Implementation of a Web-Based Customer Data Analysis System to Optimize Marketing Strategies in the Briquette Industry in Pamekasan

Authors

  • Marzuq universitas madura Author
  • Syahdayana Arifin universitas madura Author
  • Seindi Pujiastutik Dwiyanti universitas madura Author

Keywords:

Customer data analysis system, web-based system, marketing strategy, briquette industry, computer network

Abstract

Rapid developments in information technology have driven digital transformation in various industrial sectors, including small and medium-sized industries such as briquette manufacturers in Pamekasan. However, many businesses have not optimally utilized web-based information systems and customer data analysis to support their marketing strategies. This study aims to develop and implement a web-based customer data analysis system to improve the effectiveness of marketing strategies and operational efficiency in the briquette industry in Pamekasan. This study uses a system development research approach based on the System Development Life Cycle (SDLC) model with stages of requirements analysis, system architecture design, implementation, testing, and evaluation. The system was built with a three-layer architecture using the Laravel framework and MySQL database, and tested through black box testing and network performance measurements. The implementation of the system showed an increase in marketing effectiveness from 45% to 80%, data processing time efficiency of up to 70%, and a 25% reduction in promotion costs. This system is capable of analyzing customer behavior, performing market segmentation, and providing demand predictions based on historical data. The system's performance was rated as excellent with an average response time of 1.82 seconds and an analysis accuracy rate of 96.7%. The results of the study prove that a web-based customer data analysis system can optimize

Downloads

Download data is not yet available.

Author Biographies

  • Marzuq, universitas madura

    Informatics Department, University of Madura

  • Syahdayana Arifin, universitas madura

    Informatics Department, University of Madura

  • Seindi Pujiastutik Dwiyanti, universitas madura

    Informatics Department, University of Madura

References

REFERENSI

[1] F. P. E. Putra, M. A. Mahmud, and ..., “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” 2023, researchgate.net. [Online]. Available: https://jurnal.itscience.org/index.php/digitech/article/view/3457

[2] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.

[3] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.

[4] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” 2024. doi: 10.47709/digitech.v3i2.3446.

[5] F. P. E. Putra and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 175–181, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/236

[6] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.

[7] F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” 2024, pdfs.semanticscholar.org. doi: 10.47709/brilliance.v4i1.4357.

[8] F. Prasetyo Eka Putra, Moh Riski, Riyan, Yayu Rahma Febriani, and Muhammad Umar Mansyur, “Optimization Of Web Based Academic Information System Design To Increase Efficiency In Junior High Schools,” J. Inf. dan Teknol., pp. 150–158, 2024, doi: 10.60083/jidt.v6i2.545.

[9] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.

[10] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[11] F. Alfaverh, M. Denai, and Y. Sun, “A Dynamic Peer-to-Peer Electricity Market Model for a Community Microgrid with Price-Based Demand Response,” IEEE Trans. Smart Grid, vol. 14, no. 5, pp. 3976–3991, 2023, doi: 10.1109/TSG.2023.3246083.

[12] Z. Li, C. Pang, C. Dong, and X. Zeng, “R-YOLOv5: A Lightweight Rotational Object Detection Algorithm for Real-Time Detection of Vehicles in Dense Scenes,” IEEE Access, vol. 11, pp. 61546–61559, 2023, doi: 10.1109/ACCESS.2023.3262601.

[13] J. Van Der Hooft et al., “A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography,” IEEE Commun. Surv. Tutorials, vol. 25, no. 2, pp. 1336–1375, 2023, doi: 10.1109/COMST.2023.3263252.

[14] J. Arsenyan and A. Piepenbrink, “Artificial Intelligence Research in Management: A Computational Literature Review,” IEEE Trans. Eng. Manag., vol. 71, pp. 5088–5100, 2024, doi: 10.1109/TEM.2022.3229821.

[15] L. Chen, J. Qi, X. Su, and R. Wang, “REMR: A Reliability Evaluation Method for Dynamic Edge Computing Network Under Time Constraint,” IEEE Internet Things J., vol. 10, no. 5, pp. 4281–4291, 2023, doi: 10.1109/JIOT.2022.3216056.

[16] S. Wu, N. Chen, A. Xiao, P. Zhang, C. Jiang, and W. Zhang, “AI-Empowered Virtual Network Embedding:A Comprehensive Survey,” IEEE Commun. Surv. Tutorials, 2024, doi: 10.1109/COMST.2024.3424533.

[17] S. Park, J. P. Kim, C. Park, S. Jung, and J. Kim, “Quantum Multi-Agent Reinforcement Learning for Autonomous Mobility Cooperation,” IEEE Commun. Mag., vol. 62, no. 6, pp. 106–112, 2024, doi: 10.1109/MCOM.020.2300199.

[18] J. Ascenso, E. Alshina, T. Ebrahimi, and D. Grois, “The JPEG AI Standard: Providing Efficient Human and Machine Visual Data Consumption,” IEEE Multimed., vol. 30, no. 1, pp. 100–111, 2023, doi: 10.1109/MMUL.2023.3245919.

[19] J. Couture and X. Lin, “Novel Image-Based Rapid RUL Prediction for Li-Ion Batteries Using a Capsule Network and Transfer Learning,” IEEE Trans. Transp. Electrif., vol. 9, no. 1, pp. 958–967, 2023, doi: 10.1109/TTE.2022.3173918.

[20] A. A. Khan et al., “GAN-IoTVS: A Novel Internet of Multimedia Things-Enabled Video Streaming Compression Model Using GAN and Fuzzy Logic,” IEEE Sens. J., vol. 23, no. 23, pp. 29434–29441, 2023, doi: 10.1109/JSEN.2023.3316088.

[21] A. K. Bashir et al., “Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions,” IEEE Internet Things J., vol. 10, no. 24, pp. 21873–21891, 2023, doi: 10.1109/JIOT.2023.3304790.

[22] B. Zhou, G. Yang, Z. Shi, and S. Ma, “Natural Language Processing for Smart Healthcare,” IEEE Rev. Biomed. Eng., vol. 17, pp. 4–18, 2024, doi: 10.1109/RBME.2022.3210270.

[23] D. M. Doe, J. Li, N. Dusit, Z. Gao, J. Li, and Z. Han, “Promoting the Sustainability of Blockchain in Web 3.0 and the Metaverse Through Diversified Incentive Mechanism Design,” IEEE Open J. Comput. Soc., vol. 4, pp. 171–184, 2023, doi: 10.1109/OJCS.2023.3260829.

[24] M. Liu, Y. Li, Y. Chen, Y. Qi, and L. Jin, “A Distributed Competitive and Collaborative Coordination for Multirobot Systems,” IEEE Trans. Mob. Comput., vol. 23, no. 12, pp. 11436–11448, 2024, doi: 10.1109/TMC.2024.3397242.

[25] M. Mehic et al., “Quantum Cryptography in 5G Networks: A Comprehensive Overview,” IEEE Commun. Surv. Tutorials, vol. 26, no. 1, pp. 302–346, 2024, doi: 10.1109/COMST.2023.3309051.

[26] M. Zaman, D. Upadhyay, and C. H. Lung, “Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System with SCADA,” IEEE Access, vol. 11, pp. 118414–118426, 2023, doi: 10.1109/ACCESS.2023.3326751.

[27] R. Liu, M. Xie, A. Liu, and H. Song, “Joint Optimization Risk Factor and Energy Consumption in IoT Networks with TinyML-Enabled Internet of UAVs,” IEEE Internet Things J., vol. 11, no. 12, pp. 20983–20994, 2024, doi: 10.1109/JIOT.2023.3348837.

[28] J. D. Lara, R. Henriquez-Auba, D. Ramasubramanian, S. Dhople, D. S. Callaway, and S. Sanders, “Revisiting Power Systems Time-Domain Simulation Methods and Models,” IEEE Trans. Power Syst., vol. 39, no. 2, pp. 2421–2437, 2024, doi: 10.1109/TPWRS.2023.3303291.

[29] D. Rao, T. Xu, and X. J. Wu, “TGFuse: An Infrared and Visible Image Fusion Approach Based on Transformer and Generative Adversarial Network,” IEEE Trans. Image Process., 2023, doi: 10.1109/TIP.2023.3273451.

[30] J. Gu, J. Wang, X. Guo, G. Liu, S. Qin, and Z. Bi, “A Metaverse-Based Teaching Building Evacuation Training System With Deep Reinforcement Learning,” IEEE Trans. Syst. Man, Cybern. Syst., vol. 53, no. 4, pp. 2209–2219, 2023, doi: 10.1109/TSMC.2022.3231299.

[31] P. Song and C. Zhao, “Slow Down to Go Better: A Survey on Slow Feature Analysis,” IEEE Trans. Neural Networks Learn. Syst., vol. 35, no. 3, pp. 3416–3436, 2024, doi: 10.1109/TNNLS.2022.3201621.

[32] Y. Zhao et al., “Mobile Crowdsourcing Quality Control Method Based on Four-Party Evolutionary Game in Edge Cloud Environment,” IEEE Trans. Comput. Soc. Syst., vol. 11, no. 3, pp. 3652–3666, 2024, doi: 10.1109/TCSS.2023.3338370.

[33] S. Li et al., “NDRec: A Near-Data Processing System for Training Large-Scale Recommendation Models,” IEEE Trans. Comput., vol. 73, no. 5, pp. 1248–1261, 2024, doi: 10.1109/TC.2024.3365939.

[34] J. S. Park et al., “A Multi-Mode 8k-MAC HW-Utilization-Aware Neural Processing Unit with a Unified Multi-Precision Datapath in 4-nm Flagship Mobile SoC,” IEEE J. Solid-State Circuits, vol. 58, no. 1, pp. 189–202, 2023, doi: 10.1109/JSSC.2022.3205713.

[35] A. I. Ameur, O. S. Oubbati, A. Lakas, A. Rachedi, and M. B. Yagoubi, “Efficient Vehicular Data Sharing using Aerial P2P Backbone,” IEEE Trans. Intell. Veh., 2024, doi: 10.1109/TIV.2024.3414140.

[36] H. H. Esmat, B. Lorenzo, and W. Shi, “Toward Resilient Network Slicing for Satellite-Terrestrial Edge Computing IoT,” IEEE Internet Things J., vol. 10, no. 16, pp. 14621–14645, 2023, doi: 10.1109/JIOT.2023.3277466.

[37] A. A. Khan et al., “Data Security in Healthcare Industrial Internet of Things With Blockchain,” IEEE Sens. J., vol. 23, no. 20, pp. 25144–25151, 2023, doi: 10.1109/JSEN.2023.3273851.

[38] S. Pancholi, A. Giri, A. Jain, L. Kumar, and S. Roy, “Source Aware Deep Learning Framework for Hand Kinematic Reconstruction Using EEG Signal,” IEEE Trans. Cybern., vol. 53, no. 7, pp. 4094–4106, 2023, doi: 10.1109/TCYB.2022.3166604.

[39] G. Bendiab, A. Hameurlaine, G. Germanos, N. Kolokotronis, and S. Shiaeles, “Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 4, pp. 3614–3637, 2023, doi: 10.1109/TITS.2023.3236274.

[40] A. K. Kushwaha, “What impacts customer experience for B2B enterprises on using AI-enabled chatbots? Insights from Big data analytics,” Ind. Mark. Manag., vol. 98, pp. 207–221, 2021, doi: 10.1016/j.indmarman.2021.08.011.

[41] W. Wu, X. Wang, A. Hawbani, P. Liu, L. Zhao, and A. Al-Dubai, “FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs,” IEEE Trans. Mob. Comput., vol. 22, no. 1, pp. 253–268, 2023, doi: 10.1109/TMC.2021.3074739.

[42] Z. Li et al., “Integrated CNN and Federated Learning for COVID-19 Detection on Chest X-Ray Images,” IEEE/ACM Trans. Comput. Biol. Bioinforma., vol. 21, no. 4, pp. 835–845, 2024, doi: 10.1109/TCBB.2022.3184319.

[43] S. Das and S. Namasudra, “A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems,” IEEE/ACM Trans. Comput. Biol. Bioinforma., vol. 21, no. 4, pp. 1106–1116, 2024, doi: 10.1109/TCBB.2022.3230053.

[44] J. Zhang, B. Chen, R. Xiong, and Y. Zhang, “Physics-Inspired Compressive Sensing: Beyond deep unrolling,” IEEE Signal Process. Mag., vol. 40, no. 1, pp. 58–72, 2023, doi: 10.1109/MSP.2022.3208394.

[45] Y. Yang et al., “Decentralized Cooperative Caching and Offloading for Virtual Reality Task Based on GAN-Powered Multi-Agent Reinforcement Learning,” IEEE Trans. Serv. Comput., vol. 17, no. 1, pp. 291–305, 2024, doi: 10.1109/TSC.2023.3347741.

[46] L. Toderean, V. R. Chifu, T. Cioara, I. Anghel, and C. B. Pop, “Cooperative Games Over Blockchain and Smart Contracts for Self-Sufficient Energy Communities,” IEEE Access, vol. 11, pp. 73982–73999, 2023, doi: 10.1109/ACCESS.2023.3296258.

[47] A. Mahapatra, S. K. Majhi, K. Mishra, R. Pradhan, D. C. Rao, and S. K. Panda, “An Energy-Aware Task Offloading and Load Balancing for Latency-Sensitive IoT Applications in the Fog-Cloud Continuum,” IEEE Access, vol. 12, pp. 14334–14349, 2024, doi: 10.1109/ACCESS.2024.3357122.

[48] E. Sarbazi et al., “Design and Optimization of High-Speed Receivers for 6G Optical Wireless Networks,” IEEE Trans. Commun., vol. 72, no. 2, pp. 971–990, 2024, doi: 10.1109/TCOMM.2023.3328265.

[49] S. Rani, H. Babbar, G. Srivastava, T. R. Gadekallu, and G. Dhiman, “Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain,” IEEE Internet Things J., vol. 10, no. 7, pp. 6074–6081, 2023, doi: 10.1109/JIOT.2022.3223576.

[50] Y. Wang, J. Fang, Y. Cheng, H. She, Y. Guo, and G. Zheng, “Cooperative End-Edge-Cloud Computing and Resource Allocation for Digital Twin Enabled 6G Industrial IoT,” IEEE J. Sel. Top. Signal Process., vol. 18, no. 1, pp. 124–137, 2024, doi: 10.1109/JSTSP.2023.3345154.

Published

22-10-2025

How to Cite

Implementation of a Web-Based Customer Data Analysis System to Optimize Marketing Strategies in the Briquette Industry in Pamekasan. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 1(01). https://ejournal.omahtabing.com/knj/article/view/21

Most read articles by the same author(s)