Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analisis dan Visualisasi Data Penjualan Menggunakan Tableau untuk Mendukung Keputusan Strategis (Studi Kasus: PT Aspirasi Hidup Indonesia Tbk) Indah Rizki, Elvina; Anastasya Safitri, Adinda; Servanda, Yustian; Sudinugraha, Tri
Jurnal Sistem Informasi Galuh Vol 3 No 2 (2025): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v3i2.4996

Abstract

This research aims to analyze and visualize sales data using Tableau as a Business Intelligence tool to support strategic decision-making at PT Aspirasi Hidup Indonesia Tbk. The background of this study lies in the increasing need for effective data visualization to interpret complex sales information. A descriptive quantitative method was employed using secondary data from the company’s 2023 annual report and simulated sales transaction data. The data were visualized in Tableau through three main dashboards: monthly sales and profit trends, product category performance, and customer segment analysis. Results show that the Lifestyle product category and Corporate customer segment contributed the highest sales and profits. February and September were identified as the most profitable months. The use of Tableau enabled efficient data interpretation and quick decision-making insights. This study highlights the significance of visual-based analytics in improving corporate strategy, and suggests further research using larger datasets and predictive models for broader analysis.
Analysis of Hybrid Learning Model Interest Selection for students using the Multi-Attribute Utility Theory Method Case Study: Mulia University Alimyaningtias, Wahyu Nur; Saputra, Risdin; Prayogo, Ari; Sudinugraha, Tri
Brilliance: Research of Artificial Intelligence Vol. 3 No. 2 (2023): Brilliance: Research of Artificial Intelligence, Article Research November 2023
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v3i2.3069

Abstract

Hybrid learning is a learning method that combines or combines online learning with face-to-face learning (PTM). so that in its implementation, there are times when students and teaching staff meet face to face in class. However, in its implementation there are several obstacles, one of which is the number of students attending class and decreasing interest in learning, resulting in a poor final semester assessment. In connection with the problems faced, this research will try to measure interest in the hybrid learning model that has been implemented at Mulia University using the Multi-Attribute Utility Theory method, where this method is a decision-making method used to evaluate alternatives by considering several attributes. relevant and selecting the alternative that best meets the needs and preferences of the decision maker.
Pelatihan Pemrograman Flutter untuk Pengembangan Aplikasi Android bagi Guru TIK Kota Samarinda Prayogo, M. Ari; Insan Prayitno, Pramudya Prima; Sudinugraha, Tri; Romisa, Fahmi; Akhyar, Ramaulvi Muhammad; Always, Arya; Lestari, Feni Puji
Jurnal Pengabdian kepada Masyarakat Nusantara Vol. 6 No. 1.1 (2024): Jurnal Pengabdian kepada Masyarakat Nusantara (JPkMN) SPECIAL ISSUE
Publisher : Lembaga Dongan Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jpkmn.v6i1.1.5088

Abstract

Kegiatan pengabdian kepada masyarakat ini bertujuan untuk meningkatkan kompetensi guru Teknologi Informasi dan Komunikasi (TIK) di Kota Samarinda dalam penguasaan teknologi pengembangan aplikasi berbasis Flutter menggunakan bahasa pemrograman Dart. Pelatihan ini dirancang untuk memberikan pemahaman dasar hingga keterampilan praktis dalam mengembangkan aplikasi Android dan iOS yang sederhana dan interaktif. Metode pelatihan meliputi tahap persiapan, pelaksanaan, dan evaluasi. Pelaksanaan pelatihan dilakukan selama satu hari tepatnya hari sabtu tanggal 30 November 2024 dan dimulai dengan pengenalan framework Flutter, dasar bahasa pemrograman Dart, hingga pengembangan aplikasi sederhana dengan elemen visual dan logika dasar menggunakan widget Flutter. Hasil kegiatan menunjukkan peningkatan pemahaman peserta terhadap pemrograman Flutter, dengan 85% peserta berhasil mengembangkan aplikasi sederhana seperti kalkulator atau daftar tugas (to-do list). Peserta juga memberikan tanggapan positif terhadap materi yang mudah dipahami dan relevan dengan kebutuhan pembelajaran modern. Pelatihan ini mampu memberikan dampak positif pada inovasi pembelajaran berbasis teknologi, serta meningkatkan kualitas pendidikan di Kota Samarinda.
Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method Wijayanto, Agus; Riadi, Imam; Prayudi, Yudi; Sudinugraha, Tri
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 2 (2022): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i2.2953

Abstract

This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.