Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University
DOI:
https://doi.org/10.34306/ijcitsm.v1i2.55Keywords:
Data Warehouse, Data Mining, Academic Data.Abstract
If an organisation has full, rapid, exact, and accurate information, it may perform better in terms of evaluation, planning, and decision-making. The essential information can be derived from operational data maintained in an integrated database by a university that already has an information system. This research looks at how to collect operational data into a data warehouse and then apply data mining techniques to analyse the data. This study yielded a comprehensive data warehouse with a web-based information reporting application. Furthermore, data mining techniques are used to analyse the data warehouse that has been created. The result of the application of data mining is the generation of characteristic patterns of students who take certain specialization programs.
References
D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28.
D. Cahyadi, A. Faturahman, H. Haryani, E. Dolan, and S. millah, “BCS : Blockchain Smart Curriculum System for Verification Student Accreditation,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 65–83, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/20.
T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58.
M. Mulyati, I. Ilamsyah, A. Aris, iketut gunawan, and M. Suzaki Zahran, “Blockchain Technology: Can Data Security Change Higher Education Much Better?,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 121–135, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/36.
G. Maulani, G. Gunawan, L. Leli, E. Ayu Nabila, and W. Yestina Sari, “Digital Certificate Authority with Blockchain Cybersecurity in Education,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 136–150, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/40.
T. Nurhaeni, N. Lutfiani, A. Singh, W. Febriani, and M. Hardini, “The Value of Technological Developments Based on An Islamic Perspective,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 1–13, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/4.
N. P. Puji, A. Dudhat, H. Teja Sukmana, A. Mardiansyah, and M. Hardini, “Modern Technology Advances with Benefits for Humanity to Demonstrate Design with Conventional Sources Islamic,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 14–36, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/8.
B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2, pp. 173–179, 2021.
P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55.
P. Edastama, A. S. Bist, and A. Prambudi, “Implementation Of Data Mining On Glasses Sales Using The Apriori Algorithm,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 159–172, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/46.
Y. Durachman, A. Sean Bein, E. Purnama Harahap, T. Ramadhan, and F. Putri Oganda, “Technological and Islamic environments: Selection from Literature Review Resources,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 37–47, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/12.
D. Apriani, A. Williams, U. Rahardja, A. Khoirunisa, and S. Avionita, “The Use of Science Technology In Islamic Practices and Rules In The Past Now and The Future,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 48–64, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/16.
I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64.
M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53.
W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49.
S. Watini, T. Nurhaeni, and L. Meria, “Development Of Village Office Service Models To Community Based On Mobile Computing,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 189–196, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/51.
A. Alwiyah, S. Husin, P. Padeli, M. Anggaraeni, and S. Sulistiawati, “Alignment of Science and Technology With Islamic Principles Using Quantum Theory,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 115–120, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/32.
T. Ramadhan, Q. Aini, S. Santoso, A. Badrianto, and R. Supriati, “Analysis of the potential context of Blockchain on the usability of Gamification with Game-Based Learning,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 84–100, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/24.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Primasatria Edastama, Amitkumar Dudhat, Giandari Maulani.
This work is licensed under a Creative Commons Attribution 4.0 International License.