cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta timur,
Dki jakarta
INDONESIA
Jurnal Pilar Nusa Mandiri
Published by STMIK Nusa Mandiri
ISSN : 19781946     EISSN : 25276514     DOI : -
Core Subject : Science,
Jurnal Pilar merupakan jurnal ilmiah yang diterbitkan oleh program studi sistem informasi STMIK Nusa Mandiri. Jurnal ini berisi tentang karya ilmiah yang bertemakan: Rekayasa Perangkat Lunak, Sistem Pakar, Sistem Penunjang, Keputusan, Perancangan Sistem Informasi, Data Mining, Pengolahan Citra.
Arjuna Subject : -
Articles 418 Documents
FEASIBILITY TEST OF POOR RICE RECIPIENTS IN BENCOY SUKABUMI VILLAGE USING NAIVE BAYES Hidayatulloh, Taufik; Winardi, Ardi; Yusuf, Lestari; Suhada, Satia; Bahri, Saeful
Jurnal Pilar Nusa Mandiri Vol 17 No 1 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i1.2227

Abstract

A regional head must have a work plan every regional head must have a work plan which is sure to be of benefit to the community. Assisting is a definite work plan in every region. A lot of assistance is usually given from the government to the community and must be managed by the village government so that the aid gets to the right hands. And to improve food security, the people in each region have activities to distribute Poor Rice as a subsidy from the government. In the distribution method, sometimes there are constraints in data collection so that poor rice or what we usually call Raskin is not suitable for distribution. Because of this, a way is needed so that the distribution is appropriate or not in the community in accepting the Raskin so that government assistance can be delivered properly and on target. By using secondary data obtained from Bencoy Village, 205 data were obtained containing the attributes of the eligibility category of Raskin recipients, and 6 categories of attributes were found with the classification method of the Naïve Bayes algorithm. The accuracy value obtained is 96.59%, proving that the prediction using the Naive Bayes algorithm has a good performance. The next results obtained are in the form of AUC value which after being calculated produces a value of 0.999 and this results in an application which is an implementation with a flow that is adjusted to the calculation algorithm in the form of a web-based application.
IDENTIFICATION OF THE DOMAIN PROCESS INTERSECTIONS BETWEEN COBIT 4.1 AND COBIT 5 IN THE DETERMINATION OF IT GOVERNANCE ASSESSMENT Nurtrisha, Widyatasya Agustika
Jurnal Pilar Nusa Mandiri Vol 17 No 1 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i1.2229

Abstract

The implementation of information technology has an essential role in organizational development to support a business process. Currently, information technology is widely adopted by the organization. It is believed to help improve the efficiency of the ongoing business process so that IT management is needed in a more structured. Thus, need a guideline that can guide IT governance so it can be measured and utilized. COBIT is one of the frameworks that can utilize in providing IT governance guidelines for organizations, and it is the main reference used in implementing IT governance in organizations. Still, the assessment process takes a long time because many processes are assessed. So conducted this research to determine the similar activities between COBIT 4.1 and COBIT 5 as the basis for determining the development of an organizational assessment process that the organization will carry out to see the efficiency of the assessed process domain. This research is focused on several organizations that have carried out IT governance assessments with COBIT 4.1 and will then implement the assessment process using COBIT 5. Still, it will usually take more time and effort if done separately to streamline the assessment process and identify domain intersects. The process from COBIT 4.1 and COBIT 5 so that the effort to carry out the assessment can be more streamlined. Thus, this research will produce a study result related to which activities intersect with each other to determine the IT governance assessment in an organization.
COMPARISON OF APPLE IMAGE SEGMENTATION USING BINARY CONVERSION AND K-MEANS CLUSTERING METHODS Nurdiani, Siti; Rezki, Muhammad; Dahlia, Rizka; Ihsan, Muhammad Ifan Rifani; Frieyadie, Frieyadie; Fauziah, Siti
Jurnal Pilar Nusa Mandiri Vol 17 No 1 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i1.2256

Abstract

Apples are quite popular consumption among the community and have different kinds of shapes and colors. Apples themselves have many nutrients and various vitamins including fat, as well as energy, carbohydrates, protein, vitamin C, vitamin A, vitamin B2, vitamin B1, and many more. Because of the variety of types of apples, it is difficult for people to distinguish between these types of apples. However, with the development of technology and sophistication, it is now possible to classify the types of apples using digital images. This study aims to segment the image of apples by comparing 2 methods at once to find out which method is the best. This process is an initial stage that must be done before classifying. From the comparison results of apple image segmentation with binary conversion methods and k-means clustering, it can be concluded that the best method is k-means clustering. Because it can segment the image of apples almost perfectly.
The CLUSTER ANALYSIS OF SALES TRANSACTION DATA USING K-MEANS CLUSTERING AT TOKO USAHA MANDIRI Fithri, Fauzia Allamatul; Wardhana, Sukma
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2273

Abstract

Data mining is a process to obtain useful information from a database warehouse in the form of knowledge. Data transaction history of sales can be information for a business decision. Toko Usaha Mandiri has a problem with the stock of goods, and there are passive goods that settle in the warehouse for a relatively long period. Previous research conducted data analysis to form data clustering into useful information. This study aims to analyze sales data by applying the K-Means Clustering algorithm to form sales clusters. The results of data clustering form cluster1, cluster2 and cluster3 with percentage values of 62% (11 data), 8% (56 data) and 30% (25 data), respectively. Cluster validation of K-Means Clustering algorithm with Davies Bouldin Index produces a value of 0.2. The information of sales clustering can be an alternative solution, input for stock management and marketing strategies.
INFORMATION SECURITY POLICY AND SOP AS THE ACCESS CONTROL DOCUMENT OF PT. JUI SHIN INDONESIA USING ISO/IEC 27002:2013 Sukmaji, Muhammad; Yasirandi, Rahmat; Makky, Muhammad Al
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2282

Abstract

PT. Jui Shin Indonesia as the research population is a company engaged in the ceramics, granite, and cement industry. The existence of important assets owned by the company can not be denied the threat that will occur in these important assets. The importance of a company's assets, then the company must maintain the security of assets with various efforts. The security that must be maintained in this study is the security of information related to accessing control of important assets of the company. The purpose of this research is to analyze and design policy documents and SOP (Standard Operating Procedure) access control related to information security. This is done to minimize the risk that occurs in important assets of the company. The method used in this study is the OCTAVE method as a method of identification against risks that will occur in important assets of the company and the FMEA method as a method of risk analysis against the risk that has been identified through the OCTAVE method. The final result of this study is the creation of policy documents and access control SOPs related to information security which refers to the ISO/IEC 27002:2013 framework that focuses on clause 9. Access Control. Based on the results of the study, the researchers received proposals for policy document-making and SOPs as much as, namely, 17 for policy document-making and 18 for the creation of SOP documents.
THE COMBINATION OF AHP AND TOPSIS METHODS IN DETERMINING THE RANKING OF RECOMMENDATIONS FOR IMPROVEMENT OF INFORMATION TECHNOLOGY SERVICES Fitrani, Laqma Dica
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2319

Abstract

In order to improve the quality of information technology unit, XYZ University has to measure and improve the services based on a best practice framework. ITIL 3rd version was chosen to determine the service level of this unit. ITIL V3 was focused on two domains, specifically Service Operations to measure the service improvements problems and Continual Service Improvement to establish improvement continously. The measurement showed that the maturity level of IT services in the information technology unit on the Service Operation domain was at level 3 and Continual Service Improvement was at level 2, and each gap value was 1.5 and 1, respectively. The level calculation resulted in 14 recommendations that must be applied by information technology unit of XYZ University. The recommendations were applied by implementing a decision making system use the combination of AHP and TOPSIS method. AHP was needed to decide the weights of the predetermined criteria, while TOPSIS was used in calculation to rank the available alternatives. The top to bottom ranking of the 14 recommendations was Service Operation Processes, CSI Methods and Techniques, Implementing CSI, Organizing for CSI, Service Management as a Practice, Service Operation Technology Consideration, CSI Technology Considerations, CSI Processes, Common Service Operation Activities, Organizing Service Operations, CSI service Management as a Practice, CSI Principles, Service Operation Principles, and Implementing Service Operations.
PROTOTYPING MODEL IN INFORMATION SYSTEM DEVELOPMENT OF AL-RUHAMAA' BOGOR YATIM CENTER FOUNDATION Wulandari, Dewi Ayu Nur; Bahar, Asyil Alfin Halani; Arfananda, Muhammad Ghifari; Apriyani, Helina
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2375

Abstract

The information system for providing donations at the Al-Ruhamaa' Bogor Yatim Center Foundation is still not computerized, through donors coming to the location directly or through bank services, then confirmed via social media such as WhatsApp, and receiving proof of donation in the form of a receipt. The management of the Al-Ruhamaa' Bogor Yatim Center Foundation stills using Microsoft Excel to prepare donation reports. Based on the existing problems, it is necessary to develop an information system for distributing donations that can facilitate the management and the donors of the Al-Ruhamaa' Bogor Yatim Center Foundation. The system will be developed using one of the techniques commonly used in software development is called the prototyping model. the prototyping model is a technique to collect certain information about the user's information needs quickly which focuses on aspects of the software to be presented that will be visible to the customer or user. After the system is implemented, it is found that by using this Information System, the donation transaction process becomes more efficient. Calculation of the number of donations collected can be done automatically and accurately. In terms of reporting, the system can be present donation reports automatically and is ready to print whenever needed. Data storage for documentation of activities carried out by the foundation also saves space because the information can be accessed anytime and anywhere.
IMPLEMENTATION OF C4.5 ALGORITHM IN CLASSIFYING BREAST CANCER BASED ON MENOPAUSE AGE Dari, Wulan; Miranda, Nisrina
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2315

Abstract

Breast cancer is a malignant tumor that can attack breast tissue, is a disease that is most feared by women. Although based on recent findings not only women are affected by breast cancer, it turns out that men can get breast cancer, although it is still very rare. Breast cancer is one type of cancer that is often experienced by women in Indonesia. Data mining is a process that uses statistical, mathematical, artificial intelligence and machine learning techniques to interact and identify useful information and related knowledge from large databases. Breast cancer is much feared by women as well as young and old age which can lead to death, if as early as possible for a full examination, this lump initially shrinks, but over time it enlarges, then sticks to the skin or causes changes in the skin of the breast (nipple). But the skin or nipple is pulled inward (retraction), light redness, or browning, until swelling, shrinking or sore breasts get worse the old ones will get bigger and deeper so that they can crush the one breast often smells bad and bleeds easily . C4.5 algorithm and decision tree are two inseparable models, because to build a decision tree, C4.5 algorithm is needed. Decision trees are one of the most popular classification methods because they are easy for humans to interpret. A decision tree is a predictive model using a tree structure or hierarchical structure. The concept of a decision tree is to convert data into a decision tree and decision rules.
PREDICTION OF PUBLIC SERVICE SATISFACTION USING C4.5 AND NAÏVE BAYES ALGORITHM Umaidah, Yuyun; Enri, Ultach
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2403

Abstract

One of the things that has often been questioned lately is in the field of public services, especially in terms of the quality or service quality of government agencies to the community, the Manpower and Transmigration Office of Kab. Karawang is a government agency in charge of public services. where one of the tasks is to make an AK.1 card (yellow card), based on this problem the Manpower and Transmigration Office of Kab. Karawang Regency. Karawang seeks to improve service quality in order to satisfy consumers by distributing questionnaires to every consumer who is making an AK card.1. In this study, we will apply the C4.5 and Naïve Bayes algorithms to predict the satisfaction of public services with the nominal type of dataset used. The evaluation is done based on a comparison of the level of accuracy, precision, recall, and F-Measure using a confusion matrix. From the research that has been carried out, the Naïve Bayes algorithm with 70% training data distribution and 30% testing is able to provide better predictive results than the C4.5 algorithm as evidenced by the accuracy value = 96.89%, precision = 95.50%, recall = 95.00% and f-measure = 94.60%.
ONLINE THESIS GUIDANCE INFORMATION SYSTEM (SI-BISA) TO IMPROVE THE EFFECTIVENESS OF THESIS GUIDANCE ACTIVITIES AT THE UNIVERSITY OF TECHNOLOGY MATARAM Juhartini, Juhartini; Arwidiyarti, Dwinita; Hambali, Hambali
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2656

Abstract

The Covid-19 pandemic has hit the whole world since the beginning of 2020, making many activities unable to run as usual. Likewise, the thesis mentoring process, which is usually carried out face-to-face with the supervisor by the agreed schedule, is no longer possible due to an appeal from the government to work and study from home so that the mentoring process becomes constrained. Instead, the mentoring process through e-mail or WhatsApp application, where the supervisor will correct the thesis, provide notes for improvement, and send it back to students. E-mail and WhatsApp as media in the mentoring process is used. However, it will make it difficult for lecturers to find out recordings of the student. Besides, it is still possible for thesis files to be scattered or lost because there is only one student. The research aims to produce an online thesis guidance application called SI-BISA. The research was conducted using the Waterfall Model, resulting in the SI-BISA application in the PHP Programming Language with the CodeIgniter 4 Framework. The system design used the Unified Modeling Language and system testing using the Black Box Method. Given the long-lasting Covid-19 pandemic, an online thesis guidance application is very urgent. So that the thesis mentoring process can continue to run effectively even without face-to-face and the need to build an integrated information system to make it easier for supervisors to monitor the progress of their guidance students and improve the effectiveness and service of thesis guidance provided to students.

Filter by Year

2007 2026


Filter By Issues
All Issue Vol. 22 No. 1 (2026): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe Vol. 21 No. 2 (2025): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe Vol. 21 No. 1 (2025): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe Vol. 20 No. 2 (2024): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe Vol. 20 No. 1 (2024): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Pe Vol 19 No 2 (2023): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 19 No 1 (2023): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 18 No 2 (2022): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 18 No 1 (2022): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 17 No 1 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 16 No 2 (2020): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 16 No 1 (2020): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri Vol 15 No 1 (2019): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 15 No 2 (2019): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 14 No 1 (2018): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 14 No 2 (2018): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 13 No 1 (2017): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 13 No 2 (2017): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 12 No 1 (2016): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 12 No 2 (2016): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 11 No 1 (2015): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 11 No 2 (2015): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 10 No 1 (2014): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 2 Vol 10 No 2 (2014): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb Vol 9 No 1 (2013): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 20 Vol 9 No 2 (2013): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septembe Vol 8 No 2 (2012): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septembe Vol 3 No 4 (2007): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Maret 20 More Issue