cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 151 Documents
PROGRAM VIDEO CALL BERBASIS PEER TO PEER MENGGUNAKAN PROTOKOL RTMFP Nathaniel Gunawan; Gani Indriyanta; Willy Sudiarto Raharjo
Jurnal Informatika Vol 11, No 1 (2015): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4576.918 KB) | DOI: 10.21460/inf.2015.111.425

Abstract

The rapid development of information technology-based communication to encourage the development of video conferencing applications to a variety of media platforms. One of the media that is easily accessible is a web application development based RIA (Rich Internet Application). In this study developed a flash-based video conferencing application to utilize the net class group in ActionScript 3.0 and multimedia protocols RTMFP (Real Time Media Flow Protocol). Streaming video delivery technology requires codecs to be able to transmit video and audio. To find out which one is suitable codec in the development of this application, the analysis is done where appropriate codec for video conferencing on the public network access in terms of the quality of the resulting. The conclusion of the implementation and analysis of three types of audio codecs and codec, is that the codec h.264 and h.264 base profile play a video codec that is suitable for public networks because it produces little noise when there is a lot of movement when compared to the Sorenson video codec.
PENERAPAN ALGORITMA KRIPTOGRAFI ASIMETRIS RSA UNTUK KEAMANAN DATA DI ORACLE Ivan Wibowo; Budi Susanto; Junius Karel
Jurnal Informatika Vol 5, No 1 (2009): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (70.399 KB) | DOI: 10.21460/inf.2009.51.68

Abstract

RSA merupakan salah satu algoritma kriptografi asimetris yang menggunakansepasang kunci, yaitu kunci publik dan kunci pribadi. Panjang kunci dapat diatur, dimanasemakin panjang bit pembentukan kunci maka semakin sukar untuk dipecahkan karenasulitnya memfaktorkan dua bilangan yang sangat besar. Penelitian ini menerapkan algoritmaRSA untuk enkripsi dan dekripsi kolom suatu tabel pada basis data Oracle sebagai basisdata terbaik pada saat penulisan ini dibuat. Berdasarkan penelitian yang telah dilakukan,penulis dapat menarik kesimpulan, yaitu: Algoritma kriptografi asimetris RSA dapatdiimplementasikan untuk proses enkripsi dan dekripsi kolom suatu tabel pada basis dataOracle, khususnya untuk tipe data varchar2.
IMPLEMENTASI ALGORITMA GENERATE AND TEST PADA PENCARIAN RUTE TERPENDEK Selvy Welianto; Raden Gunawan Santosa; Antonius Rachmat Chrismanto
Jurnal Informatika Vol 7, No 2 (2011): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1600.924 KB) | DOI: 10.21460/inf.2011.72.103

Abstract

Masalah pencarian merupakan masalah yang umum diterapkan pada sistem berdasarkan Kecerdasan Buatan. Salah satu metode pencarian heuristik dalam terminology Kecerdasan Buatan yang cukup dikenal adalah Generate and Test. Travelling Salesman Problem (TSP) atau dipahami sebagai pencarian jalur terpendek sering diimplementasikan ke dalam dunia nyata. Tujuan penelitian ini adalah mengimplementasikan konsep pencarian heuristik dengan algoritma Generate and Test pada pencarian rute terpendek dengan studi kasus bus Trans Jogja. Parameter yang digunakan adalah jarak atau waktu. Dari hasil penelitian ini didapatkan sebuah sistem yang mampu menemukan rute terpendek, rute alternatif (jika ada), saran trayek yang digunakan beserta analisis perhitungan setiap rute yang ditemukan. Kata kunci : pencarian, algoritma Generate and Test, bus Trans Jogja
IMPLEMENTASI ALGORITMA WINNOWING UNTUK MENDETEKSI KEMIRIPAN PADA DOKUKEN TEKS Obed Kharisman; Budi Susanto; Sri Suwarno
Jurnal Informatika Vol 9, No 1 (2013): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8362.684 KB) | DOI: 10.21460/inf.2013.91.141

Abstract

Plagiarism is one of the main problems which the academic world must cope with recently. Many student papers and assignments had been found containing lines or sentences directly copied or sourced without sufficient acknowledgments to their original authors. Based on this fact, this research is conducted by developing software capable of detecting similarity between text documents, using “Winnowing algorithm” which is a document fingerprinting algorithm. The goal of this research is to measure its effectiveness in comparing test documents and reporting their similarity by percentage.
PENERAPAN OPTICAL CHARACTER RECOGNITION (OCR) UNTUK PEMBACAAN METERAN LISTRIK PLN Robert Gunawan; Sri Suwarno; Widi Hapsari
Jurnal Informatika Vol 10, No 2 (2014): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (819.168 KB) | DOI: 10.21460/inf.2014.102.331

Abstract

This paper will discuss an automatic recognition system to facilitate the activities of reading and recording of the electricity kWh meter. The system will analyze a captured image of the electricity kWh meter display using character recognition method. Prior to applying this method, each photo image of the kWh meter display will be pre-processed (i.e. converting the image to grayscale and determining the threshold). To detect the kWh meter display area, a smearing approach will be applied which connected the component labeling to character segmentation. To recognize each number, a template matching will be used. This study show that these steps were not yields good result in recognizing the characters in the electricity kWh meter. This is due to several factors, such as the persistence of noise that interfered with the character recognition, camera angles, lighting effect and the effect of the smearing limit.
PROGRAM BANTU PERENCANAAN DAN PENGENDALIAN PERSEDIAAN BAHAN BAKU PADA PROSES PRODUKSI TONER Idha Kristiana; Lucia Krisnawati; Willy Sudiarto Raharjo
Jurnal Informatika Vol 4, No 2 (2008): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5447.824 KB) | DOI: 10.21460/inf.2008.42.52

Abstract

Salah satu faktor yang mempengaruhi optimalisasi produksi adalah denganadanya pengelolaan persediaan bahan baku yang terkendali, sehingga diperlukanadanya suatu perencanaan untuk mendapatkan hasil produksi yang optimal. Olehkarena itu, peneliti manawarkan suatu penyelesaian dalam bentuk program bantu yangmenerapkan metode material requirement planning (MRP), quantity discount, dan Lofsizingtechnique dengan studi kasus PT. Digitone. Penerapan metode diatas terbuktidapat memaksimalkan proses produksi, mencegah tumpukan bahan baku digudang,mengurangi keterlambatan produksi, memenuhi kebutuhan konsumen secaramaksimal, serta meminimalkan biaya produksi. Hasil uji coba menunjukkan bahwa Loffor Lot merupakan Lot-sizing technique yang paling tepat untuk diimplementasikanbersama Material Requirement Planning dan menghasilkan total cost paling rendah.EOQ Lot-sizing technique dan Quantity Discount dalam kondisi tertentu dapatmenghasilkan totat cosf paling rendah, dengan demikian program bantu dapatmenghasilkan keputusan yang tepat dalam proses produksitoner.
Peranan Kontur dan Slope dalam Pengenalan Keaslian Tanda Tangan Menggunakan Dynamic Time Warping dan Polar Fourier Transform Ignatia Dhian Estu Karisma Ratri; Hanung Adi Nugroho; Teguh Bharata Adji
Jurnal Informatika Vol 12, No 2 (2016): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (476.563 KB) | DOI: 10.21460/inf.2016.122.495

Abstract

The writer has seen that so far signatures are just validated manually, so there is possibility to create a system for hand signature recognition.  The objective of this research is to improve the method for hand signature recognition using combination method with different characteristic. Contour and slope used for special feature in this research. Contour and slope from image will be applied using Dynamic Time Warping (DTW). Another extraction feature that been used was Polar Fourier Transform (PFT).   The method employed for classification are Support Vector Machine (SVM).From the research results, the writer obtains the fact that the combination between the DTW and PFT using SVM classification, provide the better results in verification of an authentic hand signature with the accuracy of 93.23%.  it is expected that from this research, the results can be utilized in the process of verification of an authentic hand signature in near future dailylife.
PENERAPAN METODE USABILITY TESTING PADA VISUALISASI PEMBELAJARAN PROTOKOL SPANNING TREE Sandita A. Surbakti; Joko Purwadi; Nugroho Agus Haryono
Jurnal Informatika Vol 7, No 1 (2011): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (256.554 KB) | DOI: 10.21460/inf.2011.71.94

Abstract

Topologi ganda sangat dibutuhkan untuk meningkatkan availabilitas suatau jaringan dengan mencegah tidak bisa diaksesnya suatu bagian jaringan karena gagalnya komunikasi dalam suatu titik. Namun demikian topologi ganda dapat memunculkan permasalahan looping frame yang bisa menyebabkan kepadatan lalu lintas paket. Protokol Spanning Tree yang berjalan di Layer 2 dikembangkan untuk mengatasi munculnya looping pada topologi ganda. Protokol ini menggunakan mekanisme pengaturan port-port yang berperan dalam topologi ganda dalam status forwarding dan blocking (alternatif forward) secara administratif. Visualisasi Pembelajaran Protokol Spanning Tree ini dibuat untuk menjadi salah satu media pembelajaran yang menyajikan materi Protokol Spanning Tree dalam bentuk animasi, soal-soal latihan, dan studi kasus yang membantu dalam proses pemahaman dan pembelajaran Protokol Spanning Tree. Untuk mengukur tingkat usabilitas program ini, digunakan beberapa metode Usability Testing yang ada, yaitu: compatibility, consistency, flexibility, learnability, perceptual limitation, dan minimal action. Dari hasil penelitian terhadap mahasiswa kategori belum pernah belajar Protokol Spanning Tree sebelumnya diperoleh nilai Compatibility: 81.09%, Consistency: 75.64%, Flexibility: 76.73%, Learnability: 77.45%, Minimal Action: 74.55%, dan Perceptual Limitation: 77.82%. Sedangkan Penelian terhadap mahasiswa yang sudah pernah belajar Protokol Spanning Tree diperoleh nilai Compatibility: 78.67%, Consistency: 74.67%, Flexibility: 74.22%, Learnability: 72.89%, Minimal Action: 75.11%, dan Perceptual Limitation: 80%. Kata Kunci : Protokol Spanning Tree, Metode Usability Testing, Switch, Compatibility, Consistency, Flexibility, Learnability, Perceptual Limitation, Minimal action, frame Looping
University-Based Knowledge Product Outsourcing Model Dave E. Marcial
Jurnal Informatika Vol 8, No 2 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7064.995 KB) | DOI: 10.21460/inf.2012.82.130

Abstract

Outsourcing is not new in this ever changing world. It refers to the process of subcontracting a process, such as product design or manufacturing, to a third-party company. Today, the IT outsourcing industry has matured. This paper highlights about outsourcing with emphasis on its scope of operation, importance and impact in the business process and industry in general. This paper describes the unique approach in a university-based knowledge product outsourcing. It presents a discussion on the different resources in the operation and management of the university-based knowledge enterprise. The inception stage in the development of the outsourcing model is also described in this paper. The outsourcing process model presented in this paper highlights the following: faculty and staff as the knowledge provider, infrastructure as the outsourcing facility, business sector as the knowledge seeker, University-based as the business process, and product cost and income as the sharing of limited practice of profession. This paper further describes the features in the development of an online knowledge product outsourcing as a platform for an innovative knowledge enterprise.
IMPLEMENTASI METODE REST REQUEST PADA YOUTUBE WEB SERVICE UNTUK REPRESENTASI INFORMASI BERBASIS TIMELINE Ryan Peterzon Hadjon; Restyandito Restyandito; Willy Sudiarto Rahardjo
Jurnal Informatika Vol 10, No 1 (2014): Jurnal Teknologi Komputer dan Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6726.168 KB) | DOI: 10.21460/inf.2014.101.321

Abstract

Developing video search application using the service of a third party data (resources) provider is a complex process. Therefore to obtain the desired data, an efficient communication method is needed. This research explored the use of REST request communication method by using URL to identify video resources through YouTube API data. Video data that were identified will then be processed to get more relevant video search. Relevancy of the search result was determined by applying the mechanism of relevance-based system and user-based system. Based on the experiment analysis, it is concluded that key word has an important role in determining the relevance of the search result, as it is needed for timeline based representation.

Page 10 of 16 | Total Record : 151