IJISTECH
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles
394 Documents
Message Security on Chat App based on Massey Omura Algorithm
Taronisokhi Zebua;
Rivalri Kristianto Hondro;
Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v1i2.11
Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Prototype of Blind Aid Tool With The Haar Like Feature
Ade Bastian;
Dony Susandi;
Usup Suparma
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i2.44
Every human being is born perfectly but not all humans are born perfect, some of us are born have a deficiency in blindness. Blind people are someone whose vision is impaired from birth or because of an illness that causes their vision to be disrupted. Blind people need tools for their daily activities usually in carrying out blind activities using tools as a tool. Tools that are now widely circulating only as a detector can not yet identify objects, for that blind people neeed a tool that can identify the object. To make this happen, a prototype design research is done. Blind assitive devices use the haar like feature and extreme contour methods. Prototyping method is chosen so that users can play an active role during the process of designing, testing and implementing tolls. Contour is a curve or image that has similarities with objects or objects with functions using OpenCv. The conclusion of the detection results using the haar like feature method is the form of a string then processed using pygame so that the blind are able to know the object in fron of it.
Expert System with Diagnosis of Blood Cancer (Leukaemia) with the Certainty Factor Method
S Silvilestari
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.75
Blood cancer or called leukaemia usually affects children with a high risk of death. Lack of knowledge about leukaemia is the cause that affects parents to search for information. By looking at the condition of children who are still unable to think for themselves. Will make a concern for the people around him to help them overcome their problems. Parents or immediate family must supervise the child's development and development for the recovery of their child. To help the process of healing children who have leukaemia, parents must be active in seeking information about the disease. So that if there is a symptom, the parents are more sensitive. They can recognize and immediately prevent the leukaemia disease, in this study an application in the diagnosis of leukaemia is carried out using the help of an expert system which is used to assist in diagnosing leukaemia using certainty methods. Factor. The results of using the certainty factor method based on the symptoms and criteria possessed by patients with leukaemia patients will show a fairly high percentage and accuracy as a tool that shows the conditions experienced by people living with leukaemias.
Internal Quality Audit Administration Information System In Badan Penjaminan Mutu (Case Study: Universitas Lancang Kuning)
Bayu Febriadi
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v2i2.24
Lancang Kuning University Mapping and Implementation of the Internal Quality Assurance System (SPMI) was implemented from 2008 with the establishment of the Quality Assurance Agency (BPM) and Quality Assurance Unit (UPM) at the Faculty level with the aim of creating a quality culture in the Lancang Kuning University Academic Community, in the process of implementing the internal quality assurance system at the quality assurance agency, it has also carried out Monitoring and Evaluation (Monev) once a year to guarantee the quality culture that has been implemented, but in the implementation of Monitoring and Evaluation the Quality Assurance Agency always experiences obstacles such as technical, technical and recording data during activities and also in document archiving because there is no media that can be utilized in managing monitoring and evaluation while the application of information technology and resources already exists. With the use of information technology in the application of computerized based applications for filing and presenting data needs, it is expected to help the academics more quickly and precisely in processing data monitoring and evaluation as well as a means of implementing accreditation by the National Accreditation Board of Higher Education (BAN-PT). It is expected that with the development of applications in the management of monitoring and evaluation by completing the System Development Lyfe Cycle (SDLC) method in the problem analysis phase, the application that is built can improve the quality of monitoring and evaluation in data processing that is well integrated and can be utilized at any time by Lancang Kuning University academic community.
Application of Lecturer Performance Index In Badan Penjaminan Mutu Lancang Kuning University
Bayu Febriadi;
Pandu Putra Pratama
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i2.56
In the Badan Penjaminan Mutu of Lancang Kuning University (BPM) in processing the Lecturer Performance Index (IKD) data, it still uses manual data in data processing, so this causes many problems. Among them: delays in reporting, inaccurate data, the emergence of efficiency and effectiveness of the work, overlapping data, data archiving that is not good, and other problems that result in all aspects of the existing assessment. To be able to answer all of these challenges, the author intends to submit research making Compurterization-based Quality Assurance Services application, especially in online based lecturer performance index data processing. Its usefulness is to facilitate the academic community of Lancang Kuning University in conducting data processing of Lecturer Performance Index (IKD). and it is expected that with the computerized application of Quality Assurance Services will be more effective and efficient in working. This E-IKD was created using a Mobile / Web Service application. Several actors are directly integrated with the service of this system, such as: Unit Units in the University of Lancang Kuning, Assessors, Lecturers and Administrators. Implementation methodology uses case tools which are a computer-based product, aiming to support one or more software engineering activities or processes. The purpose of the case tools is to increase the speed of analysis of university leaders, provide information related to existing business processes, improve accuracy in evaluating performance, better documentation, and use by users who are still prime. In order to provide scientific group quality assurance services or expertise and management services. The purpose of this study is the application of E-IKD (Lecturer Performance Index) based on information technology as a medium of service for lecturers and as an evaluation medium for the Badan Penjaminan Mutu (BPM) in all Units in the Lancang Kuning University environment.
Application of the Steepest Ascent Hill Climbing (SAHC) Algorithm for Mobile-based Shortest Route Search
Mhd Furqan;
A Armansyah;
Razzaq H. Nur Wijaya
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.88
This study aims at early to determine the application of algorithms Steepest Ascent Hill Climbing (SAHC) for finding the shortest route-based Mobile in Humbang Hasundutan. Based on the results of the application of algorithms Steepest Ascent Hill Climbing (Sahc) To search based Shortest These Mobile in Humbang Hasundutan. So it can be concluded that the search for the shortest route based on Mobile can be solved using the Steepest Ascent Hill Climbing algorithm. In the manual calculation process using the Steepest Ascent Hill Climbing algorithm at the node from Humbang, there is a heuristic value of 0.0896184808, at the node from which the three intersections are originated there is a heuristic value of 0.1693780561, at the node from which there is a heuristic value of 0.367474152, at the node from which the waterfall falls sibabo has a heuristic value of 0.3823982675. Then the result of the shortest route from Sipinsur Geosite (F) to Simolap Waterfall (B) is F èD èB (Sipinsur GeoSite - intersection 4 - Simolap Waterfall) the total distance is 51 km and the time is 1 hour 34 minutes. So that the test results of the Steepest Ascent Hill Climbing algorithm process with the system in accordance with the manual calculation process of the Steepest Ascent Hill Climbing algorithm.
Implementation and Analysis Zhu-Takaoka Algorithm and Knuth-Morris-Pratt Algorithm for Dictionary of Computer Application Based on Android
Handrizal Handrizal;
Andri Budiman;
Desy Rahayu Ardani
IJISTECH (International Journal of Information System and Technology) Vol 1, No 1 (2017): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v1i1.2
The string matching algorithm is the one of the most important parts in the various processes related to data and text types, which is the word search on computer dictionary. Computers have a basic role in the field of education, especially in teaching and learning activities. So that the classical learning model, that is by using the book as learning resource can be boring. To make it easier for users who searching words, we made an offline dictionary application based on Android by applying Zhu-Takaoka algorithm and Knuth-Morris-Pratt algorithm. The performance of Zhu-Takaoka is doing a search starts from the end of pattern that is tailored to the text, but in Knuth-Morris-Pratt algorithm starts from the beginning of pattern till match which the pattern used is word searched. The result of this research indicates that the Zhu-Takaoka algorithm is faster than the Knuth-Morris-Pratt algorithm which showed the running time of each algorithm.
Numerical Techniques for Underwater Topographic Measurement with GPS and Echo Sounder
Satoshi Iwakami;
Masahiko Tamega;
Shuji Jimbo;
Masaji Watanabe
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v3i1.37
This study demonstrates numerical techniques for a topographic study of a water area. Data obtained by a GPS unit and an echo sounder were combined, and three dimensional data were generated. A problem to find a surface that contains those data points was reformulated to a problem to find a piecewise linear continuous function defined over a triangular mesh. An iterative method led to an approximation of a fixed point. Those techniques are illustrated, and numerical examples are introduced.
Analysis of Integrated Lecture Minutes Recording System Analysis Based on RFID
Irfan Sudahri Damanik;
Eka Irawan
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i1.69
RFID (Radio Frequency Identification) is an identification technology for wireless data retrieval using radio waves. RFID is part of the development of semiconductor technology that is integrated with informatics systems. In the college environment, especially in the academic sector, there is often a problem with the process of recapitulation of attendance notes for lectures which is not effective and efficient. Therefore this research aims to build an information system that utilizes semiconductor RFID technology. The RFID tag used is a card that will be used as a substitute for a student ID card (KTM) in which there is a unique code that is used as the ID number of each student. This RFID tag data will be integrated with the database system so that the attendance process for lecture minutes becomes more effective and efficient. This is because students carry out the attendance process by attaching the KTM to the RFID reader, which will read the RFID tag on the KTM and store it in the database. So that the process of attendance recapitulation of lecture events becomes easier because the data is automatically stored in the database.
Facebook-based Tourism Promotion in Indonesia
Amin Kiswantoro;
Eufemia Sarina;
Azril Azahari;
Nur Rohman
IJISTECH (International Journal of Information System and Technology) Vol 4, No 2 (2021): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/ijistech.v4i2.101
Promoting a tourist destination, Facebook is one of the best social media platfroms can be employed. Facebook has been known by everyone for a long time and hence even though there are many new features, people are still using Facebook. By posting on Facebook wall, most young people shared something including tourism promotion. They will post photos or videos with exciting words and greetings to other polite users. Indeed, previously tourism promotion was still minimal because many people were not familiar with social media. But along with the times, their mindset changed. They learn to use social media and at the same time make tourism is getting more intense in Indonesia. Here we will briefly discuss Facebook as a medium for promoting tourism in Indonesia. We present a review on the usage of Facebook as a platform for tourism promotion made by many scholars in Indonesia. We further present a discussion on what should tourism business player should do on their Facebook promotion page. Finally, we present open problems for future research recommendations.