cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimatics@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
Jurnal ULTIMATICS
ISSN : 20854552     EISSN : 2581186X     DOI : -
Jurnal ULTIMATICS merupakan Jurnal Program Studi Teknik Informatika Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang analisis dan desain sistem, programming, algoritma, rekayasa perangkat lunak, serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, kecerdasan buatan, pemrograman sistem mobile, serta topik lainnya di bidang Teknik Informatika. Jurnal ULTIMATICS terbit secara berkala dua kali dalam setahun (Juni dan Desember) dan dikelola oleh Program Studi Teknik Informatika Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Arjuna Subject : -
Articles 292 Documents
Pengembangan Algoritma Advanced Encryption Standard pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere Sugiyanto Sugiyanto; Rinci Kembang Hapsari
Ultimatics : Jurnal Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.264 KB) | DOI: 10.31937/ti.v8i2.528

Abstract

Short Message Service (SMS) is working on a wireless network that allows the theft of the message contents. There are risks that could threaten the security of the contents of the message on SMS services, including SMS snooping, and SMS interception. Therefore, it takes security system messages on SMS services to maintain the security and integrity of the message content to cover the security messages. Algorithms Advanced Encryption Standard (AES) using a structure SPN (Substitution Permutation Network) structure, which has the disadvantage of encryption and decryption, so the safety level is low. To cover the security hole of these weaknesses, the researchers conducted the improvement of Advanced Encryption Standard (AES) algorithm security system based on android SMS using Vigenere algorithm, so that the level of security and integrity of the content of the short message becomes higher and difficult to solve. The results showed an average increase in percentage value of the avalanche effect from 37.24% to 42.96%. Keywords—Advanced Encryption Standard, android, message security, encryption.
Pengenalan Wajah Menggunakan Metode Linear Discriminant Analysis dan k Nearest Neighbor Fandiansyah Fandiansyah; Jayanti Yusmah Sari; Ika Putri Ningrum
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1555.238 KB) | DOI: 10.31937/ti.v9i1.557

Abstract

Face recognition is one of the biometric system that mostly used for individual recognition in the absent machine or access control. This is because the face is the most visible part of human anatomy and serves as the first distinguishing factor of a human being. Feature extraction and classification are the key to face recognition, as they are to any pattern classification task. In this paper, we describe a face recognition method based on Linear Discriminant Analysis (LDA) and k-Nearest Neighbor classifier. LDA used for feature extraction, which directly extracts the proper features from image matrices with the objective of maximizing between-class variations and minimizing within-class variations. The features of a testing image will be compared to the features of database image using K-Nearest Neighbor classifier. The experiments in this paper are performed by using using 66 face images of 22 different people. The experimental result shows that the recognition accuracy is up to 98.33%. Index Terms—face recognition, k nearest neighbor, linear discriminant analysis.
Rancang Bangun Aplikasi Pendeteksi Penyakit Ginjal Kronis dengan Menggunakan Algoritma C4.5 Robi Rianto; Ni Made Satvika Iswari
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (727.983 KB) | DOI: 10.31937/ti.v9i1.558

Abstract

Kidneys are two bean-shaped organs, each about the size of a fist. They are located just below the rib cage, one on each side of the spine. Kidneys are vital organs contained in the human body and serve to filter the blood of metabolic waste product and throw it in the form of urine. Given the changing conditions in the body can affect the kidneys, causing a decrease in the function of these organ and lead to chronic kidney disease. In an article on the website of the National Institute of Diabetes and Digestive and Kidney Diseases (2014) argued that chronic kidney disease is a silent disease, in which patients appear normal and show no symptomp but the test results stating the patient’s kidney function had decreased. Based on the above information, the research on how to detect chronic kidney disease will be conducted. Applications built on the basis of desktop and using Decision Tree algorithm C4.5. The trial was conducted to determine how much the level of accuracy that can be generated by the application. The testing process is done by using cross-validation and based on the results already calculated this application has an accuracy of 91.50% at the time of the decision tree is made without using preprocess menu. Index Terms— C4.5, chronic kidney disease, decision tree, detection system.
Rancang Bangun Aplikasi Chatbot Sebagai Media Pencarian Informasi Anime Menggunakan Regular Expression Pattern Matching David Domarco; Ni Made Satvika Iswari
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (752.773 KB) | DOI: 10.31937/ti.v9i1.559

Abstract

Technology development has affected many areas of life, especially the entertainment field. One of the fastest growing entertainment industry is anime. Anime has evolved as a trend and a hobby, especially for the population in the regions of Asia. The number of anime fans grow every year and trying to dig up as much information about their favorite anime. Therefore, a chatbot application was developed in this study as anime information retrieval media using regular expression pattern matching method. This application is intended to facilitate the anime fans in searching for information about the anime they like. By using this application, user can gain a convenience and interactive anime data retrieval that can’t be found when searching for information via search engines. Chatbot application has successfully met the standards of information retrieval engine with a very good results, the value of 72% precision and 100% recall showing the harmonic mean of 83.7%. As the application of hedonic, chatbot already influencing Behavioral Intention to Use by 83% and Immersion by 82%. Index Terms—anime, chatbot, information retrieval, Natural Language Processing (NLP), Regular Expression Pattern Matching
Model Klasifikasi Mata Katarak dan Normal Menggunakan Histogram Valencia Wirawan; Yustinus Eko Soelistio
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.944 KB) | DOI: 10.31937/ti.v9i1.561

Abstract

Telah banyak penelitian pada citra medis telah diadopsi oleh sebagian besar ilmuwan dan dokter yang dapat membantu dalam mendeteksi gangguan pada mata terutama katarak. Namun, umumnya penelitian tersebut menggunakan citra medis atau digital yang relatif mahal dan sulit didapatkan oleh sebagian orang, dan metode yang rentan akan translasi (pergeseran), serta perubahan ukuran gambar dan bentuk objek. Penelitian ini mengembangkan sebuah metode menggunakan model histogram untuk mengklasifikasi mata katarak dari citra digital dengan (1) format yang lebih umum seperti JPEG dan (2) lebih toleranterhadap translasi dan perubahan ukuran. Metode ini juga mampu bekerja dengan baik menggunakan citra digital dalam citra mata yang tidak tegak lurus terhadap kamera. Metode ini mencapai akurasi 79,03% dalam kondisi bebas dan 88.47% dalam kondisi mata tegak lurus terhadap kamera. Metode ini mempunyai kompleksitas yang rendah sehingga dapat digunakan pada komputer dengan spesifikasi rendah dan sistem yang membutuhkan kecepatan mendekati real-time. Index Terms—Image processing, cataract, classification, histogram
Implementasi Algoritma Genetika dan Neural Network Pada Aplikasi Peramalan Produksi Mie Adhi Kusnadi; Jansen Pratama
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (580.149 KB) | DOI: 10.31937/ti.v9i1.562

Abstract

Companies that produce products must be able to regulate the amount of production so that it have plan production. Therefore, it is necessary to be able to predict the amount of production. This research aims to create an application that is useful in determining the amount of production. These applications using genetic algorithms and neural network. Genetic algorithm is used to optimize the weights in the neural network. From the test results, this application uses network with 12 inputs, 5 neuron in first hidden layer, 3 neurons in the second hidden layer, and 3 neurons in the last hidden layer. Then for the genetic algorithm parameters used were 10 individuals, 50 generations, crossover probability 0.8 and mutations probability 0.1. Based on the test results, this application has the forecasting’s accuracy rate reaches 86%. Keyword : forecasting, production forecasting, genetic algorithm neural network, optimization.
Rancang Bangun Sistem Rekomendasi Televisi LED Dengan Metode Vikor Berbasis Web Boyma Simamora
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (839.353 KB) | DOI: 10.31937/ti.v9i1.563

Abstract

Beragam macam pilihan televisi LED membuat pembeli mengalami kebingungan saat menentukan tipe televisi LED yang akan dibeli. Beberapa merk televisi terkenal menawarkan macam-macam tipe televisi LED dengan keunggulannya masing-masing. Perbedaan dapat dilihat dari segi harga, ukuran layar, resolusi layar, berat dan fasilitas pendukung lain yang diberikan. Sehingga dibuatlah sistem rekomendasi pembelian televisi LED untuk memberikan masukan dan bantuan kepada calon pembeli sebagai bahan pertimbangan sesuai dengan keinginannya. Penggunaan metode VIKOR diterapkan karena termasuk jenis dari Multi Criteria Decision Making untuk mengambil keputusan bersifat diskrit berdasarkan beberapa kriteria dan membantu pengambil keputusan sebagai hasil terbaik dari rekomendasi sistem. Kriteria yang digunakan yaitu rentang harga, merk, resolusi layar, ukuran layar, berat dan fasilitas sebagai deskripsi televisi. Pembuatan sistem dibangun dengan menggunakan bahasa pemrograman PHP dan database MySQL. Uji Kepuasan Pengguna Sistem dilakukan dengan melakukan survei kepada 30 responden dengan menggunakan metode Likert dan Cronbach Alpha. Hasil yang diperoleh sebesar 0,72 dan dapat disimpulkan dalam kategori cukup baik. Index Terms-Televisi LED, Sistem Rekomendasi, VIKOR, Skala Likert, Cronbach Alpha.
Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif Arinten Dewi Hidayat; Irawan Afrianto
Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1503.067 KB) | DOI: 10.31937/ti.v9i1.565

Abstract

Many organizations use design applications to draw the products they create. The drawings are digital files that have various formats of type and size. The images sometimes have to be protected because they are secret designs, such as the design of military vehicles, weapons and other designs. In order to secure digital data, cryptography is one of the solution, including if the data to be secured in the form of digital images. Algorithms that can be used to perform cryptography in digital image one of them is chaos map using Arnold cat map, logistics map and application of selective technique. Chaos was chosen for three reasons: sensitivity to initial conditions, random behavior, and no repetitive periods. While the application of selective technique means only encrypt some elements in the image but the effect of the whole image is encrypted. Cryptography in the image is also implemented because the organization using an intranet network to deliver its design drawings from one division to another. This allows for data tapping or exploitation of digital images while inside the intranet network. So it is necessary to develop a cryptographic system on the intranet network that has the ability to secure digital images that are in the network. The results obtained from black box testing, white box and network security testing show that the built system has been able to secure digital images when sent over the organization's intranet network. Index Terms—Cryptography, Image, Chaos Map Algorithm, Selective Technique, Intranet.
Evaluasi Aksesibilitas Learning Object Berdasarkan Web Content Accessibility Guidelines 2.0 Herru Darmadi; Yan Fi; Hady Pranoto
Ultimatics : Jurnal Teknik Informatika Vol 9 No 2 (2017): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1546.494 KB) | DOI: 10.31937/ti.v9i2.602

Abstract

Learning Object (LO) is a representation of interactive content that are used to enrich e-learning activities. The goals of this case study were to evaluate accessibility and compatibility factors from learning objects that were produced by using BINUS E-learning Authoring Tool. Data were compiled by using experiment to 30 learning objects by using stratified random sampling from seven faculties in undergraduate program. Data were analyzed using accessibility and compatibility tests based on Web Content Accessibility Guidelines 2.0 Level A. Results of the analysis for accessibility and compatibility tests of Learning Objects was 90% better than average. The result shows that learning objects is fully compatible with major web browser. This paper also presents five accessibility problems found during the test and provide recommendation to overcome the related problems. It can be concluded that the learning objects that were produced using BINUS E-learning Authoring Tool have a high compatibility, with minor accessibility problems. Learning objects with a good accessibility and compatibility will be beneficial to all learner with or without disabilities during their learning process. Index Terms—accessibility, compatibility, HTML, learning object, WCAG2.0, web
Penggunaan Teknologi Web 2.0 dan Dampak Perubahannya pada Aplikasi Website berbasis Rich Internet Application (RIA) Himawan Wijaya; Dedeh Supriyanti; Asep Saefullah
Ultimatics : Jurnal Teknik Informatika Vol 9 No 2 (2017): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2697.677 KB) | DOI: 10.31937/ti.v9i2.621

Abstract

Sejak dimulainya pada tahun 2004, era teknologi website modern mulai mengalami perubahan yang cukup signifikan. Hal ini ditandainya dengan adanya kemunculan era versi web yang mengusung teknologi web 2.0 berbasiskan Rich Internet Application (RIA). Dengan adanya teknologi web 2.0, maka salah satu perubahan yang tampak jelas pada halaman website adalah adanya partisipasi aktif dan kemampuan untuk berbagi informasi dari para pengguna yang mengunjungi sebuah halaman website. Penggunaan teknologi AJAX pada model website 2.0 juga menjadikan halaman website menjadi lebih responsif dan interaktif, selain itu dengan penggunaan AJAX maka halaman website 2.0 akan memiliki kecepatan akses yang lebih baik jika dibandingkan pada halaman website tradisional karena pertukaran data dan informasi yang dilakukan secara asynchronous dari komputer klien kepada server.Penelitian ini bertujuan untuk mengetahui cara kerja dari model website 2.0 yang menggunakan teknologi AJAX. Selain itu juga untuk melihat fitur-fitur yang ditawarkan pada model website 2.0 dengan teknologi AJAX, jika dibandingkan dengan fitur-fitur yang ditawarkan pada model aplikasi web tradisional yang hanya menggunakan HTML dan CSS. Index Terms— Teknologi Website, Web 2.0, RIA, AJAX.

Page 9 of 30 | Total Record : 292


Filter by Year

2011 2025


Filter By Issues
All Issue Vol 17 No 2 (2025): Ultimatics : Jurnal Teknik Informatika Vol 17 No 1 (2025): Ultimatics : Jurnal Teknik Informatika Vol 16 No 2 (2024): Ultimatics : Jurnal Teknik Informatika Vol 16 No 1 (2024): Ultimatics : Jurnal Teknik Informatika Vol 15 No 2 (2023): Ultimatics : Jurnal Teknik Informatika Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika Vol 14 No 2 (2022): Ultimatics : Jurnal Teknik Informatika Vol 14 No 1 (2022): Ultimatics : Jurnal Teknik Informatika Vol 13 No 2 (2021): Ultimatics : Jurnal Teknik Informatika Vol 13 No 1 (2021): Ultimatics : Jurnal Teknik Informatika Vol 12 No 2 (2020): Ultimatics : Jurnal Teknik Informatika Vol 12 No 1 (2020): Ultimatics : Jurnal Teknik Informatika Vol 11 No 2 (2019): Ultimatics : Jurnal Teknik Informatika Vol 11 No 1 (2019): Ultimatics : Jurnal Teknik Informatika Vol 10 No 2 (2018): Ultimatics : Jurnal Teknik Informatika Vol 10 No 1 (2018): Ultimatics : Jurnal Teknik Informatika Vol 9 No 2 (2017): Ultimatics : Jurnal Teknik Informatika Vol 9 No 1 (2017): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 8 No 2 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 7 No 1 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 6 No 2 (2014): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 6 No 1 (2014): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 5 No 2 (2013): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 5 No 1 (2013): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 4 No 2 (2012): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 4 No 1 (2012): Ultimatics: Jurnal Ilmu Teknik Informatika Vol 3 No 2 (2011): Ultimatics: Jurnal Ilmu Teknik Informatika More Issue