Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementation Of The A* (A-Star) Algorithm For Website-Based Search Of Tourism Sites In The City Of Bengkulu Maliq, Ahmad Abdul; Darmi, Yulia; Deslianti, Dwita; Mahfuzi, AR. Walad
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 2 (2023): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i2.1213

Abstract

This study is entitled the implementation of the a* (a-star) algorithm for website-based search of tourism sites in the city of Bengkulu. The main problem ishow to build an information system search for the nearest tourism location in the city of Bengkulu. Information Systems search for this tourism locationusing the a* (a-star) algorithm method and this information system also displays information about existing tours. The a* (a-star) algorithm method was chosen because this method determines the shortest path between the starting and ending points of an existing tour. Based on the results of the discussionThe A-star algorithm is considered more effective in finding the shortest route. This is proven by testing the shortest route randomly and thoroughly 15 times for all tourist destinations. The results show that the routes generated on average are more effective and shorter than the routes generated on Google Maps.
EVALUATION OF INFORMATION SECURITY USING THE INFORMATION SECURITY METHOD (KAMI) Case Study: UPT TIK UNIVERSITY MUHAMMADIYAH BENGKULU Khairullah, Khairullah; Alam, RG Guntur; Mahfuzi, AR. Walad; Abdullah, Dedy; Fransiska, Nora
Jurnal TAM (Technology Acceptance Model) Vol 16, No 1 (2025): Jurnal TAM (Technology Acceptance Model)
Publisher : Institut Bakti Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jurnaltam.v16i1.1802

Abstract

In the rapidly evolving digital era, educational institutions increasingly rely on information technology to manage data. However, information security is a critical issue because institutional data is an asset that is vulnerable to threats. This research aims to analyse how the OUR Index Method works in evaluating and measuring the level of information security at UPTIK. The methods used in this research include literature study to understand the concept of information security, primary data collection through interviews and questionnaires, and secondary data from policy documents and audit reports. Data analysis was conducted to compare the condition of information security at UPTIK with the standards set by OUR Index, which is based on SNI ISO/IEC 27001. The expected result of this research is a deeper understanding of the maturity level of information security at UPTIK, as well as the identification of weaknesses and potential risks. With this evaluation, it is expected that institutions can improve their information security posture, prepare for threats, and ensure that the security system implemented is in accordance with applicable standards. This research is expected to make a significant contribution to the management of information security in the educational environment, as well as a reference for other institutions that want to conduct similar evaluations.