IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
17 Documents
Search results for
, issue
"Vol 3, No 1 (2019): November"
:
17 Documents
clear
Design of Artificial Neural Networks to Recognize Fingerprint Patterns
Frinto Tambunan;
Yudi Y;
Muhammad Fauzi
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.34
Image or pattern recognition system is one of the branches in computer science, this system can help the processing of fingerprint patterns, especially in the banking, police and users of other institutions who really feel the importance of using fingerprints. Several stages in fingerprint pattern image recognition are through the process of scanning, then the resulting digital fingerprint image is converted to a certain value, among others, the threshold process, the division of images, and representation of input values. The training process is carried out using two treatments: the first with a different level of understanding and the second training with different unit numbers, the best training is obtained with a level of understanding of 0.3 and the number of hidden units 10 by producing a short training time and relatively small errors. Fingerprint pattern recognition is done by two trials, based on 1 number of training patterns and 5 number of training patterns. From the research data, the ability of the system to recognize output patterns is greater if the number of training patterns increases, with a number of 1 training patterns, the system is able to recognize 50% external patterns while the 5 system training patterns are able to recognize 70% output patterns.
Analysis of Weight Product (WP) Algorithms in the best Go Car Driver Recommendations at PT. Maranatha Putri Bersaudara
Roni Kurniawan;
Agus Perdana Windarto;
M Fauzan;
Solikhun Solikhun;
Irfan Sudahri Damanik
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.28
This study aims to rank the best Go Car Driver. The problem arises because of the inaccuracy in giving value to the driver which results in the decision being given incorrectly so that the assessment tends to be subjective. This research was conducted at PT. Maranatha Putri Bersaudara. Sources of data obtained by observing, interviewing. The settlement method used is a decision support system with the Weight Producted method. The assessment criteria used are Performance (C1), Number of orders (C2), Rating (C3), Attitude (C4), Rating (C5) and Appearance (C6) where the alternatives used are 4 samples. The results obtained using the Weighted Product method are Alternative1 and Alternative4 which are recommended as the best go car driver with the assessment results of 0.0307 and 0.0272. It is expected that research results can be input to the relevant parties in recommending the best go car driver so as to minimize subjective judgment.
Implementation of ANN with the Cyclical Order Method For Forecasting the Life Span of the World’s Population
Muhammad Rizal;
Elviawaty Muisa Zamzami
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.41
This study aims to predict the age (life expectancy) of the world's population. This research is the development of research that has been done before. But in this study only to get the best architectural model to predict the age (life expectancy) of the world's population, using the Cyclical Order method. Whereas in this follow-up research, it will produce forecasting in the form of age (life expectancy) of the population in the world based on a model that has been obtained from previous research. The research data is the age data (life expectancy) of the world's population from the United Nations: "World Population Prospect: The 2010 Revision Population Database". This study uses 5 architectural models including: 3-5-1, 3-8-1, 3-10-1, 3-5-8-1 and 3-5-10-1. Of the 5 models used, architectural models 3-5-10-1 are the best with an accuracy of 97%, the value of MSE training is 0,0009979400 and MSE testing is 0,0008358919. Forecasting results from this study are expected to be a reference for governments in the world, especially Indonesia to pay more attention to the level of health and well-being of its population so that the level of life of the population is getting better and higher.
Disk-Less Network Implementation using Cyberindo Program (Case: BAHONET2 Siantar Game Center)
Tama Rudia Naibaho;
Sumarno Sumarno;
Zulaini Masruro Nasution;
Indra Gunawan;
Bahrudi Efendi Damanik
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.35
The hard disk device used on the personal computer (pc) client at the game center, however, must have decreased durability because it is used continuously as in the BAHONET2 Siantar game center. This problem can be overcome with various solutions, but the authors prefer the diskless network method using the Cyberindo program as a solution to the problem. The author begins to design the diskless network in question, which is a windows-based application that is used to run, configure, and perform diskless processes through the server. Before the design is done, the authors identify problems that arise in the system that was previously used. This is done in order to avoid various errors on the old system in system implementation so that the results obtained are more optimal. After being implemented, the authors conclude that the diskless system using the Cyberindo program can reduce the use of local hard disks and also faster client performance, the client can be operated properly like using a local hard disk. Also there is no need to update the game manually on each client, we only need to update the game on the server so that all clients can automatically play the updated game.
Implementation of Simple Multi Attribute Rating Technique Method using Decision Support System Concept (Case Recommendation of Salon Place in Pematangsiantar City)
Indra Riyana Rahadjeng;
Agus Perdana Windarto
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.29
The purpose of the research is to determine the ideal salon place considering the salon is a place visited by women to beautify themselves. This research can also be used as recommendations in the form of information in deciding whether consumers visit the salon or not based on research results. The method used in decision making is the SMART (Simple Multi Attribute Rating Technique) method. To determine the evaluation of the salon, researchers used 5 assessment criteria, among others: service (C1), facilities (C2), products (C3), price (C4) and Purchase Decision (C5). For alternatives used as a salon, among others: salon Sukim (A1), Necis (A2), Endah (A3), Crown (A4) and Chan Dhai (A5). The results obtained by Sukim (A1) with a final value of 0.8835 as the first rank, Endah Salon (A2) with a final score of 0.5530 as the second rank and Chan Dai (A5) with a final value of 0.45 as the third rank.
Cryptographic Symmetry Analysis with AES Algorithm for Safeguarding Data at Government Agencies
Muhammad Rizal;
Elviawaty Muisa Zamzami;
Muhammad Zarlis
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.42
Data is very confidential information because it contains important information about the company or agency. Therefore it is necessary to secure these important data, in order to avoid misuse, theft of information or manipulation by certain parties who are not responsible. To avoid theft and manipulation of data it is necessary to implement a computer-based security system. One of them is by using cryptography. Cryptography is the study of how to change information from a normal (understandable) state / form into an incomprehensible form. One method that can be used to secure messages or information is the Advanced Encryption Standard (AES). AES is a part of symmetry cryptography. The application of AES cryptographic algorithms in securing data at government agencies can produce encryption that cannot be understood by humans and produce decryption that is exactly the same as the initial plaintext inputted, so that important government data can be secured in such a way. This research will produce a program that can encrypt and decrypt data using the AES (Advanced Encryption Standard) algorithm which will be used to secure data at Government Agencies.
Efficient Comparative Analysis Of Fertilizers Palm Oil
Bayu Febriadi;
Anisya Anisya;
Pandu Pratama Putra
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.36
Palm oil is a vegetable oil-producing plant that has more advantages compared to other vegetable oil-producing plants, which have high productivity reaching 4 tons ha-1 Crude Palm Oil (CPO). Palm oil is also a raw material for making food and non-food ingredients, and renewable fuels. The author wants to make an analysis by comparing two methods, namely the AHP Method (Analytical Hierarchy Process) and Fuzzy logic which is able to handle the uncertainty and uncertainty used. Fuzzy logic used is the Fuzzy Tsukamoto inference system because this method uses monotonous value applications, the output of the inference output from each rule is explicitly given (crisp) based on α-predicate (fire strength). Whereas the AHP Method can facilitate in calculating the validity to the tolerance level of concentration as criteria and alternatives chosen by the user.
The Application of Data Mining in Determining Timely Graduation Using the C45 Algorithm
Asro Pradipta;
Dedy Hartama;
Anjar Wanto;
Saifullah Saifullah;
Jalaluddin Jalaluddin
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.30
Graduating on time is one element of higher education accreditation assessment. In the Strata 1 level, students are declared to graduate on time if they can complete their studies <= eight semesters or four years. BAN-PT sets a timely graduation standard of >= 50%. If the standard is not met, it will reduce the value of accreditation. These problems encourage the Universitas Simalungun Pematangsiantar to conduct evaluations and strategic steps in an effort to increase student graduation rates so that the targets of BAN-PT can be achieved. For this reason it is necessary to know in advance the pattern of students who tend not to graduate on time. In this study, C4.5 Algorithm is proposed to predict student graduation. This algorithm will process student profile datasets totaling 150 data. This dataset has a graduation status label. The value of the label is categorical, that is, right and late. The features or attributes used, namely the name of the student, gender, student status, GPA. The results of the C4.5 algorithm are in the form of a decision tree model that is very easy to analyze. In fact, even by ordinary people. This model will map the patterns of students who have the potential to graduate on time and late.
Numerical Techniques for Underwater Topographic Measurement with GPS and Echo Sounder
Satoshi Iwakami;
Masahiko Tamega;
Shuji Jimbo;
Masaji Watanabe
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.37
This study demonstrates numerical techniques for a topographic study of a water area. Data obtained by a GPS unit and an echo sounder were combined, and three dimensional data were generated. A problem to find a surface that contains those data points was reformulated to a problem to find a piecewise linear continuous function defined over a triangular mesh. An iterative method led to an approximation of a fixed point. Those techniques are illustrated, and numerical examples are introduced.
Android-Based Core Fiber Optic Management Information System Design In PT. Telkom Kebumen
Ari Waluyo;
Ega Latif Permana
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.31
The study aims to design the information system of fiber optic core management based on Android at PT.Telkom Kebumen. This study used qualitative method with a descriptive approach. Data collection techniques are carried out by observation and literature study that related to research. The software development method used waterfall. The problem of the research result are data processing of core management still using Ms.Excel so that the data received by technicians is not accurate because the data changes and data additions are slowly, and to looking for data is too difficult because the data that saved on Ms.Excel is too much. There are suggestions that submitted, designing a new information system that can help the job so that can be more effective and efficient. By utilizing the advanced android technology which owned by all technicians.