Claim Missing Document
Check
Articles

Found 24 Documents
Search

ANALYSIS OF WARGANET COMMENTS ON IT SERVICES IN MANDIRI BANK USING K-NEAREST NEIGHBOR (K-NN) ALGORITHM BASED ON ITSM CRITERIA Ramadhan, Febrian Wahyu; Sukmana, Husni Teja; Oh, Lee Kyung; Wardhani, Luh Kesuma
ADI Journal on Recent Innovation (AJRI) Vol 1 No 1 (2019): AJRI (ADI Journal on Recent Innovation)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ajri.v1i1.91

Abstract

Sentiment analysis is a method for reviewing products or services to determine opinions or feelings about a product. The results of the analysis can be used by companies as evaluation materials and considerations to improve the products or services provided. This study aims to test the level of public sentiment on the quality of Bank Mandiri services that have received ISO 20000-1 with the application of sentiment analysis using the K-NN algorithm based on ITSM criteria. The initial classification in this study uses the lexicon method by detecting words included in sentiment words, the results of which are included as labels on training data and test data. Formation of the classification with the K-NN algorithm by taking into account the results of the training data indexing and weighting of the test data, with the value of k as the decision maker limit. The trial results of 10 scenarios show that the classification using the K-NN algorithm as a sentiment classification is 98% accuracy value of 50 test data to 600 training data, with 24% getting positive sentiment, 22% negative sentiment and 55% neutral sentiment, with f -measure 95.83%. while in testing 100 the test data obtained 79% accuracy value with 21% getting positive sentiment, 42% negative sentiment and 38% neutral with an f-measure value of 68.42%.
SMART and TOPSIS Method For Determining The Priority Of Screen Printing Setiawan, Rinaldi; Arini, Arini; Wardhani, Luh Kesuma
Sinkron : Jurnal dan Penelitian Teknik Informatika Vol 4 No 2 (2020): SinkrOn Volume 4 Number 2, April 2020
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.495 KB) | DOI: 10.33395/sinkron.v4i2.10471

Abstract

The number of micro, small and medium enterprises (MSMEs) in the field of screen printing and convection that use websites in marketing is one of them CV. Ini Sablon. but in the production process there are obstacles in working on orders that come to be done first in accordance with predetermined criteria, namely deadlines, number of orders, design, profit, and availability of goods. The use of Decision Support System (DSS) aims to provide recommendations to owners of screen printing companies. This study uses the SMART method to weight the criteria and the TOPSIS method for product selection. This system is built using the PHP programming language and MySQL database. The results of the study were a screen printing production priority website with the best final value of 0.62 and the worst final value of 0.35 with the level of accuracy between manual and system calculations reaching 100%. In this study the criteria cannot be updated, it is expected that further research criteria can be updated and use a combination of methods that have not been done.
Mobile-based monitoring system for an automatic cat feeder using Raspberry Pi Nenny Anggraini; Dzul Fadli Rahman; Luh Kesuma Wardhani; Nashrul Hakiem
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14819

Abstract

In a Saheeh hadith it is explained that the cat is a clean animal that is free from najis, so keeping a cat is not something that is forbidden. One of the things that is important when keeping a cat is feeding. However, keeping a cat at home takes time and effort. In this digital era, the use of technology has penetrated all aspects of life. The objective of this research is to create a monitoring system for an automatic cat feeder using a webcam and a stepper motor that is connected to a Raspberry Pi as the main controller. The webcam can take pictures (photographs or videos) processed with the fswebcam and the avconv functions on the Raspberry Pi. The stepper motor can rotate the feed valve by utilising a General-Purpose Input Output (GPIO) pin and a program which is inserted into the Raspberry Pi. Next, the Raspberry Pi will be connected to the Internet and a server network so that the system control can be done remotely by using a web browser or web view on a mobile. The overall function of the system in the form of feeding the cat either directly or scheduled, as well as monitoring of photographs or videos around the feed. The results of a questionnaire showed that this system has a need value of 87.3% of 79 respondent cat keepers, meaning cat keepers will be greatly helped by the existence of this system.
Speech Recognition Application for the Speech Impaired using the Android-based Google Cloud Speech API Nenny Anggraini; Angga Kurniawan; Luh Kesuma Wardhani; Nashrul Hakiem
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.9638

Abstract

Those who are speech impaired (tunawicara in the Indonesian language) suffer from abnormalities in their delivery (articulation) of the language as well their voice in normal speech, resulting in difficulty in communicating verbally within their environment. Therefore, an application is required that can help and facilitate conversations for communication. In this research, the authors have developed a speech recognition application that can recognise speech of the speech impaired, and can translate into text form with input in the form of sound detected on a smartphone. By using the Google Cloud Speech Application Programming Interface (API), this allows converting audio to text, and it is also user friendly to use such APIs. The Google Cloud Speech API integrates with Google Cloud Storage for data storage. Although research into speech recognition to text has been widely practiced, this research try to develop speech recognition, specially for speech impaired's speech, as well as perform a likelihood calculation to see the factor of tone, pronunciation, and speech speed in speech recognition. The test was conducted by mentioning the digits 1 through 10. The experimental results showed that the recognition rate for the speech impaired is about 80%, while the recognition rate for normal speech is 100%.
IMPLEMENTASI FACE RECOGNITION DENGAN OPENCV PADA “SMART CCTV” UNTUK KEAMANAN BRANKAS BERBASIS IOT Nenny Anggraini; Fikriansyah Martunus; Imam Marzuki Shofi; Luh Kesuma Wardhani
Jurnal Ilmiah FIFO Vol 13, No 1 (2021)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2021.v13i1.005

Abstract

Salah satu Hak Asasi Manusia yang mendasar adalah hak atas rasa aman, hak atas rasa aman ini tidak saja dalam pengertian fisik, psikis tetapi juga hak atas keamanan harta benda. Perusakan atau pembobolan terhadap brankas merupakan salah satu pelanggaran keamanan terhadap barang. Setiap lemari besi atau brankas mempunyai tingkat proteksi yang berbeda-beda yang mesti lulus terhadap pengujian tersertifikasi sesuai dengan standar internasional. Peneliti mencoba mengembangkan penggunaan CCTV dengan membuat sebuah alat yaitu smart CCTV menggunakan Raspberry Pi 4 berbasis IoT. Dengan memanfaatkan face recognition yang merupakan salah satu metode dari library pada open source computer vision (opencv), alat ini dapat memantau orang-orang yang mendekati brankas dan kemudian mengirimkan gambar melalui aplikasi telegram pada smartphone apabila orang tersebut tidak dikenali. Berdasarkan hasil penelitian didapatkan hasil akurasi dari 40-69% terhadap pengenalan wajah dan kesesuaian fungsi sebesar 100%.
RESTAURANT RECOMMENDER SYSTEM USING ITEM BASED COLLABORATIVE FILTERING AND ADJUSTED COSINE ALGORITHM SIMILARITY Addini Yusmar; Luh Kesuma Wardhani; Hendra Bayu Suseno
JURNAL TEKNIK INFORMATIKA Vol 14, No 1 (2021): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v14i1.21102

Abstract

In 2018, the Ministry of Industry (Kemenperin) stated that the food and beverage sector contributed 6.34% of the national gross domestic product (GDP). Currently, culinary information can be easily found, both in print and online. The amount of information available sometimes makes people over-informed, making it difficult to choose a restaurant based on their preferences. To assist consumers in selecting a restaurant, we need a system that can provide several recommendations. This study aims to implement the item-based Collaborative Filtering method using the Adjusted Cosine Similarity algorithm on a restaurant recommendation system. The test was carried out with 40 samples from UIN Syarif Hidayatullah Jakarta using purposive sampling because the sample was selected based on specific criteria, and 40 respondents can be said to be correct because of the minimum number of respondents is 30. The accuracy test uses precision, and the determination of the error value uses MAE. The analysis of the research results used three scenarios, which are 5, 20, and 40 users. The third scenario produces the best precision and MAE values. Precision is better if the precision value is close to 1, and MAE is getting better if the MAE value is getting closer to 0. So it can be concluded that the Item-Based method with the Adjusted Cosine algorithm has the best accuracy and error values when the number of users grows.
ANALISIS KEAMANAN INFORMASI DATA CENTER MENGGUNAKAN COBIT 5 Iik Muhamad Malik Matin; Arini Arini; Luh Kesuma Wardhani
JURNAL TEKNIK INFORMATIKA Vol 10, No 2 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (599.878 KB) | DOI: 10.15408/jti.v10i2.7026

Abstract

ABSTRAK Data center pada sebuah institusi telah di amati dan dianalisa untuk mendapatkan deskripsi mengenai keamamanan informasinya. Data center pernah mengalami insiden keamanan informasi berupa Shell Injection. Akibatnya, beberapa situs web tidak dapat diakses beberapa saat. Insiden ini dapat memperngaruhi proses bisnis institusi. Untuk menghindari masalah ini di masa depan, diperlukan audit keamanan informasi. Audit ini dapat dilakukan dengan menggunakan framework COBIT 5. Dalam penelitian ini, audit keamanan indormasi dilakukan terhadap keamanan informasi data center dengan fokus pada proses APO13 (Manage Security) dan DSS05 (Manage Security Service). Penelitian ini Penelitian ini dilakukan melalui tahap Initiation, Planning the Assessment, Briefing, Data Collection, Data Validation, Process Attribute Level dan Reporting the Result. Hasil penelitian ini diketahui tingkat kemampuan APO13 dan DSS05 pada saat ini (As Is) bernilai 1,54 dan 1,68 atau pada level 2, yang berarti proses APO13 dan DSS05 telah dilakukan dan dipelihara sesuai dengan rencana kerja. Oleh karena itu tingkat berikutnya (to be) ditetapkan pada level 3. Untuk mencapai level 3, beberapa rekomendasi diberikan untuk menutupi gap yang telah ditentukan dalam proses APO13 dan DSS05. Data center harus membuat rencana kerja yang rinci, data center yang dikelola dengan baik dan memiliki standar yang jelas untuk diterapkan agar dapat mencapai tujuan bisnis   ABSTRACT A data center of an institution was observed and analyzed in order to get description about its information security.  The data center had ever experienced incidents of information security which is shell injection. As a result, some websites were not accessible for a moment. This incidents can affect business processes of the institution. In order to avoid this problem in the future, this institution needs information security audit. This audit can be done by using Framework COBIT 5. In this research,  an information security audit was conducted to Data Center Information Security by using Framework COBIT 5, focus on the process DSS05 (Manage Security Service) and APO13 (Manage Security). This research was conducted through some stages of initiation, planning the assessment, briefing, data collection, data validation, process attribute level and reporting the result. Form this research, the capability level of APO13 and DSS05 at this moment (as is) worth 1.54 and 1.68 or at level 2, which means process of APO13 and DSS05 had been done and maintained in accordance with the work plan. Therefore the next level (to be) set at level 3. In order to achieve level 3, some recommendations provided to cover the gap that has been determined in the process APO13 and DSS05. The data center have to make a detail work plan, well managed data center and have clear standard to be implemented in order to reach the business goal.How to Cite : Martin, I.M. Arini. Wardani, L. K. (2017). ANALISIS KEAMANAN INFORMASI DATA CENTER  MENGGUNAKAN COBIT 5. Jurnal Teknik Informatika, 10(2), 119-128. doi: 10.15408/jti.v10i2.7026Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.7026
Perancangan dan Implementasi Perangkat Lunak untuk Pengelompokan Daerah Produksi Minyak Bumi dengan Metode Kohonen Fitri Insani; Luh Kesuma Wardhani; Yusra Yusra
SITEKIN: Jurnal Sains, Teknologi dan Industri Vol 9, No 1 (2011): Desember 2011
Publisher : Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24014/sitekin.v9i1.604

Abstract

Penelitian ini membahas tentang perancangan dan implementasi aplikasi yang digunakan untuk melakukan pengelompokan daerah produksi minyak bumi. Analisa pembentukan kelompok (cluster) dilakukan menggunakan  Jaringan Syaraf Tiruan algoritma Self Organizing Maps (SOM)- Kohonen dan Java 3D sebagai bahasa pemrograman. Data yang digunakan untuk uji coba adalah data sekunder sumur minyak yang dipersiapkan dengan melalui proses transformasi min-max normalisasi. Data ini diolah menggunakan algoritma SOM untuk menghasilkan cluster data. Hasil cluster ini ditampilkan dalam bentuk bubblechart 3D. Dengan menggunakan output dari aplikasi ini, yang berupa cluster daerah produksi sumur minyak, pihak perusahan dapat dengan mudah menganalisa tiap cluster.
IMPLEMENTASI CONTENT-BASED FILTERING PADA APLIKASI RADAR ZAKAT DALAM MEREKOMENDASIKAN PREFERENSI MUSTAHIK Husni Teja Sukmana; Siti Atinah; Luh Kesuma Wardhani
JURNAL TEKNIK INFORMATIKA Vol 12, No 2 (2019): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1172.179 KB) | DOI: 10.15408/jti.v12i2.13172

Abstract

Zakat is one of the pillars of Islam which is always mentioned parallel to prayer. The problems that exist in zakat institutions in Indonesia are low level of trust in muzaki in zakat payments through official institutions and tend to distribute zakat directly to mustahik. Zakat can attract sufficient attention from Muslim intellectuals, especially in the fields of research related to the development of zakat management. However, the growing zakat information system does not make it easier for muzaki to choose mustahik preferences, even though choice recommendations of mustahik is needed to make it easier for muzaki to choose mustahik preferences. The researcher was interested in applying the concept of recommendation in the Zakat Radar application by using the content based filtering method to produce a mustahik recommendation system with the term frequency inverse document frquency (tf-idf) technique.. This system is built using the Java programming language and MySQL as a database. The mustahik recommendation system has been successfully implemented in the Radar Zakat application, which produces 5 mustahik recommendations based on the highest weighting of the similarity of mustahik criteria chosen by the user. Similarity of mustahik criteria is based on the query of mustahik criteria chosen by the user, 5 queries of mustahik criteria are mustahik income, residence, facilities, number of dependents, and mustahik employment status.  
Analisis Perbandingan Metode Bayesian Network dan Dempster-Shafer Pada Sistem Pakar Diagnosis Penyakit Mata Luh Kesuma Wardhani; Rahmad Kurniawan
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (649.554 KB)

Abstract

There are many methods that have been used in researches of expert system for diagnosing diseases, such as Bayesian Network and Dempster-Shafer. In this research, the main aim is to compare and to analyze the expert system for diagnosing eye disesases by using Bayesian Network with the expert system for diagnosing eye disesases by using Demspter-Shafer. From testing phase, it can be concluded that there is no significant difference in accuracy value from those two methods. The diagnosis resulting from expert system using Bayesian Network obtained accuracy of 85.7%. Similar results were also obtained from expert system using Dempster-Shafer method. Nevertheless, the inference process of Dempster-Shafer method is more complicated, where there are some combination of rules that are used to combine the evidence. While using the Bayesian inference network is easier because of the structure of the Bayesian network.Keyword : Bayesian Network, Dempster-Shafer, Expert System, Eye Disease