Claim Missing Document
Check
Articles

Found 23 Documents
Search

PERANCANGAN DATA WAREHOUSE KINERJA PROSES BELAJAR MENGAJAR PADA JURUSAN TEKNIK INFORMATIKA UNIVERSITAS ADIWANGSA Touriano, Derist; Hartini, Dwi; Yamalia, Ikke
JOURNAL V-TECH (VISION TECHNOLOGY) Vol 1 No 1 (2018): JOURNAL V-TECH (VISION TECHNOLOGY)
Publisher : LPPM Universitasdiwangsa Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (519.788 KB) | DOI: 10.35141/jvt.v1i1.50

Abstract

Implementasi sistem penilaian kinerja PBM dalam suatu universitas merupakan salah satu alat bantu yang dapat digunakan dalam mengambil keputusan saat ini maupun berikutnya sehingga permasalahan-permasalahan yang terjadi pada proses belajar mengajar senantiasa terpantau. Implementasi data warehouse diharapkan dapat membantu pihak pengembang dalam merancang suatu sistem dengan tingkat akurasi yang tinggi dan cepat sehingga mendukung pihak pengelola mengawasi proses PBM sehari-hari dengan mudah.
INTERACTIVE TECHNOLOGY IN THE TEACHING AND LEARNING PROCESS IN HIGHER EDUCATION Touriano, Derist
JOURNAL V-TECH (VISION TECHNOLOGY) Vol 1 No 2 (2018): JOURNAL V-TECH (VISION TECHNOLOGY)
Publisher : LPPM Universitasdiwangsa Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (285.954 KB) | DOI: 10.35141/jvt.v1i2.94

Abstract

An important aspect that requires great attention in each college is related to the lack of educational facilities and the low interest in student learning which risks the education process. Therefore the purpose of this study is to develop an interactive learning technology so that the lecturers are more creative in providing explanations of lecture material not to go monotonous and exciting. This research method is divided into four stages from ten stages of research and development to solve research problems. The final conclusion of this study is use interactive learning technology, especially SmartBoard, is easy to implement with low cost so that lectures and students can explore information more effectively and efficiently.
FinTech Risks in Indonesia Ratih Kusumastuti, Derist Touriano
International Conference on Industrial Revolution for Polytechnic Education Vol. 1 No. 1 (2019): International Conference on Industrial Revolution for Polytechnic Education
Publisher : PolinemaPress

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The current phenomenon in Indonesia is a shift in consumer behavior, from conventional services to information technology-based services that grow and develop so rapidly that it opens opportunities for start-up companies utilizing FinTech. But the Financial Services Authority (OJK) is currently aware of the main risks of FinTech-based financial services. From this phenomenon is the main reason to examine more deeply the high risk of FinTech services with research problems that will be examined in this study is what risks most significantly affect FinTech services in Indonesia.This study uses an explanatory method in order to explain the risk of FinTech services as measured by objective and empirically standardized tools. This research data was obtained from the first party (primary) by using survey techniques for explaining the symptoms, problems, and objects under study. The population of the study is an auditor who works on 600 KAP registered under the auspices of the Indonesian Accountants Association (IAI) by using a convenience sampling method. Further, while serenteristics that will be observed, manipulated, controlled in this study are security, availability, performance and compliance risk for FinTech services. While data processing uses SPSS 22 tools to test data quality and describe the risk ranking statistics for FinTech services in Indonesia based on a 7-point Likert scale.The risk rating for FinTech services in Indonesia derived from the results of data analysis revealed that the five major components of risk that greatly impacted FinTech services were 1) inadequate capacity management, 2) controls, 3) Institution factors, 4) ICT system failures and 5) authentication. The five main risks, 4 risks are included in the dimensions of availability risk and 1 risk including security risk so that it can be interpreted that the risk of FinTech services in Indonesia tends to be in accordance with the results of research by Tchernykh et al. (2016)where most of the vendors or FinTech providers in Indonesia do not consider the unavailability of systems or hardware components so that in the event of an emergency, they are unable to restore services in a timely manner. Besides that, the main risks that often occur are cheating or an attacker's attempt to exploit IS/IT security loopholes that have an impact on the financial loss of its users.Risk ranking is an advanced stage after identifying risks at FinTech services, this aims to determine the degree of risk that will occur or that will be faced by the company / its users. In addition, companies can prioritize the most important risks so as to accelerate their handling and minimize greater losses in the future. It is hoped that in the future risk-related research and FinTech will need to be continuously assessed according to the rapid innovation in the IS / IT field and the threat of cyberwar in the digital era
Sistem Pakar Mendiagnosis Penyakit Jantung dengan Metode Fuzzy Set Derist Touriano; Erick Fernando; Pandapotan Siagian; Hetty Rohayani
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2014
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penyakit jantung merupakan penyakit yangmenyebabkan tingkat kematian yang sangat tinggi. Ini yangdisebabkan kurangnya pengetahuan masyarakat dan seorangpakar atau dokter ahli yang memiliki kelemahan dalampelayanan seperti jam kerja terbatas dan menunggu antriandalam melakukan pelayanan. Dengan demikian dibutuhkanuntuk membuat komputer yang dapat bekerja seperti pakar ataudokter yang di sebut sebuah Sistem pakar (expert system)yangdibangun dalam bentuk website dengan menggunakan metodelogika fuzzy.Logika Fuzzy merupakan peningkatan terhadaplogika Boolean yang telah mengenalkan konsep kebenaransebagian.logika fuzzy dapat menggantikan kebenaran booleandengan tingkat kebenaran yang lebih baik.Dengan Sistem pakardibangun pada sebuah website yang dapat diakses oleh publikdimana saja dan kapanpun juga sehingga dapat membantumemberikan informasi yang sangat dibutuhkan secara cepat,akurat dan jelas yang layaknya berkonsultasi kepada seorangpakar atau pun seorang dokter ahlinya sehingga dapatmengurangi tingkat kematian yang terjadi.
Analysis of Security and Performance Service in Service Oriented Architecture (SOA) and Data Integration Erick Fernando; Hetty Rohayani. AH; Pandapotan Siagian; Derist Touriano
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (841.418 KB) | DOI: 10.11591/eecsi.v1.339

Abstract

Nowdays, the use of web services in the world of education is very much particular services and information provided in the form of the transaction until the payment - the payment and security in a system that is built in the form of a website. This system does not yet have a system that is integrated with each other and the security that is necessary to develop a system that leads towards it. Services provided requires an integrated system of all related system, the Service Oriented Architecture (SOA) to be used as an efficient solution for integrating distributed applications. In SOA-based environment that focuses on quality of service called WSARCH (Web Services Architecture). With this paper can then propose a system that uses a Service Oriented Architecture (SOA) with Web Services Architecture to resolve accurately than techniques that have a lower negative impact in terms of service performance and security.
Effectiveness of accrual basis accounting system in state budget and treasury system in TAM 3 framework Ratih Kusumastuti; Derist Touriano; Sry Rosita; Raja Sharah Fatricia
Journal of Islamic Accounting and Finance Research Vol 4, No 1 (2022)
Publisher : Universitas Islam Negeri (UIN) Walisongo Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21580/jiafr.2022.4.1.10896

Abstract

Purpose - This study establishes a basic theoretical model developed using Technology Acceptance Model (TAM 3) with several critical factors on the effectiveness of accrual basis accounting systems in the State Budget and the Treasury System.Method - This basic research uses a causal model with primary data collected quantitatively and presented descriptively. The study population was users of the State Budget and Treasury System in the Regional Office V of Jambi Province using the convenience sampling method.Result - The results of this study stated that all TAM variables were correlated with each other and TAM 3 variables were correlated with the effectiveness of the accrual-based accounting system in SPAN. It was proven that there was a significant relationship between all variables. However, the accrual-based accounting system in SPAN practically does not provide convenience and tends to have low intensity of use and low effectiveness.Implication - The result of this research states that all variables of TAM are correlated to each other and TAM 3 variables are correlated to the effectiveness of accrual basis accounting system in SPAN.Originality - This study focuses on the effectiveness of accrual basis accounting system in State Budget and Treasury System: migration of the Indonesian Islamic banking system of BSI.
Pemetaan dan Analisa Sebaran tempat public pada Kecamatan Jambi Timur di Kota Jambi dengan Sistem Informasi Geografis Erick Fernando; Derist Touriano; Dina Fitria Murad; Andreas Condro Bimo
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol 2 No 1 (2018): Volume II - Nomor 1 - September 2018
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan daerah dikota jambi begitu pesat sampai perkembangan dari setiap daerah kecamatan. Perkembangan yang terjadi ketidak sesuaian ataupun ketidak seimbangan dari setiap daerah di suatu wilayah yang ada dikecamatan jambi timur. Permasalahan yang terjadi dari keadaan tersebut mengakibatkan perkembangan kehidupan social, ekonomi, kesehatan, pendidikan dan lainnya yang tidak seimbangan antar masyarakat. Penelitian ini bertujuan untuk menggambarkan pemetaan tempat-tempat public pada kota jambi khususnya pada kecamatan jambi timur. Pemetaan tempat menggunakan SIG dengan menggunakan data – data spasial Data spasial yang digunakan adalah titik koordinat berdasarkan garis bujur dan garis lintang secara geografi. Penelitian ini dilakukan dengan metode survey dan statistic yang dilakukan pada tahun 2016. Berdasarkan data spasial dan non spasial yang didapat melalui survei dari 150 tempat, dapat disimpulkan bahwa persebaran tempat/lokasi dengan kategori tempat Perdagangan/bisnis memiliki jumlah terbanyak dari segala kategori dimana pertumbuhan bisnis di Kecamatan Jambi Timur sangat cepat dengan 38,7% , sarana pendidikan 16,7%, Kantor pemerintahan 13,3%, fasiltas umum 9,3%, perbelanjaan 8%, perbankan 6 %, tempat kuliner 5,3%, pelayanan kesehatan 2,7% sedangkan untuk kategori tempat wisata tidak tersedia . Dengan hasil yang didapat maka bisa dikatakan persebaran tempat yang dimana dengan jumlah penduduk sebanyak 67.878 penduduk tidak seimbang, yang didominani dengan daerah perdagangan /bisnis dan daerah perkantoran pemerintah. Dengan demikian daerah kecamatan jambi timur ini perlu dikembangkan/ dibangun tempat pelayanan kesehatan, wisata yang baru di Kecamatan Jambi Timur untuk menunjang kehidupan masyarakat yang lebih baik.
Karakteristik Kelayakan Teknologi RFID sebagai Kebutuhan Bisnis pada Perusahaan Logistik di Indonesia: Sistematik Literature Review Erick Fernando; Derist Touriano; Dina Fitria Murad; Surjandy Surjandy
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol. 2 No. 2 (2019): Volume II - Nomor 2 - Maret 2019
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Developments in information technology affects an organization to become more advanced and better. Logistics company is one of the companies to implement information technology. One of the technologies that can be implemented RFID technology. RFID is a chip that stores a record or data. Thus RFID technology can be used as business requirements on a company that can help all company activities. In this study will explore the feasibility of a characteristic of RFID technology can be applied or can as the business needs of the logistics company is INDONESIA. In this paper use you methods Systematic literature review (SLR). This research resulted in three RFID characteristics: Real-time data processing, data tracking continuous and discrete data, reuse. Expected by this research can contribute to how a user can select and measure the characteristics of RFID technology so that the views of the system and the implementation of RFID technology into added value for the company rather as complementary technologies.
Investigating the Ethernet and Boolean Logic Hetty Rohayani; Erick Fernando; Derist Touriano
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 1: July 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v3.i1.pp194-199

Abstract

Write-ahead logging to work. After years of research that are typical in Moore's Law, validate multi-processor investigation, which embodies the principles of intuitive machine learning. Our focus in this paper is not on whether a symmetric encryption can be made metamorphic, probabilistic, adaptive, efficient wearable, and interposable, but rather the introduction of new wireless communication (SCHAH). The properties SCHAH highly dependent on the assumptions inherent in our framework; in this section, we consider the methodology which consists of n access point. Implementation of our applications are replicated, symbiosis, and with large scale yangmemiliki full control over homegrown database, as may be necessary in order to control and access points are not compatible. A collection of shell scripts contains about 85 x86 assembly instructions. Where the engine and is fully compliant courseware follows the sensor network evaluation, although SCHAH not able to give a lot of kernel at a time. 
Cyber informatics and Contrasting Extreme Programming with Boolean Logic Erick Fernando; Derist Touriano
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 1: July 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v3.i1.pp157-163

Abstract

Cyber information is the solution for e-commerce, in this study we investigated the LAN is needed and seek confirmation of the decision to use the method Red-Black Tree in forming binary search tree. Given the status of the wireless modalities and development of RAID, this study used a Bayesian tool in controlling identifier-locator split (palmate). In addition, to verify that Boolean logic and the model checking can collude to address this problem. In this paper, we verify that rasterization can be made strong, cooperative, and adaptive. Furthermore, we concentrated this study can be made so that IPv6 embedded, scalable, and highly-available. Our design for investigating encrypted algorithms is dubiously promising. Finally, we introduced an analysis of journaling file systems (Palmate), which we used to validate that local-area networks and replication are often incompatible.