- Decision Support System Applications
- Edcuational Technology Systems
- Computer Science and Engineering
- Multimedia Learning Systems
- Management and Optimization Techniques
- Information Retrieval and Data Mining
- Advanced Steganography and Watermarking Techniques
- Blockchain Technology in Education and Learning
- Chaos-based Image/Signal Encryption
- Data Mining and Machine Learning Applications
- IoT and GPS-based Vehicle Safety Systems
- SMEs Development and Digital Marketing
- Innovative Teaching and Learning Methods
- Technology-Enhanced Education Studies
- Higher Education Learning Practices
- IoT-based Smart Home Systems
- Psychometric Methodologies and Testing
- Optimization and Mathematical Programming
- Technology Adoption and User Behaviour
- Financial Literacy and Behavior
- Mobile Learning in Education
- Online and Blended Learning
- QR Code Applications and Technologies
- Multi-Criteria Decision Making
- Higher Education and Teaching Methods
Yogyakarta State University
2017-2024
Universitas Islam Malang
2023
Universitas 17 Agustus 1945 Surabaya
2023
University of Sarjanawiyata Tamansiswa
2018-2019
Indonesia University of Education
2019
Indonesian Institute of Sciences
2018
Universitas Amikom Yogyakarta
2018
Universitas Widya Dharma Klaten
2018
Universitas Respati Yogyakarta
2018
Malikussaleh University
2018
Present research expresses an experimental investigation on nanoparticle use to enhance Solar still (SS) yield. Manganese Oxide (MNO2) is selected as a material and used in SS. The nanomaterial added with the black chrome paint of SS walls increase weight concentrations (WC) MNO2 have been from 20% 50 see its effect It has observed that heat transfer water temperature enhanced by paint. improved yield also 19.5% compared alone WC 20–50%. MNO2nanoparticle's payback time 82 days at than 98 days.
The development of higher education is very rapid rise to the tight competition both public universities and private colleges. XYZ University realized win competition, required continuous quality improvement, including existing service facilities. Amenities services believed support success learning activities improve user satisfaction. This study aims determine extent which effect on research method used survey-based questionnaire that measure perception expectation. results showed a gap...
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety predefined criteria, one methods used in implementation is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), method this research got results with an efficient and easily understood process computationally, it expected that study parties develop model any solutions.
The steganography process combines mathematics and computer science. Steganography consists of a set methods techniques to embed the data into another media so that contents are unreadable anyone who does not have authority read these data. main objective use base64 method is convert any file in order achieve privacy. This paper discusses encoding using base64, which schemes same binary form series ASCII code. Also, EoF technique used text performed by Base64. As an example, for mechanisms...
In the management of education is not uncommon educational institutions sometimes receive sources funds from outside, one which comes Department Education in implementation its duty to provide allocation called Special Allocation Fund (DAK). This assistance APBN revenues areas devoted schools help fund special activities such as addition or improvement school facilities and infrastructure. The application this grantee needs use a Decision Support System (CMS) allow decisions be generated...
Decision Support System is a system commonly used to assist management in assisting decision-making top managerial sections, Multi-Criteria Making (MCDM) one of many methods that can be select the best alternative from number alternatives based on certain criteria, utilized Elimination Et Choix Traduisant la Realite (ELECTRE) method works concept outranking using pairwise comparisons each appropriate this paper applies ELECTRE web application employed for input and output dynamic...
Decision support systems are part of computer-based information (including knowledge-based systems) that used to decision making within an organization or company. The system provides a semi-structured decision, where no one knows for sure how decisions should be made. Recruitment employee recruitment in PT.Waspada Medan always through some tight selection before set accepted as employees at Medan. There several criteria must owned by each participant requirement become To get the best...
The aim this study is discussed on the detection and correction of data containing additive outlier (AO) model ARIMA (p, d, q). process using an iterative procedure popularized by Box, Jenkins, Reinsel (1994). By method we obtained models were fit to AO, added original coefficients from iteration regression methods. In simulation that contained AO initial are (2,0,0) with MSE = 36,780, after Zt 0,106+0,204Zt−1+0,401Zt−2−329X1(t)+115X2(t)+35,9X3(t) 19,365. This shows there improvement...
Improving the quality of human resources that can be done with intelligent organizing carefully at level Senior High School. In order for participant to follow intelligently, every should not only have achievement and general knowledge but also must experience in following smartly before. this case, both Teachers Principals are constrained selection such discerning participants. For use a computer-based information system reduce constraints participants carefully. Decision support is assist...
Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric algorithm, symmetric stream cipher are that works on XOR between plaintext and key, to improve the security of done improvisation by using Triple Transposition Key which developed from Cipher also use Base64 for ending process, experiment ciphertext produced good enough very random.
Currently, data security is crucial so as not to fall into the hands of irresponsible, steganography and cryptography a technique commonly used secure information from irresponsible parties by using computational algorithms such Pixel Value Differencing Algorithm on process GOST (Government Standard) for cryptographic process, that insertion messages (steganography) in image will be encrypted first newly inserted, this expected increase confidentiality integrity because add changing...
The development of technology is very fast, especially in the field Internet that at any time experiencing significant changes, also supported by ability human resources, Keylogger a tool most developed because this application rarely recognized malicious program antivirus, keylogger will record all activities related to keystrokes, recording process accomplished using string matching method. method keyboard help admin knowing what user accessed on computer.
The integration of artificial intelligence (AI) in education has revolutionized traditional teaching and learning methodologies, offering significant improvements curriculum evaluation development. This study explores the utilization AI development an Outcome-Based Curriculum (OBC). technologies, including machine algorithms natural language processing, are employed to analyze vast amounts educational data, providing insights into student performance effectiveness. research highlights how...
Critical thinking is an important aspect of education. The ability to think critically needed in achieving success for the future. Based on observations, it was found that students' critical skills were still low. If a solution not sought, this will affect quality gradua
Istilah data mining sudah berkembang jauh dalam mengadaptasi setiap bentuk analisa data, penelitian ini berupaya mengembangkan strategi bisnis penyusunan layout produk yang disesuaikan dengan pola pembelian pelanggan di indomaret. Salah satu teknik digunakan untuk merancang efektif memanfaatkan transaksi penjualan telah tersedia perusahaan menggunakan metode association rule. Teknik dapat menemukan berupa produk-produk sering dibeli secara bersamaan. Penelitian bertujan menerapkan...
Measurement of the efficiency university performance. Data Envelopment Analysis (DEA) is a data-based performance evaluation method used when multiple inputs and outputs are represented in Decision-Making Unit (DMU) set. In DEA, there value Non-Zero Input Output Slacks then this often means inefficiency. This scalar measure directly with input surplus output short decision decision-making unit (DMU). DEA Structure usually apply general settings, actually DMUs can fall into distinct groups...
Searching is a common process performed by many computer users, Raita algorithm one that can be used to match and find information in accordance with the patterns entered. applied file search application using java programming language results obtained from testing of quickly accurate support data types.
Kebutuhaninformasi menjadi suatu elemen penting dalam pengambilan keputusan. Perkembangan teknologi tersebut masyarakat harus dapat menyajikan informasi yang dibutuhkan cepat dan tepat. Masalah terjadi kebutuhan tadi kadang tidak sesuai dengan diharapkan. Perpustakaan sebagai wadah untuk menimba ilmu bagi semua kalangan baik muda atau tua. sarana sumber pengetahuan menyimpan bahan pustaka dipakai oleh pemakai menggali informasi. Tujuan utama dari penelitian ini adalah penggunaan metode data...
Supplier segmentation is a strategic activity for businesses. It involves dividing suppliers into distinct categories and managing them differently. Various supplier typologies based on different dimensions factors are available in the existing literature. By highlighting two main characteristics skills desire of to work with specific company this article integrates many typologies. Almost all criteria stated literature covered by these dimensions. These can be defined utilizing...
Security in a transaction activity is crucial, digital communication that irresponsible parties can tap all objects sent the form of bits, use cryptographic algorithms such as Base64 and Word Auto Key Encryption be solution produces secure ciphertext, base64 algorithm which encode text, image, audio files into text result re-secured with algorithm, results this research get better security by combining two algorithms.
Advances in science and technology, especially Information Communication Technology (ICT) more positive impact for the advancement of education today.Various advantages e-learning to encourage use has become a necessity these days is no longer or compulsion.Utilization learning process was already inevitable.This study aims find picture successful implementation based on user acceptance within University XYZ.. User can predict level utilization technology future.The method used
This paper aims to facilitate the owner control water pump machine from vacuum, and condition of is it full or not in house apartment. The current system still has many limitations controlling at home was designed with device that a smart surveillance can be accessed Android smartphone all information will command by using SMS, this create development Arduino UNO microcontroller technology allows reading GSM Module connected SMS Gateway. Experiment results real-time much easy for tank.
Movement of paperless campus becomes a trend toward environmental sustainability, flexible learning, and 4Cs oriented (Creativity, Critical Thinking, Collaboration, Communication). The use Quick Response (QR) Code-oriented pocketbook is an alternative to building collaborative student