cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 125 Documents
Search results for , issue "Vol 3 No 4 (2019): April 2019" : 125 Documents clear
Implementasi Privacy Module Menggunakan Algoritme Enkripsi Trivium Pada SNMPL8 Dimas Dwi Radhityo; Ari Kusyanti; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.517 KB)

Abstract

Device management is needed when more internet of things (IoT) devices are connected in a network. One of the device management protocols is SNMP. But SNMP generates large data. Therefore there is a monitoring system that developed for effectivity in generating data called SNMPL8. On the other hand, SNMPL8 did not focus on security functions. One of the security functions for monitoring systems is the SNMPv3's Privacy Module. However, the Privacy Module still using CBC-DES algorithm that is not recommended by NIST, so a replacement algorithm is needed. One of the candidates is Trivium algorithm that designed for constrained devices. Therefore, this study uses the Trivium algorithm adopted on the SNMPv3's Privacy Module for network monitoring systems. Based on the getResponse testing, the Privacy Module requires 17.28 ms to generate keystream and 2.76 ms for the encryption process. The difference in memory at implementation is 176 Bytes, while the difference in the total data package is 769 Bytes.
Implementasi Komputasi Paralel GPU pada Algoritme Cellular Automata Menggunakan CUDA® Muhammad Rizal Ma'rufi; Imam Cholissodin; Eriq Muh. Adams Jonemaro
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1162.18 KB)

Abstract

Video games industry is expanding fast in this modern era. This expansion needs to be balanced with quality and production time from creator. Procedural Content Generation (PCG) is one of innovations that suit with that condition. In PCG world, there are many algorithms can be used, one of the most well know in PCG is cellular automata (CA) algorithm. But CA has efficiency problem, but it can be solved with parallel computing. In this research, parallel computing is implemented using CUDA® technology. But there is another problem, that is the map result from CA is not always giving good result, sometimes it cannot be played due to isolated cave in map, but it can be solved using flood fill algorithm. In this research, the implementation will go through few steps, implementation of CA CPU, CA GPU and Flood Fill. Then those implementations will be integrated with Unity® game engine, then time to implement it to game. The game implementations will use Unity® game engine with C# as scripting language. CA CPU, CA GPU and Flood Fill algorithms computation time will be tested to know their performances. From the test result, CA GPU algorithm has better performance than CA CPU up to 227 times. In the other hand, flood fill algorithm that being used in this research has very high computation time, so the map size is very limited.
Implementasi Topsis Pada Sistem Rekomendasi Tempat Wisata Pantai Di Sekitar Malang Berbasis Lokasi Muhamad Hilmi Hibatullah; Ratih Kartika Dewi; Marji Marji
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1236.448 KB)

Abstract

The tourism sector in Indonesia currently considered to be an effective role in increasing the country's foreign exchange. In 2016, the tourism sector was the second largest constributor to foreign exchange in the amount of USD12.5 billion. Malang is one of the areas that have a lot of potential tourism object. Beach tourism in Malang is a lot where it is cause visitors confused to choose the beach to be visited. This research propose to make a beach recommendation system around Malang by applying the Technique For Order Preference by Similiarity to Ideal Solution (TOPSIS) method. The TOPSIS method was chosen because TOPSIS was able to do the selected alternative ranking, where the selected alternative had the closest distance from the positive ideal solution and the farthest distance from the negative ideal solution. The criteria used in this system are distance, cost, rating, facilities and transportation. System functional testing shows that 100% of the functionality is valid. Furthermore, testing the validation of the algorithm, obtained the results 100% of similarities between the system output and manual calculation. While rank consistency testing obtained results that show that the TOPSIS method has a good level of consistency when implemented on the beach recommendation system
Sistem Peringatan Kondisi Jalan Berdasarkan Kecepatan dan Guncangan Sepeda Motor Menggunakan Naive Bayes Berbasis Embedded System Herwin Yurianda; Dahnial Syauqy; Hurriyatul Fitriyah
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1372.848 KB)

Abstract

In developing countries especially Indonesia traffic accidents can result in serious health problems.. Indonesia is a country which ranks fifth in the world in terms of traffic accidents, the data obtained at World Health Organization (WHO). Some of the factors that caused the accident was the road condition, vehicle and rider. However, the riders are often the vehicle outside the limit speed of the spur and the streets are less good is the most dominant factor is the cause of the accident. Based on the issue, it needs to be made to road condition warning system security drive vehicle motorcycle Embedde based System using Naive Bayes method. The sensor used in these systems is the hall effect sensor as the speedometer, and vibration sensors that serve to measure the level of shock two-wheeled vehicle. Will then be classified using Naive Bayes method, with a warning sound output with the use of the buzzer, and the screen display uses LCD, all processed system on an Arduino. Testing conducted include functional testing, system performance and accuracy. From functional testing that has been done, the system has a value of 100% truth, so it can be concluded that this test successfully. For performance testing, the system has a speed of processing time on average by 789.441 p. Whereas on testing Accuracy, the system was tested with test data as much as 43 data and the amount of training data by as much as 86 data and to have the accuracy of 97.76%.
Pengembangan Sistem Pemetaan Otomatis Entity Relationship Diagram Ke Dalam Database Michelle Larassati Ayusmara Latukolan; Achmad Arwan; Mahardeka Tri Ananta
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (578.134 KB)

Abstract

One phase in database design for developing a software is a database design, this phase created based on conceptual and relational models. The process that is quite difficult is when mapping databases. When user requirement changed, it will have an impact on the design of the Database System that has been made before. In addition, a complex database structure, when experiencing changes will take a lot of time to be manually mapped. Based on these problems, A system was created to map the database model in the form of ERD so that it can be directly used on MySQL databases. With the goal to ease the mapping process, this system uses Chen's notation. This notation is the most used notation in the data modeling tool because it is easily read and interpreted. But this notation is rarely used by the ERD mapping application. This system uses seven steps of Entity Relationship diagram mapping so that it complies with the rules of Software Engineering. The system is made by web-based, using object-oriented programming, and using the Codeigniter framework. The system develop 16 requirement that has been tested using white-box and black-box testing in order to get best result in Chen's notation ER diagram mapping and the final testing results as expected, and compatibility testing got 95% valid result.
Implementasi Protokol Neighbor Discovery Pada Pembentukan Komunikasi Antara Node Sensor dan IoT Middleware Berbasis Jaringan 6LoWPAN Heru Dias Pambudhi; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1243.872 KB)

Abstract

6LoWPAN is a network technology that is proven for IoT environment to facilitate the transmission of data from sensor node to IoT middleware. The advantages of 6LoWPAN are it is suitable for low-power device and has high scalability because it is based on IPv6. But, there is a challenge in forming communication between node sensor and the IoT middleware in 6LoWPAN, i.e. node sensor can't find out the existence and the middleware address. Beside that, node sensor also can't self-configured it's IP address using the prefix that is provided by the middleware. These problems can be resolved with Neighbor Discovery Protocol (NDP), which can give node sensor the ability to automatically find out the middleware existence and address also can self-configured it's IP address. NDP can be applied with radvd program on the middleware side and ndisc6 program on the node sensor side. The result of this research are node sensor can find out the existence and the middleware address, automatic IP addressing in node sensor, discovery delay around 1ms , the number of exchanged NDP control message of each node is six, packet delivery ratio of CoAP and MQTT are 93% and 100%, and the maximum reachability range is 105m.
Analisis Kinerja Protokol Routing Dynamic MANET On-Demand (DYMO) dan Cluster Based Routing Protocol (CBRP) pada Mobile Ad-Hoc Network (MANET) Muhammad Nurusshobah; Primantara Hari Trisnawan; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.255 KB)

Abstract

Mobile Ad-Hoc Network (MANET) is a network technology that is composed of a collection of similar or different ad-hoc nodes that are connected using a wireless connection. MANET development is very likely to be applied to areas or conditions with minimal network infrastructure, such as disaster areas. Qualitative data analysis was performed on Dynamic MANET On-Demand (DYMO) and Cluster Based Routing Protocol (CBRP) performance by saving data from test results consisting of convergence, average throughput, average delay, average jitter, and package loss. From the results of the test analysis, the DYMO protocol has better results than the CBRP protocol based on the scheme of variations in the number of nodes. The average value of parameter throughput, average end to end delay, average jitter, and packet loss are 102.09 Kbps, 73.54 ms, 11.81 ms, and 1.79% respectively. In the wide variation scenario, DYMO is better seen from the average end to end delay, average jitter, and packet loss parameters with a value of 18.98 ms, 3.07 ms, and 0.35%. While the CBRP protocol is better of the average throughput with a value of 105.74 Kbps. In the data packet size variation scheme, the DYMO protocol is also known to be better seen from the average end to end delay, average jitter, and packet loss parameters with values of 32.86 ms, 8.44 ms, and 0.53%. While the CBRP protocol is better of the average throughput with a value of 104.86 Kbps. A better convergence value is obtained from the CBRP protocol with an average convergence time of 0.755375 seconds, but from the routing routing protocol level, the DYMO protocol is better than CBRP.
Implementasi Algoritme SPECK Block Cipher dan Shamir's Secret Sharing Pada File Teks Novita Krisma Diarti; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1141.02 KB)

Abstract

Formal letter is one example of processing important data that contains text files, therefore security is needed to protect the file. Security in files aimed so that only certain people can access the contents of the file. Encryption is one of technique to secure file in cryptography. Cryptography has many algorithms that can be used for encryption process. In this study, two algorithms in cryptography use to secure file, called SPECK block cipher algorithm and Shamir's secret sharing. SPECK block cipher algorithm is used for data encryption and decryption, while Shamir's secret sharing algorithm is used to share confidential data on files. Both algorithms are used to protect text files in order to maintain data security from irresponsible people. Testing involves three file sizes, such as size 4 KB with contents 3, 8, and 13 lines. Results show average of 9.433 s, 91.938 s, and 619.036 s respectively for mentioned file contents. Average results of CPU usage are 7.058%, 25.855% and 31.095% respectively for mentioned file contents. Lastly, average results of the amount of RAM usage are 377.277 MB, 414.283 MB, 440.231 MB respectively for each file contents.
Pengembangan Aplikasi Perangkat Bergerak Identifikasi Penyakit Daun Jeruk Berbasis Android dengan Memanfaatkan Vize AI Sisco Jupiyandi; Agi Putra Kharisma; Anang Triwiratno
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (715.594 KB)

Abstract

Citrus plants are one of the important plants that get a special consideration by the Indonesian government. Based on research conducted by the Indonesian Ministry of Agriculture, citrus plants have rapid experienced development every year both in terms of the area of agricultural, the amount of production, and the increasing number of market demands. Even though the production of citrus plants continues to increase, in reality the citrus farmers have many obstacles in the field, one of which is the knowledge of diseases that exist in citrus plants, thereby reducing the productivity of the citrus fruit itself. Vize AI is a web service that provides an API for image recognition that can be trained to recognize and classify any kinds of images including a custom image. The author takes advantage of the opportunity to develop mobile-based applications with Android OS that can identify diseases from image of citrus leaves into 3 diseases, namely Downy Mildew, Cendawan Jelaga, and Citrus Vein Phloem Degeneration (CVPD) by using Vize AI. Applications that have been made by the author have some features that meet the user's need and implemented in Java programming language. After accuracy test is done, the results of the accuracy of this application in detecting citrus leaf's disease is highly accurate result with a percentage of 100% and accuracy of calculation of severity has an average accuracy of 65%. But these results still depend on the type of image quality itself.
Pengembangan Aplikasi Identifikasi Kesalahan Baca Alquran Menggunakan Speech Recognizer Dengan Metode Levenstein Distance Pada Platform Android Galang Putratama; Agi Putra Kharisma; Lutfi Fanani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1721.192 KB)

Abstract

Alquran is Muslims holy book which have to be read by paying attention to its letters pronunciation. Because even a little mistake in pronunciation resulting in damage to the meaning of Alquran itself. The process of learning to read the Koran requires a guide to correct mistakes that might occur. However, due the limited of time, then there is also limited opportunity for someone to practice reading Koran with a guide. One solution that the author offers is through the media based on Android application to detect errors in reading the verses of Koran. In the development of the application, the Waterfall method was used which began with interviews with a mosque imam and 2 students. Then the application is designed with the Object Oriented Design method and implemented with the Object Oriented Programming method. The result of its implementation is that the application utilizes Speech Recognizer to translate user readings into Arabic text. While Levenstein Distance algoritm and Diff Match Patch Library handle the error detections in user's pronunciation. At the accuracy testing stage it was found that this application successfully completed 3 of the 4 test cases performed. While at the usability testing stage with the System Usability Scale method this application gets a score of 76 with a level of satisfaction B + or above average. The application must be further developed because the level of accuracy obtained is still too low.

Page 7 of 13 | Total Record : 125


Filter by Year

2019 2019


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 4 (2026): April 2026 Vol 10 No 3 (2026): Maret 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue