cover
Contact Name
santi astawa
Contact Email
santi.astawa@unud.ac.id
Phone
-
Journal Mail Official
jik@unud.ac.id
Editorial Address
-
Location
Kota denpasar,
Bali
INDONESIA
Jurnal Ilmu Komputer
Published by Universitas Udayana
ISSN : 19795661     EISSN : 2622321X     DOI : -
Core Subject : Science, Education,
JIK is a peer-reviewed scientific journal published by Informatics Department, Faculty of Mathematics and Natural Science, Udayana University which has been published since 2008. The aim of this journal is to publish high-quality articles dedicated to all aspects of the latest outstanding developments in the field of computer science. JIK is consistently published two times a year in April and September. This journal covers original article in computer science that has not been published. The article can be research papers, research findings, review articles, analysis and recent applications in computer science.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 4, No. 2 September 2011" : 7 Documents clear
APLIKASI PENGENALAN SELAPUT PELANGI (IRIS) MENGGUNAKAN TRANSFORMASI HAAR WAVELET I Gede Arta Wibawa
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (417.771 KB)

Abstract

Sistem pengenalan biometrik merupakan sistem pengenalan pola yang menggunakan karakteristik fisiologis atau karakteristik perilaku untuk mengenali identitas seseorang. Berdasarkan sudut pandang aplikasi, sistem pengenalan biometrik dapat dibangun dalam modus verifikasi atau identifikasi. Selaput pelangi (iris) merupakan salah satu karakteristik fisiologis yang paling berpotensi digunakan dalam sistem pengenalan biometrik. Kerumitan, keunikan, dan kestabilan karakteristik tekstur acak yang dimiliki iris dapat digunakan sebagai salah satu paspor hidup untuk pengenalan individu yang disarankan oleh ophthalmologists.Pada penelitian ini dibangun sistem verifikasi citra iris yang digunakan untuk melakukan validasi identitas seseorang dengan membandingkan dua iris template. Keputusan verifikasi yang dihasilkan didasarkan pada match threshold yang digunakan. Untuk mengekstraksi pola iris yang akan dijadikan karakteristik dari suatu iris dapat dilakukan dengan berbagai metode yang sebagian besar didasarkan pada dekomposisi band pass citra iris. Salah satu metode yang dapat digunakan adalah transformasi Haar wavelet. Metode tersebut diaplikasikan pada citra iris yang telah dinormalisasi ke koordinat polar. Iris template yang dihasilkan dibentuk dari kombinasi koefisien detil HL5, LH5, dan HH5.Hasil penelitian yang diperoleh menunjukkan iris template yang dibentuk dari kombinasi HL5 – HH5 menghasilkan keputusan verifikasi yang lebih akurat dengan persentase FNMR dan FMR sebesar 6,67%.
PENERAPAN MULTI LAYER PERCEPTRON DALAM ANOTASI IMAGE SECARA OTOMATIS Agus Muliantara; I Made Widiartha
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (351.362 KB)

Abstract

Penentuan anotasi terhadap suatu image (image annotation) merupakan topik penelitian yang berkembang pesat akhir-akhir ini. Permasalahan yang ada dalam menentukan anotasi sebuah image adalah dalam hal penentuan fitur dan metode yang digunakan agar hasil anotasi yang didapat sesuai dengan yang diharapkan oleh pengguna.Dalam penelitian ini akan diimplementasikan suatu model untuk memprediksi anotasi suatu image. Penentuan fitur suatu image dilakukan dengan menggunakan metode color quantization dan multi-level wavelet transform. Dalam melakukan prediksi anotasi suatu image, dilakukan dengan mengimplementasikan metode Multi Layer Perceptron (MLP).Untuk mengevaluasi performance dari model yang diimplementasikan digunakan data image sebanyak 453. Hasil penelitian yang telah dilakukan menunjukkan bahwa tingkat akurasi untuk prediksi anotasi oleh MLP adalah sebesar 81%.
ANALISA DAN PENERAPAN ALGORITMA DES UNTUK PENGAMANAN DATA GAMBAR DAN VIDEO I Putu Herryawan
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.85 KB)

Abstract

System security of data and data’s secret represent one of important aspect in growth of information technology’s progress but which enough regrettably is imbalance between every growth of a technology which is not accompanied with the growth of security’s system. So that a lot of system which still be weak and have to be improved by security. Therefore data security which in character secret shall really paid to attention, to overcome the problem is hence needed an application of data security which can prevent and pacivy the data which we own from other people who have not business to acces it. One of them is method of algorithm of cryptography symmetric, because this algorithm use the same key at the conducting process of encryption and decryption, so that our data difficult to be understood and very quickly for the encryption data. Algorithm cryptography (cipher) used is DES
PENGAMANAN SUARA DALAM VIDEO FORMAT 3GP DENGAN MENGGUNAKAN ALGORITMA ELGAMAL DAN STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) I Made Widhi Wirawan; I Wayan Muliawan
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security at the time information transmitted through the delivery of voice messaging becomes an important thing to do. Methods of cryptography and steganography become one of the options in safeguards toavoid if the attack on the voice message which can result in messages received by aperson not entitled to know the information. Cryptography requires a private key and public key for data encryption. While steganography requires two properties of the container receptacle and dataconfidential. Objects in this study is a video File Third Generation Project, which will be inserted with a voice message encrypted MPEG Layer 3. Cryptographic algorithms are performed using ElGamal and steganography using Least Significant Bit. ElGamal cryptographyrequires a private key and public key 3 pieces (prime, alpha, beta) to perform the encryption process. At Least Significant Bit method, a bit late on the video data will be replaced with a bit of the encrypted voice messages. Once replaced, the data will be anew video file. Securing the voice in the video Third Generation Project using ElGamal cryptography and steganography algorithms with the Least Significant Bit method can provide safety messages to minimize the possibility of unreadable messages hidden voice in the video
PERBANDINGAN JUMLAH DATA DAN WAKTU LOADING ANTARA WEB TRADISIONAL DAN WEB BERBASIS AJAX Radityo Adi Nugroho
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (318.841 KB)

Abstract

Until the beginning of 2005, the characteristic of the web application interaction always depends on the events given by the user. Moreover, must wait for the occurrance of the whole web page to move from one event to another. To repair this problems, appears the Asynchronous Javascript and XML(AJAX) technique which makes the web application similar to desktop application and not depends too much on the event given by the user. Ajax also be claimed has the shorter loading time. However, Ajax also has some weakness because its source code is hard to be written. Some frameworks appear to overcome this weakness, one of them is ASP.NET Ajax.This research tries to make an Ajax web application with ASP.NET Ajax to compare with the traditional web. The compared aspects in this research are the loading time and the data amount. The web application that made is tourism information in Daerah Istimewa Yogyakarta province.The result shows that the traditional web application has the shorter loading time in a whole page refreshing because it passes less data amount rather than Ajax web application using Atlas. However, to change a web page contents, Ajax web application using the ASP.NET Ajax has the shorter loading time because it passes less data amount.
IMPLEMENTASI SISTEM PENDUKUNG KEPUTUSAN MENGGUNAKAN METODE PROFILE MATCHING UNTUK PROSES SELEKSI JABATAN PEGAWAI Ngurah Agus Sanjaya ER
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Proses seleksi pegawai untuk mengisi jabatan yang kosong pada suatu perusahaan umumnya dipengaruhi faktor subyektifitas sehingga pegawai yang terpilih tidak sesuai dengan profil jabatan yang diinginkan perusahaan. Permasalahan ini menjadi semakin kompleks karena profil pegawai yang diajukan serta profil jabatan yang kosong tidak didefinisikan dengan baik. Pada penelitian ini diterapkan suatu sistem pendukung keputusan menggunakan metode pencocokan profil (profile matching) untuk mengatasi permasalahan seleksi pegawai untuk mengisi jabatan yang kosong pada suatu perusahaan. Metode pencocokan profil mencari gap terkecil antara profil pegawai dengan profil jabatan berdasarkan pada 3 kriteria yaitu kualifikasi, kepribadian dan kecerdasan. Hasil dari sistem ini berupa ranking pegawai yang diurut berdasarkan gap antar profil pegawai dengan jabatan tersebut. Dari hasil uji coba yang dilakukan dapat ditarik suatu kesimpulan bahwa sistem yang dibangun dapat membantu pihak manajemen dalam pengambilan keputusan proses seleksi pegawai dan menghilangkan faktor subyektifitas
SISTEM TUTORIAL ADAPTIF : NEURO FUZZY DALAM PENENTUAN HASIL BELAJAR I Gede Santi Astawa
Jurnal Ilmu Komputer Vol. 4, No. 2 September 2011
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.21 KB)

Abstract

Assessment becomes very important to support the adaptive nature of the adaptive tutorial systems. Assessment relies on the standard rules of teachers, but every teacher have a different standard in assessment. In this study, the learning process divided into four phases, namely the stage read, understand, tried, and the train stage, where at each stage students are required to work on some problems with adjustable levels of difficulty. Scoring rules are based on the value factor and exercise time at each stage of student learning. In learning the standard rules of teacher assessment, neuro-fuzzy method is used because this method able to perform reasoning and also automatically learn the rules of teachers from teacher assessment data beforehand.

Page 1 of 1 | Total Record : 7