cover
Contact Name
Terttiaavini
Contact Email
avini.saputra@yahoo.com
Phone
-
Journal Mail Official
avini.saputra@yahoo.com
Editorial Address
-
Location
Kota palembang,
Sumatera selatan
INDONESIA
Jurnal Informatika Global
ISSN : 2302500X     EISSN : 24773786     DOI : -
Core Subject : Science,
Journal of global informatics publish articles on architectures from various perspectives, covering both literary and fieldwork studies. The journal, serving as a forum for the study of informatics, system information, computer system, informatics management, supports focused studies of particular themes & interdisciplinary studies in relation to the subject. It has become a medium of exchange of ideas and research findings from various traditions of learning that have interacted in the scholarly manner as well become an effort to disseminate on computer research to the International community.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 14 No. 2" : 7 Documents clear
Clustering Daerah Rawan Bencana Alam Di Indonesia Berdasarkan Provinsi Dengan Metode K-Means Azizah Baldah; After Valent Duarisah; Rizky Akbar Maulana
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3186

Abstract

Indonesia is a country located in a strategic geological position and is at the confluence of three world plates. This position causes Indonesia to become a country frequently hit by natural disasters such as earthquakes, landslides and other natural disasters. Based on data obtained from the Regional Disaster Management Agency (BPBD), from year to year the number of natural disasters always increases. The increase in the occurrence of natural disasters has led to the need for further research to find out how vulnerable areas are in Indonesia and can later reduce the risks posed when natural disasters occur. Researchers will use the K-Means Clustering method to classify natural disaster areas based on their level of vulnerability to natural disasters. Clustering is a process for grouping data into several clusters or groups. K-Means is a method for grouping non-hierarchical data (partitions) which can divide data into two or more groups. The source of this dataset comes from the Central Bureau of Statistics (BPS) and consists of 12 columns and the data used are landslides and no natural disasters. Then a search for the optimal K value was carried out using the elbow method and Silhouette Analysis which produced 2 clusters namely cluster 0 and cluster 1. The results of the clustering indicated that cluster 1 was classified as a disaster-prone area in Indonesia including Aceh, North Sumatra, West Java, Central Java, East Java.
Penerapan Algoritma K-Means Untuk Clustering Harga Rumah Di Bandung Briyan Gifari Aji; Dwi Chandra Aditya Sondawa; Muhammad Rifky Gifari; Sena Wijayanto
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3189

Abstract

The need for shelter is one of the fundamental aspects of daily life for humans. A house serves not only as a place to seek protection and rest but also as a venue for socializing with family. One of the factors influencing the decision in choosing a house is its price. House prices vary in each region, depending on factors such as location and other attributes. In major cities like Bandung, house prices differ based on their categories. However, many people still find it challenging to determine the value and discern whether a house is classified as affordable or expensive. Hence, there is a need for a clustering process of house prices in Bandung to aid in comprehending and categorizing house prices based on attributes such as the house price, total building area, and total land area. To understand and analyze the patterns of house prices in Bandung, this study utilizes the K-Means method to cluster the house price data into several groups based on their similarity in attributes. Additionally, the research aims to determine the optimal number of clusters through the cluster validation process using the silhouette index. The findings show that when using n_cluster=2, a silhouette score of 0.8870 is obtained, and with n_cluster=3, the silhouette score is 0.8009. These results indicate that clustering with n_cluster=2 and n_cluster=3 both exhibit strong interpretative structures. Thus, the clustering of house prices in Bandung can be effectively grouped into 2 clusters, as evidenced by the higher silhouette score obtained with n_cluster=2, approaching 1 compared to n_cluster=3.
Rancang Bangun Aplikasi Sistem Monitoring Kupon Makan Di Pondok Pesantren Ngalah Menggunakan KTS (Kartu Tanda Santri) Berbasis RFID Shoffi Arrosidi; Moch. Lutfi
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3212

Abstract

Along with the growth of the contemporary era, where technological advances occasionally experience rapid development and have provided many conveniences for mankind in everyday life. It promotes and facilitates human control of each system and can facilitate human work, including security-related tasks. One of the boarding schools in Pasuruan Regency is the Ngalah Islamic Boarding School. Pondok Ngalah was built on August 30, 1985 AD, or to coincide with Friday Pahing, the 14th of Dzulhijjah in 1405 Hijriyah, by its founder KH. M. Sholeh Bahruddin Kalam. Meal coupons are one of the most important cultures in the world of Islamic boarding schools. The meal coupon is proof that the student can take rice at the dormitory canteen. The student coupons are distributed in each dormitory and each student gets 60 coupons that can be used to collect rice within one month. In terms of each dormitory, coupons are used in one day, up to 2 coupons, but there are students who do not pay attention to the rules, and what's even worse, there are students who photocopy coupons to increase the number of coupons. Follow up with the student. Therefore, a coupon security system is needed that can be monitored by the parties concerned, namely using a tool that is already based on the Internet of Things by making a coupon security tool using KTS (Santri Identity Card). This electronic tool is designed to find out the availability of student meal coupons using RFID which produces a scanned program that can be printed in pdf format. The expected result of this test is to be able to find out the availability of student meal coupons every day.
Analisis Pengukuran Tingkat Kematangan Tata Kelola Sistem Informasi Manajemen Keuangan Daerah (SIMDA Keuangan) Menggunakan Cobit 5 Sontri; Darius Antoni
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3222

Abstract

The Musi Banyuasin Regency Government has implemented an information system to support its business processes, one of which is the Regional Financial and Asset Management Agency (BPKAD). To carry out its function in managing regional finances and assets, BPKAD mostly utilizes the Regional Management Information System (SIMDA) which has been used for approximately five years, but has never been evaluated. For this reason, it is necessary to evaluate SIMDA information technology governance. In this study, the author uses a qualitative approach using the Process Assessment Model (PAM) consisting of indicators on process performance and process capability COBIT 5: A Business Framework for the Governance and Management of Enterprise IT which is the material research standards to process primary data and secondary data. The result of the research is that there is a staffing requirement evaluation process carried out by the BPKAD secretary by positioning it to the staffing sub-section in the form of ASN Requirements Formulation, Plan, Fulfillment and Proposal Forms. This study also revealed that there is a process in the backup log in the operation of Simda carried out by the ICT management section of the MUBA Regency BPKAD, the EDM04 process, EA01 Monitor, is at level 2, which means that the process already has good governance, such as being properly managed and controlled. and the APO07, BAI09 and DSS01 processes are at level 1, which means that the process has been carried out by the MUBA Regency BPKAD, the IT governance capability level at SIMDA BPKAD MUBA Regency is on average at level 1.
Analisis Sistem Informasi Pada Website Jamajamaproject.id Menggunakan Metode UTAUT (Unfield Theory of Acceptance and Use of Technology) Robby Rahmat Ferdinan; Alek Wijaya
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3223

Abstract

Seeing the development of digital information technology which is the main support for obtaining information in an easy and fast way, especially with the internet or the world of networking. With the development of an internet access service, it is a global computer network that connects the world in various users who access the internet in one network to all parts of the world who use it.Jama-jama project is a business that is engaged in the production of clothing screen printing which was established in 2014 in the city of Palembang, Jama-jama project itself conducts its business in the type of screen printing such as short shirts, long shirts, jackets, hats and others. The development of digital information technology Jama-jama project now has a website for customers to use in the ordering process so that it can be accessed easily.This research method uses the UTAUT methodology, UTAUT is the Unified Theory of Acceptance and Use of Technology (UTAUT) model which is a new model developed by Venkatesh et al (2003) by examining theories about technology acceptance by system users.This is considered very effective and can increase customer satisfaction with the services provided by the Jama-jama project. Based on the results of the analysis above, the author makes a thesis proposal for this final project with the title "Analysis of Information Systems on the Jamajamaproject.id Website Using the UTAUT (Unified Theory of Acceptance and Use of Technology) Method".
Deteksi Intrusi Siber pada Sistem Pembelajaran Elektronik berbasis Machine Learning Amirah; Ahmad Sanmorino
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3227

Abstract

This study aims to develop a mechanism for detecting machine learning-based cyber intrusions in electronic learning systems. In today's digital era, e-learning systems have become an integral part of education and training, providing global accessibility and more interactive learning efficiency. However, security and privacy challenges are becoming critical issues due to the increasingly real threat of cyber intrusion. Attackers try to take advantage of vulnerabilities and weaknesses in e-learning systems to steal sensitive data or disrupt operations. To overcome this problem, this study focuses on the use of artificial intelligence technologies, especially machine learning, to proactively detect and respond to intrusive threats. Through e-learning security analysis, identification of weaknesses, and potential loopholes for cyber-attacks, the most suitable machine learning algorithms are selected to detect patterns and signs of intrusion attacks on network data. The evaluation results show that several machine learning algorithms, such as SVM and Decision Tree, have good performance in recognizing cyber intrusions with high accuracy, precision, recall, F1-score, and ROC-AUC. By implementing machine learning-based intrusion detection technology, it is expected that electronic learning systems can be more proactive in identifying and responding to intrusion threats before significant damage occurs. This research has significant benefits in increasing security and privacy in the use of electronic learning systems. In addition, this study is expected to be a reference for further research in the world of cyber security and the application of artificial intelligence technology in supporting digital security.
Sistem Informasi Penerimaan Siswa Baru Berbasis Android dengan Push Notifikasi di SMK PGRI 1 Palembang Dopri; K. Ghazali
Jurnal Ilmiah Informatika Global Vol. 14 No. 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v14i2.3259

Abstract

SMK PGRI 1 Palembang annually holds PSB activities where currently prospective new students can register by coming directly to the information section, filling out the Google Forms form, or contacting the WA PSB officer. These three registration methods have several drawbacks such as additional expenses for ATK and transportation, as well as a limited registration time. In addition, officers must re-enter data from new prospective students with the existing desktop system because the database has not yet been integrated and new prospective students need to be contacted one by one if there are changes such as changes to the briefing schedule. This resulted in PSB activities at SMK PGRI 1 PALEMBANG being less efficient, tiring, and slow. The proposed solution to the problem is to create an Android-based PSB application with push notifications and integrated with the current MSYQL database. Push notifications allow direct notifications to be sent to certain parties if an event occurs such as a new registration or registration being responded to by the admin. This means that new registrations can be immediately recognized and responded to by the admin.

Page 1 of 1 | Total Record : 7