IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
394 Documents
Generating Mersenne Prime Number Using Rabin Miller Primality Probability Test to Get Big Prime Number in RSA Cryptography
Dicky Apdilah;
Nurul Khairina;
Muhammad Khoiruddin Harahap
IJISTECH (International Journal of Information System and Technology) Vol 1, No 1 (2017): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v1i1.1
Cryptography RSA method (Rivest - Shamir - Adelman) require large-scale primes to obtain high security that is in greater than or equal to 512, in the process to getting the securities is done to generation or generate prime numbers greater than or equal to 512. Using the Sieve of Eratosthenes is needed to bring up a list of small prime numbers to use as a large prime numbers, the numbers from the result would be combined, so the prime numbers are more produced by the combination Eratosthenes. In this case the prime numbers that are in the range 1500 < prime <2000, for the next step the result of the generation it processed by using the Rabin - Miller Primarily Test. Cryptography RSA method (Rivest - Shamir - Adleman) with the large-scale prime numbers would got securities or data security is better because the difficulty to describe the RSA code gain if it has no RSA Key same with data sender.
Efficient Comparative Analysis Of Fertilizers Palm Oil
Bayu Febriadi;
Anisya Anisya;
Pandu Pratama Putra
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.36
Palm oil is a vegetable oil-producing plant that has more advantages compared to other vegetable oil-producing plants, which have high productivity reaching 4 tons ha-1 Crude Palm Oil (CPO). Palm oil is also a raw material for making food and non-food ingredients, and renewable fuels. The author wants to make an analysis by comparing two methods, namely the AHP Method (Analytical Hierarchy Process) and Fuzzy logic which is able to handle the uncertainty and uncertainty used. Fuzzy logic used is the Fuzzy Tsukamoto inference system because this method uses monotonous value applications, the output of the inference output from each rule is explicitly given (crisp) based on α-predicate (fire strength). Whereas the AHP Method can facilitate in calculating the validity to the tolerance level of concentration as criteria and alternatives chosen by the user.
The Geographic Information System of Gas Station (SPBU) Location In Musirawas, Lubuklinggau, and North Musirawas Based on Mobile Web
Joni Karman;
Oskar Al Amin
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.68
Making a Geographical Information System for the Location of Public Fuel Filling Stations (SPBU) in Musirawas, Lubuklinggau, and North Musirawas based on Mobile Web, the community, still has difficulty in finding the location for gas stations, especially people outside the region who also do not know the mileage so that they have the potential to run out of fuel and the community also does not know the types of fuel available at the gas station so that you have the potential to get lost when looking for a gas station location. This research uses data collection methods, by observing and recording directly at the research site (observation), conducting a direct question and answer with the resource (interview) and documentation by reading existing books and literature. The results of the geographic information system design for the location of gas station stations (SPBU) in Musirawas, Lubuklinggau, and North Musirawas based on Web Mobile was made by using the PHP programming language and MySQL database and making program listings using the Adobe Dreamweaver application. The system created by this user can select the closest gas station menu directly by pressing the button where the nearest gas station is located so that the closest gas station location where you are will appear. Information on gas stations can also be known with information which is located according to the location of the gas stations chosen, and users can provide feedback in the form of comments or suggestions for improvements to the gas stations.
An Information System Landscape of Indonesia Tourism Destination
Azril Azahari;
Sultan Sabiq Arrafi;
D Damiasih;
Aldi Wisnumurti
IJISTECH (International Journal of Information System and Technology) Vol 4, No 2 (2021): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i2.100
Tourism and information technology are two things that are currently interrelated. The use of information technology in the tourism sector is very influential in its current development. One of the information technologies approaches used is the information system regarding tourist destinations in Indonesia. The use of the information system is used to make it easy for media users to access information about tourist destinations. All kinds of information conveyed from destinations, routes, attractions, facilities, and others are combined into one information system. In this paper, we present an information system landscape of indonesia tourism destination. We review information system usage for tourism destination. We show that the use of the information system for tourist location destinations can continue to be developed to get the trust of its users, starting from the facilities in the system, to the benefits of its use such as ease of search, ordering or reservation, and others. Finally, we present open problems for future research recommendations.
Effectiveness of Population Data Application Implementation in Kresek Village, Wungu Sub-District, Madiun Regency
Andi Rahman Putera;
Eka Resty;
Benny Agus S;
Ilham Prihantono
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v2i1.16
Population data processing conducted in Kresek Village, Wungu Sub-District, Madiun District is still manual. Data processing that has been used so far is the Excel application. This, causing data processing requires not a little time and quite a long time. With a system that has long data storage is not safe, especially in the long term. To overcome the problems related to population data, it is designed an application to process the data more easily and safely. The purpose of this study was to determine the effectiveness of the previously designed application of population data in Kresek Village. The study was conducted in Kresek Village, Wungu Sub-District, Madiun Regency. Respondents of this study were 2 Kresek Village officers as users. The analytical method used is descriptive analysis using data from interviews with respondents. Evaluation analysis is carried out to explain the new system that has been implemented. Based on the results of the study, it can be concluded that the application that has been designed is in accordance with the wishes of the Kresek village office. This application is able to ease the workload of village officials so that population data processing is more effective and efficient.
Application of K-Means Algorithm for Clustering the Quality of Lecturer Learning at Batam International University
Yefta Christian
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i2.49
The need to measure the quality of learning becomes very significant when the quality of learning is still low. This also applies to the quality of learning at the highest level. The quality of lecturer learning in class is often not in accordance with what it should be, one of the constraints of this low quality is that the quality of lecturer learning is not accurately measured. Data mining is used in this research to map the quality of lecturer learning based on its cluster, namely Clustering, It is hoped that universities can measure the quality of learning from their lecturers accurately. From this research, students with low social studies tend to value lecturers with low grades; conversely students with high social studies tend to judge lecturers with high enough grades. The k-Means algorithm is accurate enough to be used in clustering the quality of lecturer learning based on grades and results of student questionnaires.
Higher Education e-Learning Usability Analysis Using System Usability Scale
Didi Supriyadi;
S. Thya Safitri;
Daniel Yeri Kristiyanto
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.81
The COVID-19 pandemic encourages almost every institution to optimize the use of information and communication technology to maintain consistency and competitive advantage. One of the efforts made by Higher education is developing and optimizing online-based learning (e-learning) models. E-learning plays an important role in the success of achieving learning objectives at Telkom Institute of Technology Purwokerto (ITTP), which is conducted between lecturers and students. The problem faced in optimizing e-learning system at ITTP is related to usability. The purpose of this study is to evaluate the usability level of the ITTP e-learning system using the System Usability Scale (SUS) method. Based on the testing of questionnaire instruments using SPSS software, it was obtained the result that the questionnaire used for the study was valid, and the reliability rate was 0.758. Based on the results of system tests to 100 respondents or users, it is known that the SUS score is 55.3. The value indicates that the acceptability ranges are in the Marginal Low range. It can be seen from the adjective rating, SUS score from the ITTP e-learning system is in the CATEGORY OK and according to Curved Grade Scale (CGS) is in grade D. Based on Net Promoter Scale (NPS), the score 55.3 indicates that the ITTP e-learning system users tend to be in the Detractor category.
The Application of Data Mining in Determining Timely Graduation Using the C45 Algorithm
Asro Pradipta;
Dedy Hartama;
Anjar Wanto;
Saifullah Saifullah;
Jalaluddin Jalaluddin
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.30
Graduating on time is one element of higher education accreditation assessment. In the Strata 1 level, students are declared to graduate on time if they can complete their studies <= eight semesters or four years. BAN-PT sets a timely graduation standard of >= 50%. If the standard is not met, it will reduce the value of accreditation. These problems encourage the Universitas Simalungun Pematangsiantar to conduct evaluations and strategic steps in an effort to increase student graduation rates so that the targets of BAN-PT can be achieved. For this reason it is necessary to know in advance the pattern of students who tend not to graduate on time. In this study, C4.5 Algorithm is proposed to predict student graduation. This algorithm will process student profile datasets totaling 150 data. This dataset has a graduation status label. The value of the label is categorical, that is, right and late. The features or attributes used, namely the name of the student, gender, student status, GPA. The results of the C4.5 algorithm are in the form of a decision tree model that is very easy to analyze. In fact, even by ordinary people. This model will map the patterns of students who have the potential to graduate on time and late.
Application of Steganography to Audio Files with Least Significant Bit (LSB) Process and Vigenere Cipher Encryption
Heri Santoso
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i2.62
Current technological developments, making the information very important, then the need arises in sending information that contains secrets. To solve this information security problem, the method that can be used is cryptography to encode messages using the Vigenere Cipher algorithm and steganography to hide messages using the Least Significant bit (LSB) method. This steganography application is able to insert text messages in files that have the format * .txt, * .docx, and * .pdf, but the size of the amount of text does not exceed the cover capacity of the audio file and can extract the text that has been inserted again. This application is also capable of encrypting and decrypting text files in * .txt, * .docx and * .pdf formats. Tests conducted on the audio size, audio that has a large bit rate will have a large capacity.
Decision Support Information System For Provision of Assistance Street Vendors Using Business Facilities Simple Additive Weighting Method
Ari Waluyo
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.94
The purpose of this study was to design a decision support system for providing business facilities for street vendors using the web-based Simple Additive Weighting method. The research method used in this study is a qualitative method with a descriptive approach. Data collection techniques used are by observation, literature study and interviews that have a close relationship with the main problem and the system development method used is the waterfall system development method. From the results of the research conducted found that the subjectivity of decision-making assistance is only determined based on the evaluation of the data that is owned and does not have definite criteria so that decision-making assistance has not found maximum results. Decision support system for providing business facilities for street vendors using the Simple Additive Weighting method produces sub-criteria aspects and sub-criteria values, namely aspects of the residence, income aspects and aspects of dependents of school children, each criterion has an attribute to be used as a reference for granting assessment help.