Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Proceeding International Conference on Information Technology and Business

Designing a Measurement Model for the Effectiveness of Online Learning Using C4.5 Algorithm Siti Mukodimah; Handoyo Widi Nugroho; Muhamad Muslihudin
Prosiding International conference on Information Technology and Business (ICITB) 2021: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 7
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological developments in the world of education have led to many innovations to support education such as online learning in the learning process amid the Covid19 pandemic. Changes in learning methods that occur suddenly from conventional learning methods or directly switch to distance learning methods or using online learning media greatly impact and affect students who come from underprivileged families and students who are in areas where internet access and infrastructure are lacking. support. This study aims to create a classification model for measuring the effectiveness of online learning in the Pringsewu area using the classification method. The classification method is used to classify data based on the nature of the data that has been recognized by each class. Various methods can be used to classify data, namely the C4.5 Algorithm method. The results of the research carried out are a design classification model for measuring the effectiveness of online learning in the Pringsewu area such as Internet Access, Network Infrastructure,  Learning Media, Device Networks, Mastery of Technology Operations, School ICT Infrastructure, Learning Concepts, Motivation in Online Learning, Understanding of Learning Materials.Keywords—Design, Effectiveness, Online Learning, C4.5 Algoritm
Prediction of Graduation of Students of the Lampung School of Technology Nusantara using the K-Nearest Neighbor and Naive Bayes Algorithm Febri Suganda; Handoyo Widi Nugroho; Idris Asmuni
Prosiding International conference on Information Technology and Business (ICITB) 2021: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 7
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Predicting student graduation is the main factor for campuses to be able to assess the performance of each study program in learning achievement in each semester. Nusantara High School of Technology (STTN) Lampung has difficulty predicting graduation, so the machine learning approach with the K-Nearest Neighbor algorithm and the Naïve Bayes algorithm is very important in predicting graduation. In thispaper, we discuss the K-Nearest Neighbor and Naïve Bayes methods which in research at STTN Lampung used the Rapidminer 9.1 application, with a total data of 372 student graduations which were then processed by previous data to obtain samples to be studied, then obtained a sample of 186 graduation students from the 2017 class. and 2019, for S1 Industrial Engineering and S1 Electrical. The results showed that the approach with the Naïve Bayes algorithm had a higher prediction accuracy of 89.09% compared to the K-Nearest Neighbor algorithm which obtained an accuracy rate of 74.77%. Further research can be carried out with other methods and samples from other year classes to produce more diverse predictions. Keywords — Prediction of student graduation, K-Nearest Neighbor Algorith,Naive Bayes Algorithm
Blockchain Technology for Tracking Chain Supply Riko Herwanto; Yan Aditiya Pratama; Handoyo Widi Nugroho; Wasilah Wasilah; Hary Sabita
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The adequate technology was the architecture that was distributed through the block chain technology which had authorizations for securing data storage and for accessing any piece of information anytime and anywhere. The objective of this study was to find out whether the issues of the supply chains and the block chain were able to be solved. The hypothesis of this study was suitable for the supply chain management in the block chain architectures. In this study, a survey was conducted to validate the issues of supply chain management and to obtain the requirement for a supply chain software system.Keywords: Supply Chain, Supply Chain Management, Blockchain, Distributed Architecture, Security, Traceability, Information Integration, Interoperability
Utilization of Content Base Image RetrievalTechnique Based Sketch for Facial Recognition Muhammad Said Hasibuan; Handoyo Widi Nugroho; Suhendro Yusuf
Prosiding International conference on Information Technology and Business (ICITB) 2016: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 2
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As the rising up Including terrorist crimes in our society due to issues politics, economy, poverty, religion and ethnic conflicts. Many ways and techniques have been tried to crack down Reviews those crimes, but unfortunately the Efforts to seize person or group of suspected criminal is far from our expectation. Face recognition is one of techniques Introduced by many Researchers for the last Decades with many methods and approaches they tried to Recognize a person based on his or his faces. Some of the methods such as face recognition with Query by Example (QBE) using shape, color, and texture to match a query face with the face in the database; however the result is not good enough to Recognize the faces. One of the problems of face recognition by QBE is sometime we do not have a picture or a face image to the make QBE. In order to sort it out the problem, in this research we will try to introduce of face recognition method by generating a face image by a face sketch.Many sketch based face recognition was Introduced by some Researchers and experts, but most of reviews their methods have been applied directly inputting a sketch into a database the which is very costly and Involved a complex algorithm. In addition to the research, we are applying our proposed method compressed into face images, as the compressed images will save storage and unsumming the algorithm. KEY WORDS: Query by Example, Face recognition, criminal