RANCANG BANGUN TEKNOLOGI CLOUD COMPUTING VIRTUALISASI PROSES BELAJAR MENGAJAR

Authors

  • Ahmad fatoni Universitas Banten Jaya
  • Rizki Fatullah Universitas Banten Jaya

DOI:

https://doi.org/10.47080/saintek.v4i1.829

Keywords:

RPL, SPK, K-Nearest Neighbor, debtor, creditor

Abstract

There is a lot of business competition in this case credit sales, where credit sales are made using the gradual payment method with requirements that must be agreed upon by the credit provider and credit recipient. In this XYZ company there are problems that often occur including when officers select and determine credit recipients (debtors) in accordance with the requirements given by the company, this company also still uses traditional methods in promotion and there is no decision-making system to be able to assist in determining the prospective debtor In addition, creditors (creditors) find it difficult to receive debtor data reports. In determining the debtor to get credit sales, in this study we will use the SPK K-Nearest Neighbor method where this method is to calculate the closeness between old cases and new cases in order to facilitate officers in determining prospective borrowers with a decision support system using the K-Nearest method Neighbor. In addition to facilitating and helping creditors to be able to find out the debtor data report in more detail and to increase sales. The results of this study, get results from calculating the closeness between new cases with old cases using the K-Nearest Neighbor method. And from some calculations with that method, the greatest value will be used to predict the next cases.

Downloads

Download data is not yet available.

References

Antonopoulous, Nick & Lee Gillam. 2010. Cloud Computing – Principles, Systems and Applications. United Kingdom: Springer.
Chee, Brian J.S. & Curtis Franklin, Jr. 2010. Cloud Computing – Technologies and Strategies of the Ubiquitous Data Center. New York: CRC Press.
Goyal, Amit, Sara Dadizadeh. 2009. A Survey on Cloud Computing. Journal of Computer Science. University of British Columbia, p.1-14.
Krautheim, F. John. 2009. Private Virtual Infrastructure for Cloud Computing. Journal of Univ. of Maryland, p.1-5.
Mather, Tim, Subra Kumaraswamy, Shahed Latif. 2009. Cloud Security and Privacy – An Enterprise Perspective on Risks and Compliance. USA: O’Reilly Media, Inc.
Morsy, Mohamed Al, John Grundy, Ingo Muller. 2010. An Analysis of Cloud Computing Security Problem. Proceeding of APSEC 2010 Cloud Workshop, Australia, p.1-6.
Pierce, Marlon E., Geoffrey C. Fox, Yu Ma, Jun Wang. 2009. Cloud Computing and Spatial Cyberinfrastructure. Journal of Computer Science of Indiana University, p. 1-21.
Rittinghouse, John W., James F. Ransome. 2010. Cloud Computing – Implementation, Management, and Security. USA: CRC Press.
Velte, Anthony T., Toby J. Velte, Robert Elsenpeter. Cloud Computing – A Practical Approach. USA: Mc Graw Hill.

Downloads

Published

2020-02-27

How to Cite

RANCANG BANGUN TEKNOLOGI CLOUD COMPUTING VIRTUALISASI PROSES BELAJAR MENGAJAR. (2020). Jurnal Ilmiah Sains Dan Teknologi, 4(1), 76-86. https://doi.org/10.47080/saintek.v4i1.829

Most read articles by the same author(s)

1 2 > >>