Claim Missing Document
Check
Articles

Found 19 Documents
Search

IMPLEMENTASI METODE ANALYTICAL HIERARCHY PROCESS (AHP) DALAM PEMILIHAN KARYAWAN BERPRESTASI BERDASARKAN KINERJA (STUDI KASUS: PERUSAHAAN MOVIEGOERS) Debi Yandra Niska; Muhammad Iqbal; Sartika Siburian
Jurnal Mantik Penusa Vol. 4 No. 1 (2020): Management and Informatics
Publisher : Lembaga Penelitian dan Pengabdian (LPPM) STMIK Pelita Nusantara Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk menilai dan memilih karyawan yang professional dibutuhkan suatu Sistem yang dapatmembantu manajer personalia dalam mengambil keputusan terhadap penilaian kinerja karyawan.Begitu juga yang terjadi pada perusahaan Moviegoers, manajer personalia begitu sulit untukmelakukan penilaian kinerja karyawan. Untuk itu, perusahaan membutuhkan suatu sistem yangefektif sebagai pendukung keputusan dari penilaian kinerja karyawan pada perusahaan Moviegoers.Sistem ini dibuat untuk membantu mempermudah manajer personalia dalam menentukan keputusanpenilaian karyawan berprestasi berdasarkan kinerja. Sistem ini juga bisa digunakan sebagaipengarsipan data karyawan yang berprestasi pada perusahaan. Sistem pendukung keputusan ini dibuatdengan menggunakan metode AHP (Analytical Hierarchy Process) untuk peroses perhitungannya.Kriteria yang digunakan dalam pemilihan karyawan berprestasi berdasarkan kinerja di perusahaanMoviegoers ini adalah sebagai: Kejujuaran, Disiplin, Kualitas Kerja, Inisiatif dan Penampilan.Sedangkan sub keriteria pada setiap kriteria dinilai dari 1 sampai 5, yaitu: 1 = Sangat Baik, 2 = Baik,3 = Cukup, 4 = Kurang, dan 5 = Buruk. Dengan menggunakan sistem pendukung keputusan ini,pemilihan karyawan berprestasi pada Perusahaan Moviegoers menjadi lebih efektif dan efisien sertamenutup kemungkinan terjadinya kecurangan.
Implementation of the IMAKOM Organization Presence (Computer Student Association) Panca Budi Medan Development University Using QR Code-Based ID Cards: Implementation of the IMAKOM Organization Presence (Computer Student Association) Panca Budi Medan Development University Using QR Code-Based ID Cards Kairul Fahmi; Sri Wahyuni; Muhammad Iqbal; Eko Hariyanto
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.846.pp1063-1069

Abstract

Progress in the field of information systems today has helped a lot in processing data that is very appropriate in supporting the processing of data into information. One of the technologies in question is the development of software applications, especially for mobile devices. One of the fastest mobile devices is a Smartphone. In writing this thesis, the writer raises the title of the thesis of Attendance in the Organization of IMAKOM (Computer Student Association) Medan Unpab Based on Id Card Using Qr due to the still manual validation process at imakom organization so with this application later it will attendance online and the data generated online real-time. This application is made using Android smartphone technology because of the many members of imakom using this smartphone because it has many advantages such as the availability of social media and can be used anytime and anywhere, in learning java programs that can be run on this smartphone, in this application later it will do a barcode performance in the form of QR code which will later be compiled to the database automatically and generate reports in real-time.
Implementation of Random Forest for Motif Classification Based on Sift Ahkyar Khadafi; Muhammad Iqbal
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Songket an example of intangible cultural heritage found in Indonesia. Songket, especially Songket Palembang, has a lot of variety depending on the features of each place. When compared to Songket from other locations, Palembang Songket has more features. Songket Palembang has a high motive, quality, and complexity in the manufacturing process, in addition to its historical significance. Using Scale-Invariant Feature Transform (SIFT) feature extraction, the Random Forest approach was employed to identify the Songket Palembang motif image in this study. The SIFT approach involves the steps of extrema detection scale space, keypoint localization, orientation assignment, and keypoint descriptor in the feature creation process. The Random Forest categorization uses the resulting feature. In this study, 115 photographs of each sort of Songket theme were used, including Chinese Flowers, Beautiful Flowers, and Pulir. Each Songket Palembang motif's five colors were used to create the image. For each Songket Palembang motif, 100 and 15 training and test data were used, respectively. The test results show that the SIFT and Random Forest methods for the classification of Songket Palembang motifs can provide fairly good accuracy, with overall accuracy of 92.98 percent, per class accuracy of 94.07 percent, precision 92.98 percent, and recall 89.74 percent for the SIFT and Random Forest methods, respectively.
Decision Tree Model for Predicting Work Schedules Using Scikit-Learn Siti Hapsoh Lubis; Muhammad Iqbal
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Predicting category and numerical data, such as working schedule data, is difficult since it necessitates a specific process. A decision tree is one of many categorization methods that can handle both category and numerical input. Scikit learn, a python library that may be used for decision trees, is one example. Although Scikit-optimized learn's CART algorithm could only handle numerical data, it did provide certain features to deal with categorical data. To forecast working schedules, this study used scikit-learn to create a decision tree model. There are 54 variables, three of which are category and one of which is numerical. A 6-depth decision tree model was created as a result of the implementation. The evaluation yielded a positive outcome, with accuracy and precision above 0.7 and 0.9, respectively. The optimal division of data is 30% validation and 70% training. In comparison to KNN, the decision tree model has higher accuracy, with decision tree accuracy exceeding 0.8 while KNN accuracy is below.
Using the Matlab App to Detect Objects by Color with HSV Color Segmentation Rindi Antika; Muhammad Iqbal
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Object detection using computer vision algorithms is a crucial procedure for accurately detecting items in a three-dimensional image. When using the color segmentation method with HSV color, an image segment object in the shape of a blob is created, which the computer can detect. The color sample will provide a value that will be the reference for the filter range in the segmentation process based on the test findings. During the process, the number of objects identified according to the given color will be determined.
Application of Data Mining to Predict Work Accident Rates using Rapid Miner Sapna Indah Br Ginting; Muhammad Iqbal
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Working safety is strongly linked to machines, aircraft, and work tools in the workplace runway and its surroundings, as well as how to work. The corporation must provide this protection since it is a human right. According to ILO (International Labor Organization) estimates, 2 million people die each year as a result of work-related issues around the world. A total of 354,000 persons died as a result of these accidents. The rate of fatal accidents in underdeveloped countries is four times that in developed countries. The agriculture, construction, mining, forestry, and fisheries industries all have hazardous jobs that account for the majority of accidents. This research is descriptive in nature, examining work accidents that occur based on secondary data and making predictions to estimate the amount of work accidents using a Data Mining approach utilizing Rapid Miner to determine the level of work accidents. Rapid miner is a data mining processing software that includes tools for creating decision trees and a data mining engine that may be used in its own products. The data utilized was collected from the Industrial Safety and Health Analytics Database as secondary data. The database's content consists primarily of accident records from 12 distinct factories in three different nations, with each row representing a 439-data-row accident incident. According to the findings, 11 of the 12 factories have an accident rate of level I; the third factory (level 03) has an accident rate of level IV on the Risco Critico power lock; and factory 11 (local 11) does not have a crash lift.
Design of Networked Computer Learning Applications for Android-Based Beginners Firdaus Firdaus; Muhammad Iqbal
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Learning applications are media that can be used to convey material content involving mobile devices such as Android-based mobile phones. Computer Network is a collection of computers, as well as other supporting computer devices that are connected to each other in a single unit. In this final project, a networked computer learning media application is designed for smartphones, especially Android using the Java programming language, where there are materials and quizzes including lessons about network computers. This application can only run on smartphones based on the Android operating system.
Design and Build Data Transfer Process Security on File Transfer Protocol (Ftp) Servers Using Transport Layer Security (Tls) Protocol Boy Rizky Akbar; Muhammad Iqbal; Arpan
Jurnal Mantik Vol. 6 No. 2 (2022): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.v6i2.2786

Abstract

Attacks on computer network security are very common, crimes in cyberspace are often carried out by someone and even a group of people who want to penetrate a security data on a network. This activity aims to search, damage, modify, steal and even obtain information or data on the network, one of which is Packet Sniffer attacks. This method is done by monitoring or analyzing data packets that are transmitted from the client computer to the server computer through a computer network. File Transfer Protocol (FTP) is still a reference as a medium used to transfer data with a fast process of uploading and downloading from server to client so that data is more secure, and on FTP Server security.
Implementing bandwidth management on computer networks using MIKROTIK router Kurnia Wira Syahputra; Muhammad Iqbal
Journal of Intelligent Decision Support System (IDSS) Vol 5 No 3 (2022): September: Intelligent Decision Support System (IDSS)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/idss.v5i3.102

Abstract

Today's expansion of information technology is paralleled by the development of computer networks; with tools and software for bandwidth control, the computer network can function properly. Campuses, agencies, and businesses in general require bandwidth management with a Mikrotik router to help overcome the density of traffic that can interfere with computer network connections, where when the network is down or the computer network has problems due to the absence of an even distribution of bandwidth for each user, by Therefore, it is necessary to manage the distribution of the amount of bandwidth, with the goal of achieving the optimal bandwidth capacity for each user. Later, the bandwidth capacity will be allocated to each user according to their internet usage priority in order to optimize the available bandwidth capacity. Bandwidth management, often known as QOS (Quality of Services), is an alternative term for bandwidth management. This application is executed in multiple stages, including network design, implementation, and testing, which is characterized by the availability of a more reliable network.
Data-Driven Approach for Credit Risk Analysis Using C4.5 Algorithm Muhammad Iqbal; Syahril Efendi
ComTech: Computer, Mathematics and Engineering Applications Vol. 14 No. 1 (2023): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v14i1.8243

Abstract

Credit risk is bad credit, resulting in bank losses due to non-receipt of disbursed funds and unacceptable interest income. However, credit services still have to be done to achieve profit. The absence of an approach that can assist in making policies to reduce credit risk makes the risk opportunities even more significant. So, data processing techniques are needed that produce information to be used as the basis for policies in triggering credit risk with data mining. The research presented an application of data mining as a credit risk approach considering the ability of data mining techniques to extract data into useful information with the C4.5 algorithm. The research used a sample of 30 data banks with 6 factors (credit growth, net interest margin, type of bank, capital ratio, company size, and bank compliance level). Credit risk was evaluated by making a decision tree and a RapidMiner test application. The results show that credit growth is the main factor causing credit risk, followed by bank compliance level, net interest margin, and capital ratio. Based on the results obtained, the C4.5 algorithm can be used in analyzing credit risk with results that are easy to understand and can be used as useful information for banks.