Claim Missing Document
Check
Articles

Found 31 Documents
Search

ANALISIS SISTEM INFORMASI MENGGUNAKAN METODE IMPORTANT PERFORMANCE ANALYSIS (IPA) DAN CUSTOMER SATISFACTION INDEX (CSI) Purnomo, Hendri; Suta W, I Gede Pasek; Widiartha, I B K
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 9 No. 1 (2023): Oktober 2023
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v9i1.2983

Abstract

Universitas memberikan fasilitas internet gratis menggunakan jaringan nirkabel (wifi). Namun dalam pelaksanaannya terkadang jaringan ini mengalami gangguan-gangguan yang dapat menurunkan kualitas layanan yang diberikan. Untuk menjamin kualitas layanan, pihak universitas memberikan kuesioner secara online kepada mahasiswa yang menggunakan layanan tersebut. Metode yang digunakan untuk menganalisa hasil pengisian  kuesioner tersebut adalah dengan menggunakan metode Important Performance Analisys (IPA) dan Customer Satisfaction Index (CSI). Hasil analisa menggunakan metode IPA tersebut adalah pada periode Mei terdapat lima atribut kualitas layanan yang berada pada kuadran I dan periode Agustus 2014 terdapat tiga atribut yang berada pada kuadran I, yang dimana kuadran tersebut termasuk prioritas utama peningkatan layanan. Sedangkan untuk metode CSI didapatkan indeks tingkat kepuasan sebesar 0.552 pada periode Mei dan 0.568 pada periode Agustus 2014, nilai tersebut berada pada interval 0.51 – 0.65 yang berarti bahwa mahasiswa cukup puas atas layanan yang diberikan.
Forecasting of Rice Production Using a Linear Regression and Polynomial Regression Wibisana, Bayu; Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Purnomo, Hendri
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 1 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/jict.v6i1.232

Abstract

Rice is a staple food for most Indonesians. The growing population, which has already reached 278 million, is expected to lead to increased rice consumption. Therefore, it is important to have a system that can forecast rice production. Time series data can be used to forecast rice production. Two common time series forecasting methods are linear regression and polynomial regression. Linear regression is used for data that is linear, while polynomial regression is used for data that is non-linear. In this study, we evaluated the performance of linear regression and polynomial regression for rice production forecasting in West Nusa Tenggara Province from 2001 to 2022. The results showed that the polynomial regression model with 4-degree gave better results than the linear regression model. The RMSE and MAE for the polynomial regression model were 0.48 and 2.34, respectively, while those for the linear regression model were 0.97 and 0.87, respectively. The results of this study suggest that the polynomial regression model with 4-degree is a better choice for rice production forecasting in West Nusa Tenggara Province
Perancangan Arsitektur Enterprise Pada Yayasan Pembangunan Pondok Pesantren Bustanul Ulum Menggunakan Framework Gartner Irawan, Asep; Widi Nugroho, Handoyo; Purnomo, Hendri
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 16 No 2 (2024): Jurnal Penelitian Ilmu dan Teknologi Komputer (JUPITER)
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.11540490

Abstract

This study focuses on the design of an information system architecture at Yayasan Pembangunan Pondok Pesantren Bustanul 'Ulum using the Gartner Enterprise Architecture model. The main objective of this design is to develop and implement information technology that can enhance the efficiency and effectiveness of business processes and administrative management at the foundation. The design stages include analyzing environmental trends and business strategies, developing requirements, principles, and architectural models, as well as designing a future architecture that encompasses business, information, and technology architecture. The analysis results indicate an urgent need to upgrade IT facilities, develop documentation and authentication systems, and integrate the laboratory system. The implementation of this architecture is expected to support the foundation's goals in providing quality education and improving school management performance.  
JURNAL ASSESSMENT OF INFORMATION TECHNOLOGY GOVERNANCE USING COBIT 2019 FRAMEWORK (CASE STUDY OF NATAR MEDIKA HOSPITAL): PENILAIAN TATA KELOLA TEKNOLOGI INFORMASI MENGGUNAKAN FRAMEWORK COBIT 2019 (STUDI KASUS RS NATAR MEDIKA) Satria Kusuma, Lutvianus; Wasilah, Wasilah; Purnomo, Hendri
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 16 No 2 (2024): Jurnal Penelitian Ilmu dan Teknologi Komputer (JUPITER)
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.12577212

Abstract

This study evaluates the maturity level of various domains within the COBIT framework in an organization, as well as identifies the gap between current performance and expected performance. The collected data indicates significant differences in maturity levels for domains APO.07, DSS02, DSS.03, DSS.04, DSS.05, and MEA.01, with an average gap of 2.11. Based on these findings, various actions are recommended to improve maturity levels, including increased training and development, adoption of process automation, periodic assessments, improved monitoring and reporting, and more effective risk management. Implementation of these recommendations is expected to reduce the existing gap and enhance overall operational efficiency. Keywords: COBIT, Maturity Level, GAP Analysis, APO.07, DSS02, DSS.03, DSS.04, DSS.05, MEA.01
teknika DATA MINING TO PREDICTE STUDENT ACHIEVEMENT BASED ON SOCIO-ECONOMIC, MOTIVATION, DISCIPLINE AND PAST ACHIEVEMENT AT VOCATIONAL SCHOOL 1 PENAWARTAMA TULBABAG USING THE C4.5 ALGORITHM: DATA MINING UNTUK MEMPREDIKSI PRESTASI PESERTA DIDIK BERDASARKAN SOSIAL EKONOMI, MOTIVASI, KEDISIPLINAN DAN PRESTASI MASA LALU DI SMKN 1 PENAWARTAMA TULANG BAWANG MENGGUNAKAN ALGORITMA C4.5 Suroto, Suroto; Purnomo, Hendri; Estian Pambudi, Randi
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 16 No 2 (2024): Jurnal Penelitian Ilmu dan Teknologi Komputer (JUPITER)
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.12743856

Abstract

SMK Negeri 1 Penawartama Tulang Bawang is a school whose students come from various villages in the district. Most of the students come from families with limited economic conditions and low levels of education. These factors often affect the students' learning motivation. The aim of this research is to predict students' academic performance based on parents' socioeconomic status, motivation level, discipline level, and previous academic achievements using data mining methods with the C4.5 algorithm. This research employs a quantitative approach involving 606 tenth-grade students at SMK Negeri 1 Penawartama Tulang Bawang. Data collection methods used include documentation and questionnaires. The research results show that the prediction analysis using decision trees has an accuracy rate of 98.02%, precision of 94.44%, and recall of 77.27%.   Keywords: data mining, C4.5 algorithm, accuracy, precision, and recall
Pengembangan Media Pembelajaran Berbasis Augmented Reality Habibti, Hedis Wahda; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/284cx498

Abstract

Proses pembelajaran yang baik haruslah memuat aspek interaktif, menyenangkan, menantang, memotivasi dan memberikan ruang yang lebih bagi siswa untuk dapat mengembangkan kreativitas dan kemandirian, sesuai dengan bakat dan minat siswa. Media pembelajaran yang menarik juga sangat diperlukan bagi siswa SMK, dikarenakan dalam pembelajaran SMK lebih mengutamakan praktikum dari pada teori. Perlu dipertimbangkan dalam pemilihan media yaitu tujuan pembelajaran, efektif, mudah diperoleh, peserta didik, penggunaan, tidak kaku, biaya, dan kualitas. Salah satu perkembangan media pembelajaran yang saat ini masih baru adalah media pembelajaran dengan menggunakan Augmented Reality. Augmented Reality merupakan aplikasi penggabungan dunia nyata dengan dunia maya dalam bentuk dua dimensi maupun tiga dimensi yang diproyeksikan dalam sebuah lingkungan nyata dalam waktu yang bersamaan. Augmented Reality dapat digunakan dalam hiburan, kedokteran, mekanik, dan media pembelajaran. Augmented Reality dapat dibangun dengan menggunakan bantuan software Vuforia dan Unity 3D. Hasil akhir berupa media pembelajaran interaktif dengan Augmented Reality
Arsitektur Dan Organisasi Komputer Hariati, Veni Virda; Purnomo, Hendri; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/qp4zak31

Abstract

Artikel ini membahas tentang konsep dasar arsitektur dan organisasi komputer, jenis-jenis arsitektur komputer yang umum digunakan, serta pentingnya pengetahuan tentang arsitektur dan organisasi komputer dalam pengembangan sistem komputer. Konsep dasar meliputi struktur fisik sistem komputer dan cara sumber daya sistem digunakan untuk menyelesaikan tugas tertentu. Jenis-jenis arsitektur komputer yang dibahas meliputi arsitektur Von Neumann, arsitektur Harvard, arsitektur RISC, dan arsitektur CISC. Arsitektur RISC dan CISC adalah dua pendekatan yang berbeda dalam merancang instruksi dan set instruksi dalam arsitektur komputer. Arsitektur RISC juga cenderung menggunakan register-register yang lebih banyak, sehingga mengurangi ketergantungan pada akses ke memori utama.Di sisi lain, arsitektur CISC menggunakan set instruksi yang lebih kompleks dan beragam. Instruksi-instruksi dalam arsitektur CISC dapat melakukan tugas yang lebih kompleks dalam satu instruksi, seperti operasi aritmatika yang kompleks atau akses langsung ke memori. Set instruksi CISC biasanya lebih besar dan beragam, termasuk instruksi-instruksi yang jarang digunakan. Meskipun instruksi-instruksi dalam arsitektur CISC dapat lebih kompleks, eksekusi instruksi biasanya membutuhkan lebih banyak siklus dan waktu.Kelebihan arsitektur RISC termasuk eksekusi instruksi yang lebih cepat dan efisien, konsistensi dalam ukuran dan format instruksi, serta ketergantungan yang lebih rendah pada memori utama. Arsitektur RISC juga cenderung lebih mudah diimplementasikan dalam perangkat keras dan memungkinkan pipelining yang efisien. Namun, kelemahan arsitektur RISC adalah jumlah instruksi yang terbatas, yang mungkin memerlukan lebih banyak instruksi untuk melakukan tugas yang kompleks.Sementara itu, kelebihan arsitektur CISC termasuk kemampuan untuk melakukan tugas yang kompleks dalam satu instruksi, dukungan untuk instruksi-instruksi yang jarang digunakan, dan ukuran kode yang lebih kecil. Arsitektur CISC juga dapat mengurangi jumlah instruksi yang diperlukan untuk melakukan tugas yang kompleks. Namun, kelemahan arsitekturCISC adalah kompleksitas eksekusi instruksi yang dapat mempengaruhi kinerja, serta ketergantungan yang lebih besar pada memori utama.Dalam praktiknya, kedua arsitektur ini memiliki aplikasi yang berbeda dalam sistem komputer modern. Arsitektur RISC cenderung digunakan dalam perangkat berperforma tinggi yang membutuhkan eksekusi instruksi yang cepat, seperti dalam superkomputer, server, atau mikrokontroler. 
Pemanfaatan Digital Marketing Bagi Universitas Islam Al-Azhar (Unizar) Jatmiko, Danang Priyo; Purnomo, Hendri; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/w0hzjh09

Abstract

Digitalization an important role as a marketing media and transmission of academic/non-academic information. Therefore, analysis related to optimizing the use of digital marketing for Unizar. The hope, using digital marketing to expand the range of Unizar promotions to remote areas. Al-Azhar Islamic University (UNIZAR) is one of the oldest and well-known campus on Lombok Island, starting to develop digital systems in various aspects that support campus activities. UNIZAR realizes that digital marketing can reach all people wherever they are without any geographical or time boundaries. The digital system that UNIZAR has begun to use includes in the academic field using the Academic System called SIAKAD UNIZAR, as well as in utilizing social media as a means of massive promotion and publication. Even though Unizar has used digitization, its utilization is considered not optimal. This is of particular concern, because digitization plays an important role as a marketing medium or delivery of academic and non-academic information. Therefore, it is necessary to carry out an analysis related to optimizing the use of digital marketing for Unizar.. Digital marketing to promote Unizar using social media such as Facebook, Instagram and YouTube. The use of Instagram, and Youtube are social media with the most users, so it's more efficient to promote Unizar. And now time to change to use digital marketing in order to increase the number of prospective new students Unizar
Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/1vd4xe47

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Implementation of Virtual Routers for Network Simulation Purposes in Simulated Internet Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/qpt5xh24

Abstract

This research aims to implement a virtual router as a network simulation solution in an artificial internet environment. Artificial internets have become important in developing and testing applications and network protocols without the need for expensive physical infrastructure. In this study, researchers used virtual router software to create a network environment that can be customized according to user needs. Researchers evaluated the performance of virtual routers in simulating various network scenarios, including reliability, scalability, and security testing. The methods used include installing and configuring virtual routers, as well as using network simulation tools to build complex topologies. Researchers also carried out performance measurements to evaluate the latency, throughput and stability of the virtual router. The research results show that the virtual router is able to simulate the network environment well, providing complete flexibility and control to the user. Although there are some limitations, such as high resource consumption in some configurations, the advantages in terms of efficiency and ease of use make virtual routers an attractive option for network simulation on artificial internet. This research is expected to contribute to the development of more effective and efficient network simulation environments, as well as assist researchers and developers in testing and developing network technology without having to rely on expensive physical infrastructure