Journal Fountain of Informatics Journal

-
21 articles
Page of 3
Articles per Page
by
Edi Sutoyo
Fountain of Informatics Journal, Volume 3, pp 19-23; doi:10.21111/fij.v3i1.1833

Abstract:Rough set theory is one of the mathematical models for dealing with a vague, imprecise, and fuzzy knowledge that has been successfully used to handle incomplete information systems. Since, in fact in the real-world problems, often found the conditions that are the user can not provide all the necessary preference values. In this research, an implementation of extension technique of rough set theory that called limited tolerance relation is used to overcome incomplete information systems in student data at Telkom University. Based on the obtained results, the limited tolerance relation technique successfully used to handle that problem. The results show that the technique achieved the accuracy of 96.04% with an execution time of 3.1830 seconds.
Hendra Saputra, Setio Basuki, Mahar Faiqurahman
Fountain of Informatics Journal, Volume 3, pp 12-18; doi:10.21111/fij.v3i1.1875

Abstract:Android Malware has grown significantly along with the advance of the times and the increasing variety of technique in the development of Android. Machine Learning technique is a method that now we can use in the modeling the pattern of a static and dynamic feature of Android Malware. In the level of accuracy of the Malware type classification, the researcher connect between the application feature with the feature required by each type of Malware category. The category of malware used is a type of Malware that many circulating today, to classify the type of Malware in this study used Support Vector Machine (SVM). The SVM type will be used is class SVM one against one using the RBF Kernel. The feature will be used in this classification are the Permission and Broadcast Receiver. To improve the accuracy of the classification result in this study used Feature Selection method. Selection of feature used is Correlation-based Feature Selection (CFS), Gain Ratio (GR) and Chi-Square (CHI). A result from Feature Selection will be evaluated together with result that not use Feature Selection. Accuracy Classification Feature Selection CFS result accuracy of 90.83%, GR and CHI of 91.25% and data that not use Feature Selection of 91.67%. The result of testing indicates that permission and broadcast receiver can be used in classifying type of Malware, but the Feature Selection method that used have accuracy is a little below the data that are not using Feature Selection.
Rahmat Fauzi, Satrio Wibowo, Dela Youlina Putri
Fountain of Informatics Journal, Volume 3, pp 5-11; doi:10.21111/fij.v3i1.1824

Abstract:The development of e-commerce based on marketplace is very familiar in Indonesia. However, there is no digital printing services based on marketplace whereas the need of these services remains high. Currently, the printing house services based on business to customer (B2C) style so people have to compare the pricing and service information directly to print owners both online and offline. One solution to face this problem is to create a marketplace printing services called CETAKIN. By this application, information of printing service in a region can be integrated into this system. This system of printing marketplace integration is built with waterfall method with four stages namely needs analysis, system design, implementation, and system testing with PHP programming language and MySQL Database. The features that exist in this marketplace application is registration, search, order printing services. This information system application provides added value that makes the process of printing search and printing service prices more effective and efficient because people do not need to visit the address of printing. On the other hand, the benefits gained for the store owner can expand the coverage of his store's advertising so that the public know more the existence of the printing.
Muhammad Nugraha, Yogi Nugraha
Fountain of Informatics Journal, Volume 3, pp 24-29; doi:10.21111/fij.v3i1.1873

Abstract:Lectures schedule management in campus is an important aspect that must be implemented in every period. The schedule will be managed well if avoided from collision of the room, time, and lecturer. To overcome collision problem it's necessary to make mitigate system to avoid schedule changes frequently caused by collision of room, time, and lecturer. Thus, the author design and build SIM-DRaW (Sistem Informasi Manajemen Dosen, Ruang, dan Waktu) web-based to fulfill needs and overcome schedule management system. The final result of the design and build SIM-DRaW is implemented information system that can help schedule manager to avoid collision earlier.
Aidil Primasetya Armin, Fridy Mandita
Fountain of Informatics Journal, Volume 3, pp 1-4; doi:10.21111/fij.v3i1.1349

Abstract:The BVH data is composed of two parts, the first part detailing the hierarchy and the initial pose of the framework while the second part describes the data for each frame. This data contains the translation and rotation of each joint in the form of coordinates based on X, Y, and Z axes. This study demonstrates methods for modifying BVH data to obtain new movements. First choose the joint on the BVH data, then determine the coordinate point of the initial movement and the coordinate point of the joint end motion. Both select the coordinate point to be modified. The three selected points are rotated using a rotation matrix based on the X, Y, and Z axes. The results of the test will be displayed in the form of animated characters.
Indah Puji Astuti
Fountain of Informatics Journal, Volume 2; doi:10.21111/fij.v2i2.1067

Abstract:The student is one of entities in University or Higher Education. The student has a variety of data, such as self-identity information such as address, type of school, work of parents, type of class, etc. In fact many students whose graduation rate is different, on time and not on time. The number of students who graduate is not on time will be a problem not only for university but also for faculty. The number of students graduating each year is one of points of assessment when faculty or study program submits accreditation. C4.5 Algorithm is one of classification algorithm with decision trees. In this study conducted an analysis of student data Engineering Studies Program University of Muhammadiyah Ponorogo 2012/2013. The decision trees in this case is useful for exploring student data, finding the hidden relationship between a number of candidate input attributes with a target attribute. The input attribute consist of, the type of school, address, work of parent, and type of class. The output attribute to classify is status, which consists of "on time" and "not on time". The results from this analysis shown that in this case the C4.5 algorithm can predict with an accuracy value only 82%.
Muhammad Malik Hakim
Fountain of Informatics Journal, Volume 2; doi:10.21111/fij.v2i2.1236

Abstract:IT service providers often campaign for the importance of having a high level of IT maturity to its customers. However, not all IT companies have a high commitment to IT management within their own organisation. As a case study, this paper attempts to measure the IT maturity level of PT. XYZ that now is a growing IT services provider. Data collection is done by interview, document study, and direct field observation. The measurement of IT maturity level is conducted using 4 domains of COBIT 4.1 Framework, consists of Plan and Organize (PO), Deliver and Support (DS), Acquire and Implement (AI), and Monitor and Evaluate (ME). The result shows a value of 2.5 which indicates that IT maturity level is at level 2 (Repeatable but Intuitive) which means low enough for companies that should have a high awareness of IT governance and commitment. This study shows that the level of IT maturity in IT service provider is not always as high as its campaign.
Hilyah Magdalena
Fountain of Informatics Journal, Volume 2; doi:10.21111/fij.v2i2.1196

Abstract:Health services are basic services whose implementation is protected and guaranteed by the government. The existence of BPJS makes health services easier, more secure, and reachable to all levels of society. When a patient's health condition requires a higher facility, patients are generally referred to a higher-level health facility. In the province of Bangka Belitung currently stands several hospitals with various levels and completeness of facilities, ranging from provincial public hospitals, local public hospitals, to private hospitals. Patients who need referral can adjust the choice of the hospital with their health condition. The diverse needs of referral health care services and the diversity of hospitals with their services make decision making difficult. This study focuses on analyzing what factors are the basis of patient consideration in choosing a referral hospital. To support the multicriteria and multi-alternative selection process, this study uses the Analytical Hierarchy Process (AHP). The results of data processing showed that the most important criterion for patients when choosing a referral hospital was a health service attribute weighing 19.2% and the patients referred to were mostly referral patients in wards of wards with a weight of 24.2%.
Gita Indah Marthasari
Fountain of Informatics Journal, Volume 2; doi:10.21111/fij.v2i2.1216

Abstract:One indicator of college efficiency is the study period of the students. It is important for university managers to improve the ratio of students who graduate on time. This research aims to analyze the characteristics that affect the study period of students from academic data. The methods used are association rule mining (ARM) and clustering. We propose a framework to analyze academic data using ARM dan clustering method. ARM method is a method to find association rules that meet minimum support and minimum confidence. The algorithm used is Apriori. While clustering using Simple Expectation-Maximization (EM-clustering) algorithm. Simple EM is a model-based algorithm that searches for maximum likelihood estimation in the probability model. The variables analyzed were student achievement index, province of the students, and type of high school. The analysis is done using WEKA. Research begins with the collection of data from the primary source of the Biro Administrasi Akademik (BAA) Universitas Muhammadiyah Malang (UMM). Then, we do the data cleaning and transformation. Analyzing process is done in two step. First, do a rule search using Apriori algorithm. The regulated parameters are the minimum support and minimum confidence value. Second, we use Simple EM algorithm for the clustering process. The experiments were conducted to find the clustering result with the largest log likelihood value. Based on the experiment, the method used successfully describes the characteristics based on the study period.
Dwiyono Ariyadi
Fountain of Informatics Journal, Volume 2; doi:10.21111/fij.v2i2.1066

Abstract:Use of information technology facility as supporting support vision mission university need to be proven to prove, only with any of the measurement. Infrastructure audit of information technology on online test information system (SIUJO) faculty of technique is a form of measurement the maturity level in formation technology which the purpose is identifying the early possible risk so the process of faculty's bussiness is not trouble. Doing infrastructure audit of information technology using framework cobit 4.1 focus on subdomain AI3 and AI5 with respondent according to RACI. Audit of information technology infrastructure SIUJO shows the result that the maturity level is still on the current level 1. It is necessary for gradual improvement efforts between three years to maturity level 3 to 4. By doing audit earlierly, bussiness process expected to support the faculty.
Page of 3
Articles per Page
by

Refine Search

Authors

New Search

Advanced search