Pilar Nusa Mandiri: Journal of Computing and Information System https://ejournal.nusamandiri.ac.id/index.php/pilar <p>The Pilar Nusa Mandiri: Journal of Computing and Information System Journal is a formation of the Information Systems study program, which was originally a medium for accommodating scientific writings of Universitas Nusa Mandiri Jakarta Information Systems lecturers. Along with the times, this journal has become a National journal that has P-ISSN: 1978-1946 and E-ISSN: 2527-6514. Pilar Nusa Mandiri: Journal of Computing and Information System has become a <strong>Rank 3 Accredited Journal&nbsp;</strong>and is trying to become a higher accredited journal. Pilar Nusa Mandiri: Journal of Computing and Information System is published 2 times in 1 year, namely in March and September. This journal is&nbsp;<span class="tlid-translation translation"><span title="">Rank 3 <strong>Accreditation Certificate (S3)</strong>, Accreditation is valid for 5 years. Starting from Vol. 12, No. 1 the Year 2016 to Vol. 16, No. 2 the Year 2020.&nbsp;Journal of PILAR Nusa Mandiri, re-accreditation remains at Rank 3 (SINTA 3), starting Vol. 15 No. 2 of 2019 based on the Decree of the Minister of Research and Technology / National Research and Innovation Agency <strong>Number 85 / M / KPT / 2020, April 1, 2020</strong>.</span></span></p> LPPM Universitas Nusa Mandiri en-US Pilar Nusa Mandiri: Journal of Computing and Information System 1978-1946 <div class="page"> <p>The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to the PILAR Nusa Mandiri journal as the publisher of the journal, and the author also holds the copyright without restriction.</p> <p>Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases, and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , are allowed with written permission from the PILAR Nusa Mandiri journal.</p> <p>PILAR Nusa Mandiri journal, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions, or statements be published in the journal. In any way, the contents of the articles and advertisements published in the PILAR Nusa Mandiri journal are the sole and exclusive responsibility of their respective authors and advertisers.</p> </div> INFORMATION SECURITY POLICY AND SOP AS THE ACCESS CONTROL DOCUMENT OF PT. JUI SHIN INDONESIA USING ISO/IEC 27002:2013 https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2282 <p>PT. Jui Shin Indonesia as the research population is a company engaged in the ceramics, granite, and cement industry. The existence of important assets owned by the company can not be denied the threat that will occur in these important assets. The importance of a company's assets, then the company must maintain the security of assets with various efforts. The security that must be maintained in this study is the security of information related to accessing control of important assets of the company. The purpose of this research is to analyze and design policy documents and SOP (Standard Operating Procedure) access control related to information security. This is done to minimize the risk that occurs in important assets of the company. The method used in this study is the OCTAVE method as a method of identification against risks that will occur in important assets of the company and the FMEA method as a method of risk analysis against the risk that has been identified through the OCTAVE method. The final result of this study is the creation of policy documents and access control SOPs related to information security which refers to the ISO/IEC 27002:2013 framework that focuses on clause 9. Access Control. Based on the results of the study, the researchers received proposals for policy document-making and SOPs as much as, namely, 17 for policy document-making and 18 for the creation of SOP documents.</p> Muhammad Sukmaji Rahmat Yasirandi Muhammad Al Makky ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-06 2021-09-06 17 2 115 112 10.33480/pilar.v17i2.2282 The CLUSTER ANALYSIS OF SALES TRANSACTION DATA USING K-MEANS CLUSTERING AT TOKO USAHA MANDIRI https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2273 <p>Data mining is a process to obtain useful information from a database warehouse in the form of knowledge. Data transaction history of sales can be information for a business decision. Toko Usaha Mandiri has a problem with the stock of goods, and there are passive goods that settle in the warehouse for a relatively long period. Previous research conducted data analysis to form data clustering into useful information. This study aims to analyze sales data by applying the K-Means Clustering algorithm to form sales clusters. The results of data clustering form cluster1, cluster2 and cluster3 with percentage values of 62% (11 data), 8% (56 data) and 30% (25 data), respectively. Cluster validation of K-Means Clustering algorithm with Davies Bouldin Index produces a value of 0.2. The information of sales clustering can be an alternative solution, input for stock management and marketing strategies.</p> Fauzia Allamatul Fithri Sukma Wardhana ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 113 118 10.33480/pilar.v17i2.2273 THE COMBINATION OF AHP AND TOPSIS METHODS IN DETERMINING THE RANKING OF RECOMMENDATIONS FOR IMPROVEMENT OF INFORMATION TECHNOLOGY SERVICES https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2319 <p>In order to improve the quality of information technology unit, XYZ University has to measure and improve the services based on a best practice framework. ITIL 3<sup>rd</sup> version was chosen to determine the service level of this unit. ITIL V3 was focused on two domains, specifically Service Operations to measure the service improvements problems and Continual Service Improvement to establish improvement continously. The measurement showed that the maturity level of IT services in the information technology unit on the Service Operation domain was at level 3 and Continual Service Improvement was at level 2, and each gap value was 1.5 and 1, respectively. The level calculation resulted in 14 recommendations that must be applied by information technology unit of XYZ University. The recommendations were applied by implementing a decision making system use the combination of AHP and TOPSIS method. AHP was needed to decide the weights of the predetermined criteria, while TOPSIS was used in calculation to rank the available alternatives. The top to bottom ranking of the 14 recommendations was Service Operation Processes, CSI Methods and Techniques, Implementing CSI, Organizing for CSI, Service Management as a Practice, Service Operation Technology Consideration, CSI Technology Considerations, CSI Processes, Common Service Operation Activities, Organizing Service Operations, CSI service Management as a Practice, CSI Principles, Service Operation Principles, and Implementing Service Operations.</p> Laqma Dica Fitrani ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 119 126 10.33480/pilar.v17i2.2319 PROTOTYPING MODEL IN INFORMATION SYSTEM DEVELOPMENT OF AL-RUHAMAA' BOGOR YATIM CENTER FOUNDATION https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2375 <p>The information system for providing donations at the Al-Ruhamaa' Bogor Yatim Center Foundation is still not computerized, through donors coming to the location directly or through bank services, then confirmed via social media such as WhatsApp, and receiving proof of donation in the form of a receipt. The management of the Al-Ruhamaa' Bogor Yatim Center Foundation stills using Microsoft Excel to prepare donation reports. Based on the existing problems, it is necessary to develop an information system for distributing donations that can facilitate the management and the donors of the Al-Ruhamaa' Bogor Yatim Center Foundation. The system will be developed using one of the techniques commonly used in software development is called the prototyping model. the prototyping model is a technique to collect certain information about the user's information needs quickly which focuses on aspects of the software to be presented that will be visible to the customer or user. After the system is implemented, it is found that by using this Information System, the donation transaction process becomes more efficient. Calculation of the number of donations collected can be done automatically and accurately. In terms of reporting, the system can be present donation reports automatically and is ready to print whenever needed. Data storage for documentation of activities carried out by the foundation also saves space because the information can be accessed anytime and anywhere.</p> Dewi Ayu Nur Wulandari Asyil Alfin Halani Bahar Muhammad Ghifari Arfananda Helina Apriyani ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 127 136 10.33480/pilar.v17i2.2375 IMPLEMENTATION OF C4.5 ALGORITHM IN CLASSIFYING BREAST CANCER BASED ON MENOPAUSE AGE https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2315 <p>Breast cancer is a malignant tumor that can attack breast tissue, is a disease that is most feared by women. Although based on recent findings not only women are affected by breast cancer, it turns out that men can get breast cancer, although it is still very rare. Breast cancer is one type of cancer that is often experienced by women in Indonesia. Data mining is a process that uses statistical, mathematical, artificial intelligence and machine learning techniques to interact and identify useful information and related knowledge from large databases. Breast cancer is much feared by women as well as young and old age which can lead to death, if as early as possible for a full examination, this lump initially shrinks, but over time it enlarges, then sticks to the skin or causes changes in the skin of the breast (nipple). But the skin or nipple is pulled inward (retraction), light redness, or browning, until swelling, shrinking or sore breasts get worse the old ones will get bigger and deeper so that they can crush the one breast often smells bad and bleeds easily . C4.5 algorithm and decision tree are two inseparable models, because to build a decision tree, C4.5 algorithm is needed. Decision trees are one of the most popular classification methods because they are easy for humans to interpret. A decision tree is a predictive model using a tree structure or hierarchical structure. The concept of a decision tree is to convert data into a decision tree and decision rules.</p> Wulan Dari Nisrina Miranda ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 137 142 10.33480/pilar.v17i2.2315 PREDICTION OF PUBLIC SERVICE SATISFACTION USING C4.5 AND NAÏVE BAYES ALGORITHM https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2403 <p>One of the things that has often been questioned lately is in the field of public services, especially in terms of the quality or service quality of government agencies to the community, the Manpower and Transmigration Office of Kab. Karawang is a government agency in charge of public services. where one of the tasks is to make an AK.1 card (yellow card), based on this problem the Manpower and Transmigration Office of Kab. Karawang Regency. Karawang seeks to improve service quality in order to satisfy consumers by distributing questionnaires to every consumer who is making an AK card.1. In this study, we will apply the C4.5 and Naïve Bayes algorithms to predict the satisfaction of public services with the nominal type of dataset used. The evaluation is done based on a comparison of the level of accuracy, precision, recall, and F-Measure using a confusion matrix. From the research that has been carried out, the Naïve Bayes algorithm with 70% training data distribution and 30% testing is able to provide better predictive results than the C4.5 algorithm as evidenced by the accuracy value = 96.89%, precision = 95.50%, recall = 95.00% and f-measure = 94.60%.</p> Yuyun Umaidah Ultach Enri ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 143 148 10.33480/pilar.v17i2.2403 CLASSIFICATION OF LOMBOK SONGKET CLOTH IMAGE USING CONVOLUTION NEURAL NETWORK METHOD (CNN) https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2705 <p>The diversity of tribes makes Indonesia rich in culture that characterizes it, one of which is traditional cloth. Through a variety of patterns and motifs that exist in traditional fabrics, reflecting the life, customs, and culture that exist in an area. Lombok is one of the areas that produces a typical songket cloth. The famous songket craft centers in Lombok are located in the Pringgasela area, Pringgasela District, Sade Village is in Pujut District, Central Lombok Regency and Sukarara is in Jonggat District, Central Lombok Regency. Each area of ​​the center for songket craftsmen has their own characteristics both in terms of the name, motif and texture. When viewed with the naked eye, the texture of each songket will look the same, to be able to know the differences in the texture of each songket, it is necessary to do a classification using computers or technology. Today's society still does not know much information about the textures of songket cloth. The method used to classify the typical Lombok songket in this study uses the Convolution Neural Network (CNN) method. The results obtained from the use of 64 datasets, with details of 40 types of Sade songket and 24 types of Pringgasela songket, after the dataset is trained it produces 86.36% accuracy, 87% precision, 86% recall, and 86% F1-Score.</p> <p>&nbsp;</p> <p><strong>Keywords:</strong> Histogram Equalization, Convolution Neural Network, Songket Cloth.</p> Hambali Hambali Mahayadi Mahayadi Bahtiar Imran ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 149 156 10.33480/pilar.v17i2.2705 ONLINE THESIS GUIDANCE INFORMATION SYSTEM (SI-BISA) TO IMPROVE THE EFFECTIVENESS OF THESIS GUIDANCE ACTIVITIES AT THE UNIVERSITY OF TECHNOLOGY MATARAM https://ejournal.nusamandiri.ac.id/index.php/pilar/article/view/2656 <p>The Covid-19 pandemic has hit the whole world since the beginning of 2020, making many activities unable to run as usual. Likewise, the thesis mentoring process, which is usually carried out face-to-face with the supervisor by the agreed schedule, is no longer possible due to an appeal from the government to work and study from home so that the mentoring process becomes constrained. Instead, the mentoring process through e-mail or WhatsApp application, where the supervisor will correct the thesis, provide notes for improvement, and send it back to students. E-mail and WhatsApp as media in the mentoring process is used. However, it will make it difficult for lecturers to find out recordings of the student. Besides, it is still possible for thesis files to be scattered or lost because there is only one student. The research aims to produce an online thesis guidance application called SI-BISA. The research was conducted using the Waterfall Model, resulting in the SI-BISA application in the PHP Programming Language with the CodeIgniter 4 Framework. The system design used the Unified Modeling Language and system testing using the Black Box Method. Given the long-lasting Covid-19 pandemic, an online thesis guidance application is very urgent. So that the thesis mentoring process can continue to run effectively even without face-to-face and the need to build an integrated information system to make it easier for supervisors to monitor the progress of their guidance students and improve the effectiveness and service of thesis guidance provided to students.</p> Juhartini Juhartini Dwinita Arwidiyarti Hambali Hambali ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2021-09-08 2021-09-08 17 2 157 164 10.33480/pilar.v17i2.2656