Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : Jurnal Mantik

360 DEGREES AND K-NEAREST NEIGHBOUR METHODS FOR LECTURER PERFORMANCE APPRAISAL SYSTEMS: 360 DEGREES AND K-NEAREST NEIGHBOUR METHODS FOR LECTURER PERFORMANCE APPRAISAL SYSTEMS Novita Br Ginting; Yuggo Afrianto
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.122 KB)

Abstract

The lecturer performance appraisal system functions to measure and evaluate the performance of the lecturers in a certain period of time. The purpose of this study is to apply the 360-degree and machine learning algorithm using the K-NN (k-nearest neighbour) method to model the lecturer performance appraisal system to be more objective and accountable. DP3 is List of Appraisal of Employee Work Implementation. DP3 data is used as knowledge datasets to be used as training data and test data for the classification process and prediction of lecturer performance values. The results obtained show the 360-degree method and K-NN is able to predict with 90% accuracy right on knowledge datasets that have not been normalized and K = 5 values. Hence, this model can then be used to become a lecturer performance appraisal system application.
Implementation of KIA Indicator Information System Web Based in Gunung Sindur Health Center, Bogor: Implementation of KIA Indicator Information System Web Based in Gunung Sindur Health Center, Bogor Jejen Jaenudin; Gibtha Fitri Laxmi; Puspa Eosina; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (939.034 KB)

Abstract

The Gunung Sindur Public health centre in its work area handles several villages, each of which has a number of Posyandu cadres in the village. Posyandu activities in addition to providing information about health, also facilitate the community in obtaining health services for mothers, infants and toddlers. In this activity, each village midwife must make a monthly report that is recorded in the cohort book to produce an evaluation as a reference to follow up the performance development activities, and the PWS-KIA calculation process is still done using conventional counting tools that are reported to the Puskesmas coordinator midwife and after it was reported to the Bogor District Health Office as a monitoring target and target for mothers and children so that in the storage of the MCH reporting archives it appeared to be poorly documented. Therefore, this research analyzes and develops a reporting information system to make it easier for coordinating midwives and village midwives to calculate monitoring indicators and document them. The research method for system development uses the waterfall method which consists of analysis, design, programming, and testing. The results of this study developed a web-based KIA indicator information system in the Gunung Sindur Bogor Puskesmas, input data will be processed automatically and presented quickly and neatly in the form of tables and graphs.
Mask Detection Using Framework Tensorflow and Pre-Trained CNN Model Based on Raspberry Pi Acep Ansor; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.946.pp1539-1545

Abstract

The use of masks is one of the health protocols for the community in public places and facilities in the context of preventing and controlling Covid-19. The covid-19 pandemic around the world has encouraged decision makers and various elements of society to take part in various fields and contribute to suppressing the spread of covid-19. Machine learning and computer vision are one of the branches of Artificial Intelligence (AI) and can be developed in various image recognition. In this study, a machine learning Application Program Interface (API) was used, namely Tensorflow and the pre-trained CNN model, and the Raspberry Pi, which is a mobile device as a system for detecting masks. The analysis was conducted to determine the accuracy, precision and recall (sensitivity) of the results of system implementation. The implementation results show that the use of transfer learning and fine-tuning is sufficient to help the model training process. When the model is run on the Raspberry Pi device, an accuracy percentage of 96% is produced on testing with image file input and 91% on testing with video input (realtime), 100% precision on testing with image file input and 80% on testing with video input (realtime) ). In the true positive rate (recall) performance, it was found 92% on tests with image file input and 100% on tests with video input (realtime). However, in this study, there are still type I errors in testing with video input (realtime) and type II errors in testing with image file input. In the future, it is hoped that there will be improvements and developments from this research by improving the quality of the dataset and using higher computational resources.
Design Of Automatic Sliding Doors On Lab Net Centric Computing Assisted With Arduino Mega Using Radio Frequency Identification (RFID) Based On Local Area Network (LAN): Design Of Automatic Sliding Doors On Lab Net Centric Computing Assisted With Arduino Mega Using Radio Frequency Identification (RFID) Based On Local Area Network (LAN) Enomi Muhamad Giri Salako; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.947.pp1336-1343

Abstract

The sliding door is currently still using the manual method by pushing it from the side by the arm so that many students pass into the Lab without knowing who accessed the door. For information on the use of the Lab room is very important. This study wants to provide a solution to these problems with a manual sliding door. The method in this study includes the analysis stage, the design stage, the implementation or implementation stage and the last one is the testing phase, the automatic sliding door in this study begins by detecting the card using RFID, when a card that already has access is detected, Arduino will command the servo motor to move the sliding door automatically and the LCD will show that it has simultaneous access with the green LED will light up. After the data from the RFID is read, Arduino will forward it to the web server via an Ethernet shield that has been connected using an RJ-45 cable then the server will forward it again to the database and then the database will be displayed on a website with a local area network network.
Fail Path Analysis on Openflow Network Using Floyd-Warshall Algorithm Ebim Fatur Rohman; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.959.pp1546-1550

Abstract

Software-Defined Network (SDN) is a new concept used to solve network problems by separating the control plane and data plane in a different device. Communication between the control plane and the data plane uses the Openflow scenario. SDN has several capabilities in many network technology methods and has been implemented, among others, for routing mechanisms. In routing, there are several problems including failure path. When a fail path occurs, the system will look for another shortest path using the Floyd-Warshall algorithm. The Floyd-war shall algorithm will be implemented using the POX controller. The implementation uses a mesh topology on the mininet emulator and pox as a controller. This research method includes analysis consisting of the preparation of hardware and software requirements, and analysis of how the system works, a design consisting of mesh topology, Floyd-war shall algorithm flowchart, propagation testing, throughput, and latency testing, implementation consisting of operating system installation, Mininet, POX, Applying Mesh topology to the Mininet Emulator, and Applying the Floyd-war shall Algorithm to the POX Controller, manually calculating the Floyd-Warshall algorithm on the mesh topology and testing which consists of testing propagation, throughput, and latency. Furthermore, testing with 3 tests is propagation, throughput, and latency. In testing the throughput and latency there are 3 scenarios.
Load Balancing Method Performance Analysis on Haproxy and Router OS Yoga Permana; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.961.pp1588-1596

Abstract

Increasing requests for client connections to servers on a network can cause a problem with server performance to decrease and too many user requests make the workload on the server increase rapidly resulting in the server being down, so we need technology that handles complex network usage. Then it can be solved with a load balancing system. Several studies on load balancing on haproxy and router OS with various algorithms applied will produce different performance, including round robin, least connections, and source algorithms on haproxy load balancing, while NTH, PCC, and ECMP on load balancing routers OS. Testing is done with 3 scenarios, scenario 1 with a load of 10 users, scenario 2 with a load of 20 users, and scenario 3 with a load of 30 users. The test parameters used are throughput, delay, and jitter using the webserver stress tool and wireshark. The results of the performance measurement of the load balancing method on haproxy generally show that the least connection is better than the round robin and source methods, this can be seen from the measurement figures for delay and jitter parameters that are best found in the loast connection method. While the results of the performance measurement of the load balancing method on the OS router, there are two, one shows that PCC is better, this can be seen from the measurement numbers of the delay and jitter parameters, then the second shows that the ECMP method is better, this can be seen from the throughput parameter measurement figures and delay.
Student Attendance Information System Using Web-Based Nodemcu ESP8266 Arif Sulistio; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.962.pp1597-1603

Abstract

Presence or attendance in educational institutions such as Ibn Khaldun University Bogor is an important aspect in supporting the course of the lecture system, currently the attendance system at Ibn Khaldun University Bogor, especially in the Informatics Engineering study program, still uses a conventional system where students still have to sign an attendance sheet at the time lectures. In this study, there are two problem formulations (i) How to design and implement student attendance system devices using radio frequency identification (RFID) technology and WEB-based NodeMCU ESP8266, (ii) How to test WEB to display information on the presence of Informatics Engineering students using Black Box. The purpose of this study consisted of two stages (i) Designing and implementing a student attendance system device using radio frequency identification (RFID) technology and WEB-based NodeMCU ESP8266, (ii) being able to implement WEB testing to display information on the attendance of Informatics Engineering students using Black Box. Where in this study the framework has four stages, namely (i) analysis, (ii) design, (iii) implementation and (iv) testing. The results obtained in the research (i) Design and implementation of student attendance system devices using radio frequency identification (RFID) technology and WEB-based NodeMCU ESP8266 (ii) Implementation of WEB testing to display information on the presence of Informatics Engineering students using Black Box and get results appropriate.
Prototype Control of Lighting Equipment Using Web-Based Arduino Microcontroller Afif Rafyan; Ritzkal Ritzkal; Yuggo Afrianto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.963.pp1604-1610

Abstract

Control of lighting equipment still uses the conventional way, namely by turning it on and off via a manual switch with the presence of light equipment control. It makes it easy for users to monitor or control lights anytime and anywhere with a note that the light equipment control will be applied using a WEB-based arduino microcontroller. From that background. remote control system, makes it easier for users to control and monitor room lights that are quite far away by conducting 4 stages of research (i) System Performance Analysis and Requirements Analysis (ii) Hardware Design Design, Schematic Design, Database Design, WEB Design, Topology Network (iii) Hardware Implementation and Software Implementation (iv) Testing. The results of this study are in the form of a control and monitoring system using a predetermined use with a system using the WEB. When the light is on, it will appear on the WEB which will become a printable report.
Implementation of nave bayes algorithm for routing recommendations in software defined network (sdn) simulation Yuggo Afrianto; Indriyawati; Ritzkal; Ade Hendri Hendrawan
Jurnal Mantik Vol. 6 No. 3 (2022): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.v6i3.2881

Abstract

Routing determines the route or path taken by packets and flows from sender to receiver. Software Define Networking (SDN) is a new concept for designing, building, and managing computer networks by separating controllers and devices. However, the development of a network that is currently increasing makes a computer network require a decision support mechanism, especially in determining the route or path taken by packets and flows from sender to receiver. This study aims to make a routing decision recommendation system using the Naïve Bayes algorithm using a QoS dataset including throughput, packet loss, delay, and jitter with Tiphon standards and QoS requirements for several applications on the network. Openflow protocol, Ryu controller, and simulation-based implementation using mininet were used in this study. The performance results show that the Naive Bayes algorithm can provide routing recommendations for www Browsing, Video Streaming HD, and VoIP Telephony applications with an accuracy of 91% and an average precision of 95%.
Co-Authors .S.T., M.Kom., Suhadi Acep Ansor Adhi Prakoso, Bayu Afif Rafyan Agus Rohimat Aidha Zulaika Ajmilah, Wika Alhadi, Ade Andes Andes Angelina, Putri Anggra Triawan Annisa, Sarah Chairul Arief Goeritno Arif Sulistio Aris Kurniawan Yusuf Asep Ramdan Sopyan Nurdin Asep Syaepudin Chaisar Putra, Ivanna Dahlia Widhyaestoeti Dedi Supriadi Desmy Riani Dewi, Kalih Puspita Didik Setiyadi Ebim Fatur Rohman EKO WAHYUDI Enomi Muhamad Giri Salako Fahrezi, Muhamad Rizky Falma, Nuru Fauzan, Ilham Rizq Fety Fatimah Firdaus, Fadhillah Firdaus, Yoga Hardi Fithri Muliawati Fitria Rachmawati Gibhta Fitri Laxmi Gibtha Fitri Laxmi Ginanjar, Hendra Hadi, Eko Halimatusyadiah, Halimatusyadiah Hannisa Rahmaniar Hasnin Hendrawan, A. Hendri Heru Sukoco Ibnu Hanafi Setiadi Ilma, Neng Indriyawati Indriyawati, Indriyawati Ivanna Chaisar Putra Jejen Jaenudin Komarudin Kurnia, Annisa Desri Leny Tritanto Ningrum M. Imam Sundarta Mahpulah, Siti Ainun Maswan, Maswan Maulana, Fachry Rizky Muchtar, Kaisha Az Zahra Ningrum, Almyanti Ningrum, Leny Tritanto Novita Br Ginting Nurhayati, Immas Nurzaelani, Mohammad Muhyidin Permana, Arisandi Anwar Prakosa, Bayu Adhi Pratini, Ratna Puspa Eosina Putra Pratama, Saga Eka Putri, Adriani Rianita Putri, Azzahra Safira Sekar Putria, Chairunnisa Melani Rendy Munadi Renea Shinta Aminda Ridhan Anggihadi Prayudha Ridwan Kurniawan Ritzkal, Ritzkal Rizky Amalia Sa'diah, Maemunah Sa'diyah, Maemunah Sajaratul Aini Sarah Chairul Annisa Sayaza, Mas Davino Setyorini Setyorini Setyorini Slamet Riyadi Slamet Riyadi Sonia, Neng Sulaikandi, Brisman Armansyah Suratun Suratun Suratun Suratun Syafrial Syafrial Syaiful . Tazkialaras Tjahjo Tri Hartono Triansyah, Muhammad Bugi Wahjuni, Sri Widyanto, Toto Wulandari, Berlina Yashintya Nelawati Yoga Permana Yunita Yunita