I Ketut Gede Suhartana
Program Studi Teknik Informatika, Fakultas Matematika Dan Ilmu Pengetahuan Alam, Universitas Udayana

Published : 75 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Sistem Pengamanan Gambar Lontar Berbasis Web dengan Format JPG Menggunakan Metode Rivest Shamir Adleman Rianty, Winda; Gede Suhartana, I Ketut
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 9 No 4 (2021): JELIKU Volume 9 No 4, Mei 2021
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2021.v09.i04.p10

Abstract

The Security System For Web-Based Lontar Images in JPG Format Using the Rivest Shamir Adleman Method is a system that is basically used to secure an image in JPG format, which after the encryption process will be converted into txt. Where the system functions to secure lontar by using an encryption process using a cryptographic technique, namely Rivest Shamir Adleman (RSA) which is expected to help the public to maintain information or documentation and evidence of important events that occurred in the past.
Analisis Cyberbullying pada WhatsApp Messenger Menggunakan Metode National Institute of Justice (NIJ) Putra, I Putu Denny Indra; Suhartana, I Ketut Gede
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 9 No 4 (2021): JELIKU Volume 9 No 4, Mei 2021
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2021.v09.i04.p07

Abstract

Social media is no stranger to today's digital era. Many people prefer to use social media because of its simplicity and safety, This is what makes social media more popular than other services. However, because of its convenience and security, social media, especially WhatsApp Messenger, are vulnerable to crime, one of the most common is cyberbullying. For this reason, a mobile forensic investigation is required to find evidence related to cyberbullying. In this study, the National Institute of Justice (NIJ) method was used to investigate the WhatsApp Messenger platform used for cyberbullying. The NIJ method has 5 (five) stages to carry out the forensic process, namely Preparing, Collection, Examination, Analysis, and Reporting. This study also uses 3 assistance from software, namely MOBILedit Forensic, DB Browser for SQLite, and Odin3. This research is expected to be able to help solve the problem of cyberbullying and other crimes found on social media, especially WhatsApp Messenger.
Rancang Bangun Jaringan Internet di Kantor Desa Kerta Bagaskara, Aditya Caesar; Gede Suhartana, I Ketut
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 9 No 2 (2020): JELIKU Volume 9 No 2, November 2020
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2020.v09.i02.p19

Abstract

In 2018, the Kerta Village Office in Kerta village, Payangan sub-district, Gianyar district received digital village assistance from the Ministry of Communication and Informatics (Kominfo). The digital village is a central government program to develop communication, especially in rural areas that are still constrained by the internet network. This program is expected to help Kerta villagers to get internet access.
Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali Adhana, Finandito; Gede Suhartana, I Ketut
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 8 No 4 (2020): JELIKU Volume 8 No 4, Mei 2020
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2020.v08.i04.p02

Abstract

Denial of Service (DoS) attacks are increasingly dangerous. This DoS attack works by sending data packets continuously so that the target being attacked cannot be operated anymore. DoS attacks attack the most websites, thus making the website inaccessible. An anomaly based intrusion detection system (IDS) is a method used to detect suspicious activity in a system or network on the basis of anomaly pattern arising from such interference. Wireshark is software used to analyze network traffic packets that have various kinds of tools for network professionals.
Sistem Jaringan Informasi Akademik di Sekolah Menengah Atas Negeri 1 Negara Berbasis Web Maha, Ni Made Krisna; Gede Suhartana, I Ketut; Bayu Atmaja Darmawan, I Dewa Made
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 9 No 1 (2020): JELIKU Volume 9 No 1, Agustus 2020
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2020.v09.i01.p01

Abstract

Sistem Jaringan Informasi Akademik di Sekolah Menengah Atas Negeri 1 Negara berbasis Web merupakan sistem yang pada intinya menampilkan semua informasi mengenai kegiatan dan program-program sekolah termasuk informasi dalam penilaian belajar siswa dan siswa juga dapat menyampaikan saran ataupun permasalahan yang berhubungan dengan kegiatan belajar-mengajar kepada pihak sekolah ataupun guru yang dimaksud. Publik atau masyarakat umum juga dapat mengetahui informasi mengenai sekolah dan kegiatannya dengan adanya sistem informasi berbasis web ini. Ruang lingkup sistem yang meliputi data kelas, data pelajaran, wali kelas, info sekolah dan data lainnya semua telah ditentukan oleh bagian urusan sekolah, jadi administrator hanya bertugas untuk menginputkan data yang telah disusun sebelumnya. Pembuatan sistem informasi berbasis web ini menggunakan bahasa pemrograman PHP dengan database server MySQL. Kedua bahasa pemrograman tersebut sering digunakan untuk membentuk web dinamis, karena kelebihan-kelebihan yang dimilkinya. Dengan adanya sistem ini diharapkan akan memudahkan penyampaian informasi dengan efektif dan efisien dan dapat memberikan kemudahan dalam berkomunikasi antara instansi dalam hal ini pihak sekolah kepada para siswa, wali/orangtua siswa, guru dan masyarakat umum dimanapun dan kapanpun sepanjang masih terhubung dengan fasilitas internet.
Analisis Forensik Aplikasi Telegram berbasis Desktop menggunakan Metode National Institute of Justice (NIJ) Guna Wicaksana, I Gusti Ngurah; Gede Suhartana, I Ketut
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 8 No 4 (2020): JELIKU Volume 8 No 4, Mei 2020
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2020.v08.i04.p03

Abstract

Abstract The development of telecommunications has increased very rapidly since the internet-based instant messaging service has spread rapidly to Indonesia. Telegram application is one of the growing and well-known application services in Indonesia, Desktop or smartphone-based Telegram applications, it is very possible to use digital crimes by using services, user personal information, or by hacking the Telegram application. This study explains the stages of investigation of cybercrime cases that occurred in desktop-based telegram. The method used for this research refers to the stage of investigation that was carried out in previous studies, namely using the National Institute of Justice (NIJ) method with the stages of the preparation stage, the collection stage, the examination stage, the analysis stage, and the reporting stage. The media used in this study is a desktop-based Telegram application that is synchronized with an Android-based Telegram. In this process, the location of the log file, cache, and digital proof image file was obtained in the conversation of a desktop-based Telegram application. Digital forensic evidence obtained is expected to strengthen evidence of criminal cases in court in the form of digital evidence analysis results. Keywords: Telecommunications, Digital Forensic, Telegram, Investigation, Cybercrime
Pengamanan Lontar Digital Dengan Tanda Tangan Digital Menggunakan Algoritma RSA Harta, I Gede Bendesa Aria; Gede Suhartana, I Ketut; Anom Cahyadi, I Gusti Ngurah; Pramartha, Cokorda; Ari Mogi, I Komang; Agung Raharja, Made
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 10 No 2 (2021): JELIKU Volume 10 No 2, November 2021
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2021.v10.i02.p02

Abstract

Lontar is a relic of cultural heritage whose basic source of manufacture is from rontal or tal leaves containing evidence of all records of aspects of ancient historical life which include historical values, religion, philosophy, medicine, literature and other sciences so that their sustainability needs to be maintained. Security of digital lontar will make it easier to preserve a lontar work so that it is not changed or falsified by irresponsible parties, where digital lontar in PDF format will be given a digital signature to maintain the authenticity of the document. Documents that are signed will be difficult for other parties to change, if the contents of a digital ejection are changed it will cause the digital signature to change. Based on the research conducted, from the results of testing the security of digital ejection with digital signatures using the RSA algorithm, the test results from RMSE (Root Mean Square Error) for description results with an average of 69.7794143. The larger or random the description results, the more complex the description results will be.
IDENTIFICATION OF HOAX BASED ON TEXT MINING USING K-NEAREST NEIGHBOR METHOD Santiyasa, I Wayan; Brahmantha, Gede Putra Aditya; Supriana, I Wayan; Kadyanan, I GA Gede Arya; Suhartana, I Ketut Gede; Mahendra, Ida Bagus Made
JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) Vol 10 No 2 (2021): JELIKU Volume 10 No 2, November 2021
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JLK.2021.v10.i02.p04

Abstract

At this time, information is very easy to obtain, information can spread quickly to all corners of society. However, the information that spreaded are not all true, there is false information or what is commonly called hoax which of course is also easily spread by the public, the public only thinks that all the information circulating on the internet is true. From every news published on the internet, it cannot be known directly that the news is a hoax or valid one. The test uses 740 random contents / issue data that has been verified by an institution, where 370 contents are hoaxes and 370 contents are valid. The test uses the K-Nearest Neighbor algorithm, before the classification process is performed, the preprocessing stage is performed first and uses the TF-IDF equation to get the weight of each feature, then classified using K-Nearest Neighbor and the test results is evaluated using 10-Fold Cross Validation. The test uses the k value with a value of 2 to 10. The optimal use of the k value in the implementation is obtained at a value of k = 4 with precision, recall, and F-Measure results of 0.764856, 0.757583, and 0.751944 respectively and an accuracy of 75.4%
PENGAMANAN IMAGE TRUE COLOR 24 BIT MENGGUNAKAN ALGORITMA VIGENERE CIPHER DENGAN PENGGUNAAN KUNCI BERSAMA I Ketut Gede Suhartana
Jurnal Ilmu Komputer Vol. 2, No. 1 April 2009
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1681.838 KB)

Abstract

Vigenere cipher adalah salah satu algoritma kriptografi yang digunakan untuk penyandian teks. Dalam penelitian ini pemakaian vigenere cipher diperluas dari teks ke image bitmap 24-bit. Percobaan dilakukan dengan membandingkan hasil yang diperoleh dari penggunaan variasi panjang kunci.Hasil percobaan menunjukkan enkripsi dengan vigenere cipher akan menghasilkan chiper image yang aman untuk kunci yang panjang. Makin panjang kunci maka ciphernya semakin sulit dimengerti demikain sebaliknya.
ANALISIS IDENTIFIKASI POLA DAUN MENGGUNAKAN METODE CANNY, SOBEL, PREWITT DAN ROBERTS I Ketut Gede Suhartana
Jurnal Ilmu Komputer Vol 6 No 1: April 2013
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Didalam Deteksi Tepi terdapat banyak metode yang dapat kita pergunakan, diantaranyaMetode Deteksi tepi Canny,Sobel,Prewitt dan Roberts. Setiap metode tersebut memilikikemampuan yang berbeda-beda dalam proses pengolahan citra untuk mendapat pola garis tepi.Didalam penelitian ini dengan menggunakan objek penelitian yaitu image/citra daun,kita akan membandingkan metode deteksi tepi mana yang mampu menghasilkan pola tepi yangpaling optimal. Hal tersebut dapat kita ketahui dari besarnya nilai koefisien korelasi pada saatpencocokan pola.Dari hasil uji coba yang telah dilaksanakan, dapat disimpulkan bahwa: metode deteksitepi Canny memiliki kemampuan yang paling optimal diantara metode deteksi tepi lainnya.Hal ini dapat dibuktikan dengan besarnya nilai koevisien korelasi pada saat proses pencocokanpola daun
Co-Authors -, Daniel Surya Wijaya Adhana, Finandito Adi Guna, I Made Dirga Anak Agung Istri Ngurah Eka Karyawati Anggrek, Denise Valeria Ari Mogi, I Komang Artawan, Komang Nova Astrawan, Anak Agung Made Krisna Bagaskara, Aditya Caesar Brahmantha, Gede Putra Aditya Cahyani, Ni Komang Santi Canistya Chandra, Putu Isthu Chelsy Elisabet Gultom Cokorda Pramartha Dewi, Ni Kadek Yulia Diani, I Dewa Ayu Giri, Gst Ayu Vida Mastrika Giri, Gst. Ayu Vida Mastrika Gst. Ayu Vida Mastrika Giri Gultom, Chelsy Elisabet Guna Wicaksana, I Gusti Ngurah Gusto Gibeon Ginting Harta, I Gede Bendesa Aria I Dewa Ayu Diani I Dewa Made Bayu Atmaja Darmawan I Dewa Made Bayu Atmaja Darmawan, I Dewa Made Bayu I Gede Arta Wibawa I Gede Bagus Anom Adiputra I Gede Erwin Winata Pratama I Gede Surya Rahayuda I Gede Teguh Satya Dharma I Gede Tendi Ariyanto I Gusti Agung Gede Arya Kadyanan I Gusti Ngurah Anom Cahyadi Putra I Kadek Bagus Deva Diga Dana I Made Dirga Adi Guna I Made Widhi Wirawan I Made Widiartha I Nyoman Budhiarta Suputra I Putu Ananta Wijaya I Putu Gede Hendra Suputra I Putu Gede Mahardika Adi Putra I Wayan Pande Putra Yudha I WAYAN SANTIYASA I Wayan Supriana Ida Ayu Gde Suwiprabayanti Putra Ida Bagus Gede Dwidasmara Ida Bagus Made Mahendra Ida Putu Ari Jayadinanta Indra Permana Putra Jaya, I Gede Wilantara Kartika Maharani, Ida Ayu Bintang Kewa Nilan, Yasinta Anita Khaerul Anwar Khatami, Maula Krishella Naomi D’laila Rumy Lesmana, Kenny Belle Lidya Elisabet Theogracia Silitonga Luh Arida Ayu Rahning Putri Luh Gede Astuti Maha, Ni Made Krisna Maharani Putri Suari Mahardika Adi Putra, I Putu Gede Masduki, Aan Ngurah Agus Sanjaya ER Ni Luh Eka Suryaningsih Nuboba, Barneci Henderika Nurbidin, krisphino Saputra Partamayasa, I Wayan Gede Pawitradi, Gede Pramathana, Raindra Pratama, Berlin Putra, I Dewa Agung Cahya Putra, I Kadek Bagus Deva Diga Dana Putra, I Putu Denny Indra Raharja, Made Agung Rianty, Winda Setiawan, Vinna Soeparman, William Suardana, Komang Yudi Adnyana Suwiprabyanti Putra, Ida Ayu Gde Tri Adi Ningsih Veithzal Rivai Zainal Vidiadivani, Wahyu Wahyu Vidiadivani Wahyuni, Era Wijaya, Daniel Surya Wijaya, I Made Agus Rama Winata, Mas Adi Wirasih, Ni Made Ayu Wulandari, Desak Putu Sri Yasinta Anita Kewa Nilan Yoel Samosir Yudha, I Wayan Pande Putra