SlideShare a Scribd company logo
TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1852~1857
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI:10.12928/TELKOMNIKA.v15i4.5640  1852
Received August 23, 2017; Revised November 12, 2017; Accepted November 28, 2017
Zakah Management System using Approach
Classification
Zulfajri Basri Hasanuddin, Syafruddin Syarif, Darniati
Department of Electrical Engineering, Hasanuddin University, Makassar
*Corresponding author, e-mail: zulfajri@unhas.ac.id, ssyariftuh@gmail.com, darni.dp@gmail.com
Abstract
The often problematic faced by Muslims arelack of understanding in calculating Zakahand
determining the feasibility of compliant recipients based on Islamic Shari'a. This study aimed to establish
Zakah management system to support calculation process based on Al Qaradhawi method, helping Board
of Zakahin distributing Zakah funds to mustahik. The algorithm used for the classification of
Zakahrecipients is Naive Bayes. The classification was combination of discreteand continuous data which
is conducted by experiments using feasible and unfeasible data as a novelty approach.The results have
shown thatthe Naive Bayes method could solve the problem with 85% of average.
Keywords: mustahik, Al Qaradawi, Naive Bayes
Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Zakahis one of the pillars of Islam that must be implemented by Muslims, the collected
Zakah funds will be distributed to the beneficiary (mustahik). The dense activity and lack of
understanding in calculating the amount of Zakah that must be spent mainly maalZakah
(wealth) is often be an obstacle for musakki to pay maal Zakah, moreover, the main problematic
faced by Board of Zakah is the problem of the distribution of non-targeted Zakah funds in
accordance with Islamic law because of the difficulty of measuring the economic level of the
Zakah recipients. Zakah funds is one of the financial assistance that is instrumental in changing
economic circumstances mustahik be musakki, one of them with their small capital support
provided by the Board of Zakah [1, 2], [5-7]. This makes the author to provide a solution to the
problem encountered during this time, which makes a mobile web application that can be
accessed anytime and anywhere with the internet networkand can facilitate musakki to calculate
tithe and maal Zakah, as well as facilitate Board ofZakah in determining the eligibility of
recipients [2, 3].
Several studies on the management of Zakah funds that have been done by previous
researchers, Assessing the Satisfaction Level of Zakah Recipients Towards Zakah
Management, the research on the identification of the media information that is used by the
receiver to obtain information about the distribution of Zakah and to assess the level of
satisfaction of recipients of the management of Zakah [1]. Other studies Fault Diagnosis for Fuel
Cell based on Naive Bayesian Classification, classification fault diagnosis system proton
exchange fuel cell with Naive Bayes classification method [4].
2. Methods
2.1. The concept of Zakah
Zakah is one of the pillars of Islam, including the part of the building (Islam), as
described in the Qur'an and Sunnah, even Allah mentioned in the Qur'an in parallel with prayers
at eighty-two places, it showed high notch Zakah.
Allah Subhaanahu WaTa'aala said In Qur’an as follows,
"And steadfast in prayer, pay the poor due, and bow with those who bow" (QS. Al-
Baqarah: 43).
TELKOMNIKA ISSN: 1693-6930 
Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin)
1853
Zakah consists of two types: Maal Zakah is obligatory Zakah issued by Muslims who
have reached enough nishab and haul. Tithe is the obligatory soul Zakah for all Muslims ranging
from birth and during the life of the world, which is paid each month of Ramadan.
2.2. Al Qaradhawi Method
The Al Qaradhawi calculating method is a method of calculating Zakah based on Yusuf
al Qaradawi’s premise perspective where it used theistinbat method. Etymologically, istinbat
means the discovery, excavation, expenditure (of origin), meaningful laws, regulations and
powers.
2.3. Naive Bayes Classifier
Naive Bayes is a machine learning method that uses probability calculations. This
algorithm utilizes the methods of probability and statisticwhich are stated by the British scientist
Thomas Bayes, that predict the probability in the future based on past experience. Naive Bayes
method is shown to have an accuracy and a very high speed when it is applied to a database
with a large data. The basis of the Naive Bayes theorem thatis used in the programming is the
Bayes formula:
The flow of Naive Bayes method can be seen in Figure 1,
Figure 1. The Naive Bayes Method Flow
Start
Read Training Data
Is it numeric data
Quantity and
Probability
Mean of each
Parameter
Probability Table Standard Deviation for
each Parameter
Mean Standard
Deviation Table
Solution
Stop
No Yes
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1852 – 1857
1854
Description:
a. Read the training data.
b. Calculate the amount and probability, but if the numerical data:
Find the mean and standard deviation of each parameter whichis numeric data.
The equation used to calculate the average arithmetic value (mean) can be seen as follows:
Or
Where :
μ: arithmetic average (mean)
xi: samples value to -i
n: number of samples
And equations to calculate the standard deviation (standard deviation) can be seen as follows:
Where :
σ: standard deviation
xi: value of x to -i
μ: average count
n: number of samples
Find probabilistic value by counting the number of the corresponding data from the
same category divided by the amount of data in the category.
Getting the values in the mean table, standard deviation and probability.
The solution is then generated.
3. Results and Analysis
3.1. Program Testing
This test was conducted to determine how to use the program, the speed of the
program and the ability of the program to perform the classification. The program test was
conducted using the confusion matrix method in which the author attempted four times and then
calculate the accuracy and error.
3.2. Program Usage
On the use of the program will be shown how to run Zakah Application. Musakki party
can open the website link of Zakah applications then perform the calculation process, as for the
types of Zakah contained in the system, namely Gold and silver Zakah, money Zakah and
securities, commercial Zakah (enterprise), agriculture Zakah, charity farm, income Zakah, and
rikaz Zakah (artifacts). User calculate the Zakah on owned property by input the amount of
assets being owned by type and then the system will calculate, if the nishab referring to the gold
price, the system will automatically calculate based on the prevailing price of Antam’s gold in
Indonesia, moreover, the system displays the calculation results of each types of Zakah and
sum the total shown in the results that can be seen in the following figure:
TELKOMNIKA ISSN: 1693-6930 
Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin)
1855
Figure 2. The calculation of maal Zakah
3.3 Classification Prospective Zakah Recipients
Distribution of Zakah funds by Board of Zakah Al Markaz, Makassar, South Sulawesi is
done after determining mustahik using the classification process. Classification is made using
discreteand continuous data which is conducted by experiments using feasible and unfeasible
data. Examples of data that we use in the experiment are described in the Table 1:
Table 1. Total Practice and Test Data
Practice Data Test Data
Feasible Unfeasible Feasible Unfeasible
200 150 25 25
In the fourth experiment, the authors tested the 350 practice data consisting of 200
feasible data and 150 unfeasible data. Tested with 50 pieces of test data. With details of 25
feasible and 25 unfeasible data. To determine a mustahik candidate is classified in the feasible
or unfeasible class. Then the 7 features that will be used are as follows:
a. Income
b. Amenability
c. Ownership of Assets.
d. Surface area.
e. Wall Types.
f. Floor Types.
g. Last Education.
Board of Zakah admin performs the data entry of mustahik candidate on the form of test
data that is displayed as shown in Figure 3.
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1852 – 1857
1856
Figure 3. Mustahik Candidate Data Input Form
After the data of candidate mustahiq was input as in Figure 3, the program will make the
process of classification using Naive Bayes method, then the system will show the calculation
results of classification which resulted in a decision support system that states a candidate
mustahik eligible to receive Zakah and entered in the mustahik category as shown in the
Figure 4.
Figure 4. The results of the mustahik prospective classification
TELKOMNIKA ISSN: 1693-6930 
Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin)
1857
The use of the Naïve Bayes classifier method to classified the feasible and unfeasible of
theZakahreceiver is an effective and productive way. Due to the ease in determining of mustahik
candidates as is done by computerization with the terms and conditions in making decisions.
The author has conducted four experiments as shown in Table 2:
Table 2. Number of Practice and Test Data 4 Times Trial
Trial Practice Data Test Data
Percentage
Feasible Unfeasible Feasible Unfeasible
1 45 70 25 25 84%
2 85 70 25 25 84.5%
3 100 100 25 25 86%
4 150 110 25 25 88%
Where the results of the final percentage of the accuracy of the program's success is
the result of percentage of accuracy:
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
84 + 84 + 86 + 88
4
∗ 100
=
342
4
∗ 100
= 85%
Accuracy or precision of the program that we have created with the use of Naive Bayes
methods experience the difference at every change of practice data that author used. Thus, it is
known that mustahik classification program that we made is very dependent and influenced by
the used data set.
4. Conclusion
Based on the results of the study as described above, it can be concluded that this
application can help musakki for calculating maal Zakah and tithes, using Naive Bayes as a
method of classification and can facilitate the Board of Zakah in determining whether a resident
is feasible or not to receive Zakah based on Islam Shari'a. The built program has shown the
final percentage of the accuracy is at average 85%. It is hoped that the development of program
can be combine with GIS in order to easily identify the mustahik address and region.
References
[1] Ahmada Adzrin Raja Raja Ahmad Marzuki Amiruddin Othmanb, Sufiyudin Muhammad Salleh.
Assessing the Satisfaction Level towards Recipients of Zakat Zakat Management. International
Accounting and Business Conference, Science Direct. 2015.
[2] Fenty EM A, Khodijah Hulliyah, Mayang Ekafitri. Applying Mobile Application Development Life Cycle
in the Development of Zakat Maal Mobile Web Application Using JQuery Mobile Framework. IEEE
Conference Publications. 2014: 89-92.
[3] Heit Kotter, Henning, Tim A. Majchrzak, Benjamin Ruland and Till Weber, "Evaluating Frameworks to
create Mobile Web Apps". the International 9
th
Konferensi dan Teknologi Web Information Systems,
2013
[4] Liping Fan, Xing Huang, Liu Yi. Fault Diagnosis for Fuel Cell based on Naive Bayesian
Classification. TELKOMNIKA. 2013; 11(12): pp. 7664 ~ 7670 e-ISSN: 2087-278X.
[5] Muhammad Syukri Salleh1. Organizational And definitional reconfiguration Of Zakat
Management. International Journal of Education and Research. 2014; 2(5).
[6] Rizuan Abdul Kadir Mohd Zulkifli Zainal Abidin, Juliana Anis Ramli, Khairul Nizam Surbaini, Factors
Influencing A Business Towards Zakat Payment In Malaysia. International Journal of Science
Commerce and Humanities. 2014; 2(3).
[7] Ram Saad Al Jaffri, Norazita Marina Abdul Aziz, Norfaiezah Sawandi. Islamic accountability
framework in the Zakat funds management. International Conference on Accounting Studies, ICAS.
2014.

More Related Content

What's hot

IRJET- Disease Prediction using Machine Learning
IRJET-  	  Disease Prediction using Machine LearningIRJET-  	  Disease Prediction using Machine Learning
IRJET- Disease Prediction using Machine Learning
IRJET Journal
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Editor IJARCET
 
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
IRJET Journal
 
Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...
IAEME Publication
 
Trust Enhanced Role Based Access Control Using Genetic Algorithm
Trust Enhanced Role Based Access Control Using Genetic Algorithm Trust Enhanced Role Based Access Control Using Genetic Algorithm
Trust Enhanced Role Based Access Control Using Genetic Algorithm
IJECEIAES
 
Optimization of network traffic anomaly detection using machine learning
Optimization of network traffic anomaly detection using machine learning Optimization of network traffic anomaly detection using machine learning
Optimization of network traffic anomaly detection using machine learning
IJECEIAES
 

What's hot (7)

IRJET- Disease Prediction using Machine Learning
IRJET-  	  Disease Prediction using Machine LearningIRJET-  	  Disease Prediction using Machine Learning
IRJET- Disease Prediction using Machine Learning
 
Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397Ijarcet vol-2-issue-4-1393-1397
Ijarcet vol-2-issue-4-1393-1397
 
Final ppt
Final pptFinal ppt
Final ppt
 
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
 
Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...
 
Trust Enhanced Role Based Access Control Using Genetic Algorithm
Trust Enhanced Role Based Access Control Using Genetic Algorithm Trust Enhanced Role Based Access Control Using Genetic Algorithm
Trust Enhanced Role Based Access Control Using Genetic Algorithm
 
Optimization of network traffic anomaly detection using machine learning
Optimization of network traffic anomaly detection using machine learning Optimization of network traffic anomaly detection using machine learning
Optimization of network traffic anomaly detection using machine learning
 

Similar to Zakah Management System using Approach Classification

DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERSDEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
IJCSEA Journal
 
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERSDEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
IJCSEA Journal
 
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
AM Publications
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection
IJSTA
 
Improving collaborative filtering using lexicon-based sentiment analysis
Improving collaborative filtering using lexicon-based sentiment  analysisImproving collaborative filtering using lexicon-based sentiment  analysis
Improving collaborative filtering using lexicon-based sentiment analysis
IJECEIAES
 
IRJET- Analysis of Question and Answering Recommendation System
IRJET-  	  Analysis of Question and Answering Recommendation SystemIRJET-  	  Analysis of Question and Answering Recommendation System
IRJET- Analysis of Question and Answering Recommendation System
IRJET Journal
 
QMRAS Project Presentation
QMRAS Project PresentationQMRAS Project Presentation
QMRAS Project Presentation
Gary Spencer
 
Empirical evaluation of continuous auditing system use: a systematic review
Empirical evaluation of continuous auditing system use:  a systematic reviewEmpirical evaluation of continuous auditing system use:  a systematic review
Empirical evaluation of continuous auditing system use: a systematic review
IJECEIAES
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
ShrutiGarg649495
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classification
Somdeep Sen
 
Educational Data Mining to Analyze Students Performance – Concept Plan
Educational Data Mining to Analyze Students Performance – Concept PlanEducational Data Mining to Analyze Students Performance – Concept Plan
Educational Data Mining to Analyze Students Performance – Concept Plan
IRJET Journal
 
A novel population-based local search for nurse rostering problem
A novel population-based local search  for nurse rostering problem A novel population-based local search  for nurse rostering problem
A novel population-based local search for nurse rostering problem
IJECEIAES
 
Enhancing feature selection with a novel hybrid approach incorporating geneti...
Enhancing feature selection with a novel hybrid approach incorporating geneti...Enhancing feature selection with a novel hybrid approach incorporating geneti...
Enhancing feature selection with a novel hybrid approach incorporating geneti...
IJECEIAES
 
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptxPPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
BereketRegassa1
 
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified ApproachImplementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
rahulmonikasharma
 
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified ApproachImplementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
rahulmonikasharma
 
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work FeasibilityImplementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
Universitas Pembangunan Panca Budi
 
B05110409
B05110409B05110409
B05110409
IOSR-JEN
 
A Review On Recommender Systems For University Admissions
A Review On Recommender Systems For University AdmissionsA Review On Recommender Systems For University Admissions
A Review On Recommender Systems For University Admissions
Becky Gilbert
 
Fuzzy Association Rule Mining based Model to Predict Students’ Performance
Fuzzy Association Rule Mining based Model to Predict Students’ Performance Fuzzy Association Rule Mining based Model to Predict Students’ Performance
Fuzzy Association Rule Mining based Model to Predict Students’ Performance
IJECEIAES
 

Similar to Zakah Management System using Approach Classification (20)

DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERSDEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
 
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERSDEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
DEVELOPING A CASE-BASED RETRIEVAL SYSTEM FOR SUPPORTING IT CUSTOMERS
 
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
Expert System to Determine the Priority Scale of Case in Laboratory of Forens...
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection
 
Improving collaborative filtering using lexicon-based sentiment analysis
Improving collaborative filtering using lexicon-based sentiment  analysisImproving collaborative filtering using lexicon-based sentiment  analysis
Improving collaborative filtering using lexicon-based sentiment analysis
 
IRJET- Analysis of Question and Answering Recommendation System
IRJET-  	  Analysis of Question and Answering Recommendation SystemIRJET-  	  Analysis of Question and Answering Recommendation System
IRJET- Analysis of Question and Answering Recommendation System
 
QMRAS Project Presentation
QMRAS Project PresentationQMRAS Project Presentation
QMRAS Project Presentation
 
Empirical evaluation of continuous auditing system use: a systematic review
Empirical evaluation of continuous auditing system use:  a systematic reviewEmpirical evaluation of continuous auditing system use:  a systematic review
Empirical evaluation of continuous auditing system use: a systematic review
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classification
 
Educational Data Mining to Analyze Students Performance – Concept Plan
Educational Data Mining to Analyze Students Performance – Concept PlanEducational Data Mining to Analyze Students Performance – Concept Plan
Educational Data Mining to Analyze Students Performance – Concept Plan
 
A novel population-based local search for nurse rostering problem
A novel population-based local search  for nurse rostering problem A novel population-based local search  for nurse rostering problem
A novel population-based local search for nurse rostering problem
 
Enhancing feature selection with a novel hybrid approach incorporating geneti...
Enhancing feature selection with a novel hybrid approach incorporating geneti...Enhancing feature selection with a novel hybrid approach incorporating geneti...
Enhancing feature selection with a novel hybrid approach incorporating geneti...
 
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptxPPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
PPT_for_DRC_5_data_presentation_&_test_for_assumptions.pptx
 
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified ApproachImplementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
 
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified ApproachImplementation of Banker’s Algorithm Using Dynamic Modified Approach
Implementation of Banker’s Algorithm Using Dynamic Modified Approach
 
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work FeasibilityImplementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
Implementation of Fuzzy Tsukamoto Algorithm in Determining Work Feasibility
 
B05110409
B05110409B05110409
B05110409
 
A Review On Recommender Systems For University Admissions
A Review On Recommender Systems For University AdmissionsA Review On Recommender Systems For University Admissions
A Review On Recommender Systems For University Admissions
 
Fuzzy Association Rule Mining based Model to Predict Students’ Performance
Fuzzy Association Rule Mining based Model to Predict Students’ Performance Fuzzy Association Rule Mining based Model to Predict Students’ Performance
Fuzzy Association Rule Mining based Model to Predict Students’ Performance
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

Zakah Management System using Approach Classification

  • 1. TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1852~1857 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI:10.12928/TELKOMNIKA.v15i4.5640  1852 Received August 23, 2017; Revised November 12, 2017; Accepted November 28, 2017 Zakah Management System using Approach Classification Zulfajri Basri Hasanuddin, Syafruddin Syarif, Darniati Department of Electrical Engineering, Hasanuddin University, Makassar *Corresponding author, e-mail: zulfajri@unhas.ac.id, ssyariftuh@gmail.com, darni.dp@gmail.com Abstract The often problematic faced by Muslims arelack of understanding in calculating Zakahand determining the feasibility of compliant recipients based on Islamic Shari'a. This study aimed to establish Zakah management system to support calculation process based on Al Qaradhawi method, helping Board of Zakahin distributing Zakah funds to mustahik. The algorithm used for the classification of Zakahrecipients is Naive Bayes. The classification was combination of discreteand continuous data which is conducted by experiments using feasible and unfeasible data as a novelty approach.The results have shown thatthe Naive Bayes method could solve the problem with 85% of average. Keywords: mustahik, Al Qaradawi, Naive Bayes Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Zakahis one of the pillars of Islam that must be implemented by Muslims, the collected Zakah funds will be distributed to the beneficiary (mustahik). The dense activity and lack of understanding in calculating the amount of Zakah that must be spent mainly maalZakah (wealth) is often be an obstacle for musakki to pay maal Zakah, moreover, the main problematic faced by Board of Zakah is the problem of the distribution of non-targeted Zakah funds in accordance with Islamic law because of the difficulty of measuring the economic level of the Zakah recipients. Zakah funds is one of the financial assistance that is instrumental in changing economic circumstances mustahik be musakki, one of them with their small capital support provided by the Board of Zakah [1, 2], [5-7]. This makes the author to provide a solution to the problem encountered during this time, which makes a mobile web application that can be accessed anytime and anywhere with the internet networkand can facilitate musakki to calculate tithe and maal Zakah, as well as facilitate Board ofZakah in determining the eligibility of recipients [2, 3]. Several studies on the management of Zakah funds that have been done by previous researchers, Assessing the Satisfaction Level of Zakah Recipients Towards Zakah Management, the research on the identification of the media information that is used by the receiver to obtain information about the distribution of Zakah and to assess the level of satisfaction of recipients of the management of Zakah [1]. Other studies Fault Diagnosis for Fuel Cell based on Naive Bayesian Classification, classification fault diagnosis system proton exchange fuel cell with Naive Bayes classification method [4]. 2. Methods 2.1. The concept of Zakah Zakah is one of the pillars of Islam, including the part of the building (Islam), as described in the Qur'an and Sunnah, even Allah mentioned in the Qur'an in parallel with prayers at eighty-two places, it showed high notch Zakah. Allah Subhaanahu WaTa'aala said In Qur’an as follows, "And steadfast in prayer, pay the poor due, and bow with those who bow" (QS. Al- Baqarah: 43).
  • 2. TELKOMNIKA ISSN: 1693-6930  Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin) 1853 Zakah consists of two types: Maal Zakah is obligatory Zakah issued by Muslims who have reached enough nishab and haul. Tithe is the obligatory soul Zakah for all Muslims ranging from birth and during the life of the world, which is paid each month of Ramadan. 2.2. Al Qaradhawi Method The Al Qaradhawi calculating method is a method of calculating Zakah based on Yusuf al Qaradawi’s premise perspective where it used theistinbat method. Etymologically, istinbat means the discovery, excavation, expenditure (of origin), meaningful laws, regulations and powers. 2.3. Naive Bayes Classifier Naive Bayes is a machine learning method that uses probability calculations. This algorithm utilizes the methods of probability and statisticwhich are stated by the British scientist Thomas Bayes, that predict the probability in the future based on past experience. Naive Bayes method is shown to have an accuracy and a very high speed when it is applied to a database with a large data. The basis of the Naive Bayes theorem thatis used in the programming is the Bayes formula: The flow of Naive Bayes method can be seen in Figure 1, Figure 1. The Naive Bayes Method Flow Start Read Training Data Is it numeric data Quantity and Probability Mean of each Parameter Probability Table Standard Deviation for each Parameter Mean Standard Deviation Table Solution Stop No Yes
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1852 – 1857 1854 Description: a. Read the training data. b. Calculate the amount and probability, but if the numerical data: Find the mean and standard deviation of each parameter whichis numeric data. The equation used to calculate the average arithmetic value (mean) can be seen as follows: Or Where : μ: arithmetic average (mean) xi: samples value to -i n: number of samples And equations to calculate the standard deviation (standard deviation) can be seen as follows: Where : σ: standard deviation xi: value of x to -i μ: average count n: number of samples Find probabilistic value by counting the number of the corresponding data from the same category divided by the amount of data in the category. Getting the values in the mean table, standard deviation and probability. The solution is then generated. 3. Results and Analysis 3.1. Program Testing This test was conducted to determine how to use the program, the speed of the program and the ability of the program to perform the classification. The program test was conducted using the confusion matrix method in which the author attempted four times and then calculate the accuracy and error. 3.2. Program Usage On the use of the program will be shown how to run Zakah Application. Musakki party can open the website link of Zakah applications then perform the calculation process, as for the types of Zakah contained in the system, namely Gold and silver Zakah, money Zakah and securities, commercial Zakah (enterprise), agriculture Zakah, charity farm, income Zakah, and rikaz Zakah (artifacts). User calculate the Zakah on owned property by input the amount of assets being owned by type and then the system will calculate, if the nishab referring to the gold price, the system will automatically calculate based on the prevailing price of Antam’s gold in Indonesia, moreover, the system displays the calculation results of each types of Zakah and sum the total shown in the results that can be seen in the following figure:
  • 4. TELKOMNIKA ISSN: 1693-6930  Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin) 1855 Figure 2. The calculation of maal Zakah 3.3 Classification Prospective Zakah Recipients Distribution of Zakah funds by Board of Zakah Al Markaz, Makassar, South Sulawesi is done after determining mustahik using the classification process. Classification is made using discreteand continuous data which is conducted by experiments using feasible and unfeasible data. Examples of data that we use in the experiment are described in the Table 1: Table 1. Total Practice and Test Data Practice Data Test Data Feasible Unfeasible Feasible Unfeasible 200 150 25 25 In the fourth experiment, the authors tested the 350 practice data consisting of 200 feasible data and 150 unfeasible data. Tested with 50 pieces of test data. With details of 25 feasible and 25 unfeasible data. To determine a mustahik candidate is classified in the feasible or unfeasible class. Then the 7 features that will be used are as follows: a. Income b. Amenability c. Ownership of Assets. d. Surface area. e. Wall Types. f. Floor Types. g. Last Education. Board of Zakah admin performs the data entry of mustahik candidate on the form of test data that is displayed as shown in Figure 3.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1852 – 1857 1856 Figure 3. Mustahik Candidate Data Input Form After the data of candidate mustahiq was input as in Figure 3, the program will make the process of classification using Naive Bayes method, then the system will show the calculation results of classification which resulted in a decision support system that states a candidate mustahik eligible to receive Zakah and entered in the mustahik category as shown in the Figure 4. Figure 4. The results of the mustahik prospective classification
  • 6. TELKOMNIKA ISSN: 1693-6930  Zakah Management System using Approach Classification (Zulfajri Basri Hasanuddin) 1857 The use of the Naïve Bayes classifier method to classified the feasible and unfeasible of theZakahreceiver is an effective and productive way. Due to the ease in determining of mustahik candidates as is done by computerization with the terms and conditions in making decisions. The author has conducted four experiments as shown in Table 2: Table 2. Number of Practice and Test Data 4 Times Trial Trial Practice Data Test Data Percentage Feasible Unfeasible Feasible Unfeasible 1 45 70 25 25 84% 2 85 70 25 25 84.5% 3 100 100 25 25 86% 4 150 110 25 25 88% Where the results of the final percentage of the accuracy of the program's success is the result of percentage of accuracy: 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = 84 + 84 + 86 + 88 4 ∗ 100 = 342 4 ∗ 100 = 85% Accuracy or precision of the program that we have created with the use of Naive Bayes methods experience the difference at every change of practice data that author used. Thus, it is known that mustahik classification program that we made is very dependent and influenced by the used data set. 4. Conclusion Based on the results of the study as described above, it can be concluded that this application can help musakki for calculating maal Zakah and tithes, using Naive Bayes as a method of classification and can facilitate the Board of Zakah in determining whether a resident is feasible or not to receive Zakah based on Islam Shari'a. The built program has shown the final percentage of the accuracy is at average 85%. It is hoped that the development of program can be combine with GIS in order to easily identify the mustahik address and region. References [1] Ahmada Adzrin Raja Raja Ahmad Marzuki Amiruddin Othmanb, Sufiyudin Muhammad Salleh. Assessing the Satisfaction Level towards Recipients of Zakat Zakat Management. International Accounting and Business Conference, Science Direct. 2015. [2] Fenty EM A, Khodijah Hulliyah, Mayang Ekafitri. Applying Mobile Application Development Life Cycle in the Development of Zakat Maal Mobile Web Application Using JQuery Mobile Framework. IEEE Conference Publications. 2014: 89-92. [3] Heit Kotter, Henning, Tim A. Majchrzak, Benjamin Ruland and Till Weber, "Evaluating Frameworks to create Mobile Web Apps". the International 9 th Konferensi dan Teknologi Web Information Systems, 2013 [4] Liping Fan, Xing Huang, Liu Yi. Fault Diagnosis for Fuel Cell based on Naive Bayesian Classification. TELKOMNIKA. 2013; 11(12): pp. 7664 ~ 7670 e-ISSN: 2087-278X. [5] Muhammad Syukri Salleh1. Organizational And definitional reconfiguration Of Zakat Management. International Journal of Education and Research. 2014; 2(5). [6] Rizuan Abdul Kadir Mohd Zulkifli Zainal Abidin, Juliana Anis Ramli, Khairul Nizam Surbaini, Factors Influencing A Business Towards Zakat Payment In Malaysia. International Journal of Science Commerce and Humanities. 2014; 2(3). [7] Ram Saad Al Jaffri, Norazita Marina Abdul Aziz, Norfaiezah Sawandi. Islamic accountability framework in the Zakat funds management. International Conference on Accounting Studies, ICAS. 2014.