Pub Date : 2021-11-28DOI: 10.31940/matrix.v11i3.119-129
Rifqi Hammad, Azriel Christian Nurcahyo, Ahmad Zuli Amrullah, Pahrul Irfan, Kurniadin Abd. Latif
University requires the integration of data from one system with other systems as needed. This is because there are still many processes to input the same data but with different information systems. The application of data integration generally has several obstacles, one of which is due to the diversity of databases used by each information system. Schema matching is one method that can be used to overcome data integration problems caused by database diversity. The schema matching method used in this research is linguistic and constraint. The results of the matching scheme are used as material for optimizing data integration at the database level. The optimization process shows a change in the number of tables and attributes in the database that is a decrease in the number of tables by 13 tables and 492 attributes. The changes were caused by some tables and attributes were omitted and normalized. This research shows that after optimization, data integration becomes better because the data was connected and used by other systems has increased by 46.67% from the previous amount. This causes the same data entry on different systems can be reduced and also data inconsistencies caused by duplication of data on different systems can be minimized.
{"title":"Optimization of data integration using schema matching of linguistic-based and constraint-based in the university database","authors":"Rifqi Hammad, Azriel Christian Nurcahyo, Ahmad Zuli Amrullah, Pahrul Irfan, Kurniadin Abd. Latif","doi":"10.31940/matrix.v11i3.119-129","DOIUrl":"https://doi.org/10.31940/matrix.v11i3.119-129","url":null,"abstract":"University requires the integration of data from one system with other systems as needed. This is because there are still many processes to input the same data but with different information systems. The application of data integration generally has several obstacles, one of which is due to the diversity of databases used by each information system. Schema matching is one method that can be used to overcome data integration problems caused by database diversity. The schema matching method used in this research is linguistic and constraint. The results of the matching scheme are used as material for optimizing data integration at the database level. The optimization process shows a change in the number of tables and attributes in the database that is a decrease in the number of tables by 13 tables and 492 attributes. The changes were caused by some tables and attributes were omitted and normalized. This research shows that after optimization, data integration becomes better because the data was connected and used by other systems has increased by 46.67% from the previous amount. This causes the same data entry on different systems can be reduced and also data inconsistencies caused by duplication of data on different systems can be minimized.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80789809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-28DOI: 10.31940/matrix.v11i3.150-161
Stefanus Setyo Wibagso, Ivana Celesta
In a nursing home, the elderly gets health services to support their daily life. These services are documented and reported periodically to elderly families. In addition to managing information about nursing services, there is other information that must also be managed properly to help the smooth operation of the nursing home. To support the information management process, reliable software is needed to have the functions and benefits that are in accordance with the needs. One of the supporting components that contribute to building good software is interface design. This study will discuss the design of nursing home service application interfaces that have fields, characteristics, and functions that are different from other fields, especially the field of special health services for the elderly. The purpose of this study is to provide an overview and insight to desktop, mobile, and web application developers regarding aspects of designing an interface that is acceptable to system users in nursing homes. This will certainly make it easier for developers to produce good and acceptable software. The design of the interface is carried out using the Human-Centered Design (HCD) method which applies a user-focused design approach so that it makes it easy to understand what their needs are. There are several stages in HCD, namely the stage of identifying and determining the context of the user (Understand and specifying the context of use), the stage of identifying user requirements (Specifying the user requirements), the stage of producing design solutions (Producing design solutions) and the stage of evaluating the design (Evaluating the design). This research produces an interactive and easy-to-use interface design because the testing process uses a prototype as a demonstration tool. The test results using the End User Computing Satisfaction (EUCS) method show that 88.25% of users are satisfied with the design made and in line with the needs of users in a nursing home.
{"title":"Implementation of human-centered design methods in designing application interfaces for nursing home service","authors":"Stefanus Setyo Wibagso, Ivana Celesta","doi":"10.31940/matrix.v11i3.150-161","DOIUrl":"https://doi.org/10.31940/matrix.v11i3.150-161","url":null,"abstract":"In a nursing home, the elderly gets health services to support their daily life. These services are documented and reported periodically to elderly families. In addition to managing information about nursing services, there is other information that must also be managed properly to help the smooth operation of the nursing home. To support the information management process, reliable software is needed to have the functions and benefits that are in accordance with the needs. One of the supporting components that contribute to building good software is interface design. This study will discuss the design of nursing home service application interfaces that have fields, characteristics, and functions that are different from other fields, especially the field of special health services for the elderly. The purpose of this study is to provide an overview and insight to desktop, mobile, and web application developers regarding aspects of designing an interface that is acceptable to system users in nursing homes. This will certainly make it easier for developers to produce good and acceptable software. The design of the interface is carried out using the Human-Centered Design (HCD) method which applies a user-focused design approach so that it makes it easy to understand what their needs are. There are several stages in HCD, namely the stage of identifying and determining the context of the user (Understand and specifying the context of use), the stage of identifying user requirements (Specifying the user requirements), the stage of producing design solutions (Producing design solutions) and the stage of evaluating the design (Evaluating the design). This research produces an interactive and easy-to-use interface design because the testing process uses a prototype as a demonstration tool. The test results using the End User Computing Satisfaction (EUCS) method show that 88.25% of users are satisfied with the design made and in line with the needs of users in a nursing home.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74878150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-28DOI: 10.31940/matrix.v11i3.130-139
H. Pradibta, U. Nurhasan, Muhammad Dwi Aldi Rizaldi
The solar system is one of the natural phenomena taught at school. However, delivering the material is still text-based. One of the current technology-based learning uses technology Augmented Reality as a support for learning aid. Augmented Reality is an integrated two worlds, the real and the virtual. Augmented Reality for the solar system learning application was developed by applying the concept of the Rule-Based System algorithm as a simple artificial intelligence that aims to help augmented reality systems in simulating knowledge and experience from humans with several rules prepared. The existence of Augmented Reality facilitates the process of learning on specific topics such as the solar system more attractive and interactive, with aims to inspire students to learn the solar system. Based on the testing results at SDN Purwantoro 2 Malang, Indonesia 95% of respondents are interested and captivated by learning media applications using Augmented Reality technology.
{"title":"Implementation of multimarker augmented reality on solar system simulations","authors":"H. Pradibta, U. Nurhasan, Muhammad Dwi Aldi Rizaldi","doi":"10.31940/matrix.v11i3.130-139","DOIUrl":"https://doi.org/10.31940/matrix.v11i3.130-139","url":null,"abstract":"The solar system is one of the natural phenomena taught at school. However, delivering the material is still text-based. One of the current technology-based learning uses technology Augmented Reality as a support for learning aid. Augmented Reality is an integrated two worlds, the real and the virtual. Augmented Reality for the solar system learning application was developed by applying the concept of the Rule-Based System algorithm as a simple artificial intelligence that aims to help augmented reality systems in simulating knowledge and experience from humans with several rules prepared. The existence of Augmented Reality facilitates the process of learning on specific topics such as the solar system more attractive and interactive, with aims to inspire students to learn the solar system. Based on the testing results at SDN Purwantoro 2 Malang, Indonesia 95% of respondents are interested and captivated by learning media applications using Augmented Reality technology.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"90 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75839199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2419
Nadhia Nurin Syarafina, Teknik Informatika Stiki Malang, J. Palandi
Good scriptwriting or reporting requires a high level of accuracy. The basic problem is that the level of accuracy of the authors is not the same. The low level of accuracy allows for mistyping of words in a sentence. Typing errors caused the word to become non-standard. Even worse, the word became meaningless. In this case, the recommendation application serves to provide word-writing recommendations in case of a typing error. This application can reduce the error rate of the writer when typing. One method to improve word spelling is Approximate String Matching. This method applies an approach to the string search process. The Levenshtein Distance algorithm is a part of the Approximate String-Matching method. This method, firstly, is necessary to go through the preprocessing stage to correct an incorrectly written word using the Levenshtein Distance algorithm. The application testing phase uses ten texts composed of 100 words, ten texts composed of 100 to 250 words, and ten texts composed of 250 to 500 words. The average accuracy rate of these test results was 95%, 94%, and 90%.
{"title":"Designing a word recommendation application using the Levenshtein Distance algorithm","authors":"Nadhia Nurin Syarafina, Teknik Informatika Stiki Malang, J. Palandi","doi":"10.31940/MATRIX.V11I2.2419","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2419","url":null,"abstract":"Good scriptwriting or reporting requires a high level of accuracy. The basic problem is that the level of accuracy of the authors is not the same. The low level of accuracy allows for mistyping of words in a sentence. Typing errors caused the word to become non-standard. Even worse, the word became meaningless. In this case, the recommendation application serves to provide word-writing recommendations in case of a typing error. This application can reduce the error rate of the writer when typing. One method to improve word spelling is Approximate String Matching. This method applies an approach to the string search process. The Levenshtein Distance algorithm is a part of the Approximate String-Matching method. This method, firstly, is necessary to go through the preprocessing stage to correct an incorrectly written word using the Levenshtein Distance algorithm. The application testing phase uses ten texts composed of 100 words, ten texts composed of 100 to 250 words, and ten texts composed of 250 to 500 words. The average accuracy rate of these test results was 95%, 94%, and 90%.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"85 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88159038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2447
Andi Sofyan Anas, I. Utami, A. B. Maulachela, A. Juliansyah
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community. This Information technology service is managed by Information Technology and Communication Center (PUSTIK) which is responsible to carry out the development, management, service, and maintaining the security of information and communication technology. Good information technology governance should be able to maintain information security. Therefore, it is necessary to evaluate information system security especially the security of academic information systems. This information system security evaluation uses Keamanan Informasi (KAMI) Index which refers to the ISO/IEC 27001:2013 standard to be able to determine the maturity level of information security. An evaluation of five areas of the KAMI Index shows the Information Security Risk Management area gets the lowest score at 10 out of a total of 72. The result of the KAMI Index dashboard shows that the maturity level of each area of information security is at levels I and I+ with a total score of 166. This means that the level of completeness of implement ISO 27001:2013 standard is in the inadequate category.
XYZ大学是利用信息技术为学生和整个学术界提供优质服务的大学之一。该信息技术服务由信息技术和通信中心(PUSTIK)管理,该中心负责开展信息和通信技术的开发、管理、服务和维护安全。良好的信息技术治理应该能够维护信息安全。因此,有必要对信息系统的安全进行评估,特别是对高校信息系统的安全进行评估。本信息系统安全评估使用Keamanan Informasi (KAMI)指数,该指数参考ISO/IEC 27001:2013标准,能够确定信息安全的成熟度级别。对KAMI指数的5个领域进行评价的结果显示,信息安全风险管理领域在72分中仅获得10分,是最低值。KAMI指数仪表板的结果显示,信息安全各领域的成熟度等级为I级和I+级,总分为166分。这意味着实施ISO 27001:2013标准的完整程度处于不充分类别。
{"title":"KAMI index as an evaluation of academic information system security at XYZ university","authors":"Andi Sofyan Anas, I. Utami, A. B. Maulachela, A. Juliansyah","doi":"10.31940/MATRIX.V11I2.2447","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2447","url":null,"abstract":"XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community. This Information technology service is managed by Information Technology and Communication Center (PUSTIK) which is responsible to carry out the development, management, service, and maintaining the security of information and communication technology. Good information technology governance should be able to maintain information security. Therefore, it is necessary to evaluate information system security especially the security of academic information systems. This information system security evaluation uses Keamanan Informasi (KAMI) Index which refers to the ISO/IEC 27001:2013 standard to be able to determine the maturity level of information security. An evaluation of five areas of the KAMI Index shows the Information Security Risk Management area gets the lowest score at 10 out of a total of 72. The result of the KAMI Index dashboard shows that the maturity level of each area of information security is at levels I and I+ with a total score of 166. This means that the level of completeness of implement ISO 27001:2013 standard is in the inadequate category.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75889110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2433
Imantoko Imantoko, Arief Hermawan, Donny Avianto
The communication method using sign language is very efficient considering that the speed of information delivery is closer to verbal communication (speaking) compared to writing or typing. Because of this, sign language is often used by people who are deaf, speech impaired, and normal people to communicate. To make sign language translation easier, a system is needed to translate symbols formed from hand movements (in the form of images) into text or sound. This study aims to compare performance such as accuracy and computation time of Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) with Pyramidal Histogram of Gradient (PHOG) for feature extraction, to know which one is better at recognizing sign language. Yield, both combined methods PHOG-SVM and PHOG-KNN can recognize images from hand movements that form certain symbols. The system built using the SVM classification produces the highest accuracy of 82% at PHOG level 3, while the system built with the KNN classification produces the highest accuracy of 78% at PHOG level 2. The total computation time of the fastest training and testing by the SVM model is 236.53 seconds at PHOG level 3, while the KNN model is 78.27 seconds at PHOG level 3. In terms of accuracy, PHOG-SVM is better, but in terms of computation time, PHOG-KNN takes the place.
{"title":"Comparative analysis of support vector machine and k-nearest neighbors with a pyramidal histogram of the gradient for sign language detection","authors":"Imantoko Imantoko, Arief Hermawan, Donny Avianto","doi":"10.31940/MATRIX.V11I2.2433","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2433","url":null,"abstract":"The communication method using sign language is very efficient considering that the speed of information delivery is closer to verbal communication (speaking) compared to writing or typing. Because of this, sign language is often used by people who are deaf, speech impaired, and normal people to communicate. To make sign language translation easier, a system is needed to translate symbols formed from hand movements (in the form of images) into text or sound. This study aims to compare performance such as accuracy and computation time of Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) with Pyramidal Histogram of Gradient (PHOG) for feature extraction, to know which one is better at recognizing sign language. Yield, both combined methods PHOG-SVM and PHOG-KNN can recognize images from hand movements that form certain symbols. The system built using the SVM classification produces the highest accuracy of 82% at PHOG level 3, while the system built with the KNN classification produces the highest accuracy of 78% at PHOG level 2. The total computation time of the fastest training and testing by the SVM model is 236.53 seconds at PHOG level 3, while the KNN model is 78.27 seconds at PHOG level 3. In terms of accuracy, PHOG-SVM is better, but in terms of computation time, PHOG-KNN takes the place.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78286866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2306
G. Mahendra
eIQ Consumer Pulse 2019 determines the 6 largest e-commerce in Indonesia, namely Blibli, Bukalapak, JD.id, Lazada Indonesia, Shopee and Tokopedia. This is due to an increase in e-commerce transactions. The COVID-19 pandemic, which emphasizes social distancing and physical distancing, has also played a role in increasing these transactions. Indonesia is also predicted to become the market leader in Southeast Asia due to this. On the other hand, each e-commerce customer has their preferences in choosing e-commerce to use in transactions. Various criteria make customers confused due to intense competition between e-commerce companies. DSS is a solution in choosing the right e-commerce for each customer's preferences. The AHP-WASPAS and AHP-MOORA methods can be used in calculations for determining favorite e-commerce in Indonesia. The CRISP-DM framework also helps in preparing the research flow well. 3 decision-makers are used to provide weighting criteria using AHP. The results of this study indicate that the Tokopedia alternative is the best e-commerce, with a preference value of 0.8964 for AHP-WASPAS and 0.4245 for AHP-MOORA. The second and third places are Bukalapak and Lazada, respectively. The weighting of the criteria by the decision-maker, the alternative normalization process and the calculation technique for the preference value have a significant impact on the ranking results.
{"title":"DSS for best e-commerce selection using AHP-WASPAS and AHP-MOORA methods","authors":"G. Mahendra","doi":"10.31940/MATRIX.V11I2.2306","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2306","url":null,"abstract":"eIQ Consumer Pulse 2019 determines the 6 largest e-commerce in Indonesia, namely Blibli, Bukalapak, JD.id, Lazada Indonesia, Shopee and Tokopedia. This is due to an increase in e-commerce transactions. The COVID-19 pandemic, which emphasizes social distancing and physical distancing, has also played a role in increasing these transactions. Indonesia is also predicted to become the market leader in Southeast Asia due to this. On the other hand, each e-commerce customer has their preferences in choosing e-commerce to use in transactions. Various criteria make customers confused due to intense competition between e-commerce companies. DSS is a solution in choosing the right e-commerce for each customer's preferences. The AHP-WASPAS and AHP-MOORA methods can be used in calculations for determining favorite e-commerce in Indonesia. The CRISP-DM framework also helps in preparing the research flow well. 3 decision-makers are used to provide weighting criteria using AHP. The results of this study indicate that the Tokopedia alternative is the best e-commerce, with a preference value of 0.8964 for AHP-WASPAS and 0.4245 for AHP-MOORA. The second and third places are Bukalapak and Lazada, respectively. The weighting of the criteria by the decision-maker, the alternative normalization process and the calculation technique for the preference value have a significant impact on the ranking results.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79140773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2449
I. Setiawan, Politeknik Negeri Bandung, S. Suprihanto
Visualization of data is the appearance of data in a pictographic or graphical form. This form facilitates top management to understand the data visually and get the messages of difficult concepts or identify new patterns. The approach of the personal understanding to handle data; applying diagrams or graphs to reflect vast volumes of complex data is more comfortable than presenting over tables or statements. In this study, we conduct data processing and data visualization for crime report data that occurred in the city of Los Angeles in the range of 2010 to 2017 using R language. The research methodology follows five steps, namely: variables identification, data pre-processing, univariate analysis, bivariate analysis, and multivariate analysis. This paper analyses data related to crime variables, time of occurrence, victims, type of crime, weapons used, distribution, and trends of crime, and the relationship between these variables. As the result shows, by using those methods, we can gain insights, understandings, new patterns, and do visual analytics from the existing data. The variations of crime variables presented in this paper are only a few of the many variations that can be made. Other variations can be performed to get more insights, understandings, and new patterns from the existing data. The methods can be performed on other types of data as well.
{"title":"Exploratory data analysis of crime report","authors":"I. Setiawan, Politeknik Negeri Bandung, S. Suprihanto","doi":"10.31940/MATRIX.V11I2.2449","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2449","url":null,"abstract":"Visualization of data is the appearance of data in a pictographic or graphical form. This form facilitates top management to understand the data visually and get the messages of difficult concepts or identify new patterns. The approach of the personal understanding to handle data; applying diagrams or graphs to reflect vast volumes of complex data is more comfortable than presenting over tables or statements. In this study, we conduct data processing and data visualization for crime report data that occurred in the city of Los Angeles in the range of 2010 to 2017 using R language. The research methodology follows five steps, namely: variables identification, data pre-processing, univariate analysis, bivariate analysis, and multivariate analysis. This paper analyses data related to crime variables, time of occurrence, victims, type of crime, weapons used, distribution, and trends of crime, and the relationship between these variables. As the result shows, by using those methods, we can gain insights, understandings, new patterns, and do visual analytics from the existing data. The variations of crime variables presented in this paper are only a few of the many variations that can be made. Other variations can be performed to get more insights, understandings, and new patterns from the existing data. The methods can be performed on other types of data as well.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89865629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.31940/MATRIX.V11I2.2274
Muhamad Agung Santoso, Rina Fiati, R. Nindyasari
The asset performance monitoring should be done to find out and review the reported data whether it has been in line with the reality or not. It is important to identify the occurring problems to be immediately handled. The information system development aimed to build the existing system. Thus, it will be more effective and efficient to produce information. This research applied the System Development Life Cycle (SDLC) with Waterfall Model to design, create, maintain the information and process the system. During the creation of this information system, the authors applied the PHP language program, Framework Codeigniter, MySQL, database, and Visual Studio Code as the editorial codes. The implementation of the SIPERITA application, could be used excellently were proven effective and efficient because the application facilitated the monitoring activities by providing single application access in promoting a checking process of the condition asset then the user administrator can see a diagram of the monitoring results on the home page so that if there is a problem with the asset, direct action can be taken and with this application, users can print the reports based on daily, monthly, and annually.
进行资产绩效监控,发现并审查所上报的数据是否符合实际。确定需要立即处理的问题是很重要的。信息系统开发的目的是建立现有的系统。因此,它将更有效和高效地生产信息。本研究采用瀑布模型的系统开发生命周期(SDLC)对系统进行设计、创建、信息维护和处理。在该信息系统的创建过程中,作者使用了PHP语言程序、Framework Codeigniter、MySQL、数据库和Visual Studio Code作为编辑代码。SIPERITA应用程序的实施,可以很好地证明是有效和高效的,因为该应用程序通过提供单个应用程序访问来促进状态资产的检查过程,从而促进了监控活动,然后用户管理员可以在主页上看到监控结果的图表,以便如果资产出现问题,可以直接采取行动,并且使用该应用程序,用户可以打印基于每日的报告。每月一次,每年一次。
{"title":"The system development life cycle model implementation on information system of performance reporting IT asset case study: PT Kereta Api Indonesia (Persero)","authors":"Muhamad Agung Santoso, Rina Fiati, R. Nindyasari","doi":"10.31940/MATRIX.V11I2.2274","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I2.2274","url":null,"abstract":"The asset performance monitoring should be done to find out and review the reported data whether it has been in line with the reality or not. It is important to identify the occurring problems to be immediately handled. The information system development aimed to build the existing system. Thus, it will be more effective and efficient to produce information. This research applied the System Development Life Cycle (SDLC) with Waterfall Model to design, create, maintain the information and process the system. During the creation of this information system, the authors applied the PHP language program, Framework Codeigniter, MySQL, database, and Visual Studio Code as the editorial codes. The implementation of the SIPERITA application, could be used excellently were proven effective and efficient because the application facilitated the monitoring activities by providing single application access in promoting a checking process of the condition asset then the user administrator can see a diagram of the monitoring results on the home page so that if there is a problem with the asset, direct action can be taken and with this application, users can print the reports based on daily, monthly, and annually.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88278614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.31940/MATRIX.V11I1.2330
Y. H. Chrisnanto, Gunawan Abdullah
Education is an important thing in a person's life, because by having adequate education, one's life will be better. Education can be obtained formally through formal institutions that constructively provide a person's abilities academically. This study aims to determine student performance in terms of academic and non-academic domains at a certain time during their education using techniques in data mining (DM) which are directed towards academic data analysis. Academic performance is delivered through the Educational Data Mining (EDM) integrated data mining model, in which the techniques used include classification (ID3, SVM), clustering (k-Means, k-Medoids), association rules (Apriori) and anomaly detection (DBSCAN). The data set used is academic data in the form of study results over a certain period of time. The results of EDM can be used for analysis related to academic performance which can be used for strategic decision making in aca-demic management at higher education institutions. The results of this study indicate that the use of several techniques in data mining together can maximize the ability to analyze academic performance with the same data source and produce different analysis patterns.
{"title":"The uses of educational data mining in academic performance analysis at higher education institutions (case study at UNJANI)","authors":"Y. H. Chrisnanto, Gunawan Abdullah","doi":"10.31940/MATRIX.V11I1.2330","DOIUrl":"https://doi.org/10.31940/MATRIX.V11I1.2330","url":null,"abstract":"Education is an important thing in a person's life, because by having adequate education, one's life will be better. Education can be obtained formally through formal institutions that constructively provide a person's abilities academically. This study aims to determine student performance in terms of academic and non-academic domains at a certain time during their education using techniques in data mining (DM) which are directed towards academic data analysis. Academic performance is delivered through the Educational Data Mining (EDM) integrated data mining model, in which the techniques used include classification (ID3, SVM), clustering (k-Means, k-Medoids), association rules (Apriori) and anomaly detection (DBSCAN). The data set used is academic data in the form of study results over a certain period of time. The results of EDM can be used for analysis related to academic performance which can be used for strategic decision making in aca-demic management at higher education institutions. The results of this study indicate that the use of several techniques in data mining together can maximize the ability to analyze academic performance with the same data source and produce different analysis patterns.","PeriodicalId":31964,"journal":{"name":"Matrix Jurnal Manajemen Teknologi dan Informatika","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82416053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}