cover
Contact Name
I Gede Surya Rahayuda
Contact Email
igedesuryarahayuda@unud.ac.id
Phone
+6289672169911
Journal Mail Official
jnatia@unud.ac.id
Editorial Address
Sekretariat JNATIA Gedung FMIPA Lantai 1, Program Studi Informatika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Udayana
Location
Kota denpasar,
Bali
INDONESIA
Jurnal Nasional Teknologi Informasi dan Aplikasinya
Published by Universitas Udayana
ISSN : 29863929     EISSN : 30321948     DOI : -
JNATIA (Jurnal Nasional Teknologi Informasi dan Aplikasinya) adalah jurnal yang berfokus pada teori, praktik, dan metodologi semua aspek teknologi di bidang ilmu komputer, informatika dan teknik, serta ide-ide produktif dan inovatif terkait teknologi baru dan teknologi informasi. Jurnal ini memuat makalah penelitian asli yang belum pernah diterbitkan. JNATIA (Jurnal Teknologi Informasi dan Aplikasinya) diterbitkan empat kali setahun (Februari, Mei, Agustus, November).
Articles 316 Documents
Perancangan Guitar Tuning Berbasis Web I Nyoman Dheva Surya; Cokorda Pramartha; Agus Muliantara
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p07

Abstract

Guitar tuning is a crucial step in preparing for playing, ensuring accurate sound production. In response to this need, our research led to the development of a web-based application dedicated to facilitating precise and straightforward guitar tuning. Leveraging web technology, this application offers users practical tuning experience without the need for additional software installation. By implementing comprehensive tuning features and employing the Fast Fourier Transform (FFT) method, our application guarantees accuracy in detecting and analyzing the spectrum of incoming sound vibrations. This technological approach ensures that users can confidently tune their guitars, avoiding mistuned strings. The decision to create a web-based app aims to optimize device space utilization, as it only requires a standard browser, readily available on all operating systems. In addition to tuning functionality, the application enriches the user experience by providing a collection of guitar chords for each note. This feature enables users to practice and play songs with adjustable transposition and speed. To assess the application's functionality and reliability, we conducted 100 trials using the BlackBox method, focusing on tuning the six guitar strings (e-b-g-d-a-e). The results demonstrated a remarkable 99% accuracy, affirming the system's effectiveness in facilitating precise guitar tuning. In conclusion, our research yields a practical, intuitive, and highly effective web application for users to tune their guitars with confidence and ease. 
Perancangan Infrastruktur Enkripsi End to End pada Aplikasi Penyimpanan File Berbasis Website Ni Putu Sri Agnita Samyami Wiraputri; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p06

Abstract

The rapid evolution of information and communication technology has revolutionized how we communicate and share information. Despite the numerous benefits, these advancements have introduced challenges, particularly concerning data security and privacy. Issues like data interception and escalating file sizes necessitate effective solutions. Cryptography emerges as a pivotal tool in addressing these concerns, offering a means to bolster data security while mitigating file size. This field encompasses the science and techniques of information security, converting data into unreadable ciphertext through encryption algorithms and keys. Encryption, particularly end-to-end encryption, plays a crucial role in maintaining confidentiality during file storage and exchange. The RSA cryptographic algorithm exemplifies an asymmetric approach, utilizing distinct keys for encryption and decryption. Public and private keys ensure secure communication, with the public key encrypting messages and the private key decrypting them. This widely adopted algorithm fortifies data security across various applications. Complementing this, the Caesar Cipher, a simple substitution cryptographic technique, adds an additional layer to the encryption process. By replacing each character with another at a specified shift in alphabetical order, the Caesar Cipher offers a basic yet effective safeguard. Combining the robust RSA algorithm with the simplicity of Caesar Cipher enhances file storage security. Employing Caesar Cipher as the initial step in encryption, followed by RSA to encrypt its output, ensures double-layered encryption. This dual process guarantees that only the corresponding private key can decrypt the file, reinforcing the overall security of data storage and exchange. 
Rancang Ontology untuk Sistem Pencarian Produk Smartwatch Berbasis Web Semantic Ni Luh Eka Suryaningsih
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p05

Abstract

The increasing popularity of smartwatches in the digital era has highlighted the need for efficient and relevant search systems to assist users in selecting the right product. Semantic Web technology, specifically ontology-based approaches, offer a promising solution for optimizing smartwatch product searches. This research aims to design an ontology for a Semantic Webbased smartwatch product search system using the Methontology methodology. The designed ontology enables users to search for smartwatches based on preferences such as brand, price, features, and specifications. The ontology facilitates the development of a recommendation system for personalized smartwatch suggestions. The evaluation of the ontology through SPARQL queries demonstrates its effectiveness in representing smartwatch product information. This research contributes to enhancing user experiences and decision-making processes when purchasing smartwatches. 
Pengklusteran Data Iris Menggunakan Metode Fuzzy C-Mean Gde Krishna Sankya Yogeswara
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p04

Abstract

This study focuses on the application of the Fuzzy C-Means method for clustering the Iris dataset. Clustering is a widely used technique for grouping similar data objects together, and the Iris dataset, which consists of measurements of iris flowers, has been a popular choice for clustering analysis. The Fuzzy C-Means algorithm, based on fuzzy logic, allows for a more flexible and nuanced approach to clustering by assigning degrees of membership to data points, capturing the inherent uncertainty and ambiguity in the dataset. By utilizing fuzzy logic, the Fuzzy C-Means method aims to accurately classify iris flowers into distinct clusters based on their petal width, petal length, sepal width, and sepal length. The results of this study contribute to the understanding of fuzzy clustering techniques and their application in pattern recognition and data analysis. 
Desain Antarmuka Android untuk Monitoring Energi Listrik Berbasis IoT Raindra Pramathana; Agus Dharma
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p03

Abstract

This paper presented the design of an Android user interface for monitoring electricity usage based on the Internet of Things (IoT). Adoption of using IoT devices in the energy sector increase rapidly, there is a need for user-friendly interfaces that allow users to monitor and manage their electricity consumption effectively. The proposed research was designing of Android interface which provides real-time information on energy usage, allowing users to track their electricity consumption patterns, set energy-saving goals, and receive alerts or recommendations for optimizing energy usage. The design emphasizes a visually appealing and intuitive interface, enabling users to easily navigate through energy-related data and control connected devices remotely. The interface leverages IoT technology to collect and display data from smart power meters or connected devices, enhancing energy awareness, and promoting energy-efficient behaviors. The effectiveness of the interface is evaluated through user studies, considering factors such as usability, user satisfaction, and energy conservation behavior 
Perancangan UI dan UX pada Aplikasi Pencari Homestay di Labuan Bajo Mariano Charlos Patiatma; I Wayan Santiyasa
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p02

Abstract

Labuan Bajo is one of the popular tourist destinations in Indonesia. With the significant growth in the number of tourists, the need for homestays or local accommodation is increasing. However, tourists often have difficulty finding a homestay that suits their preferences, both in terms of price,facilities or location. This research aims to develop an Android-based homestay application that can help tourists find a homestay that suits their preferences. This application was developed using prototyping and modeling methods. The research results show that an Androidbased homestay application can help tourists find a homestay that suits their preferences. This application has features such as searching for the nearest homestay, rating filters, prices and desired facilities. This application can be a solution for tourists who want to find a homestay that suits their needs. This application can also help homestay managers to promote their homestays to tourists. 
Rancang Model Ontologi untuk Representasi Pengetahuan Senjata Tradisional di Indonesia I Gusti Agung Gede Ary Mahayasa; Anak Agung Istri Ngurah Eka Karyawati
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 2 No. 2 (2024): JNATIA Vol. 2, No. 2, Februari 2024
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2024.v02.i02.p01

Abstract

Indonesia is known for its rich diversity, encompassing ethnicity, religion, culture, customs, and traditional artifacts, including traditional weapons. Traditional weapons hold significant historical and cultural value in Indonesia. To preserve and represent knowledge about these traditional weapons, an ontology model is essential. Ontology serves as a knowledge base that can effectively capture and represent information. In this project, we developed an ontology model for traditional weapons in Indonesia using the Protégé ontology development tool. The METHONTOLOGY method guided the step-by-step development of the ontology model, providing detailed descriptions for each stage. The ontology model consists of 6 classes, 4 object properties, 1 data property, and 72 individuals. We conducted testing of the ontology model through SPARQL queries. By building this ontology model, our aim is to contribute to the preservation and documentation of Indonesia's cultural heritage related to traditional weapons. The ontology serves as a valuable resource for researchers, enthusiasts, and institutions interested in studying and promoting traditional weapons in Indonesia. 
Analisis Vulnerability Sistem Informasi di Universitas Udayana Menggunakan Tool Acunetix Web Vulnerability Scanner I Putu Adi Yuda; I Gusti Ngurah Anom Cahyadi Putra
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 1 No. 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i04.p30

Abstract

Now, information technology is developing rapidly. Information systems provide convenience, especially in the field of education such as information systems at Udayana University. In addition, in universities, information systems are also used in elementary schools and high schools. Information systems must have good security. The requirements that must be met are privacy, integrity, authentication, and availability. However, no information system is completely secure. Like the information system at Udayana University has a vulnerability where it is still possible to be attacked by unauthorized parties. System vulnerability has three levels, namely low level, medium level, and high level. This can disrupt a system, and information can be changed by unauthorized parties. Therefore, it is necessary to scan the Udayana University information system to find out system vulnerabilities. The author uses the Acunetix Web Vulnerability Scanner tool. The results of the scanning can be used as a reference for evaluating system vulnerabilities so that further system security can be improved better than before. 
Penerapan Metode Kompresi Wavelet dalam Pengolahan Data Gambar untuk Mengurangi Ukuran File Ni Putu Suci Paramita; I Gede Arta Wibawa
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 1 No. 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i04.p29

Abstract

Currently more and more computer users the increase in the number of computer users has led to an increase digital data user. One of the most used digital data today is digital images. The smallest element of a digital image is called pixels. The higher the number of pixels, the higher the digital resolution picture. The higher the pixel count, the larger the digital image file size. Resulting in fast full data storage capacity.Image data compression is an important process in data processing and storage, especially with the increasing use of images in various applications and platforms. This study aims to apply the Wevalet compression method in processing image data to reduce file size. The Wevalet compression method combines the wavelet transform with an adaptive and efficient compression breaking procedure, to form significant compression without significant sacrifice of image quality. 
Perancangan Aplikasi Sistem Keamanan Checkout Online Shop Viencent; Cokorda Pramartha
Jurnal Nasional Teknologi Informasi dan Aplikasinya Vol. 1 No. 4 (2023): JNATIA Vol. 1, No. 4, Agustus 2023
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JNATIA.2023.v01.i04.p28

Abstract

Online shopping has become a preferred choice for many people to meet their consumer needs. However, security issues in online transactions remain a major concern, especially when unauthorized checkouts occur without the account owner’s knowledge. To address this problem, this research aims to design an online shop checkout security application. The application ensures that each checkout is performed by the account owner and not by unauthorized individuals, such as children without their parent’s knowledge. Advanced technology approaches and appropriate security methods will be employed in the design of this application, including the use of two-factor authentication and verification through unique security codes. It is expected that this application will provide additional protection to online shop users in maintaining the security and integrity of their transactions.