{"title":"Implementation of Simple Additive Weighting to Determine Priority for Handling Customer Complaints","authors":"Yuwan Jumaryadi, Tedjo Nugroho","doi":"10.30645/ijistech.v5i1.110","DOIUrl":"https://doi.org/10.30645/ijistech.v5i1.110","url":null,"abstract":"The number of population is increasing, and the competition is getting tougher. It requires companies to remain able to survive and be able to compete with other companies, especially with companies that have the same line of business. The increasing use of the internet today has caused many changes in various fields. Many efforts are made by the company to survive, including by providing the best service to its customers. The use of existing technology for developing information systems for handling customer complaints is expected to help companies improve the quality of their products or services. In company management, it is important to provide good quality service in order to increase customer satisfaction. By determining the priority for handling customer complaints, it is expected to improve the Key Performance Indicator (KPI) of engineers. The decision-making process using the simple additive weighting method is carried out by weighting each criterion. This research is expected to determine the priority of handling customer complaints so that it can help engineers in determining the priorities for handling existing complaints.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of the K-Medoids Algorithm for Data Clustering of Covid 19 Cases in West Java","authors":"Ririn Restu Aria","doi":"10.30645/ijistech.v5i1.109","DOIUrl":"https://doi.org/10.30645/ijistech.v5i1.109","url":null,"abstract":"The Covid 19 pandemic has hit Indonesia for almost 15 months since March 2020. The virus has spread to all provinces in Indonesia. Various efforts were made to be able to reduce or prevent the spread of the coronavirus, including the implementation of the PSBB in various areas including in West Java province. In this study, the objective of this research is to cluster the data on cases of Covid 19 in West Java which are recapitulated daily based on districts/cities that occurred on May 20, 2021. For the clustering process, the K-medoids algorithm is used which determines 3 clusters based on the variables used, namely discarded close contact, suspects discarded, probable completed, probable died, totally positive, positive recovered, and positive died. For data processing, a calculation analysis was carried out using the stages in the K-medoids algorithm and the Rapidminer application with high cluster mapping of 6 districts/cities, medium clusters there were 19 districts/cities, while low clusters had 2 districts/cities. The results of the analysis are expected to provide information about the distribution and mapping of clusters in West Java province. ","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133284434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection Coronavirus using Cased-Based Reasoning with Extended Jaccard Coefficient","authors":"Murien Nugraheni","doi":"10.30645/ijistech.v5i1.112","DOIUrl":"https://doi.org/10.30645/ijistech.v5i1.112","url":null,"abstract":"Coronavirus Disease 2019 or known as COVID-19 is a new disease that can cause respiratory problems and pneumonia. This disease is caused by infection with Severe Acute Respiratory Syndrome Me Coronavirus 2 (SARS-CoV-2). Some of the clinical symptoms that appear vary, ranging from symptoms such as influenza, cough, cold, throat pain, muscle aches, headaches to those with serious complications such as pneumonia or sepsis. This research to build case-based reasoning for early detection of COVID-19 by looking at the characteristics of clinical symptoms seen in a person using the Extended Jaccard Coefficient method. The results show case-based reasoning for early detection of COVID-19 using the Extended Jaccard Coefficient method can model the level of similarity of a new case to an old case.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internal Quality Audit Administration Information System In Badan Penjaminan Mutu (Case Study: Universitas Lancang Kuning)","authors":"Bayu Febriadi","doi":"10.30645/IJISTECH.V2I2.24","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.24","url":null,"abstract":"Lancang Kuning University Mapping and Implementation of the Internal Quality Assurance System (SPMI) was implemented from 2008 with the establishment of the Quality Assurance Agency (BPM) and Quality Assurance Unit (UPM) at the Faculty level with the aim of creating a quality culture in the Lancang Kuning University Academic Community, in the process of implementing the internal quality assurance system at the quality assurance agency, it has also carried out Monitoring and Evaluation (Monev) once a year to guarantee the quality culture that has been implemented, but in the implementation of Monitoring and Evaluation the Quality Assurance Agency always experiences obstacles such as technical, technical and recording data during activities and also in document archiving because there is no media that can be utilized in managing monitoring and evaluation while the application of information technology and resources already exists. With the use of information technology in the application of computerized based applications for filing and presenting data needs, it is expected to help the academics more quickly and precisely in processing data monitoring and evaluation as well as a means of implementing accreditation by the National Accreditation Board of Higher Education (BAN-PT). It is expected that with the development of applications in the management of monitoring and evaluation by completing the System Development Lyfe Cycle (SDLC) method in the problem analysis phase, the application that is built can improve the quality of monitoring and evaluation in data processing that is well integrated and can be utilized at any time by Lancang Kuning University academic community.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Data Mining using the Clustering Method (Case: Region of the Actors of Theft Crime by Province)","authors":"Frinto Tambunan","doi":"10.30645/IJISTECH.V2I2.25","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.25","url":null,"abstract":"Theft is a behavior that causes harm to victims who are targeted and cause casualties. This study aims to classify areas of theft crimes based on provision by using data mining techniques. Data was obtained from the Indonesian statistical center (Badan Pusat Statistik) consisting of 34 provinces. The grouping technique used is K-Means. Clusters are divided into 3 namely: C1: areas with high crime rates of theft, C2: areas with crime rates of ordinary theft and C3: areas with low theft crime rates. Data processing is done using the help of RapidMiner software. The results of the k-means analysis obtained 17 provinces in Indonesia have the highest theft crime rate (C1), namely: Aceh, North Sumatra, West Sumatra, Riau, Jambi, South Sumatra, Lampung, DKI Jakarta, West Java, Central Java, East Java, Banten, West Nusa Tenggara, East Nusa Tenggara, South Kalimantan, South Sulawesi and Papua. The results of the study concluded that more than 50% of regions in Indonesia still had high rates of crime of theft.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification Analysis Using C4.5 Algorithm To Predict The Level of Graduation of Nurul Falah Pekanbaru High School Students","authors":"Fana Wiza, Bayu Febriadi","doi":"10.30645/IJISTECH.V2I2.21","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.21","url":null,"abstract":"School as one of the processes for implementing formal education is required to carry out the learning process optimally to produce quality students. Regarding the research process carried out to predict the graduation rate of SMA Nurul Falah students by using the decision tree method. The data used in this study are student data using the criteria for student names, majors, average report cards from semester one (I), two (II), three (III), four (IV), five (V), and the average value of the National Standard School Examination (USBN). The data is then managed using Rapidminer 5.3 software to make it easier to predict student graduation rates. The application of data mining is used to predict the graduation rate by using the decision tree method and C4.5 algorithm as a supporter as well as to find out information on the graduation rate of Nurul Falah High School students. This study aims to predict student graduation rates in order to get useful information and the school can make policies in the coming year.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of The TU Service Project Monitoring System in PT. GMF Aeroasia Tbk","authors":"E. Ramadhani, H. Irawan","doi":"10.30645/IJISTECH.V2I2.19","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.19","url":null,"abstract":"To unit is one of the units in the GMF in the Information & Communication Technology division, one unit is the TOB has a Self Development Application (SDA) task. At present many requests for procurement of goods are submitted to the TU service. This is certainly very influential on TU services that become less optimal and irregular. So a system design was made to monitor the TU Service project. The research method is carried out by analyzing business requirements and business cases. After analyzing the two documents, then make a blueprint containing the system description starting from the explanation of each module or feature and appearance of the system. Then make the interactive prototype as a system simulation. After going through a number of these steps, a monitoring system for the Dinas TU project was developed which could be utilized by the TU Service in project management.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Min Max Algorithm as Intelligent Agent on Card Battle Game","authors":"S. Permana","doi":"10.30645/IJISTECH.V2I2.20","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.20","url":null,"abstract":"Information technology brings transformation from the physical world into the digital world. This transformation developed in various fields, especially games. In the past, games that are involving physical objects such as chess, cards, dominoes, and mahjong are popular for the publics. Card battle game is a game that pits strength between 2 cards. The game must have 2 players who will compete. However, if a player wants to practice before the match or wants to play alone, he needs Non Player Character (NPC). The NPC will be the opponent in card battle games. In order for NPCs to be able to fight players, a special algorithm is needed to make the NPCs compete with players. The algorithm that can be implemented into the NPC is the Min Max Algorithm. This algorithm is a responsive algorithm which can count every step of the player. The results of this study are expected to provide suitable opponents for players who want to practice or compete in Card Battle Game on their own.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Combination of Activation Functions in Neural Network Algorithms (Case: Retail State Sukuk by Group)","authors":"Muhammad Noor Hasan Siregar","doi":"10.30645/IJISTECH.V2I2.23","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.23","url":null,"abstract":"This study aims to maximize the activation function used in backpropogation networks in finding the best architectural model. The case study used is the sale of state retail sukuk based on professional groups. The combination of activation functions used for training and testing is tansig-tansig, tansig-purelin and tansig logsig. The architectural model used is the architectural model 6-2-1 and 6-5-1. The evaluation parameters used are epoch, MSE training, MSE testing and accuracy level of truth. Data processing is assisted by using Matlab software. The results showed that the tansig-logsig activation function had more stable results than tansig-tansig and tansig-purelin.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Commerce Design for Palembang Home Tailors","authors":"Irma Salamah, Ciksadan Ciksadan, Riska Melyani","doi":"10.30645/IJISTECH.V2I2.22","DOIUrl":"https://doi.org/10.30645/IJISTECH.V2I2.22","url":null,"abstract":"Home tailors are SMEs that are business opportunities that are usually chosen by housewives because, being a home tailor can be a solution for housewives to keep earning even though they are at home. The problems faced are in marketing and promoting home tailoring services because usually the target customers are only the surrounding environment, therefore innovation in promotion strategies is needed, the use of modern technology such as E-Commerce can be a strategy in business, so that it can be known to the wider community. Responsive Web-based E-Commerce design for ordering and purchasing information systems in increasing the income of home-tailor SMEs, to design this information system The programming language that will be used is PHP, and MySql as a database.","PeriodicalId":417247,"journal":{"name":"IJISTECH (International Journal of Information System & Technology)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}