cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 14 Documents
Search results for , issue "Vol 5, No 5 (2022): February" : 14 Documents clear
Fp-Growth Algorithm For Searching Book Borrowing Transaction Patterns And Study Program Suitability Lisna Zahrotun; Anna Hendri Soleliza Jones
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i5.180

Abstract

The current development of data has reached a sizeable amount. This is due to the development of the world of information technology which consists of data in it. One technique that can handle abundant data is data mining. Data mining methods are widely used to perform large amounts of data analysis. In the academic field, analysis can be used to determine the patterns of students and lecturers. Whereas in library transactions, analysis can be carried out to determine the patterns of existing book borrowing. This is done to determine the tendency of students with certain study programs to borrow any uku transactions. In this study, the aim of this research is to analyze the patterns of borrowing books from the Ahmad Dahlan University library, which includes borrowing transaction data and the book owner's study program. In addition, in this study, a percentage analysis of the suitability of the book borrower study program and the book owner's study program was also carried out. The stages in this research include data collection, data cleaning, data selection, data transformation, searching for association patterns using the FP-Growth method and pattern evaluation. The test used in this research is the lift ratio. The results of this study are publications in international journals that are in the draft process. Apart from that, the results of this study provide information on the analysis of patterns of lending books in libraries using the FP-Growth method. The resulting pattern is 103 patterns with a support count value of 5 and a confident 10% with the 2 itemset rule, this means that the level of book borrowing is still low. While the results of the analysis of the suitability of books in the study program with the borrower were 31% in accordance with the study program, namely Pharmacy and Public Health Sciences, meaning that there were 69% of students who borrowed books from the library that were not in accordance with their study program.
Performance Analysis and Model Determination for Forecasting Aluminum Imports Using the Powell-Beale Algorithm Nur Arminarahmah; Syafrika Deni Rizki; Okta Andrica Putra; Anjar Wanto
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i5.186

Abstract

Aluminum is one of the most important metals for the industrial world, but currently, aluminum is scarce due to a shortage of electricity, which makes manufacturers limit their production. Therefore, to overcome this scarcity, the government imports aluminum. Imports that are carried out continuously will more or less affect the wheels of the economy in this country. Therefore, it is necessary to predict the value of aluminum imports in the future so that later the demand for aluminum in Indonesia is stable and not too excessive in importing. The prediction method used is the Powell-Beale algorithm, which is one of the most commonly used artificial neural network methods for data prediction. This paper does not discuss the prediction results. Still, it discusses the ability of the Powell-Beale algorithm to make predictions based on imported Aluminum datasets obtained from the Central Statistics Agency. The research data used is aluminum import data by the leading country of origin from 2013-to 2020. A network architecture model will be formed and determined based on this data, including 3-15-1, 3-20-1, and 3-25-1. From these five models, after training and testing, the results show that the best architectural model is 3-20-1 with an MSE value of 0,03010927, the lowest among the other four models. So it can be concluded that the model can be used to predict aluminum imports.
Implementation of Algorithms For Frequent Itemset In Forming Association Rules In Movie Recommendation System Ilham Prayudha; Muhammad Habib Algifari
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i5.181

Abstract

A large number of movies around the world, causing a person to take a long time to find the movie they want to watch, not only that the audience will be confused to determine which movie suits their interests. A recommendation system is defined as a decision-making strategy for a user under complex information environments. From the perspective of e-commerce, the recommendation system was described as a tool that can help users decide related to user interest and preference [5]. The recommendation system is intended primarily for individuals who have no experience evaluating the number of alternative items offered, such as movie selection. This study will implement a recommendation system to form association rules from the two algorithms for frequent itemset, namely Apriori and FP-Growth
Comparison of Ascent Hill Climbing Algorithm And Simple Hill Climbing Algorithm Solving The 8-Puzzle Case Padma Mike Putri M
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i5.175

Abstract

Puzzle 8 game is a game that shifts numbers in the form of a box consisting of 9 squares arranged with numbers 1 to 8 based on the order of count and there is an order of 3x3. This form of game is very easy to complete if you follow the rules that have been applied to the algorithm. Comparison of the ascent hill climbing algorithm and the simple hill climbing algorithm. The purpose of this algorithm is to help children who are just learning to arrange a sequence of numbers so that they explore brain power and increase imagination for children. The difference between the ascent hill climbing algorithm and the simple hill climbing algorithm lies in the search movement which does not start from the far left position but the next movement is searched based on the best heuristic value. To obtain the Goal, a systematic process is needed to make it easy and fast in finding solutions so as to save time in finding the final goal.

Page 2 of 2 | Total Record : 14