Shofi, Imam Marzuki
Universitas Islam Negeri Syarif Hidayatullah Jakarta

Published : 10 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 10 Documents
Search

Goal Model to Business Process Model: A Methodology for Enterprise Government Tourism System Development Ahmad Nurul Fajar; Imam Marzuki Shofi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (297.409 KB) | DOI: 10.11591/ijece.v6i6.pp3031-3036

Abstract

The critcal factor in successfully in system development is the requirement phase. The requirement should meets with its purpose. In order to achieve it, the methodology for requrement analysis is needed. Nowdays, the complexity of e-governemnt applications is grown significantly in the government environment. E-government applications should be developed based on regulations in order to achieve the goal model of government entitties. However, the goal model could not used directly to make business process model. In order to solve this problem,this paper presents and proposed a Methodology to extract goal model into business process model that called GBPM Methodology. It can support the requirement analysis phase, especially in enterprise government tourism system. This methodology consists of two methods, there are (1) Method for convert goal model to business use case diagram, (2) Method for convert business use case diagram to activity diagram. We do the experiment in e-government applications domain. This methodology suitable with enterprise government tourism system development.
Reduced Software Complexity for E-Government Applications with ZEF Framework Ahmad Nurul Fajar; Imam Marzuki Shofi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3195

Abstract

The situation of dynamic change is unpredictable and always growth increasingly. It also can happen anytime and anywhere. The one kind which is always changing is the government policy.This condition is suggested take the impact for software for information system. It will cause replacement, modification, and enhancement of software for information system. There is some commonality and variability of software features in Indonesian Government. Hence, to manage it, we present enhancement of Zuma’s E-Government Framework (ZEF) for reduce software complexity.We enhance ZEF Framework using  SPLE and GORE approach in order to improve traditional software development.It can reduce, if the changing continuously happen.The measurement of  software complexity relate to functionality of system.It can describe with function point, because function point can describe logical software complexity also. The preliminary result of this study can reduce efficiency of software complexity such as information processing size, technical complexity adjustment factors and function points in e-government applications.
IMPLEMENTASI FACE RECOGNITION DENGAN OPENCV PADA “SMART CCTV” UNTUK KEAMANAN BRANKAS BERBASIS IOT Nenny Anggraini; Fikriansyah Martunus; Imam Marzuki Shofi; Luh Kesuma Wardhani
Jurnal Ilmiah FIFO Vol 13, No 1 (2021)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2021.v13i1.005

Abstract

Salah satu Hak Asasi Manusia yang mendasar adalah hak atas rasa aman, hak atas rasa aman ini tidak saja dalam pengertian fisik, psikis tetapi juga hak atas keamanan harta benda. Perusakan atau pembobolan terhadap brankas merupakan salah satu pelanggaran keamanan terhadap barang. Setiap lemari besi atau brankas mempunyai tingkat proteksi yang berbeda-beda yang mesti lulus terhadap pengujian tersertifikasi sesuai dengan standar internasional. Peneliti mencoba mengembangkan penggunaan CCTV dengan membuat sebuah alat yaitu smart CCTV menggunakan Raspberry Pi 4 berbasis IoT. Dengan memanfaatkan face recognition yang merupakan salah satu metode dari library pada open source computer vision (opencv), alat ini dapat memantau orang-orang yang mendekati brankas dan kemudian mengirimkan gambar melalui aplikasi telegram pada smartphone apabila orang tersebut tidak dikenali. Berdasarkan hasil penelitian didapatkan hasil akurasi dari 40-69% terhadap pengenalan wajah dan kesesuaian fungsi sebesar 100%.
ANALISIS WEBSITE PERPUSTAKAAN UNIVERSITAS ISLAM NEGERI MENGGUNAKAN METODE BENCHMARKING DAN GOAL ORIENTED REQUIRMENTS ENGINEERING (GORE) MODEL (STUDI KASUS: UIN JAKARTA, UIN YOGYAKARTA DAN UIN MALANG) Qurrotul Aini; Imam Marzuki Shofi; Fenty Eka Muzayyana Agustin
JURNAL TEKNIK INFORMATIKA Vol 12, No 2 (2019): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1003.679 KB) | DOI: 10.15408/jti.v12i2.13245

Abstract

The library is an important source of knowledge for all academicians. One of them is the university library, the purpose of the university library is funding support from the university in providing education by providing sources of scientific information in the library. However, information sources (consisting of web sites) available in the library are currently incomplete. For this reason, a usability evaluation and design analysis of the website is required so that the library website development goals can be achieved. Requirement Analysis of this library website used the Bechmarking and Goal Oriented Requirement Engineering (GORE) methods of three library websites namely the UIN Syarif Hidayatullah Jakarta library website, Sunan Kalijaga Yogyakarta UIN and UIN Maulana Malik Ibrahim. Benchmarking method is used to get the basic requirements by questionnaire. The GORE method is obtained based on the formulation of system objectives. To get the system requirements with the GORE method consists of actor models, Strategic Dependency diagrams, and Strategic Rationale diagrams. The results of this website analysis are the achievement of all requirements obtained and the new system of the library website of the Syarif Hidayatullah State Islamic University Jakarta 
PENDEKATAN SERVICE ORIENTED ARCHITECTURE (SOA) UNTUK MERESPON PERUBAHAN USER REQUIREMENT APLIKASI E-GOVERNMENT Ahmad Nurul Fajar; Imam Marzuki Shofi
JURNAL TEKNIK INFORMATIKA Vol 9, No 2 (2016): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (758.933 KB) | DOI: 10.15408/jti.v9i2.5600

Abstract

ABSTRAK Pendefinisian user requirement yang tidak komprehensif kadangkala menyebabkan pengembangan sistem informasi menjadi  lama, over budget dan tidak dapat beradaptasi dengan perubahan regulasi. Selain itu, adanya anggapan bahwa tidak adanya perubahan regulasi dalam memberikan layanan kepada masyarakat. Hal ini disebabkan karena  menganggap kondisi  environment selalu berjalan normal. Pada kenyataanya, pengembangan sistem informasi memerlukan perhatian khusus untuk antisipasi terhadap kondisi environment yang tidak dapat diprediksi perubahannya. Penelitian ini diharapkan dapat memberikan kontribusi dalam hal pengembangan sistem berbasis Service Oriented Analysis & Design dengan pendekatan SOA untuk mengakomodir perubahan user requirement agar dapat dijadikan referensi untuk melakukan penelitian lanjutan. Kata kunci: SOA, User Requirement, Aplikasi E-Government, Perubahan
SISTEM PENGAMBILAN KEPUTUSAN PEMETAAN PELATIHAN TEKNOLOGI INFORMASI UNTUK PENYANDANG DISABILITAS TUNA RUNGU HARD OF HEARING MENGGUNAKAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) Siti Ummi Masruroh; Ahmad Arya Swaraja; Imam Marzuki Shofi
JURNAL TEKNIK INFORMATIKA Vol 12, No 2 (2019): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.254 KB) | DOI: 10.15408/jti.v12i2.12203

Abstract

Law number 8 of 2016 states that disability is part of the Indonesian republic which has the same rights and obligations. Therefore the need to increase social welfare for persons with disabilities, one way to improve it is by providing information technology training. To support information technology training an appropriate training mapping is needed. In this study, a training mapping was carried out for persons with disabilities who were deaf where there was ranking at each information technology training based on the ability criteria. The ranking of information technology training is analyzed using the Analytical Hierarchy Process (AHP) method and for the system, development using Rapid Application Development (RAD). This research discusses the hard of hearing deafness disability, in which information technology training is used like the following attributes of Microsoft Word, Microsoft Excel, PowerPoint, Photoshop, Scratch Programming, Adobe illustration, e-marketing, internet browsing, and social media. The final results show the ranking of information technology training that is suitable for hearing deafness disability.
IMPLEMENTASI ALGORITMA MULTINOMIAL NAIVE BAYES CLASSIFIER Anif Hanifa Setianingrum; Dea Herwinda Kalokasari; Imam Marzuki Shofi
JURNAL TEKNIK INFORMATIKA Vol 10, No 2 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (855.54 KB) | DOI: 10.15408/jti.v10i2.6822

Abstract

ABSTRAK Informasi diperkirakan lebih dari 80% tersimpan dalam bentuk teks tidak terstruktur. Oleh karena itu, dibutuhkan sistem pengelolaan teks yaitu dengan metode text mining yang diyakini memiliki potensial nilai komersial tinggi. Salah satu implementasi dari text mining yaitu klasifikasi teks. Tidak hanya dokumen, pemanfaatan klasifikasi juga digunakan pada surat. Peneliti mengkaji Multinomial Naive Bayes Classifier untuk mengklasifikasi surat keluar sehingga dapat menentukan nomor surat secara otomatis. Sistem klasifikasi didukung dengan confix-stripping stemmer untuk menemukan kata dasar dan TF-IDF untuk pembobotan kata. Pengujian diukur dengan menggunakan confusion matrix. Dari hasil pengujian menunjukkan bahwa implementasi Multinomial Naive Bayes Classifier pada sistem klasifikasi surat memiliki tingkat accuracy, precision, recall, dan F-measure berturut-turut sebesar 89,58%, 79,17%, 78,72%, dan 77,05%.  ABSTRACT The information estimated that more than 80% is stored in the form of unstructured text. Therefore, it takes a text management system, namely text mining method is believed to have high potential commercial. One of text mining implementation is text classification. Not only documents, the use of classification is also used in official letter. Researcher examined Multinomial Naive Bayes Classifier to classify the letter so it can determine the letters classification code automatically. The classification system is supported by confix-stripping stemmer to find root and TF-IDF for term weighting. The test used by confusion matrix of a classified as a measure of its quality. The test results showed that the implementation of Multinomial Naive Bayes Classifier on letter classification system has a level of accuracy, precision, recall, and F-measure respectively for 89.58%, 79.17%, 78.72% and 77.05%.How to Cite : Setianingrum, A. H. Kalokasari, D.H . Shofi. I. M. (2017). IMPLEMENTASI ALGORITMA MULTINOMIAL NAIVE BAYES CLASSIFIER. Jurnal Teknik Informatika, 10(2), 109-118. doi: 10.15408/jti.v10i2.6822Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.6822
Prototipe Sistem Computer-Based Test dengan Pengacakan Soal Menggunakan Metode Fisher-Yates Shuffle Aryajaya Alamsyah; Imam Marzuki Shofi; Hendra Bayu Suseno
Jurnal Ilmu Komputer & Agri-Informatika Vol. 8 No. 2 (2021)
Publisher : Departemen Ilmu Komputer - IPB University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29244/jika.8.2.81-89

Abstract

Evaluasi pendidikan di Sekolah Menengah Kejuruan Negeri 2 Depok seperti Ulangan Harian, Ulangan Tengah Semester, Ulangan Akhir Semester, dan Ujian Sekolah Berstandar Nasional belum terkomputerisasi. Evaluasi pendidikan yang belum terkomputerisasi ini mengakibatkan perlunya biaya untuk penggandaan soal dan waktu untuk proses koreksi jawaban. Oleh karena itu, solusi untuk menjawab masalah tersebut adalah pembuatan sebuah sistem terkomputerisasi untuk melakukan evaluasi pendidikan atau sering disebut sebagai computer-based test (CBT). Penelitian ini bertujuan untuk membuat sistem CBT di SMKN 2 Depok, sesuai dengan rencana pihak sekolah yang ingin merapkan sistem CBT pada evaluasi pendidikan. Penelitian ini menggunakan metode Fisher-Yates shuffle (FYS) untuk melakukan pengacakan soal. Metode pengembangan sistem yang digunakan adalah waterfall. Alat yang digunakan dalam pembuatan CBT yaitu PHP, JavaScript, Bootstrap, dan MySQL. Percobaan pada sistem CBT dilakukan dengan mengacak soal ujian yang terdiri atas 30 soal. Pengacakan soal dilakukan sebanyak 40 kali. Pengacakan soal yang dilakukan berhasil dengan baik, karena tidak terdapat urutan soal yang sama. Pengujian sistem dilakukan menggunakan metode black box. Hasil pengujian sistem menunjukan bahwa fungsional sistem sudah 100% berjalan dengan baik.
Texture Analysis and Fracture Identification of Lower Extremity Bones X-Ray Images Rahayu Suci Prihatini; Anif Hanifa Setyaningrum; Imam Marzuki Shofi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (944.793 KB) | DOI: 10.11591/eecsi.v4.1030

Abstract

Lower limb bones or lower limb component related to the torso with pelvic ankle interference can be fractured. Fractures can be detected automatically take advantage x-ray images performed using feature extraction methods. Feature Extraction helpful to know existence and location of fracture with x-ray images. This research apply Gray Level Co-Occurrence Matrix (GLCM) and K-Means Clustering Algorithm to analyze texture of lower extremity bones or lower limb bones x-ray images especially on the lower leg bones (cruris) consisting of two long bones (tibia) and leg bone (fibula), as well as the kneecap bone (patella). The GLCM feature extraction process yields an image characteristic with four parameters, i.e. Contrast, Correlation, Energy, and Homogeneity done before clustering steps for identification of fractured or non-fractured (normal) bones. The results accuracy texture analysis of lower extremity bones x-ray images using GLCM Feature Extraction Method and K-Means Clustering Algorithm is 80 percent. Keywords—Fracture, X-Ray Images, Lower Extremity Bones or Lower Limb Bones, Feature Extraction, GLCM, K-Means Clustering
Whistleblowing System Deployment using ITIL v3 Framework: Evidence from a Public University in Indonesia Nashrul Hakiem; Luh Kesuma Wardhani; Fajar Nugraha Wahyu; Nenny Anggraini; Imam Marzuki Shofi; Yudi Setiadi
Jurnal Sistem Informasi Vol. 18 No. 1 (2022): Jurnal Sistem Informasi (Journal of Information System)
Publisher : Faculty of Computer Science Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.527 KB) | DOI: 10.21609/jsi.v18i1.1131

Abstract

The Indonesian government has been urged to implement Whistleblowing systems for public services in order to achieve integrity zone development. Almost all service desk software provides user convenience as well as manages the service process in an organisation using standards based on the Information Technology Infrastructure Library (ITIL) v3. The service operation of Whistleblowing systems and the service desk systems are almost the same. However, currently only a few studies have examined the implementation of Whistleblowing systems which uses such a framework in a public higher education institution. The aim of this study is to design and develop a Whistleblowing system which is expected to fulfil the IT Service Management (ITSM) standard and to perform an integration process amongst the community and students. The software was designed and tested in the Universitas Islam Negeri Syarif Hidayatullah Jakarta using the ITIL v3 standards. The result showed that the efficiency parameter value produced a page speed point of 91 % (A). The minimum score was 91 % (A) and the fully loaded time was 2.4 seconds. A portability test showed a value of 100 % for the mobile-friendly score while the reliability test with a stress test also showed at 100 %. The alpha testing result was a very good predicate while beta testing received an acceptable score, good category, and classified as grade C. In conclusion, based on the abovementioned tests, this shows that the system can be used to manage student services, lecturers and staff, as well as to integrate the current service within the community.