Claim Missing Document
Check
Articles

Found 11 Documents
Search

SISTEM PENUNJANG KEPUTUSAN PENERIMAAN RETRIBUSI PADA DINAS PERMUKIMAN DAN KEBERSIHAN MENGGUNAKAN ALGORITMA NAÏVE BAYES Nahrun Hartono; Asrul Azhari Muin; Erfina Erfina
Jurnal INSYPRO (Information System and Processing) Vol 5 No 2 (2020)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (543.883 KB) | DOI: 10.24252/insypro.v5i2.19410

Abstract

Dinas Pemukiman Dan Kebersihan Kabupaten Pangkep bertugas menjaga kebersihan dan kenyamanan Kabupaten Pangkep sehingga kota Pangkep menjadi kota yang bersih dan indah. Tugas dan tanggung jawab ada pada Dinas Pemukiman Dan Kebersihan untuk bersama-sama warganya menjaga kota Pangkep supaya tetap bersih dan indah.Sampah yang dihasilkan oleh masyarakat bisa menghasilkan retribusi terhadap Kabupaten pangkep yang nantinya di kelola menjadi APBD Kabupaten Pangkep setiap tahunnya, selama ini Dinas Pemukiman dan Kebersihan Kabupaten Pangkep dalam mengambil retribusi sampah masih digunakan cara-cara tradisional dengan menggunakan Sistem Semikomputer atau manual.Sehingga penerimaan retribusi sampah rawan di selewengkan oleh oknum yang tidak bertanggung jawab maka dari itu penulis mencoba membuat suatu Sistem yang nantinya penerimaan retribusi sampah bisa dikontrol oleh admin. Dengan sistem komputerisasi menggunakan program aplikasi visual basic dan menggunakan algoritma Naïve Bayes dengan akurasi 77, 50 % Dimana nantinya pegawai yang bertugas mengangkut sampah dari rumah tangga, restoran, rumah sakit dan pasar sesuai dengan biaya yang sudah ditentukan oleh masyarakat dan pemerintah dalam hal ini Dinas Pemukiman dan Kebersihan Kabupaten Pangkep. Pegawai yang bertugas akan membagikan karcis ke setiap rumah tangga, restoran, rumah sakit dan pasar setiap harinya sehingga berapa karcis yang dibawa oleh pegawai nantinya akan di hitung karcis yang tinggal dikali dengan harga karcis berdasarkan warna karcisnya yang sudah ditetapkan oleh Dinas Pemukiman dan Kebersihan Kabupaten Pangkep.
Perancangan Teknologi Private Cloud Computing Sebagai Sarana Infrastruktur System Online di Universitas Islam Negeri Makassar Wahyuddin saputra ririn; Nahrun Hartono
Jurnal INSYPRO (Information System and Processing) Vol 6 No 2 (2021)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/insypro.v6i2.27630

Abstract

The need for information technology infrastructure is increasing along with the increasing need for IT resources. One of these needs is the construction and development of a data center. To meet this need, an increase in computing capacity is needed, by procuring new servers. However, there are consequences of this decision, the organization will face several new problems in increasing management, namely the costs spent for these purposes are quite large. Cloud Computing is a technology that can help solve the problem of limited bandwidth and storage space. By using Proxmox VE as a tool to manage server virtualization. This is what makes the author interested in proposing the Design of Private Cloud Computing Technology as an Online System Infrastructure Facility at the Makassar State Islamic University. The purpose of this research is to maximize the performance of the infrastructure that has been used so that it can reduce the cost of using licensed software. The type of research used is experimental research, using data collection methods, namely interviews, observations and literature studies. This design is tested using a black box. The results of this study resulted in the design of an As Service (IaaS) Cloud infrastructure that runs on a local network. The conclusion of this study is that by utilizing Proxmox VE in building a Cloud service (IaaS) it can maximize the performance of a server and can reduce the use of licensed software
Systematic Literature Review: Current Products, Topic, and Implementation of Graph Database Adhy Rizaldy; Sirli Fahriah; Nahrun Hartono
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 7, No 1 (2021): April
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v7i1.19007

Abstract

Planning, developing, and updating software cannot be separated from the role of the database. From various types of databases, graph databases are considered to have various advantages over their predecessor, relational databases. Graph databases then become the latest trend in the software and data science industry, apart from the development of graph theory itself. The proliferation of research on GDB in the last decade raises questions about what topics are associated with GDB, what industries use GDB in its data processing, what the GDB models are, and what types of GDB have been used most frequently by users in the last few years. This article aims to answer these questions through a Literature Review, which is carried out by determining objectives, determining the limits of review coverage, determining inclusion and exclusion criteria for data retrieval, data extraction, and quality assessment. Based on a review of 60 studies, several research topics related to GDB are Semantic Web, Big Data, and Parallel computing. A total of 19 (30%) studies used Neo4j as their database. Apart from Social Networks, the industries that implement GDB the most are the Transportation sector, Scientific Article Networks, and general sectors such as Enterprise Data, Biological data, and History data. This Literature Review concludes that research on the topic of the Graph Database is still developing in the future. This is shown by the breadth of application and the variety of new derivatives of GDB products offered by researchers to address existing problems.
Pengunaan Formula Haversine pada Sistem Informasi Pencarian Guru Mengaji Faisal Faisal; Nahrun Hartono; Muhammad Syafei
Journal Software, Hardware and Information Technology Vol 1 No 1 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i1.3

Abstract

The search for private reciting teachers is mainly carried out through contacts with colleagues of the same profession, recommendations from previous reciting teacher service users so that broadcasts through social media problems that then arise through searches like this, including searching for prospective private reciting teachers who take a long time, find it challenging to find a match The location and time between the prospective Koran Kaji and the students, cannot know the competence, achievements and track-records of the future Koran teachers in private. This research is qualitative research where the strategy used is Design and Creation—the method used for data collection using the form of observation, literature study, questionnaires and interviews. This research aims to design a system that can make it easier for students to find Koran teachers. In contrast, the design of this system uses the Java and MySQL programming languages for databases and the programming method using the Haversine Formula method. This research produces an Android-based private apprenticeship teacher information system application for the conclusions drawn from this study. To design a system for ordering private Koran teachers to make it easier for the community, especially in Makassar.
Implementasi Extract Transform Load Pada Data Akademik Perguruan Tinggi Nahrun Hartono; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 1 No 2 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i2.16

Abstract

Each department at university needs to analyze student data and scores. By analyzing student grades, majors can improve lecturer performance in learning; one way to explore student grades is to collect student grade data and then process the data to produce information in the form of learning performance results that can be used to make decisions to improve lecturer performance. The author will analyze a structured programming course student score data; the following collected data are related to student attendance, assignment scores, mid-semester exam scores, and final semester exam scores. After all the data needed has been organized to build the data warehouse, the following process is the ETL process (Extract, Transform, and Load), as the tool used in the ETL process is Pentaho. This data extraction process using 1 data source, namely student value data with excel file type. After carrying out the extraction process, there is a data transformation process, namely making some changes to the extracted data to make it more consistent and uniform according to the needs of the data warehouse.
Comparison of Stored Procedures on Relational Database Management System Nahrun Hartono; Erfina Erfina
Tech-E Vol 4 No 2 (2021): Tech-E
Publisher : Fakultas Sains dan Teknologi-Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/te.v4i2.529

Abstract

Store procedure is a group of query stored in database catalogue which allows it to be recalled. Insert, update and delete data could performed using store procedure. Stored procedure is an alternative to optimize query performance and also to reduce security gap at interface level of a system. This research provides an overview implementation of stored procedure insert, update and deleting in two DBMS, MariaDB and PostgreSQL. Software developers prefer MariaDB and PostgreSQL because it is open-source, which means free. This research is an experimental research and descriptive analysis. This research data uses student data with amount of data 25000, 15000 and 5000 data. Research result show PostgreSQL require less processing time than MariaDB. Results of this research can used as a reference to design application programs which sometimes choose a DBMS is not a concern of developer.
Studi Literature Sistem Keamanan Biometrik Untuk Verifikasi dan Transaksi Dompet Digital Nahrun Hartono; Adhy Rizaldy; NIswa Ayu Lestari
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.30

Abstract

E-Wallet is a service for storing money electronically that can be used for financial transactions or electronic payments easily and quickly. With the increasing use of digital today, the more the threat of ID theft and account takers can lead to balance withdrawals. In the last few years, fraudulent activities have grown rapidly so that only using a PIN and password with one-time password verification is no longer safe. The solution to this security problem is to use biometric authentication. A biometric security system is an authentication system for unique parts of the human body such as fingerprints, irises, and faces, which are stored in a database. This paper will discuss how the biometric security system is used in verification and transactions on digital wallets.
Rancang Bangun Sistem Informasi Pelaporan Luas Tambah Tanam dan Panen Berbasis Web Wiwisnawati Wiwisnawati; Nahrun Hartono; Hastuti Baharuddin
Journal Software, Hardware and Information Technology Vol 3 No 1 (2023)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The reporting process at the Agricultural Extension Center takes quite a long time due to the distance from each village, where getting report data to the office to collect reports is quite far, and the media for collecting reports are still conventional. From these problems, the researcher aims to create a planting area reporting information system and a harvest-based website that can assist in collecting, processing, storing, and presenting data reports and assist extension coordinators in making decisions and planning. This study uses qualitative research, data collection methods of observation, interviews, and literature. The system design method uses a waterfall. System testing uses the Black Box, and system feasibility testing uses the System Usability Scale (SUS) method. The results of the study are in the form of a website application where from the results of the system feasibility test, an average value of 80.1 is obtained; on the grade scale assessment, they get a grade "B," and on the adjective rating they get a "Good" rating which indicates that respondents accept and agree with the existence of an information system. Reporting of added area planted and harvested.
Implementasi User Accepted Test pada Pengujian Sistem Informasi Daerah Rawan Kriminalitas Nahrun Hartono; Asrul Azhari Muin; Haykal Passolongi
Journal Software, Hardware and Information Technology Vol 3 No 1 (2023)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data collecting and mapping of criminal data have been carried out for a long time by recording criminal acts on paper (books). Otherwise, collecting data uses office applications, while mapping is done by marking on the map. The goal is to find out the highest crime rate in an area. The mapping results are a reference for the authorities to improve surveillance and education in areas with high crime rates. This method has many drawbacks, including the possibility of data being overwritten. System testing uses black box testing, while feasibility Testing uses the User Accepted Test (UAT) method. User Accepted Test testing is done by asking respondents to use the system and then giving responses to the questions given. Ten questions were asked with an assessment score using a Likert scale. After that, search for the percent value for each question to get the average score. The average score is the final result of the User Accepted Test. The results of this study are an average score of 89.88%. Based on the User Accepted Test score criteria, the average respondent strongly agrees with the developed application.
Security and Data Integrity Analysis in E-Voting Systems Zulkarnaim Masyhur; Nahrun Hartono
Jurnal INSYPRO (Information System and Processing) Vol 8 No 1 (2023)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/insypro.v8i1.37858

Abstract