Claim Missing Document
Check
Articles

Found 13 Documents
Search
Journal : IJID (International Journal on Informatics for Development)

Decision Support System for Major Determination in Madrasah Aliyah Qonitat, Ihda Imroatun; Muhsina, Elvanisa Ayu; Uyun, Shofwatul
IJID (International Journal on Informatics for Development) Vol 2, No 2 (2013): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.151 KB) | DOI: 10.14421/ijid.2013.02205

Abstract

During this time, process of major determination in MAN Gondangrejo is based on value, interests, and the results of psychological tests. Interest derived from questionnaires, which gathered information about student interest on a particular subject. While the results of psychological tests are only taken from the results of the largest majors, so the decision is less than the maximum. It is because the results ignore other majors. There is no consideration of class quota of each major. Therefore, to obtain the right decision, this senior high school needs a decision support system that can help the team as the decision maker to determine of students majoring in accordance with the values, interests, intelligence / IQ, personality and skills of students. Moreover, it considers also the class quota of each major. One of application logic fuzzy is support system with Fuzzy Inference System (FIS) Mamdani. There are four stages to get output in FIS Mamdani: formation of a collection of fuzzy, formation of rules, application of function of implications and rules of inferences, and defuzzyfication. The method for developing system that used in this research is waterfall method. There are 5 steps to developing system. They are required analysis of system, interface design of system, implementation of system, testing of system and maintenance of system. This system is capable to display the rank of recommendation to all students for x class based on FIS Mamdani. The ranks are sorted from the highest to the lowest recommendation and quota of majors. This system is useful to give the right determination for majoring in senior high schools. Based on the result of system testing, 100% major decision makers in MAN Gondangrejo totally agree about this decision support system. 
Recommendation System for Giving Scholarships to New Students Using TOPSIS Method Nuri Guntur Perdana; Muhammad Akid Musyafa; Elvanisa Ayu Muhsina; Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 4 No. 2 (2015): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.108 KB) | DOI: 10.14421/ijid.2015.04204

Abstract

Yayasan Pondok Pesantren Wahid Hasyim (YPPWH) is one of the bases of modern Islamic education in Daerah Istimewa Yogyakarta (Special Region of Yogyakarta). As one of devotion to education and society, formal education institutions, namely Madrasah Ibtidaiyah (Religion Elementary School), Madrasah Tsanawiyah (Religion Junior High School) and Madrasah Aliyah (Religion Senior High School) Wahid Hasyim currently have scholarship opportunities for students who excel and underprivileged, especially those from the local population. With the increasing number of scholarship applicants, making a challenge for the manager of the agency to be able to give a correct decision, effective and efficient in data management Fellow truly eligible to receive a scholarship. This study uses a Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in these systems vary according to the scholarships provided by the Foundation. Based on the results of case selection calculations show that the results using the same system with manual calculations. The system is able to provide scholarships recommendation. This system has been passed fit for use for 100% testing of system functionality using the alpha test, the test results and accessing interface produces 65.15% of the respondents strongly agreed with the system interface, as well as the results of the test content for the page admin, counseling teachers and students each yield 88.89%, 83.33% and 100% of respondents stated strongly agree with making this system.
Comparison of Edge Detection Method in Case of Blood Pattern Recognition Using Backpropagation Algorithm Agung Nur Hidayat; Ahmad Subhan Yazid; Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 3 No. 1 (2014): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (783.789 KB) | DOI: 10.14421/ijid.2014.%x

Abstract

There are 4 types of blood: A, B, O, and AB. So far, the process of checking blood type depends on the officer’s work accuracy. To keep the validity of the results, a system is needed to help humans to recognize the blood types. This recognition can be done by computers by applying the method of blood pattern recognition through an image. The data domain of this study is a scan of blood type checks obtained from PMI Yogyakarta City. A total of 54 images were used in the training and recognition process. The image used in .bmp extension with a size of 400 x 200 pixels. Before the recognition process, first execute the preprocessing image, that is convert the image to grayscale image. The next process is edge detection with a Sobel operator or Prewitt operator. The use of these two operators aim to determine the optimal operator for recognition of blood type case. After the edge detection process, the image is converted to binary so it can be processed by feature extraction. The last step is the implementation of artificial neural network backpropagation algorithm with bipolar sigmoid activation function for hidden layer and linear activation for output. As a result, the optimal neural network architecture is three hidden layers with each hidden layer having three nodes. The optimal value for the mean squared error parameter is 1e-1 or 0.1, epoch 1000 and learning rate 0.01. In this study, Sobel operator was better than Prewitt operator in introducing blood type types. When viewed from the difference in processing time, the Prewitt operator is slightly faster than the Sobel operator with a difference of 0.000052 seconds. From 39 training data and 14 test data, the percentage of success in the recognition of blood type was 92.86%.
Patient Data Clustering using Fuzzy C-Means (FCM) and Agglomerative Hierarchical Clustering (AHC) Rosalia Susilowati; Ahmad Subhan Yazid; Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 3 No. 1 (2014): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (981.781 KB) | DOI: 10.14421/ijid.2014.%x

Abstract

Generally, the current system development only include the input, view, and reports. At Jogja Hospital, a system with a patient database can only provide information about the percentage of male and female patients. Its unable to extract more specific information, even though medical record data has a lot of information. The complete information should be used as a reference for the authorities to make a decision. This information can be obtained by analyzing and processing the medical record data. One way to extract information from this data is clustering. The domain of this study is patient data. Before the data is clustered, preprocessing is needed through name standardization, numeration, and data normalization. During the clustering process, the algorithms used are Fuzzy C-Means (FCM) and Agglomerative Hierarchical Clustering (AHC). Two algorithms are implemented to determine which algorithm is the most appropriate and fast to handle the processing of patient data. The results of the study show that the processing time required to do clustering with FCM algorithm is relatively faster than AHC algorithm. For data with small volumes, the iteration of FCM algorithm is more than AHC algorithm, however, the results of the clustering using FCM algorithm are easier to interpret than AHC algorithm. From the visualization of clustering results, found that the cluster pattern with FCM algorithm is better based on the three variables used as references. So the most suitable algorithm to use is Fuzzy C-Means (FCM) for processing patient data.
Japanese Letter Pattern Recognition Application with Tesseract Engine Akhmad Imam Fahrizal; Ahmad Subhan Yazid; Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 4 No. 2 (2015): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (733.244 KB) | DOI: 10.14421/ijid.2015.04202

Abstract

Digital image processing is a field that is being cultivated by many researchers at this time because it is interesting to apply to various activities, both analysis and production activities. One branch of the digital image is pattern recognition. This study uses Tesseract as a tool to recognize patterns from Hiragana letters. This study was conducted to find out how much Tesseract was able to recognize a Japanese text and handwritten text. This study uses 1 image as training data containing 74 Hiragana letters which are processed through training for each letter. This study has several testing criteria based on font size and resolution to find the best results in pattern recognition. This pattern recognition system is able to do data training and recognize 74 Hiragana letters using the Tesseract Engine. The system can also recognize images with the best success percentage of 98.24% with an image resolution of 200dpi (dots per inch) at size 18. This system can also recognize handwritten images with the best percentage of success of 90% with 200dpi image resolution.
AN APPLICATION OF MAMDANI IN SELECTING MAJORS IN HIGHER EDUCATION Heni Hapsari; Muhammad Dzulfikar Fauzi; Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 2 No. 1 (2013): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1014.026 KB) | DOI: 10.14421/ijid.2013.%x

Abstract

The election for a right major at university will make a big difference because students should choose a major that suits their basic skills and talent preference. A research case uses a sample from various majors in state university in Indonesia. There are 29 majors available. Therefore, interest score, talent score, and basic ability score become a consideration matter in choosing the right major for them. The implementation of this system uses PHP programming language and MySQL database which based on the web. This research uses sample data of SMAN (state high school) 1 on Kutowinangun, Kebumen. It is including self-data, interest score, talent score, and basic skill score. This research uses a fuzzy inference system using Mamdani method. Mamdani method works based on linguistic principle and has a fuzzy algorithm which supply approximation to be entered by mathematic analysis. Data are processed through the calculation phase of fuzzy and result given by the system is a recommendation of a major suggested to be taken by the student. This system shows a recommendation of a major that suits the student. This system also gives information about universities which provide recommended major. This system is hope to help students in choosing their major.
Data Search Process Optimization using Brute Force and Genetic Algorithm Hybrid Method Riwanto, Yudha; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3743

Abstract

High accuracy and speed in data search, which are aims at finding the best solution to a problem, are essential. This study examines the brute force method, genetic algorithm, and two proposed algorithms which are the development of the brute force algorithm and genetic algorithm, namely Multiple Crossover Genetic, and Genetics with increments values. Brute force is a method with a direct approach to solving a problem based on the formulation of the problem and the definition of the concepts involved. A genetic algorithm is a search algorithm that uses genetic evolution that occurs in living things as its basis. This research selected the case of determining the pin series by looking for a match between the target and the search result. To test the suitability of the method, 100-time tests were conducted for each algorithm. The results of this study indicated that brute force has the highest average generation rate of 737146.3469 and an average time of 1960.4296, and the latter algorithm gets the best score with an average generation rate of 36.78 and an average time of 0.0642.
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Evaluation of IT Governance at Islamic Boarding Schools in the Special Region of Yogyakarta based on the COBIT 5 Framework Mardlian, M. Sa’id Abdurrohman Kunta; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3988

Abstract

Nowdays,  almost all aspects of company operations are supported by information technology systems.  Many pesantren have utilized information technology in supporting operational activities such as: using computers, accessing the internet, having a website, and managing information technology systems. The purpose of this study is to implement the COBIT 5 framework in the DSS (Deliver, Service, Support) domain in evaluating information technology governance and calculate the capability level value and gap analysis at Islamic Boarding Schools. The results of the Capability Level Analysis in the COBIT 5 DSS Domain obtained from 42 Islamic Boarding Schools showed that DSS01, DSS02, and DSS03 on average were at level 2, DSS04, DSS05, DSS06 on average at level 1. The results of the Gap Analysis in the COBIT 5 DSS Domain show that in DSS01, DSS02, and DSS03 the average GAP is 3, in DSS04, DSS05, and DSS06 the average GAP is 4. The result shows that Information Technology Governance in Islamic Boarding Schools in the Special Region of Yogyakarta based on an assessment with the COBIT 5 Framework is still low status and needs to be improved, as evidenced by the low Capability Level Value and the high GAP Value.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.