cover
Contact Name
I Gede Surya Rahayuda
Contact Email
igedesuryarahayuda@unud.ac.id
Phone
+6289672169911
Journal Mail Official
igedesuryarahayuda@unud.ac.id
Editorial Address
Sekretariat JNATIA Gedung FMIPA Lantai 1, Program Studi Informatika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Udayana
Location
Kota denpasar,
Bali
INDONESIA
Jurnal Nasional Teknologi Informasi dan Aplikasinya
Published by Universitas Udayana
ISSN : 29863929     EISSN : 30321948     DOI : -
Core Subject : Science,
JNATIA (Jurnal Nasional Teknologi Informasi dan Aplikasinya) merupakan jurnal yang berfokus pada teori, praktik dan metodologi seluruh aspek teknologi di bidang ilmu dan teknik komputer serta ide-ide produktif dan inovatif terkait teknologi baru dan sistem informasi. Jurnal ini memuat makalah penelitian asli yang belum pernah dipublikasikan dan telah melalui jurnal double-blind review. JNATIA (Jurnal Teknologi Informasi dan Penerapannya) diterbitkan empat kali setahun (Februari, Mei, Agustus, November).
Articles 255 Documents
Pengenkripsian dan Dekripsi Gambar Menggunakan Algoritma AES dengan MAC untuk Peningkatan Keamanan Astawa, Ni Wayan Amanda Putri; Widiartha, I Made
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 3 (2023): JNATIA Vol. 1, No. 3, Mei 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the increasing importance of data security in digital image transmission and storage, this research presents an implementation of an image encryption and decryption program using the Advanced Encryption Standard (AES) algorithm combined with Message Authentication Code (MAC) for enhanced security. The program utilizes AES in CipherBlock Chaining (CBC) mode to ensure confidentiality and integrity of the image data. The unique key and initialization vector (IV) enhance the security of the encryption process. Additionally, the inclusion of MAC ensures data integrity and prevents unauthorized modifications during transmission or storage. The program offers a user-friendly web-based interface for easy usability. The implemented solution provides a high level of security for image data and can be applied in various applications requiring secure image transmission and storage. The effectiveness and reliability of the program are demonstrated through experimental results and evaluation. Keywords: Advanced Encryption Standard, Message Authentication Code, Hash, Encryption, Decryption
Implementasi Random Forest Pada Klasifikasi Penyakit Kardiovaskular dengan Hyperparameter Tuning Grid Search Jayaditya, I Ketut Adian; Kadyanan, I Gusti Agung Gede Arya
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cardiovascular disease have the potential to cause death if not treated right, because it interferes with the function of the heart. Machine Learning algorithm can be used to do early diagnosis of cardiovascular disease to lower the risk of death. In this study, the classification of cardiovascular disease uses the Random Forest algorithm to determine whether a person has cardiovascular disease or not. Grid Search is also used to do hyperparameter tuning to find the optimal hyperparameter for the Random Forest algorithm. The performance results of the classification model using Random Forest with Grid Search are 73.06% in accuracy, 75.15% in precision, 68.72% in recall, and 71.79% in f1-score. Keywords: Cardiovascular Disease, Random Forest, Hyperparameter Tuning, Grid Search
Ekstraksi Fitur MFCC pada Lagu Gundhul Pacul Sitorus, Roger Julian; Astawa, I Gede Santi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MFCC is an effective method in audio feature extraction, including in song and music analysis. This method involves converting the frequency spectrum of the audio signal into the Mel scale, which is more in line with human auditory perception, and then calculating the cepstral coefficient. The results of the MFCC feature extraction on the song "Gundhul Pacul" show the pattern of the song's spectral and rhythmic characteristics. By using the MFCC representation, it is possible to see changes in energy and frequency patterns in audio signals at various time intervals. The results of the MFCC show that there are 13 resulting cepstral coefficients. However, the number of cepstral coefficients can be adjusted depending on the application and specific needs. Keywords: Features Extraction, MFCC, Gundhul Pacul
Pengamanan Data Tekstual dengan Kombinasi Vigenere Cipher dan Caesar Cipher Pertiwi, Luh Arimas; Sanjaya ER, Ngurah Agus
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Problems in data security is an important aspect in maintaining data storage, especially data stored in digital form. This is due to very rapid progress in the field of computer science with the open-system concept that has been widely used, so that this can make it easier for someone to destroy data, especially data stored in digital form without having to be known by the data custodian. In this case the researcher found a problem in using one algorithm, namely the Caesar cipher in data security, where there is a Brute force attack that tries all possible key combinations to crack a password. In the context of the Caesar Cipher, brute force can be used to try all possible shifts of letters and find a key that produces a plausible decrypted text. This study aims to maximize the security of textual data by combining two algorithms in it, in which the algorithm used is the Vigenere Cipher and the Caesar Cipher. The result of this research is that textual data that is secured becomes more difficult to understand by third parties who may want to manipulate data. Keywords : Textual Data, Vigenere Cipher, Caesar Cipher
Isolation Forest dengan Exploratory Data Analysis pada Anomaly Detection untuk Data Transaksi Taksa Wibawa, I Made Sudarsana; Karyawati, Anak Agung Istri Ngurah Eka
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 3 (2023): JNATIA Vol. 1, No. 3, Mei 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Managing value of data is one of the key aspects of presenting analysis for decision making support in various cases. One of such method is by managing detecting anomaly in the data. This research focuses on implementing Isolation Forest result of anomaly detection. This method is used on transaction dataset from Kaggle with about more than 500.000 records. The result this research shows that Isolation Forest used in the dataset have 0.899 in accuracy, 0.00649 in precision, 0.504 in recall, and 0.013 in F1 score. Keywords: Isolation Forest, iForest, Anomaly Detection
Perancangan Desain Antarmuka Aplikasi Mobile DestiGuide Menggunakan Pendekatan User Centered Design Ririmasse, Charles Alexander; Santiyasa, I Wayan
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Traveling is considered a delightful activity to engage in during leisure time. By employing a User-Centered Design approach, the developed tourism application has successfully delivered a satisfying user experience. This method allowed the developers to focus on users' needs, preferences, and enjoyment while designing and developing the application. The results obtained from the System Usability Scale (SUS) measurement yielded an average score of 77,5 from a total of 20 respondents. This indicates that the application possesses good usability and is relatively easy to navigate for users. Although there is room for further improvement, this conclusion suggests that the application has achieved its main goal of providing a seamless and responsive user experience in searching, exploring, interacting, and obtaining information about various tourist destinations. Keywords: Traveling, User-Centered Design, System Usability Scale.
Integrasi Chatbot Berbasis GPT Terhadap Website E-Commerce (Studi Kasus Toko JSA) Teguh Pramana, Made Putra; Rahayuda, I Gede Surya
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 3 (2023): JNATIA Vol. 1, No. 3, Mei 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A website is a series of sites with related hyperlinks that individuals, organizations, companies, or government made. E-commerce websites are websites that have features for transaction through online services. Toko Jsa Emas Perak is one of the companies that want to develop its company's presence on the internet using e-commerce websites. Uniqueness is important to have an edge between online competition. By implementing a chatbot system in the e-commerce website, it can increase the effect on each user in interaction. the propose of this research is to implement a chatbot service in the toko jsa website. Keywords: blackbox,e-commerce websites,chatbot, GPT
Penerapan Ontologi dalam Representasi Pengetahuan Gangguan Kesehatan Mental Octavia, Hana Christine; Widiartha, I Made
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information about mental health disorders is widely available, but there is still a need for a system that can accommodate existing knowledge and assist experts in explaining this knowledge. Building an ontology using the methontology methodology involves 10 stages that must be followed to construct the ontology. The outcome of this research is expected to provide a clear and systematic representation of knowledge about mental health disorders based on the constructed ontology. This representation will aid in understanding, early diagnosis, and management of mental health disorders. The Protégé software is used for constructing this knowledge domain.
Perancangan Desain UI/UX Untuk Aplikasi Loyalty Point Agent Menggunakan Metode Design Thinking Dwi Putra, I Made Paramadhika; Santiyasa, I Wayan
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the first spread of COVID-19 in Indonesia, technological developments in Indonesia have entered the industrial era 4.0. where this causes a change in habits, especially shopping where the current online shopping phenomenon makes it easy for customers to buy goods or services via mobile or websites so it is slowly replacing the existence of conventional traders. As a result, MSME business actors in this digital era need an innovation that not only attracts new customers but can also make these new customers become regular customers so that they can increase customer retention during the Covid-19 pandemic, namely by introducing a loyalty system. Even so, the current loyalty system still has shortcomings, including a loyalty system with a card where customers cannot see the points that have been accumulated, there is no complete information about the benefits obtained, the lack of variety in loyalty, and others. Therefore, this study aims to analyze the functional requirements of the loyalty point agent app that is used to introduce the loyalty system to MSME business customers. The method used in this research is Design Thinking and the result of this research is the UI/UX design of the loyalty point agent application.
Overlapping Map Penggunaan Overlapping Map dari Hasil Pengerjaan Reading Comprehension pada Aplikasi Viat – Map Zahri, Riris Silvia; Andoko, Banni Satria; Amalia, Eka Larasati
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Viat-map is a web-based application that implements the Toulmin Argument concept for use in English Reading Comprehension subject. User acceptance of the Viat-Map application is one of the factors that supports the continued use of the application. Measurement of user acceptance of the Viat-Map application is carried out using the TAM (Technology Acceptance Model) method. This study aims to evaluate the implementation of the Viat-Map application using the TAM method, so that user perceptions and the factors that influence users in using the application can be identified. The research method uses a questionnaire as a tool to collect data on 26 users of the Viat-Map application. The results showed that user acceptance of the Viat-Map application had a positive effect on 3 TAM variables, namely perceived user convenience 89.56%, perceived usefulness 86.68%, and technology acceptance 81.87%. This shows that application developers can focus on improving development on the Viat-Map application acceptance variable because the percentage variable value is smaller than the other variable values. Keywords: Toulmin Argument, Viat-Map, Technology Acceptance Model.