Jurnal Ilmu Komputer dan Informasi
Jurnal Ilmu Komputer dan Informasi is a scientific journal in computer science and information containing the scientific literature on studies of pure and applied research in computer science and information and public review of the development of theory, method and applied sciences related to the subject. Jurnal Ilmu Komputer dan Informasi is published by Faculty of Computer Science Universitas Indonesia. Editors invite researchers, practitioners, and students to write scientific developments in fields related to computer science and information. Jurnal Ilmu Komputer dan Informasi is issued 2 (two) times a year in February and June. This journal contains research articles and scientific studies. It can be obtained directly through the Library of the Faculty of Computer Science Universitas Indonesia.
Articles
247 Documents
IMPLEMENTING MOBILE AGENT FOR LOCATION-BASED PRINTER SERVICES
Rendy Eka Saputra;
Sri Wahjuni
Jurnal Ilmu Komputer dan Informasi Vol 5, No 2 (2012): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1042.931 KB)
|
DOI: 10.21609/jiki.v5i2.192
Most devices in ubiquitous network environment have limited memory and processing power, thus they can’t provide all services even when in suitable locations. Mobile agent technology could be implemented to improve resource efficiency. The goal of this paper is to implement mobile agent technology for location-based printer service. The system consists of four parts: (1) mobile agent server, (2) location-based service server, (3) printer service, (4) client. It is observed that mobile agent offers many advantages for ubiquitous and mobile computing settings. Perangkat dalam lingkungan ubiquitous memiliki memori dan daya proses yang terbatas, sehingga mereka tidak dapat menyediakan layanan secara utuh bahkan dalam lokasi yang tepat sekalipun.Teknologi mobile agent dapat diterapkan untuk meningkatkan efisiensi sumber daya. Tujuan dari paper ini adalah untuk melihat penerapan teknologi mobile agent pada lokasi berbasis layanan printer. Sistem ini terdiri dari empat bagian: (1) mobile agent server, (2) lokasi yang berbasiskan layanan server, (3) layanan printer, (4) klien. Hal ini menunjukkan bahwa mobile agent menawarkan banyak keuntungan untuk pengaturan komputasi ubiquitous dan mobile.
DOCUMENT CLUSTERING BY DYNAMIC HIERARCHICAL ALGORITHM BASED ON FUZZY SET TYPE-II FROM FREQUENT ITEMSET
Saiful Bahri Musa;
Andi Baso Kaswar;
Supria Supria;
Susiana Sari
Jurnal Ilmu Komputer dan Informasi Vol 9, No 2 (2016): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (380.576 KB)
|
DOI: 10.21609/jiki.v9i2.383
One of ways to facilitate process of information retrieval is by performing clustering toward collection of the existing documents. The existing text documents are often unstructured. The forms are varied and their groupings are ambiguous. This cases cause difficulty on information retrieval process. Moreover, every second new documents emerge and need to be clustered. Generally, static document clustering method performs clustering of document after whole documents are collected. However, performing re-clustering toward whole documents when new document arrives causes inefficient clustering process. In this paper, we proposed a new method for document clustering with dynamic hierarchy algorithm based on fuzzy set type - II from frequent itemset. To achieve the goals, there are three main phases, namely: determination of key-term, the extraction of candidates clusters and cluster hierarchical construction. Based on the experiment, it resulted the value of F-measure 0.40 for Newsgroup, 0.62 for Classic and 0.38 for Reuters. Meanwhile, time of computation when addition of new document is lower than to the previous static method. The result shows that this method is suitable to produce solution of clustering with hierarchy in dynamical environment effectively and efficiently. This method also gives accurate clustering result.
OPTIMUM MULTILEVEL THRESHOLDING HYBRID GA-PSO BY ALGORITHM
dwi taufik hidayat;
Isnan .;
Muhammad Ali Fauzi
Jurnal Ilmu Komputer dan Informasi Vol 6, No 1 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (482.412 KB)
|
DOI: 10.21609/jiki.v6i1.210
The conventional multilevel thresholding methods are efficient for bi-level thresholding. However, these methods are computationally very expensive for use in multilevel thresholding because the search of optimum threshold do in depth to optimize the objective function. To overcome these drawbacks, a hybrid method of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO), called GA-PSO, based multilevel thresholding is presented in this paper. GA-PSO algorithm is used to find the optimal threshold value to maximize the objective function of the Otsu method. GA-PSO method proposed has been tested on five standard test images and compared with particle swarm optimization algorithm (PSO) and genetic algorithm (GA). The results showed the effectiveness in the search for optimal multilevel threshold of the proposed algorithm.
THE APPLICATION OF GRAPHOLOGY AND ENNEAGRAM TECHNIQUES IN DETERMINING PERSONALITY TYPE BASED ON HANDWRITING FEATURES
Dian Pratiwi;
Gatot Budi Santoso;
Fiqih Hana Saputri
Jurnal Ilmu Komputer dan Informasi Vol 10, No 1 (2017): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (442.139 KB)
|
DOI: 10.21609/jiki.v10i1.372
This research was conducted with the aim of developing previous studies that have successfully applied the science of graphology to analyze digital handwriting and characteristics of his personality through shape based feature extraction, which in the present study will be applied one method of psychological tests commonly used by psychologists to recognize human’s personality that is Enneagram. The Enneagram method in principle will classify the personality traits of a person into nine types through a series of questions, which then calculated the amount of the overall weight of the answer. Thickness is what will provide direction personality type, which will then be matched with the personality type of the result of the graphology analysis of the handwriting. Personality type of handwritten analysis results is processed based on the personality traits that are the result of the identification of a combination of four dominant form of handwriting through the software output of previous studies, that Slant (tilt writing), Size (font size), Baseline, and Breaks (respite each word). From the results of this research can be found there is a correlation between personality analysis based on the psychology science to the graphology science, which results matching personality types by 81.6% of 49 respondents data who successfully tested.
PROPOSED ARCHITECTURE AND THE DEVELOPMENT OF NFCAFE: AN NFC-BASED ANDROID MOBILE APPLICATIONS FOR TRADING TRANSACTION SYSTEM IN CAFETARIA
Fikrul Arif Nadra;
Heri Kurniawan;
Muhammad Hafizhuddin Hilman
Jurnal Ilmu Komputer dan Informasi Vol 6, No 1 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1056.287 KB)
|
DOI: 10.21609/jiki.v6i1.215
The development of mobile technology and RFID leads to an innovative mobile payment technology by using NFC. One of the popular mobile device platforms today is Android. This research proposes an architecture of NFC-based payment system in cafeteria which is called NFCafe and the implementation of it in Android applications. It is a closed payment systems without involving third parties such as banks. The security issue is handled by using symmetric and asymmetric encryptions, they are RSA and AES. The application has been developed and successfully passed the testing conducted by several respondents.
DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM
Ahmad Sanmorino;
Setiadi Yazid
Jurnal Ilmu Komputer dan Informasi Vol 6, No 2 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (803.802 KB)
|
DOI: 10.21609/jiki.v6i2.224
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism). From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.
PENERJEMAHAN DOKUMEN INGGRIS-INDONESIA MENGGUNAKAN MESIN PENERJEMAH STATISTIK DENGAN WORD REORDERING DAN PHRASE REORDERING
Hisar Maruli Manurung;
Hansel Tanuwijaya
Jurnal Ilmu Komputer dan Informasi Vol 2, No 1 (2009): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (404.315 KB)
|
DOI: 10.21609/jiki.v2i1.122
Mesin penerjemah merupakan alat penerjemah otomatis pada sebuah teks dari satu bahasa ke bahasa lainnya. Mesin penerjemah statistik adalah sebuah pendekatan mesin penerjemah dengan hasil terjemahan dihasilkan atas dasar model statistik yang parameter-parameternya diambil dari hasil analisis korpus teks bilingual (atau paralel). Kualitas hasil terjemahan Bahasa Inggris – Bahasa Indonesia tersebut masih jauh dari sempurna dan memiliki nilai akurasi yang rendah. Diawali dari permasalahan ini, muncullah sebuah ide untuk membuat aturan-aturan restrukturisasi teks pada Bahasa Inggris sesuai dengan struktur Bahasa Indonesia dengan tujuan untuk meningkatkan kualitas dan nilai akurasi hasil terjemahan mesin penerjemah statistik. Aturan restrukturisasi teks tersebut bisa berupa word reordering, phrase reordering, ataupun keduanya. Dalam penelitian ini, penulis merancang 7 buah aturan word reordering, 7 buah aturan phrase reordering, dan 2 buah aturan gabungan phrase reordering dan word reordering. Hasil eksperimen menunjukkan peningkatan akurasi dan kualitas penerjemahan yang efektif diperoleh dengan word reordering. Word reordering dapat memberikan peningkatan nilai BLEU sebesar 1.3896% (dari 0.1871 menjadi 0.1897) dan nilai NIST sebesar 0.6218% (dari 5.3876 menjadi 5.4211). Pada korpus bible, rata-rata nilai peningkatan nilai BLEU yang diperoleh dengan restrukturisasi teks adalah 0.5871% dan untuk nilai NIST terjadi penurunan sebesar 0.0144%. Pada korpus novel, rata-rata nilai peningkatan nilai BLEU yang diperoleh dengan restrukturisasi teks adalah 0.8751% dan untuk nilai NIST terjadi peningkatan sebesar 0.3170%. Besarnya peningkatan dan penurunan yang terjadi pada penelitian ini cenderung kecil (masih di bawah 1%). Hal ini disebabkan aturan penerjemahan Bahasa Inggris-Indonesia menggunakan aturan MD-DM yang melibatkan penukaran kata yang jaraknya dekat sudah tercakup dalam distortion model pada mesin penerjemah statistik berdasarkan frase.
DE-IDENTIFICATION TECHNIQUE FOR IOT WIRELESS SENSOR NETWORK PRIVACY PROTECTION
Yennun Huang;
Szu-Chuang Li;
Bo-Chen Tai;
Chieh-Ming Chang;
Dmitrii I. Kaplun;
Denis N. Butusov
Jurnal Ilmu Komputer dan Informasi Vol 10, No 1 (2017): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (767.532 KB)
|
DOI: 10.21609/jiki.v10i1.440
As the IoT ecosystem becoming more and more mature, hardware and software vendors are trying create new value by connecting all kinds of devices together via IoT. IoT devices are usually equipped with sensors to collect data, and the data collected are transmitted over the air via different kinds of wireless connection. To extract the value of the data collected, the data owner may choose to seek for third-party help on data analysis, or even of the data to the public for more insight. In this scenario it is important to protect the released data from privacy leakage. Here we propose that differential privacy, as a de-identification technique, can be a useful approach to add privacy protection to the data released, as well as to prevent the collected from intercepted and decoded during over-the-air transmission. A way to increase the accuracy of the count queries performed on the edge cases in a synthetic database is also presented in this research.
AUTONOMOUS DETECTION AND TRACKING OF AN OBJECT AUTONOMOUSLY USING AR.DRONE QUADCOPTER
Futuhal Arifin;
Ricky Arifandi Daniel;
Didit Widiyanto
Jurnal Ilmu Komputer dan Informasi Vol 7, No 1 (2014): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (290.755 KB)
|
DOI: 10.21609/jiki.v7i1.251
Abstract Nowadays, there are many robotic applications being developed to do tasks autonomously without any interactions or commands from human. Therefore, developing a system which enables a robot to do surveillance such as detection and tracking of a moving object will lead us to more advanced tasks carried out by robots in the future. AR.Drone is a flying robot platform that is able to take role as UAV (Unmanned Aerial Vehicle). Usage of computer vision algorithm such as Hough Transform makes it possible for such system to be implemented on AR.Drone. In this research, the developed algorithm is able to detect and track an object with certain shape and color. Then the algorithm is successfully implemented on AR.Drone quadcopter for detection and tracking.
PENGEMBANGAN PROTOKOL ROUTING UNTUK MENJAMIN KUALITAS PERPUSTAKAAN DIGITAL BERBASIS PEER-TO-PEER
Heri Kurniawan;
Zainal A. Hasibuan
Jurnal Ilmu Komputer dan Informasi Vol 2, No 2 (2009): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (343.486 KB)
|
DOI: 10.21609/jiki.v2i2.128
Pencarian dokumen pada jaringan Perpustakaan Digital (PD) berbasis peer-to-peer dengan arsitektur terdistribusi sangat mengandalkan koneksi antar-peer. Salah satu teknik pencarian yang umum digunakan adalah melalui pengiriman query secara broadcast kepada peer tetangga. Sayangnya cara ini kurang efisien karena berpotensi meningkatkan kepadatan lalu lintas jaringan. Selain permasalahan efisiensi, permasalahan lain yang dihadapi aplikasi PD adalah rendahnya kredibilitas PD dalam pertukaran data. Hal ini dapat dilihat dari rendahnya kualitas servis yang diberikan oleh sebuah PD. Pada penelitian ini penulis mengusulkan sebuah metode yang bernama Jaris. Jaris melakukan pencarian berdasarkan kemiripan antar-PD pada cache cluster dan kemiripan query pada cache query. Cara ini dilakukan untuk meningkatkan relevansi hasil pencarian dokumen dan menurunkan jumlah pesan yang dikirim. Jaris menggunakan mekanisme polling yang menggabungkan nilai QoS lokal dan global untuk meningkatkan kualitas transaksi. Pada uji coba penelitian, metode Jaris dibandingkan dengan metode random voting. Hasil percobaan menunjukkan kinerja Jaris lebih baik bila dibandingkan dengan random voting.