Refine Search

New Search

Advanced search

Journal Fountain of Informatics Journal

-
26 articles
Page of 3
Articles per Page
by
Sucipto Sucipto
Fountain of Informatics Journal, Volume 3, pp 31-35; doi:10.21111/fij.v3i2.2286

Abstract:The use of data that has long stored in the information system can be utilized to know information that supports decision-making activities. One of them is sales transaction data. During this time, the case of sales transaction data is rarely analyzed to be taken into consideration when taking a decision, such as analyzing the transaction data. The prediction analysis of the transaction should analyze the inflation factors that affect earnings. It is predicted that inflation will lead to an increase in the price of basic necessities which can also lead to employers tend to raise the price of products to be sold. Therefore, this research focuses to analyze sales transaction data at a restaurant. Where the data used is data that has been stored for 3 years within the period 2015-2017. The purpose of this study is to determine the quality comparison of sales predictions of sales between years with regard to inflation based on changes in selling prices. The result of the study is known that the prediction of goods sold with actual data in the following year is quite significant and the prediction of income is not affected by the inflation based on price comparison.
Hilyah Magdalena, Fathul Choiri Ramadhan
Fountain of Informatics Journal, Volume 3, pp 54-63; doi:10.21111/fij.v3i2.2426

Abstract:UGD adalah unit yang memberikan tindakan medis yang dibutuhkan korban / pasien gawat darurat dalam waktu segera untuk menyelamatkan nyawa atau mencegah kecacatan. Rumah Sakit Bakti Timah Pangkalpinang sebagai salah satu rumah sakit kelas c yang ada di Ibukota Provinsi Kep.Bangka Belitung, mempunyai satu Unit Gawat Darurat yang melayani pasien dari berbagai daerah di Provinsi Bangka Belitung. Saat ini dengan semakin banyaknya pasien yang membutuhkan tindakan medis segera, maka pelayanan administrasi medis di UGD seringkali berebut waktu untuk diselesaikan. Agar fokus pelayanan medis lebih besar pada penanganan pasien gawat darurat, maka pelayanan administrasi dapat diselesaikan dengan menggunakan sistem berbasis web. Pegembangan sistem registrasi pasien UGD berbasis web di Rumah Sakit Bakti Timah Pangkalpinang ini dilakukan dengan tujuan meringankan tugas administrasi rekam medis pasien gawat darurat di UGD, baik itu pasien akan dirawat jalan ataupun harus di rawat inap. Pegembangan sistem registrasi pasien UGD berbasis web ini dilakukan dengan metode Object Oriented Analysis and Design (OOAD) dan digambarkan dengan beberapa diagram dalam bahasa Unified Modelling Language (UML). Sistem registrasi pasien UGD berbasis web ini membantu Petugas UGD untuk mendata pasien, menelusuri rekam medis, mempercepat verifikasi data diagnosa dari Dokter UGD, dan juga membantu pasien UGD untuk menyelesaikan administrasi rawat jalan maupun rawat inap.
Anton Breva Yunanda, Fridy Mandita, Aidil Primasetya Armin
Fountain of Informatics Journal, Volume 3, pp 41-45; doi:10.21111/fij.v3i2.2469

Abstract:Language is a tool used by humans to communicate between each others. Every human being was born in the world has the ability to communicate in accordance with his mother's language but not all humans are born with good communication skills, one of them is a person with special needs. Sign language is a communication device used by people in need a in communicating with other people. This language uses the body's members to communicate, one way to communicate is to use members of the body that is the hand. Every movement that is done will have a different meaning. In decades, the research in sign language is experiencing a very rapid development. In this study shows the introduction of sign language for character characters using Microsoft Kinect and the Hidden Markov Model (HMM) method. For data are taken from the (Bahasa Isyarat Indonesia) BISINDO dictionary. The results of this research is the level of accuracy of the introduction of letters.
Nurchim Nurchim, Indah Nofikasari
Fountain of Informatics Journal, Volume 3, pp 36-40; doi:10.21111/fij.v3i2.2466

Abstract:The success of the implementation of smart villages is based on the success of the village in carrying out digital transformation with Information and Communication Technology (ICT) as the driver. As a result, villages need an ICT development center which is better known as telecentre. Telecentres contribute to the social and economic development of villages with ICT as the key. In Indonesia, the establishment of telecentres is increasingly prevalent, but until now it was felt that it still did not show its success. The difficulties that arise are, constraints on information and financial management to pay for connectivity, equipment maintenance and telecentre staff salaries. The purpose of this study is to provide a telecentre development model in the form of a Village-Owned Enterprise based on hybrid organizational theory. This research approach was carried out qualitatively with a case study of Lamahu Village, Bone Bolango, Gorontalo. The process of collecting data through interviews, and the results of interviews were analyzed by interpretation into hybrid organizational theory. The results showed that the telecentre development needs to review 3 aspects, namely (1) the establishment of telecentres must have a mission as a social enterprise engaged in the implementation of ICT-based appropriate technology, (2) telecentres in the form of a legal entities Village Owned Enterprise so that they have the opportunity to obtain financial resources from external (CSR) and internal (village funds) and finally (3) telecentre human resources must involve the village community from origin so that they can help the effectiveness of interaction and ensure the sustainability of ICT adoption.
Yan Sen Paulus, Oscar Karnalim
Fountain of Informatics Journal, Volume 3, pp 46-53; doi:10.21111/fij.v3i2.2354

Abstract:In most organizations, candid moments on held events should be captured as images for administrative purposes. For instance, if an event is sponsored by third parties, it is necessary to send some images capturing moments on that event to them. However, human resources are required to capture such images, resulting additional operational cost. This paper proposes a method to capture candid moments without human intervention. Unique to this method, daily device (i.e., mobile phone) is used to replace human resource with the help of a phone holder and a dedicated mobile application. Prior capturing images, given mobile application should be installed to the mobile phone and such phone should be attached to the phone holder that is aimed at event area. Candid images can be then automatically collected by running installed mobile application. According to our evaluation, such method can replace human resource for capturing candid moments using daily device. Further, it is more efficient than video recording (i.e., an alternative to capture candid moments) in terms of used battery power and memory.
Edi Sutoyo
Fountain of Informatics Journal, Volume 3, pp 19-23; doi:10.21111/fij.v3i1.1833

Abstract:Rough set theory is one of the mathematical models for dealing with a vague, imprecise, and fuzzy knowledge that has been successfully used to handle incomplete information systems. Since, in fact in the real-world problems, often found the conditions that are the user can not provide all the necessary preference values. In this research, an implementation of extension technique of rough set theory that called limited tolerance relation is used to overcome incomplete information systems in student data at Telkom University. Based on the obtained results, the limited tolerance relation technique successfully used to handle that problem. The results show that the technique achieved the accuracy of 96.04% with an execution time of 3.1830 seconds.
Hendra Saputra, Setio Basuki, Mahar Faiqurahman
Fountain of Informatics Journal, Volume 3, pp 12-18; doi:10.21111/fij.v3i1.1875

Abstract:Android Malware has grown significantly along with the advance of the times and the increasing variety of technique in the development of Android. Machine Learning technique is a method that now we can use in the modeling the pattern of a static and dynamic feature of Android Malware. In the level of accuracy of the Malware type classification, the researcher connect between the application feature with the feature required by each type of Malware category. The category of malware used is a type of Malware that many circulating today, to classify the type of Malware in this study used Support Vector Machine (SVM). The SVM type will be used is class SVM one against one using the RBF Kernel. The feature will be used in this classification are the Permission and Broadcast Receiver. To improve the accuracy of the classification result in this study used Feature Selection method. Selection of feature used is Correlation-based Feature Selection (CFS), Gain Ratio (GR) and Chi-Square (CHI). A result from Feature Selection will be evaluated together with result that not use Feature Selection. Accuracy Classification Feature Selection CFS result accuracy of 90.83%, GR and CHI of 91.25% and data that not use Feature Selection of 91.67%. The result of testing indicates that permission and broadcast receiver can be used in classifying type of Malware, but the Feature Selection method that used have accuracy is a little below the data that are not using Feature Selection.
Rahmat Fauzi, Satrio Wibowo, Dela Youlina Putri
Fountain of Informatics Journal, Volume 3, pp 5-11; doi:10.21111/fij.v3i1.1824

Abstract:The development of e-commerce based on marketplace is very familiar in Indonesia. However, there is no digital printing services based on marketplace whereas the need of these services remains high. Currently, the printing house services based on business to customer (B2C) style so people have to compare the pricing and service information directly to print owners both online and offline. One solution to face this problem is to create a marketplace printing services called CETAKIN. By this application, information of printing service in a region can be integrated into this system. This system of printing marketplace integration is built with waterfall method with four stages namely needs analysis, system design, implementation, and system testing with PHP programming language and MySQL Database. The features that exist in this marketplace application is registration, search, order printing services. This information system application provides added value that makes the process of printing search and printing service prices more effective and efficient because people do not need to visit the address of printing. On the other hand, the benefits gained for the store owner can expand the coverage of his store's advertising so that the public know more the existence of the printing.
Muhammad Nugraha, Yogi Nugraha
Fountain of Informatics Journal, Volume 3, pp 24-29; doi:10.21111/fij.v3i1.1873

Abstract:Lectures schedule management in campus is an important aspect that must be implemented in every period. The schedule will be managed well if avoided from collision of the room, time, and lecturer. To overcome collision problem it's necessary to make mitigate system to avoid schedule changes frequently caused by collision of room, time, and lecturer. Thus, the author design and build SIM-DRaW (Sistem Informasi Manajemen Dosen, Ruang, dan Waktu) web-based to fulfill needs and overcome schedule management system. The final result of the design and build SIM-DRaW is implemented information system that can help schedule manager to avoid collision earlier.
Aidil Primasetya Armin, Fridy Mandita
Fountain of Informatics Journal, Volume 3, pp 1-4; doi:10.21111/fij.v3i1.1349

Abstract:The BVH data is composed of two parts, the first part detailing the hierarchy and the initial pose of the framework while the second part describes the data for each frame. This data contains the translation and rotation of each joint in the form of coordinates based on X, Y, and Z axes. This study demonstrates methods for modifying BVH data to obtain new movements. First choose the joint on the BVH data, then determine the coordinate point of the initial movement and the coordinate point of the joint end motion. Both select the coordinate point to be modified. The three selected points are rotated using a rotation matrix based on the X, Y, and Z axes. The results of the test will be displayed in the form of animated characters.
Page of 3
Articles per Page
by