Claim Missing Document
Check
Articles

Found 6 Documents
Search

Evaluasi Estimasi Biaya Perangkat Lunak melalui Ekstraksi Katalog Dari Dokumen Spesifikasi Kebutuhan luqman fanani mz; Andi Ikmal Rachman; Suriansyah B; Gita Pratiwi; Agus Halid; Alviadi Nur Risal
Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) Vol 7 No 1 (2024): Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Lamappapoleonro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57093/jisti.v7i1.198

Abstract

Software cost estimation is an important early stage in the software development cycle. This process requires careful analysis of the project, taking into account various factors that affect cost and time to completion such as errors in the initial identification of what kind of software will be built and its utilization. One of the main challenges in budgeting is the lack of clear reference prices, which often results in the use of historical data as the basis for calculations. This research proposes a combination of methods to improve the accuracy and reliability of cost estimation, including text summarization and word2vec for sentence analysis and weighting, and catalog extraction to identify SRS documents as system features, including ambiguity features. The goal is to provide a more effective tool for future software project budgeting, ensuring cost estimation that matches the complexity of the project and proper assignment of experts. With this method, it is expected that companies can reduce the risk of miscalculation and inappropriate assignment of experts, thereby avoiding financial losses and project delays.
Peningkatan Kinerja Database melalui Teknik Batch Loading dan Parallel Processing pada Proses Load Data Suriansyah B; Andi Ikmal Rachman; Luqman Fanani; Agus Halid; Gita Pratiwi
Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) Vol 7 No 1 (2024): Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Lamappapoleonro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57093/jisti.v7i1.199

Abstract

Penelitian ini menganalisis berbagai teknik optimasi untuk meningkatkan performansi proses load data ke dalam sistem database. Teknik yang dievaluasi meliputi indexing, partitioning, parallel processing, dan batch loading. Studi ini bertujuan untuk menentukan teknik yang paling efektif dalam meningkatkan throughput, mengurangi penggunaan CPU dan memori, serta meningkatkan efisiensi I/O.Pada pengukuran baseline tanpa optimasi, waktu load data tercatat 120 detik dengan throughput 40.000 baris per menit, penggunaan CPU sebesar 75%, penggunaan memori 60%, dan efisiensi I/O sebesar 50 MB/s. Hasil eksperimen menunjukkan bahwa penerapan indexing meningkatkan throughput menjadi 54.500 baris per menit dan sedikit mengurangi penggunaan CPU menjadi 70%, tetapi meningkatkan penggunaan memori menjadi 62%. Partitioning menghasilkan throughput 66.700 baris per menit, penggunaan CPU 65%, penggunaan memori 58%, dan efisiensi I/O meningkat menjadi 46 MB/s. Parallel processing signifikan meningkatkan throughput menjadi 85.700 baris per menit dan efisiensi I/O menjadi 60 MB/s, meskipun meningkatkan penggunaan CPU dan memori masing-masing menjadi 80% dan 75%. Teknik batch loading menunjukkan peningkatan performansi terbaik dengan throughput 90.000 baris per menit, penggunaan CPU 78%, penggunaan memori 70%, dan efisiensi I/O mencapai 65 MB/s.Hasil penelitian ini mengindikasikan bahwa batch loading dan parallel processing adalah teknik paling efektif dalam meningkatkan throughput dan efisiensi I/O, meskipun dengan peningkatan penggunaan sumber daya sistem. Partitioning efektif untuk mengurangi penggunaan memori dan CPU, sementara indexing memberikan manfaat tambahan dalam performansi query. Pemilihan teknik optimasi harus disesuaikan dengan karakteristik data dan kapasitas sumber daya sistem yang tersedia
Pertukaran Data Pada Rumah Sakit Di Makassar Berbasis Xml Based andi ikmal rachman; Luqman Fanani Mz; Agus Halid; Suriansyah B; Gita Pratiwi
Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) Vol 7 No 1 (2024): Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Lamappapoleonro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57093/jisti.v7i1.200

Abstract

Data exchange in hospitals plays an important role in hospital information systems. The problem then arises when there are different systems in two places that want to be connected. The technology used must sacrifice business, cost and development, now a method of interoperability with XML (eXtensible Markup Language) has been proposed. This method can be applied in many distributed computing technologies and problems, especially for data exchange with different platforms. XML-based data exchange is becoming one of the standards in developing frameworks for information systems. This is done to find out whether the programming algorithms used in each program in the system are correct or there are still errors, besides that, what is even more important is whether the system built can meet its objectives. From the design process that has been carried out, it can be concluded that a method can be built that uses a data exchange system between two systems by utilizing XML Based data computing. The data must be easily understood by both parties so as not to cause communication errors so that when the system process can run smoothly.
Analisa Implementasi Sistem Informasi Dalam Demand Side Management Pada Gardu Induk Terhadap Faktor Beban Gita Pratiwi; Andi Ikmal Rachman; Agus Halid; Luqman Mz; Suriansyah -
Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) Vol 7 No 1 (2024): Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Lamappapoleonro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57093/jisti.v7i1.203

Abstract

In Demand Side Management (DSM) of Substation (GI), the application of information system can improve operational efficiency and optimize the distribution of electrical load. Siantan Substation (GI) is part of the Equatorial System, which is the electricity network in West Kalimantan. In 2019, GI Siantan's electricity usage by customers was still inefficient. This is especially true during peak load time (WBP), which is at 19.00. This research analyzes the implementation of information systems in demand side management (DSM) at Siantan Substation and its effect on load factor. The research shows that the implementation of DSM can improve the operational efficiency and stability of the substation by reducing peak loads and organizing load distribution evenly. The low load factor value is definitely caused by the high energy usage during WBP, which is 0.843. However, there was a decrease in the peak load value after simulating the implementation of Demand Side Management (DSM) with the load shifting method, which resulted in the load factor value increasing to 0.9045. Although there are constraints in training and system integration, the financial and operational benefits are substantial.
Rekontruksi Arsitektur DataBase untuk Peningkatan Proses Load Data Suriansyah B; Mz, Luqman Fanani; Rachman, Andi Ikmal; Pratiwi, Gita
Jurnal Media Informatika Vol. 6 No. 2 (2025): Jurnal Media Informatika
Publisher : Lembaga Dongan Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v6i2.5585

Abstract

Proses load data menjadi aspek yang sangat penting dalam pengelolaan sistem informasi yang melibatkan basis data besar. Namun, dengan meningkatnya volume data dan kompleksitas sistem, waktu yang dibutuhkan untuk memuat data menjadi semakin lama dan menghambat efisiensi operasional . maka dari itu kami akan memberi solusi dengan membahas pendekatan rekonstruksi arsitektur database untuk meningkatkan performa proses load data, dengan fokus pada optimasi pemrosesan dan pengelolaan data. Penelitian ini mengidentifikasi tantangan utama dalam arsitektur database tradisional, dan mengeksplorasi solusi berbasis teknologi terkini seperti penggunaan partisi, indeks, dan pipeline ETL yang lebih efisien. Dengan merubah arsitekture database dari sebelumnya penerapan ini meningkatkan kecapatan load data 51% dari arsitekture sebelumnya
Cyber Security Challenges and Solutions in Critical Infrastructure: A Systematic Review of Threat Spectrum, Systemic Vulnerabilities, and Multi-Level Protection Strategies Dengkeng, Andi; Halid, Agus; Pratiwi, Gita; Rachman, Andi Ikmal; B, Suriansyah; MZ, Luqman fanani
Journal La Multiapp Vol. 6 No. 5 (2025): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v6i5.2469

Abstract

Digital transformation has increased operational efficiency infrastructure critical, but at the same time also open new loophole against attack increasingly complex and destructive cyberspace. This study aims to identify spectrum threat cyber targeting infrastructure critical, analyzing vulnerability accompanying systemic, as well evaluate strategy multi-level protection used in mitigation risk cyber. Using approach qualitative through review methods systematically, this study examines 20 primary sources in the form of scientific journals, policy reports, and studies. case international published 2015–2024. The research results revealed that threats such as ransomware, Advanced Persistent Threats (APT), attacks AI -based, and zero-day exploits are becoming a form of attack dominant, with energy, health, and communications sectors as the main targets. Vulnerabilities systemic found in aspects of old technology that is not updated, governance weaknesse, as well as low awareness cyber at the level operational. Strategy effective protection nature layered, including perimeter security, access management, data encryption, training awareness, to response incidents and system recovery. This study recommends integration strategy adaptive, data -based protection risk, and supported by policies strong national to strengthen resilience cyber sector infrastructure critical.