Claim Missing Document
Check
Articles

Found 6 Documents
Search

Penerapan Metode MOOSRA dan MOORA dalam Keputusan Pemilihan Produk Asuransi Terbaik Suryanto, Andik Adi; Alam, Sitti Nur; Widjaja, Warkianto; Wijaya, Hamid; Adhicandra, Iwan
Building of Informatics, Technology and Science (BITS) Vol 4 No 4 (2023): March 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i4.2938

Abstract

At present, public opinion regarding the selection of insurance products is very low because people still do not understand enough to insure themselves against a product that will guarantee their necessities of life. Especially now that there are so many insurance products out there, it's likely that people don't want to register for insurance. Therefore, people must be careful in choosing an insurance product so that it fits what they want. The Decision Support System is a computerized system and is designed to assist management in making decisions to solve semi-structured and unstructured problems so that the decision-making process can be of higher quality. This application that will be made is an application that is guided by the MOORA method. Therefore, an application that is guided by the MOORA method is very suitable for calculating insurance product selection. From the results of our research we conducted the MOOSRA and MOORA methods for selecting insurance products easier and more precise than the manual work method. applying the MOORA method produces an alternative A5, namely Prudential with a value of 0.217 as the best alternative.
A Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly Al Jum'ah, Muhammad Na'im; Wijaya, Hamid; Ismail, Rima Ruktiari
Cyber Security dan Forensik Digital Vol. 6 No. 2 (2023): Edisi Bulan November tahun 2023
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4265

Abstract

Perkembangan teknologi yang semakin pesat dapat menjadi dampak posistif dan dapat negatif. Dampak positifnya adalah proses penyebaran informasi yang semakin cepat, namun dampak negatifnya adalah banyaknya informasi hoax dan hate space yang terjadi di media sosial akibat tidak adanya filter dan pengecekan keabsahan informasi. Hal ini juga mengakibatkan banyaknya tindak kejahatan yang terjadi di media sosial. Salah satu pemecahan masalah dengan banyaknya kasus yang terjadi akibat penyalahgunaan media sosial adalah dengan melakukan proses invesitgasi forensic pada social media. Proses investigasi forensik ini dilakukan dengan metode live investigation menggunakan metode digital forensik proses yang terdiri dari proses Collection, Examination, Analysis dan Reporting. Proses pengumpulan barang bukti dengan menggunakan tools hunchly sehingga dapat dilakukan proses investigasi secara langsung. Hasil dari penelitian ini adalah dengan memanfaatkan metode digital forensik proses dan penggunaan tools hunchly untuk melakukan teknik live investigation untuk melakukan pengumpulan bukti digital dari akun-akun media sosial yang melakukan tindak kejahatan di media sosial sehingga dapat di proses sesuai dengan peraturan hukum yang telah berlaku Kata kunci: Bukti Digital, Media Sosial, Digital Forensik, Hunchly ------------------------------------------------------------------- The increasingly rapid development of technology can have both positive and negatif impacts. The positive impact is that the process of disseminating information is getting faster, but the negatif impact is the large amount of hoax information and hate space that occurs on social media due to the absence of filters and checking the validity of the information. This also results in many crimes occurring on social media. One solution to the problem with the many cases that occur due to misuse of social media is to carry out a forensic investigation process on social media. This forensic investigation process is carried out using the live investigation method using a digital forensic process method consisting of Collection, Examination, Analysis and Reporting processes. The process of collecting evidence uses powerful tools so that the investigation process can be carried out directly. The results of this research are by utilizing digital forensic process methods and using hunchly tools to carry out live investigation techniques to collect digital evidence from social media accounts that commit crimes on social media so that it can be processed in accordance with applicable legal regulations. Keywords: Sosial Media, Digital Forensics, Hunchly
A Comparative Analysis of Forensic Similarity and Scale Invariant Feature Transform (SIFT) for Forensic Image Identification Al Jum'ah, Muhammad Na'im; Wijaya, Hamid; Pomalingo, Suwito
ILKOM Jurnal Ilmiah Vol 16, No 3 (2024)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2357.371-381

Abstract

The image manipulation process has contributed to the widespread dissemination of false information. image forensics can help law enforcement agencies in addressing the spread of false news or information issues through visual media. Forensic image identification can be conducted using various methods, including Scale Invariant Feature Transform (SIFT) and Forensic Similarity. This study compared two methods, SIFT and Forensic Similarity, for forensic image identification. The test results showed the SIFT method identified image forensics by detecting image similarity through calculation of the key point values of each image. The process of searching the key point values was performed to extract information from the image. A high key point value indicated a large amount of information obtained from the image extraction results. On the other hand, the Forensic Similarity method also performed image forensic detection by examining whether image patches shared the same forensic traces. The advantage of the Forensic Similarity method over the SIFT method was that Forensic Similarity was more detailed because it involved many processes. Thus, Forensic Similarity was able to find similarities between two image patch objects. Additionally, the results obtained from the Forensic Similarity method were more detailed in detecting image similarity by considering the key point matching value and Cosine Similarity. Several previous studies have already implemented the SIFT and Forensic Similarity methods for image forensics, but there was no research that directly compared these two methods. This is the strength of this research. However, this study only used three data samples from three different devices for data collection. Future research can use a larger sample size to observe the comparison results
Kombinasi Metode Rank Reciprocal dan Composite Performance Index Untuk Sistem Pendukung Keputusan Promosi Jabatan Alamsyah, Dedy; Herdiansah, Arief; Wijaya, Hamid; Rusdianto, Hengki
J-INTECH (Journal of Information and Technology) Vol 12 No 1 (2024): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i1.1199

Abstract

Dalam konteks globalisasi dan persaingan bisnis yang ketat, promosi jabatan merupakan aspek strategis yang esensial bagi kelangsungan hidup dan pertumbuhan organisasi. Keputusan promosi yang objektif dan merata tidak hanya meningkatkan motivasi karyawan tetapi juga memaksimalkan potensi sumber daya manusia, meningkatkan produktivitas organisasi. Namun, penilaian kelayakan kandidat untuk promosi seringkali dihadapkan pada tantangan evaluasi kriteria yang kompleks dan subjektif. Penelitian ini bertujuan untuk mengembangkan Sistem Pendukung Keputusan (SPK) untuk promosi jabatan yang mempermudah pengambil keputusan menentukan pilihan yang objektif dan efisien dengan menggabungkan metode Rank Reciprocal (RR) dan Composite Performance Index (CPI). Metode RR mengurangi bias penilaian subjektif dengan memberikan bobot terbalik berdasarkan peringkat kriteria, sedangkan CPI mengintegrasikan berbagai dimensi kinerja menjadi satu indeks komprehensif, memungkinkan evaluasi holistik dari setiap kandidat. Output hasil perhitungan SPK yang diperoleh secara manual dalam studi kasus sesuai dengan output sistem, menunjukkan keabsahan perhitungan sistem. Disamping itu, hasil pengujian menggunakan pendekatan black-box testing juga memperlihatkan kemampuan sistem dalam menjalankan fungsinya dengan baik.
Analisis Efektivitas Metode Round-Robin dan Least-Connection dalam Load Balancing Terhadap Throughput Server Web Zahir, Ahmad Fatih; Wijaya, Hamid; Sanwasih, Mochamad; Arisantoso, Arisantoso
Jurnal Ilmiah Informatika dan Ilmu Komputer (JIMA-ILKOM) Vol. 4 No. 1 (2025): Volume 4 Nomor 1 March 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jima-ilkom.v4i1.52

Abstract

Peningkatan jumlah pengguna internet yang signifikan telah mendorong kebutuhan akan server yang lebih efisien dalam mengelola beban kerja yang semakin besar. Salah satu solusi utama yang diterapkan adalah load balancing, yang berfungsi untuk mendistribusikan lalu lintas secara optimal guna mencegah terjadinya kelebihan beban pada satu server tertentu. Penelitian ini bertujuan untuk menganalisis perbandingan efektivitas dua algoritma load balancing, yaitu Round-Robin dan Least-Connection, dalam mengoptimalkan throughput pada server aplikasi web dengan berbagai skenario beban kerja. Round-Robin mendistribusikan permintaan secara bergilir tanpa mempertimbangkan kondisi beban pada server, sedangkan Least-Connection menyesuaikan distribusi berdasarkan jumlah koneksi aktif pada masing-masing server, memungkinkan alokasi sumber daya yang lebih efisien. Hasil pengujian menunjukkan bahwa Least-Connection memiliki kinerja lebih baik dibandingkan Round-Robin, terutama dalam skenario beban tinggi. Pada beban maksimal 1.800 koneksi, algoritma Least-Connection mencatat throughput sebesar 10.373 kbps, sedikit lebih tinggi dibandingkan dengan 10.362 kbps yang dihasilkan oleh Round-Robin. Keunggulan ini menunjukkan bahwa Least-Connection lebih adaptif dalam menyesuaikan alokasi sumber daya server secara dinamis, mengurangi risiko bottleneck, serta meningkatkan efisiensi sistem dalam menangani lalu lintas yang berfluktuasi.
Implementation of Green IT-Based Cloud Computing for Energy Efficiency in Technology Companies Judijanto, Loso; Wijaya, Hamid; Ismail, Rima Ruktiari; Vandika, Arnes Yuli
West Science Information System and Technology Vol. 3 No. 01 (2025): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v3i01.1846

Abstract

The growing demand for energy-efficient and sustainable solutions has positioned Green IT-based cloud computing as a pivotal strategy for technology companies aiming to balance operational efficiency with environmental stewardship. This study conducts a systematic literature review of 15 Scopus-indexed documents to explore the benefits, challenges, and strategies associated with the adoption of Green IT-based cloud computing. The findings reveal that these practices significantly enhance energy efficiency, reduce operational costs, and minimize carbon footprints. However, challenges such as high implementation costs, technological complexity, and intermittent renewable energy sources impede widespread adoption. Strategies including the use of AI and machine learning, collaborations with renewable energy providers, and the establishment of standardized policies are identified as effective solutions. This study contributes to the growing discourse on sustainable IT practices and provides a roadmap for technology companies aiming to integrate Green IT principles into their cloud computing operations.