cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
ijistech@gmail.com
Editorial Address
Jalan Sudirman Blok A No. 1/2/3, Siantar Barat Kota Pematang Siantar, Sumatera Utara Kode Pos: 21127, Telepon: (0622) 22431
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH
ISSN : -     EISSN : 25807250     DOI : https://doi.org/10.30645/ijistech
IJISTECH (International Journal of Information System & Technology) has changed the number of publications to six times a year from volume 5, number 1, 2021 (June, August, October, December, February, and April) and has made modifications to administrative data on the URL LIPI Page: http://u.lipi.go.id/1492681220 IJISTECH (International Journal Of Information System & Technology) is a peer-reviewed open-access journal published two times a year in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in intelligent informatics. All the papers are refereed by two international reviewers, accepted papers will be available online (free access), and no publication fee for authors. The articles of IJISTECH will be available online in the GOOGLE Scholar. IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in computer science and their applications in business, industry, and other subjects. Computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications, etc. • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis, and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High-Performance Computing • Information storage, security, integrity, privacy, and trust • Image and Speech Signal Processing • Knowledge-Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition, and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high-performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 394 Documents
Face Recognition Application Using the Eigenface Method for Employee Attendance at STMIK Budi Darma Alwin Fau; Fince Tinus Waruwu
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i1.71

Abstract

Attendance is one of the most important repetitive transactions because it is related to the productivity of employees and employees and is one of the controlling indicators Human resources (HR) which aim to increase the potential of human resources as well used in the framework of efficiency. Current technological developments allow making a system that can assist humans in recognizing a digital image. One of them, a field that is currently being developed is pattern recognition. This technology identifies the special physical characteristics of a person. An example of pattern recognition is an example of face recognition, iris recognition, fingerprint recognition (finger recognition), and others. The face is part of the human body to be the focus of attention in social interactions. The face has a very important role that can show someone's identity; therefore a face can be used as a part of the human body that is used as an indication of knowing someone or face recognition. Attendance is an administrative act regarding attendance and absence attendance of employees. In this facial recognition, research uses a camera to capturing someone's face was then compared to the face that had previously been stored in a specific database. Broadly speaking, the process of facial recognition is the webcam camera captures the face. Then we get an R (read) value, G (Green), B (Blue). Using pre-processing, cropped, RGB to grayscale. After the Grayscale process is carried out, the face processing stage is carried out using the eigenface method. In this eigenface method, there are several core stages namely: converting faces to matrices, calculating Flat Vector averages, determining values eigenface, and perform the face identification process by looking for the eigenface value approaching. One of the ways of facial recognition can be developed into an application absence that can be applied in companies to prevent manipulation of absences by employees or employees.
Analysis of ANN Backpropagation Ability to Predict Expenditure Group Inflation Mhd Ali Hanafiah; Ni Luh Wiwik Sri Rahayu Ginantra; Achmad Daengs GS
IJISTECH (International Journal of Information System and Technology) Vol 4, No 2 (2021): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i2.103

Abstract

The Covid-19 pandemic that has hit the world, especially Indonesia, has greatly disturbed the stability of the inflation rate. Inflation that continues to increase will disrupt the economy in this country. Therefore this study aims to analyze the ability of ANN backpropagation which will be applied to predict the development of the inflation in Indonesia during the Covid-19 pandemic so that later it can be useful information for the government and society. The research data used is inflation data according to expenditure groups obtained from CBS (Central Statistics Agency) in January-May 2020. Prediction is done using the backpropagation neural network algorithm. This paper uses four network architectures, namely: 3-5-1, 3-10-1, 3-25-1 and 3-50-1. Based on the training and testing of the four models, the 3-10-1 model is the best architectural model that is suitable for predicting the development of the inflation in Indonesia with an accuracy of 75%. Also, this model performs an iteration of 25303 and an MSE test of 0.0362820326. Based on the prediction results in June-August 2020 and real data obtained from the Central Statistics Agency, ANN using the backpropagation method is highly recommended to be used to predict the development of Indonesian Inflation according to the Expenditure Group.
Implementation of Min Max Algorithm as Intelligent Agent on Card Battle Game Silvester Dian Handy Permana
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.20

Abstract

Information technology brings transformation from the physical world into the digital world. This transformation developed in various fields, especially games. In the past, games that are involving physical objects such as chess, cards, dominoes, and mahjong are popular for the publics. Card battle game is a game that pits strength between 2 cards. The game must have 2 players who will compete. However, if a player wants to practice before the match or wants to play alone, he needs Non Player Character (NPC). The NPC will be the opponent in card battle games. In order for NPCs to be able to fight players, a special algorithm is needed to make the NPCs compete with players. The algorithm that can be implemented into the NPC is the Min Max Algorithm. This algorithm is a responsive algorithm which can count every step of the player. The results of this study are expected to provide suitable opponents for players who want to practice or compete in Card Battle Game on their own.
Problem Based Learning Android App Innovation Adi Ahmad; Fauzan Putraga Al Bahri
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i2.52

Abstract

>Nowadays, there are many learning media that have been developed by many programmers either based on mobile or not have became the needs and viewed as a normal situation in education activity. However, there are many learning media in the market that used by many users are still have many problems on it, such as learning media are not able to adjust to the learning problems needed that are facing in higher education. For this reason this research was conducted to create an Android app that applies the concept of Problem Based Learning in order to produce a mobile learning media so that it is expected to be able to improve the achievements of students in schools because it is more effective and efficient.
Acceptance of Video Conference Technology as a Distance Learning Media with the TAM Method S Sefrika; Enok Tuti Alawiah
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i1.84

Abstract

The covid19 pandemic has resulted in teaching and learning activities to be carried out online using video conferencing. This study aims to determine the acceptance of video conferencing technology in the teaching and learning process. The research method uses TAM (Technology Acceptance Model). TAM is a model used to measure the extent to which the level of user acceptance of technology, especially information technology. The results showed that the online learning system using video conferencing could be accepted by students as a solution for distance learning.
Geographical Information System Mapping Based on Android at Equal Senior High School In Lubuklinggau Joni Karman; Ema Crisdiyanti
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i1.33

Abstract

The problem in this study is there is no geographic information system for mapping senior high schools so that there is a misunderstanding inlocation delivery at aqual Senior high schools (SMA) in Lubuklinggau. This research uses data collection methods, by making observations at the research site, conducting question and answer directly to the source, and documentation by reading literature books. The results of the study show that the program on the geographic information system mapping on Android based equivalents on Android at Lubuklinggau the geographical information system is expected to be a solution for the community in finding the location of Senior High Schools in Lubuklinggau. This application was created using the C I framework and also the ionic framework supported by api Google Maps.
Developing Fuzzy-Promethee Method by using AHP Method on Student Achieving Selection Rina Widyasari; Hendra Cipta; Abdul Halim Hasugian
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i2.65

Abstract

The achievements are the result of a person doing. Achievement can be achieved by relying on intellectual ability, emotional, and spiritual and resilience in the face of situations in all aspects of life. Student achievement awards can be either scholarship or involve the student in the national and international mathematics Olympiad. In UINSU, determining the best students in each major still uses manual procedures. Promethee is a method to resolve decision-making cases that belong to the MCDM with the outranking principle. This research developed a decision support system that involves AHP and Fuzzy-Promethee. The result shows the model that integrating AHP and Fuzzy-Promethee, which criteria in achievement selected by AHP, then the value of each criterion enter fuzzification, select the best student by Promethee method.
Utilization of the MOORA Method for Recommended Selection of Best Waiters in Hospitality Preddy Marpaung; Henri Pandiangan
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i1.97

Abstract

Hospitality waiters are the spearhead in a hotel's service with a variety of tasks ranging from food preparation, room arrangement, serving guests, and other tasks. So waiters as hotel employees are very influential on the quality of service to consumers. To motivate waiters to provide better service to consumers, a decision-making system is needed in selecting the best waiters according to the criteria determined by management. With the creation of the best waitress selection system to get an award according to the specified criteria, waiters will compete to provide the best service to impact hospitality positively. The method used in selecting the best waiters at The K Hotel Medan by utilizing the MOORA method, using the MOORA method can produce good and effective decisions in recommending the best waiters according to the highest value, namely rank 1, so that with a decision support system using the MOORA method This can help hotel management determine their best waiters for each episode objectively.
The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit Nurul Khairina; Muhammad Khoiruddin Harahap; Juanda Hakim Lubis
IJISTECH (International Journal of Information System and Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.
K-Means to Determine the e-commerce Sales Model in Indonesia Ririn Restu Aria
IJISTECH (International Journal of Information System and Technology) Vol 3, No 2 (2020): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v3i2.47

Abstract

Sales of e-commerce in Indonesia are currently experiencing a pretty good increase by starting to switch sales that are done traditionally or offline to online sales using the use of internet media to facilitate trade transactions between sellers and buyers can be done anywhere and anytime. In this study using the K-means clustering method algorithm. The data source used in this study is based on sales using e-commerce based on provinces in Indonesia in 2018. The criteria used in the calculation are divided into 3 clusters, namely seller, reseller and dropship. Centroid data for cluster 1 = 68.30,33,58,4.95 namely Aceh, Riau, West Kalimantan, East Kalimantan, and Maluku. Centroid data for cluster 2 = 78.58,22,25.4,22 i.e. North Sumatra, West Sumatra, Jambi, Bangka Belitung Islands, D.K.I Jakarta, Central Java, East Java, Banten, Bali, Central Kalimantan, South Kalimantan, South Sulawesi and Papua  and Centroid data for cluster 3 = 86.36,13.34,4.38 namely South Sumatra, Bengkulu, Lampung, Riau Islands, West Java, D.I Jogyakarta, West Nusa Tenggara, East Nusa Tenggara, North Kalimantan, Central Sulawesi, Gorontalo, West Sulawesi, North Maluku and West Papua.

Page 9 of 40 | Total Record : 394