cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. ponorogo,
Jawa timur
INDONESIA
Fountain of Informatics Journal
ISSN : 25414313     EISSN : 25485113     DOI : -
Core Subject :
Fountain of Informatics Journal (FIJ), with registered ISSN 2541-4313 (Print), ISSN 2548-5113 (Online), and DOI 10.21111/fij, is a peer-reviewed journal published semi-annual (May and November) by Universitas Darussalam Gontor. The FIJ invites manuscripts in the various topics include, but not limited to, functional areas of the information system, software engineering, computer network and game technology.
Arjuna Subject : -
Articles 96 Documents
Aplikasi Analisis Manajemen Resiko Untuk Membantu Pengambilan Keputusan Menggunakan Metode Decision Table Berbasis Web (Studi Kasus SMKN 1 Jenangan Ponorogo) Dihin Muriyatmoko; Edi Satriyanto; Eru Puspita
Fountain of Informatics Journal Vol 1, No 2 (2016): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v1i2.671

Abstract

Decision making by considering is very important in an institution. Generally, in choosing a solution of the problem is only take from a meeting, discussion or vote among the leader of each division. But it usually needs more time if the problems are the repetitive and less measurable,  then it takes an application so that decision-making to be effective, efficient, systematic and measurable. This application use decision table method to classifies each risk by considering the scale of likelihood and consequence, then of both these parameters will be taken risk management matrix that will determine the best solution.  This application not absolutely and only help to give the recommendation with the minimum value, so on each solution and risk have a value and the test results of the respondents indicated that the application is able to assist institutions in decision-making as much as 50 percent.
Aplikasi Penyimpan Koordinat Lokasi Beserta Rute dan Tracking Map Berbasis Mobile Android Kamal Fadl-Lu Maulayal Matin; Slamet Sugiarto; Happy Chrismana Datu
Fountain of Informatics Journal Vol 1, No 2 (2016): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v1i2.672

Abstract

The quickly and accurately access to information has become the society necessary in the 21st century.  The information in this period not only presented in the form of verbal communication, technological developments have enabled some information at once can be wrapped in a visual minimalist form. One popular technology is Google Map. Despite the existence of Google Map has helped many people to facilitate access to the full location, but in term of usage, society tends to only require information related to everyday life. Therefore, the ability of more suitable minimalist information to facilitate the publicin performing daily activities. We create an application that can provide location information that specifically aims to facilitate the public in performing daily activities. The application work using GPS technology-based Google APIs and runs on the Android platform. The information presented depends on the activities of daily users, either in the form of the most frequently visited locations, routes oftravel, location tracking, and navigation. All locations will be stored in the database of SaveLoc application, sso that the information that has been stored can be accessed anytime and anywhere.
Pembuatan Sistem Layanan Penjualan Berbasis Desktop Dilengkapi Monitoring Berbasis Android Pringgo Juni Saputro; Nanik Nuryantini
Fountain of Informatics Journal Vol 1, No 2 (2016): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v1i2.679

Abstract

Sales service system is an information system that serves all activities relating to the sale, whether it's a sales transaction data processing, data processing, data processing purchase transactions of goods, processing of customer data, and the processing of data member supplier. Sales system that is currently developing in community is not yet integrated with mobile applications, resulting in the creation of reports, the incoming transaction cannot be monitored in real-time so that owners of companies that are outside the area or you're not at home, not able to keep an eye on sales transactions that occurred o their company. The purpose of this research is to provide ease of data processing at the time the goods, customer and supplier, ease in data processing sales and purchase transactions, minimize errors in recording data of purchase and sales data per period. The method of research done by two methods i.e., methods of data collection and the development of information systems. Method of data collection is done in finding the needed information with the activities of field studies and research librarian ship. Information systems development methods used in the assessment of the problem in data collection, this method of the form of Action Research, analysis, design, designing, implementation.  Sales service system was built in order to provide ease in data processing sales and purchase either from sales to customers and purchases against the supplier as well as processing sale and purchase report making it more precise and accurate.
Pengembangan Aplikasi Pengolah Kata Menggunakan C++ Builder 5.0 Lukman Effendi
Fountain of Informatics Journal Vol 1, No 2 (2016): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v1i2.681

Abstract

A word processor is a tool used for writing text in which a word processing application has a function can perform text editing and printing. In making the word processing application is used programming languages C ++ Builder 5.0. The logic flow of this first-word processing application user will be presentedwith a form where there is a place to write the text. Within these forms are also several main menus in which there is a menu that is used to create new documents, the menu is used to edit the text, the menuis used for printing, as well as a menu that is used to store documents that support the format: txt, rtf, doc.
Desain Hybrid Prototype System Deteksi Api dan Deteksi Gerak Pada Keamanan Ruangan Shoffin Nahwa Utama
Fountain of Informatics Journal Vol 1, No 2 (2016): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v1i2.682

Abstract

The use of surveillance cameras are commonly used in place or room that is considered vulnerable, not only monitor but also can provide a sense of security for its users. This study discusses concerning fire detection and motion detection using a webcam for security room. Fire detection using the method of fire threshold RGB values by comparing each frame images captured by the webcam as data input, at the motion detection algorithm using blob calculation. Warning system used SMS gateway and sent to the specified server. The results show the value range RGB flame 218-248, 240-250, 242-252 and the use of motion detection complementary security systems built.
Implementasi Teknik Seleksi Fitur Pada Klasifikasi Malware Android Menggunakan Support Vector Machine Hendra Saputra; Setio Basuki; Mahar Faiqurahman
Fountain of Informatics Journal Vol 3, No 1 (2018): Mei
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v3i1.1875

Abstract

Android Malware has grown significantly along with the advance of the times and the increasing variety of technique in the development of Android. Machine Learning technique is a method that now we can use in the modeling the pattern of a static and dynamic feature of Android Malware. In the level of accuracy of the Malware type classification, the researcher connect between the application feature with the feature required by each type of Malware category. The category of malware used is a type of Malware that many circulating today, to classify the type of Malware in this study used Support Vector Machine (SVM). The SVM type will be used is class SVM one against one using the RBF Kernel. The feature will be used in this classification are the Permission and Broadcast Receiver.  To improve the accuracy of the classification result in this study used Feature Selection method. Selection of feature used is Correlation-based Feature Selection (CFS), Gain Ratio (GR) and Chi-Square (CHI). A result from Feature Selection will be evaluated together with result that not use Feature Selection. Accuracy Classification Feature Selection CFS result accuracy of 90.83%, GR and CHI of 91.25% and data that not use Feature Selection of 91.67%. The result of testing indicates that permission and broadcast receiver can be used in classifying type of Malware, but the Feature Selection method that used have accuracy is a little below the data that are not using Feature Selection.
Analisa Hasil Rekomendasi Pembimbing Menggunakan Multi-Attribute Dengan Metode Weighted Product Sucipto Sucipto
Fountain of Informatics Journal Vol 2, No 1 (2017): Mei
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v2i1.912

Abstract

The development world of work is influenced by several factors such as the performance of human resources, so that each company tried to get quality employees. Improvement of human resources can be obtained from the process of field work practice in college. The field supervisor is a quality improvement factor for the students. Generally the selection of lecturers of fieldwork practice practicum is done without recommendation from students. That condition make students facing problems in field work practice. One of them is the students have difficulty adjusting to the supervisor because the characteristics of lecturers obtained from the college does not match with the required students. Therefore, a recommendation system of guidance lecturers in the field of Information System Department of X University facilitates the students to recommend lecturers according to their needs. In the recommendation process of lecturers the field work practices is conducted with the assessment of five variables. Variables obtained from lecturer performance assessment. Each of these assessments is taken into account and considered according to the needs of the students in the field. That system is made using decision support system method by multi-attribute of Weighted Product. Resulted of the analysis that has been done obtained an alternative of lecturers selected from the group of fieldwork students and the evaluation of lecturer selection by the student group. The result of the method is known that the analysis can give the recommendation of the supervisor lecturers to the student group in accordance with the highest score.
Implementasi Teknik Data Mining untuk Evaluasi Kinerja Mahasiswa Berdasarkan Data Akademik Gita Indah Marthasari
Fountain of Informatics Journal Vol 2, No 2 (2017): November
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v2i2.1216

Abstract

One indicator of college efficiency is the study period of the students. It is important for university managers to improve the ratio of students who graduate on time. This research aims to analyze the characteristics that affect the study period of students from academic data. The methods used are association rule mining (ARM) and clustering. We propose a framework to analyze academic data using ARM dan clustering method. ARM method is a method to find association rules that meet minimum support and minimum confidence. The algorithm used is Apriori. While clustering using Simple Expectation-Maximization (EM-clustering) algorithm. Simple EM is a model-based algorithm that searches for maximum likelihood estimation in the probability model. The variables analyzed were student achievement index, province of the students, and type of high school. The analysis is done using WEKA. Research begins with the collection of data from the primary source of the Biro Administrasi Akademik (BAA) Universitas Muhammadiyah Malang (UMM). Then, we do the data cleaning and transformation. Analyzing process is done in two step. First, do a rule search using Apriori algorithm. The regulated parameters are the minimum support and minimum confidence value. Second, we use Simple EM algorithm for the clustering process. The experiments were conducted to find the clustering result with the largest log likelihood value. Based on the experiment, the method used successfully describes the characteristics based on the study period.
Implementasi Limited Tolerance Relation Untuk Sistem Informasi yang Tidak Lengkap Pada Data Mahasiswa Edi Sutoyo
Fountain of Informatics Journal Vol 3, No 1 (2018): Mei
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v3i1.1833

Abstract

Rough set theory is one of the mathematical models for dealing with a vague, imprecise, and fuzzy knowledge that has been successfully used to handle incomplete information systems. Since, in fact in the real-world problems, often found the conditions that are the user can not provide all the necessary preference values. In this research, an implementation of extension technique of rough set theory that called limited tolerance relation is used to overcome incomplete information systems in student data at Telkom University. Based on the obtained results, the limited tolerance relation technique successfully used to handle that problem. The results show that the technique achieved the  accuracy of 96.04% with an execution time of 3.1830 seconds.
Analisis Dan Perancangan Aplikasi Pengelolaan Komunikasi Dan Informasi Pada Apotek Anisa Dengan Akses Client-Server Dan Virtual Host Ricki Ardiansyah
Fountain of Informatics Journal Vol 2, No 1 (2017): Mei
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v2i1.871

Abstract

The The rapid development of science and technology has encouraged people to seek and implement new ways and methods in the process of work in order to run more easily and smoothly. By looking at the current technological sophistication, especially information and communication technology that can help facilitate the work of an organization or company that can be used as consideration in making a decision and provide timely and accurate information. So the author tries to take advantage of this to design an application Management Applications Communications And Information At Anisa Apotek as a tool to improve the effectiveness and accuracy of work, which during this process of data processing on Apotek anisa still done manually. With this application, it is expected Anisa Pharmacy can be more developed, so many customers who use it.

Page 1 of 10 | Total Record : 96