cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 201 Documents
Search results for , issue "Vol 2 No 12 (2018): Desember 2018" : 201 Documents clear
Pemilihan Alternatif Tanaman Obat Terhadap Penyakit Hipertensi Menggunakan Metode Analytical Network Process (ANP) dan Simple Multi Attribute Rating Technique (SMART) Linda Pratiwi; Indriati Indriati; Ahmad Afif Supianto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (711.595 KB)

Abstract

Medicinal plants contain active substances aims for healing and preventing of various types of diseases. Various types of medicinal plants each has certain criteria which result in difficulty in determining the alternative medicinal plants as the best priority. This research aims to select alternative medicinal plants which have nutritious substances for hypertension disease treatment. Not only nutritious substances, but also considering the price, availability and taste of the plant. Hypertension is a disease caused by high blood pressure. The selection of alternative medicinal plants for hypertension disease using Analytical Network Process (ANP) and Simple Multi Attribute Rating Technique (SMART) method. Analytical Network Process (ANP) method is used for determining the weights of each of the supporting criteria and Simple Multi Attribute Rating Technique (SMART) method is used for ranking of alternative medicinal plants selection. This research uses 10 data of medicinal plants to be tested. The result of Analytical Network Process (ANP) and Simple Multi Attribute Rating Technique (SMART) method use Spearman Rank correlation test with rs = 0.964 that means a relationship system and expert approach perfectly.
Analisis Kinerja Openflow Based Switch pada Router Linkysys WRT54GL dan TP-Link TL-WR1043ND Dalam Arsitektur Software Defined Networking Yasin Rizqi Afandi; Sabriansyah Rizqika Akbar; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (545.936 KB)

Abstract

In software defined network architecture (SDN) there is an open source protocol called Openflow. Openflow can be added to the open interface device. The Linkysys WRT54GL and TP-Link TL-WR1043ND routers can use Openflow by installing open-source firmware such as Openwrt. Several previous studies have tested the performance of LInkysys WRT54GL and TP-Link TL-WR1043ND routers based on network resource parameters such as throughput, round trip time and jitter. This study is conducted testing the performance of the Openflow protocol on the SDN architecture with adding parameters of computational. Computational parameters include the use of CPU and memory resources then, network parameters include round trip time, throughput and flow table formation time. Based on all test results, the addition of Openflow on the Linkysys WRT54GL and TP-Link TL-WR1043ND router who installed openwrt, can increase the use of CPU and memory resources and can degrade network performance such as round trip time and throughput. The decrease performance of router is due to the addition of the Openflow process on the router who cause decreased the switching performance and the mechanism of the Openflow hybrid switch who cause increased forwarding data processing time .
Pembangunan Sistem Untuk Pendeteksian Code Smells Refused Bequest Muhammad Faishal Firdaus; Bayu Priyambadha; Fajar Pradana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.608 KB)

Abstract

Code smells are a characteristic of a software that indicates problems in the code structure and system design that result in the software is being difficult to develop and maintain. The quite famous kind of code smells is refused bequest, which is a condition in the concept of inheritance that subclasses do not use the derived functionality of the superclass so as to happen inheritance rejection. Generally, code smells only can be identified through the program code structure. However, in this study developed the detection code smells in the stage of software development is design. Design is a very important phase in the software development phase because the success of a software depends on good analysis and design. At the design stage performed detection code smells with the kind of refused bequest is on the design of components, namely class diagrams design. The design of the class diagram in the .vpp format of the UML Creator Visual Paradigm application is converted into the xml language. Once converted, the xml file is detected on the detection software by parsing and finding the code smells refused bequest level referring to the smells thermometer as the measured refused bequest intensity meter. Development of this system follows the stages of software development starting from the needs analysis phase, design and implementation, as well as system testing. The tests performed on this system use testing whitebox testing for unit testing and integrase and blackbox testing for validation testing.
Implementasi Algoritme Grain V1 Untuk Enkripsi Gambar Pada Aplikasi Berbasis Web Andhika Brahmana Putra; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1273.549 KB)

Abstract

The challenge of dealing with illegal copying and distribution of multimedia documents is an important problem to be solved. Different techniques have been introduced such as encryption and digital watermarking to protect the data from unauthorized parties. In this study, data encryption is carried out in image format through web-based applications by using the Grain algorithm. Grain algorithm has an advantage of that it reduces the value of complexity and increases the speed of computing. Tests carried out are test vector validation testing, encryption and decryption validation testing, encrytime performance testing and security testing. The result of test vector, encryption and decryption validation test are valid. For encryption and decryption execution time of each image file extension resulted the longest execution time is on JPG extension files while the shortest execution time is on BMP.While for security testing obtained sniffing results using Wireshark which shows that the encrypted data is unknown to an authorized party. The conclusion of the above test is that the Grain algorithm can be performed by applying an image encryption mechanism that can protect data confidentiality.
Implementasi Low Power Pada Embedded System Untuk Mendeteksi Kondisi Kebakaran Dalam Ruangan Rinaldi Albert Soritua; Mochammad Hannats Hanafi Ichsan; Gembong Edhi Setyawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1254.769 KB)

Abstract

Fire is an event caused by unrestrained fire by human. Fire could cause various losses from treasures to casualties. Based from that problem needed a system that able to detect fire based on smoke level, room temperature, dan existence fire source. In implementation needed low power to save power consumption when system not detect a fire. The output of the system is current condition which is no fire, fire and smoky little, fire smoky and lot that shown on LCD and sound from buzzer. Arduino Mega 2560 implanted fuzzy logic as output decision based on fuzzy calculation. If system not detect a fire then system will switch to sleep mode, yet if system detect an output which is smoky, fire and smoky little, fire smoky lot it will shown on LCD and sound from buzzer. The used feature is sleep mode power down to turn off some sub-system. Testing resulted system is running accordance with the principles of it works. The average system execution is ±33284,2 ms. On the power consumption of the device is able pressed for 40mA from 245mA to 205mA with implementation sleep mode power down.
Pengembangan IDS Berbasis J48 Untuk Mendeteksi Serangan DoS Pada Perangkat Middleware IoT Hilman Nihri; Eko Sakti Pramukantoro; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.578 KB)

Abstract

The development of IoT devices causes a change in many aspects of human life. Although this device has a limited resources, IoT devices can be used in every kind of environment. The use of IoT device in these environments make the security of IoT device important to study. One of biggest DoS attacks happen to IoT devices because there is no self-defense mechanism toward dangerous packets, so that IoT devices easily infected by Mirai botnet. A method choosen for this research to solve this problem is using Intrution Detection System(IDS). This IDS is expected to handle DoS attack in IoT devices with its limitation. Machine learning is chosen for detector in IDS because it's better for detecting anomalies, and also can run better in limited resources than other type of IDS. The Machine Learning algorithm is J48 because J48 has been prooven to detect anomaly better than other classification algorithms. There are few testing parameters used in this research; which are resource usage, detection engine accuracy, ability to give alert, logging ability, realibility in capturing packet in the network, and ability to handle the attack. Based on the evaluation results, this IDS can handle an attack, give alert, and do the logging process. This IDS is also able to classify the packet up to 100%, but this IDS has average 73.6% for capture packet from the network, so IDS can show alert in average of 17.42%. The resource usage in this IoT devices increases by average CPU usage 16% and memory usage 70MB. Based on these testing results, IDS can be used for solution to handle DOS attack in IoT devices.
Analisis Penerapan Markerless Augmented Reality pada Video Game Memancing dengan Pendekatan Simultaneous Localization and Mapping (SLAM) Dany Muhammad; Wibisono Sukmo Wardhono; Tri Afirianto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.998 KB)

Abstract

In the development of application that utilize augmented reality, one of the most common approach is using a special marker. However, a marker can limit the player's freedom when playing a video game that utilize augmented reality. This research will develop an augmented reality video game without any marker (markerless) using Simultaneous Localization and Mapping (SLAM) approach. SLAM is an approach of constructing or updating a map of a certain environment while keeping track of an agent's location at the same time. SLAM is implemented in an augmented reality fishing game which use marker so that the game can be played without any marker. The markerless function will be implemented using VOID AR package in Unity game engine. After markerless function implemented, black box testing is used to observe if virtual object can appear correctly in the environment. The testing result shows that markerless augmented reality fishing game can be developed with SLAM method using VOID AR package in Unity. The virtual object looks most stable when the environment that recorded in frame is not changed much. This is happened because it is easier for video game application to use SLAM approach when the features are not changed much. When the camera is directed to the new environment, new features are recorded, make it harder for video game application to adapt.
Sistem Pencarian Jurnal Ilmiah Cross Language dengan Metode Vector Space Model (VSM) Indah Mutia Ayudita; Indriati Indriati; Putra Pandu Adikara
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (920.048 KB)

Abstract

Scientific journals are periodical publications that contain scientific papers with data and information written in accordance with the rules of scientific writing. Scientific journals used widely as a reference to make a new research or continue the previous research. As the usage is growing, scientific journals also easier to find digitally and available in a digital library such as Science Direct and IEEE, but the searching process is still limited to Monolingual Information Retrieval, in which the search results have the same language as the query inputted, even though the relevant documents also available in other languages. This research is done to observe the result of implementing Cross Language Information Retrieval that can do the searching process in one language for the input and retrieved document in two languages. The final result is 8 out of 10 queries have a higher precision up to 74,5% and recall up to 41,5%. Generally, system can retrieved the relevant documents in average for 84%.
Implementasi Protokol Geographic Source Routing(GSR) Pada Vehicular Ad-Hoc Network(VANET) untuk Komunikasi Kendaraan Dengan Road Side Unit(RSU) Rezky Hadiwiriyanto; Primantara Hari Trisnawan; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.628 KB)

Abstract

Vanet (Vehicular Ad Hoc Network)is a type of wireless network that provides communication vehicles that serve as its nodes. Vanet has three elements, namely among vehicle to vehicle communication (V2V), vehicle to infrastructure (V2I) and infrastructure to infrastructure (I2I). This study focuses on the communication vehicle to infrastructure such as Road Side Unit (RSU). Various problems arise in the design of Vanet, one of them is the use of a protocol that is not in accordance with the criteria and mechanism of action of the Vanet. In this study, the protocols in use are the GSR and AODV protocol which are implemented and compared based on the scenarios research which are the density of the vehicle, the vehicle speed and the number of RSU's variations specify the protocol works best on Vanet environment. Implementation is performed using (NS-2) and SUMO. The results of the GSR and AODV protocol implementation are analyzed based on the test parameters are throughput, end-to-end delay and packet delivery ratio. From the test results, protocols AODV has a better performance in scenarios density and speed of the vehicle with the parameters throughput and packet delivery ratio with a value of 1004 bps and 99.65%, while the GSR better its performance on parameters of end-to-end delay with a value of 2.35 ms. In scenario number variation RSU, GSR protocol has better performance parameters of throughput and end-to-end delay with a value of 4060 bps and 2,531 ms while AODV protocol, better on the parameters of packet delivery ratio with a value of 99.83%.
Optimasi Parameter Support Vector Machine (SVM) dengan Particle Swarm Optimization (PSO) Untuk Klasifikasi Pendonor Darah Dengan Dataset RFMTC I Gusti Ngurah Ersania Susena; Muhammad Tanzil Furqon; Randy Cahya Wihandika
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (669.626 KB)

Abstract

Blood donation is one of voluntary humanitarian activities. Blood is one of the most important substances that humans have in the human life cycle. In carrying out blood donation activities, monitoring the stock availability of blood bags is usually a major problem. To know ammount stock of blood bag we need a system that can predict the behavior of blood donors. RFMTC (Recency, Frequency, Monetary, Time, Churn Probability) is a modified RFM method in order to see the behavior of donors who can donate their blood or not to donate again. Therefore, SVM-PSO method needed to know classification of blood donors behavior. With SVM techniquesto find hyperplane that is the dividing line between data classes. Then the PSO technique to find the range of input parameters that SVM needed to get the optimal hyperplane value. This research uses 748 data from UCI dataset with 4 main features and 2 classes. Based on the test that has been done obtained the accuracy of 90% with the value of learning rate SVM small and the value of the number of PSO particles are low.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 4 (2026): April 2026 Vol 10 No 3 (2026): Maret 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue