Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 611–620 dari 3953 artikel
Manajemen risiko teknologi informasi pada PT. XYZ menggunakan framework COBIT 5
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
PT. XYZ applies Information Technology in business processes to achieve company goals. achieve company goals. However the use of Technology brings risks that can reduce business effectiveness and efficiency of the business. PT. XYZ faced several problems in its IT department, including network connectivity issues, human error, hardware failure, ERP system integration failure, data security, and human error, hardware failure, ERP system integration failure, data security, data backup failures, s...
Sumber Asli
Google Scholar
DOI
Perancangan sistem informasi manajemen gudang berbasis web pada Cozy Mart
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
PT. Surya Cahaya Kembar or known as Cozy Mart aims to improve the delivery process and inventory management by using a web-based warehouse management information system. Companies have difficulty monitoring stock and distribution accurately as their business grows rapidly. The system analysis and software development method used in this research is Agile, which allows quick adjustments to user needs. The system is designed to include delivery tracking, stock management features and reports to as...
Sumber Asli
Google Scholar
DOI
Simulasi traffic dan performa jaringan SDN menggunakan ONOS Controller dan standar TIPHON
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
The increasing number of devices connected to the network and the rapid growth of data traffic have posed challenges in managing conventional networks. Traditional networks often experience inefficiencies in handling high traffic loads due to static traffic management, leading to congestion in some network paths while others remain underutilized. Software-Defined Networking (SDN) has emerged as an innovative solution by separating the control plane and data plane, enabling more flexible, central...
Sumber Asli
Google Scholar
DOI
Pemanfaatan chatbot untuk informasi pendaftaran calon mahasiswa baru di perguruan tinggi
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
A good administrative system in admitting new students not only makes things easier for prospective students, but also increases the efficiency and effectiveness of the registration process. With a structured system, prospective students can register directly at the counter or via an online platform, which makes access easier and reduces waiting time1. This is in line with the need for institutions to adapt to the digital era and improve services to prospective students. However, this often happ...
Sumber Asli
Google Scholar
DOI
Analisis sentimen terhadap dampak banjir rob dengan menggunakan metode Support Vector Machine
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
Tidal flooding is an event of a natural phenomenon when sea water rises to land due to the influence of changes in sea tides, which causes waterlogging around the coastal area. This tidal flood hit the Demak-Semarang area, especially in the Sayung District area, which hampers and impacts community life. The purpose of this analysis is to analyze public sentiment regarding the impact of tidal flooding in Demak Regency using data obtained from social media, and the results of the analysis can be u...
Sumber Asli
Google Scholar
DOI
Analisis tingkat kepuasan pengguna Tiktok Shop berdasarkan UI/UX menggunakan metode Naïve Bayes
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
Technological advances that continue to develop have changed the way people carry out various activities, including online buying and selling transactions. Various e-commerce platforms are here to meet the Indonesian market, including Tiktok which in the form of a social tool that people like. The lesson wants to observe the satisfaction of Tiktok Shop users from UI/UX through the Naïve Bayes algorithm. This lesson uses the CRISP-DM method. There are stages of reviewing reports, efforts, models,...
Sumber Asli
Google Scholar
DOI
Teknik dan aplikasi data mining di Indonesia: tinjauan literatur satu dekade (2015-2024)
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
The importance of data mining in Indonesia is increasing along with the growth of big data in various strategic sectors. Data mining plays an important role in transforming complex data into useful information to support data-driven decision making, which is urgently needed in the face of competitive challenges and operational complexity. This research aims to examine the development of data mining techniques and applications in Indonesia over the last decade (2015-2024). Through a systematic li...
Sumber Asli
Google Scholar
DOI
Pengelompokan wilayah produksi tuna, cakalang, tongkol dan udang di Indonesia menggunakan algoritma K-Means
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
The research was intended to cluster the production areas of Indonesia's fishery products especially Skipjack Tuna, Tuna, Mackarel Tuna, and shrimp using data science techniques. The algorithm used was K-means Clustering. The data used was annual production data for each province for the last 3 years (2019 – 2021). Determination of the number of clusters using the Elbow Method. For each commodity, three clusters were obtained, namely clusters with low production, medium production, and high prod...
Sumber Asli
Google Scholar
DOI
Analisis forensik jaringan serangan ARP Spoofing menggunakan metode National Institute of Justice (NIJ)
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
This study aims to identify evidence of Address Resolution Protocol (ARP) Spoofing attacks in the form of the attacker's and victim's Media Access Control (MAC) addresses, as well as the time of the attack. With the increasing use of computer networks, ARP Spoofing attacks have become a serious threat that can lead to data theft, communication interception, and service disruption. ARP Spoofing can serve as a means to launch more complex attacks, such as Denial of Service (DoS) and Man in the Mid...
Sumber Asli
Google Scholar
DOI
Analisis persebaran dan visualisasi penyakit Infeksi Saluran Pernapasan Akut (ISPA) dengan metode K-Means clustering pada Provinsi Jawa Tengah
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
Acute Respiratory Infection (ARI) is an infectious disease that often affects the upper and lower respiratory tract. This disease is one of the main causes of death in children under five, especially in areas with less favourable environmental conditions. This study aims to map the distribution of ARI in Central Java Province using the K-Means clustering method. Through data analysis that includes inputting, transforming, processing, and visualisation, this study successfully identified three cl...
Sumber Asli
Google Scholar
DOI