Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 761–770 dari 4857 artikel
Manajemen risiko teknologi informasi pada PT. XYZ menggunakan framework COBIT 5
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
PT. XYZ applies Information Technology in business processes to achieve company goals. achieve company goals. However the use of Technology brings risks that can reduce business effectiveness and efficiency of the business. PT. XYZ faced several problems in its IT department, including network connectivity issues, human error, hardware failure, ERP system integration failure, data security, and human error, hardware failure, ERP system integration failure, data security, data backup failures, s...
Sumber Asli
Google Scholar
DOI
Perancangan sistem informasi manajemen gudang berbasis web pada Cozy Mart
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
PT. Surya Cahaya Kembar or known as Cozy Mart aims to improve the delivery process and inventory management by using a web-based warehouse management information system. Companies have difficulty monitoring stock and distribution accurately as their business grows rapidly. The system analysis and software development method used in this research is Agile, which allows quick adjustments to user needs. The system is designed to include delivery tracking, stock management features and reports to as...
Sumber Asli
Google Scholar
DOI
Analisis sentimen terhadap dampak banjir rob dengan menggunakan metode Support Vector Machine
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
Tidal flooding is an event of a natural phenomenon when sea water rises to land due to the influence of changes in sea tides, which causes waterlogging around the coastal area. This tidal flood hit the Demak-Semarang area, especially in the Sayung District area, which hampers and impacts community life. The purpose of this analysis is to analyze public sentiment regarding the impact of tidal flooding in Demak Regency using data obtained from social media, and the results of the analysis can be u...
Sumber Asli
Google Scholar
DOI
Analisis Kinerja Simpang Tidak Bersinyal Kota Bima Studi Kasus Jalan Walter Monginsidi – Jalan Anggrek Menggunakan Metode MKJI 1997
Jurnal Teknik Sipil
Vol 18
, No 1
(2025)
Unsignalized intersections are a major point of concern due to the increasing number of vehicles. Bima City is a city located on the eastern part of Sumbawa Island, West Nusa Tenggara Province. As a developing city, congestion and busy traffic often occur on roads or intersections of Mongosidi and Anggrek roads. Therefore, this study was conducted to determine the performance and level of service of unsignalized intersections at Mongosidi Street and Anggrek Street. The method used refers to the...
Sumber Asli
Google Scholar
DOI
Implementasi Konsep Hak Khiyar Dalam Transaksi Jual Beli Modern
Jurnal Ekonomi, Bisnis dan Manajemen (EBISMEN)
Vol 4
, No 2
(2025)
Penelitian ini membahas Implementasi Konsep Hak Khiyar dalam transaksi jual beli modern, dengan fokus pada transaksi istishna, Cash on Delivery (COD), dan sistem jual beli online melalui e-commerce. Metode penelitian yang digunakan adalah kualitatif dengan pendekatan deskriptif. Hasil penelitian menunjukkan bahwa penerapan Hak Khiyar dilakukan dengan cermat dan sesuai dengan prinsip-prinsip syariah Islam. Konsumen merespons positif terhadap Implementasi Hak Khiyar karena memberikan rasa kepercay...
Sumber Asli
Google Scholar
DOI
Training on the Use of Educational Tools with Picture Cards (Flash Cards) in Mathematics Learning for Madrasah Ibtidaiyah Students
Rahim, Rani
; Nasution, Asrindah
; Siregar, Rizka Fahruza
; Ramadhani, Rini
; Riani, Nova
; Marito, Winanda
Educate: Journal of Community Service in Education
Vol 5
, No 1
(2025)
Educational tools are very important to be implemented in the learning process. This is because educational tools can increase students' learning motivation so that learning is more meaningful, innovative and creative. However, the reality in the field is that when the learning process is in the classroom, teachers do not use learning media such as educational tools. This results in low student interest in learning mathematics, which also makes students' mathematical abilities low. Therefore, th...
Sumber Asli
Google Scholar
DOI
Teknik dan aplikasi data mining di Indonesia: tinjauan literatur satu dekade (2015-2024)
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
The importance of data mining in Indonesia is increasing along with the growth of big data in various strategic sectors. Data mining plays an important role in transforming complex data into useful information to support data-driven decision making, which is urgently needed in the face of competitive challenges and operational complexity. This research aims to examine the development of data mining techniques and applications in Indonesia over the last decade (2015-2024). Through a systematic li...
Sumber Asli
Google Scholar
DOI
Analisis forensik jaringan serangan ARP Spoofing menggunakan metode National Institute of Justice (NIJ)
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
This study aims to identify evidence of Address Resolution Protocol (ARP) Spoofing attacks in the form of the attacker's and victim's Media Access Control (MAC) addresses, as well as the time of the attack. With the increasing use of computer networks, ARP Spoofing attacks have become a serious threat that can lead to data theft, communication interception, and service disruption. ARP Spoofing can serve as a means to launch more complex attacks, such as Denial of Service (DoS) and Man in the Mid...
Sumber Asli
Google Scholar
DOI
Analisis persebaran dan visualisasi penyakit Infeksi Saluran Pernapasan Akut (ISPA) dengan metode K-Means clustering pada Provinsi Jawa Tengah
IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi
Vol 4
, No 2
(2025)
Acute Respiratory Infection (ARI) is an infectious disease that often affects the upper and lower respiratory tract. This disease is one of the main causes of death in children under five, especially in areas with less favourable environmental conditions. This study aims to map the distribution of ARI in Central Java Province using the K-Means clustering method. Through data analysis that includes inputting, transforming, processing, and visualisation, this study successfully identified three cl...
Sumber Asli
Google Scholar
DOI
An Asynchronous Learning to Improve Vocabulary Building by Using YouTube Channel
Scripta : English Department Journal
Vol 12
, No 1
(2025)
This study investigates the impact of YouTube usage on enhancing the vocabulary of eleventh-grade students at Vocational PN 2 Purworejo. This methodology employs a mixed approach, incorporating qualitative data from initial and final interviews and quantitative data derived from student test scores that explicitly address specific questions. This study demonstrates a substantial enhancement after viewing the Vocab App-Learn English Words channel. This study examines the utilization of YouTube by...
Sumber Asli
Google Scholar
DOI