IJISTECH (International Journal of Information System and Technology)最新文献

筛选
英文 中文
Decision Support System To Choose The Best Social Media Platform For Product Marketing Using Topsis Method 运用Topsis法选择最佳社会化媒体平台进行产品营销的决策支持系统
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.157
Dwi Andini Putri, Enok Tuti Alawiah
{"title":"Decision Support System To Choose The Best Social Media Platform For Product Marketing Using Topsis Method","authors":"Dwi Andini Putri, Enok Tuti Alawiah","doi":"10.30645/ijistech.v5i4.157","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.157","url":null,"abstract":"Currently, many content creators use social media to conduct product reviews or testimonials. This often attracts followers to make purchases of the same product. Marketing of products with social media is mostly done by the industry to attract buyers. However, in-depth research is needed to analyze which social media is most appropriate to use to market their products. This study uses the TOPSIS method, which is a multi-criteria selection method that uses a positive and negative ideal solution distance approach to obtain a valid final preference value. The results showed that as many as 0.31 social media youtube, 0.24 for social media tiktok, 0.20 for social media instagram and 0.11 for social media facebook. The results of the study can be used by policy makers to decide the selection of the right social media for marketing their products","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alfa Value Scalability on Single and Double Exponential Smoothing Comparatives 单指数和双指数平滑比较的阿尔法值可扩展性
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.165
Yuli Astuti, I. Wulandari, Muhammad Noor Arridho, Erni Seniwati, Dina Maulina
{"title":"Alfa Value Scalability on Single and Double Exponential Smoothing Comparatives","authors":"Yuli Astuti, I. Wulandari, Muhammad Noor Arridho, Erni Seniwati, Dina Maulina","doi":"10.30645/ijistech.v5i4.165","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.165","url":null,"abstract":"To find out sales forecasts in the future, it is not only based on estimates but must be calculated carefully based on the experience of previous sales transactions. This observation can be made based on sales data a few months ago to be used as actual data to get predictive value in the future period. Prediction or forecasting is done with two methods Single Exponential Smoothing (SES) and Double Exponential Smoothing (DES), from these two methods, will be sought the most suitable alpha value to get the percentage error value. There are two error values : Mean Absolute Deviation (MAD) and Mean Absolute Percentage Error (MAPE). By using sales data from February to December 2019, the predicted value of 430 orders was obtained in the SES method and resulted in a sales prediction of 402 orders in the DES method with the smallest error accuracy value of 26.88% in the SES method and an accuracy value of 22.71%. in the DES method with the acquisition of scalability of the right alpha value for both, namely 0.3 and the beta value of 0.3 in the DES method","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Teach : Mobile Application Teaching Administrative System Using Near Field CommunicationN (NFC) E-Teach:近场通信(NFC)移动应用教学管理系统
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.156
F. Ferry, Dedy Prasetya Kristiadi, S. Sutrisno
{"title":"E-Teach : Mobile Application Teaching Administrative System Using Near Field CommunicationN (NFC)","authors":"F. Ferry, Dedy Prasetya Kristiadi, S. Sutrisno","doi":"10.30645/ijistech.v5i4.156","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.156","url":null,"abstract":"Teaching administration is a teacher's needs that are recorded or recorded into files stored by the school curriculum section. Teaching administration is in the form of lesson plans per semester made by the teacher to be applied based on the planned subject matter. Archiving of learning outcomes data and teaching materials is often ignored so that teachers do not provide subject matter according to the study plan and evaluation of learning outcomes is not satisfactory. In addition, the teacher administration file is a need for school accreditation which is a benchmark for the education office's assessment, which is a serious concern for schools in making reports in their work units. To reduce administrative errors, loss of data and the effectiveness of teaching services and assist teachers in managing lesson plans and evaluating learning outcomes, a tool that is able to provide solutions is needed. Near Field Communication, abbreviated as NFC, is a development tool for Bluetooth and RFID. NFC allows the phone to store important data securely and sent to other phones equipped with NFC or read by an NFC reader. In addition, this NFC allows mobile phones to be developed for the administration of school payments as well as giving class schedules to students. In this study, a teaching administration system based on Near Field Communication (NFC) has been developed using the Raspberry Pi as a microcontroller as well as a computer capable of applying web-based programs. Electronic teaching administration with NFC is expected to replace conventional teaching administration. The advantages of NFC-based E-Teach are that it takes a short time to use, does not depend on internet access and is easy in delivering teacher administration to those in need. Study plan data processing and evaluation of student learning outcomes are faster, more accurate and integrated with the management of education providers.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126385136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Home Security And Access System Prototype Using Fingerprint 基于指纹的家庭安全与门禁系统原型
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.169
Muhammad Fahrurrozi, Lalu Puji Indra Kharisma
{"title":"Home Security And Access System Prototype Using Fingerprint","authors":"Muhammad Fahrurrozi, Lalu Puji Indra Kharisma","doi":"10.30645/ijistech.v5i4.169","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.169","url":null,"abstract":"A sense of security and easy access in managing the house is a must that every home must-have. With advances in technology, it makes it easy for us to manage and maintain the security of our homes, one of which is by utilizing an embedded system in home management using fingerprints. Fingerprints are used as the main key to access the house to provide a sense of security, convenience in managing the house, and minimizing cases of theft that occur in houses that still use conventional keys. based on trials carried out the use of fingerprints is easier to use than using an ordinary key with a success rate in the test, namely 100% in a clean and not wet state, 40% in wet fingerprints, and 0% in dirty fingerprints or dusty.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Ripeness of Manggosteen Fruit Using Hsv Color Space Transformation Method 利用Hsv颜色空间变换法检测山竹果实成熟度
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.171
M. Furqan, M. Ikhsan, Annafiah Dalimunthe
{"title":"Detection of Ripeness of Manggosteen Fruit Using Hsv Color Space Transformation Method","authors":"M. Furqan, M. Ikhsan, Annafiah Dalimunthe","doi":"10.30645/ijistech.v5i4.171","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.171","url":null,"abstract":"Rapid advances in innovation in the PC field are increasingly making applications and exploration of image handling strategies created. Image processing has an important role in various fields. Image processing applications are concerned with image processing with regard to color transformation. In this case, the method of transforming the color space as part of the image processing helps in detecting the colors in the image and processing them. Color space is a mathematical model that describes the color represented in the number model. HSV color space is a color space composed of 3 components, namely Hue, Saturation, Value. Hue is related to purity (color pattern), Saturation is related to the saturation of the color, Value expresses the brightness level of the color. In this study, based on the results of testing using mangosteen fruit imagery to detect the type of ripeness by transforming RGB color space into HSV color space conducted using sample data as much as 60 fruit data consisting of 45 training samples consisting of 15 images of mangosteen fruit in each type of ripeness, and 15 test samples consisting of 5 samples of ripe mangosteen fruit,  5 samples of half-cooked mangosteen fruit and 5 samples of raw mangosteen fruit obtained success rate accuracy of 86.6%, so it can be concluded that the HSV Color Space Transformation method can be used to detect the ripeness of mangosteen fruit.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Public Transportation Services on Twitter Social Media Using the Method Naïve Bayes Classifier 基于Naïve贝叶斯分类器的Twitter社交媒体公共交通服务情感分析
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.166
Rima Tamara Aldisa, Pandu Maulana, Muhammad Aldinugroho
{"title":"Sentiment Analysis of Public Transportation Services on Twitter Social Media Using the Method Naïve Bayes Classifier","authors":"Rima Tamara Aldisa, Pandu Maulana, Muhammad Aldinugroho","doi":"10.30645/ijistech.v5i4.166","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.166","url":null,"abstract":"Public transportation services in Indonesia, especially Jabodetabek, have used social media, especially Twitter, as a way to improve services. Currently, the use of online transportation services is like a need; it is necessary to conduct a sentiment analysis of online transportation to find out how people respond to these online transportation services. This research was made to analyze community responses with data analysis in the form of tweets that filtered with a public transportation-related keyword then classified into positive and negative classes using the Naïve Bayes Classifier method. Based on the system built, the total sentiment results for the percentage of the occurrence of positive words were 0.507843137, and the sentiment results for the percentage of negative word occurrences were 1.4132493. The results show that the level of negative sentiment from public tweets is greater than the level of positive sentiment.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Inference System In Predicting Unemployment Rate In City X Using Sugeno Method 用Sugeno法预测X市失业率的模糊推理系统
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.151
Yosdarso Afero
{"title":"Fuzzy Inference System In Predicting Unemployment Rate In City X Using Sugeno Method","authors":"Yosdarso Afero","doi":"10.30645/ijistech.v5i4.151","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.151","url":null,"abstract":"Unemployment in Indonesia is currently increasing. This can be seen from the number of unemployed and workers who are looking for job vacancies either directly or through applications. The problem in this study is the lack of understanding of job applicants about the terms or criteria for applying for a job so that they are not accepted in a company. There are five criteria that must be considered in applying for a job, namely, education, vacancies, age, opportunities and knowledge. The purpose of this study is to help job seekers to complete and understand the criteria that have been set. This study uses the Sugeno method with the final result in the form of linear or constant. The working process of the Sugeno method is fuzification, inference engine, application of implication and defuzzification functions to obtain results in accordance with the decision-making system.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133925585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation and Development of Web-Based Information Systems of Unit Pelaksana Teknis Mengwi District Based on Usability Method and User Experience 基于可用性方法和用户体验的蒙威区Pelaksana分公司网络信息系统评价与开发
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.167
I. M. S. Dwipa, I. Candiasa, L. J. E. Dewi
{"title":"Evaluation and Development of Web-Based Information Systems of Unit Pelaksana Teknis Mengwi District Based on Usability Method and User Experience","authors":"I. M. S. Dwipa, I. Candiasa, L. J. E. Dewi","doi":"10.30645/ijistech.v5i4.167","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.167","url":null,"abstract":"Unit Pelaksana Teknis (UPT) of Mengwi District is one of the regional agencies of Badung Regency. UPT Mengwi has an important task in terms of educational services in the Mengwi District. There were several problems found by users, namely problems related to the interface and some functional systems that did not run optimally. Therefore, continuous evaluation and development were needed. The evaluation of SIUPT Mengwi was carried out using the evaluation techniques of Performance Measurement, Retrospective Think Aloud, and User Experience Questionnaires. The results in the initial evaluation phase with the Performance Measurement technique showed that it was still not effective and efficient. The analysis of user satisfaction on the attractiveness aspect was 1.45, clarity aspect was 1.05, efficiency aspect was 1.21, and accuracy aspect was 1.45. It discovers that the satisfaction Level of the SIUPT Mengwi has not reached the set standard, so that development efforts were needed. The results of the evaluation after the development phase showed that SIUPT has been effective and efficient with a failure rate of 0%, and there was no significant difference in the time to complete the task. All aspects of user satisfaction gained a very good category with an average score for the attractiveness aspect, which was 2.39, the clarity aspect was 2.29, the efficiency aspect was 2.50, the accuracy aspect was 2.41, the stimulation aspect was 2.43, and the novelty aspect was 2.40. For future evaluation and development, some improvements can be made to the Graphic User Interface (GUI) on the system to improve the research which will be carried out.","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization of Asmuth-Bloom Algorithm In Data Security Using Secret Sharing Protocol Asmuth-Bloom算法在秘密共享协议数据安全中的应用
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.158
Heri Santoso, Aidil Halim Lubis, A. Darta
{"title":"Utilization of Asmuth-Bloom Algorithm In Data Security Using Secret Sharing Protocol","authors":"Heri Santoso, Aidil Halim Lubis, A. Darta","doi":"10.30645/ijistech.v5i4.158","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.158","url":null,"abstract":"Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertexts because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message). In this case, a cryptographic protocol can be applied, namely the Asmuth-Bloom secret sharing protocol. The methodology used to analyze and design application software and learning the Asmuth-Bloom secret sharing protocol is the Waterfall method. This research is intended to produce a learning software that is able to display the working process of the Asmuth-Bloom secret sharing protocol and the application of the Asmuth-Bloom secret sharing protocol. The working procedure described by the software includes the key formation process, the shadow formation process and the shadow merge process. The software also provides an interface to do the process of splitting a text file into n shadow files and merging m shadow files into the original text file. In addition, the software also provides basic theories related to the two cryptographic protocols and reports the results of the calculation process are stored in a text file with *.txt extension","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"52 206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125951079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Generation By Population by Region in Indonesia Using K-Means Algorithm 基于K-Means算法的印尼地区人口世代分类
IJISTECH (International Journal of Information System and Technology) Pub Date : 2021-12-30 DOI: 10.30645/ijistech.v5i4.160
Ririn Restu Aria, Susi Susilowati
{"title":"Classification of Generation By Population by Region in Indonesia Using K-Means Algorithm","authors":"Ririn Restu Aria, Susi Susilowati","doi":"10.30645/ijistech.v5i4.160","DOIUrl":"https://doi.org/10.30645/ijistech.v5i4.160","url":null,"abstract":"Population growth caused by the year of birth led to the classification of population groups into several generations. Classification is important because in each generation there is based on population growth has different characteristics and traits in each generation. This research was conducted to try to group generations based on provinces in Indonesia based on the number of residents owned. When researchers analyzed the data obtained from population census data conducted by the central statistics agency (BPS). The method used in generation classification grouping uses the K-Means algorithm method based on 3 clusters. Based on the results of calculations carried out for 3 clusters obtained cluster 1 has 25 provinces, cluster 2 has 3 provinces and cluster 3 has 6 provinces. Based on the 2020 census that has been conducted, the current population is generation Z, generation and Pre Boomer generation is last in line so that from the available data can provide information about mapping in 34 provinces to be able to improve communication patterns between generations and fulfill public facilities that can be used every generation","PeriodicalId":355398,"journal":{"name":"IJISTECH (International Journal of Information System and Technology)","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信