

Paradigm changes are also occurring in the field of marketing which is shifting from a selling and marketing concept to a holistic marketing concept which is caused by rapid changes in the market and its supporting technology with the Internet as the main pillar. Based on data from https://databoks.katadata.co.id/ The Data Reportal report noted that there were 4.95 billion internet users in January 2022. This number increased 4% from 4.76 billion people in January 2021. As of January 2022, internet users in Indonesia it reached 204.7 million. This number covers 73.7% of Indonesia's total population. One of the sophisticated Internet facilities that is widely used by business people as a means to promote their products is through websites. Facilities that can change the existence of a business into unlimited information that can be accessed by people in various corners of the world without having to spend large amounts of capital are a promising offer from the existence of the Internet today. The results of this research explain the path coefficient (β) and t-test, all hypotheses that influence User Satisfaction are declared accepted. Then, referring to the results of the choices in the questionnaire, the Usability Quality (USA) variable has a fairly high influence on User Satisfaction compared to other variables. This is related to the quality of the website, which is attractive in terms of user interface and ease of operation. Of course, this creates a positive experience for users when accessing the Mitra10 website. It is hoped that Mitra10 can improve the quality of the website in terms of usability and service interaction quality because these variables have a significant positive influence on user satisfaction of the Tokopedia website. One way to increase usability is to improve the appearance of the website so that the menus on the website are easier to find. Mitra10 is expected to focus more on the service interaction side because it has an influence on high user satisfaction. If service interaction is improved, user satisfaction will also increase significantly.
Combined Performance of Hill Cipher and Rivest Code 6 (Rc6) Algorithms in Image Security Santoso, Heri; Rambe, Nia Sabrina; Suhardi, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 6 (2024): The April edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i6.337

Abstract

Digital image files are a form of information that is accurate and reliable enough to describe something, so the level of authenticity of this information needs to be maintained. Especially when sent via the internet as in chat-based applications such as Facebook, WhatsApp, Instagram and other social media. To maintain the security and confidentiality of digital image/image information, it is necessary to have a technique called cryptography. Cryptography is a technique or algorithm for changing data or information to be different from the original information. For example, in everyday life, there is a result of a design order that is still in the development stage that needs to be shown to prospective buyers, a drawing file or documentation image file that is private and confidential, so it is important to pay attention to its security. This research will use the combined performance of the Hill Cipher and Rivest Code 6 cryptographic algorithms in securing image files. The results of the Hill Cipher and Rivest Code 6 cryptographic algorithm encryption are able to disguise the image during the encryption process. And can restore to the original image in the decryption process. So that the encrypted image is safer to send via the internet or social media.
Implementation of Machine Learning Classification of Obesity Weight using Dicision Tree Putra, Fajar Rahardika Bahari; Surahmanto, Muhammad; Haris, H
IJISTECH (International Journal of Information System and Technology) Vol 8, No 2 (2024): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i2.354

Abstract

This work presents the application of the Decision Tree algorithm in the classification of obesity status using a machine learning approach. Indonesia is faced with three nutrition problems at once: stunting, wasting, and obesity or overnutrition. Obesity is a condition with excessive accumulation of body fat, which can lead to diseases and reduce quality of life. This study uses a dataset of 500 respondents and aims to classify obesity status early using the Decision Tree algorithm. The findings show that the developed Decision Tree model has an accuracy of 82%, with high precision and recall values, demonstrating the effectiveness of the algorithm in classifying obesity status. In conclusion, this study demonstrates the significant potential of the Decision Tree algorithm in supporting the early detection of obesity and facilitating more focused health interventions.
Determination of The Closest Path Using The Greedy Algorithm Furqan, Mhd.; Adha, Rifki Mahsyaf; Armansyah, A
IJISTECH (International Journal of Information System and Technology) Vol 7, No 5 (2024): The February edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i5.332

Abstract

Several alternate routes are displayed by the greedy algorithm, which is widely used in the closest travel route search application. This study employs the greedy method, which sets up a route map to quickly determine the shortest path. The goal of this study is to find the shortest path using a greedy algorithm. By using a greedy algorithm system to find the closest point to which the user's selection is made, the study's eight times with different points on the graph can be seen in the user's position. In an attempt to find the best solution, the greedy algorithm—which is renowned for its simplicity and effectiveness—iteratively chooses the best option available at each step. The greedy algorithm frequently gives priority to proximity when it comes to travel route optimization, and it might not always produce the shortest path overall. However, it's a well-liked option for some applications due to its quickness and simplicity of implementation. Notwithstanding its drawbacks, the greedy algorithm can offer insightful solutions for optimization and route planning issues. Users can make decisions more quickly and possibly find alternate routes they might not have otherwise thought of by using this algorithm to find the closest point in a travel route search application. The study's conclusions also emphasize how crucial it is to take user convenience and preferences into account when developing route planning systems. Future studies could look into ways to improve the greedy algorithm's performance and fix its drawbacks, like adding more heuristics or combining it with other optimization strategies. Overall, this study's findings validate the greedy algorithm's efficacy as a workable choice for locating the closest point in travel route search applications, providing consumers with a dependable and approachable navigational aid.
Sentiment Analysis Of Instagram Social Media Users For BPJS Health Services Using Support Vector Machine Algorithm Hsb, Dinda Umami; Furqan, Mhd; Armansyah, A
IJISTECH (International Journal of Information System and Technology) Vol 8, No 1 (2024): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i1.349

Abstract

Health services are an important aspect of people's quality of life, and BPJS as a public health service provider in Indonesia is often the subject of discussion on social media platforms. The SVM method has proven effective in sentiment analysis in various domains, including social media. In this study, data in the form of user comments and uploads on BPJS Instagram accounts were collected and processed to identify Positive, Negative or Neutral sentiments regarding the health services provided by BPJS. with the government's efforts to improve access and quality of health services for pregnant women as well as provide financial protection in order to reduce maternal and infant mortality in Indonesia and has the aim of reducing the burden of childbirth costs for people with low and middle incomes. This information can be input for BPJS in improving quality according to public expectations. In this research with a data set of 600 comments, the research was carried out with the support vector machine classification and the highest accuracy results in the first test experiment on 80% training data and 20% test data with 97% precision, 64% recall and 77% F1-Score obtained accuracy by 83%.
Augmented Reality Introduction The Engineering and Computer of Harapan Medan University Using Markerbased Tracking Method Nurjamiyah, N; Elsera, Marina; Ashar, Khairil
IJISTECH (International Journal of Information System and Technology) Vol 7, No 4 (2023): The December edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i4.327

Abstract

Developing technology provides convenience in almost every field. One of them is the introduction of a campus that will be an option for prospective students. Almost every campus promotes its campus by using banners, brochures, and others. The use of flyer or brochure for introduction the Faculty of Engineering and Computers Harapan Medan University was less efficient because of student candidates were not familiar with the Faculty of Engineering and Computers Harapan Medan University. The use of Augmented Reality will attract the interest of student candidates to become more familiar with the Faculty of Engineering and Computers Harapan Medan University. The method used for Augmented Reality is markerbased tracking, and for system development method is using waterfall. The application is built using Unity3D and uses Vuforia as the software development kit, and also uses C#(Sharp) for its programming language. Based on the results obtained, the system is running well as desired, such as displaying 3D of Faculty of Engineering and Computers Harapan Medan University Building and the location of the FTK Building. Augmented Reality provides a better picture of how access, buildings, locations and administrative centers are in Faculty of Engineering and Computers Harapan Medan University.
The Influence of Quality Assurance and Knowledge Management on Higher Education Accreditation Performance Febriadi, Bayu; Putra, Pandu Pratama; Syam, Febrizal Alfarasy
IJISTECH (International Journal of Information System and Technology) Vol 8, No 1 (2024): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v8i1.348

Abstract

With the issuance of Permendikbud No 53 Tahun 2023 concerning the accreditation transformation mechanism and Quality Assurance System for higher education, it is hoped that existing study programs at state universities and private universities can adjust the direction of accreditation performance policies and Higher Education Performance Indicators. Lancang Kuning University currently has 32 study programs consisting of 11 new study programs that still have accreditation with minimum scores. So it is hoped that the study program will respond well to higher education accreditation performance. This is in line with the expectations of Lancang Kuning University to ensure a culture of quality in achieving the vision and mission of higher education. The method used in this research is quantitative by determining Quality Assurance and Knowledge Management variables in influencing the accreditation performance of universities and study programs. Quality Assurance 0.790 coefficient influences accreditation performance and Knowledge Management influence 0.778 coefficient influences the accreditation performance of Lancang Kuning University.
Using the Waterfall Model in Developing an Employee Payroll Information System Hidayati, Nur
IJISTECH (International Journal of Information System and Technology) Vol 7, No 4 (2023): The December edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i4.322

Abstract

Payroll is one of the most important elements in an organization, company or government agency, where remuneration is a right that must be given to employees for the performance and services they have provided during a certain period. Policies in managing payroll are certainly not the same from one company to another. Because each company has its own standards in determining the amount of salary that will be given to its employees. The most important thing is that the salary given must meet the Regional Minimum Wage  which has been determined by each region. Therefore, there needs to be good management in making payroll. However, currently there are still many organizations or companies that cannot manage their employee payroll well, because many still use conventional methods in calculating employee salaries. Under these conditions, of course it can cause problems. Problems that are often encountered include difficulties in recording employee salaries, delays in providing salaries to employees and inaccurate payroll reports produced. If this problem is allowed to continue, it will result in losses for employees. Therefore, to deal with this problem, it is necessary to develop a system with the hope that the resulting new system will be able to solve the problems faced in managing payroll. To support the development of this system, it is also necessary to select the right model that suits the needs of the organization or company. One of the models used is the Waterfall model. In the waterfall model, the stages that will be carried out in developing the system can be clearly identified, so that it is hoped that the final result will be an application that can be used in managing employee payroll information systems.