Pub Date : 2023-07-20DOI: 10.55606/jitek.v3i2.1826
Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur
This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy
{"title":"IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION","authors":"Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur","doi":"10.55606/jitek.v3i2.1826","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1826","url":null,"abstract":"This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-20DOI: 10.55606/jitek.v3i2.1377
Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana
Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.
在 Next Gen's Party Koi Show #2 的比赛管理中检查和实施信息与传播技术。通过双向互动方法、演示和练习,培训如何使用活动注册应用程序和后台应用程序管理活动参与者,并在活动日提供支持。Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.
{"title":"KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2","authors":"Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana","doi":"10.55606/jitek.v3i2.1377","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1377","url":null,"abstract":"Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.
{"title":"ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN","authors":"Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i","doi":"10.55606/jitek.v3i2.1838","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1838","url":null,"abstract":"Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha
Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.
信息技术的发展日新月异,已经成为现代人类生活的一部分,随着这些发展,网站扮演着重要的角色,然而,现有的发展也对网站的安全性产生了影响,因此测试网站服务器是非常重要的。需要使用适当的方法和技术来查看网络应用程序的组件、库和系统中可能存在的漏洞,OWASP、Nikto 和 Burp Suite 工具可用于测试网站的安全漏洞。每种工具在速度或持续时间、结果或扫描对象方面都存在差异。本文的研究目标是如何分析比较测试网站安全漏洞的工具。因此,本文将根据扫描对象、持续时间和结果对网站漏洞的检测或分析结果进行比较,然后提出有效和高效使用的工具建议。
{"title":"ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE","authors":"Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha","doi":"10.55606/jitek.v3i2.908","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.908","url":null,"abstract":"Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1519
Hendra Gunawan, Efori Bu'ulolo
CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread
简历Syahfira Bakery and Cake 是一家从事蛋糕、糕点和面包生产的企业。企业越发展,每天发生的交易也就越多。然而,有时行政人员和公司所有者并没有充分利用销售交易数据。事实上,如果行政人员对其进行处理和使用,企业主对其进行监督,那么销售数据将对未来的产品销售产生重大影响。数据处理可以使用数据挖掘技术,这些数据集可以产生新的信息,其中之一就是客户购买模式。Syahfira Bakery and Cake 是一家蛋糕、海绵蛋糕和面包店,尚未充分利用数据来确定销售业务战略。面对这些问题,有必要使用 Apriori 算法对交易数据进行处理,以便为店主提供可以利用的新知识。根据已完成的研究,从 20 个经过处理的交易数据中得出的结果符合最小支持度 30% 和最小置信度 70% 的要求,并得出一条规则,即如果顾客购买巧克力果酱产品,他将会购买纯面包。
{"title":"IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER","authors":"Hendra Gunawan, Efori Bu'ulolo","doi":"10.55606/jitek.v3i2.1519","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1519","url":null,"abstract":"CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1846
Aris Sunandar, Henri Septanto
Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.
{"title":"PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL","authors":"Aris Sunandar, Henri Septanto","doi":"10.55606/jitek.v3i2.1846","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1846","url":null,"abstract":"Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1844
Edi Kalsid, Henri Septanto
A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.
{"title":"RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL","authors":"Edi Kalsid, Henri Septanto","doi":"10.55606/jitek.v3i2.1844","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1844","url":null,"abstract":"A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1736
A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut
In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks
{"title":"IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE","authors":"A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut","doi":"10.55606/jitek.v3i2.1736","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1736","url":null,"abstract":"In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1856
Dion Fahrul, Henri Septanto
Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.
数据库管理是信息和通信技术发展中的一项主要工作。随着世界信息和通信技术的飞速发展,数据和事务管理系统的管理也经历了发展。在当今这样一个信息时代,数据库管理系统必须在计算机化系统中运行,以便更好、更快地管理数据。薪资系统就是需要计算机化才能更好运行的系统之一。本研究的目的是开发一个基于网络的薪资系统,该系统能够与邮件存档应用程序集成,从而提高根据员工工作计算薪资的效率。本研究采用了系统开发生命周期法,即系统分析员和程序员在建立信息系统时所进行的工作阶段以及开发信息系统的方法。该工资单系统将比以前运行的工资单系统更简便、更高效。本研究的成果是为 CV Loka Media 公司的自由职业者创建了一个与基于网络的邮件存档应用程序(使用 PHP 编程语言)相集成的工资单系统。
{"title":"PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA","authors":"Dion Fahrul, Henri Septanto","doi":"10.55606/jitek.v3i2.1856","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1856","url":null,"abstract":"Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"183 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-14DOI: 10.55606/jitek.v3i2.1506
M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini
Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.
{"title":"CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA","authors":"M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini","doi":"10.55606/jitek.v3i2.1506","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1506","url":null,"abstract":"Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}