cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 394 Documents
Realignment Matrix of Digital Campus Master Plan based on Digital Transformation Maturity Assessment Yanuar Firdaus Arie Wibowo; Dawam Dwi Jatmiko Suwawi; Amarilis Putri Yanuarifiani; Widia Febriyani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.296

Abstract

The previous research that created a framework for evaluating the level of digital maturity and digital transformation in higher education is a valuable resource for universities when revising their Digital Campus Master Plan (DCMP). DCMP is an integral part of a university's life cycle and is derived from their Strategic Plan. The strategic planning within DCMP should be reviewed regularly and adapted to the latest changes in digital maturity and digital transformation within the university. A university's level of digital maturity is a measure of their readiness to incorporate digital technology and information technology into their campus. The goal of a digital transformation in universities is not only to implement technology but to also develop new strategies and methods of working that positively impact the university experience for students (digital journey). The digital transformation maturity assessment is crucial in helping universities align or restructure their DCMP or Information Technology Master Plan (ITMP). The outcome of this research is a matrix that will guide the digital transformation planning team in realigning or redeveloping the DCMP.
Decision Support System in Determining Lecturer Performance with the TOPSIS Method Sefrika, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.297

Abstract

In order to improve the quality of learning in tertiary institutions, it is necessary to carry out periodic evaluations so that the quality of education can increase and adapt to needs. Performance appraisal is carried out in order to know the teaching and interpersonal quality of the lecturers so that they are in line with the education quality standards. To determine the best lecturer performance, it needs to be done further in order to get accurate results. This study aims to determine the best lecturer performance by using the TOPSIS method decision support system. TOPSIS is a method that can solve multi-criteria problems so as to get maximum results. The results show that the most ideal criterion in determining outstanding lecturers is the pedagodic aspect. Research can be used in multi-criteria decision-making processes with accurate results.
Prototype River Water Level Detection Tool Using Ultrasonic Sensor with Sound Output Based on Arduino Uno Microcontroller Chandra, Yudi Irawan; Irawati, Diyah Rury; Riastuti, Marti; Rokoyah, Kokoy
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.298

Abstract

River water that overflows or is at an uncontrolled height can cause flooding and environmental damage. Therefore, the development of a river water level detector that can provide early warning is very important. In this research, we propose a river water level detector using ultrasonic sensor with sound output based on Arduino Uno microcontroller. This device is designed to measure the level of river water by utilizing the principle of ultrasonic wave reflection. The ultrasonic sensor is installed above the river and sends ultrasonic waves to the water surface. The waves are then reflected back to the sensor after reaching the water surface. The travel time of the reflected wave is used to calculate the distance between the sensor and the river water surface.The Arduino Uno microcontroller is used to process the distance data obtained from the ultrasonic sensor. When the water level exceeds the specified limit, the microcontroller will generate a sound output as a warning. A speaker is connected to the microcontroller and will emit different sounds depending on the water level.This tool has advantages in terms of accuracy and responsiveness. By using ultrasonic sensors, measurements can be taken in real-time and provide water level information with high precision. The voice output also allows the information to be delivered directly and effectively to the user. The test results show that this river water level detection device can work well and provide early warning when the water level exceeds the specified limit. The success of this tool is expected to help in flood risk management and environmental conservation.
Web-based Pentaca Sale Information System Implementation Robo, Salahudin; Oktaviani, Alif Anas Tasya
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.299

Abstract

Pentaca products are experiencing problems in the form of managing Pentaca customer order data which is still being done manually by writing it in a book, making it difficult for Pencaca brand owners to manage customer data and make monthly reports for these products. The application of information systems in pentaca sales is needed to ensure that the business operates properly and improves the quality of service to customers. This study uses qualitative research methods to fulfill the use of the subject under study and collects data from various case studies, personal experiences, interviews with brand owners, visuals depicting everyday life. The system development uses the waterfall method. The data collection technique used is by direct observation, direct interviews and taking documentation of the business owner. With this system, it makes it easier for customers to buy these products and also makes it easier for brand owners to make monthly product purchase reports and manage financial reports.
Implementation of The Naïve Bayes Algorithm For Diagnosing Lung Disesase In An Expert System Concept Hafiyyan, Azka; Seniwati, Erni; Haryoko, H
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.300

Abstract

Web-based lung disease diagnosis expert system is an application designedto help diagnose lung disease quickly and accurately. This system uses the Naïve Bayes classification method which is one of the techniques in artificial intelligence. The Naïve Bayes method utilizes probability to classify data based on existing attributes. In the context of a lung disease expert system, these attributes can include symptoms experienced by patients such as cough, shortness of breath, chest pain, and so on. Research results have shown that in the test of accuracy comparing the expert with the lung disease diagnostic system using the naive Bayes method, the accuracy rate reached 86.66%. With the achieved accuracy rate, it can be stated that the system is capable of performing diagnoses effectively and accurately
Cluster Analysis for Performance Evaluation of Outsourcing Engineers in the Telecommunication Industry Hasibuan, M. Rivai; Kusrini, K; Muhammad, Alva Hendi
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.301

Abstract

The telecommunications industry relies significantly on the knowledge and contributions of engineers, who play a crucial role in designing, enhancing, and supervising diverse communication infrastructure systems. As engineers gain experience, they frequently advance to supervisory or consulting positions in which they provide expert guidance. Many businesses have delegated their recruitment processes to contract workers to optimize operational costs and boost productivity. It is essential to evaluate the performance of outsourced employees in order to determine the value they add to the organization. Performance evaluations play a vital role in evaluating factors such as attendance, skill level, burden management, and job performance. These evaluations aid in contract renewal decision-making. Various metrics emphasizing factors such as effective skills, well-defined objectives, and regular status updates can be used to determine the success of outsourced employees. This permits a comprehensive evaluation and the identification of improvement areas. In this paper, the investigation concentrates on using cluster analysis techniques, specifically partition-based algorithms such as K-means, to classify outsourced workers according to their individual skills and characteristics. Then, we compare the provided insights with the density-based algorithm DBSCAN to comprehend them. Cluster analysis is a potent method for analyzing large datasets, allowing for swift and confident conclusions. By utilizing cluster analysis, organizations can gain insight into the diverse skill sets and characteristics of their outsourced workforce, thereby improving resource allocation, task assignment, and management as a whole
Sentiment Analysis of Product Reviews in the Sales System of Putra Electronics Store Wulandari, Maria Sri; Noveandini, Rahayu; Chandra, Yudi Irawan; Putra, Noval Dwi
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.302

Abstract

The Putra Elektronik Store is a commercial establishment that sells various electronic goods, including mobile phones, desktop computers, and laptops, among other products. The procedure for conducting transactions, which has been ongoing until now, is still done manually. The author suggests developing an online sales platform based on this information. The system design uses UML in addition to the programming languages PHP and Laravel. In addition, a tool for collecting customer reviews has also been developed. The purpose of this feature is to determine whether consumers' feelings regarding the things being offered are favorable or unfavorable by employing the navel Bayes algorithm and weighting tf (term frequency) and probability..
Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
The Application of the MOORA Method on Recommendations for Selection of Promotional Media for Nurul Izzah Kindergarten Siregar, Annisa Fadillah
IJISTECH (International Journal of Information System and Technology) Vol 7, No 1 (2023): The June edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i1.303

Abstract

Nurul Izzah Kindergarten is one of the kindergartens located in Deli Tua District, Deli Serdang Regency, North Sumatra. Nurul Izzah Kindergarten has an educational concept of learning either religion or other general education without losing the playful children's world. However, the Deli Tua District community in Deli Serdang Regency is not very familiar with Nurul Izzah Kindergarten, therefore promotion is needed. In this matter, a decision support system is necessary on aiming to recommend the priority of media promotions using the MOORA method. The MOORA method is used to calculate the weight value of each attribute, then the process of which alternative ranking is the most recommended according to the results of the highest Yi calculation, some of these alternatives are Tiktok, Instagram, Facebook, Brochures, and Posters. For recommendations for promotional media, several criteria are required such as the cost, reach, attractiveness, and completeness of information. Based on the calculation of the MOORA (Multi-Objective Optimization based on Ratio Analysis) method for each alternative, the highest Yi is Tiktok with 0.3306 and the second highest Yi is Instagram with 0.2956.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.