Basmar, Muh. Fahmi
Unknown Affiliation

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Waterfall Method In The Development Of Information Systems In Supporting Transactional In Small Businesses Basmar, Muh. Fahmi; Yusuf, Muh.; Rachmat, Rachmat
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/infokum.v10i5.1061

Abstract

The application of the Waterfall technique to the development of sales information systems in small organizations is one way to increase sales process efficiency and effectiveness. The Waterfall technique is an organized and sequential approach to software development that begins with an analysis of user requirements and proceeds to system design. In this study, the Waterfall method is applied to the development of a sales information system determined by specifications for a small business with a relatively simple business process, namely the sales transaction process related to improving services in business transactions and the process of ordering items related to the inventory of items in the warehouse to be able to control whether items need to be restocked. The design employs a structured method, the Data Flow Diagram (DFD), beginning with the context diagram, DFD level, table design with the Conceptual Data Model (CDM), and interface design for the sales transaction process and arranging transactions.
Decision Support System On The Influence Of Leadership Style And Work Motivation Of Upri Makassar Employees Using Naive Bayes Algorithm Basmar, Muh. Fahmi; Racchmat, Racchmat; Yusuf, Muh.
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/infokum.v10i5.1073

Abstract

The personal quality of a leader depends partly on hereditary factors and is a hereditary psychophysical/physical-spiritual disposition, namely in the form of: intelligence, energy, body strength, mental flexibility, and moral steadfastness. And partly influenced by the socio-cultural environment and conditions of the times. The general assumption states that without leadership any organization will not be able to achieve its goals. Testing was carried out using the Naïve Bayes classification method. To simplify the process of analyzing data using the Naive Bayes algorithm, it is necessary to do data cleaning or preprocessing with the aim of eliminating noise or missing values. From the preprocessing of 320 data, 155 out of 155 can be used, 70% of which will be used as a training dataset as a test dataset. The Naive Bayes algorithm produces an accuracy value of 78.33%, precision 79.31% and recall 81.25%. From the research results it is proven that the Naive Bayes model has good accuracy. This can be seen from the results of the research evaluation that the Naive Bayes model is able to analyze the leadership style and motivation of good and bad employee performance using the data set used during the study.
IMPACT ANALYSIS OF COAL MINING ON WATER POLLUTION IN BUNATI VILLAGE, ANGSANA SUB-DISTRICT, TANAH BUMBU REGENCY, SOUTH KALIMANTAN Kasim, Hasni; Haslinda, Haslinda; Yusuf, Muh; Rachmat, Rachmat; Basmar, Muh. Fahmi
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/infokum.v10i5.1086

Abstract

The purpose of this study was to analyze the heavy metal mercury (Hg) component in coal mining waste water during mining activities. A field observation method has been used to continuously capture and monitor sampling at mining and processing sites. In the laboratory, tests for the content of metal mercury (Hg) in liquid waste from mine waste have been completed. The three components of the field survey are preliminary research, main research (sampling), and laboratory analysis. Air samples were fired at pre-tapped points based on waste conditions while fully appreciating the potential of about four points. The results showed that there were two air samples with very high mercury content, namely 5.0828 pp Hg at location 02 (ST.02) and 6.3060 pp Hg at location 3 (ST.03).
Analysis of algorithms and data processing efficiency in movie recommendation systems based on machine learning Rachmat , Rachmat; Yusuf, Muhammad; Basmar, Muh. Fahmi; Suherwin, Suherwin
Jurnal Mandiri IT Vol. 13 No. 2 (2024): CALL FOR PAPER !!! Scope Computer Science
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i2.358

Abstract

This study explores the use of content-based filtering and collaborative filtering algorithms in machine learning (ML)-based movie recommendation systems. The Collaborative Filtering and Content-Based Filtering algorithms work rather well, according to evaluation using Precision, Recall, and F1-Score metrics; Precision is approximately 0.82, Recall is approximately 0.85, and F1-Score is approximately 0.83. These findings show that both systems are capable of providing users with accurate and pertinent movie suggestions. The Collaborative Filtering and Content-Based Filtering algorithms work rather well, according to evaluation using Precision, Recall, and F1-Score metrics; Precision is approximately 0.82, Recall is approximately 0.85, and F1-Score is approximately 0.83. These findings show that both systems are capable of providing users with accurate and pertinent movie suggestions. The results demonstrate that both Collaborative Filtering and Content-Based Filtering produce highly accurate and relevant movie suggestions. When it comes to data processing, collaborative filtering is shown to be more effective than content-based filtering. The research advances the fields of information technology and computer science, especially in the creation of more precise and effective movie recommendation systems. The study also emphasizes how combining both algorithms in a hybrid approach could lead to even greater advancements in the creation of ML-based recommendation systems. Nevertheless, the study contains drawbacks, including the use of a small dataset and the failure to take into account additional variables that can affect movie choices. The goal of future studies should be to increase the dataset's size and take into account more aspects of the creation of movie recommendation systems.
Analisis Kerentanan Website SMK Muhammadiyah 2 Bontoala Makassar Menggunakan Metode OWASP (Open Web Application Security Project) Pahlawansah, Haniwijaya; Basmar, Muh. Fahmi; Yusuf, Muhammad
BIOS : Jurnal Teknologi Informasi dan Rekayasa Komputer Vol 6 No 2 (2025): September
Publisher : Puslitbang Sinergis Asa Professional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37148/bios.v6i2.180

Abstract

The official website of SMK Muhammadiyah 2 Bontoala Makassar plays a crucial role as a medium for information and services. However, its significance is often not matched by a verified security posture. The primary problem addressed in this study is the potential for unidentified cybersecurity vulnerabilities on the website, which malicious actors could exploit. To address this problem, a systematic vulnerability analysis was conducted based on the Open Web Application Security Project (OWASP) Top 10 framework. The testing process combined automated scanning using the OWASP ZAP tool with manual validation via penetration testing to ensure the accuracy of the findings. The assessment successfully identified several critical security flaws, primarily in the categories of Cross-Site Scripting (XSS) (A03:2021), Security Misconfiguration (A05:2021), and Vulnerable and Outdated Components (A06:2021). These vulnerabilities directly expose the website to risks of data breaches, unauthorized content modification, and service disruption. This study concludes by providing concrete technical recommendations for administrators to mitigate the identified vulnerabilities and strengthen the website's overall security posture.