The String-matching technique is part of the similarity technique. This technique can detect the similarity level of the text. The Rabin-Karp is an algorithm of string-matching type. The Rabin-Karp is capable of multiple patterns searching but does not match a single pattern. The Jaro-Winkler Distance algorithm can find strings within approximate string matching. This algorithm is very suitable and gives the best results on the matching of two short strings. This study aims to overcome the shortcomings of the Rabin-Karp algorithm in the single pattern search process by combining the Jaro-Winkler and Rabin-Karp algorithm methods. The merging process started from pre-processing and forming the K-Gram data. Then, it was followed by the calculation of the hash value for each K-Gram by the Rabin-Karp algorithm. The process of finding the same hash score and calculating the percentage level of data similarity used the Jaro-Winkler algorithm. The test was done by comparing words, sentences, and journal abstracts that have been rearranged. The average percentage of the test results for the similarity level of words in the combination algorithm has increased. In contrast, the results of the percentage test for the level of similarity of sentences and journal abstracts have decreased. The experimental results showed that the combination of the Jaro-Winkler algorithm on the Rabin-Karp algorithm can improve the similarity of text accuracy.
{"title":"The Hybrid of Jaro-Winkler and Rabin-Karp Algorithm in Detecting Indonesian Text Similarity","authors":"Muhamad Arief Yulianto, N. Nurhasanah","doi":"10.15575/join.v6i1.640","DOIUrl":"https://doi.org/10.15575/join.v6i1.640","url":null,"abstract":"The String-matching technique is part of the similarity technique. This technique can detect the similarity level of the text. The Rabin-Karp is an algorithm of string-matching type. The Rabin-Karp is capable of multiple patterns searching but does not match a single pattern. The Jaro-Winkler Distance algorithm can find strings within approximate string matching. This algorithm is very suitable and gives the best results on the matching of two short strings. This study aims to overcome the shortcomings of the Rabin-Karp algorithm in the single pattern search process by combining the Jaro-Winkler and Rabin-Karp algorithm methods. The merging process started from pre-processing and forming the K-Gram data. Then, it was followed by the calculation of the hash value for each K-Gram by the Rabin-Karp algorithm. The process of finding the same hash score and calculating the percentage level of data similarity used the Jaro-Winkler algorithm. The test was done by comparing words, sentences, and journal abstracts that have been rearranged. The average percentage of the test results for the similarity level of words in the combination algorithm has increased. In contrast, the results of the percentage test for the level of similarity of sentences and journal abstracts have decreased. The experimental results showed that the combination of the Jaro-Winkler algorithm on the Rabin-Karp algorithm can improve the similarity of text accuracy.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91110312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agus Mailana, Andi Agung Putra, Sarifudlin Hidayat, Arief Wibowo
In higher educational institutions, graduation rates are one of the many aspects to assess the quality of the learning process. Al-Hidayah Islamic University in Bogor is one of the established private Islamic universities to create skilled human resources with moral values required by many companies nowadays. Having another institution in Bogor as a competitor with the same direction and objective is a challenge for Al-Hidayah Islamic University. Thus a solution is required to face the competition. One solution is to predict the student graduation timeliness of the students using data mining method with classification function. The implemented methodology in the data mining is Discovery Knowledge of Database (KDD), starting from selecting, preprocessing, transformation, data mining, and evaluation/ interpretation. There were two Algorithm models used in this paper, namely C4.5 and Support Vector Machine (SVM). The classification procedure consists of predictor variables and one of the target variables. Predictor variables are gender, Grade Point Average, marital status, and job status. Rapid Miner software was used to process the data. The final results of both Algorithms show an 81% precision rate and 80% accuracy level for the C4.5 Algorithm, while SVM has an 88% precision rate and 85% accuracy level.
{"title":"Comparison of C4.5 Algorithm and Support Vector Machine in Predicting the Student Graduation Timeliness","authors":"Agus Mailana, Andi Agung Putra, Sarifudlin Hidayat, Arief Wibowo","doi":"10.15575/JOIN.V6I1.608","DOIUrl":"https://doi.org/10.15575/JOIN.V6I1.608","url":null,"abstract":"In higher educational institutions, graduation rates are one of the many aspects to assess the quality of the learning process. Al-Hidayah Islamic University in Bogor is one of the established private Islamic universities to create skilled human resources with moral values required by many companies nowadays. Having another institution in Bogor as a competitor with the same direction and objective is a challenge for Al-Hidayah Islamic University. Thus a solution is required to face the competition. One solution is to predict the student graduation timeliness of the students using data mining method with classification function. The implemented methodology in the data mining is Discovery Knowledge of Database (KDD), starting from selecting, preprocessing, transformation, data mining, and evaluation/ interpretation. There were two Algorithm models used in this paper, namely C4.5 and Support Vector Machine (SVM). The classification procedure consists of predictor variables and one of the target variables. Predictor variables are gender, Grade Point Average, marital status, and job status. Rapid Miner software was used to process the data. The final results of both Algorithms show an 81% precision rate and 80% accuracy level for the C4.5 Algorithm, while SVM has an 88% precision rate and 85% accuracy level.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90704975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ability to do problem solving will be greatly influenced by how the flow of thinking in decomposing a problem until it finds the root of the problem so that it can determine the best solution. There is currently a growing recognition around the world that all fields require a prerequisite ability, namely to think logically, in a structured manner, and use computational tools to rapidly model and visualize data. This ability is known as Computational Thinking (CT). In this study, the author applied the computational thinking key concept in a case study to train structured thinking in problem solving. Computational thinking key concept includes Decomposition, Pattern recognition, Abstraction, and lastly use algorithms when they design simple steps to solve problems. Based on our case study that has been model, the result shows us that Computational Thinking can be used to train structured thinking in problem solving in everyday life
{"title":"The Importance of Computational Thinking to Train Structured Thinking in Problem Solving","authors":"R. Andrian, R. Hikmawan","doi":"10.15575/JOIN.V6I1.677","DOIUrl":"https://doi.org/10.15575/JOIN.V6I1.677","url":null,"abstract":"Ability to do problem solving will be greatly influenced by how the flow of thinking in decomposing a problem until it finds the root of the problem so that it can determine the best solution. There is currently a growing recognition around the world that all fields require a prerequisite ability, namely to think logically, in a structured manner, and use computational tools to rapidly model and visualize data. This ability is known as Computational Thinking (CT). In this study, the author applied the computational thinking key concept in a case study to train structured thinking in problem solving. Computational thinking key concept includes Decomposition, Pattern recognition, Abstraction, and lastly use algorithms when they design simple steps to solve problems. Based on our case study that has been model, the result shows us that Computational Thinking can be used to train structured thinking in problem solving in everyday life","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78190558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Review ranking is useful to give users a better experience. Review ranking studies commonly use upvote value, which does not represent urgency, and it causes problems in prediction. In contrast, manual labeling as wide as the upvote value range provides a high bias and inconsistency. The proposed solution is to use a classification approach to rank the review where the labels are ordinal urgency class. The experiment involved shallow learning models (Logistic Regression, Naïve Bayesian, Support Vector Machine, and Random Forest), and deep learning models (LSTM and CNN). In constructing a classification model, the problem is broken down into several binary classifications that predict tendencies of urgency depending on the separation of classes. The result shows that deep learning models outperform other models in classification dan ranking evaluation. In addition, the review data used tend to contain vocabulary of certain product domains, so further research is needed on data with more diverse vocabulary.
{"title":"Product Review Ranking in e-Commerce using Urgency Level Classification Approach","authors":"H. Zuhri, N. Maulidevi","doi":"10.15575/JOIN.V5I2.612","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.612","url":null,"abstract":"Review ranking is useful to give users a better experience. Review ranking studies commonly use upvote value, which does not represent urgency, and it causes problems in prediction. In contrast, manual labeling as wide as the upvote value range provides a high bias and inconsistency. The proposed solution is to use a classification approach to rank the review where the labels are ordinal urgency class. The experiment involved shallow learning models (Logistic Regression, Naïve Bayesian, Support Vector Machine, and Random Forest), and deep learning models (LSTM and CNN). In constructing a classification model, the problem is broken down into several binary classifications that predict tendencies of urgency depending on the separation of classes. The result shows that deep learning models outperform other models in classification dan ranking evaluation. In addition, the review data used tend to contain vocabulary of certain product domains, so further research is needed on data with more diverse vocabulary.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88977973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Aini, U. Rahardja, Melani Rapina Tangkaw, N. Santoso, Alfiah Khoirunisa
In the disruptive 4.0 era that emphasizes technological sophistication, blockchain is present as a technology that increasingly influences human life, helping humans in all aspects, including education. The role of blockchain technology in the world of education is to test the validity of diplomas, the increasing number of fake diplomas for an interest, both for work and continuing education to a higher level. The purpose of this research with the implementation of blockchain is expected to make it easier for users to verify the authenticity of a diploma. This study uses the SWOT analysis method to identify all possibilities that exist in blockchain technology. The final result of this research, the system will print a physical certificate in the form of paper in general, then the certificate will be printed a QR code. To verify numeric code on QR Code via scanning on smartphone or QR Reader. It is hoped that the blockchain technology applied to digital assets can reduce cases of forgery of diplomas and other important documents.
{"title":"Embedding a Blockchain Technology Pattern Into the QR Code for an Authentication Certificate","authors":"Q. Aini, U. Rahardja, Melani Rapina Tangkaw, N. Santoso, Alfiah Khoirunisa","doi":"10.15575/JOIN.V5I2.583","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.583","url":null,"abstract":"In the disruptive 4.0 era that emphasizes technological sophistication, blockchain is present as a technology that increasingly influences human life, helping humans in all aspects, including education. The role of blockchain technology in the world of education is to test the validity of diplomas, the increasing number of fake diplomas for an interest, both for work and continuing education to a higher level. The purpose of this research with the implementation of blockchain is expected to make it easier for users to verify the authenticity of a diploma. This study uses the SWOT analysis method to identify all possibilities that exist in blockchain technology. The final result of this research, the system will print a physical certificate in the form of paper in general, then the certificate will be printed a QR code. To verify numeric code on QR Code via scanning on smartphone or QR Reader. It is hoped that the blockchain technology applied to digital assets can reduce cases of forgery of diplomas and other important documents.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77360078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The government is seeking preventive steps to reduce the risk of the spread of Covid-19, one of which is social restrictions that have become popular with social distancing and physical distancing. One way to assess whether the steps taken by the government regarding social and physical distancing are accepted or not by the community is by conducting sentiment analysis. The process of sentiment analysis is carried out using a variant of the Recurrent Neural Network (RNN), namely Long Short-Term Memory (LSTM). In this study, the results obtained from the sentiment analysis, where the public response to social distancing and physical distancing has more positive sentiments than negative sentiments. To measure the accuracy level of sentiment analysis using the Recurrent Neural Network (RNN) algorithm and evaluation of the modeling is done using confusion matrix where the results obtained for the training dataset are 89% accuracy, 89% recall, 89% precision, and 89% F1 Score. Meanwhile, for the test dataset, an accuracy of 80% was obtained, a recall of 79%, a precision of 81%, and an F1 score of 80%.
{"title":"Sentiment Analysis on Social Distancing and Physical Distancing on Twitter Social Media using Recurrent Neural Network (RNN) Algorithm","authors":"Fikri Nugraha, Nisa Hanum Harani, Roni Habibi, Rd. Nuraini Siti Fatonah","doi":"10.15575/JOIN.V5I2.632","DOIUrl":"https://doi.org/10.15575/JOIN.V5I2.632","url":null,"abstract":"The government is seeking preventive steps to reduce the risk of the spread of Covid-19, one of which is social restrictions that have become popular with social distancing and physical distancing. One way to assess whether the steps taken by the government regarding social and physical distancing are accepted or not by the community is by conducting sentiment analysis. The process of sentiment analysis is carried out using a variant of the Recurrent Neural Network (RNN), namely Long Short-Term Memory (LSTM). In this study, the results obtained from the sentiment analysis, where the public response to social distancing and physical distancing has more positive sentiments than negative sentiments. To measure the accuracy level of sentiment analysis using the Recurrent Neural Network (RNN) algorithm and evaluation of the modeling is done using confusion matrix where the results obtained for the training dataset are 89% accuracy, 89% recall, 89% precision, and 89% F1 Score. Meanwhile, for the test dataset, an accuracy of 80% was obtained, a recall of 79%, a precision of 81%, and an F1 score of 80%.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88357895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagles
本研究利用有限状态机算法(FSM)对NPC (Non-Player Character,非玩家角色)的移动产生动态动作,开发Android游戏。最受欢迎的传奇游戏是《超级马里奥兄弟》和《铲骑士》,这款游戏从当时到现在都是最受欢迎的游戏,但游戏没有使用AI(人工智能),所以游戏看起来不那么具有挑战性。这款游戏是一款概念游戏,目前很少有人使用。基于此,我们通过在Android平台上的npc上执行AI创造了一款基于侧卷轴的生存游戏。使用的AI是FSM算法,其功能是调节敌人的移动。本游戏的多媒体产品开发采用的方法是MDLC (multimedia Development Life Cycle)。根据已经进行的测试,alpha测试的结果在功能上是合适的,使用用户接受度测试(UAT)的beta测试的结果获得了86.40%的值,被宣布为可行的使用和可以开发。这个游戏的优点是存在以山体滑坡、水爆发、岩雨和老鹰攻击的形式出现的冲击元素
{"title":"Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies","authors":"Ade Solihin, E. W. Hidayat, A. P. Aldya","doi":"10.15575/JOIN.V4I1.293","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.293","url":null,"abstract":"This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagles","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73765047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
{"title":"Development of National Digital Evidence Metadata","authors":"B. Sugiantoro","doi":"10.15575/JOIN.V4I1.292","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.292","url":null,"abstract":"The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76760429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of pharmacies in the Pangkalpinang City has increased rapidly. This is directly proportional to the needs of the people of Pangkalpinang City to fulfill the health needs, buy medicine or divert doctor's prescriptions. This is a debate for people who do not know the location of pharmacies in this city. Practically, people can just go to a pharmacy with a location that far from user location, even though there is a pharmacy near the user. This is because there is no pharmacy information location in the Pangkalpinang City. To solve this problem, proposed a system that can display the location of all pharmacies in the Pangkalpinang City. In addition, the system can search the shortest path from the user's location to the nearest pharmacy location around using the A * algorithm. This algorithm was chosen because its advantages that are able to produce optimal solutions according to the expected heuristic functions. The results of the testing are that the system can optimize and be able to search the shortest path from the user's location to the nearest pharmacy.
{"title":"Implementation of Finding Shortest Route for Pharmacy Location Using A-star Algorithm","authors":"F. P. Juniawan, Dwi Yuny Sylfania, Dini Agrina","doi":"10.15575/JOIN.V4I1.296","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.296","url":null,"abstract":"The number of pharmacies in the Pangkalpinang City has increased rapidly. This is directly proportional to the needs of the people of Pangkalpinang City to fulfill the health needs, buy medicine or divert doctor's prescriptions. This is a debate for people who do not know the location of pharmacies in this city. Practically, people can just go to a pharmacy with a location that far from user location, even though there is a pharmacy near the user. This is because there is no pharmacy information location in the Pangkalpinang City. To solve this problem, proposed a system that can display the location of all pharmacies in the Pangkalpinang City. In addition, the system can search the shortest path from the user's location to the nearest pharmacy location around using the A * algorithm. This algorithm was chosen because its advantages that are able to produce optimal solutions according to the expected heuristic functions. The results of the testing are that the system can optimize and be able to search the shortest path from the user's location to the nearest pharmacy.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84538596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Small Micro Medium Enterprises (SMME) is one of the business enterprises that has a prime role in the development of economic growth in Indonesia. The SMME also not only reduces the number of jobless but also improve the community’s standard of living. Nonetheless, in this globalization era where the technology reaches its peak in every field, some SMME entrepreneurs have not taken advantage of IT-based business yet. On the other hand, the utilization of IT in the business field has many profitable benefits. This could make the SMME faced trouble and hard to survive in the tight competition with other bigger enterprises that had applied IT in the future. The main reason that SMME entrepreneur has not applied the IT system is that they lack fund. Moreover, cloud computing is a technology that can be used for every SMME entrepreneur without any costs. The advantages of this system utilization are to improve competitiveness, increase its flexibility, reduce costs, and to improve both agility and scalability. This research is based on a literature study that describes research’s aim that is to seek advantages from cloud computing implementation towards SMME in Indonesia so they can compete with international enterprises with a bigger scale. The researcher expects that SMME entrepreneurs in Indonesia can utilize Information technology particularly cloud computing, to support their business.
中小微企业(Small Micro Medium Enterprises, SMME)是在印尼经济增长中发挥主要作用的企业之一。中小企业不仅减少了失业人数,而且提高了社区的生活水平。然而,在这个技术在各个领域都达到顶峰的全球化时代,一些中小企业企业家还没有充分利用it业务。另一方面,IT在商业领域的应用有许多有利的好处。这可能会使中小企业在未来与其他应用IT的大型企业的激烈竞争中面临困难和难以生存。中小企业没有应用IT系统的主要原因是缺乏资金。此外,云计算是一种可以为每个中小企业企业家免费使用的技术。这种系统利用的优点是提高了竞争力,增加了灵活性,降低了成本,提高了敏捷性和可扩展性。本研究基于一项文献研究,该研究描述了研究的目的,即寻求云计算实施对印度尼西亚中小企业的优势,以便他们能够与规模更大的国际企业竞争。研究人员期望印度尼西亚的中小企业企业家可以利用信息技术,特别是云计算,来支持他们的业务。
{"title":"The Advantages from Cloud Computing Application Towards SMME (UMKM)","authors":"Tazkia Shabrina Az-zahra","doi":"10.15575/JOIN.V4I1.307","DOIUrl":"https://doi.org/10.15575/JOIN.V4I1.307","url":null,"abstract":"Small Micro Medium Enterprises (SMME) is one of the business enterprises that has a prime role in the development of economic growth in Indonesia. The SMME also not only reduces the number of jobless but also improve the community’s standard of living. Nonetheless, in this globalization era where the technology reaches its peak in every field, some SMME entrepreneurs have not taken advantage of IT-based business yet. On the other hand, the utilization of IT in the business field has many profitable benefits. This could make the SMME faced trouble and hard to survive in the tight competition with other bigger enterprises that had applied IT in the future. The main reason that SMME entrepreneur has not applied the IT system is that they lack fund. Moreover, cloud computing is a technology that can be used for every SMME entrepreneur without any costs. The advantages of this system utilization are to improve competitiveness, increase its flexibility, reduce costs, and to improve both agility and scalability. This research is based on a literature study that describes research’s aim that is to seek advantages from cloud computing implementation towards SMME in Indonesia so they can compete with international enterprises with a bigger scale. The researcher expects that SMME entrepreneurs in Indonesia can utilize Information technology particularly cloud computing, to support their business.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82968822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}