cover
Contact Name
I Gede Surya Rahayuda
Contact Email
igedesuryarahayuda@unud.ac.id
Phone
+6289672169911
Journal Mail Official
igedesuryarahayuda@unud.ac.id
Editorial Address
Sekretariat JNATIA Gedung FMIPA Lantai 1, Program Studi Informatika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Udayana
Location
Kota denpasar,
Bali
INDONESIA
Jurnal Nasional Teknologi Informasi dan Aplikasinya
Published by Universitas Udayana
ISSN : 29863929     EISSN : 30321948     DOI : -
Core Subject : Science,
JNATIA (Jurnal Nasional Teknologi Informasi dan Aplikasinya) merupakan jurnal yang berfokus pada teori, praktik dan metodologi seluruh aspek teknologi di bidang ilmu dan teknik komputer serta ide-ide produktif dan inovatif terkait teknologi baru dan sistem informasi. Jurnal ini memuat makalah penelitian asli yang belum pernah dipublikasikan dan telah melalui jurnal double-blind review. JNATIA (Jurnal Teknologi Informasi dan Penerapannya) diterbitkan empat kali setahun (Februari, Mei, Agustus, November).
Articles 255 Documents
Sistem Pakar Diagnosa Penyakit Sapi Berbasis Android Ari Negara, I Komang Agus; Muliantara, Agus
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cows are livestock that are widely kept by people in Indonesia. Like other livestock, cows can also get disease. Currently, the disease that is rife in attacking cows is Mouth and Nail Disease (FMD). The spread of this disease can be harmful to livestock production, so it is important to know early on the disease that occurs in cattle. This study aims to build a system that can be used to diagnose diseases to minimize the spread of FMD. The system built applies an expert system in diagnosing disease with the method of determining disease using the forward chaining method. The system built is implemented on an Android basis considering that currently the use of mobile-based devices has been widely used. The results of this study indicate that the expert system with the forward chaining method can be applied and functions well on an android basis.
Perancangan Infrastruktur Enkripsi End to End pada Aplikasi Penyimpanan File Berbasis Website Wiraputri, Ni Putu Sri Agnita Samyami; Pramartha, Cokorda Rai Adi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid evolution of information and communication technology has revolutionized how we communicate and share information. Despite the numerous benefits, these advancements have introduced challenges, particularly concerning data security and privacy. Issues like data interception and escalating file sizes necessitate effective solutions. Cryptography emerges as a pivotal tool in addressing these concerns, offering a means to bolster data security while mitigating file size. This field encompasses the science and techniques of information security, converting data into unreadable ciphertext through encryption algorithms and keys. Encryption, particularly end-to-end encryption, plays a crucial role in maintaining confidentiality during file storage and exchange. The RSA cryptographic algorithm exemplifies an asymmetric approach, utilizing distinct keys for encryption and decryption. Public and private keys ensure secure communication, with the public key encrypting messages and the private key decrypting them. This widely adopted algorithm fortifies data security across various applications. Complementing this, the Caesar Cipher, a simple substitution cryptographic technique, adds an additional layer to the encryption process. By replacing each character with another at a specified shift in alphabetical order, the Caesar Cipher offers a basic yet effective safeguard. Combining the robust RSA algorithm with the simplicity of Caesar Cipher enhances file storage security. Employing Caesar Cipher as the initial step in encryption, followed by RSA to encrypt its output, ensures double-layered encryption. This dual process guarantees that only the corresponding private key can decrypt the file, reinforcing the overall security of data storage and exchange. Keywords: Algorima RSA, Algoritma Caesar Cipher, Keamanan Jaringan
Perancangan Tampilan Antarmuka pada Aplikasi Selfqure dengan Menerapkan Metode Design Thinking Samanjaya, I Gede Arisudana; Dwidasmara, Ida Bagus Gede
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mental health disorders in adolescents are influenced by factors such as social pressure, identity exploration, violence, harsh parenting, and socio-economic problems. The lack of understanding and stigma surrounding mental health issues often leads adolescents to avoid discussing their problems, resulting in potential risks to their well-being. To address this, the development of mobile applications like "Selfqure" focuses on providing information and treatment for mental health problems in adolescents. By utilizing design thinking principles, the application aims to enhance user experience and interface, increase understanding, reduce stigma, and improve access to support. Usability testing of the app yielded a score of 82, indicating satisfactory acceptance and usability among the target age group. This highlights the importance of innovative solutions to tackle mental health challenges and promote well-being in adolescents. Keywords: Mental Health, Design Thinking, User, User Interface.
Perancangan Aplikasi Forcoms Menggunakan Metode User Centered Design Abhirama Adnyana, I Gusti Agung Gde; Mahendra, S.Kom., M.Kom., Ida Bagus Made
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Building application are the hardest thing, specially the user interface. User Interface be the first thing user see and the pointer between application and user it’s self. User Center Design are design by valuing from user base, not like other method for designing. UCD create design from feedback user and making the valuable design for user to use and the design methodology for understandable design. in this case using UCD and implement the design to android application using programming language like java.
Low-level Images Extraction Features pada Algoritma SVM untuk Mengidentifikasi Kematangan Jeruk Wijaya, I Made Agus Rama; Suhartana, I Ketut Gede
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Terkadang jika melakukan identifikasi secara manual oleh petani buah masih memunculkan peluang terjadinya human error saat panen. Untuk itu, penelitian ini dilakukan bertujuan untuk pelatihan klasifikasi terhadap buah jeruk guna mengurangi error rate dalam pemanenan. Kematangan buah dipisah ke dalam dua kelas yaitu matang dan belum matang. Dimana dataset yang digunakan merupakan data sekunder citra buah jeruk dengan total sebanyak 400 buah, yaitu 200 citra matang dan 200 citra belum matang. Metode yang digunakan adalah Support Vector Machine kernel linear dengan penggabungan Low-level Image Extraction Features, yaitu warna dengan color histogram, tekstur dengan metode Gray Level Co-occurance Matrix (GLCM), dan bentuk dengan kalkulasi kontur. Pembagian klasifikasi dilakukan dengan membagi dataset menjadi 20% data uji dan 80% data latih. Hasil klasifikasi pada penelitian mendapatkan nilai akurasi sebesar 96,34%. Keywords: SVM, Klasifikasi, Low-level Extraction Features
Analisis Clustering Paket Data Internet di Indonesia Menggunakan Metode K-Means Wijaya, I Putu Ananta; Astawa, I Gede Santi
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 1 (2022): JNATIA Vol. 1, No. 1, November 2022
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Disruption of technology and the impact of the recent pandemic has made people access the internet longer than before, especially with smartphones. Before accessing the internet, users must purchase a data package provided by an internet service provider. Various data packages are provided by internet service providers. Starting from network coverage, speed, number of quotas, active period, to tariffs are the choices of each operator. These various offerings often make users confused because they have to adjust to economic conditions. The existence of knowledge analysis in the database, grouping data packets can be done using the k-means method. K-means groups data by iterating and creating groups based on the closest distance of the data to the center point. K-means is very widely used because of its simplicity. Before clustering, the data will go through a preprocessing process. The end result is four clusters that have their own characteristics. For example, cluster four has the characteristics of a small quota with a long active period, which is suitable for the typical community who only wants to stay connected to the internet for communication.
Klasifikasi Suara Pria Menggunakan Metode Fast Fourier Transform (FFT) Pattraksha, Anak Agung Gde Ramananda Kartikeya; Muliantara, Agus
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 1 No 2 (2023): JNATIA Vol. 1, No. 2, Februari 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i02.p01

Abstract

Every Person has a different voice. By gender, the voice type is divided into six parts, namely soprano, soprano and tenor for girls and tenor, baritone and bass for men. Each type of sound has a by different range and with different frequencies: this study classified the voice type in Men using Fast Fourier Transform (FFT) method by recording each user's voice , then will be processed by FFT method to obtain the appropriate sound range. sound This study has obtained results with up to 80% accuracy. The results obtained from this study are quite consistent and there is evidence that the FFT method can be used in digital signal processing. Keywords: Fast Fourier Transform, Sound type, Men, Frequency
Image Restoration Menggunakan Metode Lucy-Richardson pada Citra Digital Gotama, Sammaditthi; Santiyasa, I Wayan
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This journal discusses the use of the Lucy-Richardson method for image restoration on digital images. Digital images are often affected by noise or blur, which can cause the image to be too contrasted, out of focus, less sharp, and so on. Therefore, digital image processing technology is very important to improve image quality. Image restoration is one of the digital image processing techniques used to improve images that are affected by noise or blur. The Lucy-Richardson method is one of the methods that can be used to perform image restoration on digital images. In this journal, we will discuss the basic theory of the Lucy-Richardson method, the implementation of the Lucy-Richardson method on digital images, and the evaluation of the results of using the Lucy-Richardson method on digital images. The purpose of this journal is to provide a better understanding of the use of the Lucy-Richardson method for image restoration on digital images. Keywords: Image restoration, Lucy-Richardson method, Digital Imaga, Noise
Perancangan Aplikasi Tour Travel Nusa Tenggara Timur Berbasis Web Kewa Nilan, Yasinta Anita; Suhartana, I Ketut Gede
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

East Nusa Tenggara (NTT) is a province in Indonesia which is rich in natural beauty, culture, and history. Even though NTT has tremendous tourism potential, challenges in the promotion and accessibility of tourist destinations are still a major concern. In today's digital era, web-based applications are tools that effectively facilitate the tourism industry by providing complete information, facilitating travel planning, and expanding the reach of promotions. Therefore, this web-based NTT travel tour application makes it easy for tourists to access information, compare options, and plan trips efficiently. Keywords: Application, Tourism, Tour Travel, East Nusa Tenggara, Website
Sistem Pendeteksi Sampah Secara Realtime Menggunakan Metode YOLO Priana, Kadek Adi; Eka Karyawati, Anak Agung Istri Ngurah
Jurnal Nasional Teknologi Informasi dan Aplikasnya Vol 2 No 1 (2023): JNATIA Vol. 2, No. 1, November 2023
Publisher : Informatics Study Program, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

At present, people’s daily garbage is increasing day by day. How to intelligently classify garbage can save manpower and improve work efficiency. In this paper, a garbage classification model is based on. First, according to the common daily garbage category, twelve typical kinds of garbage were selected, data cleaned, labeled, and constructed a garbage dataset. Second, YOLO was built and trained on our datasets. The experimental results show that YOLO can accurately identify the garbage’s types and find out the location of garbage. Keywords: YOLO, Convolutional Neural Network, Sampah, object detection

Page 6 of 26 | Total Record : 255