cover
Filter by Year

Analysis
Articles
21
Articles
Sales Transaction Result Analysis for Increase Prediction of Income

Sucipto, Sucipto ( Universitas Nusantara PGRI Kediri )

Fountain of Informatics Journal Vol 3, No 2 (2018): Article in press
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The use of data that has long stored in the information system can be utilized to know information that supports decision-making activities. One of them is sales transaction data. During this time, the case of sales transaction data is rarely analyzed to be taken into consideration when taking a decision, such as analyzing the transaction data. The prediction analysis of the transaction should analyze the inflation factors that affect earnings. It is predicted that inflation will lead to an increase in the price of basic necessities which can also lead to employers tend to raise the price of products to be sold. Therefore, this research focuses to analyze sales transaction data at a restaurant. Where the data used is data that has been stored for 3 years within the period 2015-2017. The purpose of this study is to determine the quality comparison of sales predictions of sales between years with regard to inflation based on changes in selling prices. The result of the study is known that the prediction of goods sold with actual data in the following year is quite significant and the prediction of income is not affected by the inflation based on price comparison.

Perancangan Aplikasi Marketplace Jasa Percetakan Berbasis Website

Fauzi, Rahmat ( Telkom University ) , Wibowo, Satrio ( Mahasiswa Sistem Informasi Universitas Telkom ) , Putri, Dela Youlina ( Mahasiswa Sistem Informasi Universitas Telkom )

Fountain of Informatics Journal Vol 3, No 1 (2018)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The development of e-commerce based on marketplace is very familiar in Indonesia. However, there is no digital printing services based on marketplace whereas the need of these services remains high. Currently, the printing house services based on business to customer (B2C) style so people have to compare the pricing and service information directly to print owners both online and offline. One solution to face this problem is to create a marketplace printing services called CETAKIN. By this application, information of printing service in a region can be integrated into this system. This system of printing marketplace integration is built with waterfall method with four stages namely needs analysis, system design, implementation, and system testing with PHP programming language and MySQL Database. The features that exist in this marketplace application is registration, search, order printing services. This information system application provides added value that makes the process of printing search and printing service prices more effective and efficient because people do not need to visit the address of printing. On the other hand, the benefits gained for the store owner can expand the coverage of his stores advertising so that the public know more  the existence of the printing.

Implementasi Teknik Seleksi Fitur Pada Klasifikasi Malware Android Menggunakan Support Vector Machine

Saputra, Hendra ( Universitas Muhammadiyah Malang ) , Basuki, Setio ( Universitas Muhammadiyah Malang ) , Faiqurahman, Mahar ( Universitas Muhammadiyah Malang )

Fountain of Informatics Journal Vol 3, No 1 (2018)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Android Malware has grown significantly along with the advance of the times and the increasing variety of technique in the development of Android. Machine Learning technique is a method that now we can use in the modeling the pattern of a static and dynamic feature of Android Malware. In the level of accuracy of the Malware type classification, the researcher connect between the application feature with the feature required by each type of Malware category. The category of malware used is a type of Malware that many circulating today, to classify the type of Malware in this study used Support Vector Machine (SVM). The SVM type will be used is class SVM one against one using the RBF Kernel. The feature will be used in this classification are the Permission and Broadcast Receiver.  To improve the accuracy of the classification result in this study used Feature Selection method. Selection of feature used is Correlation-based Feature Selection (CFS), Gain Ratio (GR) and Chi-Square (CHI). A result from Feature Selection will be evaluated together with result that not use Feature Selection. Accuracy Classification Feature Selection CFS result accuracy of 90.83%, GR and CHI of 91.25% and data that not use Feature Selection of 91.67%. The result of testing indicates that permission and broadcast receiver can be used in classifying type of Malware, but the Feature Selection method that used have accuracy is a little below the data that are not using Feature Selection.

Implementasi Limited Tolerance Relation Untuk Sistem Informasi yang Tidak Lengkap Pada Data Mahasiswa

Sutoyo, Edi ( Program Studi Sistem Informasi, Universitas Telkom, Bandung, Jawa Barat, Indonesia, 40257 )

Fountain of Informatics Journal Vol 3, No 1 (2018)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Rough set theory is one of the mathematical models for dealing with a vague, imprecise, and fuzzy knowledge that has been successfully used to handle incomplete information systems. Since, in fact in the real-world problems, often found the conditions that are the user can not provide all the necessary preference values. In this research, an implementation of extension technique of rough set theory that called limited tolerance relation is used to overcome incomplete information systems in student data at Telkom University. Based on the obtained results, the limited tolerance relation technique successfully used to handle that problem. The results show that the technique achieved the  accuracy of 96.04% with an execution time of 3.1830 seconds.

Bye bye Collision! Efficiency of Schedule Management with SIM-DRaW (Management Information System of Lecturer, Room, and Time)

Nugraha, Muhammad ( Politeknik META Industri Cikarang ) , Nugraha, Yogi ( Politeknik META Industri Cikarang )

Fountain of Informatics Journal Vol 3, No 1 (2018)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Lectures schedule management in campus is an important aspect that must be implemented in every period. The schedule will be managed well if avoided from collision of the room, time, and lecturer. To overcome collision problem its necessary to make mitigate system to avoid schedule changes frequently caused by collision of room, time, and lecturer. Thus, the author design and build SIM-DRaW (Sistem Informasi Manajemen Dosen, Ruang, dan Waktu) web-based to fulfill needs and overcome schedule management system. The final result of the design and build SIM-DRaW is implemented information system that can help schedule manager to avoid collision earlier.

Variasi Animasi Gerakan Menggunakan Edit Data BVH

Armin, Aidil Primasetya ( Universitas 17 Agustus 1945 Surabaya ) , Mandita, Fridy ( Universitas 17 Agustus 1945 Surabaya )

Fountain of Informatics Journal Vol 3, No 1 (2018)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The BVH data is composed of two parts, the first part detailing the hierarchy and the initial pose of the framework while the second part describes the data for each frame. This data contains the translation and rotation of each joint in the form of coordinates based on X, Y, and Z axes. This study demonstrates methods for modifying BVH data to obtain new movements. First choose the joint on the BVH data, then determine the coordinate point of the initial movement and the coordinate point of the joint end motion. Both select the coordinate point to be modified. The three selected points are rotated using a rotation matrix based on the X, Y, and Z axes. The results of the test will be displayed in the form of animated characters.

Evaluasi Infrastruktur TI Menggunakan Framework COBIT 4.1 (Studi kasus : Sistem Informasi Ujian Online Universitas Y)

Ariyadi, Dwiyono

Fountain of Informatics Journal Vol 2, No 2 (2017)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Use of information technology facility as supporting support vision mission university need to be proven to prove, only with any of the measurement. Infrastructure audit of information technology on online test information system (SIUJO) faculty of technique is a form of measurement the maturity level in formation technology which the purpose is identifying the early possible risk so the process of facultys bussiness is not trouble. Doing infrastructure audit of information technology using framework cobit 4.1 focus on subdomain AI3 and AI5 with respondent according to RACI. Audit of information technology infrastructure SIUJO shows the result that the maturity level is still on the current level 1. It is necessary for gradual improvement efforts between three years to maturity level 3 to 4. By doing audit earlierly, bussiness process expected to support the faculty. 

Prediksi Ketepatan Waktu Kelulusan Dengan Algoritma Data Mining C4.5

Astuti, Indah Puji ( Universitas Muhammadiyah Ponorogo )

Fountain of Informatics Journal Vol 2, No 2 (2017)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The student is one of entities in University or Higher Education. The student has a variety of data, such as self-identity information such as address, type of school, work of parents, type of class, etc. In fact many students whose graduation rate is different, on time and not on time. The number of students who graduate is not on time will be a problem not only for university but also for faculty. The number of students graduating each year is one of points of assessment when faculty or study program submits accreditation. C4.5 Algorithm is one of classification algorithm with decision trees. In this study conducted an analysis of student data Engineering Studies Program University of Muhammadiyah Ponorogo 2012/2013. The decision trees in this case is useful for exploring student data, finding the hidden relationship between a number of candidate input attributes with a target attribute. The input attribute consist of, the type of school, address, work of parent, and type of class. The output attribute to classify is status, which consists of "on time" and "not on time". The results from this analysis shown that in this case the C4.5 algorithm can predict with an accuracy value only 82%.

IT Audit of IT Service Provider Using COBIT 4.1 Framework: Case Study at PT. XYZ

Hakim, Muhammad Malik ( Universitas Muria Kudus )

Fountain of Informatics Journal Vol 2, No 2 (2017)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

IT service providers often campaign for the importance of having a high level of IT maturity to its customers. However, not all IT companies have a high commitment to IT management within their own organisation. As a case study, this paper attempts to measure the IT maturity level of PT. XYZ that now is a growing IT services provider. Data collection is done by interview, document study, and direct field observation. The measurement of IT maturity level is conducted using 4 domains of COBIT 4.1 Framework, consists of Plan and Organize (PO), Deliver and Support (DS), Acquire and Implement (AI), and Monitor and Evaluate (ME). The result shows a value of 2.5 which indicates that IT maturity level is at level 2 (Repeatable but Intuitive) which means low enough for companies that should have a high awareness of IT governance and commitment. This study shows that the level of IT maturity in IT service provider is not always as high as its campaign.

Implementasi Teknik Data Mining untuk Evaluasi Kinerja Mahasiswa Berdasarkan Data Akademik

Marthasari, Gita Indah ( Universitas Muhammadiyah Malang )

Fountain of Informatics Journal Vol 2, No 2 (2017)
Publisher : Universitas Darussalam Gontor

Show Abstract | Original Source | Check in Google Scholar |

Abstract

One indicator of college efficiency is the study period of the students. It is important for university managers to improve the ratio of students who graduate on time. This research aims to analyze the characteristics that affect the study period of students from academic data. The methods used are association rule mining (ARM) and clustering. We propose a framework to analyze academic data using ARM dan clustering method. ARM method is a method to find association rules that meet minimum support and minimum confidence. The algorithm used is Apriori. While clustering using Simple Expectation-Maximization (EM-clustering) algorithm. Simple EM is a model-based algorithm that searches for maximum likelihood estimation in the probability model. The variables analyzed were student achievement index, province of the students, and type of high school. The analysis is done using WEKA. Research begins with the collection of data from the primary source of the Biro Administrasi Akademik (BAA) Universitas Muhammadiyah Malang (UMM). Then, we do the data cleaning and transformation. Analyzing process is done in two step. First, do a rule search using Apriori algorithm. The regulated parameters are the minimum support and minimum confidence value. Second, we use Simple EM algorithm for the clustering process. The experiments were conducted to find the clustering result with the largest log likelihood value. Based on the experiment, the method used successfully describes the characteristics based on the study period.