cover
Contact Name
I Gede Surya Rahayuda
Contact Email
igedesuryarahayuda@unud.ac.id
Phone
+6289672169911
Journal Mail Official
jnatia@unud.ac.id
Editorial Address
Sekretariat JNATIA Gedung FMIPA Lantai 1, Program Studi Informatika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Udayana
Location
Kota denpasar,
Bali
INDONESIA
Jurnal Nasional Teknologi Informasi dan Aplikasinya
Published by Universitas Udayana
ISSN : 29863929     EISSN : 30321948     DOI : -
JNATIA (Jurnal Nasional Teknologi Informasi dan Aplikasinya) adalah jurnal yang berfokus pada teori, praktik, dan metodologi semua aspek teknologi di bidang ilmu komputer, informatika dan teknik, serta ide-ide produktif dan inovatif terkait teknologi baru dan teknologi informasi. Jurnal ini memuat makalah penelitian asli yang belum pernah diterbitkan. JNATIA (Jurnal Teknologi Informasi dan Aplikasinya) diterbitkan empat kali setahun (Februari, Mei, Agustus, November).
Articles 316 Documents
Penerapan Teknik Steganografi LSB pada Format Gambar Modern I Gusti Ngurah Febri Ananda Krisna; Anak Agung Istri Ngurah Eka Karyawati
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p02

Abstract

As the digital era advances, protecting sensitive information becomes crucial. One approach used is the steganography technique, which involves hiding secret messages in plain-looking media. In this context, the LSB (Least Significant Bit) steganography technique emerged as a common choice, exploiting changes in the least significant bits of media such as images to hide secret messages. This research aims to analyze and apply LSB steganography techniques in modern image formats such as PNG, WEBp, JPEG, BMP, TIFF, HEIF, GIF, and SVG. Through implementation in the form of a computer program with the python programming language, this research evaluates the performance of the technique and makes it applicable in various realworld scenarios. It is hoped that this research can contribute to the development of more effective information security solutions and become the basis for further research in the field of steganography and information security as a whole. The results obtained from this research are that the encryption process of modern image formats has a success rate of 81.25% with an average successful sample encryption speed of 1.55 seconds. and the modern image format decryption process has a success rate of 81.25% with a text match rate of 69.23%. 
Perancangan UI/UX pada Aplikasi Rental Kendaraan dengan Menggunakan Metode Design Thinking Ni Luh Gede Ananda Puja Cahyani; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p03

Abstract

The rapid development of technology has transformed the way humans interact, work, and learn. Technology has become a crucial aspect of various aspects of life, including education, business, and public interaction. In this digital era, the speed and affordability of information have become the key to progress. One example of the use of technology is in the field of transportation, especially vehicle rental. The vehicle rental application is an efficient solution to facilitate users in renting vehicles without having to come directly to the rental place. The addition of the ride feature allows users to conveniently travel by matching routes between users and drivers, thereby optimizing their trips. In this context, the design of the user interface and user experience (UI/UX) of the vehicle rental application is of paramount importance. A well-designed UI/UX will facilitate the rental process and enhance the user experience, making it more enjoyable and efficient. Consequently, technology offers a significant opportunity to enhance efficiency and convenience in various aspects of daily life. 
Perancangan Sistem Steganografi Berbasis Transformasi Wavelet Diskrit Terintegrasi Algoritma Rijndael dan QR-Code I Putu Rizky Pratama Putra; Gst. Ayu Vida Mastrika Giri
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p04

Abstract

The advancement of technology has been the primary driving force behind the transformative shifts across various domains of human life, spanning from the era of industrial revolution to the present digital age. Within the digital epoch, the pivotal role of information and communication technology in shaping the global societal framework is unequivocal. Nonetheless, the rapid progression of technology introduces novel challenges such as safeguarding personal data integrity and combating unauthorized access to individual information. Addressing these challenges entails the adoption of sophisticated techniques, including compression methodologies like Discrete Wavelet Transform (DWT), renowned for its efficacy in multimedia data compression with high rates. Furthermore, cryptographic algorithms such as Rijndael offer viable solutions to enhance data security through a series of encryption operations, encompassing substitution, permutation, and iterative rounds applied to each block. The amalgamation of DWT and Rijndael culminates in data representation via QR codes. Additionally, this research encompasses the development of a user interface design to facilitate the seamless implementation and utilization of the system, ultimately aiming to fortify data security effectively. 
Analisis Microinteractions pada Aplikasi Manajemen Keuangan dengan Metode System Usability Scale Ni Wayan Diyarini; I Gede Arta Wibawa
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p05

Abstract

Financial management is essential for personal financial well-being, yet financial literacy remains low in Indonesia. To improve usability, this study analyzes microinteractions in existing financial management applications by using System Usability Scale (SUS) methode. Through literature review, observation, and online surveys, microinteraction effectiveness is assessed, revealing areas for improvement. Results indicate a SUS score of 40, suggesting poor usability. Thus, redesigning the application is recommended to enhance usability and user experience, fostering better financial management practices. 
Analisis Emosi Anjing Melalui Klasifikasi Citra untuk Deteksi Ekspresi Wajah Hewan Peliharaan I Gede Surya Adi Pradana; I Gede Santi Astawa
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p06

Abstract

 Emotion Detection in Dogs through Image Classification for Pet Facial Expression Analysis utilizes convolutional neural networks (CNNs) to discern and quantify dogs' emotional states based on their facial expressions. This approach leverages advanced image processing techniques to recognize subtle cues indicative of various emotions like happiness, fear, or sadness in dogs. By applying CNNs to analyze image data, pet owners can gain valuable insights into their dogs' emotional well-being and address their needs accordingly. This technology offers a promising avenue for enhancing the bond between pets and owners by facilitating more informed and empathetic care tailored to each dog's emotional state and personality. 
Simulasi Kontrol Lampu Jarak Jauh Menggunakan Cisco Packet Tracer Ahmad Royyan Fath; I Gede Surya Rahayuda
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p07

Abstract

The advancement of Internet of Things (IoT) technology has significantly contributed to various aspects of modern life, particularly in smart home applications. One essential feature of a smart home is a remote light control system that enables users to manage household lighting more efficiently. This research simulates an IoT-based light control system using Cisco Packet Tracer, focusing on the design and implementation of a smart home network topology. The system consists of a Wi-Fi router, multiple smart lights, and a smartphone as the primary control device. The methodology includes network topology design, device configuration, and communication testing to evaluate system performance. The test results indicate that the system successfully operates according to the predefined scenarios, where smart lights respond to commands from a smartphone quickly and reliably via a Wi-Fi network. Additionally, the system demonstrates stable communication between IoT devices, even under network variations. This simulation highlights the potential of IoT-based light control systems in enhancing energy efficiency and providing greater convenience in home automation. Future research can expand this system by integrating sensor-based automation and cloud connectivity to improve flexibility, security, and scalability. 
Sistem Pendukung Keputusan Pemilihan Jalur Peminatan Menggunakan Metode Analytical Hierarchy Process Putu Yuki Parmawati; I Gusti Agung Gede Arya Kadyanan
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p08

Abstract

The selection of the path of interest is an important stage for Udayana University Informatics students. This decision determines the study and the topic of their final assignment. Challenges, such as varied choices, limited quotas, and student uncertainty often accompany the election process. It causes doubts and confusion in decision-making. The study builds a decision support system based on AHP to help students choose their path of interest. Analytical Hierarchy Process (AHP) allows comprehensive analysis and recommendation of paths that match preferences and relevant criteria, where these criteria are determined through observations and interviews conducted with students in related environments. Using the student's grades and preference levels for the 15 basic courses they passed during the first three semesters of the course, this AHP-based decision support system is implemented to facilitate students' decision-making related to the path of interest they will choose. 
Rancangan Sistem Cari dan Temu Barang Hilang di Universitas Udayana Berbasis Web Zerina Nur Salsabila; I Gusti Ngurah Anom Cahyadi Putra
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p09

Abstract

Losing items is an event that has been experienced by all of us. At Udayana University itself, loss of goods is still a common problem that is often faced by students, lecturers, and staff. This of course can result in material loss and inconvenience for the owner of the goods. Currently at Udayana University to disseminate information on the announcement of lost items is still by means of social media only. To overcome this problem, a web-based lost and found system was designed called "Lost Goods Search and Find System at Udayana University". This system allows users to report lost items and share information on found items. Udayana's Lost and Found System is expected to help increase the chances of finding lost items and reduce material losses for the owner of the goods. This system can also help improve security and comfort at Udayana University. 
Implementasi SHA-256 Dalam Program Verifikasi Originalitas Video Sebelum dan Sesudah Proses Kriptografi Daniel Surya Wijaya; I Ketut Gede Suhartana
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p10

Abstract

This research aims to develop a computer program utilizing the SHA-256 algorithm to compare the authenticity between the original video and the video that has undergone cryptographic processes, particularly during the decryption phase. The program is designed to provide additional verification regarding the success of the decryption process in restoring the video to its original condition. The program development is conducted using the Python programming language. The SHA-256 algorithm is employed to generate hash values for both the original video and the decrypted video. The resulting hash values of the two videos are then compared to evaluate their similarity. The developed program successfully compares the authenticity between the original video and the decrypted video. Through the analysis of hash values using SHA-256, the program concludes whether the decryption process successfully restores the video to its original state or not. 
Sistem Rekomendasi Produk pada E-Commerce Menggunakan Metode User-Based Collaborative Filtering Devon Vivian Gunawan; I Komang Ari Mogi
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 4 (2024): JNATIA Vol. 2, No. 4, Agustus 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i04.p11

Abstract

In an increasingly advanced digital era, the demand for recommendation systems that can provide products that match user preferences is increasingly high. The method used in this research is User-Based Collaborative Filtering, an approach that utilizes the purchasing patterns of other users to provide recommendations to active users. The research process began with collecting transaction datasets and product user preferences from leading e-commerce platforms. This data is then processed through the loading, preprocessing and analysis stages to prepare good data. Model performance is carried out using Mean Absolute Error (MAE) through a 5-fold cross validation process. The evaluation results show that the model has a satisfactory level of accuracy, with an average MAE value of 0.31. This research contributes to the development of a product recommendation system that can help improve users' online shopping experience by providing relevant and personalized recommendations.