IJID (International Journal on Informatics for Development)
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Articles
216 Documents
A Design and A Development of A Web Based Purchase Information System
Solikin, Mokhamad;
Musyafa, Muhammad Akid;
Yazid, Ahmad Subhan;
Mulyanto, Agus
IJID (International Journal on Informatics for Development) Vol 2, No 2 (2013): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (993.919 KB)
|
DOI: 10.14421/ijid.2013.%x
The desire to manage a company to move forward is always there and will almost certainly have become one of the planned long-term targets since founding the company. As more and more competition in the business world we need accurate information. Thus, the required information could be obtained by providing good data that will be processed in the transaction among supplier companies so that these operations are performed thoroughly, quickly and efficiently in accordance with the times. This research will be applied to CV. Barokah Abadi. Development methods used in building design of this system is waterfall method. Software to build this system is CodeIgniter, Xampp which there is PHP, MySQL as the database. This system can be used for data processing purchases of goods made by the company. So that transaction data processing is not done manually anymore. This system also uses the LAN in the processing of selling and buying. By which, it can use many separate computers perform the purchases, but the processes run from the same system so that transactions are quicker and more efficient.
Analyzing the Accuracy of Answer Sheet Data in Paper-based Test Using Decision Tree
Edy Suharto;
Aris Puji Widodo;
Suryono Suryono
IJID (International Journal on Informatics for Development) Vol. 8 No. 1 (2019): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (456.284 KB)
|
DOI: 10.14421/ijid.2019.08101
In education quality assurance, the accuracy of test data is crucial. However, there is still a problem regarding to the possibility of incorrect data filled by test taker during paper-based test. On the contrary, this problem does not appear in computer-based test. In this study, a method was proposed in order to analyze the accuracy of answer sheet filling out in paper-based test using data mining technique. A single layer of data comprehension was added within the method instead of raw data. The results of the study were a web-based program for data pre-processing and decision tree models. There were 374 instances which were analyzed. The accuracy of answer sheet filling out attained 95.19% while the accuracy of classification varied from 99.47% to 100% depend on evaluation method chosen. This study could motivate the administrators for test improvement since it preferred computer-based test to paper-based.
CRM 2.0 within E-Health Systems: Towards Achieving Health Literacy & Customer Satisfaction
Muhammad Anshari;
Mohammad Nabil Almunawar;
Patrick Kim Cheng Low
IJID (International Journal on Informatics for Development) Vol. 1 No. 2 (2012): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2125.865 KB)
|
DOI: 10.14421/ijid.2012.01201
Customer Relationship Management (CRM) within healthcare organization can be viewed as a strategy to attract new customers and retaining them throughout their entire lifetime of relationships. At the same time, the advancement of Web technology known as Web 2.0 plays a significant part in the CRM transition which drives social change that impacts all institutions including business and healthcare organizations. This new paradigm has been named as Social CRM or CRM 2.0 because it is based on Web 2.0. We conducted survey to examine the features of CRM 2.0 in healthcare scenario to the customer in Brunei Darussalam.? We draw the conclusion that the CRM 2.0 in healthcare technologies has brought a possibility to extend the services of e-health by enabling patients, patient?s families, and community at large to participate more actively in the process of health education; it helps improve health literacy through empowerment, social networking process,? and online health educator. This paper is based on our works presented at ICID 2011.
An Analysis of Memory Usage in Web Browser Software
Oktavianita, Annisa Dwi;
Arifin, Hendra Dea;
Fauzi, Muhammad Dzulfikar;
Rifa'i, Aulia Faqih
IJID (International Journal on Informatics for Development) Vol. 5 No. 2 (2016): IJID December
Publisher : Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (270.498 KB)
|
DOI: 10.14421/ijid.2016.05204
A RAM or formerly known as a memory is a primary memory which helps swift data availability without waiting the whole data processed by the hard disk. A memory is also used by all installed applications including web browsers but there have been disappointed in cases of memory usages. Researchers use a descriptive quantitative approach with an observation, a central tendency and a dispersion method. There are 15 browsers chosen by random to be tested with low, medium and high loads to get their memory usage logs. Researchers proceed to analyze the log by using descriptive statistics to measure the central tendency and dispersion of data. A standard reference value from web application memory usage has been found as much as 393.38 MB. From that point, this research is successful and has been found the result. The web browser with the lowest memory usage is Flock with 134.67 MB and the web browser with the highest memory usage is Baidu with 699.66 MB.
Japanese Letter Pattern Recognition Application with Tesseract Engine
Akhmad Imam Fahrizal;
Ahmad Subhan Yazid;
Shofwatul Uyun
IJID (International Journal on Informatics for Development) Vol. 4 No. 2 (2015): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (733.244 KB)
|
DOI: 10.14421/ijid.2015.04202
Digital image processing is a field that is being cultivated by many researchers at this time because it is interesting to apply to various activities, both analysis and production activities. One branch of the digital image is pattern recognition. This study uses Tesseract as a tool to recognize patterns from Hiragana letters. This study was conducted to find out how much Tesseract was able to recognize a Japanese text and handwritten text. This study uses 1 image as training data containing 74 Hiragana letters which are processed through training for each letter. This study has several testing criteria based on font size and resolution to find the best results in pattern recognition. This pattern recognition system is able to do data training and recognize 74 Hiragana letters using the Tesseract Engine. The system can also recognize images with the best success percentage of 98.24% with an image resolution of 200dpi (dots per inch) at size 18. This system can also recognize handwritten images with the best percentage of success of 90% with 200dpi image resolution.
Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)
Muhammad Nur Alfani;
Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 7 No. 2 (2018): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (721.348 KB)
|
DOI: 10.14421/ijid.2018.07205
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
Hijaiyah Matching Games Using Html5
Pratami, Jauharoh;
Yazid, Ahmad Subhan;
Fatwanto, Agung
IJID (International Journal on Informatics for Development) Vol. 5 No. 1 (2016): IJID May
Publisher : Universitas Islam Negeri (UIN) Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (682.364 KB)
|
DOI: 10.14421/ijid.2016.05105
Hijaiyah letters are letters used in the writing of the Holy Qur'an. In learning hijaiyah letters, many children still have difficulties so alternative learning methods are needed to make children more interested in recognizing hijaiyah letters. Interactive hijaiyah learning using electronic media is also still rare. Of the several hijaiyah letter recognition applications which are available, it is also limited in the use of certain operating systems. This research uses the waterfall method. The technology used to build web-based games in this study is HTML5 because HTML5 has the advantage of the flexibility to run on various platforms through a browser. In addition, this application does not require an installation process like other applications, but simply by accessing the web page, the application can be used. The results of this study are Hijaiyah Match games that can be run on various operating systems through a browser. The test results show that this application can help children learn hijaiyah letters.
Automatic of Correction and Program Evaluation Using Web-Based Systems
Sunu Pinasthika Fajar;
Muhammad Dzulfikar Fauzi;
Maria Ulfah Siregar
IJID (International Journal on Informatics for Development) Vol. 2 No. 2 (2013): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (474.376 KB)
|
DOI: 10.14421/ijid.2013.%x
Assistant or lecturer in a practicum on algorithmic learning courses it often takes a long time to correct a task collected by the practitioner. The number of tasks that must be corrected many will require a longer time. To simplify the work of the assistant or the lecturer developed a system that automatically corrects tasks that are collected by the practitioners with the black box testing method, so that the assistant only needs to publish the task and wait for the task to be corrected automatically and view or download the correction results. With the existence of this system, it is expected that the correction of tasks will be more fast, easy, and effective, and make students more able to get grades better because students are allowed to collect their assignments many times to be satisfied with the value.
Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga
Rizki Dewantara;
Siska Iskandar;
Agung Fatwanto
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (467.063 KB)
|
DOI: 10.14421/ijid.2017.06205
High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.
A Review Paper on Big Data and Data Mining Concepts and Techniques
Prasdika Prasdika;
Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 7 No. 1 (2018): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (451.52 KB)
|
DOI: 10.14421/ijid.2018.07107
In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly