cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimainfosys@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
International Journal of New Media Technology
ISSN : 23550082     EISSN : 25811851     DOI : -
International Journal of New Media Technology (IJNMT) is a scholarly open access, peer-reviewed, and interdisciplinary journal focusing on theories, methods, and implementations of new media technology. IJNMT is published annually by Faculty of Engineering and Informatics, Universitas Multimedia Nusantara in cooperation with UMN Press. Topics include, but not limited to digital technology for creative industry, infrastructure technology, computing communication and networking, signal and image processing, intelligent system, control and embedded system, mobile and web based system, robotics.
Arjuna Subject : -
Articles 164 Documents
Identification of Authenticity and Nominal Value of Indonesia Banknotes Using Fuzzy KNearest Neighbor Method Ricky Ramadhan; Jayanti Yusmah Sari; Ika Purwanti Ningrum
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1592.145 KB) | DOI: 10.31937/ijnmt.v6i1.989

Abstract

The existence of counterfeit money is often troubling the public. The solution given by the government to be careful of counterfeit money is by means of 3D (seen, touched and looked at). However, this step has not been perfectly able to distinguish real money and fake money. So there is a need for a system to help detect the authenticity of money. Therefore, in this study a system was designed that can detect the authenticity of rupiah and its nominal value. For data acquisition, this system uses detection boxes, ultraviolet lights and smartphone cameras. As for feature extraction, this system uses segmentation methods. The segmentation method based on the threshold value is used to obtain an invisible ink pattern which is a characteristic of real money along with the nominal value of the money. The feature is then used in the stage of detection of money authenticity using FKNN (Fuzzy K-Nearest Neighbor) method. From 24 test data, obtained an average accuracy of 96%. This shows that the system built can detect the authenticity and nominal value of the rupiah well.
Electrocardiogram (ECG) Application for Checking Heart Conditions Based on Android Eko Budi Setiawan; Muhammad Yasin Tahir
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.769 KB) | DOI: 10.31937/ijnmt.v6i1.1039

Abstract

Abstract— Based on Indonesia Health Research Data globally the number one cause of death is caused by cardiovascular diseases, namely heart and blood vessel function disorders such as Coronary Heart Disease, Heart Failure or Heart Disease, Hypertension and Stroke. In 2008 it was estimated that 17.3 million deaths were caused by cardiovascular disease, and more than 3 million of these deaths occurred before the age of 60 years where this age could have been prevented. With the advancement in technology, it is now needed tools/applications that can monitor heart conditions at any time and any time to prevent deaths caused by sudden heart attacks. The research method used is the QRS approach and use AD8232 to get ECG data. Where to prove the results of the research conducted are appropriate or not by comparing the real ECG data in the hospital with ECG data obtained from the results of the study. The results of testing the data collected in this study can be said that the data in the application built is almost matched with the data obtained from the test results using hospital tools, with a data matching percentage of 96% for QRS interval and 90% for RR interval. Index Terms— ECG, AD8232, QRS Interval, RR Interval.
The Use of Color Gradation on Program Visualization for Learning Programming Rossevine Artha Nathasya; Oscar Karnalim
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1768.339 KB) | DOI: 10.31937/ijnmt.v6i1.1040

Abstract

According to several works, Program Visualization (PV) enhances student understanding further about how a particular program works. However, to our knowledge, no PVs utilize color gradation as a part of their features, even though color plays an important role in visualization. Therefore, two uses of color gradation on PV are proposed on this paper. On the one hand, color gradation can be used to display execution frequency of each instruction; instruction with higher execution frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program complexity. On the other hand, color gradation can also be used to display access frequency of each variable; variable with higher access frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program-to-variable dependency. Both uses are proved to be effective for learning programming according to our evaluation. Index Terms—program visualization, color gradation, program complexity, program-to-variable dependency, computer science education
Personality Based Lipstick Color Recommender System using K-Nearest Neighbors Algorithm Ryan Adiputra; Ni Made Satvika Iswari; Wella Wella
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1321.513 KB) | DOI: 10.31937/ijnmt.v6i1.1041

Abstract

Lipstick is a lip color which available in many colors. A research said instant valuation of woman personality can be figured by their lipstick color choice. Therefore there is a necessity to use the right lipstick color to obtain a harmony between personality and appearance. This experiment was conducted to give lipstick color recommendation by using K-Nearest Neighbors algorithm, and Myers-Briggs Type Indicator (MBTI) personality test instrument. The system was built on Android application. Euclidean distance value is affected by 5 factors which are age, introvert, sensing, thinking, and judging. Lipstick color recommendation is obtained by fetching 7 training data with nearest Euclidean distance when compared to personality test result. The colors used in this experiment are nude, pink, red, orange, and purple. After evaluation, it is obtained the application’s accuracy of 87.38% which considered as good classification, both precision and recall with 75.68% which considered as fair classification. The score for software quality is 79.13% which considered as good quality. Keywords—K-Nearest Neighbors, Data Mining, Myers-Briggs Type Indicator,Recommender System, Lipstick.
ITIL 2011: Maturity Level of Service Operation Rekha Bella Novia; Wella .
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1391.345 KB) | DOI: 10.31937/ijnmt.v6i1.1058

Abstract

Service quality is a measurement from users’ hope to the company in fulfilling their needs and desires also service delivery accuracy. Technology and information services can help the company in supporting the company’s business operations. Therefore, the company needs to apply ITSM (Information Technology Service Management) as an operational approach of technology and information services to keep the service quality in the company. The framework that is focusing on providing technology and information services which can be used as a guide is the ITIL framework (Information Technology Infrastructure Library). This research is conducted at PT Pertamina (Persero). The research is conducted using the 2011 ITIL framework on Domain Service Operation with 5 processes in it which are Incident Management, Request Fulfillment, Event Management, Access Management, and Problem Management. The methods that are used in this research are interview and questionnaires. This research is conducted based on research steps by Gallegos 2008, which consist of 5 steps such as the planning, the field checking, the report, and the follow-up. Based on the research conducted there are three processes that are stopped at level 1 which is Incident Management with score 62.54%, Problem Management with score 79.08% and Request Fulfillment with score 81.09%. Meanwhile, on the Access Management process achieve 86.00% and Access Management is stopped at level 2 with score 77,23%.
Application Model for Travel Recommendations Based on Android Rahma Wahdiniwaty; Eko Budi Setiawan; Fajri Auliardi; Deden A Wahab
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2182.801 KB) | DOI: 10.31937/ijnmt.v6i1.1059

Abstract

Abstract—Traveling is a fun activity. Everyone has a different preference for the type of tour they like. Some like nature tourism, culinary tours, religious tourism, and other tourism. Problems encountered by tourists when planning tourism activities, usually do not know complete information related to tourist destinations that will be visited, and can not make weather forecasts from the destination tourist destination. This research aims to provide a model travel recommendation that is implemented into the Android mobile application so that tourists can be given recommendations on which tourism destinations are most suitable based on the criteria that are the assessment criteria, namely the price of tourist accommodation, weather and rating of tourist attractions. Mobile technology used is using GPS sensors, Google Maps API, Open WeatherMap API, and Facebook API. Based on the results of testing, the application in this research can help in recommending tourist attractions that meet the criteria desired by tourists.
Review on Realization of AES 256bit Encryption with Raspberry Pi Erick Fernando; Surjandy Surjandy; Muhamad Irsan; Hetty Rohayani A H; Fachruddin Fachruddin
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1489.269 KB) | DOI: 10.31937/ijnmt.v6i1.1070

Abstract

In this article, it aims to present the AES encryption on the Raspberry Pi mini pc. this application also aims to illustrate that this AES algorithm can be applied with small resources. This research was conducted with an experimental approach, which carried out the implementation process in mini pc hardware and xampp software (php, apache). This AES algorithm is tested by PHP programming with Apache web server with text data. The results of the study, that the AES algorithm can run well with a hard minimum, like raspberry mini pc with a very fast time in the process, speed in the process and a lot of text data. So, AES algorithm can be widely adopted for various applications from raspberry PI mini pc computers with strong practicality in information security and reliability.
Review of Various A* Pathfinding Implementations in Game Autonomous Agent Alethea Suryadibrata; Julio Cristian Young; Richard Luhulima
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1728.215 KB) | DOI: 10.31937/ijnmt.v6i1.1075

Abstract

Among many pathfinding algorithms, A* search algorithm is an algorithm that most commonly used in grid-based pathfinding. This is due to implementation of A* search which proven to be able to generate the optimal path in a relatively short time by combining two characteristics of Djikstra's and best-first search algorithm. In the implementation of A* search, the selection of heuristic function and data structure can affect the performance of the algorithm. The purpose of this research is to find the best heuristic function and data structure with regards of the performance in A* search implementation as a pathfinding algorithm in a 3D platform. In the experiment, some known heuristic functions and data structures will be tested on the various 3D platform with a different size and obstacle percentage. Based on experiment that have been done, euclidean squared distance is best heuristic function for 3D pathfinding problem, with regards of the implementation performance. In addition, we also found that binary heap is the best data structure to be implemented for 3D pathfinding problem, with regards of implementation performance.
Naïve Bayes Anomaly Detection System Design On Openflow Network Nehemia Edbertus; Samuel Hutagalung; Hargyo Tri Nugroho
IJNMT (International Journal of New Media Technology) Vol 6 No 2 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (758.003 KB) | DOI: 10.31937/ijnmt.v6i2.1186

Abstract

One of the generally launched attacks is Distributed Denial of Service that renders its target unable to provide its service. Gaussian Naïve Bayes Classifier is one out of several techniques used in detecting those attacks by classifying network traffic in a window as an attack or a normal traffic based on normal distribution previously calculated from normal and attack traffic datasets. This research focuses on mitigating SYN Flood Type DDoS attacks on OpenFlow Network using Zodiac FX as a switch. The developed system utilizes OpenFlow Protocol to apply flow rule in switch’s flow table in order to detect and mitigate SYN Flood attacks in real-time. Applied mitigation procedure is to divert incoming packets into SYN Proxy so that only legitimate TCP packets are able to reach the server. The results show that the system has a bandwidth of up to 60Mbps under normal condition and 5,03Mbps under attack. Maximum malicious packets that could reach server before it is diverted to SYN Proxy is estimated to be 400 packets and not affected by the number of attacks, assuming that the flow rule sent by the controller are enacted immediately.
Re-design Business Process at Forwading Company Based on EAP Johanes Fernandes Andry; Pranchis Ranting
IJNMT (International Journal of New Media Technology) Vol 6 No 2 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (836.367 KB) | DOI: 10.31937/ijnmt.v6i2.1188

Abstract

To be able to become a service company that is superior to other service companies, it requires assistance from the application of IS / IT in its business processes. Both main activities and supporting activities. Enterprise Architecture Planning or EAP helps make planning for the implementation of IS / IT more mature and better, so that the implementation of IS / IT in the company's business processes can run and work in accordance with the company's vision and mission. Zachman Framework is one method that can be used to help do EAP. The Zachman Framework will map the entire system in the company based on 6 different viewpoints along with 5W + 1H. Therefore, this research is expected to be able to provide input to companies that are the object of research to implement IS / IT in accordance with business processes and vision and mission. Later the results of this study will be in the form of proposals for new business processes both supporting activities and the main activities of companies that use the application of IS / IT in them.

Page 5 of 17 | Total Record : 164