cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 394 Documents
ITERA Astronomical Observatory Information System Muhammad Habib Algifari; Winda Yulita; Eko Dwi Nugroho
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.130

Abstract

In the current information age, data is a valuable asset for companies [1]. Technological advances encourage the digitization of information in almost all fields of science, including astronomy. Technological developments make it easy to access open data in the public domain. The availability of open data will encourage the acceleration of research. ITERA Astronomical Observatory is an observatory located in Lampung. This observatory is claimed to be the largest in Southeast Asia [3]. To face the challenges in the digitization of information, ITERA Astronomical Observatory plans to build an information system specifically for Storing and handling astronomical data
Case Based Reasoning using K-Nearest Neighbor with Euclidean Distance for Early Diagnosis of Personality Disorder Anna Hendri Soleliza Jones; Cicin Hardiyanti
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i1.111

Abstract

A personality disorder is a condition of a person with an extreme personality that causes the sufferer to have unhealthy and different thoughts patterns and behavior from other people. The personality disorders discussed in this study consisted of 110 diseases with 300 case data and 68 symptoms. Based on Basic Health Research (Riskesdas) 2018 data, it shows that more than 19 million people aged 15 years and over were affected by mental-emotional disorders. Data from the Statistics Indonesia in 2019 that the population of Indonesia is around 265 million people, while according to the Indonesian Clinical Psychologist Association, the number of verified professional psychologists is 1,599 clinical psychologists out of a total membership of 2,078 as of January 2019. However, this figure does not meet the standards of the World Health Organization (WHO), which is that psychologists serve 30 thousand people. This shows that Indonesia still lacks around 28,970 psychologists. The unequal distribution of professional psychologists has made psychologists need a long time to provide a diagnosis because of the number of patients being inversely proportional to the availability of psychologists in Indonesia. Moreover, there is not enough patient knowledge about the symptoms they feel. This study aims to produce a system for diagnosing personality disorders. This study is a case based reasoning to solve problems that have occurred in previous cases using K-Nearest Neighbor to classify data based on the closest distance using the calculation of the Euclidean Distance. Algorithm testing for the system used the Confusion Matrix test. Based on the results of testing data in the 60 case data using K-nearest Neighbor and the calculation of the Euclidean Distance with a score of K=3, it is known that 60 data have 100% similarity to cases with a personality disorder. Meanwhile, testing new cases with 10 case data that were not in the knowledge base was also conducted showing that 9 cases had 100% similarity to the previous case, while another case had 90% similarity to the previous case.
Implementation of the General Administrative Management Information System at Victory University of Sorong Melda Agnes Manuhutu; Lulu J. Uktolseja; Sarsa F. Sitaniapessy; Cynthya A.K. Maradesa; Meldi Manuhutu; Abraham Manuhutu
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.124

Abstract

Management Information System is a comprehensive, coordinated and rationally integrated set of information subsystems capable of transforming data into information through a series of ways to increase productivity in accordance with the style and nature of managers on the basis of established data quality criteria. Technological developments require every institution, both government and private, to provide services to be able to serve effectively and efficiently. Management is defined as a typical process consisting of planning, organizing, implementing and monitoring carried out to determine and attempt to achieve goals by utilizing human resources and other resources. In the work process of Victory Sorong University, the General Administration Bureau (ADUM) carries out administrative management processes still manually, this can be seen from the survey results that the data management process is carried out in manual books. This is a major issue that needs attention. Manual conditions can support data loss due to several factors. The importance of the role and function of general administration management as the main task of a government agency, private or organization, so it is necessary to implement an integrated information system using PHP and MySQL database.
Geographical Information System for Indonesian Tourist Destinations John JOI Ihalauw; Natalia Kristiani Tandafatu
IJISTECH (International Journal of Information System and Technology) Vol 4, No 2 (2021): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i2.105

Abstract

Geographical Information Systems have been widely used as a method for effective, efficient and robust decision making in the business world. It has also been used in the selection of precise and accurate tourist destinations. This paper discusses a review of geographical information system for Indonesian tourist destinations. Articles taken from sources in the form of national journals, international journals and conferences proceedings. The author limits the years 2018-2021. Furthermore, the writer will present the taxonomy and summary of the review results. Finally, the authors present research opportunities that have the potential to be studied in the future.
Implementation of Simple Additive Weighting (SAW) and Weighted Aggregated Sum Product Assessment (WASPAS) Methods in Selection of Young Lecturers with Achievements M Mesran; Nelly Khairani Daulay
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i1.118

Abstract

Lecturers are resources owned by the University. One of the efforts to improve the quality of lecturers is by giving appreciation in the form of rewards or awards to the best lecturers or lecturers who excel. However, to be able to provide these rewards, of course there are several assessments that will be given to lecturers. The problem is how to give the assessment so that the lecturer is declared worthy to receive a reward or award. There is a decision support system or abbreviated as DSS where in the system there are several methods that can be used to provide an assessment of course with the determined assessment criteria. In this research, the method used is the Simple Additive Weighting (SAW) and Weighted Aggregated Sum Product Assessment (WASPAS) with several criteria into consideration. The results showed that alternative A3 and A2 were selected as outstanding young lecturers.
Network Security System Analysis Using Access Control List (ACL) Oris Krianto Sulaiman; Darjat Saripurna
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.131

Abstract

Communication using internet media is a mandatory requirement today to carry out various activities. Communication through the internet will pass through public access, where many people use public access. When communication is in progress, many things can happen before the message reaches its destination. One of them is the occurrence of hacking attempts from irresponsible parties. Therefore, it is necessary to secure the communication process, and many network security methods can be used to secure the communication process in the internet network. Access Control List or ACL is one method that can be used to secure communication in the network. ACL makes it easy to block specific devices and ports to prevent network communication. The results of the ACL implementation have the impact of avoiding access so that not all devices or protocols can access certain communications, thereby increasing network security in the process.
Detection Coronavirus using Cased-Based Reasoning with Extended Jaccard Coefficient Murien Nugraheni
IJISTECH (International Journal of Information System and Technology) Vol 5, No 1 (2021): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i1.112

Abstract

Coronavirus Disease 2019 or known as COVID-19 is a new disease that can cause respiratory problems and pneumonia. This disease is caused by infection with Severe Acute Respiratory Syndrome Me Coronavirus 2 (SARS-CoV-2). Some of the clinical symptoms that appear vary, ranging from symptoms such as influenza, cough, cold, throat pain, muscle aches, headaches to those with serious complications such as pneumonia or sepsis. This research to build case-based reasoning for early detection of COVID-19 by looking at the characteristics of clinical symptoms seen in a person using the Extended Jaccard Coefficient method. The results show case-based reasoning for early detection of COVID-19 using the Extended Jaccard Coefficient method can model the level of similarity of a new case to an old case.
Web-Based Academic Potential Test Information System (Case Study: Faculty of Teacher Training and Education Victory University of Sorong) Natasya V. Leuwol; Melda Agnes Manuhutu; Muhammad Z. Sirajuddin
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.125

Abstract

Academic Potential Test (TPA) is a test used to measure a person's ability level. At the Faculty of Teacher Training and Education (FKIP) Victory University, Sorong, TPA was held before the Field Experience Program (PPL) where the implementation was still manual, namely the test was carried out in writing using paper and corrections by the lecturer. It takes a long time to correct and uses a lot of paper. The purpose of this research is to design a Web-Based Academic Potential Test Information System. System development used the prototype method. This research used the PHP programming language, the database is built using MySQL. The result of this study is that this web-based academic potential test information system helps FKIP in conducting online academic potential tests, where this test can be taken anywhere and can see the results directly after taking the test
Implementation of Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in Recommendations for New Position in Companies Mesran M; Eka Pratiwi Sumantri; Supriyanto S; Syafrida Hafni Sahir; Nelly Khairani Daulay
IJISTECH (International Journal of Information System and Technology) Vol 4, No 2 (2021): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to provide support to management in recommendations for promotion of employee promotions, with the aim of providing motivation to employees. The problem encountered at this time is the number of employees making it difficult for management to choose employees to recommend in promotions for promotions. In this research, the method used is Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) which is a fairly good method in ranking where the best alternative is the alternative that has the closest distance to the best alternative and far from the worst alternative. From the research results, it can be concluded that the A5 alternative is the best with a value of 0.748 and can be recommended in a new position promotion at the company.
Designing High Availability Cluster Using Server Virtualization on Cloud Storage Services Ali Idrus
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.119

Abstract

Cloud Storage Service at PT. Harrisma Globaltechnologies Jakarta has not been applied based on virtualization. The problem with cloud storage services in general is that the server is not able to serve a high number of requests as a result the cloud storage server fails. One of these problems is caused by inadequate server resources and less than optimal storage server management. These problems can be solved effectively and efficiently with server virtualization. Where server virtualization is managed by Proxmox. Proxmox is an open-source virtualization platform supported by KVM and OpenVZ hypervisors and can be managed with web-based graphics. Server virtualization collaboration can save server resources by duplicating server services virtually. The research methodology used is clustering by applying the concept of high-availability where there is a secondary server as a backup-server for the primary-server. The results of this study include three parameters, namely Throughput, Response Time, and CPU Usage. The results show that cloud storage servers that implement virtualization than those that do not apply with a difference in the value of the Throughput parameter of 1896.6 Kbps, the difference in the value of the Response Time parameter of 10.6 requests/second, and the difference in the value of the CPU Usage criteria of 11.91%