Jurnal ULTIMATICS
Jurnal ULTIMATICS merupakan Jurnal Program Studi Teknik Informatika Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang analisis dan desain sistem, programming, algoritma, rekayasa perangkat lunak, serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, kecerdasan buatan, pemrograman sistem mobile, serta topik lainnya di bidang Teknik Informatika. Jurnal ULTIMATICS terbit secara berkala dua kali dalam setahun (Juni dan Desember) dan dikelola oleh Program Studi Teknik Informatika Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Articles
10 Documents
Search results for
, issue
"Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika"
:
10 Documents
clear
Implementasi Algoritma Hamming Distance dan Brute Force dalam Mendeteksi Kemiripan Source Code Bahasa Pemrograman C
Andreas Budiman;
Dennis Gunawan;
Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (454.838 KB)
|
DOI: 10.31937/ti.v8i2.514
Plagiarism is a behavior that causes violence of copyrights. Survey shows 55% of college presidents say that plagiarism in students’ papers has increased over the past 10 years. Therefore, an application for detecting plagiarism is needed, especially for teachers. This plagiarism checker application is made by using Visual C# 2010. The plagiarism checker uses hamming distance algorithm for matching line code of the source code. This algorithm works by matching the same length string of the code programs. Thus, it needs brute will be matched with hamming distance. Another important thing for detecting plagiarism is the preprocessing, which is used to help the algorithm for detecting plagiarized source code. This paper shows that the application works good in detecting plagiarism, the hamming distance algorithm and brute force algorithm works better than levenstein distance algorithm for detecting structural type of plagiarism and this thesis also shows that the preprocessing could help the application to increase its percentage and its accuracy. Index Terms—Brute Force, Hamming Distance, Plagiarisme, Preprocessing.
Forecasting Motorcycle Sales Using Nearest Symmetric Trapezoidal Fuzzy Number
Jessica Jessica;
Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (855.919 KB)
|
DOI: 10.31937/ti.v8i2.515
A business activity aimed at obtaining forecasting as an initial step in planning activities helps provide an overview of sales in a business for the coming period based on data available. This research aims to design and develop a motorcycle sales forecasting application using Fuzzy Time Series with Nearest Symmetric Trapezoidal Fuzzy Number approach to predict the next period sales of PT Mutiara Motor. To test the accuracy of the method used in application, we used the MSE and MAPE criteria. Based on the results of three experiments taken: (1) monthly ‘All Category’-’All Type’ with MSE = 54.42 and MAPE = 4.28%, (2) monthly ‘Beat CW Fuel Injection’ with MSE = 3.67 and MAPE = 4.04%, and (3) daily ‘All Category’- ’All Type’ with MSE = 1.42 and MAPE = 27.36% we indicate that Fuzzy Time Series with Nearest Symmetric Trapezoidal Fuzzy Number approach could give higher accuracy than the Single Exponential Smoothing method as comparison in forecasting motorcycle sales. Index Terms—fuzzy time series, nearest symmetric trapezoidal fuzzy number, sales forecasting
Pencarian Materi Kuliah Pada Aplikasi Blended Learning Menggunakan Metode Vector Space Model
Putra Angga;
Lastri Widya Astuti;
Mustafa Ramadhan
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1171.583 KB)
|
DOI: 10.31937/ti.v8i2.517
Searching for a lot of materials are materials which is needed quickly and accurately. are by ranking them. Ranking is one branch of science of information retrieval. Information document search Vector Space Model (VSM). VSM uses the concept which is included in linear algebra is a vector space. Based on the concept that is used, the development of blended learning application uses space vector modeling method as an alternative for students in searching of relavan material toward materials needed, reducing the error level in the return of information and students can achieve goals quickly. Column vector representation is used in the conversion of document input, processing and output. Another concept that is used to determine the proximity between two vectors, are by calculating the angle formed between the two vectors and then it is sequenced from the data which has a large angle of the smallest to the largest of which indicates the sequence data of the ranking from the most relevant to irrelevant. In this study is described about the will produce quality to each document to determine how relevant the document to the query. Quality method which is used in the implementation can be a combination of TF (Term Frequency), IDF (Inverse Document Frequency), and the corresponding normalized input from the user. Index Terms— Content Search, Blended learning, the Vector Space Model.
Analisa Implementasi Protokol HTTPS pada Situs Web Perguruan Tinggi di Pulau Jawa
Willy Sudiarto Raharjo;
Aloysius Airlangga Bajuadji
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1200.825 KB)
|
DOI: 10.31937/ti.v8i2.518
HTTPS protocol offers better data protection than regular HTTP protocol since it utilize cryptography, mainly encryption and authentication mechanism to provide confidentiality and authenticity to packets sent to and from servers. However, not all institutions have properly implemented HTTPS protocol for their web sites. This paper analyzed the implementation of HTTPS protocol for all higher education web sites in Java island. We found that only 28 out of 1505 (1.86%) of all higher education institution who have a domain name have been using HTTPS protocol for their main domain. Furthermore, not all of them have properly implemented HTTPS protocol. We analyzed all 28 domains and we found that 8 out of 28 (28.57%) institutions are still using SSLv3 protocol which is no longer recommended to be used since it’s vulnerable to POODLE attack, 9 out of 28 (32.14%) institutions are still using an old algorithm RC4 which is proven to be insecure, 4 out of 28 (14.28%) institutions only support up to TLS 1.0, and 6 out of 28 (21.42%) institutions are still using SSLv2 or reusing same RSA keys thus vulnerable to DROWN attack. Many of the best practices of implementing HTTPS protocol were also neglected. HTTP Strict Transport Security (HSTS) is used by 5 out of 28 (17.8%) institutions and none of them have implemented HTTP Public Key Pinning (HPKP). Index Terms—cryptography, HTTPS, SSL, TLS
Design and Development of Android Based Teeth and Mouth Disease Detection Expert System Using Dempster-Shafer Method
Kristian Kristian;
Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (763.947 KB)
|
DOI: 10.31937/ti.v8i2.519
Teeth and mouth disease is a disease that affects many people in Indonesia. Teeth and mouth disease can interfere with human activities a link between oral health to overall body health including diabetes, heart disease, pregnancy problems, and memory loss. The quick detection of teeth and mouth disease would help people to quickly recover from teeth and mouth disease. This research was conducted with the aim to help detect teeth and mouth disease suffered by the user. In this research, the determination of the results of teeth and mouth disease detection was conducted using Dempster-Shafer method. This method is used because this method combines belief values of that the data is taken from the entire value of the trust that is available. This application was developed for android devices. This application was tested using ten kinds of cases designed by a doctor. Based on test cases conducted as many as ten kinds of cases, the results given by this application correspond 100% with the results that have been validated by drg. Lanny Widjaja. Index Terms: Android, Dempster-Shafer, expert system, teeth and mouth disease
Metode Pencocokan Bunyi Ketuk Buah dengan Kadar Kemanisan Menggunakan k-Nearest Neighbour
Ranny Ranny;
Yustinus Eko Soelistio;
Ni Made Satvika
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (515.65 KB)
|
DOI: 10.31937/ti.v8i2.520
The development of fruit local industry is very high, but it less competitive than the imported fruit product. The kind of Indonesian fruit is very variative, but the support technology in this industry is stiil not implemented. This problem make the local fruit industry cannot compete with imported fruit. The purpose of the research is to develop a technology that can increase the using of technology on fruit industry. This research focus is fruit sweetness measeurment technology. This research the fruit tapping sound. Fast Fourier Transform is used as sound feature extraction method to get the feature. Based on the feature the fruit sweetness level can be predicted using the k Nearest Neighbour (kNN). The experiment on this research is divided into two parts. is using the training data to predict the sweetness levelof the fruits. The result of the research shows that the correlation between tapping sound and sweetness level can be used to predict the sweetness level of the fruit. Index Terms—Sweetness Degree, Brix, k Nearest Neighbor, and Fast Fourier Transform.
Identifikasi Dini Kerusakan Jalan Flexible Pavement Dengan Menggunakan Algoritma PCA
Adhi Kusnadi;
Ranny Ranny
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (740.671 KB)
|
DOI: 10.31937/ti.v8i2.521
Identifikasi of road damage and how to handle early is important so that the use of the road remains optimally. The delay in the repair process will exacerbate the damage to the road itself, and will certainly increase the cost of repairs. PCA algorithm was chosen because it is a technique that is commonly used to draw the features of the data on a high-dimensional scale. While the input of the system that is built in the form of a digital image of the damaged roads, has a relatively large dimensions to be used directly by the algorithm of pattern recognition, such as neural networks. Research results obtained this type of cracking cracked 67% and cracking the other 33%. This can be caused by a few things, namely the shooting process is not perfect, as the distance is too far, the less light, the edge detection process less well due to the method used is not appropriate. Index Terms—road damage, PCA, cracking, image, egde detection
Analisis Kualitas Interpolasi Terhadap Fitur Statistik pada Citra
Meirista Wulandari
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2424.403 KB)
|
DOI: 10.31937/ti.v8i2.523
There are a lot of applications of pattern recognition which need input image with a certain size. The size effect the result of pattern recognition. Determining size of image adopts interpolation technique. Interpolated image’s quality depends on interpolation technique. Texture is the main feature which is used in image processing and computer vision to classify object. One of some methods that are used to characterize texture is statistical methods. Statistical methods characterize texture by the statistical distribution of the image density. This research compared 4 interpolation methods (Nearest Neighbor Interpolation, Bilinear Interpolation, Bicubic Interpolation and Nearest Neighbor Value Interpolation) and 6 features of 10 test images. Based on 6 features which are researched, skewness changes upto 800%, energy 90%, entropy 75%, smoothness 18%, standard deviation 10% and mean 0,9%. Index Terms—Interpolation, Statistical feature, NNI, Bilinear Interpolation, NNV, Bicubic Interpolation
Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere
Sugiyanto Sugiyanto;
Rinci Kembang Hapsari
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (522.264 KB)
|
DOI: 10.31937/ti.v8i2.528
Short Message Service (SMS) is working on a wireless network that allows the theft of the message contents. There are risks that could threaten the security of the contents of the message on SMS services, including SMS snooping, and SMS interception. Therefore, it takes security system messages on SMS services to maintain the security and integrity of the message content to cover the security messages. Algorithms Advanced Encryption Standard (AES) using a structure SPN (Substitution Permutation Network) structure, which has the disadvantage of encryption and decryption, so the safety level is low. To cover the security hole of these weaknesses, the researchers conducted the improvement of Advanced Encryption Standard (AES) algorithm security system based on android SMS using Vigenere algorithm, so that the level of security and integrity of the content of the short message becomes higher and difficult to solve. The results showed an average increase in percentage value of the avalanche effect from 37.24% to 42.96%. Keywords—Advanced Encryption Standard, android, message security, encryption.
Pembangunan Modul Pembelajaran Bahasa Inggris Menggunakan Grammar Translation Method Berbasis Android
Noviani Kurnia Ambarwati;
Rita Wiryasaputra;
Shinta Puspasari
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (813.994 KB)
|
DOI: 10.31937/ti.v8i2.516
English has become the international language now used in almost all areas of global life and connect to transfer knowledge to the whole world, for the mastery of the English language allows a person to expand interaction in the international world. To help in learning English to primary school students, especially in class 3-5 primary school will be built learning module applications. In order to teach English well, better know the methods used in the process of learning English in primary school is the grammar translation method (GTM), which is a method of teaching grammar to the main characteristics focusing on translation (translation) and to memorize verb forms. This application is intended as an alternative to learning to enhance students’ understanding of the material about the translation and pronunciation of English interactive fun, the application is built using the Android operating system. Index Terms— Android, English, Elementary students, Grammar Traslations Method, Learning Module.