Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal Software, Hardware and Information Technology

Pengunaan Formula Haversine pada Sistem Informasi Pencarian Guru Mengaji Faisal Faisal; Nahrun Hartono; Muhammad Syafei
Journal Software, Hardware and Information Technology Vol 1 No 1 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i1.3

Abstract

The search for private reciting teachers is mainly carried out through contacts with colleagues of the same profession, recommendations from previous reciting teacher service users so that broadcasts through social media problems that then arise through searches like this, including searching for prospective private reciting teachers who take a long time, find it challenging to find a match The location and time between the prospective Koran Kaji and the students, cannot know the competence, achievements and track-records of the future Koran teachers in private. This research is qualitative research where the strategy used is Design and Creation—the method used for data collection using the form of observation, literature study, questionnaires and interviews. This research aims to design a system that can make it easier for students to find Koran teachers. In contrast, the design of this system uses the Java and MySQL programming languages for databases and the programming method using the Haversine Formula method. This research produces an Android-based private apprenticeship teacher information system application for the conclusions drawn from this study. To design a system for ordering private Koran teachers to make it easier for the community, especially in Makassar.
Implementasi Extract Transform Load Pada Data Akademik Perguruan Tinggi Nahrun Hartono; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 1 No 2 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i2.16

Abstract

Each department at university needs to analyze student data and scores. By analyzing student grades, majors can improve lecturer performance in learning; one way to explore student grades is to collect student grade data and then process the data to produce information in the form of learning performance results that can be used to make decisions to improve lecturer performance. The author will analyze a structured programming course student score data; the following collected data are related to student attendance, assignment scores, mid-semester exam scores, and final semester exam scores. After all the data needed has been organized to build the data warehouse, the following process is the ETL process (Extract, Transform, and Load), as the tool used in the ETL process is Pentaho. This data extraction process using 1 data source, namely student value data with excel file type. After carrying out the extraction process, there is a data transformation process, namely making some changes to the extracted data to make it more consistent and uniform according to the needs of the data warehouse.
Studi Literature Sistem Keamanan Biometrik Untuk Verifikasi dan Transaksi Dompet Digital Nahrun Hartono; Adhy Rizaldy; NIswa Ayu Lestari
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.30

Abstract

E-Wallet is a service for storing money electronically that can be used for financial transactions or electronic payments easily and quickly. With the increasing use of digital today, the more the threat of ID theft and account takers can lead to balance withdrawals. In the last few years, fraudulent activities have grown rapidly so that only using a PIN and password with one-time password verification is no longer safe. The solution to this security problem is to use biometric authentication. A biometric security system is an authentication system for unique parts of the human body such as fingerprints, irises, and faces, which are stored in a database. This paper will discuss how the biometric security system is used in verification and transactions on digital wallets.