Nuruzzaman, Muhammad Taufiq
Unknown Affiliation

Published : 15 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : IJID (International Journal on Informatics for Development)

Data Search Process Optimization using Brute Force and Genetic Algorithm Hybrid Method Riwanto, Yudha; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3743

Abstract

High accuracy and speed in data search, which are aims at finding the best solution to a problem, are essential. This study examines the brute force method, genetic algorithm, and two proposed algorithms which are the development of the brute force algorithm and genetic algorithm, namely Multiple Crossover Genetic, and Genetics with increments values. Brute force is a method with a direct approach to solving a problem based on the formulation of the problem and the definition of the concepts involved. A genetic algorithm is a search algorithm that uses genetic evolution that occurs in living things as its basis. This research selected the case of determining the pin series by looking for a match between the target and the search result. To test the suitability of the method, 100-time tests were conducted for each algorithm. The results of this study indicated that brute force has the highest average generation rate of 737146.3469 and an average time of 1960.4296, and the latter algorithm gets the best score with an average generation rate of 36.78 and an average time of 0.0642.
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Evaluation of IT Governance at Islamic Boarding Schools in the Special Region of Yogyakarta based on the COBIT 5 Framework Mardlian, M. Sa’id Abdurrohman Kunta; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3988

Abstract

Nowdays,  almost all aspects of company operations are supported by information technology systems.  Many pesantren have utilized information technology in supporting operational activities such as: using computers, accessing the internet, having a website, and managing information technology systems. The purpose of this study is to implement the COBIT 5 framework in the DSS (Deliver, Service, Support) domain in evaluating information technology governance and calculate the capability level value and gap analysis at Islamic Boarding Schools. The results of the Capability Level Analysis in the COBIT 5 DSS Domain obtained from 42 Islamic Boarding Schools showed that DSS01, DSS02, and DSS03 on average were at level 2, DSS04, DSS05, DSS06 on average at level 1. The results of the Gap Analysis in the COBIT 5 DSS Domain show that in DSS01, DSS02, and DSS03 the average GAP is 3, in DSS04, DSS05, and DSS06 the average GAP is 4. The result shows that Information Technology Governance in Islamic Boarding Schools in the Special Region of Yogyakarta based on an assessment with the COBIT 5 Framework is still low status and needs to be improved, as evidenced by the low Capability Level Value and the high GAP Value.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.
Comparison of K-Nearest Neighbor, Support Vector Machine, Random Forest, and C 4.5 Algorithms on Indoor Positioning System Astari, M Rizky; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3991

Abstract

Today’s most common Positioning System applied is the Global Positioning System (GPS). Positioning System is considered accurate when outdoors, but it becomes a problem when indoors making it difficult to read the GPS signal. Many academics are actively working on indoor positioning solutions to address GPS's drawbacks. Because WiFi Access Point signals are frequently employed in multiple studies, they are used as research material. This study compares the classification algorithms KNN, SVM, Random Forest, and C 4.5 to see which algorithm provides more accurate calculations. The fingerprinting method was employed in the process of collecting signal strength data in each room of the Terpadu Laboratory Building at UIN Sunan Kalijaga using 30 rooms and a total dataset of 5,977 data. The data is utilized to run experiments to determine the location using various methods. According to the experimental data, the Random Forest algorithm achieves an accuracy rate of 83%, C4.5 81%, and KNN 80%, while the SVM method achieves the lowest accuracy rate of 57%.
An Efficient Journal Articles Searching using Vector Space Model Algorithm Alvriyanto, Azis; Nuruzzaman, Muhammad Taufiq; Siregar, Maria Ulfah; Hidayat, Rahmat
IJID (International Journal on Informatics for Development) Vol. 9 No. 1 (2020): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.09104

Abstract

One of the main feature of digital library is a search engine which depends on keywords submitted by a user. However, in the traditional algorithm, the computation performance, searching speed, significantly relies on the number of journal articles stored in the databases. Some irrelevant search results also increase the speed of article searching process. To solve the problem, in this paper we propose vector space model (VSM) algorithm to search for relevant journal articles. The VSM algorithm considers a term frequency - inversed document frequency (TF-IDF). The VSM algorithm will be compared to the baseline algorithm namely traditional algorithm. Both algorithms will be evaluated using combination of keywords which can be a synonym, phrase, error typography, or suffix and prefix. By using the data consist of 635 journal articles, both algorithms are compared in terms of 11 evaluation criteria. The results show that VSM algorithm is able to obtain the intended journal at 5th rank on average as compared to the traditional algorithm which can obtain the intended journal at rank of 171st on average. Therefore, our proposed algorithm can improve the performance to accurately sort the journal articles based on the submitted keywords as compared to traditional algorithm.   
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.
Comparison of K-Nearest Neighbor, Support Vector Machine, Random Forest, and C 4.5 Algorithms on Indoor Positioning System Astari, M Rizky; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3991

Abstract

Today’s most common Positioning System applied is the Global Positioning System (GPS). Positioning System is considered accurate when outdoors, but it becomes a problem when indoors making it difficult to read the GPS signal. Many academics are actively working on indoor positioning solutions to address GPS's drawbacks. Because WiFi Access Point signals are frequently employed in multiple studies, they are used as research material. This study compares the classification algorithms KNN, SVM, Random Forest, and C 4.5 to see which algorithm provides more accurate calculations. The fingerprinting method was employed in the process of collecting signal strength data in each room of the Terpadu Laboratory Building at UIN Sunan Kalijaga using 30 rooms and a total dataset of 5,977 data. The data is utilized to run experiments to determine the location using various methods. According to the experimental data, the Random Forest algorithm achieves an accuracy rate of 83%, C4.5 81%, and KNN 80%, while the SVM method achieves the lowest accuracy rate of 57%.