Journal of Informatics Management and Information Technology最新文献

筛选
英文 中文
Analisa Kualitas Layanan Pada E-learning di Sekolah Menggunakan Metode Servqual 使用Servqual方法分析学校电子学习的质量服务
Journal of Informatics Management and Information Technology Pub Date : 2022-07-31 DOI: 10.47065/jimat.v2i3.167
Tri Sentia, Mustafia Mustafia, Eva Zuraidah
{"title":"Analisa Kualitas Layanan Pada E-learning di Sekolah Menggunakan Metode Servqual","authors":"Tri Sentia, Mustafia Mustafia, Eva Zuraidah","doi":"10.47065/jimat.v2i3.167","DOIUrl":"https://doi.org/10.47065/jimat.v2i3.167","url":null,"abstract":"Service quality is the main thing that users of e-learning applications always hope to receive, and these virtues are used to meet the expectations of users. The problem that occurs is that the quality of service is still lacking in the service order, causing the e-learning application to be unable to be reopened. Students who are late in submitting assignments must enter manually and the answers cannot be tracked. The purpose of this study was to measure the quality of service that affects the level of user satisfaction with the servqual method. Measurement of satisfaction for users in measuring the level of satisfaction with 5 dimensions of service quality, namely Tangible, Reliability, Responsiviness, Assurance, and Empathy. The result of the gap between perceptions and expectations of users is -0.08. The gaps are grouped based on attributes using an IPA (Importance Performance Analysis) diagram with the Tangible dimension, the value of the gap is -0.09, the attributes of e-learning application services must be maintained by users who always wear clear student ID cards so that they can be known. Reliability with a gap of -0.07, covering website context related to school e-learning, and guidebooks according to website content. Responsiveness with a gap value of -0.10, namely the attendance menu on the website is functioning properly, notifications appear when there is new information. Assurance with a gap of -0.10, guaranteed website security, and easy to file a complaint if there are website problems. And Empathy with a gap value of -0.08 for convenience in using the website, easy contact, and good communication with supervisors.","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analisa Kualitas Aplikasi Performance Simanis dengan Metode End User Computing Satisfaction (EUCS) 分析用户端计算方法中模拟表现的质量(EUCS)
Journal of Informatics Management and Information Technology Pub Date : 2022-07-31 DOI: 10.47065/jimat.v2i3.169
Meidita Nurul Farisi, Eva Zuraidah
{"title":"Analisa Kualitas Aplikasi Performance Simanis dengan Metode End User Computing Satisfaction (EUCS)","authors":"Meidita Nurul Farisi, Eva Zuraidah","doi":"10.47065/jimat.v2i3.169","DOIUrl":"https://doi.org/10.47065/jimat.v2i3.169","url":null,"abstract":"A process to find and find out the extent of an information system implementation activity from the point of view of an information system evaluation. It aims to determine the level of user satisfaction in using a system. This study was conducted to measure the quality of the Simanis application using the End User Computing Satisfaction (EUCS) method, as well as using questionnaires to respondents and IPA Importance Performance Analysis. The results of the application quality level still need to be evaluated because the GAP level of 5 dimensions, namely content (content), accuracy (accuracy), appearance (format), user satisfaction (easy to use), and timeliness (timeliness) is still far from user expectations. The results of the user assessment of the Simanis performance application, no attributes found in quadrant 1. This indicates that the priority level for changes in some features does not exist, meaning that the features already provide the needs of the users. Suggestions in this study, application developers must continue to meet the performance expectations of the Simanis application in the 5 dimensions that have been assessed.","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116084504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Perancangan Aplikasi Kompresi File Teks Menggunakan Algoritma Context Tree Weighting
Journal of Informatics Management and Information Technology Pub Date : 2022-07-31 DOI: 10.47065/jimat.v2i3.149
Mayniar Albina
{"title":"Perancangan Aplikasi Kompresi File Teks Menggunakan Algoritma Context Tree Weighting","authors":"Mayniar Albina","doi":"10.47065/jimat.v2i3.149","DOIUrl":"https://doi.org/10.47065/jimat.v2i3.149","url":null,"abstract":"Currently the use of applications as information is increasingly being used. but there is a problem that is often encountered, namely the need for a large space as a storage medium. Data compression is the process of converting a set of data into a coded form to save the need for data storage. Context Tree Weighting algorithm is a data compression algorithm. To determine the results of the compression process, compression ratio and space saving media are used. The results will be known, the compression ratio and space saving. In accordance with the results of the trials conducted, it can be seen that the data that was originally large in size can be compressed very well with the implementation of compression text files.","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audit Sistem Informasi Absensi Pada MI Miftahul Ulum Menggunakan Cobit 4.1 Ulum使用Cobit 4.1对MI miftau信息系统进行审计
Journal of Informatics Management and Information Technology Pub Date : 2022-07-30 DOI: 10.47065/jimat.v2i3.168
M. Irfandi, Eva Zuraidah
{"title":"Audit Sistem Informasi Absensi Pada MI Miftahul Ulum Menggunakan Cobit 4.1","authors":"M. Irfandi, Eva Zuraidah","doi":"10.47065/jimat.v2i3.168","DOIUrl":"https://doi.org/10.47065/jimat.v2i3.168","url":null,"abstract":"This study aims to determine the extent to which the company implement IT governance. The focus of this research is on the COBIT 4.1 domain, namely PO1, PO4, PO9, DS5, DS9, DS12, and ME. The method is based on COBIT 4.1, this research uses several stages, namely literature review, data collection, and data processing at MI Miftahul Ulum. The results of data processing are used to find weaknesses in each domain. Weaknesses or problems compared to the ideal conditions that have been set for the COBIT 4.1 audit framework at each level, the problem encountered at MI Miftahul Ulum is that there are still problems with the attendance system, problems often occur such as not being read by the system even though they have made attendance which results in reduced attendance. teacher appraisals and salaries. The results of the calculation of the largest maturity level in the DS12 domain with a maturity level value of 3.89, must be increased again, while the smallest value in the PO1 domain with a maturity level value of 3.15 must be repaired again so that the attendance system is as expected.","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125488444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Akurasi Algoritma Fletcher-Reeves untuk Prediksi Ekspor Karet Remah Berdasarkan Negara Tujuan Utama 弗莱彻-里维斯根据国家的主要目标预测面包屑出口的准确算法
Journal of Informatics Management and Information Technology Pub Date : 2022-07-30 DOI: 10.47065/jimat.v2i3.170
Rapianto Sinaga, Mora Malemta Sitomorang, Deri Setiawan, Anjar Wanto, Agus Perdana Windarto
{"title":"Akurasi Algoritma Fletcher-Reeves untuk Prediksi Ekspor Karet Remah Berdasarkan Negara Tujuan Utama","authors":"Rapianto Sinaga, Mora Malemta Sitomorang, Deri Setiawan, Anjar Wanto, Agus Perdana Windarto","doi":"10.47065/jimat.v2i3.170","DOIUrl":"https://doi.org/10.47065/jimat.v2i3.170","url":null,"abstract":"Crumb rubber is a natural rubber specially designed to ensure its technical quality. Rubber is produced mainly in Southeast Asia, where Indonesia is the second largest producer in the world after Thailand. This study aims to predict the export of powdered rubber in Indonesia. The prediction method used is FletcherReeves which is one of the artificial neural network methods commonly used to predict data. The research data used is crumb rubber export data by main destination country for the period 2012-2020 which was obtained from the website of the Indonesian Central Statistics Agency. Based on this data, network architecture models will be trained and defined, including 7-10-1, 7-15-1, 7-20-1, 7-25-1, 7-30-1 (trancgf). Of the five models, after training and testing, the best data architecture model is 7-15-1 (trancegf) 7 is the input layer, 15 is the number of neurons in the hidden layer and 1 is the exit layer. The level of accuracy of the architectural model with the MSE value is 0.00482054.","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"68 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analisis Pola Penjualan Produk Makanan dan Minuman Menggunakan Algoritma Apriori 利用杏色算法分析餐饮产品的销售模式
Journal of Informatics Management and Information Technology Pub Date : 2022-04-30 DOI: 10.47065/jimat.v2i2.161
Boby, Solikhun, Zulia Almaida Siregar
{"title":"Analisis Pola Penjualan Produk Makanan dan Minuman Menggunakan Algoritma Apriori","authors":"Boby, Solikhun, Zulia Almaida Siregar","doi":"10.47065/jimat.v2i2.161","DOIUrl":"https://doi.org/10.47065/jimat.v2i2.161","url":null,"abstract":"Sales are seen as a unit of business parameters that are very vital and valuable for business people to manage the business they are running, especially in the cafe business.  Cafe Aksara as one of the business actors in the culinary world has a lot of demand in the sale and supply of goods on certain days due to the dynamic nature of visitor patterns and makes business people have to be wiser in setting strategies for the combination pattern of sales of food and beverage products found in Indonesia. Aksara cafe to attract customers.  In a process of determining the sales pattern strategy at Cafe Aksara, customers or buyers greatly influence the sales transaction data recorded by the Aksara Cafe business person.  However, from the results of these recordings, sales transaction data tend not to be used in a process of determining sales pattern strategies to attract customers and are only used as useless archives for Aksara Cafe business people.  From these problems, there are many branches of computer science that can be used as reference points in overcoming sales problems, one of which is the branch of computer science Data Mining.  Data Mining is a method that is quite categorical to be recommended in solving problems with the sale of food and beverage products, especially the Apriori Algorithm. The output of the Apriori Algorithm can help Cafe Aksara business people determine sales patterns on the sales data of their products","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256 设计一个复制程序扫描仪,采用SHA-256方法
Journal of Informatics Management and Information Technology Pub Date : 2022-04-30 DOI: 10.47065/jimat.v2i2.150
Adelina
{"title":"Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256","authors":"Adelina","doi":"10.47065/jimat.v2i2.150","DOIUrl":"https://doi.org/10.47065/jimat.v2i2.150","url":null,"abstract":"Hard drives are one of the core components of a computer in various types and sizes. Large hard disks can become full, even though they don't feel like storing large files. The possibility of saving the same file in the directory is very difficult and will take a long time. The Duplicate Docx Scanner application is able to solve this problem. The Duplicate Docx Scanner application is able to find out the same file is located in a different directory by determining the directory on the hard disk and other storage media. This application can calculate the hash value so that it can find the same file. The Duplicate Docx Scanner application uses the SHA-256 hash method. SHA-256 is used to perform file integrity checks in a variety of situations. This Duplicate Docx Scanner application is designed to use the Microsoft Visual Basic.Net 2008 programming language","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132975211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementasi Metode Regionprops Untuk Mendeteksi Objek Image Fraktur Tulang 定位工具的执行方法,以检测物体骨头断裂
Journal of Informatics Management and Information Technology Pub Date : 2022-04-30 DOI: 10.47065/jimat.v2i2.142
Nadilla Sarah Sinaga
{"title":"Implementasi Metode Regionprops Untuk Mendeteksi Objek Image Fraktur Tulang","authors":"Nadilla Sarah Sinaga","doi":"10.47065/jimat.v2i2.142","DOIUrl":"https://doi.org/10.47065/jimat.v2i2.142","url":null,"abstract":"Bone is one of the most important parts of the human body. The function of the bone itself is as a framework, a support for the human body and a place for muscles to attach, so that the body can move optimally. Not only that, some parts of the bones also have a function to protect other organs in the body. Such as the skull that serves to protect the brain from various kinds of impact from the outside, the arrangement of the ribs which serves to protect the lungs and so on. Regionprops method is a method used to measure a set of properties - properties of each region that has been labeled in the label matrix. A positive integer that is an element of the matrix corresponding to the corresponding region. This study uses the Regionprops method to detect an object of damage that is on a bone invoice. The application for detection of bone invoice object image results from Regionprops shows that the resolution produced by the detected image is different. The speed of the application to perform the image detection process depends on the pixel resolution and also depends on the specifications of the computer running the image detection application","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analisis Kepuasan Pelanggan Menggunakan Algoritma C5.0
Journal of Informatics Management and Information Technology Pub Date : 2022-04-30 DOI: 10.47065/jimat.v2i2.160
Dandi Junandi Purba, Muhammad Ridwan Lubis, Zulia Almaida Siregar
{"title":"Analisis Kepuasan Pelanggan Menggunakan Algoritma C5.0","authors":"Dandi Junandi Purba, Muhammad Ridwan Lubis, Zulia Almaida Siregar","doi":"10.47065/jimat.v2i2.160","DOIUrl":"https://doi.org/10.47065/jimat.v2i2.160","url":null,"abstract":"Water is one of the necessities that are needed by living things, especially humans. In everyday life, humans cannot be separated from the need for air. PDAM is a regional-owned business unit, which is engaged in the distribution of clean water for the general public. However, along the way, along with receiving complaints from the public or customers, public complaints about the increasing difficulty of getting clean water are still an obstacle that can be completely overcome, for example in the North Sumatra area, precisely in Gunung Malela District. On the one hand, public demand will increase, but the quality of services provided is not comparable to meeting the demands of the community. Therefore, this study was conducted to determine customer satisfaction with PDAM Tirta Lihou in Gunung Malela District. Many branches of computer science study various algorithms, one of which is data mining methods, DSS, ANN, and others. This study uses a data mining method with the C5.0 algorithm to solve the problem of factors that affect customer satisfaction with PDAM Tirta Lihou, Gunung Malela District","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementasi Algoritma Noekeon Untuk Mengamankan File Audio 执行Noekeon算法以保护音频文件
Journal of Informatics Management and Information Technology Pub Date : 2022-04-30 DOI: 10.47065/jimat.v2i2.143
Tita Azwinar Sarumaha
{"title":"Implementasi Algoritma Noekeon Untuk Mengamankan File Audio","authors":"Tita Azwinar Sarumaha","doi":"10.47065/jimat.v2i2.143","DOIUrl":"https://doi.org/10.47065/jimat.v2i2.143","url":null,"abstract":"Along with the development of an increasingly advanced era, and supported by the development of very rapid information technology, especially in producing audio files, it can now be done with smartphone devices. With the application on smartphones with devices to make audio both for private and public. Audio files need to be secured with better security, in order to anticipate if the account is far from being in the hands of unauthorized people, one way to secure audio files is by using cryptographic techniques, with this technique, unauthorized people cannot see the information contained in the audio. the. One of the algorithms that can be used to secure audio files is the NOEKEON algorithm, Noekeon is a repeating block cipher with a block length and key length of 128 bits each, which consists of a simple round transformation application that repeats itself, followed by an output transformation. Noekeon has 16 rounds (Nr) iterations in each round four transformations are carried out, namely, Theta, shift offset consisting of two transformations Pi1 and Pi2 and gamma The advantages of the Noekeon algorithm do not limit the keys used or use these keys to exploit into cipher text and avalanche effects obtained meet the strict Avalanche criterion. If there is an error in one block cipher it cannot affect the other blocks","PeriodicalId":236817,"journal":{"name":"Journal of Informatics Management and Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信