cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimainfosys@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
International Journal of New Media Technology
ISSN : 23550082     EISSN : 25811851     DOI : -
International Journal of New Media Technology (IJNMT) is a scholarly open access, peer-reviewed, and interdisciplinary journal focusing on theories, methods, and implementations of new media technology. IJNMT is published annually by Faculty of Engineering and Informatics, Universitas Multimedia Nusantara in cooperation with UMN Press. Topics include, but not limited to digital technology for creative industry, infrastructure technology, computing communication and networking, signal and image processing, intelligent system, control and embedded system, mobile and web based system, robotics.
Arjuna Subject : -
Articles 110 Documents
Implementation IT Governance Using COBIT 5 Framework at PT. XYZ (Persero) Drago Tinus; Johan Setiawan
IJNMT (International Journal of New Media Technology) Vol 9 No 2 (2022): IJNMT : International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v9i2.2739

Abstract

PT. XYZ (Persero) is one of the state-owned companies that move in insurance & guarantee, capital market & investment. PT. XYZ (Persero) conducts an assessment of information technology governance with the aim of meeting the implementation of GCG (Good Corporate Governance) which are listed through KBUMN (Ministry of State-Owned Enterprises) regulations PER-02/MBU/2013 & PER-03/MBU/02 /2018. The regulation PER-02/MBU/2013 has been stipulated on page 6 section 3.2. The target is that “The maturity level target in the next 5 years is a minimum maturity level of 3 in accordance with the specified maturity level”.PT. XYZ will conduct a COBIT 5 assessment again based on the results of the assessment that has been carried out by the previous assessor. COBIT 5 assessment will be carried out with a target of level 4 so that it is expected to get a maturity value above 3 and can meet the request of KBUMN (Ministry of State-Owned Enterprises).The assessment is doing by identifying company objectives, mapping Enterprise Goals, mapping IT Related Goals, mapping and determining process domains, analysis the previous assessor's COBIT 5 capability level measurement, measuring the process capability level of EDM01, EDM02 and EDM04, results and gap analysis as well as improvement recommendations.Based on the assessment that has been carried out on the EDM01, EDM02 & EDM04 process, the final result is obtained with a final value of 97.08% so that it gets a Capability Level of 3,88 and it has a gap of 0,12 from the expected target.
INDONESIAN ANALYSIS SENTIMENT ON NON FUNGIBLE TOKEN (NFT) Adhitia Erfina; Dinda Tasya Mahardika
IJNMT (International Journal of New Media Technology) Vol 9 No 2 (2022): IJNMT : International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v9i2.2760

Abstract

NFT or Non-Fungible Token is a unique token attached to a digital asset that is connected to the blockchain system. Various assets, digital art, music, tweeters, memes, sold as NFT, NFT has been widely discussed on various social media, one of which is Youtube. NFT has become a new trend for the Indonesian people, based on the fact that someone who sells selfie photos at the Open Sea is viral because people think it is a trivial thing but why do they produce it, but people actually accept the trend as a mistake, they intentionally upload their identity on the platform. This Open Sea, this happened because there was little information related to NFT and the public did not really understand that NFT could be a bridge for criminals. But in this case, many people as artists have been greatly helped in the marketing of their art. And even when the stock market is down, NFT remains one of the digital assets that attracts the attention of the world community, therefore this study was made to analyze the public's response with sentiment analysis, data obtained from Youtube content comments and then classified into Positive, negative, and neutral classes with TF IDF for the process of word weighting and classification using the Naïve Bayes Classifier algorithm. The test is carried out by calculating accuracy, precision, recall and F1-score, using a variety of training data and test data. And the accuracy results are 64%, for positive prediction class precision is 63%, neutral class precision is 83%, while for negative prediction is 0% and recall obtained from positive is 99%, neutral recall is 0.7% while negative is 0%. These results are the data obtained on Youtube comment
Predicting the Case of COVID-19 in Indonesia using Neural Prophet Model Efraim Yahya Wijaya; Alethea Suryadibrata
IJNMT (International Journal of New Media Technology) Vol 9 No 2 (2022): IJNMT : International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v9i2.2821

Abstract

Since the initial entry of the COVID-19 virus in Indonesia, the spread of cases increased significantly. This has a huge impact on hospitals that serve chronic COVID-19 patient. There are several ways that the government used to suppresses the spread of COVID-19 case in Indonesia, such as making PPKM policies and providing vaccinations. Through this research, the prediction method is used to find increasing and decreasing of COVID-19 cases using the Neural Prophet model. Then the model will be compared with the Facebook Prophet as comparison model. In this study dataset is used from (covid19.go.id) which was taken on 23 June 2022 with scraping technique. The results of this study indicate that the Neural Prophet model has better value in RMSE, and MAE compared to the Facebook Prophet.
Sentiment; Clustering; K-Means Analysis Sentiment in Bukalapak Comments with K-Means Clustering Method Rena Nainggolan; Fenina Adline Twince Tobing; Eva J.G Harianja
IJNMT (International Journal of New Media Technology) Vol 9 No 2 (2022): IJNMT : International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v9i2.2914

Abstract

Technological development are very fast ini this era of globalization, to facilitate the work of many aspevt that can be utilized, as well as for the flow of information. By applying computer technology in varios fields, such as educations, entertainment, healt, tourism, culinary and so on. Clustering id one of the Data Mining techniques. Clustering works by combining a number of data or objects into one cluster, with the aim that each data ini one cluster will have data that is a similar as possible and different from data or objects in other groups. K-Means Clustering has the ability to perform computations that are relatively fast and efficient in combining large amounts of data. In this research, there are 1407 comments which will training data and testing data.
Designing an Enterprise Architecture Using TOGAF ADM Framework (Case Study: PT. Indorama) Feby Janiar Husein; Melissa Indah Fianty
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.2903

Abstract

This research aims to create an information technology architecture that will automate the company's business processes that focus on customer relationship management systems using a case study from PT Indorama. Enterprise IT Architecture must complement the vision and organizational goals and match the needs of business processes. As a result, creating IT blueprints is critical for businesses to make the future development of information systems easier. TOGAF ADM was used to create the IT architecture for this investigation. To integrate current system applications, Customer Relationship Management (CRM) based applications are used to complete various business tasks that are not currently enabled by the current application system. This research results in the design of an IT architecture to support the company's strategic plans through business process automation and answer predetermined challenges. Keywords— Enterprise Architecture, Customer Relationship Management, TOGAF ADM
A BUSINESS PROCESS REENGINEERING AT MULYOAGUNG VILLAGE COMMUNITY SERVICE OFFICE Ahmad Raihan Djamarullah; Budiman Hamsyurah; Ilyas Nuryasin
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.2915

Abstract

The Mulyoagung Village Office is a community service office in Mulyoagung Village. One of the services offered at the Mulyoagung village office is a system for making ID cards at the village office using the SiPeduli Desa website, but after analyzing the percentage of throughput efficiency obtained is still 30.85%. There are several processes that require a long waiting time and also manual processing processes so that this condition is still less efficient. Therefore, changes in business processes need to be made to improve the old system that is currently running into a more optimal system. This significant change in business processes is called Business Process Reengineering. The concept of reengineering was born to solve the shortcomings of the old system or legacy system in a business process. Completion of a business process with Business Process Reengineering is done by eliminating processes that do not provide added value and changing manual processes into automated processes by utilizing information technology. The results of this study are business process designs that increase throughput efficiency from 30.85% in the previous process to 89.61% in processes that have been carried out by Business Process Reengineering. The application of Business Process Reengineering can help provide the design of a new business recommendation model that is obtained after an analysis of old business processes and analysis of redesign alternatives is carried out. Business Process Reengineering is also able to improve old processes both in terms of service and speed.
The Integrated System Design Of Sales And Production Module Using RAD Method Alvin Dzaki Hernindyaputra; Monika Evelin Johan; David Tjahjana
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3012

Abstract

PT Shafira Putri Kreatif is a company engaged in the field of fashion and apparel for men and women. In business processes, communication is carried out manually in the form of face-to-face or in-office meetings between subsidiaries. This results in inappropriate or forgotten information on production and sales. Therefore, implementing the ERP module is because it can help find important problem points faced by companies to better control the company's financial performance. The SDLC Rapid Application Development (RAD) method was used. System design is done by making DFD and ERD. The system design is coded using the PHP programming language with the Laravel framework and SQL database. The result of the research is a website-based application that is integrated with the sales module which can assist in viewing and managing transaction data from subsidiaries.
DistilBERT with Adam Optimizer Tuning for Text-based Emotion Detection Farica Perdana Putri
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3170

Abstract

Emotion detection (ED) refers to identifying individual emotions or feelings, such as happiness, sadness, disappointment, fear, etc. The classic machine learning technique still relies on feature engineering, which makes it difficult to convey the meaning of words. Deep learning-based algorithms have recently been shown to be beneficial for emotion detection because they require only a simple feature creation process. Transfer learning is an approach that uses data similarities, data distribution, models, tasks, and other factors to apply knowledge learnt in one domain to a new domain. This study is to shed light on the fine-tuned models' efficacy in detecting emotions from the International Survey on Emotion Antecedents and Reactions (ISEAR) dataset. In order to optimize the model, we conducted the hyperparameters tuning on Adam optimizer in DistilBERT. The experiment examined the moment estimators and learning rate of Adam optimizer. The effect of the parameters to training and validation accuracy were presented and analyzed.
Developing HIV/AIDS Patient Profile Model Using K-Means Clustering Method Rena Nainggolan; Fenina Adline Twince Tobing
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3199

Abstract

Dr. Pirngadi is one of the Regional General Hospitals in North Sumatra that handles services for HIV/AIDS patients. Patients who actively take ARV therapy every month are low, namely around 20%. This will hurt efforts to prevent and transmit HIV/AIDS-, because people infected with HIV become carriers and transmitters of the HIV throughout HIVes,HIV though they don't feel sick and look healthy, the sufferer still carries HIV. To be able to carry out more effective and efficient handling of the prevention and control from HIV/AIDS transmission, it is very important for the government and related parties, such as the Health Office, Social Services, and Hospital management, especially in VCT/CST (Voluntary Counseling and Testing) services. /Care Support Treatment) to find out about understanding patient profiles, the knowledge possessed to understand, predict, and prevent the development of HIV/AIDS disease transmission is very important. This knowledge can be used by the government to carry out programs that can prevent and break the chain of transmission of the HIV/AIDS virus as early as possible and help those involved in health services to become more familiar with the situation of their patients and can be used as early knowledge in the decision-making process to preventive actions in terms of improving providing health services to patients, increasing the level of public health, improving people's welfare and many other benefits that can be obtained found from the results data mining. This research takes the service area at RSUD Dr. Pirngadi Medan as one of the research domains in the field of data mining with data sources from RSUD Dr. Pirngadi Medan. This is done as information is known to the VCT/CST services at RSDU Dr. Pirngadi Medan. With data groupings like this, it is hoped that the Government or related agencies can create programs and implement them so that they can prevent and overcome the spread of HIV/AIDS in Indonesia. It is on this basis that the authors are interested in taking the title of the study regarding the formation of a patient profile model using the K-Mean clustering method.
Intrusion Detection System on Nowaday's Attack using Ensemble Learning Fajar Henri Erasmus Ndolu; Ruki Harwahyu
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3210

Abstract

Attacks on computer networks are becoming more and more widespread nowadays, making this an important issue that must be considered . These attacks can be detected with the Intrusion Detection System (IDS). However, at this time there are new attacks that have not been detected by IDS. Therefore, ensemble learning is used. This research we used Random Forest algorithm for attack detection as an increase in the ability of IDS to detect cyber attacks. The use of the CSE-CIC-IDS2018 dataset is used in this research as a current representative dataset for cyber attack detection. The results of this study we get a binary classification accuracy of 99.6856% and an f1-score of 99.5803% and a multiclass classification accuracy of 99.6944 and an f1-score of 97.8032% with a data ratio ratio dataset of 3:1 normal class to attack class.

Page 11 of 11 | Total Record : 110