Implementasi Sistem Analisis Data Customer Berbasis Web untuk Optimalisasi Strategi Pemasaran pada Industri Briket di Pamekasan
Kata Kunci:
sistem analisis data pelanggan, web-based system, strategi pemasaran, industri briket, jaringan komputerAbstrak
Perkembangan pesat dalam teknologi informasi telah mendorong transformasi digital di berbagai sektor industri, termasuk industri kecil dan menengah seperti produsen briket di Pamekasan. Namun, banyak bisnis belum secara optimal memanfaatkan sistem informasi berbasis web dan analisis data pelanggan untuk mendukung strategi pemasaran mereka. Studi ini bertujuan untuk mengembangkan dan mengimplementasikan sistem analisis data pelanggan berbasis web guna meningkatkan efektivitas strategi pemasaran dan efisiensi operasional di industri briket di Pamekasan. Studi ini menggunakan pendekatan penelitian pengembangan sistem berdasarkan model Siklus Hidup Pengembangan Sistem (SDLC) dengan tahap-tahap analisis kebutuhan, desain arsitektur sistem, implementasi, pengujian, dan evaluasi. Sistem dibangun dengan arsitektur tiga lapis menggunakan kerangka kerja Laravel dan basis data MySQL, serta diuji melalui pengujian kotak hitam dan pengukuran kinerja jaringan. Implementasi sistem menunjukkan peningkatan efektivitas pemasaran dari 45% menjadi 80%, efisiensi waktu pemrosesan data hingga 70%, dan pengurangan biaya promosi sebesar 25%. Sistem ini mampu menganalisis perilaku pelanggan, melakukan segmentasi pasar, dan memberikan prediksi permintaan berdasarkan data historis. Kinerja sistem dinilai sangat baik dengan waktu respons rata-rata 1,82 detik dan tingkat akurasi analisis 96,7%. Hasil penelitian membuktikan bahwa sistem analisis data pelanggan berbasis web dapat mengoptimalkan
Unduhan
Referensi
REFERENSI
[1] F. P. E. Putra, M. A. Mahmud, and ..., “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” 2023, researchgate.net. [Online]. Available: https://jurnal.itscience.org/index.php/digitech/article/view/3457
[2] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[3] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.
[4] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” 2024. doi: 10.47709/digitech.v3i2.3446.
[5] F. P. E. Putra and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 175–181, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/236
[6] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.
[7] F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” 2024, pdfs.semanticscholar.org. doi: 10.47709/brilliance.v4i1.4357.
[8] F. Prasetyo Eka Putra, Moh Riski, Riyan, Yayu Rahma Febriani, and Muhammad Umar Mansyur, “Optimization Of Web Based Academic Information System Design To Increase Efficiency In Junior High Schools,” J. Inf. dan Teknol., pp. 150–158, 2024, doi: 10.60083/jidt.v6i2.545.
[9] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.
[10] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[11] F. Alfaverh, M. Denai, and Y. Sun, “A Dynamic Peer-to-Peer Electricity Market Model for a Community Microgrid with Price-Based Demand Response,” IEEE Trans. Smart Grid, vol. 14, no. 5, pp. 3976–3991, 2023, doi: 10.1109/TSG.2023.3246083.
[12] Z. Li, C. Pang, C. Dong, and X. Zeng, “R-YOLOv5: A Lightweight Rotational Object Detection Algorithm for Real-Time Detection of Vehicles in Dense Scenes,” IEEE Access, vol. 11, pp. 61546–61559, 2023, doi: 10.1109/ACCESS.2023.3262601.
[13] J. Van Der Hooft et al., “A Tutorial on Immersive Video Delivery: From Omnidirectional Video to Holography,” IEEE Commun. Surv. Tutorials, vol. 25, no. 2, pp. 1336–1375, 2023, doi: 10.1109/COMST.2023.3263252.
[14] J. Arsenyan and A. Piepenbrink, “Artificial Intelligence Research in Management: A Computational Literature Review,” IEEE Trans. Eng. Manag., vol. 71, pp. 5088–5100, 2024, doi: 10.1109/TEM.2022.3229821.
[15] L. Chen, J. Qi, X. Su, and R. Wang, “REMR: A Reliability Evaluation Method for Dynamic Edge Computing Network Under Time Constraint,” IEEE Internet Things J., vol. 10, no. 5, pp. 4281–4291, 2023, doi: 10.1109/JIOT.2022.3216056.
[16] S. Wu, N. Chen, A. Xiao, P. Zhang, C. Jiang, and W. Zhang, “AI-Empowered Virtual Network Embedding:A Comprehensive Survey,” IEEE Commun. Surv. Tutorials, 2024, doi: 10.1109/COMST.2024.3424533.
[17] S. Park, J. P. Kim, C. Park, S. Jung, and J. Kim, “Quantum Multi-Agent Reinforcement Learning for Autonomous Mobility Cooperation,” IEEE Commun. Mag., vol. 62, no. 6, pp. 106–112, 2024, doi: 10.1109/MCOM.020.2300199.
[18] J. Ascenso, E. Alshina, T. Ebrahimi, and D. Grois, “The JPEG AI Standard: Providing Efficient Human and Machine Visual Data Consumption,” IEEE Multimed., vol. 30, no. 1, pp. 100–111, 2023, doi: 10.1109/MMUL.2023.3245919.
[19] J. Couture and X. Lin, “Novel Image-Based Rapid RUL Prediction for Li-Ion Batteries Using a Capsule Network and Transfer Learning,” IEEE Trans. Transp. Electrif., vol. 9, no. 1, pp. 958–967, 2023, doi: 10.1109/TTE.2022.3173918.
[20] A. A. Khan et al., “GAN-IoTVS: A Novel Internet of Multimedia Things-Enabled Video Streaming Compression Model Using GAN and Fuzzy Logic,” IEEE Sens. J., vol. 23, no. 23, pp. 29434–29441, 2023, doi: 10.1109/JSEN.2023.3316088.
[21] A. K. Bashir et al., “Federated Learning for the Healthcare Metaverse: Concepts, Applications, Challenges, and Future Directions,” IEEE Internet Things J., vol. 10, no. 24, pp. 21873–21891, 2023, doi: 10.1109/JIOT.2023.3304790.
[22] B. Zhou, G. Yang, Z. Shi, and S. Ma, “Natural Language Processing for Smart Healthcare,” IEEE Rev. Biomed. Eng., vol. 17, pp. 4–18, 2024, doi: 10.1109/RBME.2022.3210270.
[23] D. M. Doe, J. Li, N. Dusit, Z. Gao, J. Li, and Z. Han, “Promoting the Sustainability of Blockchain in Web 3.0 and the Metaverse Through Diversified Incentive Mechanism Design,” IEEE Open J. Comput. Soc., vol. 4, pp. 171–184, 2023, doi: 10.1109/OJCS.2023.3260829.
[24] M. Liu, Y. Li, Y. Chen, Y. Qi, and L. Jin, “A Distributed Competitive and Collaborative Coordination for Multirobot Systems,” IEEE Trans. Mob. Comput., vol. 23, no. 12, pp. 11436–11448, 2024, doi: 10.1109/TMC.2024.3397242.
[25] M. Mehic et al., “Quantum Cryptography in 5G Networks: A Comprehensive Overview,” IEEE Commun. Surv. Tutorials, vol. 26, no. 1, pp. 302–346, 2024, doi: 10.1109/COMST.2023.3309051.
[26] M. Zaman, D. Upadhyay, and C. H. Lung, “Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System with SCADA,” IEEE Access, vol. 11, pp. 118414–118426, 2023, doi: 10.1109/ACCESS.2023.3326751.
[27] R. Liu, M. Xie, A. Liu, and H. Song, “Joint Optimization Risk Factor and Energy Consumption in IoT Networks with TinyML-Enabled Internet of UAVs,” IEEE Internet Things J., vol. 11, no. 12, pp. 20983–20994, 2024, doi: 10.1109/JIOT.2023.3348837.
[28] J. D. Lara, R. Henriquez-Auba, D. Ramasubramanian, S. Dhople, D. S. Callaway, and S. Sanders, “Revisiting Power Systems Time-Domain Simulation Methods and Models,” IEEE Trans. Power Syst., vol. 39, no. 2, pp. 2421–2437, 2024, doi: 10.1109/TPWRS.2023.3303291.
[29] D. Rao, T. Xu, and X. J. Wu, “TGFuse: An Infrared and Visible Image Fusion Approach Based on Transformer and Generative Adversarial Network,” IEEE Trans. Image Process., 2023, doi: 10.1109/TIP.2023.3273451.
[30] J. Gu, J. Wang, X. Guo, G. Liu, S. Qin, and Z. Bi, “A Metaverse-Based Teaching Building Evacuation Training System With Deep Reinforcement Learning,” IEEE Trans. Syst. Man, Cybern. Syst., vol. 53, no. 4, pp. 2209–2219, 2023, doi: 10.1109/TSMC.2022.3231299.
[31] P. Song and C. Zhao, “Slow Down to Go Better: A Survey on Slow Feature Analysis,” IEEE Trans. Neural Networks Learn. Syst., vol. 35, no. 3, pp. 3416–3436, 2024, doi: 10.1109/TNNLS.2022.3201621.
[32] Y. Zhao et al., “Mobile Crowdsourcing Quality Control Method Based on Four-Party Evolutionary Game in Edge Cloud Environment,” IEEE Trans. Comput. Soc. Syst., vol. 11, no. 3, pp. 3652–3666, 2024, doi: 10.1109/TCSS.2023.3338370.
[33] S. Li et al., “NDRec: A Near-Data Processing System for Training Large-Scale Recommendation Models,” IEEE Trans. Comput., vol. 73, no. 5, pp. 1248–1261, 2024, doi: 10.1109/TC.2024.3365939.
[34] J. S. Park et al., “A Multi-Mode 8k-MAC HW-Utilization-Aware Neural Processing Unit with a Unified Multi-Precision Datapath in 4-nm Flagship Mobile SoC,” IEEE J. Solid-State Circuits, vol. 58, no. 1, pp. 189–202, 2023, doi: 10.1109/JSSC.2022.3205713.
[35] A. I. Ameur, O. S. Oubbati, A. Lakas, A. Rachedi, and M. B. Yagoubi, “Efficient Vehicular Data Sharing using Aerial P2P Backbone,” IEEE Trans. Intell. Veh., 2024, doi: 10.1109/TIV.2024.3414140.
[36] H. H. Esmat, B. Lorenzo, and W. Shi, “Toward Resilient Network Slicing for Satellite-Terrestrial Edge Computing IoT,” IEEE Internet Things J., vol. 10, no. 16, pp. 14621–14645, 2023, doi: 10.1109/JIOT.2023.3277466.
[37] A. A. Khan et al., “Data Security in Healthcare Industrial Internet of Things With Blockchain,” IEEE Sens. J., vol. 23, no. 20, pp. 25144–25151, 2023, doi: 10.1109/JSEN.2023.3273851.
[38] S. Pancholi, A. Giri, A. Jain, L. Kumar, and S. Roy, “Source Aware Deep Learning Framework for Hand Kinematic Reconstruction Using EEG Signal,” IEEE Trans. Cybern., vol. 53, no. 7, pp. 4094–4106, 2023, doi: 10.1109/TCYB.2022.3166604.
[39] G. Bendiab, A. Hameurlaine, G. Germanos, N. Kolokotronis, and S. Shiaeles, “Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 4, pp. 3614–3637, 2023, doi: 10.1109/TITS.2023.3236274.
[40] A. K. Kushwaha, “What impacts customer experience for B2B enterprises on using AI-enabled chatbots? Insights from Big data analytics,” Ind. Mark. Manag., vol. 98, pp. 207–221, 2021, doi: 10.1016/j.indmarman.2021.08.011.
[41] W. Wu, X. Wang, A. Hawbani, P. Liu, L. Zhao, and A. Al-Dubai, “FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs,” IEEE Trans. Mob. Comput., vol. 22, no. 1, pp. 253–268, 2023, doi: 10.1109/TMC.2021.3074739.
[42] Z. Li et al., “Integrated CNN and Federated Learning for COVID-19 Detection on Chest X-Ray Images,” IEEE/ACM Trans. Comput. Biol. Bioinforma., vol. 21, no. 4, pp. 835–845, 2024, doi: 10.1109/TCBB.2022.3184319.
[43] S. Das and S. Namasudra, “A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems,” IEEE/ACM Trans. Comput. Biol. Bioinforma., vol. 21, no. 4, pp. 1106–1116, 2024, doi: 10.1109/TCBB.2022.3230053.
[44] J. Zhang, B. Chen, R. Xiong, and Y. Zhang, “Physics-Inspired Compressive Sensing: Beyond deep unrolling,” IEEE Signal Process. Mag., vol. 40, no. 1, pp. 58–72, 2023, doi: 10.1109/MSP.2022.3208394.
[45] Y. Yang et al., “Decentralized Cooperative Caching and Offloading for Virtual Reality Task Based on GAN-Powered Multi-Agent Reinforcement Learning,” IEEE Trans. Serv. Comput., vol. 17, no. 1, pp. 291–305, 2024, doi: 10.1109/TSC.2023.3347741.
[46] L. Toderean, V. R. Chifu, T. Cioara, I. Anghel, and C. B. Pop, “Cooperative Games Over Blockchain and Smart Contracts for Self-Sufficient Energy Communities,” IEEE Access, vol. 11, pp. 73982–73999, 2023, doi: 10.1109/ACCESS.2023.3296258.
[47] A. Mahapatra, S. K. Majhi, K. Mishra, R. Pradhan, D. C. Rao, and S. K. Panda, “An Energy-Aware Task Offloading and Load Balancing for Latency-Sensitive IoT Applications in the Fog-Cloud Continuum,” IEEE Access, vol. 12, pp. 14334–14349, 2024, doi: 10.1109/ACCESS.2024.3357122.
[48] E. Sarbazi et al., “Design and Optimization of High-Speed Receivers for 6G Optical Wireless Networks,” IEEE Trans. Commun., vol. 72, no. 2, pp. 971–990, 2024, doi: 10.1109/TCOMM.2023.3328265.
[49] S. Rani, H. Babbar, G. Srivastava, T. R. Gadekallu, and G. Dhiman, “Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain,” IEEE Internet Things J., vol. 10, no. 7, pp. 6074–6081, 2023, doi: 10.1109/JIOT.2022.3223576.
[50] Y. Wang, J. Fang, Y. Cheng, H. She, Y. Guo, and G. Zheng, “Cooperative End-Edge-Cloud Computing and Resource Allocation for Digital Twin Enabled 6G Industrial IoT,” IEEE J. Sel. Top. Signal Process., vol. 18, no. 1, pp. 124–137, 2024, doi: 10.1109/JSTSP.2023.3345154.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Marzuq, Syahdayana Arifin, Seindi Pujiastutik Dwiyanti (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








