cover
Contact Name
Nurul Fazriah
Contact Email
jiki@cs.ui.ac.id
Phone
+62217863419
Journal Mail Official
jiki@cs.ui.ac.id
Editorial Address
"Faculty of Computer Science Universitas Indonesia Kampus Baru UI Depok - 16424"
Location
Kota depok,
Jawa barat
INDONESIA
Jurnal Ilmu Komputer dan Informasi
Published by Universitas Indonesia
ISSN : 20887051     EISSN : 25029274     DOI : 10.21609
Core Subject : Science,
Jurnal Ilmu Komputer dan Informasi is a scientific journal in computer science and information containing the scientific literature on studies of pure and applied research in computer science and information and public review of the development of theory, method and applied sciences related to the subject. Jurnal Ilmu Komputer dan Informasi is published by Faculty of Computer Science Universitas Indonesia. Editors invite researchers, practitioners, and students to write scientific developments in fields related to computer science and information. Jurnal Ilmu Komputer dan Informasi is issued 2 (two) times a year in February and June. This journal contains research articles and scientific studies. It can be obtained directly through the Library of the Faculty of Computer Science Universitas Indonesia.
Arjuna Subject : -
Articles 247 Documents
THE PAR (PEER ASSESSMENT RATING) CALCULATION ON 2 DIMENSIONAL TEETH MODEL IMAGE FOR THE CENTERLINE COMPONENT AND TEETH SEGMENTATION ON THE OCCLUSAL SURFACE TEETH MODEL IMAGE Hanif Arief Wisesa; Ratna Rustamadji; Miesje Karmiati Purwanegara; Benny Hardjono
Jurnal Ilmu Komputer dan Informasi Vol 7, No 2 (2014): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (600.339 KB) | DOI: 10.21609/jiki.v7i2.259

Abstract

Abstract The PAR (Peer Assessment Rating) Index is used by orthodontists around the world to calculate the severeness of a malocclusion. A malocclusion is a dental disease where the teeth are not properly aligned. In Indonesia, the number of malocclusion is relatively high. The occurrence of orthodontics who can treat malocclusion is also low in Indonesia. In 2013, a research is done to create the telehealth monitoring system to provide better treatment of malocclusion in Indonesia. The research is further improved by using different Adaptive Multiple Thresholding methods to segmentate the image. The result will be used to calculate the Centerline component of the PAR Index. The result is a system that could calculate the PAR Index automatically and is compared to the results using manual method.
IDENTIFIKASI DISTORSI BLUR PADA GAMBAR DIGITAL Irwan Prasetya Gunawan; Erik Kalalembang; Korendianto Usman
Jurnal Ilmu Komputer dan Informasi Vol 3, No 1 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1551.831 KB) | DOI: 10.21609/jiki.v3i1.136

Abstract

Salah satu masalah yang sering muncul dalam dunia fotografi adalah efek blur yang dapat diakibatkan baik oleh objek yang bergerak maupun gerakan kamera yang berhubungan dengan kecepatan rana (shutter speed) ketika gambar akan diambil. Paper ini menyajikan sebuah metode baru yang sederhana untuk mendeteksi kemunculan distorsi blur yang tidak diinginkan pada gambar digital. Metode yang diusulkan menggunakan transformasi discrete cosine transform (DCT) pada gambar yang telah mengalami distorsi dengan ukuran blok DCT yang bervariasi. Hasil dari pendeteksian ini kemudian digunakan untuk meningkatkan kualitas gambar melalui metode debluring berdasarkan korelasi pixel yang diterapkan pada area tertentu pada gambar yang mengandung distorsi blur ini. Hasil eksperimen menunjukkan bahwa kualitas gambar yang disempurnakan dihasilkan oleh metode debluring secara selektif menggunakan deteksi distorsi blur lokal akan lebih baik daripada yang tidak melalui proses seleksi. Dari berbagai ukuran blok yang digunakan dalam percobaan, blok berukuran 32×32 piksel menghasilkan kualitas gambar yang secara umum lebih baik. One of the problems that often arise in photography is a blurring effect that can be caused either by a moving object or camera movements that associated with the shutter speed when the picture is taken. This paper presents a simple new method for detecting the appearance of unwanted blur distortion in digital images. The proposed method uses the transformation of Discrete Cosine Transform (DCT) on the image that has been distorted with varying DCT block size. The results of the detection used to improve image quality through debluring method based on pixel correlation that applied to certain areas of the image that contains this blur distortion. The experimental results show that the enhanced picture quality produced by the method of selectively debluring using a local blur distortion detection is better than not through the selection process. From various block sizes used in the experiments, the block size of 32×32 pixel generates better picture quality.
Securing Communication in the IoT-based Health Care Systems Bayu Anggorojati; Ramjee Prasad
Jurnal Ilmu Komputer dan Informasi Vol 11, No 1 (2018): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.658 KB) | DOI: 10.21609/jiki.v11i1.562

Abstract

Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans’ quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. However, security and privacy becomes the main concern in the electronic Health (eHealth) systems and it becomes more challenging with the integration of IoT. Furthermore, most of the IoT-based health care system architecture is designed to be cross-organizational due to many different stakeholders in its overall ecosystems – thus increasing the security complexity. There are several aspects of security in the IoT-based health care system, among them are key management, authentication and encryption/decryption to ensure secure communication and access to health sensing information. This paper introduces a key management method that includes mutual authentication and secret key agreement to establish secure communication between any IoT health device with any entity from different organization or domain through Identity-Based Cryptography (IBC).
ENHANCEMENT OF PIXEL VALUE ORDERING BASED DATA HIDING BY ROW BLOCK PARTITION Hendro Eko Prabowo; Tohari Ahmad
Jurnal Ilmu Komputer dan Informasi Vol 11, No 2 (2018): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.27 KB) | DOI: 10.21609/jiki.v11i2.539

Abstract

The development of information and communication technology that support digital data transmission such as text, image, audio and video gives several effects. One of them is data security that becomes the main priority during the transmission process. Pixel-Value-Ordering (PVO) which one of data hiding methods can be implemented to achieve the requirement. It embeds data on maximum pixel and minimum pixel in a blok which is a part of the carrier image. However, PVO has capacity a problem, that only 2 bits per block can be hidden. To handle this problem, we propose a new approach by dividing blocks dinamically based on its complexity. These blocks are grouped into 4: smooth block, semi-smooth block, normal block and rough block. Using this approach, the stego capacity can be improved up to 2.6 times in average of  previous method by keeping the quality stego more than 65 dB for all testing image.
ANALISIS DAN PERANCANGAN TEKNOLOGI PADA ROBOT SEPAK BOLA Tony .
Jurnal Ilmu Komputer dan Informasi Vol 3, No 1 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1287.923 KB) | DOI: 10.21609/jiki.v3i1.141

Abstract

Pertandingan sepak bola antar robot merupakan salah satu tantangan dalam dunia robotika yang diselenggarakan untuk dapat lebih mengembangkan robotika dan kecerdasan buatan serta sebagai ajang bertukar ilmu bagi para peneliti di seluruh dunia. Hal ini mendorong penulis merancang sebuah strategi untuk pertandingan sepak bola antar robot. Strategi dibuat dengan menggunakan konsep koordinat untuk merepresentasikan posisi robot dalam lapangan. Kemudian strategi diuji dan dianalisis untuk menentukan kinerja strategi dalam berbagai situasi. Inter-robot soccer game is one of the challenges in the world of robotics that is held to develop robotics and artificial intelligence and as well as a forum for researchers to exchange knowledge across the world. This encouraged the authors to design a strategy for inter-robot soccer game. Strategies are made using the concept of coordinates to represent the robot position in the field. Then the strategy is tested and analyzed to determine the performance of strategies in different situations.
PERANCANGAN ATURAN TRANSFORMASI UML – SYSTEMC DALAM PERANCANGAN EMBEDDED SYSTEM Maman Abdurohman; Kuspriyanto .; Sarwono Sutikno; Arif Sasongko
Jurnal Ilmu Komputer dan Informasi Vol 3, No 2 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1153.664 KB) | DOI: 10.21609/jiki.v3i2.146

Abstract

Pemodelan adalah salah satu proses awal dalam pengembangan suatu aplikasi atau produk. Tahap ini dilakukan untuk meminimalkan kesalahan pada produk akhir. Salah satu metode pemodelan berorientasi objek yang banyak digunakan adalah pemodelan UML (Unified Modeling Language). Dalam UML suatu sistem dipandang sebagai kumpulan objek yang memiliki atribut dan method. SystemC adalah bahasa perancangan perangkat keras yang berbasis C++. SystemC merupakan sebuah library yang mendefinisikan tipe-tipe komponen perangkat keras. Dalam pemodelan bersama perangkat keras dan perangkat lunak, UML dan SystemC memiliki kemampuan yang sama. Pada paper ini dilakukan analisis proses transformasi dari pemodelan berorientasi objek dengan UML dan implementasi dengan menggunakan SystemC. Hasil penelitian menunjukan bahwa proses transformasi UML-SystemC dapat dilakukan karena keduanya memiliki nature yang sama sebagai lingkungan yang dapat merancang bersama hardware dan software. Perangkat yang digunakan untuk penelitian ini adalah Rational Rose dan SystemC. Modeling is one of the first process in the development of an application or product. This phase is done to minimize errors in the final product. One method in object-oriented modeling that is widely used is UML (Unified Modeling Language). In UML a system is seen as a collection of objects that have attributes and methods. SystemC is a hardware design language based on C++. SystemC is a library that defines the types of hardware components. In a joint modeling of hardware and software, UML and SystemC have similar capabilities. In this paper, researchers analyzed the transformation of object-oriented modeling with UML and the implementation by using SystemC. The results shows that the transformation process of UML-SystemC can be done because both have the same nature as the environment that can design both hardware and software. The device used for this study is the Rational Rose and SystemC.
TABLING WITH INTERNED TERMS ON CONTEXTUAL ABDUCTION Muhammad Okky Ibrohim; Ari Saptawijaya
Jurnal Ilmu Komputer dan Informasi Vol 12, No 1 (2019): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.492 KB) | DOI: 10.21609/jiki.v12i1.569

Abstract

Abduction (also called abductive reasoning) is a form of logical inference which starts with an observation and is followed by finding the best explanations. In this paper, we improve the tabling in contextual abduction technique with an advanced tabling feature of XSB Prolog, namely tabling with interned terms. This feature enables us to store the abductive solutions as interned ground terms in a global area only once so that the use of table space to store abductive solutions becomes more efficient. We implemented this improvement to a prototype, called as TABDUAL+INT. Although the experiment result shows that tabling with interned terms is relatively slower than tabling without interned terms when used to return first solutions from a subgoal, tabling with interned terms is relatively faster than tabling without interned terms when used to returns all solutions from a subgoal. Furthermore, tabling with interned terms is more efficient in table space used when performing abduction both in artificial and real world case, compared to tabling without interned terms.
IMPLEMENTASI ALGORITMA BREADTH FIRST SEARCH DAN OBSTACLE DETECTION DALAM PENELUSURAN LABIRIN DINAMIS MENGGUNAKAN ROBOT LEGO Adi Wibowo; Budianto .; Lasguido .; Fahry Fathurrahman
Jurnal Ilmu Komputer dan Informasi Vol 4, No 1 (2011): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1323.116 KB) | DOI: 10.21609/jiki.v4i1.153

Abstract

Dewasa ini perkembangan teknologi di dunia robot edukasi berkembang pesat. Robot-robot edukasi ini sering digunakan dalam riset penelitian karena kemudahan-kemudahan yang diberikannya dari segi perangkat keras. Salah satu contoh robot edukasi adalah robot LEGO Mindstorms NXT. Pada penelitian ini robot LEGO dibangun dalam bentuk robot line follower. Robot ini mampu menelusuri dan mencari jalan keluar dari labirin dinamis. Dalam menelusuri dan mencari jalan keluar, robot LEGO menggunakan algoritma Breadth First Search dan Manhattan Distance dalam memutuskan jalan mana yang harus diambil. Ketika menemui objek halangan, robot LEGO akan mengenali dan menghindari objek halangan tersebut dengan algoritma Obstacle Detection yang dimilikinya. Hasil implementasi membuktikan bahwa algoritma penelusuran labirin dinamis ini dapat diimplementasikan pada robot LEGO meskipun terdapat banyak keterbatasan dalam robot LEGO. Nowadays, the development of technology in educational robots is rapidly evolving. Educational robots are often used in research studies because they provide convenience in terms of hardware. One example is the educational robot LEGO Mindstorms NXT robot. In this research, LEGO robots built in the form of line follower robot. Robot is able to browse and find a way out of the dynamic labyrinth. In track and find a way out, LEGO robot uses an algorithm Breadth First Search and Manhattan Distance in deciding which path to take. When encountering an obstacle object, LEGO robot will recognize and avoid that obstacle objects with Obstacle Detection algorithm. The results prove that the implementation of a dynamic maze search algorithm can be implemented on a LEGO robot even though there are many limitations in LEGO robot.
GOOD PERFORMANCE IMAGES ENCRYPTION USING SELECTIVE BIT T-DES ON INVERTED LSB STEGANOGRAPHY Christy Atika Sari; Eko Hari Rachmawanto; Edi Jaya Kusuma
Jurnal Ilmu Komputer dan Informasi Vol 12, No 1 (2019): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (940.59 KB) | DOI: 10.21609/jiki.v12i1.646

Abstract

Transmitting image through the internet needs to be secured because of risk to be stolen. Security techniques that can be used for securing data especially image are cryptography and steganography. Combine these techniques can provide double protection in image security. In this research, we proposed the used of T-DES encryption with a selective bit to improve the time performance because time aspect is one of the important aspects of data transmission process. Four MSB of the secret image will be selected, then it will be encrypted using T-DES. After that, this encrypted results will be combined with other 4 LSB. This encryption scheme result will be embedded into a cover image using inverted LSB because inverted LSB can produce high imperceptible value. From 6 testing images which encrypted using proposed scheme present that proposed encryption scheme is twice faster than classic triple DES and slightly faster than double DES. While the embedding scheme can produce PSNR value above 40 dB with the range between 51 dB to 61 dB as well as SSIM which close to 1. This result denoted that proposed scheme generated good quality of stego images.
AUTOMATIC ARRHYTHMIAS DETECTION USING VARIOUS TYPES OF ARTIFICIAL NEURAL NETWORK BASED LEARNING VECTOR QUANTIZATION (LVQ) Diane Fitria; Muhammad Anwar Ma'sum; Elly Matul Imah; Alexander Agung Gunawan
Jurnal Ilmu Komputer dan Informasi Vol 7, No 2 (2014): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (674.814 KB) | DOI: 10.21609/jiki.v7i2.262

Abstract

Abstract An automatic Arrythmias detection system is urgently required due to small number of cardiologits in Indonesia. This paper discusses only about the study and implementation of the system. We use several kinds of signal processing methods to recognize arrythmias from ecg signal. The core of the system is classification. Our LVQ based artificial neural network classifiers based on LVQ, which includes LVQ1, LVQ2, LVQ2.1, FNLVQ, FNLVQ MSA, FNLVQ-PSO, GLVQ and FNGLVQ. Experiment result show that for non round robin dataset, the system could reach accuracy of 94.07%, 92.54%, 88.09% , 86.55% , 83.66%, 82.29 %, 82.25%, and 74.62% respectively for FNGLVQ, FNLVQ-PSO, GLVQ, LVQ2.1, FNLVQ-MSA, LVQ2, FNLVQ and LVQ1. Whereas for round robin dataset, system reached accuracy of 98.12%, 98.04%, 94.31%, 90.43%, 86.75%, 86.12 %, 84.50%, and 74.78% respectively for GLVQ, LVQ2.1, FNGLVQ, FNLVQ-PSO, LVQ2, FNLVQ-MSA, FNLVQ and LVQ1.

Page 8 of 25 | Total Record : 247


Filter by Year

2009 2025


Filter By Issues
All Issue Vol. 18 No. 2 (2025): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 18 No. 1 (2025): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 17 No. 2 (2024): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 17 No. 1 (2024): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 16 No. 2 (2023): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 16 No. 1 (2023): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 15 No. 2 (2022): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol. 15 No. 1 (2022): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio Vol 14, No 2 (2021): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 14, No 1 (2021): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 13, No 2 (2020): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 13, No 1 (2020): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 12, No 2 (2019): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 12, No 1 (2019): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 11, No 2 (2018): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 11, No 1 (2018): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 10, No 2 (2017): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 10, No 1 (2017): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information Vol 9, No 2 (2016): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 9, No 1 (2016): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 8, No 2 (2015): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 8, No 1 (2015): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 7, No 2 (2014): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 7, No 1 (2014): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 6, No 2 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 6, No 1 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 5, No 2 (2012): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 5, No 1 (2012): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 4, No 2 (2011): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 4, No 1 (2011): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 3, No 2 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 3, No 1 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 2, No 2 (2009): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) Vol 2, No 1 (2009): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information) More Issue