Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Journal of Intelligent Software Systems

Query Execution Performance Analysis of Column-Oriented Database in Dashboard Bagas Triaji; Widyastuti Andriyani; Totok Suprawoto; Muhammad Agung Nugroho; Rikie Kartadie
Journal of Intelligent Software Systems Vol 1, No 2 (2022): Desember
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (649.54 KB) | DOI: 10.26798/jiss.v1i2.768

Abstract

In making reports or dashboards from operational data, problems often occur in the query process with low speed in responding to an output, causing the server to experience overload. This condition often occurs in companies or higher education organizations in managing academic data. This condition can be improved by optimizing the database server by integrating relational databases with column-oriented databases to speed up query responses and save development costs. Based on the experiments that had been carried out, column-oriented has succeeded in optimizing with a significant difference in query execution time and the server does not crash.
Analysis of Determining the Types of Wireless BTS Devices Using the Dude Implementation and Telegram Notifications on Internet Services Provider XYZ Robertus Saptoto; Bambang Purnomosidi DP; Widyastuti Andriyani; Rikie Kartadie
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3149.373 KB) | DOI: 10.26798/jiss.v1i1.603

Abstract

ISP XYZ is a company engaged in the field of Internet Service Providers (ISP). Network monitoring is something that an ISP must have in monitoring network router traffic, wireless Base Transceiver Station (BTS) traffic and wireless client traffic. Connections between BTS backbone and BTS use wireless devices. Because currently the main network (backbone) inter BTS to BTS uses wireless devices, sometimes disturbances occur such as frequency interference and high data loads on BTS which lead data distribution to customers disrupted. The factors that affect this incident are the number of similar frequency number usage, the distance between BTS to BTS, the type of wireless device that can no longer carry large data loads as its main source. Telegram makes it possible to send and receive text messages over the internet. In addition, the function of telegram is usable. This research will be used to determine policies for updating wireless devices, especially on the BTS to BTS backbone. Chat, video calls, shared photos and files, telegram supports bots. This bot will later be used to mechanize notifications from the dude application to telegram messages, which of course are connected to the internet. You can provide reports on the use of data traffic, wireless device data resources that are currently implemented.
ANALYSIS AND DESIGN OF DATA WAREHOUSE AND DATA MART BUDGET Hendra Maryanto; Bambang Purnomosidi Dwi Putranto; Rikie Kartadie; Muhammad Guntara; Robertus Saptoto
Journal of Intelligent Software Systems Vol 2, No 1 (2023): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v2i1.927

Abstract

University as higher education institutions must be able to manage budgets properly. The budget is a future financial plan which includes the expectations of university management. This research will design a data warehouse, which is a place where data can be stored on a large scale. In this research, a data warehouse will be designed as a place to store budget data. The method applied in this study is the Kimball method with a nine-step methodology. The result of this research is a data warehouse design and budget data mart
DATA PIPELINE ARCHITECTURE FOR ACADEMIC INFORMATION SYSTEM AT AKADEMI TEKNIK BIAK Israel Mnsen, Heman Koreri; Purnomosidi, Bambang; Kartadie, Rikie; Kurnaedi, Didi
Journal of Intelligent Software Systems Vol 3, No 1 (2024): July 2024
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v3i1.1335

Abstract

In development a information system Intergrated, Architecture planning is the first step must be established. The planning of development in a information system is needed in order to a system can be running according to necessity. The data is used for this research, that is internal data of Biak Technical Academy College and external data of Institution of high education service at IV area in Biak Papua. The main goal of this research is design architecture pipelines data of ATB college. The architecture of pipelines is used for carrying resources of big data from one area to the other area in far distance to be efficiency. The method is used for this research, that is Estract Transform Load (ETL). The process of estract data is needed a special supporting library on apache spark in using library spark session. This spark session is established in order to call data of Biak Technical Academy college with csv extension can be run on apache spark. After the process of estract is established, apache spark will read data with csv extension and establish transform data. The process of transform data csv extension will be loaded in to a frame data as a output of processing ETL The result of research is apache spark technology can be easy for writers in design process information system of Biak Technical Academy and to be one of the best solution in processing Estract Load Transform (ETL) data with the big scale and real-time
BUILDING DATA WAREHOUSE FOR EMPLOYEE TRAINING MINISTRY OF LAW AND HUMAN RIGHTS Nugroho, Ari Fauzi Mukti; Kartadie, Rikie; Handayani, Latifah Nurrohmah; Isnaeni, Nenen; kholik, Moh. Abdul
Journal of Intelligent Software Systems Vol 3, No 2 (2024): December 2024
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v3i2.1500

Abstract

In order to improve and expand each employee's competency and knowledge, education and training are crucial for the Ministry of Law and Human Rights. They may also be utilized for employee mapping. In the past, it was necessary to gather data on things like the number of employees who attended a particular training, which training had reached its participant quota, and the number of graduates in each training. This required extensive processing and repeated cross-checking of data sources to make sure the data was accurate and legitimate before it could be compiled into a table for analysis. Information technology may be used to immediately process employee competence data and education and training results into information. Therefore, it is expected that the Nine Step method, which is part of the Kimball & Ross (2010), methodology will simplify and accelerate the process of processing training data into information presented for analysis and reporting purposes at the leadership level in each work unit. Keywords: data warehouse, OLAP, ETL, pentaho, kemenkumham, training 
Prediction of Cyber Attack Losses by Attack Type and Country with Visual Approach and Quantitative Statistics Kabahing, Sepfanner; Kartadie, Rikie; Aditomo, Sigit; da silva, Ivònia Fàtima Ruas; Xavier, Francisco; Nur aini, Nur aini
Journal of Intelligent Software Systems Vol 4, No 1 (2025): Juli 2025
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v4i1.2002

Abstract

Cyberattacks continue to be a major threat to the digital infrastructure of countries around the world, significantly impacting economic stability, data security and public trust. This research aims to analyze financial losses due to cyberattacks by country, attack type, and affected industry sector, utilizing a visual exploratory approach through interactive dashboards and descriptive statistical analysis. The data used includes 3,000 cyber incidents from 10 countries, covering various attack types such as DDoS, Phishing, Malware, and Man-in-the-Middle. Visualization was developed using Power BI with DAX (Data Analysis Expressions) SUMX aggregation formula to calculate Total_Loss in order to dynamically estimate the cost of loss based on user interaction. The analysis showed that DDoS and Phishing attacks were the most frequent attack types, while the Information Technology, Banking and Government sectors recorded the highest accumulative losses. Geographically, the UK, Germany and Brazil were the countries with the largest total losses, with the highest average loss per incident found in Man-in-the-Middle and Phishing attacks. The findings underscore the urgency for the government and private sector to develop more responsive and data-driven mitigation strategies. This research confirms that the integration of dynamic visualization systems with quantitative analysis not only improves understanding of attack patterns, but also supports the decision-making process in efforts to strengthen national cybersecurity in a sustainable manner