cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimacomputing@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
Jurnal ULTIMA Computing
ISSN : 23553286     EISSN : 25494007     DOI : -
urnal ULTIMA Computing merupakan Jurnal Program Studi Sistem Komputer Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang Sistem Komputer serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, organisasi dan arsitektur komputer, programming, embedded system, sistem operasi, jaringan dan internet, integrasi sistem, serta topik lainnya di bidang Sistem Komputer. Jurnal ULTIMA Computing terbit secara berkala dua kali dalam setahun(Juni dan Desember) dan dikelola oleh Program Studi Sistem Komputer Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Arjuna Subject : -
Articles 157 Documents
Penerapan Algoritma C4.5 pada Analisis Kerusakan Barang Jadi Ivan Oktana; Seng Hansun
Ultima Computing : Jurnal Sistem Komputer Vol 7 No 1 (2015): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (635.728 KB) | DOI: 10.31937/sk.v7i1.450

Abstract

A Data mining is the activity that includes the collection, the use of historical data to discover regularity, patterns and relationship in a large data set. The usefulness of data mining is to specify a pattern to be found in the data mining task. The presences of data mining is motivated by the problem of data explosion which had been experienced lately these day where many organization or company collect so many years of data (purchasing data, sales data, damage data item, transaction data, and so on). In this paper data mining methods been used to analyze the damage data of finished products, with the goal of producing a pattern of the damage product. Based on the pattern from product’s damage, can be see and the aspects that affect to the damaged product. The purpose of this study is to show information about the relationship of damage data of finished goods using C4.5 algorithms in PT. Kayu Lapis Asli Murni, and display results in the form of a decision tree mining. Index Terms—data mining, C4.5 algorithms, decision tree, damage data of finished products, PT. Kayu Lapis Asli Murni
Rancang Bangun Aplikasi Pembelajaran Chord dan Melodi Gitar Berbasis Augmented Reality Daniel Hero Fersil Punuindoong; Hira Meidia
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.293 KB) | DOI: 10.31937/sk.v9i1.566

Abstract

In this study, the application of the basic concepts of chord and melody guitar is made by using marker-based Augmented Reality method. Unity 3D is used to build the application and Vuforia is used as a library of Augmented Reality, where the application can recognize the marker as the basis of the virtual 3D objects rendering chord and melody guitar by using Android smartphone. There are several colours and numbers to make it easier to know the type and position of the fingers used in forming a chord or a melody. Index Terms- Augmented Reality, Guitar 3D Chord, Guitar 3D Melodi, Unity 3D, Vuforia, Android
Distribusi Pengiriman File Multimedia Secara RealTime dengan Jaringan WAN Frame Relay Fransiscus Ati Halim
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (671.606 KB) | DOI: 10.31937/sk.v9i1.567

Abstract

Today's communications networks are built using high-speed digital trunks that inherently provide high throughput, minimal relay, and a very low error rate. Such transmission networks supply highly reliable service without the overhead of error control functions. Frame relay is a packet-mode transmission network service that exploits these network characteristics by minimizing the amount of error detection and recovery performed inside the network [1]. In addition, real time network based systems can also minimize the possibility of employees committing fraud resulting in losses for the company. The research was carried out in a service provider video ad impressions company, which has fifteen branches in the islands of Java and Sumatra. The problem is the revenue reporting is not real-time and non-standard video file format ads to each branch. This is because the distribution process with the hard disk media are still using courier services. Based on user demand, it was decided to use the computer network using Frame Relay technology. With the computer network that connects all the branches to the head office, the data updating process can be done in a shorter time than the previous system and will reduce fraud forms of each branch and enable the achievement of a better quality of service to customers. Index Terms—Computer Network, Frame Relay
Perbandingan Algoritma Horspool dan Algoritma Zhu-Takaoka dalam Pencarian String Berbasis Desktop Adhi Kusnadi; Abraham Khrisnandi Wicaksono
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (868.361 KB) | DOI: 10.31937/sk.v9i1.568

Abstract

String searching is the search process by using the index to find text that can help in information retrieval systems. Continuing previous research, this study uses an algorithm Horspool and Zhu-Takaoka to find the performance of each of these algorithms in the search for a pattern in the text. So they make a useful desktop-based application to measure performance of both algorithm, particulary the time required to perform string searching process. Using the method of prototyping and Microsoft Visual Studio with C# programming language implementation. Result obtained from this application is the number of words found, and the processing time of each algorithm. From this study, the Horspool algorithm is 19,82845 percent faster in first test with the pattern "swan" in a text file 50 multiples 1000 words and 15.9442 percent in the second trial using text files 70000 words with different pattern than the number of characters Zhu algorithm -Takaoka in the process of searching string. Index Terms-String searching, Horspool, Zhu-Takaoka, Microsoft Visual Studio, application, processing time.
Penelitian Mengenai Metode Steganografi Least Significant Bit Ivan Jonathan; Albert Yeusiawan Haryono; Kevin Leonardi
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.255 KB) | DOI: 10.31937/sk.v9i1.569

Abstract

In today's technological era, the concealment of sensitive information is the concern of many people. Because the information is often shared and discussed through a very commonly used communication medium. Steganography is one technique to hide a secret message into a file that has a larger size. In this paper, we will discuss the methods that can be used in steganography, especially the method of Least Significant Bit. Keywords: Steganography, Data Hiding, Steganography Algorithm, Least Significant Bit.
Aplikasi Pengendali Kamera DSLR Nirkabel Tipe Low End Berbasis Android Endang Tirtana; Eko Budi Setiawan
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (919.02 KB) | DOI: 10.31937/sk.v9i1.570

Abstract

One of those beneficial innovations in DSLR camera it is able to connect with other mobile devices using wireless network. Its primary function is to control camera from distance and to instantly upload photos to social medial. But, not all DSLR cameras are equipped with this feature. Only the latest mid-end and high-end DSLR camera have the feature. In order to solve the previously mentioned issue, the researcher conducted a trial using Arduino and Bluetooth as the camera’s wireless network. The result showed that Arduino did not have its own module and, as a result, users would need to add new modules if they wanted to add new features. This was considered ineffective and inefficient. Moreover, Bluetooth connection is rarely used nowadays due to the limited transfer rate and area coverage compare to using WiFi connection. In line with the aforementioned explanation, a research was held with the main objective to access and operate low-end DLSR camera using Raspberry Pi. The Raspberry Pi was operated using access point and controlled by smartphone. Index Terms— Camera, DSLR, wireless, Raspberry Pi, Android
Analisis dan Implementasi Protokol Otentikasi FIDO U2F Sunderi Pranata; Hargyo Tri Nugroho; Hirofumi Yamaki
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.627 KB) | DOI: 10.31937/sk.v9i1.571

Abstract

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection. Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP
Pengaruh Algoritma Stemming Nazief-Adriani Terhadap Kinerja Algoritma Winnowing Untuk Mendeteksi Plagiarisme Bahasa Indonesia Hargyo Tri Nugroho
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (476.904 KB) | DOI: 10.31937/sk.v9i1.572

Abstract

Winnowing algorithm is one among many algorithms for detecting document similarity and plagiarism. Some studies show that Winnowing algorithm performs quite well. One form of plagiarism is paraphrase plagiarism. Paraphrase plagiarism can be done by changing sentence structure, changing vocabulary, and adding or changing affixes. Based on some of our previous experiments, detecting document resemblances can be enhanced by changing the words containing affixes to their basic words. In computer science, this technique is known as stemming - a technique to extract the basic word from an affixed word. Usually this technique is required in the filtering process to save storage media. For Indonesian, the Nazief-Adriani stemming algorithm is by far the most appropriate. This study examines how the effect of Nazief-Adriani stemming algorithm on Winnowing algorithm's performance against Indonesian texts. The results showed that the stemming process using Bloom-Filter on the Winnowing algorithm tends to decrease the similarity level achieved, but it accelerates processing time by approximately 30%. Keywords—Algoritma Nazief-Adriani, Algoritma Winnowing, Bloom-Filter, Plagiat, Plagiat Checker
Rancang Bangun Mekanisme Load Sharing Pada Link Aggregation Menggunakan Software Defined Networking Samuel Samuel; Cahyo Eko Samudera
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 1 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.494 KB) | DOI: 10.31937/sk.v9i1.573

Abstract

Given the level of activity of Internet users is high on lately. Impact on the growing needs for server throughput can be treated with load sharing on link aggregation. However, it possess a problem for UDP protocol data packets which will experience jitter and packet received out of order high. Therefore, the author tries to create an algorithm to share the package which will be sent to the server with weighted round robin method that focuses UDP Protocol data packets. The author uses the Software Defined Networking (SDN) and OpenFlow protocol that is capable of directly reprogrammed network devices. Host connect by sending packets Internet Control Message Protocol (ICMP), Transport Control Protocol (TCP) and User Datagram Protocol (UDP) to the server, then do an analysis of the bandwidth, jitter, datagrams, and retry. The author has successfully implemented with the emulator Mininet and testing. The results indicate that the average jitter is able to be reduced to 50% and packets received out of order is reduced to 0 compared to standard link aggregation with weighted round robin load sharing method. Keywords— Software Defined Netwoking, Link Aggregation, Weighted Round Robin, UDP
Implementasi Monitoring Kualitas Udara Menggunakan Peramalan Exponential Smoothing dan NodeMCU Berbasis Mobile Android Kurniansyah Pratama; Eko Budi Setiawan
Ultima Computing : Jurnal Sistem Komputer Vol 9 No 2 (2017): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2508.211 KB) | DOI: 10.31937/sk.v9i2.656

Abstract

Poor air quality threatens the health of all living things from humans to plants. Most people don’t know that the air they are breathing may be polluted. WHO said that 92% population in the world are living in the area with poor air quality that exceed the safe limit from WHO. Carbondioxide is one of many dangerous gas that must be considered by human. It can cause serious problem to human health. Industries are contribute to carbondioxide concentration in air. The purpose of this system is build the tool using NodeMCU microcontroler to measure the air quality in some place. This system can inform the user about air quality in their place by using Android smartphone. The forecast feature can be used to prevent the dangerous air quality. Index Terms— Carbondioxide, Air Quality, Android, Forecast

Page 3 of 16 | Total Record : 157