Lontar Komputer: Jurnal Ilmiah Teknologi Informasi
Lontar Komputer [ISSN Print 2088-1541] [ISSN Online 2541-5832] is a journal that focuses on the theory, practice, and methodology of all aspects of technology in the field of computer science and engineering as well as productive and innovative ideas related to new technology and information systems. This journal covers research original of paper that has not been published and has been through the double-blind reviewed journal. Lontar Komputer published three times a year by Research institutions and community service, University of Udayana. Lontar Komputer already indexing in Scientific Journal Impact Factor with impact Value 3.968. Lontar Komputer already indexing in SINTA with score S2 and H-index 5.
Articles
226 Documents
Modified Background Subtraction Statistic Models for Improvement Detection and Counting of Active Spermatozoa Motility
I Gede Susrama Masdiyasa;
I D. G. Hari Wisana;
I K. Eddy Purnama;
M. Hery Purnomo
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (437.904 KB)
|
DOI: 10.24843/LKJITI.2018.v09.i01.p04
An important early stage in the research of sperm analysis is the phase of sperm detection or separating sperm objects from images/video obtained from observations on semen. The success rate in separating sperm objects from semen fluids has an important role for further analysis of sperm objects. Algorithm or Background subtraction method is a process that can be used to separate moving objects (foreground) and background on sperm video data that tend to uni-modal. In this research, some of the subproject model statistics of substrata model are Gaussian single, Gaussian Mixture Model (GMM), Kernel Density Estimation and compared with some basic subtraction model background algorithm in detecting and counting the number of active spermatozoa. From the results of the tests, the Grimson GMM method has an f-measure value of 0.8265 and succeeded in extracting the sperm form near its original form compared to other methods
Perancangan Sistem Informasi Manajemen Modul Front Office Pada Rumah Sakit
Kevin Wijaya;
A.A.K. Oka Sudana;
Ni Kadek Dwi Rusjayanthi
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 6, No.1 April 2015
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (773.076 KB)
Information systems can be used to provide information quickly. It also can be used by management to make a decisions and to run the hospital’s operations. One of the manual activity that will take a lot of time is for example, searching the data of the patient. It will also waste a lot of space for the file storage. The Design of the Front Office Module of Information System in Hospital was made to support the business processes in the hospital. It also made to replace all the activities that were still done manually in the Front Office Departement. The Method that used to make the system design is TAS (Total Architecture Synthesis) which devided into five steps. The design of the system is integrated with six other modules. The processes in Front Office Module are Data Master Management, Registration, Information, Marketing, Payment, and Reporting. The result of this system design is a design of Modules Relation, Context Diagram, Hierarchy Chart, Overview Diagram, Data Flow Diagram, Database, and Graphical User Interface.
Pengembangan Virtual Reality Pengenalan Binatang Buas Untuk Anak Usia Dini
I Made Ardwi Pradnyana;
I Ketut Resika Arthana;
I Gusti Bagus Hari Sastrawan
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 8, No. 3 Desember 2017
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (260.277 KB)
|
DOI: 10.24843/LKJITI.2017.v08.i03.p05
Submission of learning materials with animal themes, especially wild animals to early childhood becomes a challenge for teachers. Two-dimensional displacement media in the form of a monotonous image has the potential to decrease interest in children's learning. Bringing wild animals directly or bringing the children to the zoo requires considerable cost and time and harm. Based on these problems, the authors develop android-based applications that contain fourteen species of wild animals in 3D format that is packed with Virtual Reality (VR) technology. The authors develop applications using development research methods with the ADDIE model. The developed VR application is capable of displaying wild animal animations complete with the sounds and environment of the habitat, as well as the description narrative features and food that can be viewed in 3D and VR modes. The test results showed that the application received a positive response from users, especially children in TK Negeri Pembina Singaraja. The average percentage for the user response test is 88.50%, which means it is very good where children can know the types of wild animals, the movements of wild animals, the sounds of wild animals, the habitats of wild animals and can use them easily.
AUDIT TI UNTUK MENEMUKAN POLA BEST PRACTICE PENGELOLAAN TI PADA PERBANKAN (STUDI KASUS PT. BANK SYARIAH MANDIRI CABANG DENPASAR)
Shofwan Hanief
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 4, No.3 Desember 2013
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (527.807 KB)
Audit TI untuk Menemukan Pola Best PracticePengelolaan TI pada Perbankan(Studi Kasus PT. Bank Syariah Mandiri CabangDenpasar)Shofwan HaniefEmail : zwanhanf27@gmail.comAbstrakPT. Bank Syariah Mandiri cabang Denpasar sudah menggunakan TI untuk menunjang prosespelayanan yang dilakukan. Sampai saat ini TI yang ada belum pernah dilakukan penilaian sejauhmana proses-proses tersebut dapat berjalan dengan baik. Agar implementasi IT Governanceyang ada di PT. Bank Syariah Mandiri berlangsung secara efektif, organisasi perlu menilai sejauhmana IT Governance yang sekarang berlangsung dan mengidentifikasi peningkatan yang dapatdilakukan. Pengunaan model maturity (kematangan) dalam hal ini akan memudahkan dalampenilaian dengan cara pendekatan yang terstruktur terhadap skala yang mudah dimengerti dankonsisten. Salah satu alat yang digunakan untuk IT Governance adalah COBIT (ControlObjectives for Information and Related Technology) yaitu suatu model standar pengelolaan TIyang dapat membantu pihak manajemen dan pemakai untuk menjembatani kesenjangan antararesiko bisnis, kebutuhan kontrol, dan permasalahan teknis.Analisis untuk tingkat kematangandilakukan dengan cara membandingkan tingkat kematangan yang ada pada saat ini dengantingkat kematangan yang dituju.Tingkat kematangan saat ini (current maturity level) untuk setiapproses yang ada pada domain Deliver and Support rata-rata berada pada level 2, walaupun adasebagian kecil yang berada di level 3, bahkan di level 1. Hal ini dapat dikatakan bahwa prosestata kelola TI di PT. Bank Syariah Mandiri cabang Denpasar sudah dilakukan tetapi belumberjalan secara optimal.
Understanding Behavioral Intention in Implementation of the ICTs Based on UTAUT Model
Krismadinata Krismadinata;
Nizwardi Jalinus;
Hafeasi Pitra Rosmena;
yahfizham yahfizham
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 2 August 2019
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (232.128 KB)
|
DOI: 10.24843/LKJITI.2019.v10.i02.p04
Innovation on Information Communication and Technology (ICT) are not suddenly accepted and directly used by individuals in work and workplace, even some individuals refuse to work using adoption ICTs. Therefore this research needs to be done to reveal what factors influence this attitude. This article aims to analysis variables or factors such as performance expectancy (PE) as X1, effort expectancy (EE) as X2, social influence (SI) as X3 and facilitating condition (FC) as X4 that contribute to the behavioral intention (BI) as Y of individual in accepted or rejected innovation based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model perspective. The method was applied factor analysis. A technique of collecting data using the checklist of questionnaire instrument, with total the population of 85 people, then according to tables of Isaac and Michael obtained the sample of 68 respondents who came from the Government Employees in the Disdikpora Dharmasraya Regency. The data were analyzed with the software tools of the Statistical Package for the Social Sciences (SPSS) version 22. The data collection time starts from November to December 2018. We found that X1, X2, X3, and X4 have significant effects on user acceptation based on UTAUT model.
Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool
Budi Rahardjo;
I Putu Agus Eka Pratama
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 7, No. 2 Agustus 2016
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (362.617 KB)
|
DOI: 10.24843/LKJITI.2016.v07.i02.p04
Computer forensics and anti computer forensics are two opposing fields. Computer forensics is done by a computer forensics expert in order to obtain accurate data and evidence of cyber crime cases for investigation, while the anti-computer forensics conducted by the attacker to remove traces at once difficult computer forensics expert in performing its duties. For the attacker, the selection of anti-computer forensics tool that default on the target machine, more effective and faster than installing it first on the victim machine. For this reason the author chose shred as anti computer forensics applications on GNU / Linux machine. If anti forensic work, forensic experts would be difficult to perform computer forensics to data as evidence of cyber crime. This paper describes the anti-forensics performed by the attacker to remote machines GNU / Linux for cyber crime cases in a computer network. Anti forensic performed using shred the syslog file to remove traces of the crime at the same time make it difficult for the forensic process by computer forensics expert. Tests performed on three pieces of computer-based GNU / Linux on System Signals Lab intranet ITB. Each act as the target machine (server), firewall machine, and the machine attacker. Doing the anti computer forensics and computer forensics at the server machine. The test results are recorded and analyzed in order to then be deduced.
PENERAPAN HYBRID SLOWLY CHANGE DIMENSION UNTUK NEARLY REALTIME DATAWAREHOUSE
Ni Wayan Wisswani
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 4, No. 1 April 2013
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (533.276 KB)
Datawarehouse yang bersifat nearly realtime membutuhkan pemodelan dimensi dan fakta secara realtime. Pemodelan dimensi sangat penting untuk dilakukan karena dimensi akan menjadi sumber bagi fakta. Teknik pemodelan dimensi yang akan diterapkan pada makalah ini adalah hybrid slowly change dimension. Teknik ini akan menciptakan beberapa field baru untuk menampung perubahan yang mungkin saja terjadi pada database sumber saat manipulasi terjadi sehingga fakta tidak kehilangan informasi. Dalam usaha untuk mengimplementasikan dimensi yang bersifat nearly realtime maka hybrid slowly change dimensionakan dikembangkan dengan metode change data capture.Hal iniakan menangkap setiap perubahan data yang dapat mempengaruhi dimensi yang terjadi pada database sumber dan kemudian mentransformasinya sehingga dapat sesuai denganhybrid dimensi yang telah didesain.
Implementasi Zoning dan K-Nearest Neighbor dalam Pengenalan Karakter Aksara Wrésastra
I Wayan Agus Surya Darma
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (401.763 KB)
|
DOI: 10.24843/LKJITI.2019.v10.i01.p02
Balinese script is an important aspect that packs the Balinese culture from time to time which continues to experience development along with technological advances. Balinese script consists of three types (1) Wrésastra, (2) Swalalita and (3) Modre which have different types of characters. The Wrésastra and Swalalita script are Balinese scripts which grouped into the script criteria that are used to write in the field of everyday life. In this research, the zoning method will be implemented in the feature extraction process to produce special features owned by Balinese script. The results of the feature extraction process will produce special features owned by Balinese script which will be used in the classification process to recognize the character of Balinese script. Special features are produced using the zoning method, it will divide the image characters area of ??Balinese scripts into several regions, to enrich the features of each Balinese script. The result of feature extractions is stored as training data that will be used in the classification process. K-Nearest Neighbors is implemented in the special feature classification process that is owned by the character of Balinese script. Based on the results of the test, the highest level of accuracy was obtained using the value K=3 and reference=10 with the accuracy of Balinese script recognition 97.5%.
SISTEM MONITOR DAN KENDALI RUANG SERVER DENGAN EMBEDDED ETHERNET
A.A. Ketut Agung Cahyawan W
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 2, No. 1 Juni 2011
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (277.742 KB)
Selama ini seorang network administrator harus berada pada ruang server jika ingin menyalakan server yang ada disana, atau memeriksa apakah temperatur ruang server sudah cukup agak server dapat bekerja optimal. Permasalahan timbul karena ruang server biasanya terletak cukup jauh dan harus selalu terkunci demi alasan keamanan. Pada penelitian ini dirancang suatu sistem kendali dan monitor yang dapat menyalakan server dari jarak jauh sekaligus memantau suhu ruangan server, menaikkan atau menurunkan temperatur AC dan juga mematikan dan menghidupkannya. Desain yang dibuat berbasis Arduino Duemilanove dan Arduino Ethernet Shield, yang merupakan suatu platform kit elektronik yang open source. Dengan sistem ini seorang network administrator dapat melakukan kontrol ruang server dari jarak jauh.
Implementasi Keamanan Data Menggunakan Algoritma Rivest Code 4 (RC4) Pada Sistem Informasi Inventory Stock Barang Pada Distributor PT.Wings Food
Susanto Susanto
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 8, No. 2 Agustus 2017
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (459.205 KB)
|
DOI: 10.24843/LKJITI.2017.v08.i02.p02
Rivest code 4 (RC4) is a cryptographic algorithm modern symentic key which has an operating mode stream chipper. It’s used two substitutions box in processing data and information, they are array with a permutation length of 256 and second s-box as permutation with has a function as public key. Algorithm rivest code 4 was used for data encryption, message or information. Information system inventory stock of goods at distributor PT. Wings Food is a system that processed incoming and outgoing goods data, so that the data stored in database must be guaranteed confidential and its secure. To keep the security of stock data items stored in database, it was combined with algorithm rivest code 4. Thus, the data encrypted in database would not be known the real meaning and was difficult to change or replaced. Symmetry key that was used for processing encryption and description rivest code 4 algorithm at information system inventory stock of goods in source code. Algorithm implementation rivest code 4 was made by programming language Hypertext Preprocessor and MySQL. Based on the result, the data displayed in database PT. Wings Food was encrypted, so it was found that the system could keep the data confidential in a secure. In short, the data displayed was unencrypted.