cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol 13, No 2 (2015): NOVEMBER 2015" : 6 Documents clear
PENGUKURAN TINGKAT MOTILITAS SPERMA BERDASARKAN LINEARITAS SPERMA MENGGUNAKAN METODE ADAPTIVE LOCAL THRESHOLD DAN ELLIPSE DETECTION Hidayatullah, Priyanto; Nuriyadi, M.; Awaludin, Iwan; Kusumo, Reyhan Damar
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.347 KB) | DOI: 10.9744/informatika.13.2.44-50

Abstract

Technology that can be used toassist sperm examination is Computer-Aided Sperm Analysis (CASA). The problems with this technology are expensive and the methods are not open for public. A lot of researches have been done to have an altenative CASA’s method to examine sperm quality accurately, inexpensively, and fast. This research is focused on measuring the level of sperm motility. Visual observations of sperm motility greatly depend on each andrologists which are subjective and also the possibility of repetition for the examined sample does not exist. Moreover, visual observation cannot provide precise values for parameters that affect the sperm motion patterns which are Velocity Straight Line, Velocity Curvilinear Line, and Linearity. Focus of this research is to create an application using sperm detection method, Local Adaptive Threshold and Ellipse Detection to measure sperm linearity to determine the level of sperm motility based on the WHO standard. Experiment produces result with the smallest difference 5.7333% and the biggest difference 10.4667% compared to the result of visual analysis by andrologist.
LOAD BALANCING DINAMIS MENGGUNAKAN ALGORITMA DYNAMIC DISTRIBUTION UPON DEMAND PADA SISTEM ENKRIPSI/DEKRIPSI DATA TERDISTRIBUSI Laulyta, Lauw Reduardy I.; Fajar, Mohammad; Bahri, Syamsul
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.574 KB) | DOI: 10.9744/informatika.13.2.51-55

Abstract

The diversity of capability of computers worker in distributed system influences resource allocation and completion time for each jobs on the system. This study aims to implement a dynamic load balancing technique using dynamic distribution upon demand (DDD) algorithm to optimize the resource allocation in distributed data encryption/decryption system. Evaluating was performed by comparing the proposed system with two other models that is a system without load balancing and with static load balancing method. Evaluation result showed that the resource allocation in the proposed system using DDD algorithm more optimized and at the decryption process of three and four characters with proper workload initialization values presented that the job completion time much faster than the two other systems.
IOS APPLICATION FOR FINDING HALAL FOOD, MOSQUE, QIBLA DIRECTION AND PRAYER TIME Dwi, Febria Roosita
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.923 KB) | DOI: 10.9744/informatika.13.2.63-70

Abstract

Muslim sometimes has trouble when they travel to a new place for find where the location of the halal food and mosque near their location is. Other things that Muslim will have difficulty when they travel in to a new place are find the Qibla direction, pray time in local time and the mosque location near their location. From that problem MLH (Muslim Little Helper) want to help them to solve their problem. The process is carried out as follows: The app get the user location, send the location to the YELP API server and muslimshalat.com API to get the location of halal food, and mosque (using YELP) and for find the direction of Qibla and the prayer schedule (by using muslimshalat.com API). After the system get the data, then it will show on the Map (using apple map inside the app) and put the data as marker. For the Qibla direction and prayer time, it will show in arrow image and listview. This app will be use Swift for the development language. The test result shows that the YELP API can be use only in USA, and internet play as the main rule in this app, because to create connection to the server to pull the data, the system need internet to pass all the data to server.
AUDIT AWAL SISTEM INFORMASI PADA PT. X BERDASARKAN STANDAR CONTROL OBJECTIVES FOR INFORMATION AND RELATED TECHNOLOGY (COBIT 4.1) Monica, Cindy; Santoso, Leo Willyanto; Yulia, Yulia
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (232.577 KB) | DOI: 10.9744/informatika.13.2.33-38

Abstract

PT. X is a company engaged in the field of iron and steel construction, located in Surabaya. Not easy for a large company with business processes that are also wide enough to carry out all processes in the company by way of the manual. This is because in the era of globalization, companies must be able to address the issues and changes that occur quickly and on target. Therefore, companies urgently need an integrated application. However, the factor that must be considered not only focuses on the acquisition of application systems needed by the company alone. But companies also need to focus on maintaining the quality of the application system. Because the application system useful to support and enhance the company's management in order to improve company performance and effectiveness in delivering services to the public. Therefore, the researcher wants to conduct the audit planning of application system for PT. X with analysis on the condition of IT at PT. X to determine the COBIT domains that need to be audited.
REKAYASA PERANGKAT LUNAK DETEKSI DINI KECENDERUNGAN GANGGUAN KESEHATAN MASYARAKAT TERTINGGAL DAN PESISIR DENGAN BAYESIAN NETWORK Ilham, Ilham
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.059 KB) | DOI: 10.9744/informatika.13.2.39-43

Abstract

This study was conducted to see the trend of diseases caused by unhealthy lifestyles on disadvantaged communities and coastal villages around Gresik and Tuban using hybrid algorithms through the construction of the structure of Bayesian Network. The problem to be solved in this study is no system that can detect a relationship between unhealthy behavior that caused the disease. Model of this structure has never been applied directly in the field to detect a causal events for example, if a behavior is unhealthy will arise disease. Application of this model needs to be done with a field study to determine and prove the actual benefits of the concept of a hybrid construction of Bayesian network structure. The purpose of this research is to produce a software model capable of early detection of disease risk propensity underdeveloped rural and coastal communities who have unhealthy lifestyles in the form of construction of the structure and generates a probability value with a tendency disease. The comparison between the structure of the origin of the structure of the trial results indicate the level of suitability for complete test data difference of 10% to the original structure, and suitability for the test data is incomplete for more than 20% depending on the amount of his missing value. The validity of that smoke will have the tendency has tuberculosis disease, bronchitis or Lung Cancer through the test system is 80% to 90%.
THE CPA QUALIFICATION METHOD BASED ON THE GAUSSIAN CURVE FITTING Adithia, M.T.
Jurnal Informatika Vol 13, No 2 (2015): NOVEMBER 2015
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.9744/informatika.13.2.56-62

Abstract

The Correlation Power Analysis (CPA) attack is an attack on cryptographic devices, especially smart cards. The results of the attack are correlation traces. Based on the correlation traces, an evaluation is done to observe whether significant peaks appear in the traces or not. The evaluation is done manually, by experts. If significant peaks appear then the smart card is not considered secure since it is assumed that the secret key is revealed. We develop a method that objectively detects peaks and decides which peak is significant. We conclude that using the Gaussian curve fitting method, the subjective qualification of the peak significance can be objectified. Thus, better decisions can be taken by security experts. We also conclude that the Gaussian curve fitting method is able to show the influence of peak sizes, especially the width and height, to a significance of a particular peak.

Page 1 of 1 | Total Record : 6