RANCANG BANGUN TEKNOLOGI CLOUD COMPUTING VIRTUALISASI PROSES BELAJAR MENGAJAR

  • Ahmad fatoni Universitas Banten Jaya
  • Rizki Fatullah Universitas Banten Jaya
Keywords: RPL, SPK, K-Nearest Neighbor, debtor, creditor

Abstract

There is a lot of business competition in this case credit sales, where credit sales are made using the gradual payment method with requirements that must be agreed upon by the credit provider and credit recipient. In this XYZ company there are problems that often occur including when officers select and determine credit recipients (debtors) in accordance with the requirements given by the company, this company also still uses traditional methods in promotion and there is no decision-making system to be able to assist in determining the prospective debtor In addition, creditors (creditors) find it difficult to receive debtor data reports. In determining the debtor to get credit sales, in this study we will use the SPK K-Nearest Neighbor method where this method is to calculate the closeness between old cases and new cases in order to facilitate officers in determining prospective borrowers with a decision support system using the K-Nearest method Neighbor. In addition to facilitating and helping creditors to be able to find out the debtor data report in more detail and to increase sales. The results of this study, get results from calculating the closeness between new cases with old cases using the K-Nearest Neighbor method. And from some calculations with that method, the greatest value will be used to predict the next cases.

References

Antonopoulous, Nick & Lee Gillam. 2010. Cloud Computing – Principles, Systems and Applications. United Kingdom: Springer.
Chee, Brian J.S. & Curtis Franklin, Jr. 2010. Cloud Computing – Technologies and Strategies of the Ubiquitous Data Center. New York: CRC Press.
Goyal, Amit, Sara Dadizadeh. 2009. A Survey on Cloud Computing. Journal of Computer Science. University of British Columbia, p.1-14.
Krautheim, F. John. 2009. Private Virtual Infrastructure for Cloud Computing. Journal of Univ. of Maryland, p.1-5.
Mather, Tim, Subra Kumaraswamy, Shahed Latif. 2009. Cloud Security and Privacy – An Enterprise Perspective on Risks and Compliance. USA: O’Reilly Media, Inc.
Morsy, Mohamed Al, John Grundy, Ingo Muller. 2010. An Analysis of Cloud Computing Security Problem. Proceeding of APSEC 2010 Cloud Workshop, Australia, p.1-6.
Pierce, Marlon E., Geoffrey C. Fox, Yu Ma, Jun Wang. 2009. Cloud Computing and Spatial Cyberinfrastructure. Journal of Computer Science of Indiana University, p. 1-21.
Rittinghouse, John W., James F. Ransome. 2010. Cloud Computing – Implementation, Management, and Security. USA: CRC Press.
Velte, Anthony T., Toby J. Velte, Robert Elsenpeter. Cloud Computing – A Practical Approach. USA: Mc Graw Hill.
Published
2020-02-27
How to Cite
fatoni, A., & Fatullah, R. (2020). RANCANG BANGUN TEKNOLOGI CLOUD COMPUTING VIRTUALISASI PROSES BELAJAR MENGAJAR. Jurnal Ilmiah Sains Dan Teknologi, 4(1), 76-86. https://doi.org/10.47080/saintek.v4i1.829

Most read articles by the same author(s)

<< < 1 2 3 > >>