cover
Contact Name
Nahrun Hartono
Contact Email
nahrunhartono@gmail.com
Phone
+6285342991420
Journal Mail Official
jurnal.shift@uin-alauddin.ac.id
Editorial Address
Kampus II Gedung D Fakultas Sains dan Teknologi Lt. IV Jl. H.M. Yasin Limpo No. 36 Samata Kab. Gowa Sulawesi Selatan - Indonesia, 90235
Location
Kab. gowa,
Sulawesi selatan
INDONESIA
Journal Software, Hardware and Information Technology
ISSN : 28083385     EISSN : 27768961     DOI : -
Core Subject : Science,
Journal Software, Hardware, and Information Technology (SHIFT) is an academic journal published in January and June by State Islamic University Alauddin of Makassar and managed by Department of Information System, Faculty of Science and Technology. The journal publish scholarly articles on the scope of Computer Architecture; Virtual/Augmented Reality; Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods); etc. Every manuscript submitted to Journal SHIFT is independently reviewed by at least two reviewers in the form of "peer-review". It is due to increase the quality of articles. Decision for publication, amendment, or rejection is mostly based upon their reports/recommendation. In certain cases, the editor may submit an article for review to another, third reviewer before making a decision, if necessary. The Editorial Team, however, reserves the right to make the final decision on the status of the manuscript with regard to publication.
Articles 60 Documents
Sistem Informasi Operasional Apotek Berbasis Customer Relationship Management (CRM) Ratnawati Ratnawati; Aryati Aryati; Akbar Hendra
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.17

Abstract

This study aims to 1) create an effective, efficient, and easy-to-use pharmacy operational system for pharmacy employees and consumers that can be accessed remotely. 2) Implementing a Pharmacy Operational Information System Based on Customer Relationship Management (CRM). The problem faced by the current system is that it is still using a desktop-based system which is difficult to access by management remotely if there is a need for monitoring drug data management. This data was obtained by conducting 1) field research by making observations at pharmacies 2) direct interviews with the pharmacy on behalf of Alwidah Lestari as an employee. The software development method used is the Scrum Method, this system is made using Xampp as a database storage medium and Sublime Text. The results of this study show that the Pharmacy Operational Information System Based on Customer Relationship Management (CRM) is attractive and User Friendly because it is easy to use, thus obtaining test results of 89.93% of 20 respondents with 26 questions by sending a questionnaire form for system assessment.
Analisis Sentimen Pengguna Indihome dengan Metode Klasifikasi Support Vector Machine (SVM) Muhammad Nur Akbar; Nur Annisa Safitri Yusuf; Nasrullah Nasrullah; Mubarak Mubarak
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.18

Abstract

Indonesia Digital Home (IndiHome) is a communication service provider from PT Telekomunikasi Indonesia (Telkom) that provides several communication and data service packages such as internet, home telephone and cable television (Usee TV & IP TV) which implements copper and fiber pptic cable services. Currently, IndiHome is implementing a 100% fiber service replacement for all customers in order to produce high data speeds and more reliable services. However, the fact is that fiber optic services often receive complaints from customers due to weather and other factors. It was recorded that in 2020 internet users in Indonesia reached 196.7 million people or 73.7% million of the population and around 51.2% were social media users (Kompas.com, 2020). One of the social media with 6.43 million active users is Twitter. Twitter then became a medium for channeling opinions regarding a service, including the services provided by Indihome. Based on this, a method is needed, namely sentiment analysis to understand whether the opinion is negative or positive. The Support Vector Machine (SVM) is used to create a classification model for sentiment analysis of IndiHome service users' opinions on Twitter with an accuracy of 91.3%.
Rancang Bangun Sistem Informasi Pemasaran pada CV Anugrah Sejati Prima Berbasis Website Menggunakan Framework Scrum Dwi Haryani; Firmansyah Ibrahim; Zulkarnaim Mahsyur
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.20

Abstract

CV Anugerah Sejati Prima is a business entity engaged in the sale of goods/tools, selling various kinds of civil engineering laboratory equipment. In providing services to visitors, CV Anugerah Sejati Prima has provided information about the specifications of the offered goods, but as an effort to obtain this information, visitors or potential buyers must come directly to the office or ask for information about the goods or services by telephone. The methodology used in making this system uses the agile method by applying the scrum framework. This application made by using PHP as the programming language by implementing the laravel framework. And by applying blackbox testing and accessibility testing as a system testing method. The result of this information system is that users or potential buyers can get price information and specifications by accessing the website, it can increase visibility and marketing of the CV. The presence of the website can also be used as evidence if CV Anugerah Sejati Prima exists and is trusted. By directing to the website, visitors or potential buyers will find complete information about the company, from the products being sold, the location, to the vision and mission, along with the company's history.
Arsitektur Digitalisasi Slot Sharing Agreement pada Pelayaran Rakyat (Pelra) Rizki Eka Nafiandia; I Gusti Ngurah Sumanta Buana
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.21

Abstract

This research focuses on the cargo hold rental system on the Pelra ship, which plays an important role in island connectivity which is categorized as PPKT (pulau-pulau kecil terluar). The purpose of this study is to identify the conventional cargo hold rental system and Pelra as well as the disengagement between agents. The method used is an empathy map and user persona which serves to identify the needs and objectives of the application prototype users. The purpose of this study is to identify the disengagement between Pelra parties by developing a cargo hold rental system in the form of a prototype, as well as forming a transformation strategy for implementing information system exchange. The method used is an empathy map and user persona which serves to identify the needs and objectives of the application prototype. The resulting prototype can simplify the cargo rental business process from 11 to 9 stages. Cost-benefit analysis is used to determine the feasibility of the prototype. The prototype is considered feasible because the feasibility ratio value is 1.133 so that it can be applied to the Pelra cargo hold rental process.
Analisis Komparasi Genetic Algorithm dan Firefly Algorithm pada Permasalahan Quadratic-Assignment-Problem (QAP) Desi Novianti; Dewi Anjani
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.22

Abstract

Quadratic Assignment Problem (QAP) is the problem of determining the location of several facilities to a certain number of places to minimize the cost of moving. This displacement considers the flow of material or people movement and the distance between locations. Many studies have developed several efficient methods for solving QAP, one of which is metaheuristics. In this paper, the metaheuristic methods used are Genetic Algorithm (GA) and Firefly Algorithm (FA). The data used is taken from the Nugent data on QAPLIB with 12x12, 16x16, 20x20, and 30x30 matrices. This study proves that FA is an algorithm that produces the most optimal results with indicators in the test getting the best results (12x12 and 16x16), having better average and deviation values and faster computational time than GA. Meanwhile, for comparing the results obtained by the Nugent, FA also has more optimal results on the 12x12 and 16x16 matrices. However, the 20x20 and 30x30 GA metrics get more optimal results.
Penambangan Pengklasifiksi Fuzzy dengan Multiobjective Evolutionary Fuzzy Classifier Nur Salman; Mustikasari Mustikasari; Muhammad Nur Akbar
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.24

Abstract

Classification is one of the key issues in the field of data mining and knowledge discovery. This paper implements a method of constructing a fuzzy rule mining classifier, which is extended in the context of classification. There are three stages of this approach: fuzzy rule set extraction, second; a linguistic labeling process that assigns a linguistic label to each fuzzy set. Owing to many attributes in the database, the feature selection process is also carried out, reducing the complexity to build the final classifier. Third: incorporate strategies to avoid rule redundancy and conflict into process mining. We applied the application Multiobjective Evolutionary Fuzzy Classifier (MOFC), which produced a classifier with satisfactory classification accuracy compared to other classifiers such as C4.5. In addition, in terms of classification based on association rules, MOFC can filter the large of rules and be proven to be able to build compact fuzzy models while maintaining a very good level of accuracy and producing a much smaller set of rules. We examine the performance of fuzzy rule classifiers through computational experiments on three benchmark data sets in the UCI machine learning repository.
Aplikasi Virtual Whiteboard sebagai Media Pembelajaran Daring Marwa Sulehu; Watty Rimalia; Tamra Tamra
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.28

Abstract

Government policies in the Pandemi period through the spread of covid 19, authorize schools or university institutions to force online learning (sekolah daring). Due to teachers habit in offline elearning class, utilizing offline learning media such as whiteboard, online learning is very difficult for educators to implement. In other side, online learning can be more effective by utilizing tools that can be used in online learning such as virtual meeting application combined with a virtual whiteboard. Virtual whiteboards will work like contemporary whiteboards but use the educator's monitor screen as the medium for the whiteboard. Virtual whiteboards will assist educators in explaining material that cannot be explained verbally. Teach using Virtual whiteboards are also prior than learning videos i.e. Youtube.com that explain material not interactively. Other pros are Virtual whiteboards can be used in real time and interactively.
Studi Literature Sistem Keamanan Biometrik Untuk Verifikasi dan Transaksi Dompet Digital Nahrun Hartono; Adhy Rizaldy; NIswa Ayu Lestari
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.30

Abstract

E-Wallet is a service for storing money electronically that can be used for financial transactions or electronic payments easily and quickly. With the increasing use of digital today, the more the threat of ID theft and account takers can lead to balance withdrawals. In the last few years, fraudulent activities have grown rapidly so that only using a PIN and password with one-time password verification is no longer safe. The solution to this security problem is to use biometric authentication. A biometric security system is an authentication system for unique parts of the human body such as fingerprints, irises, and faces, which are stored in a database. This paper will discuss how the biometric security system is used in verification and transactions on digital wallets.
Internet of Things (IoT): Security, Threats and Countermeasures Zulkarnaim Masyhur; Firmansyah Ibrahim; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.31

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.
Rancang Bangun Aplikasi Disposisi Persuratan Berbasis Mobile Apps Farida Yusuf; Asrul Azhari Muin; Nisrawati Nisrawati
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.32

Abstract

Letter disposition is a response that a document received and read by work supervisor/leader as follow-up activity. Next step is to instruct the subordinate to finish remaining tasks flow. The process of this letter disposition is one of the activities at the Makassar City DPRD office which is still less effective processes. One obstacle in the disposition process is need more time to be completed, where the work supervisor is not always in place caused by bustle. Consequently affected to the distribution process of letters. This study aims to determine the implementation of the letter disposition system that occurs at the Makassar City DPRD office and then attempt a solution to a system to facilitate staff or employees in managing letters. This research is a type of qualitative research with data collection techniques used, namely by observation, interviews and documentation review. Then the data obtained were analyzed descriptively qualitatively. The resulting system includes several features such as incoming and outgoing mail data, disposition processes, employee users, and reporting.