RANCANG BANGUN TEKNOLOGI CLOUD COMPUTING VIRTUALISASI PROSES BELAJAR MENGAJAR
Abstract
There is a lot of business competition in this case credit sales, where credit sales are made using the gradual payment method with requirements that must be agreed upon by the credit provider and credit recipient. In this XYZ company there are problems that often occur including when officers select and determine credit recipients (debtors) in accordance with the requirements given by the company, this company also still uses traditional methods in promotion and there is no decision-making system to be able to assist in determining the prospective debtor In addition, creditors (creditors) find it difficult to receive debtor data reports. In determining the debtor to get credit sales, in this study we will use the SPK K-Nearest Neighbor method where this method is to calculate the closeness between old cases and new cases in order to facilitate officers in determining prospective borrowers with a decision support system using the K-Nearest method Neighbor. In addition to facilitating and helping creditors to be able to find out the debtor data report in more detail and to increase sales. The results of this study, get results from calculating the closeness between new cases with old cases using the K-Nearest Neighbor method. And from some calculations with that method, the greatest value will be used to predict the next cases.
References
Chee, Brian J.S. & Curtis Franklin, Jr. 2010. Cloud Computing – Technologies and Strategies of the Ubiquitous Data Center. New York: CRC Press.
Goyal, Amit, Sara Dadizadeh. 2009. A Survey on Cloud Computing. Journal of Computer Science. University of British Columbia, p.1-14.
Krautheim, F. John. 2009. Private Virtual Infrastructure for Cloud Computing. Journal of Univ. of Maryland, p.1-5.
Mather, Tim, Subra Kumaraswamy, Shahed Latif. 2009. Cloud Security and Privacy – An Enterprise Perspective on Risks and Compliance. USA: O’Reilly Media, Inc.
Morsy, Mohamed Al, John Grundy, Ingo Muller. 2010. An Analysis of Cloud Computing Security Problem. Proceeding of APSEC 2010 Cloud Workshop, Australia, p.1-6.
Pierce, Marlon E., Geoffrey C. Fox, Yu Ma, Jun Wang. 2009. Cloud Computing and Spatial Cyberinfrastructure. Journal of Computer Science of Indiana University, p. 1-21.
Rittinghouse, John W., James F. Ransome. 2010. Cloud Computing – Implementation, Management, and Security. USA: CRC Press.
Velte, Anthony T., Toby J. Velte, Robert Elsenpeter. Cloud Computing – A Practical Approach. USA: Mc Graw Hill.
In order to be accepted and published by Journal Agribest, author(s) submitting the article manuscript should complete all the review stages. By submitting the manuscript the author(s) agreed to these following terms:
- The copyright of received articles shall be assigned to Journal Agribest as the publisher of the journal. The intended copyright includes the right to publish articles in various forms (including reprints). Journal Agribest maintain the publishing rights to the published articles.
- Authors are permitted to disseminate published article by sharing the link/DOI of the article at Journal Agribest. authors are allowed to use their articles for any legal purposes deemed necessary without written permission from Journal Agribest with an acknowledgement of initial publication to this journal.
- Users/public use of this website will be licensed to Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.