Monday, March 9, 2015

Support Vector Machine

PENERAPAN METODE SVM UNTUK KLASIFIKASI  RESIKO KREDIT KEPEMILIKAN  
KENDARAAN (MOTOR) 


Abstract—Given Credit Risk in a lease is always there  , So  credit analysis should be done carefully .  if Consumer troubled in paying installment  payments  ,  so  would  be  detrimental  to  the  lease. Therefore, quantitative  and  qualitative  Credit  analyzing  will provide  clarity  for  decision makers  .To  achieve  this  goal,  credit preparations  should  be  done  by  collecting  information  and  data. The quality of   the result of the analysis depends on the quality of Human resources, the data, and analysis techniques . In this research  discussed  regarding the application using support vector machine  (  SVM  ) method  for  determination  of  the  Credit Risk of  Motor  Vehicle  ownership  .  The resulting model  is  then evaluated its performance by calculating accuracy model prediction using  Confusion  Matrix  and  ROC  curve,  obtained  9.78  % accuracy value and AUC value is 0.894. The classification is Good Enough because have  AUC values between from 0.8 to 0.9.

Download Cover


Jurnal Sistem Informasi :oleh LPPM STMIK Antar Bangsa  (ISSN 2089-8711) Vol.IV No. 1, Februari 2015

Sistem Pakar

Sistem Pakar Minat Dan Bakat Anak Dengan   Multiple Intelligences Berbasis Web Pada  Sdit Mutiara Islam Depok 

ABSTRACT 
Identifying  talents of  children  as  early  as possible  as parents will  surely  find  it helpful because parents can directly lead and guide so that their interests and talents can flourish. So it is with the child,  the  child  can  explore  talents  honed  better  and  also  can  fill  the  days  in  its  path with  an activity  that  is  meaningful  to  him  and  certainly  liked  it.  Therefore  needed  an  expert  system application  that  can  help  figure  it  out.  Application  of  expert  system  is  an  expert  system  that created  the  interest  and  talents  of  children  elucidation web  based.  The  system  uses  a forward search method (Forward Chaining) to determine the child's interests and talents. The theory used is  the  theory  of  multiple  intelligences  (Multiple  Intelligences)  by  Professor  Howard  Gardner. Expert System Application Determination interest and Kids Talent is expected to help in knowing the  interests  and  talents  of  children  as  early  as  possible.  So with  a  system  of  this  application, parents can maximize kemmapuan children, so that children can be multitalented. 
Jurnal Tekno :oleh LPPM STMIK Nusa Mandiri  (ISSN 1978-2136) Vol.IX No. 1, Maret 2013

Sistem Keamanan Rumah

PerancanganSistem  Keamanan  Rumah  Dengan Memanfaatkan Layanan Sms Telepon Selular  

Abstrak: Hadirnya  telepon  bergerak  (seluler)  atau  handphone  yang  telah  dikenal  dan  digunakan  banyak  orang, yang mampu melakukan  komunikasi  di manapun mereka  berada  tanpa  dibatasi  oleh  ruang  dan  rentang  panjang kabel  bisa  menjadi  solusi  bagi  kebutuhan  kemanan  rumah.  Sistem  ini  diharapkan  dapat  membantu  seseorang  untuk   mengawasi   dan   mengontrol    keadaan    rumah,   dengan  memanfaatkan    teknologi   SMS.   Sistem    ini   menggunakan    IP   Camera   dan   4   buah   saklar   yang   berfungsi       sensor   yang   akan   mendeteksi   keberadaan  seseorang   yang    terhubung   dengan   sebuah   Buzzer   dan   LCD.   Sistem   pemrosesan   data   menggunakan   IC  Mikrokontroller   ATmega 162   yang   diprogram   dengan   bahasa   Bascom   melalui   compiler   program  codeVisionAVR.  Sistem  terhubung  dengan Wavecom M1306B  yang  berfungsi  sebagai  mengirimkan  pesan  jika terjadi  suatu  seatu  tindakan  yang  mencurigakan.  Hasil  pengujian  menunjukkan  sistem  dapat  bekerja  secara otomatis  untuk mengirimkan  peringatan      jika  terjadi  bahaya  kepada  seorang  pemilik  rumah  berupa  format  teks tertentu   dalam   bentuk   SMS.   Selain    itu   pemilik    juga   dapat   melakukan   pengontrolan    terhadap   alarm   dan membunyikan buzzer hanya dengan mengirimkan format teks SMS tertentu.  



Proceedings Seminar Nasional Inovasi & Teknologi 2012 LPPM BSI BANDUNG ISBN : 978-602-99213-2-8

model delone and mclean

Efektifitas Pemanfaatan e-Learning e-Dukasi.net Berdasarkan Model DeLone & McLean

Abstrak -- Saat ini banyak Sekolah Menengah Umum yang menggunakan internet sebagai sarana pendukung untuk membantu pelaksanaan proses belajar mengajar seperti e-Learning e-dukasi.net yang dibuat oleh Pemerintah. Penelitian ini  dilakukan untuk menyelidiki seberapa efektivitas pemanfaatan  e-Learning e-dukasi.net pada siswa SMA. Metode yang digunakan adalah dengan memberikan kuesioner untuk Siswa SMA, Guru dan Wali Siswa di 5 (lima) wilayah acak di Jakarta yang telah menggunakan e-dukasi.net. Secara umum, model penelitian berdasarkan model Delone & McLean yang telah diperbaharui (2003) dan untuk perbedaan ragam  pengguna e-Learning e-dukasi.net  didasarkan pada model UTAUT (Unified Theory of Acceptance and Use of Technology), yang dikembangkan oleh Venkatesh et al. (2003). Model  akhir yang diperoleh dalam penelitian ini adalah model keberhasilan dari sistem Teknologi Informasi yang dikembangkan oleh Delone & McLean yang telah diperbarui (2003) yang menurut penelitian ini adalah variabel meliputi : Variabel Kualitas Layanan  (KL)  berpengaruh langsung terhadap variabel  Intensitas Pemakai  (IP) sebesar  0,15. (15 %), Intensitas  Pemakai (IP) secara langsung mempengaruhi Variabel Manfaat (M) pada 0,43 (43%), Ragam Pengguna (RP) langsung mempengaruhi hubungan Intensive Pemakai (IP) dan Manfaat (M).

DOWNLOAD COVER

Proceedings Seminar Nasional SINAPTIKA 2011 Universitas Mercubuana ISSN : 2086-8251

Monitoring Packet Data

Analisa Monitoring Lalu Lintas Paket Data Jaringan Lokal


ABSTRACT
The attack on internet systems increasingly rampant, almost all of the information in the system, it is not an easy job to monitor the hundreds of IP in and out of clients. We need the help of a system that can monitor the data packet and record it and provide further information to be analyzed further. System Intrusion Detection System can help users monitor and analyze problems in network security. The expected result is to know how much inconvenience caused to the system through a corporate network traffic. Testing of IDS performed on a local network of  PT. Anta Citra Arges for three days. Observations were made to the directory the user can monitor the daily activities in the network and the result will be a reference in determining how much disk capacity is needed for the system is not disturbed or damaged. Observations also held with the activities of suspected hacker activities, such as sending large data packets that can make the system unstable or monitor activity in and out of IP networks that are not known or suspected. The results of this analysis is that with 17  use,r disk capacity to be provided for one year is 15,5GB.


Download Cover Proceedings Seminar Nasional Inovasi & Teknologi 2011 LPPM BSI ISSN : 978-602-99213-0-4

penerimaan e-dukasi.net

Faktor Penentu Keberhasilan Siswa Dalam Menerima E-Learning E-Dukasi.Net

ABSTRACT
Now many high schools that uses the internet as a means of support to assist the implementation of teaching and learning processes such as e-learning e-dukasi.net are made by government.This study was conducted to investigate the effect Internet self efficacy, perceived enjoyment, ease of use and perceived usefulness  of  high school students  on intention to continue to use e-learning e-dukasi.net so would cause a behavior to use e-learning is continuously .The method used is by giving questionnaires to high school students in five random areas of Jakarta who had used e-dukasi.net.The analysis was performed to assess the relationship of each variable and they constructs research, also investigated the relationship between variables, examining the normality and the validity of all constructs. Model analysis was conducted by Technology Acceptance Model (TAM) and the program package AMOS 7.0 structural equation, to test the causal hypothesis between constructs and variables and goodness of fit of the model study.Results of the can is internet self efficacy, perceived ease of students in using e-dukasi.net had significant influence on intention to use e-learning e-dukasi.net so as to affect the behavior of the use of e-dukasi.net itself .

link cover

Proceedings Seminar Nasional Inovasi & Teknologi 2011 LPPM BSI ISSN : 978-602-99213-0-4

IDS sebagai Firewall

Penerapan Intrusion Detection System Sebagai Firewall dan Sarana Untuk Menangkal Penyusupan Hacker Pada Jaringan Local Asuransi Jiwa Inheal Indonesia di Jakarta

Abstract:
The attack on internet systems increasingly rampant, almost all of the information in the system vulnerable to attack and also generated a lot of financial losses due to these attacks, of course, as network administrators, is not an easy job to monitor the hundreds of IP in and out of clients. Install the honeypot to fool hackers also not the only way to better secure the internal regions and Demilitary Zone (DMZ). We need the help of a system that can monitor the data packet and record it and provide further information to be analyzed further. System Intrusion Detection System (IDS) can help users monitor and analyze problems in network security. In this case the IDS used a snort for windows software to monitor user activities on the system and out of the corporate network. The expected result is to know how much inconvenience caused to the system through a corporate network traffic data base created using MySQL and what actions should be taken on these disorders will be the future. Testing of IDS performed on a local network of PT. Asuransi Jiwa Inhealth Indonesia for six days. Observations were made to the directory the user can monitor the daily activities in the network and the result will be a reference in determining how much disk capacity is needed for the system is not disturbed or damaged. Observations also held with the activities of suspected hacker activities, such as sending large data packets that can make the system unstable or monitor activity in and out of IP networks that are not known or suspected. The results of this analysis is that with as many as 45 (fourty five) user disk capacity to be provided for one year is 40 GB.    

Journal link : 



Journal PARADIGMA : oleh LPPM AMIK BSI  (ISSN 1410-5963) Vol.XI No. 2, September 2009

Penerapan Bahasa C++

Penerapan Bahasa C++ Dalam  Menggerakan Motor Stepper Pada  Ic Mikrokontroler Atmel 89s51

Abstract : Abstract
The Automatization  of Equipments of electronics which  is  in  this  time happened, expanding  very  fast,  a  lot  of  appliance s which  the manual  in  this  time  change  over  to automatic system. This switchover make many people to create appliance s   of electronic having  the  character  of  automatically  both  for having  the  character  of  commercial  and also just only channel hobby. Appliances of electronics having the character of automatically generally in making constructively a especial IC (integrated circuit), The IC can be in the form of IC PPI 8255 or IC microcontroller. IC Microcontroller  of  plenty  of  enthused  to  be  caused  by  the  IC  can  in  running although  peripheral  do  not  in circuit  with  computer.  In  its  growth  is  IC  Mi crocontroller which  beam  one  of  them  is ATMEL  89x51  plenty  in  making  various  application ,  like movement  led,  fox of  input a censor become voice or displ ay  led as well as making an application which can make a move to use a motor stepper .


Jurnal Tekno :oleh LPPM STMIK Nusa Mandiri  (ISSN 1978-2136) Vol.IV No. 1, Maret 2008