cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika" : 11 Documents clear
IMPLEMENTASI METODE USER CENTERED DESIGN DALAM PERANCANGAN APLIKASI PEMBELAJARAN VLAN & INTER-VLAN ROUTING Anthonio Febrianto Patulak; Joko Purwadi; Theresia Herlina R.
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5179.41 KB) | DOI: 10.21460/inf.2015.111.428

Abstract

This research aims to make learning application materials VLANs and Inter-VLAN Routing with User-Centered Design (UCD) methods. System was evaluated by involving students, to evaluate the level of interest and ease students' learning. The results of feedback given by the participants back to the interface implemented learning applications. In addition, the authors also do a hypothesis test to determine whether the designed application has improved the understanding of learning for the user or not. Based on the results of usability testing using self-reported metrics showed 72% of participants agreed that the learning system useful, 74% of participants were satisfied with the learning system that has been made, 62% of participants agreed that the learning system is easy to use, and 64% of participants agreed that the learning system provides ease of learning.
EVALUASI CIRI CITRA MEDIS MENGGUNAKAN METODE PENINGKATAN KUALITAS CITRA HISTOGRAM EQUALIZATION DAN KARAKTERISASI STATISTIK Afriliana Kusumadewi; Sugeng Santoso
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (11707.181 KB) | DOI: 10.21460/inf.2015.111.414

Abstract

This research has an objective to implement histogram equalization technique in the evaluation of characteristics medical images, especially for statistical characterization of medical images. Implementation starting with the pre-processing of the image by converting RGB medical images into grayscale images, followed by determination of the Region of Interest (ROI) and cropping methods. The next process was to increase the quality of medical images by implementing histogram equalization technique. The medical image characteristic was evaluated using characteristic statistical methods with their parameters are mean value, standard deviation, entropy, skewness, and kurtosis. The Medical image was used in this research is a medical image of advanced breast cancer. This research compared the characteristics statistical characterization of medical images obtained with the original medical image which has enhanced use histogram equalization technique. The results of implementation histogram equalization obtain medical image feature extraction results for the value of mean, entropy, skewness, and kurtosis become smaller and standard deviation value was increase.
IMPLEMENTASI MONTE CARLO TREE SEARCH PADA PERMAINAN KARTU “DAIFUGO” Eunike Thirza Hanitya Christian; R. Gunawan Santoso; Erick Purwanto
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7624.628 KB) | DOI: 10.21460/inf.2015.111.424

Abstract

Daifugo is climbing card game that is originated from Japan. AI player of Daifugo card game can be implemented using Monte Carlo Tree Search to get optimal result from random simulation. Monte Carlo Tree Search has 4 step, selection, expansion, simulation and backpropagation that is executed until maximal loop is reached. Objective of using Monte Carlo Tree Search on AI player in Daifugo card game is to get move with high winning rate and to observe the effect of number of loop on the method to winning rate
IMPLEMENTASI ALGORITMA DIJSKTRA UNTUK PERINGKASAN OTOMATIS ARTIKEL ILMIAH BERBAHASA INGGRIS Yanuar Budi Prasetyo; Gloria Virginia; Antonius Rachmat Chrismanto
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5193.383 KB) | DOI: 10.21460/inf.2015.111.429

Abstract

This research implemented Dijkstra algorithm to summarize text documents. To run Dijkstra algorithm, we represented sentence as a vertex and the similarity between sentences as an edge, where the result of the summarization process was the shortest path of Dijkstra calculation. The summarization processes were conducted by utilizing WordNet database and without WordNet database. Our experiment showed that without WordNet the result was better than using WordNet. Using WordNet, the system could obtain 80% relevant sentences. While without WordNet, the system could obtain about 90% of relevant sentences.
SISTEM PENGAMANAN BRANGKAS MENGGUNAKAN KOMBINASI PIN, RFID, DAN SMS BERBASIS MIKROKONTROLER AVR ATMEGA32 Agus Wibowo; Hendro Setiadi; Prihadi Beny Waluyo
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4331.926 KB) | DOI: 10.21460/inf.2015.111.416

Abstract

This safe box security system with a PIN combination, RFID, and SMS is controlled by a microcontroller ATmega32. This system is designed to verify the PIN number input which is read by the keypad, RFID tag number input of RFID reader, and random code sent via SMS consecutively as the requirement to open the safe box. When receiving the SMS which contain a random code from the system, user must reply the SMS corresponding to the received code within two minutes. If all of the requirements is fulfilled, servo as the locker slot will move that makes the safe box can be opened. If there is one of requirements which is not fulfilled, buzzer will beep and user have must restart the process. This system use 16x2 LCD as the interface to show the information to the user.
KLASIFIKASI SENTIMEN PEMBELI BERDASARKAN LAYANAN SMS “SUARA KONSUMEN” TERHADAP PRODUK MENGGUNAKAN METODE K-NN David Addiwijaya Hanz; Budi Susanto; Lukas Chrisantyo
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3383.566 KB) | DOI: 10.21460/inf.2015.111.423

Abstract

Limited number of characters in an SMS causes the use of words and the structure of solid and compact but obviously become very important in presenting the content and purpose of the sender of the SMS. This research studied how the use of SMS classify structures and limited words to get the sentiment of an SMS service "Suara Konsumen" through text mining approach. This study uses K-NN algorithm in the classification, besides the K-NN algorithm of this study will be weighted words using TF-IDF methods, Feature Selection in the selection of words also Cosine Similiarity in measuring the degree of proximity between documents. In determining the success, measured the accuracy of the documents the trial and the results are very accurate with an average value of 89% accuracy on the variation of K and Feature Selection.
KLASIFIKASI SUARA MANUSIA KE DALAM SOPRAN, MEZZO SOPRAN, ALTO, TENOR, BARITON, BASS DENGAN SELF ORGANIZING MAP Andreas Saputra; Sri Suwarno; Lukas Chrisantyo
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3112.48 KB) | DOI: 10.21460/inf.2015.111.418

Abstract

Self Organizing Map adalah metode jaringan syaraf tiruan (Artificial Neural Network) yang biasa digunakan untuk melakukan proses klasifikasi dengan sifat unsupervised learning atau pelatihan tak terbimbing. Cluster yang akan digunakan akan ditentukan secara manual hanya saja dalam prosesnya data yang masuk akan dikelompokan secara otomatis tanpa adanya intevensi dari sistem. Penelitian ini menerapkan Self Organizing Map untuk melakukan klasifikasi data berupa rekaman suara dengan format file WAV karena merupakan format audio yang belum terkompresi ke dalam sopran, mezzo sopran, alto, tenor, baritone, dan bass. Dalam pengambilan data untuk input melalui proses preemphasis, frame, blocking, dan windowing sebelum dirubah menjadi sinyal diskrit dengan Fast Fourier Transform. Data berupa rata-rata magnitude menjadi input dalam sistem klasifikasi Self Organizing Map. Dalam penelitian ini hasil yang didapat belum sesuai dengan harapan karena data tidak mengelompok dengan baik.Self Organizing Map adalah metode jaringan syaraf tiruan (Artificial Neural Network) yang biasa digunakan untuk melakukan proses klasifikasi dengan sifat unsupervised learning atau pelatihan tak terbimbing. Cluster yang akan digunakan akan ditentukan secara manual hanya saja dalam prosesnya data yang masuk akan dikelompokan secara otomatis tanpa adanya intevensi dari sistem. Penelitian ini menerapkan Self Organizing Map untuk melakukan klasifikasi data berupa rekaman suara dengan format file WAV karena merupakan format audio yang belum terkompresi ke dalam sopran, mezzo sopran, alto, tenor, baritone, dan bass. Dalam pengambilan data untuk input melalui proses preemphasis, frame, blocking, dan windowing sebelum dirubah menjadi sinyal diskrit dengan Fast Fourier Transform. Data berupa rata-rata magnitude menjadi input dalam sistem klasifikasi Self Organizing Map. Dalam penelitian ini hasil yang didapat belum sesuai dengan harapan karena data tidak mengelompok dengan baik.
PROGRAM VIDEO CALL BERBASIS PEER TO PEER MENGGUNAKAN PROTOKOL RTMFP Nathaniel Gunawan; Gani Indriyanta; Willy Sudiarto Raharjo
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4576.918 KB) | DOI: 10.21460/inf.2015.111.425

Abstract

The rapid development of information technology-based communication to encourage the development of video conferencing applications to a variety of media platforms. One of the media that is easily accessible is a web application development based RIA (Rich Internet Application). In this study developed a flash-based video conferencing application to utilize the net class group in ActionScript 3.0 and multimedia protocols RTMFP (Real Time Media Flow Protocol). Streaming video delivery technology requires codecs to be able to transmit video and audio. To find out which one is suitable codec in the development of this application, the analysis is done where appropriate codec for video conferencing on the public network access in terms of the quality of the resulting. The conclusion of the implementation and analysis of three types of audio codecs and codec, is that the codec h.264 and h.264 base profile play a video codec that is suitable for public networks because it produces little noise when there is a lot of movement when compared to the Sorenson video codec.
IMPLEMENTASI STEGANOGRAFI DENGAN METODE END OF FILE PADA TEKS YANG TERENKRIPSI MENGGUNAKAN BLOCK CIPHER RIVEST CODE-6 KE DALAM CITRA Andrew Chandra; Willy Sudiarto Raharjo; Junius Karel Tampubolon
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10165.31 KB) | DOI: 10.21460/inf.2015.111.420

Abstract

Datas or informations are very important assets nowdays, that is why we have to keep it safe so it will not fall into one who is do not have rights. There are several methods to maintain the confidentiality of datas/informations, which are cryptography and steganography. By using cryptographic Rivest Code-6 algorithm then the datas/informations is converted into a form that cannot be undestood, and then steganographic End of File algorithm the datas/informations is inserted into another media so that ordinaary people do not know the existence of the datas/informations. The results of this research tell that by using both algorithms the secret datas/informations can be hidden and read back properly. In addition there will be increase in file size reservoirs, where the increase in dependent on the size of the secret datas/informations and file size of the reservoir, while the length of the key to be isnerted into reservoir will remain  at 16 bytes.
VERIFIKASI AKUN DATABASE DENGAN PENERAPAN METODE TEMPLATE MATCHING PADA KARATERISTIK WAJAH PERSONAL Ginting Pebrindanov; Widi Hapsari; Yuan Lukito
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4638.858 KB) | DOI: 10.21460/inf.2015.111.427

Abstract

The identification of account is a step to keep the important data secure. Nowadays, it can be done by using username and password, but, after see the reality, the using of username and password can’t keep the data secure from the thief. Because of that, the  verification of the characteristic of personal face can be a solution to change the using username and password. The method that can be used for verification is template matching.It is implemented in four features of personal face, such as left eye, right eye, nose and lips. The four images of  each feature will be extracted with wavelet haar method. The feature extraction will be done during template taking process and verification. The result of this research, the result of verification is determined by two factors,  such as the distance between face and web camera is different when the template taking process and the verification process and the diferrent brightness condition when the template taking process and the verification proccess. The threshold value that has been decided is not really able to block the unregistered data.  Then the accuracy of the verification activity is still low and it is still not able yet to identify an account well.

Page 1 of 2 | Total Record : 11