1. Generating strategic IS: Towards the winning strategy - Semantik Suksesi Sistem Informasi Berdasarkan Populasi Teks

  

LAMPIRAN 1

DAFTAR PUBLIKASI

  

ILMIAH PENULIS (TESIS)

No. Judul Artikel Penulis Publikasi Tahun Tempat

(Seminar – Jurnal)

  1. Generating Maria Elfida, Cornell University 2012 USA strategic IS: dan Library (CUL) – Towards the Mahyuddin K. (Jurnal) winning strategy M. Nasution Diindeks oleh arXiv:1212.1882 dan DBLP

  

3. Pemodelan Maria Elfida, Prosiding Seminar 2013 Medan

sistem pakar dan Nasional Teknologi untuk Mahyuddin K. Informasi & mendeteksi M. Nasution Komunikasi kerusakan pada (SNASTIKOM), komputer Vol. 1: 3-15-3-18. dengan metode

ISBN 978-602-

  forward 19837-2-0 chaining

  3. Terrorist Mahyuddin K. Cornell University 2013 USA network: M. Nasution Library (CUL) Towards an dan Maria (Jurnal) analysis Elfida Diindeks oleh arXiv:1302.1727 dan DBLP

  57  

  58  

  

44834661.2607

41449707.3621

212175028.2310

12071023.6378

  Х

  69697087.1092 6189274.7940 18183322.4869 211948.4097 31733321.4570 1976192.8567 578995.276365 25290585.6981

  19346522.8696 4467929.1204 2060141.9498 3115.5445 2720079.8612 15694985.6662

  136463152.3500 20215866.6333 318476.6032 77005441.5559

  12308.6481 2642536.2146 15941731.0765 36789773.7320 41800093.1413 5490525.7300

  

35963168.2573

49316235.2867

2658693.2384 40382.1893 6419470.3978 278010.0899

  

776198221.4980

44159329.9523

195831329.6560

571396579.9420

  

147939882.9450

9311198.3674

12768431.4742

151635135.4080

  

39259745.2804

200964930.5950

11433260.7744

50702550.5634

  

53530807.9141

156192171.1780

9830589.6985

13480671.9784

  

40146385.6355

178035311.8660

519471365.9350

32695043.6768

  

LAMPIRAN 2

TABEL-TABEL KONTINGENSI

Tabel B2.1. Hitungan chi-square untuk faktor organisasi.

  31400000 14000000

137855411.9490

705661819.6760

  42600000 121000000 895000000 41100000 117000000 605000000

  6580000 51100000 168000000 21400000

  11600000 45700000 11700000 171000000

  18100000 80500000 118000000 3930000 139000000 100000000

  56200000 171000000 522000000 23400000

  2 157000000 711000000

  ( x - E x )

  

Diharapkan

E x

  Frekuensi Teramati x

  2 (chi square) = 25290585.6981

  59  

Tabel B2.2. Hitungan chi-square untuk faktor organisasi secara probabilitas relatif.

  Frekuensi Terobservasi x /T x

  

Diharapkan

E x

  ( x - E x )

  2 0.2208 1.0000 0.0790 0.2405 0.7342 0.0329 0.0255 0.5791 0.8489 0.0283 1.0000 0.7194 0.0835 0.3288 0.0684 1.0000 0.0385 0.2988 0.9825 0.1251 0.2491 0.1352 1.0000 0.0459 0.1307 0.6759 0.0351 0.0156

  0.2184 0.8375 0.0417 0.3634 0.6771 0.0602 0.1347 0.3358 1.2880 0.0642 0.5589 1.0414 0.0926 0.2071 0.2586 0.9917 0.0494 0.4303 0.8018 0.0713 0.1595 0.1908 0.7318 0.0365 0.3175 0.5917 0.0526 0.1177

  0.0000 0.0315 0.0334 0.0415 0.0048 0.0124 0.0886 0.1763 0.1497 0.0201 0.3482 0.0996 0.0009 0.0714 0.1398 0.0001 0.0024 0.0402 0.0407 0.0407 0.0504 0.0162 0.0983 0.0025 0.1099 0.0120 0.0058 0.0885

  Х

  2 (chi square) = 0.0885

      LAMPIRAN 3

  

TABEL HASIL MESIN CARI YAHOO!

Tabel C3.1. Singleton dan doubleton untuk Pendekatan Analisis dan Fitur

Singleton

   dari Pendekatan Analisis (PA)  Singleton   Fitur  (FF)  9500000 21200000 2590000 2000000   136000000 81900000 106000000

  9550000 Doubleton  antara PA dan FF 

  84800000   4270000 4260000 2940000 2910000  

  3780000 7570000 256000 4020000 110000000   11300000 43900000 42100000 21300000  20400000 27500000 1330000 19800000

  107000000   14700000 34900000 25000000 28800000  23200000 40100000 1770000 17400000 47000000

    5350000 9590000 2590000 2000000   1300000 21500000 17900000 9600000

  114000000   5900000 19000000 15300000 14800000  

  6530000 9820000 571000 6210000 9360000   5320000 8460000 5110000 5070000

    4830000 9880000 529000 5320000  

  Universitas Sumatera Utara

  

LAMPIRAN 4

SURVEI

1.

  Pelaksanaan survei: Survei tentang sistem informasi dilakukan pada Tempat : Jurusan Sistem Informasi Strata 1 Sekolah Tinggi Teknik Harapan (STTH)

  Medan Bulan : Oktober 2013

  2. Metode Pelaksanaan: Pelaksanaan dilakukan pada setiap kelas kuliah yang asuh oleh penulis. Kelas kuliah adalah kelas tingkat akhir, yang telah melewati mata kuliah yang berkaitan dengan sistem informasi seperti a.

  Konsep Sistem Informasi b.

  Analisis dan Rancangan Sistem c. Manajemen Projek Sistem Informasi d.

  

Dan beberapa mata kuliah yang berkaitan dengan internet dan Web.

  Tabel D4.1. Jumlah responden setiap kelas.

  Kelas Jumlah responden I 12 orang

  II 13 orang

  III 23 orang

  IV 13 orang Sebelum pertanyaan diajukan kepada setiap peserta kuliah dan dijawab pada lembaran kertas, penjelasan dilakukan untuk mengantar kepentingan sistem informasi dalam organisasi. Pertanyaan yang diajukan berkaitan dengan kepentingan setiap butir pada konstruk [FF], dan jawaban berbentuk binari (Ya atau Tidak), nilai pada setiap kelas dinyatakan dalam bentuk probabilitas

  61   terhadap jumlah peserta setiap kelas untuk setiap butir pertanyaan dari

konstruk. Jumlah peserta setiap kelas seperti Tabel D4.1 (Lampiran 4).

  3. Setiap butir dari konstruk akan diukur berdasarkan jumlah jawaban Ya (binari) dan dibagi dengan jumlah responden per kelas sehingga diperoleh bilangan pada rentang [0,1].

  62   Generating Strategic IS: Towards the Winning Strategy 1⋆ 1,2

  Maria Elfida and Mahyuddin K. M. Nasution

  1 Program S2 Teknik Informatika, FASILKOM-TI, Universitas Sumatera Utara, Padang Bulan 20155 USU, Medan, Indonesia.

  2 Departemen Teknologi Informasi, FASILKOM-TI, Universitas Sumatera Utara, Padang Bulan 20155 USU, Medan, Indonesia. yayank@usu.ac.id,mahyunst@yahoo.com Abstract.

  

In modern era, the role of information system in organiza-

tion has been taken many discussions. The models of information system are constantly updated. However, most of them can not face the chang- ing world. This paper discusses an approach to generating of strategic information system based on features in organization. We proposed an approach by using disadvantages in some tools of analysis whereby the lack of analysis appear as behaviour of relation between organisation and the world.

  Keywords: Information system, information technology, feature, orga- nization, knowledge

1 Introduction

  The success of information system (IS) has been one of themes in many discus- sions in the past two decades The rapid growth in the use of information systems has led to several changes in the workflow of both the private and public sectors, mainly about providing the units for working, servicing, implementing all works in environment of information technology A change is to compete with one another. The changes are as attempts to develop efficiency services, improved products, and better systems. The change for other changes, that to be the implementation of and use for what do the information technology is constantly changing. An information system is always by means of the concept, planning, design, implementation, and use of advanced technology either from the beginning or the capacity for self-upgrading and self-updating. Why are so

  

  many implementations and information systems created and so few used? Should information system be something strategic, so how? A strategic information system is an information system for helping to over- come the problem of inefficient public service and information delivery in the public sector by using the information technology effectively. The informa- tion system thus has been identified as vital in order to avail continually be

  2 M. Elfida dan M. K. M. Nasution

  available to generate the services. The Information system is critical in this age whereby the knowledge has been a part of ubiquitous of environments and their strategies, the knowledge as resources of competence. However, there is little attention about the study of information system as strategic factor to an en- vironment such as enterprise, organization, or special in Indonesia. We assure that the competence will become an important part of information system, and to support the achievement towards ”the winning strategy”. This paper aims to address an approach to identify strategic information system for an organization in a changing world.

  2 Related Work

  Information system is one of important studies in information area since its universal model to be important consequences for many organization and en- terprise based on some factors. Some of factors are the management style, size, goals, vision, mission and culture. However, the researchers also have identified organisational structure, organisational size, managerial information technology knowledge, top management support, financial resources, goal alignment and budgeting method as factors that affect the success of information systems. Currently, the informa- tion technology has supported many applications for understanding the behavior people, groups of people or organizations The information technology sup- ports and influences business strategies and objectives In general, in many books about analysis and design system, they explained that to implement and settle an information system becomes better and more better, constantly used the system development life cycle: planning, analysis, design, implementation, and testing. Therefore, the success of information system depends on the plan- ning mainly. The process of planning will determine the success of implemen- tation and using the information system in an organization Planning for information system requires an organization to consider the current situation and potential future, and to select most appropriate way to achieve objectives. In analysis, any organization needs to conduct the critical success factor (CSF) for understanding the business process that are supporting objectives, to implement SWOT (strengths, weaknesses, oppor- tunities, and threats) analysis for modeling a situation for organization to do the normative analysis (NA) for finding the limitations of organization, to study basically the system by end-means analysis (EMA) for emphasizing the identification of reliable things in organization, to conduct business strat- egy analysis (BSA) for deriving the essential relations between organization and business, to analysis with the value chain analysis (VCA) for looking for the op- portunities that can be exploited or supported by information technology and it needs to model the dynamic world with Porter’s five forces (PFF) model for identifying the opportunities in business. However, features of organization on planning sub-instances cannot be expressed clearly. Note: A planing as the

  Generating Strategic IS: Towards the Winning Strategy

  3

  gray (from dark to light or light to dark) is as the contribution levels. There- fore, we proposed an approach to address the changing an information system becomes strategic information system.

  3 The Proposed Approach for Generating Strategic Information System

  Each organization as a system exists in an environment, i.e., a world that consists of classes of knowledge Therefore, an organization has something in isolation and also things in sharing. An organization starts with idea, concept, vision and mission, whereby the organization achieves its objectives, but an organization is always in a predictable path, going on achievements and performances. A world can be considered a space of event whereby an organization will connect to any event, each event can measure in either discrete or continue. An event can be recognized clearly as a number, a count, or a value, but sometimes it can not identified. An event sometimes depends on another event. The both events have any relation. Let us model an organization as a set of entities, then entities exists in both an organization and a world, and therefore each entity has the stable attributes and the flexible attributes. Thus, the event can be considered as uncertainty for some situations and can be measured by the probability Therefore, we group the features of information system into six categories as the beginning of analysis, i.e. an approach that classifies the features into internal, external, quantitative, qualitative, history, and forecasting categories, where each feature is potentially same opposition to core, to generate a strategic information system, based on a comprehensive view, scope of data/information, mechanisms, definiting requirements, high level goal and knowledge-oriented paradigm.

  Some features internally in organisation as the advantage and if we confront them to organisation’s environment will be the complex situation. Size of or- ganization become bigger if the organization was expanded area of its colonies, the branches is needed to represent organization, and then information system is one panacea to control all resources in organization, but when the organiza- tion take a system to supervise all, the organization increasingly exposed to the world and it is most difficult to control them. In strategic information system, the system needs to define the internal features of organization as a basic modal in information system for facing an environment and also the system needs to identify the external features from outside as input for defending own self from an attack. As a strategy, the organization must know that the internal and the external features have relationship, and the relation between them always hidden in background of organization or the features. Each feature has the latent threat in relations. Therefore, each strategic information system requires the support in multi level analysis, the information/data modelling, and the background of knowledge in having sound theoretical basis. In this case, a comprehensive view of organization requirements will capture requirements of information system.

  Some features exist as information quantitative, something easily we recog- nize it. In strategic information system, it is represented as statistics, graphics or

  4 M. Elfida dan M. K. M. Nasution

  other infrastructures of multimedia. However, other features we can identify only through stable attributes of another feature in their relations. An information model should take an embraced view to conceptualize the requirements from data to knowledge in order to an environment can be determine existing organi- zation uniquely with information system. There are many features in qualitative condition and this is most subjective, because the values of them depend on the exercise of members in organization or they are outside. Therefore, requirements about data/information must cover in wider scope.

  The important feature comes and goes based on time in a timeline of organi- zation. The robust feature always exist, and it as a core in information system. The core of feature is a benchmark for evaluating the information system while other features are the constraints for supporting the forecasting. Some tools in statistic and optimization are the best assistants to measure the importance of features and their relations. The strategic information system must enable to generate the temporary situations of organization and predictable some the choices as solution. In the system therefore there is a mechanism to address the complex situation of an organization whereby the organization regenerate high level goal for learning to the strategic information system.

  The features are phenomena about organization and information system is a paradigm for understanding the phenomena, but in some conditions not each paradigm enable we use to understand any phenomena, there is a bridge the gap always exists between them. Anyway, everything has limitations, only hu- man with their knowledge has a container of the strategy making. A strategic information system therefore must support knowledge-oriented paradigm, i.e. a system based on knowledge in overall of system as a winning strategy.

  4 Conclusion and Future Work

  The strategic information system can be generated based on an approach with six advantages of data as basic modal of organization to face the change world. The approach implicitly covers all attributes and values of features to take the implications for getting the winning strategy. Our near future work is to develop a framework to generate the background of knowledge about strategic information system.

  References

1. W. H. DeLone and E. R. McLean, Information system success: The quest for the dependent variable. Information System Research 3(1) (1992) 60-90.

  2. W. H. DeLone and E. R. McLean, The DeLone and McLean Model of Information System Success: A Ten-year update. Journal of Management Information Systems 19(4) (2003) 9-30.

  3. Sylvie Feindt, Judith Jeffcoate and Caroline Chappell, Identifying success factors for rapid growth in SME E-commerce. Small Business Economics 19(1) (2002) 51-62.

  Generating Strategic IS: Towards the Winning Strategy

  5

  4. Nigel Melville, Kenneth Kraemer, and Vijay Gurbaxani, Review: information tech- nology and organizational performance: an integrative model of it business value.

  Journal MIS Quarterly 28(2) (2004) 283-322.

  5. Dennis F. Galletta and Albert L. Lederer, Some cautions on the measurement of user information satisfaction. Decision Sciences 20(3) (1989) 419-434.

  6. Mahyuddin K. M. Nasution and Shahrul Azman Noah, Superficial method for ex- tracting social network for academics using web snippets. Rought Set and Knowl- edge Technology, LNAI 6401 (2010) 483-490.

  7. Mahyuddin K. M. Nasution, Shahrul Azman Noah and Saidah Saad, Social network extraction: Superficial method and information retrieval. Proceedings of Interna- tional Conference on Informatics for Development (ICID’11) (2011).

  8. Luis F. Luna-Reyes, Jing Zhang, J. Ramon Gil-Garcia and Anthony M. Cresswell, Information systems development as emergent social-technical change: a practice approach. European Journal of Information Systems 14 (2005) 93-105.

  9. G. N. Mentzas. Implementing as IS Strategy - A team approach. Long Range Planning 30(1) (1997) 84-95.

  10. J. Rockart. Chief executives define their own data needs. Harvard Business Review 57(2) (1979) 215-229.

  11. J. Ward and J. Peppard. Strategic planning for information systems. John Wiley & Sons Ltd, Chichester, 2002.

  12. W. Robson. Strategic management and information systems: An integrated ap- proach. Pitman Publishing, Greate Britain, 1994.

  13. G. B. Davis. Strategis for information requirements determination. IBM System Journal 27(1) (1982) 4-30.

  14. M. E. Porter. Competitive strategy: Techniques for analysing industries and com- petitors. Free Press, New York, 1980.

  15. Mahyuddin K. M. Nasution. Theory of sharing knowledge: An Introduction. Bul- letin of Mathematics, to print.

  16. Mahyuddin K. M. Nasution and Shahrul Azman Noah. Information retrieval model: A social network extraction perspective. IEEE International Conference on Information Retrieval & Knowledge Management (CAMP’12) (2012). Seminar Nasional Teknologi Informasi dan Komunikasi (SNASTIKOM 2013)

  ISBN 978-602-19837-2-0 3-15

  Artificial Intelligence Seminar Nasional Teknologi Informasi dan Komunikasi (SNASTIKOM 2013)

  

Pemodelan Sistem Pakar Untuk Mendeteksi Kerusakan Pada Komputer

dengan Metode Forward Chaining

Maria Elfida 1) dan Mahyuddin K. M. Nasution 2)

  1)

  Jurusan Sistem Informasi Sekolah Tinggi Teknik Harapan Medan

  2)

  Program Studi Teknologi Informasi Fasilkom-TI Universitas Sumatera Utara

  yayank@usu.ac.id , mahyunst@yahoo.com Abstrak Sistem pakar telah menjadi bagian dari banyak pembuat keputusan, tetapi sistem pakar juga tidak bergantung kepada pakar saja, tetapi melibatkan kilas balik dari pengguna, dan melibatkan informasi yang terdapat dilingkungan sebagai basis pengetahuan. Oleh karena itu, suatu sistem pakar melibatkan semua ini untuk membangun aturan-aturan yang mungkin diberlakukan dalam pendeteksian kerusakan komputer. Aturan yang mungkin dijalankan menggunakan metode Forward Chaining. Kata kunci : gagal-fungsi, perangkat keras, perangkat lunak.

  Pada saat ini, komputer telah menjadi perangkat yang sangat penting untuk mendukung aktivitas manusia. Komputer tidak hanya digunakan sebagai sarana utama banyak pekerjaan, tetapi menjadi infrastruktur bagi interaksi antara manusia. Komputer berperan dalam banyak bidang, komputer digunakan sebagai sarana hiburan seperti memainkan dan mendengarkan musik, membuat dan memainkan permainan (game) atau menjalankan aplikasi yang dianggap menarik. Walaupun komputer telah diadaptasi sesuai dengan sifat dan kebutuhan manusia tetapi pada hakekatnya komputer tetap menjadi alat yang terus-menerus dipengaruhi oleh lingkungannya (Mahfudz et al. 2013), memiliki kemampuan terbatas dari sudut fisik, mengalami kemunduran, tidak up-to-date terhadap perkembangan teknologi, dan kemudian tidak dapat digunakan lagi. Gagal-fungsi suatu komputer disebabkan perangkat keras dan perangkat lunak, kemudian oleh keperluan dan keinginan pemakai sebagai brainware. Oleh karena itu, pengembangan sistem pakar memerlukan suatu pemodelan untuk mendeteksi aturan pendeteksian kerusakan yang mungkin terjadi berdasarkan konsultasi pakar dan pemakai. Dengan melibatkan, metode forward

  chaining , sistem pakar diadaptasikan untuk menentukan suatu kerusakan pada komputer.

  2. Istilah, Batasan dan Karakteristik

  Kecerdasan buatan salah satu bidang dari teknologi informasi yang bertujuan untuk mengadap-tasi kemampuan nalar manusia kepada mesin seperti komputer. Manusia mampu memikirkan segala hal, menstrukturisasi informasi menjadi data terstruktur, mensistematiskan melalui rumus yang bersifat abstraks dari konsep yang luas dan terdeskripsi, tetapi tidak mampu menyelesaikan persoalan dengan timbunan data yang sangat besar, sedangkan komputer sebaliknya. Jadi, aktivitas manusia yang telah dirumuskan diangkat ke dalam komputer agar komputer mampu melakukan tugas itu, menirukan kemungkinan penalaran, penglihatan, pembelajaran, pemecahan masalah, sampai kepada pemahaman tentang sesuatu secara semantik.

1. Pendahuluan

  2.1 Komputer

  Gagal-fungsi sebuah komputer berasal dari dua kemungkinan, yaitu lingkungan dan komputer itu sendiri. Lingkungan boleh jadi karena sebab pengaruh lingkungan secara fisik ataupun lingkungan pemakaian. Fisik komputer rentan terhadap berbagai faktor, air dan udara yang menyebabkan munculnya arus pendek dalam komponen komputer secara elektronik. Misalnya, lingkungan yang mengandungi kelembatan tinggi menyebabkan komputer mudah lembab, apalagi udara menghantar debu, perubahan cuaca sebagai pemicu. Lingkungan pemakaian berkaitan dengan pemakai, tatacara pemakaian yang mungkin berbenturan dengan sifat-sifat fisik dari komputer, seperti mengetik dengan komputer sambil merokok dan makan.

  Kerusakan karena komputer itu sendiri, juga berkaitan dengan pemakai selain keterbatasan komponen komputer. Kehandalan komponen komputer telah ditentukan berdasarkan pengukuran mutu, jadi dapat diprediksi waktu pergantian berdasaran lama pemakaian. Namun demikian, kegagalan fungsi komponen juga dibebabkan oleh manusia dan perangkat lunak seperti virus komputer.

  ISBN 978-602-19837-2-0 3-16

  Artificial Intelligence Pola-pola kerusakan komputer sebenarnya dapat ditentukan berdasarkan cara pemakaian dan posisi pada lingkungan. Setiap pola dapat dirumuskan ke dalam aturan tertentu yang membantu dalam implementasi (Lai et al. 2006).

  2.2 Kecerdasan buatan

  Banyak penerapan kecerdasan buatan telah dilakukan, saat ini hampir kepada semua bidang yang terkait dengan pengolahan data agar menjadi informasi, kemudian menjadi pengetahuan, pengetahuan digunakan untuk membuat keputusan atau suatu kebijakan, misalnya seperti sistem robot bermain sepak bola. Namun begitu, kecerdasaran buatan hanya akan menyelesaikan permasalahan kompleks dengan mendayagunakan komputer. Salah satu penerapan kecerdasan buatan untuk membuat keputusan adalah sistem pakar.

  2.3 Sistem pakar

  Sistem pakar adalah suatu implementasi yang dikembangkan berdasarkan strategi heuristik: aturan yang dibuat oleh manusia untuk mendekati berbagai persoalan secara khusus, dengan mempertimbangkan pengetahuan yang telah ada. Sistem pakar mempu- nyai sifat-sifat berikut: (1) Terdiri dari informasi yang handal, yang didukung adanya langkah-langkah dalam menjawab pertanyaan, termasuk pertanyaan tentang proses; (2) Fasilitasi modifikasi, dengan melibatkan operasi penambahan dan penghapusan, kemampuan yang berasal dari pengetahuan basis; (3) Heuristik dengan latar belakang pengetahuan yang tidak sempurna dengan mana penyelesaian didapatkan; (4) Fleksibel digunakan dalam berbagai jenis komputer; dan (5) Adanya adaptasi sebagai kemampuan (Cowan, 2001).

  2.4 Struktur Sistem Pakar

  Struktur pembangunan sistem pakar dibagi menjadi dua bagian utama yaitu lingkungan pengambangan dan lingkungan konsultasi. Struktur pertama berkaitan dengan pembangunan sistem pakar, dengan mana pengetahuan pakar dimasukkan ke dalam lingkungan sistem pakar, sedangkan struktur kedua digunakan untuk jasa konsultasi untuk mendapatkan pengetahuan pakar.

  Bangunan sistem pakar terdiri dari komponen- komponen yaitu (1) antarmuka pemakai, (2) basis pengetahuan, (3) mekanisme inferensi, (4) memori kerja, (5) Kemudahan penjelasan, (6) Kemudahan akuisisi pengetahuan

  Antarmuka pemakai, suatu mekanisme berkaitan dengan aktivitas komunikasi pemakai dan sistem pakar. Penerimaan informasi dari pemakai menjadi bagian utama dari antarmuka, mengubahnya menjadi bentuk yang dapat diterima, untuk selanjut- nya menyerahkanterimakannya dengan antarmuka agar dapat diterima oleh pemakai. Selalu bagian antarmuka didukung oleh adanya dialog, yang menjadi bagian hadapan daripada antarmuka. Oleh karena itu, informasi perlu diterima dan diberikan dengan baik dan efektif melalui antarmuka ramah pemakai

  Pada era modern, pengetahuan menjadi banyak basis bagi sebarang sistem, terutama sistem pakar, karena tanpa itu sebarang sistem tidak akan dapat menghadapi tantangan perubahan dengan mudah. Bagaimanapun, suatu sistem pakar disusun dari fakta dan aturan. Setiap fakta mengandungi informasi tentang objek yang perlu dipertimbangan dan mendukung tindakan yang akan dilakukan. Aturan adalah kendali tindakan yang akan dilakukan itu. Jadi, arsitektur sistem pakar akan tergantung kepada pengetahuan sebagai kunci kekuatan, yang memerlukan kepastian dan lengkap, menyempurnakan ketidaklengkapan, mendeskripsikan hal-hal tertentu, fleksibel atau mudah diubah bergantung kepada keperluan, dan jelas.

  Penalaran atau kemampuan berpikir dari sistem pakar melibatkan strutur endali, penafsiran aturan, atau mesin pemikir, yang disebut sebagai otak suatu sistem pakar. Otak ini melibatkan konsep runut balik, suatu metodologi pelaksanaan suatu penyelesaikann berdasarkan pengetahuan ke dalam tempat kerja, untuk kemudian disimpulkan. Setiap

  bagian ini mempunyai perintah yang dipatuhi oleh sistem. Oleh karena itu, pemilikan tindakan didasarkan kepada penjenjangan yang diagendakan.

  Fakta memerlukan tempat, seperti halnya data memerluan storage. Fakta dapat dijadian rujukan, tapi juga memerlukan proses, dan menghasilkan fakta baru. Fakta baru ini sebagai hasil diagnosis, boleh berupa tindakan atau hanya akibat.

  Penjelasan dilakukan oleh otak sistem pakar, dan mencerminkan proses penalaran seorang pakar. Dalam hal ini, konsultasi terjadi bagi pemakai yang bukan pakar, tetapi sistem kemudian menjadi lebih cerdas dengan melakukan pembelajaran terhadap fakta lama dan baru.

  Oleh karena itu, sistem pakar memiliki kemampuan untuk mendapatkan pengetahuan tambahan. Akuisisi pengetahaun menjadi bagian dari sistem pakar untuk mendapatkan pengetahuan. Jadi sistem pakar dilengkapi dengan kemudahan yang melibatkan prinsip what you see what computer see. Seminar Nasional Teknologi Informasi dan Komunikasi (SNASTIKOM 2013)

  ISBN 978-602-19837-2-0 3-17

2.5 Metode Forward Chaining

  Pemodelan sistem pakar dibangun dari aturan-aturan yang berbeda: pakar, pengguna, dan lingkungan sistem pakar. Semua aturan ini dibakukan sesuai dengan metode yang akan digunakan, dan kemudian dibandingkan untuk menilai dan mensahihkan sistem pakar untuk keperluan tertentu, termasuk untuk mendeteksi kerusakan pada komputer.

  Policy 30: 1355-1372, 2001.

  [3] Lai, Y., Li, X., Xiong, Y., dan Du, P., Design of an efficient intelligent instrument fault diagnosis expert system. Computational Engineering in Systems Applications (CESA), Beijing, China, 2006. [4] Cowan, R. Expert systems: aspects of an limitations to the codifiability of knowledge, Research

  Technology , LNCS Vol. 6401, Springer-Verlag: 483- 490, 2010.

  [2] Nasution, M. K. M. dan Noah, S. A., Superficial method for extracting social network for academics using web snippets. Rough Set and Knowledge

  [1] Mahfudz, S., Nasution, M. K. M. dan Nasution, S., Knowledge sharing: a model, Cornell University Library , 2013.

  4. Penutup

  Artificial Intelligence Adanya, fungsi yang melakukan perubahan atau transformasi dari sesuatu yang tidak dimengerti komputer menjadi dapat diolehnya, sesuatu yang tidak dikenali oleh manusia, menjadi bagian darinya dengan baik. Terrorist Network: Towards An Analysis 1)⋆ 1)

  Aturan yang telah dicipta berdasarkan pakar akan dibandingkan dengan pengalaman pengguna. Tujuannya adalah untuk menilai sistem pakar yang akan dikembangkan. Namun begitu, beberapa aturan dasar juga diperoleh dan dikembangkan berdasarkan nalar yang berlaku sebagai hukum di alam. Aturan ini, menjadi umpan balik untuk mensahihkan aturan yang diberlakukan di dalam sistem pakar pendeteksian kerusakan komputer. Semua aturan ini disusun berdasarkan metode Forward Chaining.

  Perancangan sistem pakar berbeda dari sistem informasi biasa, apalagi sistem berbasis pengetahuan. Perancangan ini tergantung kepada pemodelan, penentuan hubungan antara beberapa komponen yang melibatkan masukan dari pakar dan kilas balik dari pemakai (Mahyuddin dan Noah, 2010). Setiap komponen memiliki bobot yang kemudian menghasilkan bobot hubungan yang mungkin terjadi antara komponen itu. Model akan menjadi satu fungsi yang melibatkan peubah bebas dan peubah tetap. Namun begitu, selalu bahwa masukan dari pengguna dibakukan dengan cara mengeliminasi beberapa hal yang tidak terkait dengan karakteristik sistem pakar, setelah itu menjadi bahan perbandingan kepada masukan dari pakar. Penilaian dapat dilakukan sehingga diperoleh presisi pemodelan dan keakuratan informasi tentang sistem pakar.

  Suatu sistem pakar melibatkan pangkalan data, untuk menyimpan fakta, data dasar seperti informasi komputer tertentu, dan informasi lain yang mungkin ada dari berbagai sumber. Biasanya, informasi yang tidak terstruktur disimpan dalam berkas khusus seperti berkas teks.

  Borang pakar digunakan oleh pakar dengan tujuan memperbaharui fakta dasar di dalam pangkalan data, sedangkan borang yang lain berkaitan dengan sajian informasi fakta tetapi juga dapat menempatkan komentar dan pengalaman pemakai, sehingga pakar dapat mempertimbangkan kasus bersifat khusus, atau tidak terekam dalam fakta.

  Sistem pakar adalah sistem yang berkaitan dengan pakar dan objek yang menjadi sasaran dari sistem pakar. Oleh karena itu, sistem pakar untuk objek pendeteksian kerusakan komputer berkaitan dengan dua borang yang digunakan untuk konsultasi: Borang pakar dan borang pemakai.

  Aturan penyimpulan ditentukan dengan strategi implementasi forward chaining, yaitu data disediakan dan aturan kesimpulan digunakan untuk mengekstrak data lain hingga dicapai sasaran.

  Metode ini adalah salah satu dari dua metode utama dalam kecerdasan buatan, yang dapat dideskripsikan secara logika. Misalnya, untuk aturan sederhana tentang kerusakan komputer: Jika x adalah kerusakan dan arus listrik tidak ada – lalu x adalah komponen. Jika x adalah kerusakan dan arus listrik ada – lalu x adalah bukan komponen. Jika x adalah komponen – lalu x diganti. Jika x adalah bukan komponen – lakukan deteksi lain.

3. Pemodelan Sistem Pakar

DAFTAR PUSTAKA

  Mahyuddin K. M. Nasution and Maria Elfida

  1) PS Sistem Informasi, STTH, Medan, Sumatera Utara, Indonesia mahyuddin@usu.ac.id yayank262000@yahoo.com Abstract.

  

Terrorist network is a paradigms to understand the terror-

ism. The terrorist involves a lot of people, and among them are involved as perpetrators, but on the contrary it is very difficult to know who they are caused by lack of information. Network structure is used to reveal other things about the terrorist beyond the ability of social sciences. Keywords: Social network, data, information structure, investigation, generator.

  1 Introduction

  The network is one of defining paradigms in modern era, or as concept for un- derstanding the phenomenon in world The most be noticed phenomenon is what we called as terrorism. As social phenomena, always, there is no single definition of terrorism that commands full international approval but FBI define it as action of ”the use of serious violence against persons or property, or threat to use such violence, to intimidate or coerce a government, the public or any section of the public, in order to promote political, social or ideological objectives”

  In social network, the terrorism is a important study since 9/11 twin tower attack Social network analysis as knowledge extraction from graph is the study of mathematical models for interaction among persons, groups, or organi- zations The popularity of this study because the salience of the connections among terrorism actions. Thus, to find out the relations between actors of ter- rorism be important to do the counter of terrorism actions. Therefore, our goal is to describe some aspects of terrorist network. In the section of history: towards a motivation we discuss that historically the terrorist network is interaction of group people. Network Data and Investigation Section describes how to connect one with the other terrorist. Last section we describe a model of optimal network.

  

  2 History: Towards a Motivation

  Currently there is a modern issue, an intelligence agency is investigating gen- eral trends in terrorist activities all over the world. In the literature, initially

  Seminar International/Nasional Matematika dan Terapan (SiManTap2011), Medan, 28-29 November 2011

  2 M. K. M. Nasution & M. Elfida

  emerged as a form of political expression, terrorism dates back to 6 A.D. when Jewish patriots opposed to Roman rule in Palestine, organized under the name of Zealots and launched a terrorist campaign to drive Romans out of Palestine Terrorism recurred from 116-117 A.D. and again from 132-135 A.D. until the Jewish population was driven out of Rome. The term did not officially enter political vocabulary until the 18th century, when Edmund Burke criticized the ”reign of terror” following the 1792-94 French Revolution, when the French gov- ernment used systematic terror to intimidate and eliminate its enemies On and off, the use of terrorism can be traced to presented day. In 20th century, the activity of international terrorism increased rapidly during the late 1960s and early 1970s, but after a brief quietness, the 1980s began and ended with terrorist violence until beginning of this century. By the end of the decade, terrorism has become commonplace Comparatively fewer terrorist incident have been recorded for the first half of the 1990s. However, their nature and magnitude are not easily comparable to those of past years events as indicated by the US Department of State. Like that, terrorists in the modern era has always been as- sociated with Jewish and Zionist. Therefore, the US Department of State defines terrorism as ”... premeditated, politically motivated violence perpetrated against civilians and unarmed military personnel by subnational groups ... usually in- tended to influence an audience.”; and international terrorism as ”...involving citizens or the territory of more than one country”

  For example, as organization, Jemaah Islamiyah (JI) started as an Indonesian Islamist group and is a loosely structured organization characterized by territo- rial divisions: the peninsular Malaysia and Singapore; Java, Mindanao, Sabah, and Sulawesi; and Australia and Papua Abdullah Sungkar motivated by the need for a new organisation that could work to achieve an Islamic State in Indonesia and cause of established JI in Malaysia around 1995. During the 1990’s Al Qaeda infiltrated JI and JI subsequently developed into a pan-Asian network extending from Malaysia and Japan in the north to Australia in the south

  Peak in Indonesia, the tactical operation of the Bali attack was conducted by JI’s Indonesian cells until now the hunt terrorist operations continue take place.

  From histories, the actions of terrorism generally is not only done by a bunch of people but also the country to the people or the other country. Therefore, actions like this always to be a secret network. In modern era, the concept of the network allows us to capture the interactions of any individual unit within larger field of activity to which the unit exists, see Figure 1. The model of network based on the concept of graph. However, to construct any required network is the causes of the actors exist and related to the cluse of relations between them.

  3 Network Data and Investigation

  For building social network is difficult if only because a clue of relation between a pair of actors as a property of the pair, i.e. anything inherent to either actor.

  n (n−1)

  Collecting data on n actors degenerates is to find the properties of pairs

  2

  of actors. Furthermore, the classical means of collecting such data by social sci-

  Terrorist Network: Towards An Analysis

  3 Fig. 1.

  The relations among entities in the salience

  entists, though done carefully and reliably, are painstaking and time-consuming, is by involving questionnaires, interviews, direct observations, manual sifting through archival records, or various experiments

  Through investigation, there are two ways for finding the terrorist: a direct and an indirect ways.

  1. In particular, an independent Bernoulli random draw determines whether a particular agent is found directly as a terrorist. The direct finding about a particular agent as terrorist at each period is independent of other terrorists. Thus, a terrorist i can be found directly by the authority according to some probability α i . This probability depends on the extent of the enforcement agency’s scrutiny of terrorist i.

  2. The law enforcement authority might also find terrorists indirectly. It is based on when the agency detects a terrorist who has information about other members of the organization, the agency also finds each of these with probability γ ∈ (0, 1].

  (a) This implies that the enforcement agency’s ability to find terrorists in- directly based on the structure social of the terror group. (b) γ is a parameter that depends on the ability of the law enforcement agency to extract information of terrorist activity from catched terrorists.

  For instance, the parameter γ is determined by the interrogation methods and the ability to strike by dealing with prisoners in exchange for informa- tion.

4 M. K. M. Nasution & M. Elfida

  The law enforcement agency has a budget B ∈ [0, 1] to allocate the resources for investigating the N members of the organization and devoted α i ∈ [0, 1] to P N

  α ≤ B. Without loss of the generalization, investigate member i where i

  i =1

  ≤ α ≤ . . . α N i we label terrorists so that α

  1 2 . We refer to α as the enforcement

  agency’s level of scrutiny (or investigation) of terrorist i. Each terrorist can be found by the enforcement agency. If the terrorist is found, this imposes a direct cost to the organization of k > 0. This cost may include a punishment for the individual, such as time in prison, and a cost to the organization of recruiting a new member.

  In information structure, it is not just what you know, but also whom you know, that matters. What you know, say, Σ, Σ ⊂ Γ the set of all thinking. Someone has only mod(Σ) as a part of the thinking or class of knowledge K

  Definition 1.

  |i = Let σ be a generator as a trigger of the thinking, and {σ i

  1, . . . , m} is a set of generator for Σ such that Σ = {f (σ i )|i = 1, . . . , m} is the knowledge of an actor where f () as disseminator.

  A graph G is an ordered pair (V, E), where V 6= ∅ represents the finite set of verteces and E represents the set of edges as set of all unordered pairs of vertices. The set of all graphs of order n and size m is denoted with G(V, E) = G(n, m). Let us define ξ and ζ as two mapping, ξ : A → V and ζ : {Σ a i ⊓ Σ a j } i,j → E, we obtain a tie between a i and b j as edge

  {i, j} = ζ(|σ a ⊓ σ a |) (1) i j or briefly ij = ζ ij . Definition 2.

  The shortest distance between vertices i, j ∈ G is called the geodesic distance between i and j, denoted by ℓ ij (G), i.e.,

  X ℓ ζ

  ij (G) = min( ij ) (2)

ij∈E

  where 1. ℓ ij = ℓ ji if ij = ji, for all ij, ji ∈ E or ij is an undirected edge (symmmetry).

  2. ℓ ij 6= ℓ ji if ij is a directed edge (assymmetric). Definition 3.

  Let G(V, E) is a graph, where V 6= ∅. The total distance, T (G), is

  X X T ℓ

  (G) = ij (G) (3)

  i∈G j∈V Definition 4.

  A diameter of a graph G(V, E) defined as a maximum over the geodesic distances between all pairs of vertices, i.e., D ℓ

  (G) = max ij (G) (4)

  ij∈V ×V Terrorist Network: Towards An Analysis

  5 Definition 5.

  The community (based on fields of knowldge, or organization) is a set neighbors at distance δ of vertex i by Ξ i,δ (G), i.e., Ξ

  i,δ (G) = {i ∈ V |ℓ ij (G) = δ}. (5)

  Some researchers and goverment agencies gather information from various sources that involved computer network or the computer mediated communi- cation. They have a database of millions of new feed, minutes and e-mails and want to use these to get a detailed overview of all terrorist events in a particular geographic region in the last five years. This information not only related to the general public but also the information coming from government officials. Knowledge of terrorist networks is useful in finding various other crimes. In law enforcement concerning organized crimes such as drugs and money leunder- ing Knowing patterns of relationship in a social network is very useful for law enforcement agencies to investigate collaborations among criminals, i.e., how the perpetrators are connected to one another would assist the effort to disrupt a criminal act or to identify additional suspects.

4 Optimal Network

  Any organization takes their network structure explicitly. In absence of further information, we are interested in what structure these organizations actually adopt. Theoretically, the analysis of the sharing knowledge of covert networks depends on proposed framework such that the optimal network structure derived the appropriate scenarios.

  n Definition 6.

  Let G is a set of graphs of order n. The information measure

  n

  of g ∈ G is given by n (n − 1) K

  (g) = (6) T

  (G) In terrorist organizations case, for two agents, one responsible for network

  n

Dokumen yang terkait

BAB II TINJAUAN PUSTAKA - Pengaruh Pasar Modern terhadap Pedagang Pasar Tradisional dan Masyarakat dalam Pengembangan Wilayah di Kecamatan Medan Area

0 0 30

BAB I PENDAHULUAN - Pengaruh Pasar Modern terhadap Pedagang Pasar Tradisional dan Masyarakat dalam Pengembangan Wilayah di Kecamatan Medan Area

0 1 7

BAB 2 LANDASAN TEORI - Model Pembelajaran Berbasis Komputer Mengenai Sistem Pencernaan Manusia pada Siswa Kelas XI SMA

0 0 22

BAB II PROFIL INSTANSI - Pelaksanaan Etika dan Sikap Profesi Sekretaris pada Kantor Wilayah Kementerian Agama

0 0 25

BAB 1 PENDAHULUAN 1.1 Latar Belakang - Pelaksanaan Etika dan Sikap Profesi Sekretaris pada Kantor Wilayah Kementerian Agama

0 3 10

BAB 2 TINJAUAN PUSTAKA 2.1 Kriptografi - Pengembangan Algoritma RC6 Dalam Proteksi Transmisi Data Dengan Mengkombinasikan RC5 Dan RC

0 0 14

BAB 2 LANDASAN TEORI - Analisis Metode Fuzzy Analytic Hierarchy Process (Fahp) Dalam Menentukan Posisi Jabatan

0 0 17

BAB II PERENCANAAN BISNIS “TELA-TELA” A. DATA PERUSAHAAN - Perencanaan Bisnis Tela-Tela

0 3 21

BAB II PENGAJUAN PERMOHONAN PENUNDAAN KEWAJIBAN PEMBAYARAN UTANG KEPADA PENGADILAN NIAGA A. Pengertian PKPU - Asas Pembuktian Secara Sederhana Dalam Permohonan Penundaan Kewajiban Pembayaran Utang (Pkpu) Pada Putusan Ma Ri No. 586 K/Pdt.Sus-Pailit/2013

0 1 23

1 BAB I PENDAHULUAN A. Latar Belakang - Asas Pembuktian Secara Sederhana Dalam Permohonan Penundaan Kewajiban Pembayaran Utang (Pkpu) Pada Putusan Ma Ri No. 586 K/Pdt.Sus-Pailit/2013

0 0 19