cover
Contact Name
Fristi Riandari
Contact Email
hengkitamando26@gmail.com
Phone
+6281381251442
Journal Mail Official
hengkitamando26@gmail.com
Editorial Address
Romeby Lestari Housing Complex Blok C Number C14, North Sumatra, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mandiri IT
ISSN : 23018984     EISSN : 28091884     DOI : https://doi.org/10.35335/mandiri
Core Subject : Science, Education,
The Jurnal Mandiri IT is intended as a publication media to publish articles reporting the results of Computer Science and related research.
Articles 202 Documents
Analysis and Design of a Web-Based Marketing Information System with a CRM (Customer Relationship Management) Approach at Tenun Resti Sipirok Ofelius Laia; Jurisman Waruwu; Arisman Telaumbanua
Jurnal Mandiri IT Vol. 12 No. 1 (2023): July: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i1.237

Abstract

Tenun Resti Sipirok is a company engaged in trading woven products such as Jas, Ulos, Souvenirs and other woven products. In marketing its products, Tenun Resti Sipirok still uses the shop as a marketing place, so that consumers who are interested in buying these products must come directly to the store where they are marketed. Not infrequently consumers are disappointed because the product they want to buy is not available which requires consumers to order in advance until the product is finished being produced. By designing and implementing a web-based marketing system with a CRM approach to Tenun Resti Sipirok, it is very helpful in the process of marketing products via the internet, such as selling and promoting products to consumers. This also has a positive impact on the consumer side, because consumers do not have to come directly to the marketing shop, but consumers can buy and order products through the website that is created and information about new products and promos is easy for consumers to get through the website page as well as via email messages.
Application of the Dijkstra method in finding the shortest route for hospitals in Kabupaten Tegal Gunawan Gunawan; Wresti Andriani; Khadziqul Humam Munfi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.238

Abstract

Health services are one of the most critical aspects of human life. Getting medical care quickly and efficiently can be a determining factor in saving a person's life in an emergency. In this article, we will review the application of the Dijkstra Method in finding the shortest route to Mitra Siaga hospitals in Kabupaten Tegal. This article is expected to contribute to understanding and developing a more efficient transportation system in Kabupaten Tegal, focusing on health services. Dijkstra algorithm for determining the shortest route. Dijkstra's algorithm is an algorithm that intends to find the shortest path on a graph. The principle of the Dijkstra Algorithm is searching for two passes with the most negligible weight. Based on the results of testing 10 times, the accuracy of this application is 100%. In this study, limited to the initial location tested, this application has not used the current location at its initial location. For the development of this application, you can use the current location at the initial location so that this application runs optimally
Digitizing learning modules without internet quota to accelerate education equity in Pabean Udik Village Indramayu Achmad Zuchriadi; Fajar Rahayu; Silvia Anggraeni; Muhammad Alif Razi; Jati Kinsela Brajamusti; Mutiara Putri R Darmawan
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Education equality for the Indonesian people still needs to be improved; for example, in Indramayu, the average length of schooling for the community has only reached 6.52 years (2021) and 6.83 years (2022), still below the 12-year compulsory education program. One way of equitable distribution of education through digitisation of the Education module still needs to be solved, especially related to uneven internet access facilities and the high price of internet quota. Therefore, it is necessary to carry out this activity so that a system that contains digital learning modules can be produced without using internet quota. This activity aims to digitise learning modules that can be accessed without internet quota to accelerate education equity for Pabean Udik Village Indramayu school students. Activities are carried out by designing a system consisting of hardware, web-based applications and learning module content, both K-13 modules and Virtual laboratories. The result obtained is the availability of a system that contains learning module content and virtual laboratories that can be accessed without internet quota using smartphones, tablets and computers. This system is expected to be a solution for equitable development, especially for students in Indramayu, to increase students' knowledge even though the average school time is still below national standards. This system can also be implemented in other regions to accelerate education equity in Indonesia.
Data Mining for Indonesian National Football team: Data mining for Indonesian National Football Team Luki Ardiantoro; Ronny Makhfuddin Akbar; Yanuarini Nur Sukmaningtyas
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.243

Abstract

The Indonesian national football team is controlled by the Indonesian Football Association, which is a member of FIFA and also a member of the AFC. The current coach of the Indonesian national team is Shin Tae-yong (STY), a former South Korean soccer player. In this study, the researcher intends to examine, study and obtain an overview of the game patterns, tactics and game strategies carried out by STY against the Indonesian national team. The goal to be achieved is gained of tactics and strategies for local coaches in the future. FP Growth algorithm was used for this research. Method to analyze match videos and record them in the form of statistical data in a set of data tupples (rows/records) for a particular match session was used. Then normalize the data, by forming a series of pattern numbers as a representation of the direction of attack in certain situation. The data set is formed with one set per round. As conclusion, data mining can be used to provide an overview of the national team's playing pattern. Thus, it makes it easier for coaches to determine the right strategy to beat opponents.
Comparison of SAW methods with WP method laptop recommendations Ahmad Taufik Marsaoly; Riffa Haviani Laluma
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.244

Abstract

In this era, laptop users are increasing rapidly to support people's work. Various types and brands of laptops have been produced and distributed on the Indonesian market with various specifications and different uses. Survey results from indonesiabaik.id show that the use of laptops without internet for work is 54.55%. Meanwhile, laptops used for entertainment were 34.94%. With various types, specifications and uses of laptops having varying prices from cheap to expensive, this creates a dilemma for people in choosing a laptop that suits their needs. Many people have already bought laptops, but the increasing demand ends up having to buy another laptop to suit the increasing work and entertainment needs. The method used for comparison is the SAW method with the WP method in a web-based application that can recommend laptops. The results of this research show that recommending laptops using the SAW method or the functionally WP method is very helpful in finding out the overall ranking or level of the laptop. However, in terms of effectiveness, the SAW method still has the possibility of having the same ranking value and that could cause a dilemma for people in determining the ranking order on laptops. Meanwhile, the WP method has the possibility of the same ranking value being very small so it can determine the laptop ranking order better than the SAW method. From the overall comparison, it can be concluded that the WP method is better in recommending laptops.
Comparison of investor detection algorithm in internet of things based home security systems Didit Karyadi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.245

Abstract

Empirical studies state that the environment is the main factor that influences crime patterns, so closed circuit television (CCTV) is an option to reduce the risk of crime. However, CCTV is less effective because it requires high bandwidth & storage and cannot provide notifications. Therefore, a technology called the internet of things (IoT) has emerged so that CCTV or webcams can work together with sensors to detect the presence of intruders and provide notifications. This research proposes a system that detects intruders and sends notifications to home owners without being tied to time and place. This system is usually referred to as a smart home security system. This research aims to compare intruder detection algorithms in IoT-based home security systems. This research method uses the internet of things (IoT) in smart homes or home security by comparing the accuracy and processing time of the HoG+SVM and Yolo V3 algorithms. The results of the system implementation show that the most accurate intruder detector is the Yolo V3 algorithm with an accuracy of 99% and a processing time of 14.852 seconds. This processing time can be accelerated by using a Graphics Processing Unit (GPU) with higher specifications.
Geographic information system for boyolali tourist object mapping android based Maria Atik Sunarti Ekowati; Kristyana Dananti; Darsini Darsini; Sri Wening
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.246

Abstract

Boyolali is part of Indonesia which is rich in tourism potential and regional specialties. Boyolali is a city that has tourist attractions and typical regional souvenirs. Boyolali tourist attractions are New Selo, Gancik Hill, Kedung Kayang Waterfall, Omah Bammbu Merapi, Cengklik Reservoir, Gunung Madu Valley, Dairy Cow Agro Tourism, Brown Canyon, Tlatar Water Park, Mount Merbabu Trekking, Kedung Goro, Umbul Tirto, Gardens Raya Indrokilo, Bade Reservoir, Restu Wijaya Waterboom. However, there are problems for tourists outside the region due to the lack of information obtained or tourists' knowledge about where the tourist attractions they can visit are located. Apart from that, tourists are also confused about where to go. The aim of this research is to provide a solution to the problems faced by tourists by developing a geographic information system for mapping tourist attractions by utilizing the global positioning system (GPS) feature available on Android smartphones. Through the design of the application being developed, it is hoped that tourists and visitors to Boyolali tourist attractions will be able to obtain convenience in mapping tourist locations in the Boyolali area as well as help provide comments and ratings about the quality of the products produced by sellers.
Implementation of forward chaining in tourism recommendation selection expert system based on user preferences Firahmi Rizky
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.247

Abstract

Precise travel recommendations tailored to user preferences are a key element in enriching the travel experience. In this context, the Forward Chaining method in the User Preference-Based Travel Recommendation Selection Expert System offers a powerful and highly personalised approach. This article describes the implementation steps of the Forward Chaining method, which involves identification of user preferences, conversion of preferences to facts, initialisation of knowledge base, Forward Chaining process, evaluation of results, and customised travel recommendations. This method allows the system to dynamically respond to user preferences, generate accurate recommendations, and ensure that users are satisfied with their experience. However, some challenges such as privacy protection, complexity of user preferences, and knowledge base updates must be considered. Therefore, this article also discusses important implications of implementing the Forward Chaining method, including strict privacy protection, regular updates of the knowledge base, as well as the system's ability to learn from user feedback. In conclusion, the Forward Chaining method is a very useful approach in improving travel recommendation services tailored to user preferences, which can enrich the travel experience and result in higher satisfaction for users.
Motorcycle workshop selection recommendation system in gading serpong using the topsis method Natapura, Septaria Dwi; Twince, Fenina Adline; Kusnadi, Adhi; Nainggolan, Rena
Jurnal Mandiri IT Vol. 12 No. 3 (2024): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i3.249

Abstract

In Indonesia, motorbike repair shops have become a necessity for motorbike riders. The large number of motorcycle repair shops makes it difficult for users to determine the right repair shop according to their needs. Thus, the role of the recommendation system is needed. In order to meet the need for various criteria, a recommendation system for selecting a motorbike repair shop was built using a case study in Gading Serpong. The criteria used are distance, service, speed, price, and comfort of the waiting area. The TOPSIS method (Technique for Order Preference by Similarity to Ideal Solution) is a multi-criteria method that is computationally efficient and is able to measure the relative performance of various decision alternatives in simple mathematical form. Therefore, this research system was built using the TOPSIS method. The test results in this research show that the TOPSIS method has been implemented correctly. Apart from that, a success test of the recommendation system has been carried out by distributing questionnaires, with a success percentage of 82.24%. The questionnaire results obtained have also been tested using Cronbach Alpha, with a result of 0.81, which means that the questionnaire results obtained can be trusted
Key analysis of the hill cipher algorithm (Study of literature) Sujarwo, Sujarwo
Jurnal Mandiri IT Vol. 12 No. 3 (2024): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i3.250

Abstract

The security of the data (message) sent is very important in maintaining the confidentiality of the message. Many algorithms can be used to secure messages. Among them is the Hill Cipher algorithm. The Hill Cipher algorithm is a classic cryptographic algorithm. This algorithm uses a square matrix key. In connection with the Hill Cipher algorithm key, this literature aims to examine the matrix that can be used as a key in the encryption and decryption process in the Hill Cipher algorithm. In this literature, we take a square matrix of order 3x3 and use 36 characters (A-Z, 0-9). To produce cipher text, the method used is to carry out an encryption process based on the Hill Cipher algorithm. The encryption process is carried out by multiplying the key matrix by the plaintext. The decryption process to get the plain text back is done by multiplying the ciphertext by the inverse modulo matrix of the key matrix. The encryption process can always be carried out, but not all decryption processes can be carried out. Because not all matrices can be used as key matrices. The results of this literature show that the key matrix must be a matrix of order mxm. A matrix with determinant value = 0 cannot be used as a key. Likewise, a matrix whose determinant value is not relatively prime with the number of characters to be encrypted or decrypted cannot be used as a key matrix

Page 9 of 21 | Total Record : 202