IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
394 Documents
Optimization of The Smallest Road Using The Traveling Salesman Problem (TSP) Method
Alvendo Wahyu Aranski
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i1.224
Optimization is the process of obtaining a minimum (small) or maximum (largest) value in an opportunity function. One case that uses the optimization function is the Traveling Salesman Problem (TSP). The case study problem in this research is to find the shortest route to a destination city in order to get a short time to get to that city and save time and costs on the way. The completion of the search for the shortest route uses the TSP concept. Basic concepts in running CSR 1. The journey starts and ends in the same city as the original city of the salesperson. 2. Entire cities must be visited without missing a single city.3. Sales are not allowed to return to the city of origin before all cities have been visited. By using this method, the distance between each city will be analyzed. The cities that the salesman will go to consist of 4 cities A, B, C, and D with a combination process to obtain as many as 24 lanes that can be passed by the salesman. From each route taken by the salesman, there are 2 shortest paths that can be used as alternatives, including the CABD=17+15+19=51 route and the DBAC=19+15+17=51 route. The final results of this study can be used as a reference in determining the shortest route by salesmen with a distance value of 15.
Online Donation Information System with Payment Gateway
Adjie Krisnandy;
Nurajijah Nurajijah
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i1.204
The COVID-19 pandemic has had a significant impact on various aspects of social life. There is no exception in the aspect of religious activities in the process of receiving donations or raising funds which are still carried out manually by mosque officials. This is quite irrelevant to the current conditions that require to maintain health protocols in every activity. This study aims to design an Online Donation Information System with a Payment Gateway as an appropriate solution in accommodating the entire process of receiving donations and raising funds at mosques through electronic media. The method used is the scrum system development method with several stages such as product backlog, sprints, scrum meetings, and demos.
Graduation Prediction Application using Naive Bayes Algorithm in Sukabumi Muhammadiyah University
Indra Griha Tofik Isa;
Indra Satriadi
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i1.218
The use of data mining has become a trend in data processing because of the availability of large amounts of data and the increasing need to convert this data into useful information and knowledge. Besides as a tool in extracting data, data mining is also used as decision support, both in the commercial and non-commercial fields. Of the many algorithms used in data mining, one of them is the Naïve Bayes Algorithm, which in this algorithm is one of the methods in Probabilistic Reasoning which aims to classify data in certain classes. The study conducted by applying the stages of the Naïve Bayes Algorithm in application design to predict student graduation on time based on the parameters contained in the Enrolment Student (PMB), Grade Point Average (IP) and the Finance Department. The data processed were 436 datasets from the Informatics Engineering Study Program, Muhammadiyah University of Sukabumi. The system design uses UML modeling with implementation using the PHP programming language and MySQL database. The results of the study are in the form of graduation prediction applications with an accuracy rate of 78%
Comparison of Fuzzy Time Series and Double Smoothing Holt Methods for Rainfall Forecasting
Endang Habinuddin;
Euis Sartika;
Neneng Nuryati
IJISTECH (International Journal of Information System and Technology) Vol 6, No 3 (2022): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i3.243
This research aims to compare the time series forecasting method, namely the Fuzzy Time Series method, with Double Exponential Smoothing Holt. The data used in this study is the rainfall data of the city of Bandung every month from January 2012 to December 2021. The analysis of the two methods is seen for accuracy according to the measure of error, namely MSE (Mean Square Error) and MAD (Mean Absolute Deviation). The results show that the Fuzzy Time Series method has MSE of 15558.89 and MAD of 108.97. While the Doube Smoothing Holt method has MSE of 23367.79 and MA of 115.94 So the Fuzzy Time Series method is reliable to use for forecasting rainfall in Bandung because the error values is lower than that of the Exponential Smoothing Holt.
Cryptocurrency Sentiment Classification Based on Comments On Facebook Using K-Nearest Neighbor
Ramu Will Sandra;
Yelfi Vitriani;
Muhammad Affandes;
Suwanto Sanjaya
IJISTECH (International Journal of Information System and Technology) Vol 6, No 2 (2022): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i2.237
Cryptocurrencies continue to develop and have received world attention, price changes that occur every day are influenced by uncertain factors such as political problems and global economic problems. The author will explore the problems discussed by the public regarding positive and negative cryptocurrency comments on Facebook comments using the K-Nearest Neighbor method. This study uses 1000 data comments which are divided into 500 positive data and 500 negative data. The data was obtained manually by using the keyword "bitcoin price" on social media facebook. The results of the testing process using the confusion matrix get the highest accuracy at a comparison of 90: 10 by 62%, recall 70%, error rate 38% and precision 60,34% with k value of 11 and threshold 9.
Utilization of Arduino as Incinerator Control Using Temperature Sensor
Mohammad Ibrahim Ashari;
Anis Artiyani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 3 (2022): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i3.250
The waste problem is part of the dynamics of human life. Every human activity must produce waste. Garbage is a pollution that interferes with the health and comfort of the community. Solid waste management is a challenge for developing countries, mainly due to the increase in waste generation. Garbage results in high city budget costs related to its management. One of the impacts of urban development is an increase in the volume of waste. This requires improvement of facilities and infrastructure against limited land. For this reason, good and efficient waste management is needed. In general, waste disposal that does not meet environmental health requirements can result in, among other things, breeding grounds and nests of insects and rats, becoming a source of pollution and contamination of soil, water and air, becoming a source and a place to live. live germs that endanger health. Based on this, the researchers made a tool in the form of a furnace that can be used for waste treatment and burning garbage. From the results of the overall tool testing, to obtain optimal combustion results in the mass of waste (4 Kg) and the combustion temperature setting (200 oC- 300 oC) is fixed, the minimum burning time is 30 minutes
Maximum Security of Login Pin Data by Combining the Gifshuffle Algorithm and TCC Algorithm
Rivalri Kristianto Hondro
IJISTECH (International Journal of Information System and Technology) Vol 6, No 2 (2022): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i2.231
System or data security is very important in today's digital era. Various kinds of security techniques used, one of these techniques is the encoding technique by applying a number of cryptographic algorithms. The durability of cryptographic algorithms must of course be known before the algorithm is used and applied to a system or data to be secured. This study discusses the combination of the gifshuffle algorithm and the TCC algorithm for securing login pin characters
Information System Employee Attendance at PT. Sigma Cipta Caraka Web-Based Using Coloring and Sequential Search Methods
Avi Khoirun Nizam;
F Fauziah;
Albaar Rubasy
IJISTECH (International Journal of Information System and Technology) Vol 6, No 3 (2022): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i3.244
At PT. Sigma employee attendance is still done manually by hand writing into a book by entering the hours of arrival and hours of leaving work. From the TDS unit, the process that was carried out manually was found to be a problem where attendance was not appropriate. Difficult to trace, and a high risk of data loss. On the other hand, employees who work with assignments to leave the office have not been accommodated so employees who are outside the office must return to the office to fill in attendance manually by writing a hand, so a computerized attendance system is needed and can be accessed by employees who are on duty outside the office. by connecting to the internet network, so that problems can be resolved properly. and for monitoring and reporting daily employee attendance can be directly seen and displayed. From the problems above, the writer uses the coloring method to monitor employee attendance and assisted by sequential search for the employee tracking process
Design and Build A Customer-Finding Application For Leko Restaurant Using The K-Means Algorithm
Mohamad Yusuf;
Muhaimin Hasanudin;
Ifan Prihandi
IJISTECH (International Journal of Information System and Technology) Vol 6, No 2 (2022): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i2.238
Warung Makan Leko is one of the restaurants in the Jakarta area that offers local cuisine, a diverse menu and delivery orders via phone order. Customers are one source of income for Warung Makan Leko. The amount of competition makes Warung Makan Leko have difficulty in retaining loyal customers. For this reason, further analysis is needed to find out who these potential customers are. Then an application was developed to classify customer data using the K-Means (clustering) algorithm. The data used as an example in this study is the sales transaction data of Warung Makan Leko. Run the process to calculate the total sales to customers and the number of transactions with customers to classify customer data. The K-Means clustering method tries to group the existing data into groups. Data in groups have the same properties. Customer data is grouped into two clusters, no and implicit. Each cluster is then classified based on the prioritized criteria. The cluster with the highest centroid value is the cluster that is rewarded, and the cluster with the lowest centroid value is the non-rewarded cluster. The results of this process form clusters, which are used for advice and consideration to determine sales strategy, namely to reward customers who rank higher in the cluster
E-PTJOB: Application Link And Match Job Seekers Based On Android
Alfredo Pasaribu;
Yoas Arnest Soetopo;
Dedy Prasetya Kristiadi;
S Sutrisno
IJISTECH (International Journal of Information System and Technology) Vol 6, No 3 (2022): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i3.251
The impact of the corona virus disease-19 has caused many companies to close and workers to be laid off. This also has an impact on the decline in economic growth and the level of welfare of the population in the affected areas. The need for labor management is an urgent and serious matter. The creation of the e-PTJOB application is a breakthrough to deal with this problem. This part-time job seeker application is made with a link and match model where job seekers are met with job seekers based on the needs or requests of job seekers who are not limited by education level. Jobs given by job seekers are temporary with payment based on duration of time, meanwhile prospective workers can choose work categories based on location, level of education and work to be done. The e-PTJOB application begins with registration of job seekers and job seekers where each actor provides data according to his capacity. Furthermore, job seekers will make a deposit on the application via transfer of a nominal amount that will be used to pay workers according to job criteria and work duration. Workers who have already done work will get paid according to the job offer. This e-PTJOB application will assist the government in dealing with cases of unemployment of productive age which are not limited by education level as well as increase the income level of the population in the region