cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Query: Journal of Information Systems
ISSN : -     EISSN : -     DOI : -
Articles 43 Documents
Aplikasi Media Pembelajaran Olahraga Bola Basket Menggunakan Adobe Flash Khairunnisa, Khairunnisa
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (440.532 KB)

Abstract

The development of information technology is currently very rapid. So that it influences the world of education, especially in the learning media. Every student has different abilities and ways of thinking to develop themselves in understanding a material. One of them, when studying Basketball Sports Materials. This application is made to help educators to be more efficient in teaching so that students are able to learn and understand the material techniques available in basketball sports through learning media applications with Adobe Flash. So that students can learn wherever and whenever. With the existence of this Basketball Sports Learning Application, it is expected to be able to provide material that is easier in understanding, interactive in teaching, interesting in giving material to students, and can facilitate the teaching and learning process in Basketball Sports practice to users.Keywords: Application, Learning Media, Basketball, Adobe Flash
Aplikasi Penentuan Penerbit Buku Sekolah Terbaik Dengan Menggunakan Metode Topsis Berbasis Web Sari, Yenny Ratna; Fransiska, Gusvina; Batubara, M. Diarmansyah
Query: Journal of Information Systems VOLUME: 03, NUMBER: 01, APRIL 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (575.318 KB)

Abstract

The book is the result of analysis of knowledge made in writing. Books are important for students who are studying in school, so it is important for schools choose the right books so that students can be given the right knowledge. In this era of modern times as many books are spread with all kinds and kinds of topics and of course with different publishers as well, therefore choosing a quality book is a key to bringing students to become qualified students. Because of the large number of book publishers available, schools find it difficult to determine a quality standard book. So in this problem the Topsis method was created to determine the best school book publishers. This Topsis method can help the school to make the right and accurate results, so that it can reduce the problems that exist in the school. Using web based application, it is certainly easier to access, to choose the best school books publishers.Keywords:  Web, Best Book Publishers, Topsis, Decision Support Systems.
Analisis Sistem Informasi Pengolahan Data Nilai Mahasiswa Menggunakan PIECES pada Prodi Sistem Informasi STTH-Medan Nurjamiyah, Nurjamiyah; Dewi, Arie Rafika
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (409.757 KB)

Abstract

In some parts of the education system, there are teaching and learning activities involving students and lecturers. And when doing some teaching and learning activities, some progress of student learning occurred which are grades obtained from the student’s examination. Presently, the student’s grades are processed conventionally which is done by each lecturer manually using pen, paper and a calculator. Thus, the Department will have difficulties managing the student’s grades given by the lecturer and the results will not be optimal either.  If done manually, the lecturer must calculate the grade for each student one at a time. Moreover, students will have to wait for a long time finding out for their grades. It will take a long time and requires high precision for accurate calculations if the student’s grades processed manually. A PIECES Analysis, which is analyzing performance, information, economics, applications, and services, is used in analyzing student information system of the Information System Department STTH-Medan. The purpose of this study is to find out the data processing system and the data needed for developing STTH-Medan Information System. By using PIECES Analysis, it will be done in detail, and can be used for information systems.Keywords: Analysis, Information Systems, Grades, PIECES, UML 
Sistem Pendukung Keputusan Fuzzy Mamdani pada Alat Penyiraman Tanaman Otomatis Asih, Munjiat Setiani
Query: Journal of Information Systems VOLUME: 02, NUMBER: 01, APRIL 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1504.201 KB)

Abstract

In the gardening activities that cannot be separated from the activities of watering plants. Almost everyone is still doing the activity of watering the plants manually, by watering the plants one by one is time-consuming enough and wasting energy. Watering plants is an activity that is always done every day by almost everyone that has plants at home, office and elsewhere. The activity of watering the plants manually can not know how much water is needed by the plant so that many plants die of excess water. With the development of technology provides ease of  watering plants. Technological advances include automatic plant watering, automatic plant watering equipment utilizing micro controller as a circuit brain that processes the entire series to be used for watering plants. Knowledge of fuzzy mamdani can be used as a reference when the plants watered or not to take the value of soil moisture and air temperature, so the need for water plants can be met.Keywords: automatic, air temperature, soil moisture, fuzzy mamdani
Penerapan Cloud Computing Pada Sistem Reservasi Homestay Dieng Berbasis Web Umar, Alan Fajar Sudrajat, Rusydi
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (358.185 KB)

Abstract

Homestay is one of the places needed as lodging facilities in the tourist area. In recent years, lodging business is greatly increasing. Business lodging in Dieng is one of the promising venture business due to the increasing number of the tourists who interested to visit the tourist  places in Dieng and they need the hotel services. However, there are some managers who are unable to promote their lodging through the internet. Therefore, this research will make a software as a service in a cloud computing, regarding the Homestay Reservation System service in order to make the managers able to promote their homestay to public through the internet and it will make customers able to make a reservation through the software. This software was made by following waterfall paradigm in software engineering, start from analysis, design, implementation and testing. Testing result showed that the application deserved to be used.Keywords: information, cloud computing, homestay, reservation
Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara Nasution, Niti Ravika
Query: Journal of Information Systems Volume: 01, Number: 01, April 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (439.211 KB)

Abstract

In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theorem (RSA-CRT) and steganography technique Random Least Significant Bits (LSB). RSA-CRT is basically the same as usual, but utilizing RSA CRT theorem to shorten the bit size decryption exponent d by hiding d on congruent systems that accelerate time decryption, the difference in the key generation process and the decryption process. Cryptographic algorithm RSA-CRT produce ciphertext stored into a picture (image) using Steganography technique Random Least Significant Bits (LSB). The workings of Random LSB is storing the message (ciphertext) in the first bit or the second bit random key for use random number generator Pseudo Random Number Generator (PRNG) with Linear Congruential Generator (LCG) method. Ciphertext stored in a picture  (image) has extracted key re-use random number generator at the time of inserting the message. Then the ciphertext is decrypted back by the algorithm RSA-CRT to produce the original text (plaintext). Merging Cryptographic Algorithm RSA-CRT with Steganography Technique Simple  LSB than with Random LSB generate higher PSNR and MSE is lower, which means better level of data security and more resistant to attack. Has more difficult to find a secret message by cryptanalysis and steganalyst.
Aplikasi Pembelajaran Unified Modeling Language Berbasis Computer Assisted Instruction Hasdiana, Hasdiana; Fahmi, Hasanul
Query: Journal of Information Systems VOLUME: 02, NUMBER: 02, OCTOBER 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (675.515 KB)

Abstract

Unified Modeling Language (UML) is one of the important materials in the analysis and design of information systems. UML is used in designing or modeling the system. UML has some form of diagram that is grouped in several aspects based on a different view. Forms of the diagram are illustrated by different functions and notations. This makes UML difficult to understand considering that time in the classroom is very limited. Therefore, it is necessary to design a learning aid based Computer Assisted Instruction (CAI). Interactive application interface helps students understand the learning materials. Students can learn independently wherever and whenever they need. The results of this study can be utilized for the development of teaching materials, especially about modeling the system with UML. Keywords: Learning, Computer Assisted Instruction, Unified Modeling Language 
Segmentasi Perilaku Pembelian Pelanggan Berdasarkan Model RFM dengan Metode K-Means Monalisa, Siti
Query: Journal of Information Systems VOLUME: 02, NUMBER: 01, APRIL 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (886.746 KB)

Abstract

This study aims to measure customer purchase behavior by using RFM model with K-Means, silhouette Index method. Using historical data by Cendana Perdana Perkasa Distributor to data this study. The company has never to measured customer buy behavior by this model. The results of this study showed that there 3 cluster with 0,589 silhouette Index. Based on the highest silhouette Index then the cluster is divided into 3 segment with some segments 1 is 57 customers, segment 2 is 257 customers and segment 3 is 8 customers. The best purchase value is segment 3 with symbolized byR↓F↑M↑ that means this segment has high frequency and monetary as well as low regency. The segment has potential customers for the future. The worst purchase value is segment 1 withv symbolised byR↑F↓M↓ that means this segment has low-frequency and monetary as well as high regency. The segment has an unclear or uncertain customer will be a potential customer. Keywords: Customer Purchase Behavior, K-Means, RFM and Silhoutte Index
Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan Fahana, Rusydi Umar, Faizin Ridho, Jefree
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (270.909 KB)

Abstract

Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS). The use of snort is useful for recording Distributed Danial of Services (DDoS) attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App) notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack. Keywords: Telegram, Intrusion Detection System (IDS), Snort, Network Forensics, DDoS. 
Perangkat Lunak Perhitungan Perubahan Jabatan Dengan Menggunakan Fuzzy Analytical Hierarchy Process (studi kasus : UIN Sunan Ampel Surabaya) ., Ilham
Query: Journal of Information Systems Volume: 01, Number: 01, April 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (352.905 KB)

Abstract

This study discusses the promotion in an institution by considering many factors, and the submission must be conducted objectively, not subjectively. To be able to give an objective assessment results in every employee by considering all the assessment criteria, one of the methods that can be used is the method of Fuzzy Analytical Hierarchy Process (AHP). From the results of research using Fuzzy Analytical Hierarchy Process method showed that the greatest weight virmansyah discount the value that is equal to 80.78 so a great opportunity to get a change or a promotion. Decision to change positions, it gives the rank order value candidates as a recommendation for promotion to employees. So with the Decision Support System with Analytical Hierarchy Process  method can help and facilitate career planning manager (sale or transfer) to save time, costs, and more objective.