cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 13 Documents
Search results for , issue "Vol 6, No 5 (2023): February" : 13 Documents clear
Hydroponic Vegetable Product Advertisement Video Analysis and Development with MDLC Model Jimmy Pratama; Andry Ramadhansyah
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.279

Abstract

Growing vegetables with a hydroponic system have the advantage of not requiring large areas of land and can produce good quality vegetable products continuously. The hydroponic system can be a solution for producing vegetables in areas that do not have large areas of land with soil conditions that make it impossible to grow vegetables conventionally, such as in the city of Batam. Hydroponic vegetables also have advantages over conventional vegetables such as longer shelf life, crunchier texture, and wider leaves. This research is expected to provide information to the public that hydroponic vegetables have advantages compared to conventional vegetables so that people's consumption of hydroponic vegetables increases. Media development was carried out using the MDLC method and media analysis was carried out using qualitative methods. The analysis was carried out by testing media experts and content experts using the Gregory formula with a validity coefficient of 1.00 and testing audience response using a Likert scale with a percentage of 93.25%.
The Impact of Employees’ Information Security Awareness on Information Security Behaviour Melissa Indah Fianty
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.280

Abstract

Internal threats have been a hot topic in information security for several years. According to a 2018 Insider Threat Reports survey, 51% of users are more concerned about internal carelessness and negligence than 47% about external attacks. The availability of information has a vital role for companies today, including confidentiality and integrity in supporting company performance. Users or employees are an essential factor in many information security breaches. This study aims to determine whether security education & training, information security awareness, employee relations, employee accountability, organizational culture, and national culture significantly affect Information System Security Behavior. The sample of this research is employees who work at PT Infracom Technology. Sampling was carried out using the Likert Scale method, and data collection was carried out using questionnaires distributed directly to employees as many as 72 respondents. The statistical method uses Linear Regression Analysis, with statistical tests to test the hypothesis. The results showed a direct and significant influence between security training and education factors, information security awareness, employee relations, and employee responsibility. The most influential variable was employee accountability.
Congregational Information System and Inventory of GKI Harapan Abepura, Papua Albert T. Wairara; Remuz MB Kmurawak; Yokelin Tokoro; Samuel Mandowen
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.281

Abstract

Gereja Kristen Injili Harapan Abepura Papua processes data by conventionally collecting congregational and inventory data and recapitulating it in Microsoft Excel. This process causes the data not to be up-to-date, the process of adding inefficient data and data that is vulnerable to lose. Information systems are solutions in data management.  A Data and inventory system was created to help the process of efficient data management at GKI Harapan. The waterfall is used to develop the system, consisting of requirements, design, testing, integration, and maintenance.  System Modeling Methods using UML with PHP programming language using codeigniter framework and MySQL as database. The research results in system development have been carried out well and are used at GKI Harapan Abepura.
Data Mining to Predict Gojek's Consumer Satisfaction Level Using Naive Bayes Algorithm Rudika Rahman; Felix Andreas Sutanto
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.276

Abstract

Gojek is an application that is very popular and in demand as a means of transportation because it is practical and fast. Consumer satisfaction is where the expectations, desires and needs of consumers are met. To assess whether the company provides quality service to consumers, it is necessary to evaluate consumers to determine the level of consumer satisfaction when using the Gojek application. This study aims to build a system for predicting satisfaction levels from Gojek Driver services to consumers using the Naive Bayes algorithm, as well as to determine the level of accuracy in classifying customer satisfaction using Gojek services. questionnaire is the method used in collecting data on Gojek consumer satisfaction. In this study, 120 questionnaires were distributed to respondents, namely Gojek service users, and these questionnaires would later become training data. Researchers use the survey method as a direct observation of the process of using Gojek services to identify the services provided to consumers. Researchers use the waterfall method as a system development model. This model is the oldest software development model paradigm, and the most widely used. The process of calculating the accuracy of the system uses the Naive Bayes method by testing based on training data taken from the questionnaire. The calculation results on the level of accuracy obtained from the training data are equal to 88.9%. The calculation is processed and divided by the system as much as 70% training data and 30% testing data or as many as 84 training data and 36 testing data. This consumer satisfaction prediction system can assist an admin in determining the classification of consumer satisfaction with web-based Gojek services by applying the Naive Bayes method. In this study, researchers only calculated the level of accuracy and predictive value, for further research it is hoped that they can try to calculate the precision value and recall value calculations.
Exploratory Study and Analysis on Color Grading Technique for Horror Short Movie Rayden Vebrianto; Jimmy Pratama
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.277

Abstract

Horror is a movie genre where the main purpose is to convey fear, anxiety, suspense, and such to the audiences. On ensuring the success of a horror movie, there is one big factor that decides it, which is color grading. Color grading is one of movies editing technique which main purpose is to change color in a video, useful to build or support a desired atmosphere. Color grading is important in horror movies because if the applied technique does not fit with the movie concept, the desired message to convey will fail to deliver. In this study, a two version of horror short movie will be produced, with one version using a darker color grading tone (A) and the other one uses brighter color grading tone (B). The method used in this study is Research & Development, with Research using semiotic analysis and Development using Multimedia Development Life Cycle (MDLC) method. The semiotic analysis will focus on 10 horror movies with a rating of at least 7 based on IMDb US Box Office Rating, and the analyzed subject is the color grading technique used on each movies. The color grading analysis result then will be applied to the short movie production. After the short movie production has been finished, a blind test will be carried out to see which version of color grading suits better with the movie. The blind test is carried out with 53 participants, and the result is 39 participants choosing A and the other 14 choosing B. Due to the significance difference, a reasoning was asked to the participants. Most of the participants who chose A said A fits more with the movie concept and for them B does not really convey the horror from the movie, while those who chose B just gave personal preference as an answer.
Text Data Security Using Stream Cipher Algorithm S Supiyanto; Agung Dwi Saputro; Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.278

Abstract

The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
Effect of Distribution Resources Planning (DRP) Method on Supply Chain Management (SCM) Yuli Setiawannie; Nita Marikena
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.288

Abstract

PT. Growth Asia is an industrial company in the iron and steel foundry sector. It is well known for its export orientation as a supplier of wear-resistant parts to the international market, especially in gold and copper mining. This steel product will be used for planning distribution activities in mining, with the primary raw material, namely scrap (old iron or scrap iron) obtained from domestic suppliers, which is then processed into finished products, namely selections (mining tools), and distributed to the distribution center. namely Gorontalo, Maluku, Papua, and South Kalimantan. Fulfilling consumer demand for the product is not timely; this occurs due to problems in the distribution schedule at the distribution center to each city that is a consumer of PT. Growth Asia. Based on these problems, the purpose of this study is to determine the factors that cause non-smooth distribution, determine distribution scheduling planning using the Distribution Resources Planning (DRP) method and its effect on supply chain management method that can be proposed to deal with this problem is Distribution Resources Planning (DRP). With DRP, companies can initiate distribution scheduling more accurately and, at the same time, achieve production stability. The results of distribution planning and scheduling with the DRP method can reduce the total frequency of orders from 20 orders to 13 demands, and distribution costs have decreased by 13%, from IDR 39,610,000 to IDR 26,159,000.
Exploratory Analysis Design and Development of Fantastic Fighting Scene For Promoting Indonesian Martial Arts Muhammad Rizqiansyah Haqiqi Ali; Surya Tjahyadi
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.282

Abstract

This research aims to explore, analyze, and develop a fantastic fight scene to promote Indonesian martial arts. The purpose of this research is to introduce and promote Indonesian martial arts to the wider community by using available technology and media. The research method used in this study is the initial stage of research and development, followed by the ADDIE method in developing fantastic battle videos. The result of this research is a fantastic fighting video that showcases the skills and aesthetics of Indonesian martial arts. This video will present spectacular and mesmerizing actions that show the rich culture and traditions of Indonesian martial arts. This video will be published via the YouTube channel and is expected to be able to promote Indonesian martial arts to the wider community and provide an appreciation for the richness of Indonesian culture. This research is expected to contribute to the world of Indonesian martial arts and introduce Indonesian martial arts to the wider community.
Fuzzy Logic Controller Implementation for Motor DC Control Position With Real-Time Operating System M Martin; Dodi Budiman Margana; Endang Habinuddin
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.283

Abstract

A fuzzy Logic Controller (FLC) is a control system that expresses in linguistics, there are several ways to defuzzification such as Sugeno. This paper proposes FLC to control the Motor DC Module position within -180 to 180 degrees using Real-Time Operating System (RTOS) running in the microcontroller. The FLC design based on input errors and changes of errors get from the feedback module, and defuzzification uses Sugeno rules. The FLC design simulates in the simulator program with the motor dc ideal model to show the output response transient. Experimental is done by using step input and variable inputs, step input is used to calculate the output response transient, and variable input to show the reliability of the control scheme. The output response shows that the motor DC control position has 0% of overshoot, 0.9 seconds of settling time, and 2.7769 rise time from position -80 to 0. The FLC success controls the position motor, and RTOS can be implemented in a microcontroller based on ATMega 2560 series.
Comparative Sentiment Analysis of Delivery Service PT.POS Indonesia and J&T Express on Twitter Social Media Using The Support Verctor Machine Algorithm Euis Nur Fitriani Dewi; Aldy Putra Aldya; Andi Nur Rachman; Ara Ramdani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.284

Abstract

Based on a survey conducted by the Top Brand Award in the courier service category, the J&T Express company is in the highest position from 2018 to 2021 beating Pos Indonesia. Social media Twitter is a place often used by customers to submit complaints and opinions regarding the services of a company. The method used to determine the tendency of the views to contain positive or negative sentiments is sentiment analysis. Sentiment analysis will classify the polarity of the text in sentences or documents to determine whether the opinions expressed are positive or negative. This study uses the Support Vector Machine (SVM) algorithm. The results of the user tweet data used are as many as 1000 data with details of data 206 (20.6%) have positive sentiments and 794 (79.4%) have negative sentiments. In the Pos Indonesia tweet data, 110 positive sentiment data were obtained, while the positive sentiment data in the J&T Express tweet data was 96 data. This shows that the Pos Indonesia delivery service has better customer service than J&T Express. The highest level of accuracy using the SVM algorithm in classifying sentiment is 80.14% with a comparison of 70% training data and 30% test data with an average precision of 90%, an average recall of 51.74%, and an average f-measure of 47.80%.

Page 1 of 2 | Total Record : 13