Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2731
Eddy Triswanto Setyoadi, Alexander Wirapraja, Muhammad Adi Prakoso
The property business is always in great demand and is discussed by every class of society, that's what makes all business people vying to improve their property business, one of which is by utilizing technology so that it can make it easier for businesses to develop where companies can use technology as a tool. when making a property reservation. In this research, a website-based information system was created that helps Adiland Property Company in improving services in its business. The system created consists of a property booking system and mortgage data processing. The existence of a mortgage data processing system can make it easier for companies to manage mortgage data by customers in an integrated manner, besides that with an online ordering system it can also make it easier for customers to make orders where there are several choices of online payment methods. In making the system, the software development method was used using the requirements prototyping method, while testing this application, two methods have been used, namely blackbox testing. In blackbox testing, testing is carried out by trying all the existing inputs on the system whether they are as expected by giving a questionnaire to each existing user, namely the customer, property agent admin, in-house mortgage manager. The results obtained are a website that can be used by Adiland Property to reach a wider market and ease in making property purchase transactions.
{"title":"Adiland Property Website Design and KPR Management Using the Requirement Prototyping Method","authors":"Eddy Triswanto Setyoadi, Alexander Wirapraja, Muhammad Adi Prakoso","doi":"10.32520/stmsi.v12i3.2731","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2731","url":null,"abstract":"The property business is always in great demand and is discussed by every class of society, that's what makes all business people vying to improve their property business, one of which is by utilizing technology so that it can make it easier for businesses to develop where companies can use technology as a tool. when making a property reservation. In this research, a website-based information system was created that helps Adiland Property Company in improving services in its business. The system created consists of a property booking system and mortgage data processing. The existence of a mortgage data processing system can make it easier for companies to manage mortgage data by customers in an integrated manner, besides that with an online ordering system it can also make it easier for customers to make orders where there are several choices of online payment methods. In making the system, the software development method was used using the requirements prototyping method, while testing this application, two methods have been used, namely blackbox testing. In blackbox testing, testing is carried out by trying all the existing inputs on the system whether they are as expected by giving a questionnaire to each existing user, namely the customer, property agent admin, in-house mortgage manager. The results obtained are a website that can be used by Adiland Property to reach a wider market and ease in making property purchase transactions.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.3330
Salwa Deta Mediana, Lindawati Lindawati, Mohammad Fadhli
In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation.
{"title":"Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP","authors":"Salwa Deta Mediana, Lindawati Lindawati, Mohammad Fadhli","doi":"10.32520/stmsi.v12i3.3330","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.3330","url":null,"abstract":"In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2986
Kadek Wawan Cahyadi, I Gusti Ayu Agung Diatri Indradewi, Putu Yudia Pratiwi
BeFind is a website-based application that facilitates the public and sports instructors to be able to interact and transact with each other. However, the website has deficiencies such as incomplete features and inflexible use, so it is necessary to design a mobile-based application to optimize the features. The purpose of this research is to produce UI and UX model designs that apply the Design Thinking method and to find out the results of usability testing. Design Thinking is a product design process resulting from problem-solving efforts that arise from potential product users. Empathy stage, conduct interviews to get problems. The define stage is carried out by creating a user persona from the results of the interview. The ideate stage is carried out by brainstorming to compile user flow. The prototype stage is made in the form of a mockup design and a prototype design is prepared. The test phase was carried out to test the design with task scenarios on 4 usability aspects and 1 aspect using the System Usability Scale (SUS) questionnaire. In the final test for service seekers and service providers respondents obtained 97% and 96% learnability results, efficiency 0.033689182 goals/sec and 0.033689182 goals/sec, 96% and 95% memoryability, 0.0306 and 0.0800 errors, and satisfaction with SUS obtained 94 results with the best imaginable predicate. In efficiency there is a decrease in yield caused by a bad signal factor. The resulting UI and UX can become the foundation for development of the "BeFind" mobile application based on the prototype design that has been designed in this study.
{"title":"UI/UX Design for Mobile-based Sports Instructor Search Application “Befind” using Design Thinking","authors":"Kadek Wawan Cahyadi, I Gusti Ayu Agung Diatri Indradewi, Putu Yudia Pratiwi","doi":"10.32520/stmsi.v12i3.2986","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2986","url":null,"abstract":"BeFind is a website-based application that facilitates the public and sports instructors to be able to interact and transact with each other. However, the website has deficiencies such as incomplete features and inflexible use, so it is necessary to design a mobile-based application to optimize the features. The purpose of this research is to produce UI and UX model designs that apply the Design Thinking method and to find out the results of usability testing. Design Thinking is a product design process resulting from problem-solving efforts that arise from potential product users. Empathy stage, conduct interviews to get problems. The define stage is carried out by creating a user persona from the results of the interview. The ideate stage is carried out by brainstorming to compile user flow. The prototype stage is made in the form of a mockup design and a prototype design is prepared. The test phase was carried out to test the design with task scenarios on 4 usability aspects and 1 aspect using the System Usability Scale (SUS) questionnaire. In the final test for service seekers and service providers respondents obtained 97% and 96% learnability results, efficiency 0.033689182 goals/sec and 0.033689182 goals/sec, 96% and 95% memoryability, 0.0306 and 0.0800 errors, and satisfaction with SUS obtained 94 results with the best imaginable predicate. In efficiency there is a decrease in yield caused by a bad signal factor. The resulting UI and UX can become the foundation for development of the \"BeFind\" mobile application based on the prototype design that has been designed in this study.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2807
Ali Mustopa, Agung Sasongko, Hendri Mahmud Nawawi, Siti Khotimatul Wildah, Sarifah Agustiani
Livestock farming requires technological innovation to increase productivity and efficiency. Chickens are a livestock animal with good market prospects. However, not all farmers understand about chicken diseases and signs of sickness. Detection of chicken diseases can be done through various methods, one of which is by looking at the shape of the chicken's feces. Images in feces can be detected using machine learning. Convolutional Neural Networks (CNN) are used to speed up disease prediction. Transfer learning is used to leverage knowledge that has been learned by previous models. In this study, we propose our own CNN architecture model and present research by building a new model to detect and classify diseases in chickens through their feces. The model training process is carried out by inputting training data and validation data, the number of epochs, and the created checkpointer object. The hyperparameter tuning stage is carried out to increase the accuracy rate of the model. The research is conducted by testing datasets obtained from the Kaggle repository which has images of coccidiosis, salmonella, Newcastle, and healthy feces. The results of the study show that our proposed model only achieves an accuracy rate of 93%, while the best accuracy rate in the study is achieved by using the EfficientNerV2L model with the RMSProp optimizer, which is 97%.
{"title":"Chicken Disease Detection Based on Fases Image Using EfficientNetV2L Model","authors":"Ali Mustopa, Agung Sasongko, Hendri Mahmud Nawawi, Siti Khotimatul Wildah, Sarifah Agustiani","doi":"10.32520/stmsi.v12i3.2807","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2807","url":null,"abstract":"Livestock farming requires technological innovation to increase productivity and efficiency. Chickens are a livestock animal with good market prospects. However, not all farmers understand about chicken diseases and signs of sickness. Detection of chicken diseases can be done through various methods, one of which is by looking at the shape of the chicken's feces. Images in feces can be detected using machine learning. Convolutional Neural Networks (CNN) are used to speed up disease prediction. Transfer learning is used to leverage knowledge that has been learned by previous models. In this study, we propose our own CNN architecture model and present research by building a new model to detect and classify diseases in chickens through their feces. The model training process is carried out by inputting training data and validation data, the number of epochs, and the created checkpointer object. The hyperparameter tuning stage is carried out to increase the accuracy rate of the model. The research is conducted by testing datasets obtained from the Kaggle repository which has images of coccidiosis, salmonella, Newcastle, and healthy feces. The results of the study show that our proposed model only achieves an accuracy rate of 93%, while the best accuracy rate in the study is achieved by using the EfficientNerV2L model with the RMSProp optimizer, which is 97%.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.3122
Lutfi Rahmawati, Kristoko Dwi Hartomo
The Salatiga City Population and Civil Registration Office is a regional device organization that already uses information technology in its business processes. Although they have taken advantage of the information system, they have not yet conducted an assessment of risk threats and have not run a risk management. The source of the problem is a problem in implementing risk measurement and management techniques using the Octave-S method that focuses on organizations with no more than 100 members. This technique is used to identify and analyze threats to critical assets in Salatiga City Population and Civil Registration Service. The results of analysis of such threats will be useful when performing mitigation plans in accordance with existing security practices. From the research that has been conducted, there are 2 areas of security practice that produce yellow stoplight status which is a sign that the organization has implemented security practices but is not yet perfect. Both areas of security practice will be selected as mitigation areas.In
{"title":"Information Technology Security Risk Management using the OCTAVE-S Method","authors":"Lutfi Rahmawati, Kristoko Dwi Hartomo","doi":"10.32520/stmsi.v12i3.3122","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.3122","url":null,"abstract":"The Salatiga City Population and Civil Registration Office is a regional device organization that already uses information technology in its business processes. Although they have taken advantage of the information system, they have not yet conducted an assessment of risk threats and have not run a risk management. The source of the problem is a problem in implementing risk measurement and management techniques using the Octave-S method that focuses on organizations with no more than 100 members. This technique is used to identify and analyze threats to critical assets in Salatiga City Population and Civil Registration Service. The results of analysis of such threats will be useful when performing mitigation plans in accordance with existing security practices. From the research that has been conducted, there are 2 areas of security practice that produce yellow stoplight status which is a sign that the organization has implemented security practices but is not yet perfect. Both areas of security practice will be selected as mitigation areas.In","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2474
Galuh Roro Vebiana, Riza Prapascatama Agusdin
The importance of maintaining the quality of information systems is one of the main factors in creating the success of a system owned by a company so as to encourage employees to utilize technology in completing their work. The web-based employee presence system is one of the systems developed by companies to monitor and measure the level of productivity of human resources. Based on the results of interviews conducted by researchers with five informants, it was found that the user's intention to use the system was still relatively low because the user was not satisfied with the implementation of the employee presence system. System evaluation can be carried out to find out what factors have a significant influence on behavioral intentions and the use of the staffing attendance system by adopting the UTAUT 2 acceptance model. This study makes adjustments to the UTAUT 2 model by eliminating price value as an exogenous variable. A total of 291 data were obtained from respondents through distributing questionnaires and data analysis was carried out using the PLS-SEM analysis technique assisted by SmartPLS. The results of the analysis show that system users must first develop behavioral intentions to use the presence system by increasing significant factors, namely: performance expectancy, effort expectancy, facilitating conditions, hedonic motivation which is reinforced by gender, habit, and behavioral intention.
{"title":"Analysis of User Acceptance Factors in Employee Attendance System","authors":"Galuh Roro Vebiana, Riza Prapascatama Agusdin","doi":"10.32520/stmsi.v12i3.2474","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2474","url":null,"abstract":"The importance of maintaining the quality of information systems is one of the main factors in creating the success of a system owned by a company so as to encourage employees to utilize technology in completing their work. The web-based employee presence system is one of the systems developed by companies to monitor and measure the level of productivity of human resources. Based on the results of interviews conducted by researchers with five informants, it was found that the user's intention to use the system was still relatively low because the user was not satisfied with the implementation of the employee presence system. System evaluation can be carried out to find out what factors have a significant influence on behavioral intentions and the use of the staffing attendance system by adopting the UTAUT 2 acceptance model. This study makes adjustments to the UTAUT 2 model by eliminating price value as an exogenous variable. A total of 291 data were obtained from respondents through distributing questionnaires and data analysis was carried out using the PLS-SEM analysis technique assisted by SmartPLS. The results of the analysis show that system users must first develop behavioral intentions to use the presence system by increasing significant factors, namely: performance expectancy, effort expectancy, facilitating conditions, hedonic motivation which is reinforced by gender, habit, and behavioral intention.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2979
Nur Wachid Hidayatulloh, Prita Dellia
Information systems and social media are a form of rapid development in the era of society 5.0. Both of these can be used in an agency in disseminating information and can be used as promotional media. One institution that is very closely related to this is an educational institution. An existing educational institution has used social media and a website-based information system. SMK PGRI 1 Bangkalan is one of the vocational schools in Bangkalan Regency which does not yet have a website and social media accounts to disseminate information. A website-based social media integrated information system is one of the recommendations in solving this problem. This study uses the waterfall research model in developing the system. The results of this research are a website-based school information system that is integrated with social media, namely WhatsApp and Instagram. In addition, the website that has been created also meets several quality aspects of ISO 25010, namely functional suitability which gets a percentage of 100% and is declared very good, portability which gets a percentage of 100% and is declared very good, performance efficiency which has an average speed of 1,193 which fall into the very good category, and the usability aspect which gets a percentage of 90% and is declared very feasible.
{"title":"Integration of Social Media in Website Based School Information System","authors":"Nur Wachid Hidayatulloh, Prita Dellia","doi":"10.32520/stmsi.v12i3.2979","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2979","url":null,"abstract":"Information systems and social media are a form of rapid development in the era of society 5.0. Both of these can be used in an agency in disseminating information and can be used as promotional media. One institution that is very closely related to this is an educational institution. An existing educational institution has used social media and a website-based information system. SMK PGRI 1 Bangkalan is one of the vocational schools in Bangkalan Regency which does not yet have a website and social media accounts to disseminate information. A website-based social media integrated information system is one of the recommendations in solving this problem. This study uses the waterfall research model in developing the system. The results of this research are a website-based school information system that is integrated with social media, namely WhatsApp and Instagram. In addition, the website that has been created also meets several quality aspects of ISO 25010, namely functional suitability which gets a percentage of 100% and is declared very good, portability which gets a percentage of 100% and is declared very good, performance efficiency which has an average speed of 1,193 which fall into the very good category, and the usability aspect which gets a percentage of 90% and is declared very feasible.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Foodstuffs price analysis and prediction is one of the important research topics. This paper applies Long Short-Term Memory (LSTM) and Extreme Learning Machines (ELM) as models for forecasting the price of rice, chicken meat, chicken egg, shallot, garlic, and red chili in the Tasikmalaya traditional market. The dataset is a daily time series obtained from April 2017 - February 2023. LSTM models perform accurately to forecast 5 foodstuffs prices and obtain MAPE scores of no more than 3%. ELM works well to predict the price of rice, chicken meat, chicken egg, shallot, and garlic with MAPE scores are less than 1%. The price of rice, chicken egg, shallot, and red chili has an increasing trend. The correlation analysis finds that the price of chicken egg, shallot, and red chili has a positive correlation with each other.
{"title":"Analysis and Prediction of Foodstuffs Prices in Tasikmalaya Using ELM and LSTM","authors":"Andry Winata, Manatap Dolok Lauro, Teny Handhayani","doi":"10.32520/stmsi.v12i3.3145","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.3145","url":null,"abstract":"Foodstuffs price analysis and prediction is one of the important research topics. This paper applies Long Short-Term Memory (LSTM) and Extreme Learning Machines (ELM) as models for forecasting the price of rice, chicken meat, chicken egg, shallot, garlic, and red chili in the Tasikmalaya traditional market. The dataset is a daily time series obtained from April 2017 - February 2023. LSTM models perform accurately to forecast 5 foodstuffs prices and obtain MAPE scores of no more than 3%. ELM works well to predict the price of rice, chicken meat, chicken egg, shallot, and garlic with MAPE scores are less than 1%. The price of rice, chicken egg, shallot, and red chili has an increasing trend. The correlation analysis finds that the price of chicken egg, shallot, and red chili has a positive correlation with each other.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Drug management is important in managing adequate drug supplies in Puskesmas, to avoid errors in controlling existing drug stock inventory, it is necessary to predict the amount of drug usage by comparing Data Mining methods and Machine Learning methods, using the Triple Exponential Smoothing (TES) and Support Vector Regression (SVR) algorithms. Implementation is done using the Python programming language. The data used is Amlodipine 10 mg and Amoxicillin 500 mg drug data with a period of 42 months, from January 2020 - June 2023. This study aims to determine the best algorithm by comparing prediction error rate using the Mean Absolute Percentage Error (MAPE) method. Based on research that has been conducted on Amlodipine 10 mg and Amoxicillin 500 mg drugs with a division of 80% training data and 20% testing data, the Triple Exponential Smoothing algorithm with an additive model produces MAPE values of 10.36% and 17.50% respectively with the "Good" category. While Support Vector Regression algorithm, with RBF kernel, complexity 1.0, and epsilon 0.1 produces MAPE values of 10.31% and 9.38% in the "Good" and "Very Good" categories, respectively. Based on this, it can be concluded that Support Vector Regression algorithm is better at predicting than the Triple Exponential Smoothing algorithm.
{"title":"Comparison of Triple Exponential Smoothing and Support Vector Regression Algorithms in Predicting Drug Usage at Puskesmas","authors":"Syafira Agnesti, Alwis Nazir, Iwan Iskandar, Elvia Budianita, Iis Afrianty","doi":"10.32520/stmsi.v12i3.3499","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.3499","url":null,"abstract":"Drug management is important in managing adequate drug supplies in Puskesmas, to avoid errors in controlling existing drug stock inventory, it is necessary to predict the amount of drug usage by comparing Data Mining methods and Machine Learning methods, using the Triple Exponential Smoothing (TES) and Support Vector Regression (SVR) algorithms. Implementation is done using the Python programming language. The data used is Amlodipine 10 mg and Amoxicillin 500 mg drug data with a period of 42 months, from January 2020 - June 2023. This study aims to determine the best algorithm by comparing prediction error rate using the Mean Absolute Percentage Error (MAPE) method. Based on research that has been conducted on Amlodipine 10 mg and Amoxicillin 500 mg drugs with a division of 80% training data and 20% testing data, the Triple Exponential Smoothing algorithm with an additive model produces MAPE values of 10.36% and 17.50% respectively with the \"Good\" category. While Support Vector Regression algorithm, with RBF kernel, complexity 1.0, and epsilon 0.1 produces MAPE values of 10.31% and 9.38% in the \"Good\" and \"Very Good\" categories, respectively. Based on this, it can be concluded that Support Vector Regression algorithm is better at predicting than the Triple Exponential Smoothing algorithm.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"407-408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-30DOI: 10.32520/stmsi.v12i3.2773
Myrna Dwi Rahmatya, Mochamad Fajar Wicaksono
Online learning certainly requires an attendance system that is accessed anywhere with a minimum level of fraud. This research aimed to build an online attendance system using face recognition to prevent filling out online learning attendance represented by others. The online attendance system was built using the object-based system approach method. The system development method used was the waterfall. The development of this system utilizes the Django python framework, face recognition library, and OpenCV. This research delivered an attendance system that could not be represented by others. To record attendance, students visit the online attendance system. Students can only record attendance once according to the lecture schedule. The camera will capture the student’s face and equate it with the existing facial data. Only the registered student that his attendance data stored in the database. In addition, students cannot record attendance with face recognition outside of their lecture hours. This attendance system was tested using black-box testing. The test is carried out on the access button function to record attendance during the lecture schedules data and outside the lecture schedule, facial recognition function with valid and not valid facial data, function to store attendance data, and function to view attendance data recap in the current semester. The result showed that the attendance application with facial recognition is 100% running as it should and as expected.
{"title":"Online Attendance with Python Face Recognition and Django Framework","authors":"Myrna Dwi Rahmatya, Mochamad Fajar Wicaksono","doi":"10.32520/stmsi.v12i3.2773","DOIUrl":"https://doi.org/10.32520/stmsi.v12i3.2773","url":null,"abstract":"Online learning certainly requires an attendance system that is accessed anywhere with a minimum level of fraud. This research aimed to build an online attendance system using face recognition to prevent filling out online learning attendance represented by others. The online attendance system was built using the object-based system approach method. The system development method used was the waterfall. The development of this system utilizes the Django python framework, face recognition library, and OpenCV. This research delivered an attendance system that could not be represented by others. To record attendance, students visit the online attendance system. Students can only record attendance once according to the lecture schedule. The camera will capture the student’s face and equate it with the existing facial data. Only the registered student that his attendance data stored in the database. In addition, students cannot record attendance with face recognition outside of their lecture hours. This attendance system was tested using black-box testing. The test is carried out on the access button function to record attendance during the lecture schedules data and outside the lecture schedule, facial recognition function with valid and not valid facial data, function to store attendance data, and function to view attendance data recap in the current semester. The result showed that the attendance application with facial recognition is 100% running as it should and as expected.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}