cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimatics@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
Jurnal ULTIMATICS
ISSN : 20854552     EISSN : 2581186X     DOI : -
Jurnal ULTIMATICS merupakan Jurnal Program Studi Teknik Informatika Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang analisis dan desain sistem, programming, algoritma, rekayasa perangkat lunak, serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, kecerdasan buatan, pemrograman sistem mobile, serta topik lainnya di bidang Teknik Informatika. Jurnal ULTIMATICS terbit secara berkala dua kali dalam setahun (Juni dan Desember) dan dikelola oleh Program Studi Teknik Informatika Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika" : 10 Documents clear
Implementasi Algoritma Genetika Pada Penempatan Tugas Asisten Laboratorium Berbasis Web Adhi Kusnadi; David Setyadi Santoso
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1487.566 KB) | DOI: 10.31937/ti.v7i2.353

Abstract

On education system in University, the given subject is not only theoretics subject, but practicum also. In teaching practical subjects, the lecturer often experiences a difficulty to answer and handle every question that the students have in laboratory. Therefore, the assistant laboratory is needed here. One of the division in Universitas Multimedia Nusantara, ICT LAB still arranges the assignment of the assistant laboratory manually. It is difficult and takes some times. This thing becomes the reason for the development of an application ICT LAB that can do the assignment process automatically. This research is using Genetic algorithm that can calculate fitness value which show the matching level of the assignment that has been created. Based on the testing, using one point crossover, mutation on bit level, and rank selection, the average fitness value is 68.571% from all of the laboratory assistant vacancy. Based on the data used, there are 22 assignment slots on certain subjects that don’t have any applicant. So if that 22 slots are not used in the fitness calculation, there are only 118 assignment slot and the fitness value becomes 80,5%. This fitness value has problem with the quantity of student that didn’t fit to all of the assignment slot. Index Terms - Genetic Algorithm, rank selection, one point crossover, assignment, laboratory assistant.
Implementasi Simple Moving Average dan Exponential Moving Average dalam Menentukan Tren Harga Saham Perusahaan David Widodo; Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2201.102 KB) | DOI: 10.31937/ti.v7i2.354

Abstract

The rapid economic growth, technology and science have a big impact on human mind for searching and getting money, one of the example is stocks investment. The information is so easy to find and disseminated, as well as the awareness and knowledge are the other key to be able to know and understand how to be a good investor. The purpose of this research was to implement simple moving average and exponential moving average to determine the trend of the stock price of a company. The application is by calculating the value of a simple moving average and exponential moving average period of 5 (weekly) and a period of 20 (monthly) then analyze the results of calculation with the data on the fact whether it is appropriate or not. The tests for this research is conducted using data from the 15 companies listed in the Indonesia Stock Exchange (IDX) and always included in the list of LQ45 index from 2005 to 2014. From the research that began on January 6, 2014 until September 29, 2015 for the simple moving average and the exponential moving average period of 5 (weekly) can be inferred that the level of accuracy of the simple moving average 5-day period was at 61,73%, then to the result of the exponential moving average 5-day period was at 68,07%. Then, based on research results that starting on January 1, 2014 until September 29, 2015 for the simple moving average and the exponential moving average 20day period (monthly) can be inferred that the level of accuracy of the simple moving average 20-day period was at 72,52%, and then to result 20-day period exponential moving average is at 73,39%.
Implementasi Zero Knowledge Proof Menggunakan Protokol Feige Fiat Shamir Untuk Verifikasi Tiket Rahasia Willy Sudiarto Raharjo; Dessy Sutanti
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.174 KB) | DOI: 10.31937/ti.v7i2.355

Abstract

Cryptography is known for it’s ability to protect confidential information, but it can also be used for other purposes. One of them is for identity verification or authentication. One of the biggest disadvantages of traditional authencation method is at the end of the session, the verifier knows about secrets which is supposed to be known only by prover. In this paper, we implemented a ZeroKnowledge Proof-based secret ticket verification system using Feige Fiat Shamir protocol. The goal of this system is to help prover identified themselves to the verifier, but also prevent the verifier to understand anything about the prover’s secret information. The system is also able to prevent ticket duplication or double-use of tickets by using an interactive proof verification method. By combining it with cryptography, not only we can achieve completeness and soundness property of Zero-Knowledge Proof, but we can also achieve information security property. Index Terms - Feige Flat Shamir, Verification, Zero Knowledge Proof.
Klasifikasi Daun Dengan Perbaikan Fitur Citra Menggunakan Metode K-Nearest Neighbor Febri Liantoni
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (671.182 KB) | DOI: 10.31937/ti.v7i2.356

Abstract

Plants are the most important part in life on earth as oxygen supplier to breathe, groceries, fuel, medicine and more. Plants can be classified based on its leaves shape. Classification process is required well data extraction feature, so it needs fixing feature process at pre-processing level. Combining median filter and image erosion is used for fixing feature process. Whereas for feature extraction is used invariant moment method. In this research, it is used leaves classification based on leaves edge shape. K-Nearest Neighbor Method (KNN) is used for leaves classification process. KNN method is chosen because this method is known rapid in training data, effective for large training data, simple and easy to learn. Testing the result of leaves classification from image which is on dataset has been built to get accuracy value about 86,67%. Index Terms—Classification, Median Filter, Invariant Moment, K-Nearest Neighbor.
Kriptografi Citra Menggunakan Metode Rivest-Shamir-Adleman Chinese Remainder Theorem Di Konsultan XYZ Eko Budi Setiawan; Yogie Setiawan Nugraha
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1089.456 KB) | DOI: 10.31937/ti.v7i2.357

Abstract

This study basically do image management processes which have no restrictions in about permissions to view the images on the XYZ consultant. This results in image can be easily used by those who do not have the right to open it. Therefore, security research digital image with cryptographic techniques using Rivest Shamir-Adleman With the Chinese Remainder Theorem (RSA-CRT) aims to provide restrictions permissions to view the image, and give the number of restrictions to view images that can be performed by the client. Results of this research is a security application that can create digital images can not be seen without using a specific key and restrictions as well as providing an image to only be opened in a few times. Index Terms— Cryptography, Digital Image, RSACRT, Data Security, Asymmetric Key
Rancang Bangun Aplikasi Penjurusan Minat Bakat Menggunakan Metode Forward Chaining Levi Jordan Halim; Ranny Ranny; P.M. Winarno
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (770.321 KB) | DOI: 10.31937/ti.v7i2.358

Abstract

Plentiful choices of Student Activities Unit that offered by a campus like Multimedia Nusantara University can help students who want to choose a unit that suitable for them. The decision support system application with Forward Chaining method is built to help students choosing the Student Activity Unit that suits them. Multiple Intelligence method is used as the knowledge base at making the rules. The aspects that considered as attributes to choosing the Student Activities Unit is the initial interest and also the multiple intelligence scores that the level of conformity will be searched by using Forward Chaining method. This research has produced a knowledge-based decision support system that can help students at choosing Student Activities Unit that suitable for them with the highest accuracy of 86.67 percent. This system is designed in website with PHP and MySQL database programming language. Index Terms—Forward Chaining, Knowledge-based, Multimedia Nusantara University, Multiple Intelligence, Student Activities Unit
Rancang Bangun Aplikasi Peramalan Laba dengan Metode Kuadrat Terkecil Berbasis Android Audrey Sugiarto; Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (920.518 KB) | DOI: 10.31937/ti.v7i2.359

Abstract

The advancement of technology effects in increasing competition between companies. Because of that, companies need more than just raw information, but rather some insight that can help companies to make decisions in the future regarding all the possibilities that can happen. The data that can help the company to make decisions is a forecasting earnings because it can help predict the state of the company has right now, and also can help to make a better decision in the future. Therefore, this study discusses about the design and development of forecasting earnings application using Least Squares Method which will create an equation with the formula, y = ax + b. The method will be implemented based on Android OS at PT TRI PANJI GEMILANG using data from January 2005 to December 2013 (108 months) for data forecasting, and the data used to check the error is data from January 2014 to May 2015 (17 months). Forecasting results have a mean absolute percentage error (MAPE) about 8.26%, with an accuracy of forecasting results about 91.74%. Keywords: android, forecasting, least squares method, profits
Rancang Bangun Piranti Lunak Pengolah Data Pasca Pengujian Terowongan Angin Kecepatan Rendah Indonesia Ivransa Zuhdi Pane
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1041.039 KB) | DOI: 10.31937/ti.v7i2.360

Abstract

Data post-processing plays important roles in a wind tunnel test, especially in supporting the validation of the test results and further data analysis related to the design activities of the test objects. One effective solution to carry out the data post-processing in an automated productive manner, and thus eliminate the cumbersome conventional manual way, is building a software which is able to execute calculations and have abilities in presenting and analyzing the data in accordance with the post-processing requirement. Through several prototype development cycles, this work attempts to engineer and realize such software to enhance the overall wind tunnel test activities. Index Terms—software engineering, wind tunnel test, data post-processing, prototype, pseudocode
Rancang Bangun Sistem Pakar Prediksi Stres Belajar Dengan Neural Network Algoritma Backpropagation Adhi Kusnadi; Idul Putra
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2776.667 KB) | DOI: 10.31937/ti.v7i2.361

Abstract

Stress will definitely be experienced by every human being and the level of stress experienced by each individual is different. Stress experienced by students certainly will disturb their study if it is not handled quickly and appropriately. Therefore we have created an expert system using a neural network backpropagation algorithm to help counselors to predict the stress level of students. The network structure of the experiment consists of 26 input nodes, 5 hidden nodes, and 2 the output nodes, learning rate of 0.1, momentum of 0.1, and epoch of 5000, with a 100% accuracy rate. Index Terms - Stress on study, expert system, neural network, Stress Prediction
Sistem Pendukung Keputusan Pemilihan Taksi Berbasis Web dengan Algoritma Pencarian Linear Bimo Satriantoro; Ni Made Satvika Iswari
Ultimatics : Jurnal Teknik Informatika Vol 7 No 2 (2015): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1030.374 KB) | DOI: 10.31937/ti.v7i2.362

Abstract

Indonesian people have a high interest for public transportation. There are few kind of public transportation, and taxi is one of them. Taxi use taximeter to calculate passanger fares. Taximeters between taxi companies are different in term of results although using the same equation and principle. The total fare from the taximeter is based on equation that includes distance variable, speed of the vehicle, and time variable. People have a problem to choose taxi because of the differnces of taximeter fares and taxi pool. Based on the problem, the solution is an application to help customer to decide choosing taxi. The application will help customer by giving informations about taximeter and carpool form two different company. The informations are based on the distance of the start point and the finish point of the customer and based on the distances of the customer and the carpool of the taxy company that will processed trough the application to calculating the total fares for the customer between two taxi companies. By using algorithm for linear searching, customer will get the informations to help them to decide which taxi the customer will use. Keywords: Linear Algorithm, Taximeter, Google Apps, Choice, Taxi

Page 1 of 1 | Total Record : 10


Filter by Year

2015 2015