Bambang Purnomosidi Dwi Putranto
Universitas Teknologi Digital Indonesia

Published : 16 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 16 Documents
Search

PROGRAMMER'S PERSPECTIVE IN YOGYAKARTA ABOUT OBJECT ORIENTED PROGRAMMING (OOP) IN SOFTWARE DEVELOPMENT USING CORRELATION ANALYSIS Bagas Triaji; Cucut Hariz Pratomo; Bambang Purnomosidi DP
SINTECH (Science and Information Technology) Journal Vol. 4 No. 1 (2021): SINTECH Journal Edition April 2021
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/sintechjournal.v4i1.632

Abstract

Pesatnya perkembangan teknologi menghasilkan era digitalisasi. Permintaan pengembangan perangkat lunak dan insinyur perangkat lunak di berbagai sektor industri, bisnis, dan pendidikan sangat tinggi. Yogyakarta adalah kota pendidikan, dimana banyak perguruan tinggi dan universitas berdiri. Namun, calon programmer sering memiliki pemahaman yang kurang memadai tentang paradigma OOP dari perspektif praktisi industri IT. Oleh karena itu, survei berikut melibatkan praktisi programmer profesional dilakukan untuk menganalisis bagaimana mereka melihat Object-Oriented Programming (OOP) ketika mengembangkan perangkat lunak dan bagaimana pengalaman mereka, dengan menggunakan analisis korelasi. Penelitian ini dilakukan untuk mengkaji aspek yang mempengaruhi preferensi programmer terhadap OOP. Hasil analisis korelasi menunjukkan bahwa programmer yang lebih berpengalaman akan lebih memilih paradigma OOP untuk menyelesaikan proyek meskipun mengalami beberapa hambatan dalam implementasi OOP, tetapi mereka tidak yakin bahwa OOP akan tetap digunakan sebagai paradigma yang mumpuni di masa depan.
The Prediction on the Students’ Graduation Timeliness Using Naive Bayes Classification and K-Nearest Neighbor Anwarudin Anwarudin; Widyastuti Andriyani; Bambang Purnomosidi DP; Dommy Kristomo
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (471.02 KB) | DOI: 10.26798/jiss.v1i1.597

Abstract

The college quality can be seen from the level of punctuality of student graduation. The Prediction on students’ graduation timelines can be used as one of the supporting decisions to evaluate students’ performance. Currently, the Medical Laboratory Technology study program of STIKES Guna Bangsa Yogyakarta does not have tools to predict the level of students’ graduation punctuality early yet. The purpose of this study is to evaluate the application of the Naive Bayes Classification and K-Nearest Neighbor algorithms with predictive modeling of student graduation period. This study applied the academic data from students of the Medical Laboratory Technology study program for the Academic Year (TA) 2015/2016 to 2018/2019. This study utilized an experimental approach by comparing the methods of the Naive Bayes Classification (NBC) and K-Nearest Neighbor (KNN) algorithms. The validation model uses 5-fold Cross Validation, while the evaluation model uses a Confusion Matrix. The results illustrated that the prediction with NBC in this case obtained an accuracy of 96.11%, precision of 82.11% and Recall of 100.00%. Meanwhile, predictions using KNN obtained accuracy of 97.68%, precision of 100.00% and Recall of 86.11%. Thus, KNN is an algorithm with an enhanced level of accuracy to solve the case of predicting the timeliness of students’ graduation of the Medical Laboratory Technology Study Program STIKES Guna Bangsa Yogyakarta
Building a Knowledge Graph on Video Transcript Text Data Bagas Triaji; Widyastuti Andriyani; Bambang Purnomosidi DP; Faizal Makhrus
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (802.045 KB) | DOI: 10.26798/jiss.v1i1.585

Abstract

Youtube is a video platform which not only provides entertainment but also education in which knowledge can be dug based on video transcripts. The results of this knowledge can be formed as a knowledge graph to build a knowledge base that saves storage space. Moreover, it can be used for other purposes such as recommendation systems and search engines. Prosen built a knowledge graph using NLP to extract the text by identifying the subject-verb-object (SVO) and stored in the graph database. The construction of a knowledge graph on a Youtube video transcript was successfully carried out. However, there are still obstacles in the process of extracting text using NLP which is less optimal so it is possible that there is still a lot of knowledge that has failed to be obtained.
Analysis of Determining the Types of Wireless BTS Devices Using the Dude Implementation and Telegram Notifications on Internet Services Provider XYZ Robertus Saptoto; Bambang Purnomosidi DP; Widyastuti Andriyani; Rikie Kartadie
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3149.373 KB) | DOI: 10.26798/jiss.v1i1.603

Abstract

ISP XYZ is a company engaged in the field of Internet Service Providers (ISP). Network monitoring is something that an ISP must have in monitoring network router traffic, wireless Base Transceiver Station (BTS) traffic and wireless client traffic. Connections between BTS backbone and BTS use wireless devices. Because currently the main network (backbone) inter BTS to BTS uses wireless devices, sometimes disturbances occur such as frequency interference and high data loads on BTS which lead data distribution to customers disrupted. The factors that affect this incident are the number of similar frequency number usage, the distance between BTS to BTS, the type of wireless device that can no longer carry large data loads as its main source. Telegram makes it possible to send and receive text messages over the internet. In addition, the function of telegram is usable. This research will be used to determine policies for updating wireless devices, especially on the BTS to BTS backbone. Chat, video calls, shared photos and files, telegram supports bots. This bot will later be used to mechanize notifications from the dude application to telegram messages, which of course are connected to the internet. You can provide reports on the use of data traffic, wireless device data resources that are currently implemented.
Data Warehouse to Support the Decision Using Vikor Method Heri Muhrial; Bambang Purnomosidi.D.P; Widyastuti Andriyani; Hamdani Hamdani
Journal of Intelligent Software Systems Vol 1, No 2 (2022): Desember
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.731 KB) | DOI: 10.26798/jiss.v1i2.767

Abstract

Data warehouse is a place where data compilations are stored extensively and periodically. The ability of the data warehouse to integrate data lightens CV. Visi Indonesia Mandiri companies in evaluating and making decisions on operational, strategic and tactical processes. The problem is that the company has not provided a data warehouse yet. Moreover, there is no service to give out the needs of easy, consistent, valid and accurate information on operational data, tactical data and strategic data from the decision-making process at the executive level. The data warehouse architecture was established as decision making using the Vikor method analysis.
Price Intelligence Using K-Means Clustering and Linear Regression, Case Study of Store Dk Nutritionindo at Tokopedia Arma Fauzi; Bambang Purnomosidi DP; Faizal Makhrus; widyastuti Andriyani
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (503.929 KB) | DOI: 10.26798/jiss.v1i1.602

Abstract

The ability to find the right price recommendation will determine the fate of product sales in the market. This is necessary to prevent whey concentrate products from being sold in the market and to avoid customers fleeing or switching to other competitors. This study uses a price intelligence approach using the k-means clustering method for price grouping based on the closest competitor and demand forecasting using linear regression to determine fair and competitive prices. The results of the k-means clustering price of 145000 from dk nutritionindo are included in C4. The closest competitor has 7 prices cheaper and 5 prices more expensive. The highest price is 495000 and the lowest price is 90000. The results of the 26th month to 33rd month demand forecasting have 2 graphs up and 6 graphs down. Forecasting confusion matrix test produces 62.5% accuracy, 75% precision, 60% recall. With MAPE = 28.95% according to Lewis (1982) then the influence of forecasting is declared feasible (good enough). Because the trend chart illustrates a decline, it is recommended that the shop lowers the price with a recommended price range from 135000 to 90000.
Determining the Target of Independent Graduation for Beneficiary Families of the Hopeful Family Program Andre Argisitawan; Widyastuti Andriyani; Bambang Purnomosidi DP; Dommy Kristomo
Journal of Intelligent Software Systems Vol 1, No 1 (2022): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (774.907 KB) | DOI: 10.26798/jiss.v1i1.601

Abstract

The Family Hope Program (Program Keluarga Harapan) or better known as PKH is the conditional social assistance to the Poor Families which are designated as PKH Beneficiary Families. Self-Graduation is one of the goals of the PKH program, Self-Graduation is a condition in which the PKH Beneficiary Families is declared ‘passed’ from PKH participation with their respective awareness. This recommendation system uses the Simple Additive Weighting (SAW) method to calculate the criteria for several website-based alternatives with the Model View Controller concept.
IMPLEMENTASI SECURITY AUDITOR UNTUK STANDARDISASI INSTALASI SERVER PADA LAYANAN SAAS MENGGUNAKAN CIS BENCHMARK Muhammad Najib; Bambang Purnomosidi D.P; M.Agung Nugroho
Cyber Security dan Forensik Digital Vol. 5 No. 2 (2022): Edisi Bulan November tahun 2022
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2022.5.2.3929

Abstract

Pertumbuhan layanan sistem pada era ini semakin banyak dan variatif, termasuk juga adalah layasan SaaS. Pada layanan SaaS kebutuhan sebuah kemanan informasi itu cukup penting dan vital. Salah satu cara meningkatkan keamanan adalah dengan melakukan hardening pada server yang digunakan. Hardening dapat dilakukan jika memiliki data konfigurasi pada sistem dan kontrol terdahap isu-isu kemanan informasi. Penelitian ini bertujuan untuk mengimplementasikan CIS Security untuk mengetahui hasil audit dari CIS Benchmark berupa penilaian sehingga dapat meningkatkan keamanan sistem operasi Centos 6.10 dengan rekomendasi dari CIS Security ini. Sistem ini dibuat bertujuan untuk melakukan audit pada server dengan sistem operasi Centos 6. 10, kemudian hasil dari audit akan ditampilkan dalam data agar lebih mudah dibaca dan dapat dijadikan bahan untuk menjadi evaluasi bagi instalasi layanan SaaS agar lebih baik. Dalam sistem security auditor ini terdapat 2 buah server, masing-masing adalah server testing dan server pool. Server testing adalah server yang akan di audit menggunakan program audit yang disesuaikan dengan CIS Benchmark. Program audit ini ditulis dalam bahasa bash script. Hasil audit dapat dikirimkan ke server pool dan ditampilkan oleh server pool dengan halaman web. Pada server pool ini menggunakan PHP sebagai backend dengan manajemen datanya adalah mysql. Sedangkan menggunakan framework Bootsrap untuk meperindah frontend nya. Untuk enviroment server pool ini dijalankan dengan virtulasisasi docker. Berdasarkan analisa yang dilakukan sehingga diperoleh hasil yaitu sistem security auditor untuk standardisasi instalasi server pada layanan SaaS menggunakan CIS Benchmark. Untuk membangun sebuah security auditor membutuhkan standardisasi yang sudah diakui dunia. CIS Control memiliki kaitan penting dalam implementasi ISO 27001. Dalam sistem security auditor ini dapat memberikan nilai pada setiap hasil audit yang dijalankan pada server testing dengan CIS Benchmark berdasarkan CIS Control. Selain itu sistem ini memberikan ceklist data hasil audit yang dapat digunakan System Administrator untuk mengevaluasi intalasi server pada layanan SaaS. Kata kunci: audit keamanan sistem, CIS benchmark, CIS Control, CIS Security, ISO 27001 ------ The development of system services this year is increasing, especially SaaS services. In SaaS services, the need for information security is quite important. One of the solutions to improve security in the system is to harden the server used. Hardening can be done if you have configuration data on the design and controls for information security issues. This study aims to implement CIS Security to find out the results of an audit from CIS Benchmark in the form of an assessment so that it can improve the security of the Centos 6.10 operating system with recommendations from CIS Security. This research is building a system to conduct an audit on a server with the Centos 6.10 operating system; then, the audit results will be displayed in the data so that it is easier to read and can be used as material for evaluation for better SaaS service installations. In this security auditor system, there are two servers: a testing server and a pool server. Server testing is a server that will be audited using an audit program that is adjusted to the CIS Benchmark. This audit program is written in a bash script language. Audit results can be sent to the pool server and displayed by the pool server with a web page. This server pool uses PHP as the backend, with MySQL as data management. At the same time, use the Bootstrap framework to beautify the front end. The server pool environment is run with docker virtualization. Based on the analysis, the results are a security auditor system for standardizing server installations in SaaS services using CIS Benchmarks. Building a security auditor requires standardization that has been recognized worldwide. CIS Control has an important link in the implementation of ISO 27001. The system can give a value to each audit result run on the testing server with CIS Benchmark based on CIS Control. In addition, this system provides a checklist of audit results data that System Administrators can use to evaluate server installations on SaaS services. Keywords: network security auditing, CIS benchmark, CIS control, CIS security, ISO 27001  
ANALYSIS AND DESIGN OF DATA WAREHOUSE AND DATA MART BUDGET Hendra Maryanto; Bambang Purnomosidi Dwi Putranto; Rikie Kartadie; Muhammad Guntara; Robertus Saptoto
Journal of Intelligent Software Systems Vol 2, No 1 (2023): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v2i1.927

Abstract

University as higher education institutions must be able to manage budgets properly. The budget is a future financial plan which includes the expectations of university management. This research will design a data warehouse, which is a place where data can be stored on a large scale. In this research, a data warehouse will be designed as a place to store budget data. The method applied in this study is the Kimball method with a nine-step methodology. The result of this research is a data warehouse design and budget data mart
IOT BASED SOIL MOISTURE MONITORING AND SOIL MOISTURE PREDICTION USING LINEAR REGRESSION (CASE STUDY OF VINCA PLANTS) Kuindra Iriyanta; Bambang Purnomosidi Dwi Putranto; Widyastuti Andriyani
Journal of Intelligent Software Systems Vol 2, No 1 (2023): July
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v2i1.929

Abstract

Soil moisture is something that becomes important. Indonesia as an agricultural country, most of the population has a profession as a farmer. In agriculture, one of the important parts is the water composition in the soil or soil moisture. One attempt to maintain soil moisture is to provide sufficient water intake to the soil. However, in practice, it is sometimes complicated for farmers to do proper irrigation of their agricultural land. This humidity condition will ultimately determine the success of vinca plant cultivators. The accuracy of giving water both in terms of time management and volume are two things which are an important focus of vinca crop growing. This system is designed using a humidity sensor which is used to measure the moisture composition contained in the soil, and an air temperature sensor. The NodeMCU ESP2866 microcontroller acts as a link between Google spreadsheet sensors. NodeMCU ESP2866 will send humidity and temperature sensor reading data to Google spreadsheets using a RESTfull API which can connect one application to another. The sensor data is then saved to Google spreadsheet and processed using the linear regression method. The processing results will be displayed on the Google Data Studio dashboard. The output of this process is to provide information about soil moisture conditions, notification of soil moisture conditions if it is too dry or damp, thus the prevention of the death of vinca plants can be carried out. The benefit for users is that they can carry out periodic and real-time monitoring by simply using the Telegram instant messaging application, which is expected to reduce the risk of plant death due to drought or excessive watering