Claim Missing Document
Check
Articles

Pemanfaatan Metode Moving Average Dalam Sistem Informasi Pendukung Keputusan Pembelian Barang Berdasarkan Peramalan Penjualan Dengan Berbasis Web Fujiama Diapoldo Silalahi; Khoirur Rozikin; Daniel Rudjiono; Nuris Dwi Setiawan
Elkom : Jurnal Elektronika dan Komputer Vol 14 No 2 (2021): Desember: Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v14i2.540

Abstract

CV. Ida Ayu adalah sebuah perusahaan yang bergerak di bidang perdagangan umum seperti tas rapat dan blocknote. Tujuan dilakukannya penelitian ini adalah untuk merancang sistem informasi pendukung keputusan pembelian barang yang dapat menghasilkan informasi yang valid, cepat dan akurat dan untuk mengetahui bagaimana membangun sistem informasi pendukung keputusan pembelian barang yang efektif dalam peramalan penjualan. Sulitnya administrasi untuk merancang suatu sistem informasi pendukung keputusan pembelian barang yang valid berdasarkan peramalan penjualan dan membuat sistem informasi pendukung keputusan pembelian barang yang efektif dalam meramalkan penjualan pada CV. Ida Ayu Semarang. Pada aplikasi peramalan ini metode yang digunakan adalah metode moving average. Metode ini diperoleh melalui penjumlahan dan pencarian nilai rata-rata dari sejumlah periode tertentu, setiap kali menghilangkan nilai terlama dan menambah nilai baru. Hasil penelitian diharapkan dapat menunjukan bahwa perancangan sistem informasi pendukung keputusan pembelian barang berdasarkan peramalan penjualan berbasis web dapat membantu karyawan (administrasi) untuk meminimalkan terjadinya kesalahan pembelian barang dengan mempertimbangkan penjualan yang terjadi dalam periode tertentu. Jadi semua kegiatan penjualan serta pembelian barang di CV. Ida Ayu dapat berjalan secara efektif dan efisien.
TEKNIK PENDUKUNG KEPUTUSAN DALAM MENENTUKAN PENERIMA KARTU INDONESIA PINTAR KULIAH (KIP-KULIAH) DENGAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) Fujiama Diapoldo Silalahi; Sumaryanto Sumaryanto; Setiyo Prihatmoko
JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI Vol 12 No 2 (2021): September
Publisher : UNIVERSITAS STEKOM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (266.809 KB) | DOI: 10.51903/jtikp.v12i2.288

Abstract

In realizing accessibility and equalizing of high-quality education and relevant to community interests for progress, independence, and prosperity. The government is obliged to increase access and learning opportunities at universities and to prepare intelligent and competitive Indonesian people. There is no term “poor children are being banned fromschool or college” in this country. Those who are less able and have achievements, must continue to advance to higher education through the Indonesian Smart College Card or KIP- College from the Government. This research is to create a decision support technique in determining KIP-College recipients using the Analytical Hierarchy Process (AHP) method so that it is right on target. Besides that, it is also to assist operators in determining KIP-College recipients, especially in processing and selecting data for parents who are truly from underprivileged economic classes.
APLIKASI SMS GATEWAY SEBAGAI SISTEM LAYANAN MENERAPKAN METODE STORE AND FORWARD PADA PT. FASTRONIC MAKMUR SENTOSA SEMARANG Fujiama Diapoldo Silalahi; Dian Noor Hamami
Jurnal Maklumatika Jurnal Maklumatika Vol.3 No.2 (2017)
Publisher : Program Studi Teknik Informatika Sekolah Tinggi Teknologi Informasi NIIT

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1163.31 KB)

Abstract

PT Fastronic Makmur Sentosa (FMS) adalah Authorized Dealer Smartfren yang mendistribusikan produk dari Smartfren, seperti staterpack perdana, voucher pulsa, modem doungle dan handset bandling. Aplikasi SMS Gateway sebagai sistem layanan difungsikan untuk mengintegrasikan antara pelanggan dengan sistem informasi yang otomatis, bagian customer service dengan bagian administrasi sehingga diperoleh informasi yang valid. Pelanggan dapat melakukan pemesanan produk dan mengakses informasi dengan mudah melalui SMS tanpa harus datang langsung ke PT. FMS mengenai informasi harga, info promo, info spesifikasi produk dan pemesanan produk bagi pelanggan yang sudah terdaftar. Aplikasi SMS Gateway juga dapat membantu Customer Service dalam melaksanakan tugasnya untuk melayani pelanggan dengan data yang sudah jelas dan ter update yang bisa dilihat pada modul administrasi. Dengan adanya Aplikasi SMS Gateway penyampaian informasi menjadi lebih cepat apabila pelanggan membutuhkan informasi, menghasilkan laporan stok dengan jelas kepada bagian administrasi. Penelitian ini menggunakan model pengembangan Research and Development (R & D) oleh Borg and Gall dengan pengembangan modivikasi 6 langkah yaitu Research and Information Collecting, Planning, Develop Premilinary Form of Product, Premilinary Field Testing, Main Product Revision, Main Field Testing.
Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Management and Informatics Vol 1 No 2 (2022): Agustus: Journal of management and informatics
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jmi.v1i1.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM Joseph Teguh Santoso; Fujiama Diapoldo Silalahi; Laksamana Rajendra Haidar
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.149

Abstract

Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
Pemanfaatan Metode Moving Average Dalam Sistem Informasi Pendukung Keputusan Pembelian Barang Berdasarkan Peramalan Penjualan Dengan Berbasis Web Fujiama Diapoldo Silalahi; Khoirur Rozikin; Daniel Rudjiono; Nuris Dwi Setiawan
Elkom : Jurnal Elektronika dan Komputer Vol 14 No 2 (2021): Desember: Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v14i2.540

Abstract

CV. Ida Ayu adalah sebuah perusahaan yang bergerak di bidang perdagangan umum seperti tas rapat dan blocknote. Tujuan dilakukannya penelitian ini adalah untuk merancang sistem informasi pendukung keputusan pembelian barang yang dapat menghasilkan informasi yang valid, cepat dan akurat dan untuk mengetahui bagaimana membangun sistem informasi pendukung keputusan pembelian barang yang efektif dalam peramalan penjualan. Sulitnya administrasi untuk merancang suatu sistem informasi pendukung keputusan pembelian barang yang valid berdasarkan peramalan penjualan dan membuat sistem informasi pendukung keputusan pembelian barang yang efektif dalam meramalkan penjualan pada CV. Ida Ayu Semarang. Pada aplikasi peramalan ini metode yang digunakan adalah metode moving average. Metode ini diperoleh melalui penjumlahan dan pencarian nilai rata-rata dari sejumlah periode tertentu, setiap kali menghilangkan nilai terlama dan menambah nilai baru. Hasil penelitian diharapkan dapat menunjukan bahwa perancangan sistem informasi pendukung keputusan pembelian barang berdasarkan peramalan penjualan berbasis web dapat membantu karyawan (administrasi) untuk meminimalkan terjadinya kesalahan pembelian barang dengan mempertimbangkan penjualan yang terjadi dalam periode tertentu. Jadi semua kegiatan penjualan serta pembelian barang di CV. Ida Ayu dapat berjalan secara efektif dan efisien.
Sistem Informasi Berbasis Website sebagai Media Edukasi dan Pencegahan Stunting di Posyandu "Mangga" Desa Tumpangkrasak Jati Kudus Sholikhan, Muhammad; Galeh Septiar Pontang; Fujiama Diapoldo Silalahi
Jurnal Pengabdian Masyarakat Sains dan Teknologi Vol. 2 No. 4 (2023): Desember : Jurnal Pengabdian Masyarakat Sains dan Teknologi
Publisher : Fakultas Teknik Universitas Cenderawasih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58169/jpmsaintek.v2i4.214

Abstract

  "Mangga" Integrated Health Post is one of the Integrated Service Posts located in Tumpangkrasak Village, Jati Subdistrict, Kudus District. There are approximately 80 toddler members who participate in activities every month on the 25th. "Mangga" Integrated Health Post utilizes the home of the health worker as its location, equipped with basic tables and chairs. In broad terms, this dedication aims to (1) Improve services by providing information and education on stunting prevention through the use of a website and (2) Assist in providing facilities such as equipment for "Mangga" Integrated Health Post. The expected outcomes include (1) Publication of articles in a Service Journal. (2) Documentation of activities will be published in the online mass media Jawa Pos Radar Kudus. (3) Publication of photos and videos of activities to be uploaded on the institution's YouTube channel. (4) "Mangga" Integrated Health Post website www.manggahealthpost.com. With website management training, it is possible to enhance the skills of village health workers in developing the "Mangga" Integrated Health Post website, thereby educating residents of the village, especially parents with toddlers, and achieving the goal of stunting prevention.
Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
MACHINE LEARNING TECHNIQUE FOR CREDIT CARD SCAM DETECTION Fujiama Diapoldo Silalahi; Toni Wijanarko Adi Putra; Edy Siswanto
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.143

Abstract

Credit Card (CC) scam In financial markets is a growing nuisance. CC scams increasing rapidly and causing large amounts of financial losses for organizations, governments, and public institutions, especially now that all payment methods for e-commerce shopping can be done much more easily through digital payment methods. For this reason, the purpose of this study is to detect scam CC transactions from a given dataset by performing a predictive investigation on the CC transaction dataset using machine learning techniques. The method used is a predictive model approach, namely logistic regression models (LR-M), random forests (RF), and XGBoost combined along particular resampling techniques that have been practiced to anticipate scams and the authenticity of CC transactions. Model performance was calculated grounded Re-call Curve (RC), precision, f1-score, PR, and ROC. The experimental results show that the random forest in combination with the hybrid resampling approach of SMOTE and removal of Tomek Links works better than other models. The random forest model and XGBoost accomplished are preferred over the LR-M as long as their global f1 score is without re-sampling. This demonstrates the strength of one technique that can provide greater achievement alike in the existence of class inequality dilemmas. Each approach, at the same time when used with Ran-Under, will give a great memory score but fails cursedly in the language of accuracy. Compared to the coordinate model sine re-sampling, the accuracy and RS are not repaired in cases where Tomek linker displacement was used. RF and xgboost perform quite well in terms of f1-S when Ran-Over is used. SMOTE increases the random forest draw score and xgboost but the precision score (PS) decreases slightly. Completely, during a hybrid solution of Tomek delinker and SMOTE was practiced with random forest, it gave equitable attention and RS in the PR-AUC. XGboost failed to increase the PS even though the same re-sampling technique was used. For future research, a fee-delicate study method can be applied as long as fee misclassifications. So for future research, it is very necessary to consider this behavior change and it is also very important to develop predictive models. In addition to this, much larger data is needed so that detailed studies on handling non-stationary properties in CC scam detection can be carried out better.