IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
394 Documents
Analysis of Back-End Requirements of a Web-Based Application to Identify Damage for Building Structures
A Anisya;
Fajar Nugroho
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.162
The need for well-maintained facilities can certainly affect activities in the building. To meet these needs, a building maintenance work program is needed to achieve the planned life of the building. The problem with contractors is that they still use telephone communication to receive reports of any damage to the building. This paper discusses the needs analysis in the construction of a building damage reporting system from the back-end side. The application is built on a web-based basis and provides information about the building in terms of the structural aspect as well as grouping the damage based on the damage criteria. The results of this study are obtained in the form of 10 tables that will compile a system database and transaction analysis that can be done in the system, namely generating building damage data reports where there are four categories of damage, namely light damage, moderate damage , severe damage, total damage and this application can later be used by building managers in reporting building damage through applications and contractors can monitor through applications
Implementation of A Decision Making System of Giving Bonus To Employees Using Fuzzy Logic Method
Y Yendrizal
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i5.176
Each company has its own standards in giving bonuses to outstanding employees in accordance with the company's rules. So we need a system that is able to solve the problem so that the bonus is given according to the performance of each employee. The problem that often occurs today is in the form of a lack of user knowledge in providing bonuses according to employee performance, so that this research can be used as a reference in giving bonuses to each employee according to performance. The solution for giving this bonus uses a decision-making system using Sugeno's Fuzzy Logic. The Sugeno method is to determine the input variable and the output variable which is a firm set, the second step is to change the input variable to a fuzzy set with a fuzzification process, then the third step is to process the fuzzy set data with the minimum method. And the last or fourth step is to change the output into a firm set with a defuzzification process using the centroid method, so that the desired result will be obtained on the output variable. Solving production problems using a comparison of the Sugeno and Mamdani methods. This method uses constants or mathematical functions of the input variables, and in the defuzzification process uses the centralized average method.
E-Teach : Mobile Application Teaching Administrative System Using Near Field CommunicationN (NFC)
F Ferry;
Dedy Prasetya Kristiadi;
S Sutrisno
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.156
Teaching administration is a teacher's needs that are recorded or recorded into files stored by the school curriculum section. Teaching administration is in the form of lesson plans per semester made by the teacher to be applied based on the planned subject matter. Archiving of learning outcomes data and teaching materials is often ignored so that teachers do not provide subject matter according to the study plan and evaluation of learning outcomes is not satisfactory. In addition, the teacher administration file is a need for school accreditation which is a benchmark for the education office's assessment, which is a serious concern for schools in making reports in their work units. To reduce administrative errors, loss of data and the effectiveness of teaching services and assist teachers in managing lesson plans and evaluating learning outcomes, a tool that is able to provide solutions is needed. Near Field Communication, abbreviated as NFC, is a development tool for Bluetooth and RFID. NFC allows the phone to store important data securely and sent to other phones equipped with NFC or read by an NFC reader. In addition, this NFC allows mobile phones to be developed for the administration of school payments as well as giving class schedules to students. In this study, a teaching administration system based on Near Field Communication (NFC) has been developed using the Raspberry Pi as a microcontroller as well as a computer capable of applying web-based programs. Electronic teaching administration with NFC is expected to replace conventional teaching administration. The advantages of NFC-based E-Teach are that it takes a short time to use, does not depend on internet access and is easy in delivering teacher administration to those in need. Study plan data processing and evaluation of student learning outcomes are faster, more accurate and integrated with the management of education providers.
Home Security And Access System Prototype Using Fingerprint
Muh. Fahrurrozi;
Lalu Puji Indra Kharisma
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.169
A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.
Implementation of Logging Feature in Android Payment SDK using Scrum Method
Ardian Dwi Rifai;
Erika Ramadhani
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.150
Electronic money or e-money is a technological innovation that allows payment transaction processing to be easier and more practical. PT Aino Indonesia is a payment gateway company that serves payment processes using this technology for various business segments. To satisfy the requirements of each business segment, Aino needs to develop a wide range of applications. These applications require a standard for the payment system to make it faster to integrate and maintain. The payment team at Aino has developed a module or SDK that provides a standard payment system for Android-based applications. Two new features will be added to this SDK, the logging feature and log file upload. The logging feature will record the data generated by each transaction process into a log file. Next, the SDK will upload the log files to the server to help retrieve transaction data uploaded from the device. Both features will help the process of tracking issues and problems that may arise during the transaction process. The development of the two features in this SDK uses the Scrum method to ensure it stays on track.
Implementation of Internal Control in Accounting Information Systems Based Online
R Riyanti;
D Dassaad;
Dyah Palupi
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i5.182
The background of this research is how to make an accounting information system that is initially offline will be made online, while the problems and methods raised in this research will be explained in the abstract. The problem raised in this research is how to make the existing system at PT ARS COMPUTINDO ABADI into an online system that can assist leaders and subordinates in managing the company so that regular and periodic online checks can be carried out. The method used in this study is to use the 4K method, namely the boundary control, input control, processing control, and output control methods. Where the method is, it can be seen how the data entered into the system is processed and generated. The purpose of this research is how to find out whether the online system that is applied to the accounting information system, in a company works optimally after being analyzed, the data obtained are the results are much better, and company data can be seen in general and free but conditional and the leaders can do internal control anywhere and anytime.
Prediction of Rainfall Intensity as Early Warning Information on Potential Landslides using Fuzzy Logic (Case Study West Lampung Regency)
Daniel Rinaldi;
Rahman Indra Kesuma;
M. Yafi Fahmi;
Winda Yulita;
Mugi Praseptiawan;
Aidil Afriansyah
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.163
Landslides always happened in West Lampung Regency yearly, which makes early warning information of landslides is needed. There are many factors which can cause landslide, one of the important factors is rainfall intensity, which can be predicted. The prediction of rainfall intensity can be obtained by using fuzzy logic. The fuzzy logic used in this research is Mamdani, and this research show the similar result for most data which means that fuzzy logic might not be suitable to be used to forecast the rainfall if the obtained data has lots of missing values.
Utilization of The Generate and Test Algorithm In Shortest Route Search Case
S Silvilestari
IJISTECH (International Journal of Information System and Technology) Vol 5, No 5 (2022): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i5.177
The Gerenete and test algorithm is a very simple method in a heuristic search. The principle of this method is a combination of the depthbforst search method with backtracking because it produces a complete solution before the test process is carried out. If the work process is carried out systematically and follows the procedure, it will find a solution. The problem in this research is that if the problem is broad and large, it will likely take time to find a solution. The main purpose of this research is to test the distance in order to find a solution so as to produce a solution that is fast and saves time. Generate and test work system, namely 1. Generate a possible solution 2. Test each node which is a solution by comparing the node with the end node of a selected path with a set of expected goals. 3. If a solution has been found, then exit the system. If you haven't found a solution, then return to step 1. The final result of the research is the point F(A-B-E-I-L-T) with a heuristic number of 14
Decision Support System To Choose The Best Social Media Platform For Product Marketing Using Topsis Method
Dwi Andini Putri;
Enok Tuti Alawiah
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.157
Currently, many content creators use social media to conduct product reviews or testimonials. This often attracts followers to make purchases of the same product. Marketing of products with social media is mostly done by the industry to attract buyers. However, in-depth research is needed to analyze which social media is most appropriate to use to market their products. This study uses the TOPSIS method, which is a multi-criteria selection method that uses a positive and negative ideal solution distance approach to obtain a valid final preference value. The results showed that as many as 0.31 social media youtube, 0.24 for social media tiktok, 0.20 for social media instagram and 0.11 for social media facebook. The results of the study can be used by policy makers to decide the selection of the right social media for marketing their products
Implementation of The AHP And MOORA Methods For Admission Selection of Stmik Lecturers Syaikh Zainuddin NW
Lalu Puji Indra Kharisma;
Muh. Fahrurrozi;
I Gede Iwan Sudipa
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v5i4.170
STMIK Syaikh Zainuddin NW Anjani always strives to improve quality or internal quality sustainably as a strategy to be able to compete with other universities. The institution itself realizes that to achieve educational goals and maintain the quality of education and produce good outputs, it requires commitment, strategies, appropriate methods, and adequate human resources in the process of achieving it. One way to improve the quality of a university is to select teaching staff or lecturers because the quality of lecturers will greatly determine the high and low quality of a university. Based on the problems that arise, a decision support system is needed that can handle the influence relationship between parameters for the selection process for lecturer acceptance. In this study, the Analytical Hierarchy Process (AHP) method and the Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA) method were used to determine alternative priorities for prospective lecturers. The AHP method is used to determine the weight of the criteria, sub-criteria, and scoring data, while the MOORA method is used to calculate the final score and ranking.