Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Teknik Informatika (JUTIF)

DATA MINING ESTIMATE TOURISM INCOME IN TOMOHON CITY USING MULTIPLE LINEAR REGRESSION ALGORITHMS Karamoy, Beauty Leony; Rantung, Vivi Peggie; Kumajas, Sondy; Ratumbuisang, Yosua Fitsgerald
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2199

Abstract

This study aims to estimate the revenue of tourist destinations in Tomohon City using the multiple linear regression algorithm. The problem addressed is how to determine revenue estimates from various tourist spots categorized into nature tourism and cultural experiences. The research method employed is quantitative, using a multiple linear regression approach. Data were collected through interviews with tourist destination owners regarding ticket prices and visitor numbers, and then analyzed using Microsoft Excel. The results show that the independent variables, consisting of ticket prices (X1) and the number of visitors (X2), significantly affect the dependent variable, which is monthly revenue (Y). The regression equation model obtained is Y = -5594 + 250X1 + 2.26X2. Using this model, the next month's revenue prediction for each tourist destination in Tomohon City can be determined, demonstrating that the multiple linear regression approach is effective for estimating tourism revenue.
FACE IDENTIFICATION USING IMAGE PROCESING WITH THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) METHOD Runtuwene, Eunike R.; Kumajas, Sondy; Kainde, Quido
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2350

Abstract

Cybercrime is a criminal act that utilizes technology, from devices to internet networks. The purpose of cybercrime cases is to harm others by committing theft, hacking, fraud, spreading viruses, and other digital crimes. In every cybercrime case there are usually traces of activity left behind, in the form of traces of activity (history) related can be used as evidence, both in the form of electronic evidence (in the form of electronic physical devices or storage media) and digital evidence (such as document files, history files, or log files containing relevant data). The National Institute of Standards and Technology (NIST) method is a method that is often used in digital forensics to overcome cybercrime cases. The National Institute of Standards and Technology (NIST) method is a method that aims for investigations in finding related information, in order to provide structured information, and process the information obtained. NIST refers to general principles such as collection, examination, analysis, reporting. Using the NIST (National Institute of Standards and Technology) method, the process at each stage is Data Collection is the process of collecting user data and face images through an easy-to-use user interface, Examination is the stage of processing images to detect faces using the Haar Cascade algorithm, Analysis is the process of training a face recognition model (LBPH) and applying it to recognize faces in images or videos. Reporting is the stage of displaying face recognition results and related information to the user through the GUI.