Cokorda Pramartha
Unknown Affiliation

Published : 17 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 17 Documents
Search

Perancangan UI/UX pada Aplikasi Rental Kendaraan dengan Menggunakan Metode Design Thinking Ni Luh Gede Ananda Puja Cahyani; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p03

Abstract

The rapid development of technology has transformed the way humans interact, work, and learn. Technology has become a crucial aspect of various aspects of life, including education, business, and public interaction. In this digital era, the speed and affordability of information have become the key to progress. One example of the use of technology is in the field of transportation, especially vehicle rental. The vehicle rental application is an efficient solution to facilitate users in renting vehicles without having to come directly to the rental place. The addition of the ride feature allows users to conveniently travel by matching routes between users and drivers, thereby optimizing their trips. In this context, the design of the user interface and user experience (UI/UX) of the vehicle rental application is of paramount importance. A well-designed UI/UX will facilitate the rental process and enhance the user experience, making it more enjoyable and efficient. Consequently, technology offers a significant opportunity to enhance efficiency and convenience in various aspects of daily life. 
Perancangan Ontologi Pendekatan Representasi Pengetahuan Topeng Bali Ni Nyoman Sukma Prasetyadewi Gita; I Made Widhi Wirawan; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p12

Abstract

This research aims to design an ontology model representing knowledge concerning Balinese masks, particularly focusing on their functions and uses. The methodology employed encompasses stages including specification, knowledge acquisition, conceptualization, integration, implementation, evaluation, and documentation. Implementation utilized Protégé software, resulting in 7 classes, 8 object properties, 5 data properties, and 26 instances related to Balinese Masks. Testing involved SPARQL queries to retrieve information on Balinese masks based on criteria such as function, motif, name, region, and artist. Test results demonstrate the efficacy of the ontology model in addressing relevant inquiries. This study seeks to offer information and digital documentation on Balinese masks, particularly regarding their function and use, thereby contributing to the preservation of this cultural heritage. 
Klasifikasi Hewan Berbasis Fitur Gray Level Co-Occurrence Matrix dengan Artificial Neural Network Ryan Hangralim; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 3 (2024): JNATIA Vol. 2, No. 3, Mei 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i03.p07

Abstract

Dogs and cats are animals commonly treated as pets by many people. Humans have the ability to differentiate various things, and this ability when converted to a form of system is called Computer Vision. Computer Vision has many applications such as image processing that can be used for various things and one of the techniques in image processing is image classification. Image classification is a problem that aims to organize objects that are then observed into predefined categories. The approach utilized to construct the model involves employing an Artificial Neural Network (ANN) using Gray Level Co-occurrence Matrix (GLCM) as the method for extracting the features. The data used are images of cats and dogs which will be extracted using GLCM using various parameters that include distance and angles. The extracted feature will then be used to train a model and accuracy of each model will be measured to find the best parameter result. In this study, the best parameter that results in the best accuracy is 1 for the distance and 0°, 45°, 90° for the combination of angles resulting in 79% accuracy. 
Perancangan Guitar Tuning Berbasis Web I Nyoman Dheva Surya; Cokorda Pramartha; Agus Muliantara
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p07

Abstract

Guitar tuning is a crucial step in preparing for playing, ensuring accurate sound production. In response to this need, our research led to the development of a web-based application dedicated to facilitating precise and straightforward guitar tuning. Leveraging web technology, this application offers users practical tuning experience without the need for additional software installation. By implementing comprehensive tuning features and employing the Fast Fourier Transform (FFT) method, our application guarantees accuracy in detecting and analyzing the spectrum of incoming sound vibrations. This technological approach ensures that users can confidently tune their guitars, avoiding mistuned strings. The decision to create a web-based app aims to optimize device space utilization, as it only requires a standard browser, readily available on all operating systems. In addition to tuning functionality, the application enriches the user experience by providing a collection of guitar chords for each note. This feature enables users to practice and play songs with adjustable transposition and speed. To assess the application's functionality and reliability, we conducted 100 trials using the BlackBox method, focusing on tuning the six guitar strings (e-b-g-d-a-e). The results demonstrated a remarkable 99% accuracy, affirming the system's effectiveness in facilitating precise guitar tuning. In conclusion, our research yields a practical, intuitive, and highly effective web application for users to tune their guitars with confidence and ease. 
Perancangan Infrastruktur Enkripsi End to End pada Aplikasi Penyimpanan File Berbasis Website Ni Putu Sri Agnita Samyami Wiraputri; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p06

Abstract

The rapid evolution of information and communication technology has revolutionized how we communicate and share information. Despite the numerous benefits, these advancements have introduced challenges, particularly concerning data security and privacy. Issues like data interception and escalating file sizes necessitate effective solutions. Cryptography emerges as a pivotal tool in addressing these concerns, offering a means to bolster data security while mitigating file size. This field encompasses the science and techniques of information security, converting data into unreadable ciphertext through encryption algorithms and keys. Encryption, particularly end-to-end encryption, plays a crucial role in maintaining confidentiality during file storage and exchange. The RSA cryptographic algorithm exemplifies an asymmetric approach, utilizing distinct keys for encryption and decryption. Public and private keys ensure secure communication, with the public key encrypting messages and the private key decrypting them. This widely adopted algorithm fortifies data security across various applications. Complementing this, the Caesar Cipher, a simple substitution cryptographic technique, adds an additional layer to the encryption process. By replacing each character with another at a specified shift in alphabetical order, the Caesar Cipher offers a basic yet effective safeguard. Combining the robust RSA algorithm with the simplicity of Caesar Cipher enhances file storage security. Employing Caesar Cipher as the initial step in encryption, followed by RSA to encrypt its output, ensures double-layered encryption. This dual process guarantees that only the corresponding private key can decrypt the file, reinforcing the overall security of data storage and exchange. 
Perancangan Aplikasi Sistem Keamanan Checkout Online Shop Viencent; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 1 No. 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i04.p28

Abstract

Online shopping has become a preferred choice for many people to meet their consumer needs. However, security issues in online transactions remain a major concern, especially when unauthorized checkouts occur without the account owner’s knowledge. To address this problem, this research aims to design an online shop checkout security application. The application ensures that each checkout is performed by the account owner and not by unauthorized individuals, such as children without their parent’s knowledge. Advanced technology approaches and appropriate security methods will be employed in the design of this application, including the use of two-factor authentication and verification through unique security codes. It is expected that this application will provide additional protection to online shop users in maintaining the security and integrity of their transactions. 
Perancangan Antar Muka Wearable Sistem Bagi Atlet Ni Wayan Sani Utari Dewi; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 1 No. 3 (2023): JNATIA Vol. 1, No. 3, Mei 2023
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i03.p05

Abstract

Technological developments have had a huge impact on various areas of life, including the world of sports. Today, athletes are leveraging various technologies to improve their performance and gain a better competitive advantage. Athletes must comply with the rules of the game and comply with the rules and regulations that apply to their game. hours of sleep is one of the most important factors in maintaining the stamina of athletes, according to the coach's directions. This study aims to make it easier for coaches to monitor the sleep hours of athletes being mentored. In order to improve the athlete's heart rate monitoring, an application was formed in the form of a prototype. The method used in this study is the mid-fidelity prototype which is the development of a prototype design model. Mid-fidelity prototype is a method for initial design, for purposes after detailed design and usability validation.