Claim Missing Document
Check
Articles

PENGEMBANGAN SISTEM PENGELOLAAN ARSIP KELUARGA BERBASIS WEBSITE DALAM UPAYA PELESTARIAN INFORMASI KELUARGA Putu Bayu Baskara; Cokorda Rai Adi Pramartha; I Gusti Ngurah Anom Cahyadi Putra
Jurnal Pengabdian Informatika Vol. 1 No. 4 (2023): JUPITA Volume 1 Nomor 4, Agustus 2023
Publisher : Jurusan Informatika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Arsip keluarga merupakan data penting bagi setiap anggota keluarga. Jumlah arsip keluarga berbanding lurus dengan jumlah, peran, dan aktivitas anggota keluarga. Pengelolaan arsip keluarga biasanya dilakukan dengan cara konvensional yang memiliki kekurangan terkait kelestarian wujud fisik arsip, efisiensi tempat pemberkasan dan penyimpanan, efisiensi penataletakan arsip, efisiensi perpindahan arsip dan sebagainya. Untuk mengatasi permasalahan tersebut maka di rancanglah sistem pengelolaan arsip keluarga guna untuk mempermudah serta mempercepat pengelolaan arsip keluarga. Sistem dibuat berdasarkan pengalaman dalam kegiatan pengabdian yang dilaksanakan di PT. Guna Teknologi Nusantara dengan mengadaptasi beberapa tampilan dan konsep sistem. Fitur utama yang terdapat pada sistem pengelola arsip keluarga yaitu login, register dashboard, master arsip, kategori arsip, keamanan arsip, dan logout. Tahapan perancangan sistem dimulai dengan membuat use case serta relational database. Implementasi sistem menggunakan bahasa pemrograman PHP, HTML, Javascript, CSS serta database MySQL. Berdasarkan pengujian black box, sistem telah sesuai dengan kebutuhan dan berhasil diterima serta sudah dapat diimplementasikan dalam membantu mengelola arsip keluarga sekaligus sarana pelestarian arsip berupa bentuk digital.
Systematic Literature Review: Machine Learning Methods in Emotion Classification in Textual Data Wibawa, Putu Widyantara Artanta; Pramartha, Cokorda
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 12, No 3 (2023): NOVEMBER
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v12i3.1787

Abstract

Emotions are a person's response to an event. Emotions can be expressed verbally or nonverbally. Over time people can express their emotions through social media. Considering that emotion is a reflection of society's response, it is important to classify emotions in society to find out the community's response as information for consideration in decision-making. This study is aimed to identify and analyze the datasets, methods, and evaluation metrics that are being used in the classification of emotional texts in textual data from research data from 2013 to 2022. Based on the inclusion and exclusion design in selecting literature, a total of 50 kinds of literature were used in extracting and synthesizing data. Analysis of the data shows that out of 50 pieces of literature, there are 36 works of literature that use public datasets while 14 kinds of literature use private datasets. In the method of developing models for classifying, the SVM and Naive Bayes models are the most popular among the other models. In evaluating the model, the F-measure or F1-score metric is the most widely used metric compared to other metrics. There are three main contributions identified in this study, namely methods, models, and evaluation
Aplikasi Pengukur Tingkat Kepuasan Alumni Berdasarkan Data Tracer Study Berbasis Metode Machine Learning Supriana, I Wayan; Pramartha, Cokorda; Putri, Luh Arida Ayu Rahning
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol. 7 No. 1 (2024): Jurnal RESISTOR Edisi April 2024
Publisher : Prahasta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/jurnalresistor.v7i1.1561

Abstract

Pelacakan lulusan atau yang lebih dikenal dengan tracer study adalah salah satu feedback dari alumni terhadap perguruan tinggi. Tracer study merupakan salah satu kegiatan wajib bagi perguruan tinggi dalam menggali berbagai macam aspek yang dibutuhkan dari alumni seperti data diri ketika menjadi mahasiswa, pelayanan selama kuliah, lamanya mencari kerja serta kesesuaian dengan pekerjaan. Setiap tahun ratusan mahasiswa sudah diluluskan oleh perguruan tinggi, dengan begitu jumlah alumni dari tahun ke tahun terus bertambah, perlu dilakukan analisis yang mendalam dengan teknik data science untuk mendapatkan insight data tracer study sebagai evaluasi oleh program studi. Analisis data tracer study diperlukan untuk perbaikan proses pembelajaran melalui pengukuran tingkat kepuasan lulusan. Adapun tujuan penelitian, yaitu membuat analisis model prediksi tingkat kepuasan alumni berdasarkan klasifikasi data tracer study menggunakan metode machine learning yaitu algoritma K-Means sebagai klusterisasi data, algoritma Support Vektor Machine sebagai klasifikasi data. Model penilaian menggunakan 87 fitur data tracer study, dimana algoritma Support Vektor Machine menggambarkan klasifikasi data tracer study dengan tingkat akurasi sebesar 90%. Berdasarkan faktor yang dapat mengklasifikasikan tingkat kepuasan alumni, maka dapat menentukan kualitas lulusan akan semakin baik.
Pengembangan Sistem Rekomendasi Melalui Pendekatan Web Semantik dan Simple Additive Weighting (SAW) Pramartha, Cokorda; Jayadi, I Putu Indie Surya; Atmaja, I Dewa Made Bayu
SINTECH (Science and Information Technology) Journal Vol. 5 No. 2 (2022): SINTECH Journal Edition Oktober 2022
Publisher : Prahasta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/sintechjournal.v5i2.1216

Abstract

Indonesia is one of the countries that have the largest growth after China and India in the use of mobile phones. eMarkerter published that the number of mobile phone users in Indonesia increased by 37.1% from 2016 to 2019 and in 2019 it reached 92 million users. This study aims to develop a mobile phone recommendation system with a semantic web approach using the Simple Additive Weighting Method (SAW). The prototype system available online at http://mobile.oss.web.id that has 3 main features, namely searching, browsing, and recommendation features. The process of searching, browsing, and recommending the system using information that has been stored in Ontology. Meanwhile, the recommendation mechanism uses the SAW method as a method of calculating the weight of each cellphone and the weight of the criteria. Evaluation of functional requirements system using Black-Box testing approach, while evaluation of non-functional requirement systems using Technology Acceptance Model (TAM) approach by involving 32 respondents. The final result of the evaluation shows that the system functionality is running well as expected. Moreover, the evaluation of the non-functionality of the system showed that on average the respondents involved in the study agreed that the system developed was useful and easy to use
Perancangan Ontologi: Pendekatan Representasi Pengetahuan Topeng Bali Gita, Ni Nyoman Sukma Prasetyadewi; Wirawan, I Made Widhi; Pramartha, Cokorda
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p12

Abstract

This research aims to design an ontology model representing knowledge concerning Balinese masks, particularly focusing on their functions and uses. The methodology employed encompasses stages including specification, knowledge acquisition, conceptualization, integration, implementation, evaluation, and documentation. Implementation utilized Protégé software, resulting in 7 classes, 8 object properties, 5 data properties, and 26 instances related to Balinese Masks. Testing involved SPARQL queries to retrieve information on Balinese masks based on criteria such as function, motif, name, region, and artist. Test results demonstrate the efficacy of the ontology model in addressing relevant inquiries. This study seeks to offer information and digital documentation on Balinese masks, particularly regarding their function and use, thereby contributing to the preservation of this cultural heritage. Keywords: Ontology, Topeng Bali, Methontology, Protégé, SPARQL Query
Aplikasi Keamanan E-Commerece Berbasis Web Menggunakan Metode Algoritma Blowfish Hairul, Hairullah; Pramartha, Cokorda Rai Adi; Putra, Ida Ayu Gde Suwiprabayanti
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Seiring dengan perkembangan informasi yang terus meningkat salah satunya penggunaan komputerisasi dalam berbagai bidang. Hal ini erat kaitannya dengan penggunaan password dalam area komputerisasi. Rawannya manupulasi password dinilai sebagai hal yang perlu dicegah menggunakan data hiding. Salah satu teknik dalam data hiding yaitu Kriptografi. Dalam kriptografi terdapat banyak algoritma, salah satnya yang memiliki kehandalan yaitu algoritma blowfish. Sampai saat ini algoritma Blowfish belum ditemukan kelemahan yang berarti hanya adanya weak key dimana dua entri dari S-box mempunyai nilai yang sama. Belum ada cara untuk mengecek weak key sebelum melakukan key expansion, tetapi hal ini tidak berpengaruh terhadap hasil enkripsi. Hasil enkripsi dengan algoritma Blowfish sangat tidak mungkin dan tidak praktis untuk di terjemahkan tanpa bantuan kunci. Sampai kini belum ada Cryptanalysis yang dapat membongkar pesan tanpa kunci yang enkripsi oleh Blowfish. Hasil pengujian menunjukkan bahwa aplikasi bisa menjalankan fungsi-fungsi untuk melakukan proses enkripsi dan dekripsi data dengan baik. Waktu proses untuk enkripsi dan dekripsi untuk masing-masing file mempunyai sedikit perbedaan dikarenakan ukuran antara plainteks dan cipherteks juga berbeda, sedangkan waktu yang diperlukan juga lebih lama. Penelitian ini telah menghasilkan aplikasi enkripsi password yang telah diuji coba dan algoritma blowfish terbukti handal dalam mengamankan password.
Perancangan Antar Muka Wearable Sistem Bagi Atlet Dewi, Ni Wayan Sani Utari; Pramartha, Cokorda
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 3 (2023): JNATIA Vol. 1, No. 3, Mei 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological developments have had a huge impact on various areas of life, including the world of sports. Today, athletes are leveraging various technologies to improve their performance and gain a better competitive advantage. Athletes must comply with the rules of the game and comply with the rules and regulations that apply to their game. hours of sleep is one of the most important factors in maintaining the stamina of athletes, according to the coach's directions. This study aims to make it easier for coaches to monitor the sleep hours of athletes being mentored. In order to improve the athlete's heart rate monitoring, an application was formed in the form of a prototype. The method used in this study is the mid-fidelity prototype which is the development of a prototype design model. Mid-fidelity prototype is a method for initial design, for purposes after detailed design and usability validation. Keywords: Athlete, Wearable, Prototype
Pengembangan Prototipe Aplikasi Berbasis Web untuk Pengenalan Batik Tradisional Indonesia Mbuik, Genaldy Septianto; Pramartha, Cokorda Rai Adi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Batik is one of the cultural arts recognized worldwide as a human heritage for oral and non-material culture by UNESCO since October 2009. It is known that in antiquity, the batik was a garment thatworn by relatives of the royal palace and not to be worn by commoners, even some patterns or motifs of batik can only be worn by certain groups because it has philosophical values and is used in traditional ceremonies. In Indonesia, batik has existed since the Majapahit era and was very popular in the following century. Until the 20th century all batik produced was written batik, which was only known as stamped batik. Therefore, batik is one of the cultural arts heritage that should be preserved and developed. The feature implemented in this application is a chatbot where the chatbot will provide messages containing information about batik motifs from each province in Indonesia. This application is also equipped with several features on the website, namely the home feature, the Indonesian batik feature, the historical feature that discusses the history of batik, and the chatbot feature.
Perancangan Infrastruktur Enkripsi End to End pada Aplikasi Penyimpanan File Berbasis Website Wiraputri, Ni Putu Sri Agnita Samyami; Pramartha, Cokorda Rai Adi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid evolution of information and communication technology has revolutionized how we communicate and share information. Despite the numerous benefits, these advancements have introduced challenges, particularly concerning data security and privacy. Issues like data interception and escalating file sizes necessitate effective solutions. Cryptography emerges as a pivotal tool in addressing these concerns, offering a means to bolster data security while mitigating file size. This field encompasses the science and techniques of information security, converting data into unreadable ciphertext through encryption algorithms and keys. Encryption, particularly end-to-end encryption, plays a crucial role in maintaining confidentiality during file storage and exchange. The RSA cryptographic algorithm exemplifies an asymmetric approach, utilizing distinct keys for encryption and decryption. Public and private keys ensure secure communication, with the public key encrypting messages and the private key decrypting them. This widely adopted algorithm fortifies data security across various applications. Complementing this, the Caesar Cipher, a simple substitution cryptographic technique, adds an additional layer to the encryption process. By replacing each character with another at a specified shift in alphabetical order, the Caesar Cipher offers a basic yet effective safeguard. Combining the robust RSA algorithm with the simplicity of Caesar Cipher enhances file storage security. Employing Caesar Cipher as the initial step in encryption, followed by RSA to encrypt its output, ensures double-layered encryption. This dual process guarantees that only the corresponding private key can decrypt the file, reinforcing the overall security of data storage and exchange. Keywords: Algorima RSA, Algoritma Caesar Cipher, Keamanan Jaringan
Perancangan Aplikasi Sistem Keamanan Checkout Online Shop -, Viencent; Pramartha, Cokorda Rai Adi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Online shopping has become a preferred choice for many people to meet their consumer needs. However, security issues in online transactions remain a major concern, especially when unauthorized checkouts occur without the account owner’s knowledge. To address this problem, this research aims to design an online shop checkout security application. The application ensures that each checkout is performed by the account owner and not by unauthorized individuals, such as children without their parent’s knowledge. Advanced technology approaches and appropriate security methods will be employed in the design of this application, including the use of two-factor authentication and verification through unique security codes. It is expected that this application will provide additional protection to online shop users in maintaining the security and integrity of their transactions. Keywords: Online Shop, Checkout Security, Two-Factor Authentication, Unauthorized Transactions
Co-Authors -, Viencent Adu, Enga Prinda Agus Muliantara Ananda Puja Cahyani, Ni Luh Gede Andrayuga Mardhayiska, I Made Ari Mogi, I Komang Atmaja, I Dewa Made Bayu Dewi, Ni Wayan Sani Utari Fahmi Ahmad Arum Pratama Ganeswara, Putu Ryan Genaldy Septianto Mbuik Gita, Ni Nyoman Sukma Prasetyadewi Hairul, Hairullah Hangralim, Ryan Harta, I Gede Bendesa Aria I Gede Aditya Mahardika Pratama I Gede Arta Wibawa I Gusti Agung Gede Arya Kadyanan I Gusti Anom Cahyadi Putra I Gusti Ngurah Anom Cahyadi Putra I Kadek Agus Chandra Pradika I Kadek Ari Surya I Ketut Gede Suhartana I Ketut Gede Udha Krisna Yasa I Made Agus Widiana Putra I Made Wardana I Made Widhi Wirawan I Wayan Supriana I Wayan Wijaya Kusuma Sandi I. W. Arka I. W. Supriana I.G.N.A.C. Putra Ida Bagus Ary Indra Iswara Ida Bagus Gede Dwidasmara Ida Bagus Gede Sarasvananda Ida Bagus Made Mahendra IGNAC Putra Indrayasa, I Wayan Gede IPGH Suputra Irianto Koten IW Arka Jayadi, I Putu Indie Surya Koten, Irianto Liko kresnawan, Lanang Ary Kusuma, I Made Cantiawan Giri Luh Arida Ayu Rahning Putri Mbuik, Genaldy Septianto Ngakan Nyoman Kutha Krisnawijaya Ngurah Agus Sanjaya ER Ni Made Yuli Cahyani Ni Putu Sri Harta Mimba Palguna, I Wayan Gede Adi Putra, Ida Ayu Gde Suwiprabayanti Putu Audi Pasuatmadi Putu Bayu Baskara Raharja, Made Agung Siddarta, Wahyu Surya, I Nyoman Dheva Suryana, Kadek Andre Sutanegara, Made Dimas Dwi Wahyu Ananta, I Gede Ngurah Wati, Ni Putu Sintia Wibawa, Putu Widyantara Artanta Widiatmika, I Putu Agus Wahyu Wijaya, Wahyu Septian Windayani, Ni Wayan Wiraputri, Ni Putu Sri Agnita Samyami