IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
394 Documents
Recommendation System for Selection of Beach Tourist Attraction in Serdang Bedagai Applying the TOPSIS Algorithm
Annisa Fadillah Siregar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 2 (2022): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i2.230
One of the regencies in North Sumatra, specifically the Serdang Bedagai Regency, has many exciting beach attractions for the public to visit. Each beach attraction offers its own excellence. In this circumstance, it could be a hesitation which to decide on, considering that there are a great number of beaches lying in the Serdang Bedagai Regency. This research uses five criteria such as facilities, security, hygiene, road access, and price. As well as the alternatives of several beach attractions such as Pondok Indah beach, Mutiara beach, Klang beach, Cermin beach, Romantic beach, Gudang Garam beach, Sri Mersing beach, Bali Lestari beach, Wong Rame beach, and Cemara Kembar beach. Therefore, a system is built to be used for the public in deciding on beach attractions by applying a recommendation system for selecting any beach attractions. According to the calculations in table 3.3 with the RPI as the reference value. The highest RPI value among beach attractions is the Bali Lestari beach with an RPI value of 1, the second is Romantic beach with an RPI value of 0.462, and Cermin beach with an RPI value of 0.462
Academic Information Systems And PPDB Base On Web-Android
Wirhan Fahrozi;
Fitriana Harahap;
Fithry Tahel;
Erwin Ginting;
Dedek Indra Gunawan Hts
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.268
SMA-SMK Yapim Taruna Belawan is an institution engaged in the field of education. Student registration and reporting of student assessment results at SMA-SMK Yapim Taruna Belawan is a form of service for students/students. In terms of registration, efforts are made to be more effective and for the student assessment process covering all activities in schools to be more effective and efficient by using internet technology facilities in the form of a school academic system. The academic system that is currently operating at the Yapim Taruna Belawan High School and Vocational Schools is not all computerized and cannot be accessed online. In addition, every input of academic data that is stored in the form of sheets of paper is considered less effective and efficient because the administration section will experience difficulties when it comes to recording data when making reports. So that it is hoped that a better system will be formed that can solve these problems by implementing a web-based and mobile internet technology base, so that information can be accessed boldly
Knowledge Management Strengthening Character of Entrepreneurs Students Department of Technopreneur at School of Technopreneur Nusantara
Luthfia Fauzia Dewi Aryanti;
R. Achmad Rachmat S;
Euis Nurninawati;
Dedy Prasetya Kristiadi
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.262
This study aims to improve the entrepreneurial character of STMIC Kuwera students with the knowledge management method. The application of knowledge management with an emphasis on strengthening the character of web-based entrepreneurs is expected to be a solution for the character education needs of STMIC Kuwera students to open up job opportunities for the business world by using technology according to their fields. This research will develop a knowledge management system model and design a prototype of the model developed on entrepreneurial character to be packaged as teaching materials for teachers for students. The methodology used is to perform a contingency factor analysis to obtain the knowledge management system model. The resulting knowledge management system model supports the Socialization, Externalization, Combination, Internalization (SECI) process.
Implementation of the Socata TBM-700 Aircraft as Learning Material for Live Aircraft Practical at Indonesia Civil Aviation Academy - Banyuwangi
Hadi Prayitno;
Wira Gauthama
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.256
The increase in air transport transportation traffic after the Covid-19 subside led to increased flight frequency which also increased the need for aircraft maintenance. Good quality aircraft maintenance is also very much needed to avoid accidents due to malfunctions of all systems on the aircraft. Good quality aircraft maintenance can be achieved from qualified aircraft maintenance personnel. To produce qualified personnel, it is necessary to have a strong and deep understanding of personnel knowledge about aircraft, theoretically and practically. This research aims to carry out innovation activities in the form of implementing the Socata TBM-700 aircraft as a live aircraft suitable learning material at the Bayuwangi Aviation Polytechnic. The result of this research is an innovation of live aircraft practical learning at the Bayuwangi Aviation Polytechnic to increase the desire of active teachers at universities under PPSDMPU to be active in processing and utilizing valuable equipment available on campus so that their ability to follow the development of aviation technology can be improved.
Mobile Device Management for the Use of Bring Your Own Device (BYOD) as Company Data Security during the Covid-19 Pandemic
Yolanda Mega Puspita;
Muhaimin Hasanudin
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.269
Since the end of 2019 a large outbreak has hit almost the entire world, namely the Covid-19 pandemic. COVID-19 has encouraged millions of employees to change their jobs from coming to the office to working at home. This phenomenon is known as Bring Your Own Device (BYOD). Good policies and guidelines on the use of BYOD must be followed to prevent some form of security breach and maintain user privacy, confidentiality, integrity, and availability of organisational data, and the same security on the devices of employees who use their own devices to process company data. To solve these problems, researchers implemented Mobile Device Management with VMware workspace one uem tools to monitor, control and protect mobile devices. The system uses Windows server. The results of the research can be input to the company to secure and monitor company data on employee work devices.
Application of A Decision Support System on Additive Ratio Assessment (ARAS) Method in Determining Best-Selling Korean Snacks
S Susliansyah;
Heny Sumarno;
Hendro Priyon;
Linda Maulida;
Fintri Indriyani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.263
Nikmat group is a franchise company engaged in food and one of the brands owned by the company is GILDAK. GILDAK is a Korean snack business whose branches are everywhere. The different problem faced by each GILDAK branch located in each city is not being able to determine which snack menus are the most sold because consumers' tastes are different in each city, thus causing the franchisee to be inaccurate in determining what raw materials to use. in stock a lot, so as not to cause raw materials to run out. The Decision Support System (DSS) method that will be used in problem solving to determine the best-selling Korean service is the Additive Ratio Assessment (ARAS) method which has six stages such as determining the decision matrix, determining normalization, determining weights, determining normalized matrices, determining the value of the function. optimization and the highest ranking level. The results obtained from these calculations can be seen in the 5th stage, namely the best-selling snacks are Itaewon crispy chicken snacks ranked first with a value of 0.07783 (K1), original corndog snacks ranked second with a value of 0.07426 (K12) and gimpo snacks ranked third. with a value of 0.06907 (K9). It can be said that this method can be applied by companies in decision making.
Comparison of the Multinomial Naive Bayes Algorithm and Decision Tree with the Application of AdaBoost in Sentiment Analysis Reviews PeduliLindungi Application
Cecep Muhamad Sidik Ramdani;
Andi Nur Rachman;
Rizki Setiawan
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.257
One solution that the Indonesian government has implemented in controlling and tracking COVID-19 cases is using the PeduliLindungi application. User review data on the PeduliLindungi application is available on the Google Play Store, the data can be analyzed to determine the trend of public sentiment towards the PeduliLindungi application using sentiment analysis techniques. One of the methods used for sentiment analysis is machine learning, but in the machine learning method there is a problem, namely the relatively low level of accuracy. In this study, there are 2 machine learning algorithms that are used and compared, namely the Multinomial Naïve Bayes (MNB) and Decision Tree (DT) algorithms combined with the AdaBoost (AB) method to improve the accuracy of the PeduliLindungi application review data classification accuracy. In the experiment conducted, the tendency of public sentiment towards the PeduliLindungi application was 67% positive and 33% negative from a total of 8305 data. Multinomial Naïve Bayes before being combined with AdaBoost produces an average accuracy value of 83,7%, while Decision Tree produces an average accuracy value of 82,8%. After being combined, MNB+AB produces an average accuracy value of 88,8%, while the DT+AB method produces an average accuracy value of 84,1%. The use of AdaBoost can improve the accuracy of the Multinomial Naive Bayes algorithm and Decision Tree for the PeduliLindungi application review data classification process.
ARIMA Method Implementation for Prediction of Oyster Mushroom Production
Nita Syahputri;
Ommi Alfina;
Labuan Nababan;
Ulfah Indriani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.270
Ad-Dhuha Farm is an MSME (Micro, Small and Medium Enterprises) business engaged in the production of oyster mushrooms. In producing oyster mushrooms for sale, Ad-Dhuha usually estimates based on production logbooks. So that sometimes the results of predictions that are made miss estimates, this is because there is no proper calculation based on the data used so that there is a buildup of oyster mushroom supplies. This affects the progress of MSME businesses (Micro Small and Medium Enterprises) because seeing from the need to pay workers, invoices for operational needs and so on so that MSME businesses (Micro Small and Medium Enterprises) suffer losses. This study uses the ARIMA method to predict the amount of oyster mushroom production in Ad-Dhuha. With the ARIMA method, Ad-Dhuha can predict the amount of production so that there is no accumulation of oyster mushrooms.
Comparison of Response Time of Artificial Intelligence Mask Detection Program Implemented on Several Computer and Microcontroller Platforms
Eril Mozef;
Raihana Aqila
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.264
The use of masks during the Covid-19 pandemic is crucial to prevent transmission of the Covid-19 virus. Everyone is required to wear a mask in public places both indoors and outdoors. Therefore, a mask detection device is urgently needed to allow visitors to enter public facilities and reduce interaction between officers and visitors. Currently, many algorithms and programs for detecting masked faces based on artificial intelligence have been proposed using cameras and image processing. However, unfortunately, the implementation, realization, and application in public places are still ineffective. Beside the reability is still not high enough, another factor is the response time which needs to be considered when implemented on a computer or a microcontroller device. In this regard, this research focused on measuring the response time of an artificial intelligence-based mask detection program using a camera and image processing and its implementation on several computer and microcontroller platform. The response time of several computer and microcontroller devices is needed to provide an overview of the relationship between system execution speed and costs. When we use a high speed computer, the response time is fast, but the cost of the device is high. In contrast, by using a microcontroller-type device means the costs are low but the response time is slow, which will eventually cause problems in the visitor queuing system. In this research, the Balaji Srinivasan mask detection program was successfully implemented on several computer and microcontroller devices. The results are as follows: PC core i3-5005 2 GHz, 4 GB RAM: 0.456 seconds, PC core i5-3207 RAM 4 GB, 3.2 GHz SSD 128 GB: 0.382 seconds, PC core i5-8250 RAM 8 GB: 0.393 seconds, AMD Ryzen 5 3550H 2.1 GHz RAM 8 GB SSD 512GB: 0.303 seconds, Raspberry Pi 3 B+, 1.4 GHz RAM 1 GB: 12.03 seconds, Raspberry Pi 4 1.6 GHz RAM 4 GB: 0.89 seconds. So that the shortest average delay respon time for the PC type is AMD Ryzen 5 3550H 2.1 GHz RAM 8 GB SSD 512 GB of 0.303 seconds, and for the microcontroller type is Raspberry Pi 4 of 0.89 seconds.
Study on Calculation of Foundation Strength Structure of STAIN College Building, Sultan Abdulrahman, Bintan Islands
M. Husni Malik Hasibuan;
Diana Suita;
Simon Petrus Simorangkir;
Johan Oberlyn Simanjuntak
IJISTECH (International Journal of Information System and Technology) Vol 6, No 4 (2022): Decembar
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v6i4.258
Based on the results of the analysis obtained 1). Axial force on F 1 Single Pile pile 1178.91 ≤ 1200.00. And the lateral force on the pile obtained 14.51 ≤ 24.88 2). Axial force on piles F 1 Single Pile Axial force on piles 275.13 ≤ 400.00. And the lateral force on the pile obtained 0.62 ≤ 17.77. The difference between the two F1 Single Piles lies in the axial force of the column due to factored load, Puk = 1116.13 Kn, x-direction moment due to factored load. Mux = 18.85 kNm, Y direction moment due to factored load. Muy = 29.85 kNm, And the other F1 Single Pile data: Column axial force due to factored load, Puk = 247.02 Kn, Moment x direction due to factored load. Mux = 0.00 kNm. The y-direction moment due to factored load. Muy = 0.00 kNm, and the axial force on the pile F2 is 648.29 ≤ 1200.00. And the lateral force on the pile is 4.27 ≤ 24.88. Thus, the construction is safe on the axial force on the pile and the lateral force on the pile. And F1 Single Pile remains safe even though the moment of direction due to different factors. Due to the location of the design F1 Single Pile.