Nurul Fajrin Ariyani

Nurul Fajrin Ariyani
  • Master of Science
  • PhD Student at Cardiff University

About

32
Publications
5,142
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
159
Citations
Current institution
Cardiff University
Current position
  • PhD Student
Additional affiliations
July 2012 - present
Sepuluh Nopember Institute of Technology
Position
  • Lecturer
Education
August 2010 - July 2012
National Taiwan University of Science and Technology
Field of study
  • Computer Science and Information Engineering

Publications

Publications (32)
Article
ITS Online Publication (POMITS) is a publication journal for ITS undergraduate students. Many articles are published in it, and they are often needed as reference material for other student research. The search process is still based on title, abstract, author's name, and keywords. The data is still entered manually by the author. This process allo...
Article
Siternak atau Sistem Informasi Pencatatan Data Ternak merupakan aplikasi yang dibangun untuk mempermudah para peternak dalam melakukan pencatatan ternak di desa binaan Lembaga Amil Zakat (LAZ) Al-Azhar. Selain menghemat waktu, aplikasi ini juga bertujuan untuk meminimalkan sumber daya dalam pencatatan data ternak. Aplikasi Siternak yang berjalan pa...
Article
Ijin edar dan sertifikasi halal merupakan jaminan kualitas produk mitra Usaha Mikro dan Kecil (UKM). Kurangnya informasi, pembinaan, dan stigma kerumitan proses pemenuhan standar pangan dan sertifikasi halal dialami kebanyakan mitra UKM. Strategi pengabdian masyarakat yang telah kami lakukan berupa pelatihan kelas halal, pendampingan pembuatan nomo...
Article
There is an impersonation (login as) feature in several applications that can be used by system administrators who have special privileges. This feature can be utilized by development and maintenance teams that have administrator rights to reproduce errors or bugs, to check specific features in applications according to the specific users’ login se...
Article
Full-text available
The working technology will provide information and knowledge. Information and technology can be developed in various ways, by reusing the technologies. In this study modeled the ontology of SOPs using protege. Ontology will be matched between ontology A and B to obtain similarity and reuse ontology to create a more optimal ontology. Matching is a...
Article
Full-text available
The biography of historical figures is often fascinating to be known. Everything about their character, work, invention, and personal life sometimes are presented in their biography. The social and family relationships among historical figures also put into concern, especially for political figures, heroes, kings or persons who have ever been ruled...
Article
Full-text available
Management processes without responsive to abnormal activity that might occur can affect the performance of an organization. The Publishing Workflow Ontology (PWO) will be modified for detect abnormal activity, such as wrong pattern, wrong resource, throughput time maximum and wrong duty combine that occurs in the event logs. The new model from mod...
Article
Full-text available
Waktu adalah sebuah konsep penting dalam pencatatan objek-objek warisan budaya dan peristiwa sejarah. Contoh konsep waktu yang sering digunakan dalam pencatatan objek-objek warisan budaya dan sejarah adalah waktu interval (time-interval) dan waktu titik (time-point). Informasi waktu disajikan dalam granularitas waktu primitif yang berbeda seperti t...
Conference Paper
Full-text available
This paper propose a method for automatically linking spatial information that embedded in cultural heritage metadata to geo linked open data. The spatial information that embedded in a cultural heritage object could be used to enrich information of the other objects. For example, by knowing the spatial relation between two or more CH objects, we c...
Conference Paper
Full-text available
Business process metamodel is a representation of knowledge on business processes. Balanced scorecard ontology (BSCO) is a conceptual representation of the balanced scorecard, so it can be integrated in semantics. However, the balanced scorecard ontology unable to measure fraud criterion when a business process has been executed. This research prop...
Conference Paper
Full-text available
The process of Solar Farm site selection is a complex issue because it involves many criteria and many factors that are classified as problem Multi-Criteria Decision Making (MCDM). With computer technology, it is possible to analyze systematically the MCDM complex problems through computational intelligence techniques. Many methods have been develo...
Conference Paper
This paper propose a metadata schema to preserve the semantics of cultural heritage (CH) objects. A widely used standard of CH metadata is already provide by CIDOC-CRM which has been approved as an ISO 21127 in 2006. However, mapping CH attributes to CIDOC-CRM entities needs to be done carefully since the metadata could be published as open data. I...
Article
The knowledge that embedded in a historical artifact can have multidimensional information, such as time (temporal) and place (spatial) dimension. The temporal dimension indicates when the artifact had been used in the past, while spatial dimension points the location of people who had been using it at the time. Both of these information provide a...
Article
Full-text available
Pada saat ini penggunaan diagram kasus penggunaan dalam pendefinisian kebutuhan sistem sangat sering digunakan. Sebelum pembangunan diagram kasus penggunaan tersebut, seorang sistem analis harus membuat sebuah skenario agar konsumen lebih mengerti tentang apa sistem yang akan diberikan kepada mereka. Permasalahan sekarang adalah setelah melakukan a...
Article
Full-text available
Pada saat ini diagram kasus penggunaan sering digunakan dalam pendefinisian kebutuhan sistem. Sebelum pembangunan diagram kasus penggunaan tersebut, seorang sistem analis membuat sebuah skenario agar konsumen lebih mengerti tentang sistem yang akan diberikan kepada mereka. Kemudian seorang analis melakukan analisa kembali pada kebutuhan sistem untu...
Article
Traditional database are passive in the sense that they perform operations on the database exclusively on specific external request, either request from user or application. Here, a database can not works automatically. Sometimes, passive database cannot handle some conditions that must be run automatically. Therefore the existence of active databa...

Network

Cited By