IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Articles 5 Documents
Search results for , issue " Vol 2, No 1 (2018): November" : 5 Documents clear
Evacuation Planning for Disaster Management by Using The Relaxation Based Algorithm and Route Choice Model

Hartama, Dedy, Windarto, Agus Perdana, Wanto, Anjar

IJISTECH (International Journal Of Information System & Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar | | DOI: 10.30645/ijistech.v2i1.14

Abstract

Research in the field of disaster management is done by utilizing information and communication technology. Where disaster management is discussed is about evacuation planning issues. The evacuation stage is a very crucial stage in the disaster evacuation process. There have been many methods and algorithms submitted for the evacuation planning process, but no one has directly addressed evacuation planning on dynamic issues concerning time-varying and volume-dependent. This research will use the Relaxation-Based Algorithm combined with the Route Choice Model to produce evacuation models that can be applied to dynamic issues related to time-varying and volume-dependent because some types of disaster will result in damage as time and evacuation paths are volume-dependent so as to adjust to the change in the number of people evacuated. Disaster data that will be used in this research is sourced from Disaster Information Management System sourced from DesInventar. The results of this study are expected to produce an evacuation planning model that can be applied to dynamic problems that take into account the time-varying and volume-dependent aspects.

The Online Marketing Strategic Planning for Jember Coffee SMEs

Juwita, Oktalia, Arifin, Fajrin Nurman, Dewi, Fitriyana

IJISTECH (International Journal Of Information System & Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar | | DOI: 10.30645/ijistech.v2i1.15

Abstract

Coffee is a kind of beverage that is widespread and much-loved in the world. Today coffee has become a lifestyle. Various kinds of coffee are offering in many shops. This is a great opportunity for entrepreneurs, especially SMEs providers of coffee products, in introducing and marketing variants of coffee products that are owned at the national and international level. One of the problems often arises in the marketing of SMEs products is the lack of information and marketing access to potential markets. An effective and appropriate marketing strategy is needed, especially for SMEs producing coffee products. The research method is done by observation and interview to get primary and secondary data. After the data obtained, analyzed the current condition using SWOT analysis and then followed by strategy mapping using SOSTAC method. From the analysis that has been done, needed a website for the directory to introduce SMEs engaged in the production and sale of coffee in Besuki Raya area.

Effectiveness of Population Data Application Implementation in Kresek Village, Wungu Sub-District, Madiun Regency

Putera, Andi Rahman, Resty, Eka, S, Benny Agus, Prihantono, Ilham

IJISTECH (International Journal Of Information System & Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar | | DOI: 10.30645/ijistech.v2i1.16

Abstract

Population data processing conducted in Kresek Village, Wungu Sub-District, Madiun District is still manual. Data processing that has been used so far is the Excel application. This, causing data processing requires not a little time and quite a long time. With a system that has long data storage is not safe, especially in the long term. To overcome the problems related to population data, it is designed an application to process the data more easily and safely. The purpose of this study was to determine the effectiveness of the previously designed application of population data in Kresek Village. The study was conducted in Kresek Village, Wungu Sub-District, Madiun Regency. Respondents of this study were 2 Kresek Village officers as users. The analytical method used is descriptive analysis using data from interviews with respondents. Evaluation analysis is carried out to explain the new system that has been implemented. Based on the results of the study, it can be concluded that the application that has been designed is in accordance with the wishes of the Kresek village office. This application is able to ease the workload of village officials so that population data processing is more effective and efficient.

Implementation of Backpropagation Artificial Neural Networks to Predict Palm Oil Price Fresh Fruit Bunches

Ismanto, Edi, Effendi, Noverta, Cynthia, Eka Pandu

IJISTECH (International Journal Of Information System & Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar | | DOI: 10.30645/ijistech.v2i1.17

Abstract

Riau Province is one of the regions known for its plantation products, especially in the oil palm sector, so that Riau Province and regional districts focus on oil palm plants as the main commodity of plantations in Riau. Based on data from the Central Bureau of Statistics (BPS) of Riau Province, the annual production of oil palm plantations, especially smallholder plantations in Riau province has always increased. So is the demand for world CPO. But sometimes the selling price of oil palm fresh fruit bunches (FFB) for smallholder plantations always changes due to many influential factors. With the Artificial Neural Network approach, the Backpropagation algorithm we conduct training and testing of the time series variables that affect the data, namely data on the area of oil palm plantations in Riau Province; Total palm oil production in Riau Province; Palm Oil Productivity in Riau Province; Palm Oil Exports in Riau Province and Average World CPO Prices. Then price predictions will be made in the future. Based on the results of the training and testing, the best Artificial Neural Network (ANN) architecture model was obtained with 9 input layers, 5 hidden layers and 1 output layer. The output of RMSE 0000699 error value and accuracy percentage is 99.97% so that it can make price predictions according to the given target value.

The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit

Khairina, Nurul, Harahap, Muhammad Khoiruddin, Lubis, Juanda Hakim

IJISTECH (International Journal Of Information System & Technology) Vol 2, No 1 (2018): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar | | DOI: 10.30645/ijistech.v2i1.13

Abstract

A creation can be considered as belonging to someone if they have a valid proof. An original creation that have been changed for certain purposes will definitely eliminate proof of ownership of the creation. A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties. In this study, the Hash MD5 method will be combined with the Least Significant Bit method to test the authenticity of an image. The purpose of testing the authenticity is to find out the truth of ownership of a creation, in this case, we are testing the image. The results of this test are the status of an image that will be declared valid or invalid. Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test. If the tested image has the same Hash value, then the image will be declared valid, but instead ai image is declared invalid if the image has been modified or ownership status has been changed. From the result of testing the authenticity with several images, it can prove that the combination of the Hash MD5 method with LSB has a good level of security and suitable to authenticity testing.

Page 1 of 1 | Total Record : 5