Articles
9 Documents
Search results for
, issue
"Vol 9, No 2 (2008): NOVEMBER 2008"
:
9 Documents
clear
KRIPTOSISTEM MENGGUNAKAN ALGORITMA GENETIKA PADA DATA CITRA
Pakereng, Magdalena Ariance Ineke
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2297.536 KB)
|
DOI: 10.9744/informatika.9.2.137-149
Data and information security either those to be sent through the communication network or those to be kept in a device has brought into attention of the user of this information and data. Information and data security is being kept by making the data and information are not able to be read or known by unauthorized users. This can be done by using the cryptography technique. There are many cryptography techniques has been created to meet the above purpose. This research dealt with a new method in symmetric cryptosystem to encrypt digital image data using genetic algorithm. This method uses some components of genetic algorithm, the crossover operation and mutation operation, crossover rate and mutation rate, and fitness function. The process includes creating the encryption and decryption process using the crossover and mutation process. The crossover process illustrates the transposition technique, while the mutation process illustrates the substitution technique. This cryptosystem is applied to the 8-bit grayscale image using 2 (two) keys, random seed and number of generation. The result of the research shows that cryptosystem using the genetic algorithm is possible to be applied to the digital image. With 7000 or more as number of generation, plain image is possible to be encrypted into unrecognized cipher image, and by measuring the similarity of the image based on the pixel (pixel based similarity), the result of decipher image is similar with the plain image. The keys of the random seed affect the durability of the result of encryption process, while the sum of the generation affects the randomization of the cipher image and the running time (the time needed for the process).
ANALISA DAMPAK INVESTASI TEKNOLOGI INFORMASI PROYEK DATA WAREHOUSE PADA PERGURUAN TINGGI SWASTA DENGAN METODE SIMPLE ROI
Hendric, Spits Warnars Harco Leslie
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (106.314 KB)
|
DOI: 10.9744/informatika.9.2.101-108
The decreasing number of new students for private high education is forced the management specially high management to look for a means to generate information that will help them in their decision making process in compete with others high education. One of the solutions is to use the Information Technology like data warehouse to maintain data and give the best decision making. Simple Return On Investment (ROI) is used to asses the project justification. Based on ROI of 698.36% and total cash flow of Rp 8.334.901.522, it can be concluded that the project data warehouse on private high education is feasible to be implemented within the given assumptions in the process. Abstract in Bahasa Indonesia: Berkurangnya jumlah mahasiswa baru untuk perguruan tinggi swasta memaksa manajemen khususnya manajemen tingkat atas untuk berpaling untuk membuat sebuah informasi yang dapat membantu dalam membantu mengambil keputusan dalam rangka berkompetisi dengan perguruan tinggi lainnya. Salah satu jalan keluarnya adalah dengan membangun dengan pendekatan teknologi informasi seperti data warehouse untuk mengelola data dan memberikan pembuatan pengambilan keputusan yang paling terbaik. Simple Return on Investment (ROI) digunakan untuk menilai kelayakan proyek. Berdasarkan nilai ROI yang berkisar 698,36% and nilai total aliran uang kas yang mencapai Rp 8.334.901.522, dapat disimpulkan bahwa proyek pengembangan data warehouse pada perguruan tinggi swasta layak untuk diimplementasikan dengan asumsi-asumsi yang ada. Kata kunci: investasi teknologi informasi, return on investment, data warehouse, simple ROI
PERANCANGAN DAN IMPLEMENTASI WEBGIS PARIWISATA KABUPATEN SUMBA TIMUR
Tanaamah, Andeka Rocky;
Wardoyo, Retantyo
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (517.145 KB)
|
DOI: 10.9744/informatika.9.2.150-158
East Sumba district has big tourism potency. However this potency has been ignored by tourist, because the lack of information. Currently information provided is only in static character. This research aims to determine tourism potency in East Sumba District with WebGIS implementation using Mapserver Opensource, PHP/Mapscript, and Arcview. This research found that: 1) a simple data structure in MS4W was made to solve loading time problem; 2) in order to give detail information for tourist, data structure in Arcview covered village view or position; 3) an attractive facility in Tourism WebGIS of East Sumba District is searching facility (search). This facility could assist the consumer in order to get detail information about the tourism WebGIS database location, 4) no resistance found when Tourism WebGIS of East Sumba District tested in various browsers. Abstract in Bahasa Indonesia: Sumba Timur merupakan salah satu wilayah yang memiliki potensi pariwisata yang besar. Namun potensi pariwisata ini tidak dapat diketahui oleh wisatawan, dikarenakan kurangnya informasi tentang pariwisata Kabupaten Sumba Timur. Disamping itu, Informasi yang disediakan selama ini hanya bersifat statis. Mengacu pada pemahaman tersebut maka penelitian ini mengkaji Potensi Pariwisata Kabupaten Sumba Timur memanfaatkan WebGIS dengan menggunakan MapServer OpenSource, PHP, MapScript, dan ArcView. Berdasarkan pemahaman diatas, maka temuan dalam penelitian ini adalah 1) Struktur penyimpanan data dalam MS4W dibuat sesederhana mungkin; 2) Struktur tabel dalam arcview, perlu dibangun sampai tingkat desa untuk menberikan informasi posisi daerah wisata secara lebih detail; 3) Salah satu daya tarik dalam WebGIS Pariwisata Kabupaten Sumba Timur adalah fasilitas search (pencarian). Kehadiran fasilitas search pada dasarnya untuk membantu pengguna dalam mendapatkan informasi dalam lokasi database WebGIS pariwisata secara detail; 4) Berdasarkan pengujian pada berbagai browser, maka WebGIS Pariwisata Kabupaten Sumba Timur pada prinsipnya tidak memiliki kendala yang berarti. Kata kunci: WebGIS, Pariwisata, Sumba Timur
DESAIN RULES UNTUK TRANSFORMASI SINTAKS RDF (TEXT) KE RDF BERBASIS GRAFIK DALAM SEMANTIC WEB
Prapanca, Aditya
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (94.013 KB)
|
DOI: 10.9744/informatika.9.2.109-114
Semantic Web is a branch of field that provides infrastructure for the exchange of information from various resources based on the combined meaning contained in the information exchanged and the relationship between one particular meaning to another. In the semantic web, there are semantics, which connect a set of data that has a meaning which allows occurrence of the exchange of information. The aim of this study is to make rules used in the process of transformation from the RDF document to be RDF graph, the data model so that it can provide semantic meaning in a web of visual content (graphic). By using these rules, a case can be made based graphical tool that can help the designer in created the data model. The results are models form of graphical data input from text-based documents RDF. For the transformation process, starting with a separate document, then taken sequentially the object, and then take the attributes of the object, and the last search for the relationship of each object that is.
PEMBUATAN SYSTEM CORPORATE MESSENGER PADA JARINGAN LAN
Dewi, Lily Puspa;
MB Kmurawak, Remuz;
Santoso, Petrus
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (543.815 KB)
|
DOI: 10.9744/informatika.9.2.159-165
Corporate messenger is the one of the application that can be used for communication in a local area network. The backgrounds of this topic are needs of sending message process in the LAN. The messages which want to be presented are not only in a text format, but also can be in audio visual format. Computer client will connect to the server. When the connection has been established, the client continued the authentication and started sending message between client and server. Audio and video message sending can be done with peer to peer connection with entering the IP address first from remote user that we want to communicate with. The evaluation of this application was done by using 3 computers and as the result, we found that authentication process can work properly, sending text message was done properly and communication using audio can be heard clearly. In addition to video sending message, we could see directly in remote client. The average time to show the video on remote client is 3.771 seconds. Abstract in Bahasa Indonesia: Corporate messenger merupakan suatu aplikasi yang dapat digunakan untuk berkomunikasi dalam sebuah Local Area Network. Hal ini dilatarbelakangi oleh perlu adanya proses pengiriman pesan secara bersama-sama dalam sebuah Local Area Network. Pesan yang ingin dikomunikasikan tidak hanya berupa teks, tetapi dapat juga menggunakan video maupun audio Komputer client akan melakukan koneksi dengan server. Jika sudah terjadi koneksi dengan server, maka client tersebut akan melanjutkan dengan autentikasi dan kemudian dapat melakukan pengiriman pesan dengan client yang telah terdaftar dalam database server. Pengiriman pesan audio dan video terjadi dengan koneksi peer to peer dengan terlebih dahulu memasukkan IP address dari remote user yang ingin diajak berkomunikasi. Pengujian dilakukan dengan menggunakan tiga buah komputer dan diperoleh bahwa proses autentikasi dapat berjalan dengan baik, pengiriman pesan teks dapat dilakukan dengan baik dan komunikasi dengan menggunakan audio dapat didengar dengan jelas. Khusus untuk pengiriman pesan dengan menggunakan video dapat langsung dilihat pada remote client. Rata-rata waktu yang dibutuhkan untuk menampilkan video pada remote client adalah 3.71 detik. Kata kunci: Local Area Network, Messenger, Client server
RANCANGAN TATAKELOLA TEKNOLOGI INFORMASI UNTUK PABRIK PUPUK
Surendro, Kridanto
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (185.466 KB)
|
DOI: 10.9744/informatika.9.2.115-121
Many believe that information technology will be the major driver for economic wealth in the 21st century, but investing in information technology implementation on supporting corporate business process have a huge risk of failure because of the huge investment involved. There is a need of a comprehensive and structured IT governance from design until monitoring phase. This paper was trying to propose an IT governance model for a fertilizer company as a strategic state company in Indonesia’s macro economics. It identified current IT implementation, governance model requirements aligned with corporate resources and vision and mission base on COBIT standard. COBIT Standard is used because it has a good combination of the width and the depth of IT governance processes compared to other standards. Identification of current IT process maturity level showed that 50% of COBIT IT processes have maturity scale at 2, 37,5% at 1, and 12,5% at 3. None of current IT process maturity level had the same level with the expected one, so all of the process had a gap to be closed. The action in closing the maturity gap need a hard work for PT XYZ management. There are actions about defining policies and procedures, documentation of the defined policies and procedures, and a routine reviews of it. Abstract in Bahasa Indonesia: Teknologi Informasi diyakini sebagai pendukung utama tercapainya tujuan perusahaan di abad 21 ini, namun investasi penerapan teknologi informasi dalam menunjang proses bisnis suatu perusahaan mempunyai resiko kegagalan yang cukup besar dikarenakan nilai investasi yang menyertainya cukup besar. Untuk itu diperlukan suatu tatakelola teknologi informasi yang komprehensif dan terstruktur dari mulai perancangan sampai pengawasannya. Makalah ini mencoba memberikan suatu usulan model tatakelola teknologi informasi di sebuah pabrik pupuk yang merupakan salah satu BUMN yang mempunyai nilai strategis dalam menunjang makro ekonomi di Indonesia. Penelitian ini akan melakukan identifikasi profil penerapan TI yang telah ada, kebutuhan model pengelolaan yang disesuaikan dengan sumber daya dan visi misi perusahaan dengan menggunakan standar COBIT. Standar COBIT digunakan karena mempunyai kompromi yang cukup baik dalam keluasan cakupan pengelolaan dan kedetailan proses-prosesnya dibandingkan dengan standar-standar lainnya. Pada pengukuran kematangan proses TI di PT XYZ, terlihat bahwa 50% proses TI COBIT mempunyai kematangan pada skala 2 (repeateable but intuitive), 37,5% pada skala 1 (initial/ad hoc), dan 12,5% pada skala 3 (defined process). Hal ini menunjukkan bahwa belum satupun proses TI COBIT yang sudah mempunyai tingkat kematangan yang seharusnya dimiliki. Seluruh proses masih memiliki gap yang harus ditutup. Kata kunci: tatakelola, teknologi informasi, COBIT
IMAGE DATA CLASSIFICATION BY NFES-MODEL
Efgivia, M. Givi;
A. Prasad, Safaruddin
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (252.468 KB)
|
DOI: 10.9744/informatika.9.2.130-136
In this paper, we propose an identification method of the land cover from remote sensing data with combining neuro-fuzzy and expert system. This combining then is called by Neuro-Fuzzy Expert System Model (NFES-Model). A Neural network (NN) is a part from neuro-fuzzy has the ability to recognize complex patterns, and classifies them into many desired classes. However, the neural network might produce misclassification. By adding fuzzy expert system into NN using geographic knowledge based, then misclassification can be decreased, with the result that improvement of classification result, compared with a neural network approximation.
PENGEMBANGAN APLIKASI PENGUBAH LATAR BELAKANG VIDEO
Adipranata, Rudy;
Setiabudi, Djoni Haryadi;
Tedjowarsito, Henry
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (193.964 KB)
|
DOI: 10.9744/informatika.9.2.95-100
At this research we developed an application to substitute video background. The application can be used in broadcasting to broadcast more interesting program. By using this application, the object for example presenter, can stay in studio having static background and then the application will do background substitution to show better or dynamic background. Input for this application could come from webcam or two video files, where one file is the video source with background which will be substituted and the other file is the substitution background. The application is developed by using method to do detection of background and the substitution will be done for the detected background. Output of the application could be saved in video file. Abstract in Bahasa Indonesia: Pada penelitian ini dikembangkan aplikasi untuk mengubah latar belakang video. Aplikasi pengubahan latar belakang video ini banyak digunakan pada broadcasting untuk menghasilkan tayangan yang lebih menarik. Dengan menggunakan aplikasi ini, obyek seperti penyiar dapat berada pada studio yang mempunyai latar belakang statis dan kemudian dilakukan penggantian sehingga latar belakang menjadi lebih baik atau dinamis. Input dapat berasal dari webcam atau dapat pula berasal dari dua buah file video, dimana satu file adalah video sumber dengan latar belakang yang akan diganti dan file yang lain adalah latar belakang pengganti. Aplikasi dikembangkan dengan menggunakan metode untuk melakukan pendeteksian latar belakang dan melakukan proses penggantian latar belakang yang telah terdeteksi tersebut. Output aplikasi dapat disimpan menjadi file video. Kata kunci: pengubahan latar belakang video, broadcasting
STATIC CODE ANALYSIS FOR SOFTWARE QUALITY IMPROVEMENT: A CASE STUDY IN BCI FRAMEWORK DEVELOPMENT
Sugiarto, Indar
Jurnal Informatika Vol 9, No 2 (2008): NOVEMBER 2008
Publisher : Institute of Research and Community Outreach - Petra Christian University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.9744/informatika.9.2.166-172
This paper shows how the systematic approach in software testing using static code analysis method can be used for improving the software quality of a BCI framework. The method is best performed during the development phase of framework programs. In the proposed approach, we evaluate several software metrics which are based on the principles of object oriented design. Since such method is depending on the underlying programming language, we describe the method in term of C++ language programming whereas the Qt platform is also currently being used. One of the most important metric is so called software complexity. Applying the software complexity calculation using both McCabe and Halstead method for the BCI framework which consists of two important types of BCI, those are SSVEP and P300, we found that there are two classes in the framework which have very complex and prone to violation of cohesion principle in OOP. The other metrics are fit the criteria of the proposed framework aspects, such as: MPC is less than 20; average complexity is around value of 5; and the maximum depth is below 10 blocks. Such variables are considered very important when further developing the BCI framework in the future.