cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimatics@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
Jurnal ULTIMATICS
ISSN : 20854552     EISSN : 2581186X     DOI : -
Jurnal ULTIMATICS merupakan Jurnal Program Studi Teknik Informatika Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang analisis dan desain sistem, programming, algoritma, rekayasa perangkat lunak, serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, kecerdasan buatan, pemrograman sistem mobile, serta topik lainnya di bidang Teknik Informatika. Jurnal ULTIMATICS terbit secara berkala dua kali dalam setahun (Juni dan Desember) dan dikelola oleh Program Studi Teknik Informatika Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika" : 10 Documents clear
Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509 Is Mardianto; Kuswandi Kuswandi
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1828.12 KB) | DOI: 10.31937/ti.v8i1.496

Abstract

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES
Pengembangan Model Pengenalan Wajah Manusia dengan Teknik Reduksi Dimensi Bi2DPCA dan Support Vector Machine sebagai Classifier Fredicia Fredicia; Agus Buono; Endang Purnama Giri
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (597.244 KB) | DOI: 10.31937/ti.v8i1.497

Abstract

This paper presents the modeling of face recognition using feature extraction based on Principal Component Analysis (PCA) and Support Vector Machine (SVM) as a classifier. Three PCA techniques were compared, they are 1DPCA, 2DPCA and Bi-2DPCA. Meanwhile, three type of SVM kernel functions-linear, polynomial, and radial basis function (RBF) were used. The experiment used the ORL Face Database AT&T Laboratory, which contain 400 images with 10 images per each person. The leave one out method is used for validating each pair of extraction and classifier method. The highest accuracy is obtained by a combination of linear kernel and Bi-2DPCA85%, with 94.25%, and also the fastest computation time, is 15.34 seconds. Index Terms— Face Recognition, Principle Component Analysis, Kernel, Support Vector Machine, Leave-one Out Cross Validation
Implementasi Skema Meaningful Sharing pada Kriptografi Visual Berwarna untuk Digital Safe Deposit Box Willy Sudiarto Raharjo; Danny Aguswahyudi
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1049.651 KB) | DOI: 10.31937/ti.v8i1.498

Abstract

Conventional key being used in safe deposit box is a physical key that is easily duplicated, stolen and abused by irresponsible parties. This research proposed a model that substitutes the conventional key with a digital shared secret with the use of visual cryptography scheme. Visual cryptography hide the secret image into two or more images which are called share images that will not reveal anything about secret image if they were separated. The secret image can be recovered simply by stacking the shared images together without any complex computation. In this research, we propose a digital safe deposit box built using a color visual cryptography scheme. The proposed system will generate secret images containing passphrase that will be hidden in two shared images. The shared images are used for substituting the traditional key. We found 93% of the stacked image are visually readable by human eye and Arial-Courier font combination are more readable compared to Times New Roman-Calibri with 95% compared to 92% during human visual verification process. Index Terms— visual cryptography, secret sharing
Implementasi Metode Maximum Marginal Relevance (MMR) dan Algoritma Steiner Tree untuk Menentukan Storyline Dokumen Berita Eko Budi Setiawan; Aji Teja Hartanto
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (963.135 KB) | DOI: 10.31937/ti.v8i1.499

Abstract

In chronological search process a news event online which using search engines, users must access the various sites that have relevance for the event. This is because search engines do not provide search results in a structured method. The search process requires conformity result of the query is entered as search criteria. Relevance textual news can be obtained by using a cosine-similarity summary of news by implementing the method of Maximum Marginal Relevance (MMR) which is determined based on the similarity to the query. In the same context, the search over 90 samples of news documents applied algorithm Steiner Tree in determining the best path in a collection of news documents (vertices) connected as a weighted similarity (edge) while the side directed toward a specific document (directed arc). Based on usability testing methods directed against six respondents as much as 66.7% of respondents considered that this application tasks more quickly and 75% of users were able to overcome the existing problems with the process of finding a time-saving news. From the performance testing of the algorithms applied, obtained by the complexity of the implementation of the MMR algorithm is O (n2) and Steiner Tree algorithm is O (n). Thus, the implementation of MMR and Steiner Tree in search applications of chronological events can reduce the level of absurdity news structurally. So as to facilitate the readers in determining the understanding of events happening quickly. Index Terms— text-summarization, MMR, steiner tree, Storyline, Artificial Intellegence (AI).
Improving Multi-Document Summarization Performance by Utilizing Comprehensive Document Features Rosalina Rosalina
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (588.078 KB) | DOI: 10.31937/ti.v8i1.500

Abstract

The rapid growth of information technology and communication technology makes the volume of information available on the web increase rapidly. This development is leading to information overload. Multidocument summarization appears as a way to resolve the information overload problem in an effective way. In order to improve the performance of the multi-document summary this research combined the sentence features: sentence centroid, sentence position, sentence length and IsTheLongestSentence value to weight the sentences in order to find the most informative information of a text. In addition, this research uses a new method to calculate the weight of sentence position feature. The performance of the research result was evaluated using ROUGE metrics: ROUGE-N, ROUGE-L, ROUGE-W, ROUGE-S, and ROUGE-SU. The research result outperform MEAD system if it was evaluated using the dataset of cluster D133C and D134H and if it was evaluated using ROUGE-1, ROUGE-S and ROUGE SU for cluster D133C and ROUGE-2, ROUGE-3, ROUGE-4, ROUGE-L and ROUGE-W for cluster D134H. This shows that the research result captures the important words in the extracted summary and it generates longer sentences as longer sentence contains more material that would match the one in the reference summaries. Index Terms— multi-document summarization, document features, centroid based summarization
tudi Kelayakan dan Perancangan Aplikasi Pencarian Buku pada Katalog Perpustakaan Menggunakan Rocchio Relevance Feedback Albert Albert; Marcel Bonar Kristanda; Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (515.425 KB) | DOI: 10.31937/ti.v8i1.501

Abstract

A catalog is a register of all bibliographic items found in a library. A bibliographic item can be any information entity. The library catalog has evolved from manual, website based catalog to mobile catalog. Unfortunately, there are still many obstacles in the results of library catalog search, including the relevant results of documents based on input from the user. The purpose of this research is to make the library catalog based on mobile application in android using relevant calculation used rocchio relevance feedback method. Terms— android, library, library catalog, mobile, rocchio.
Weight-Loss Program Assistance System for Obesity Patients Based on Internet of Things (IoT) Technology I Gusti Bagus Astawa; I Ketut Agung Enriko
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (791.931 KB) | DOI: 10.31937/ti.v8i1.502

Abstract

These days, the use of Internet technology can be found in almost every sector of human life. One of the advanced Internet technologies is Internet of Things (IoT), that is a technology where devices can communicate via Internet connectivity. It is used in many vital industries like automotive, electricity, home automation, and healthcare. This study aims to implement IoT technology for healthcare sector, i.e. in helping obesity people to pursue their weight-loss program (WLP). The result is a system which consists of a smart weight scale, a mobile application, and food menu recommendation database in order to help obesity people in their WLP program. A trial to some obesity patients is performed to collect data. Index Terms—Internet of things; overweight; weight loss program; food recommendation
Rekayasa Piranti Lunak Pengelola Tugas Personil Organisasi Fungsional Kerekayasaan Ivransa Zuhdi Pane
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (800.079 KB) | DOI: 10.31937/ti.v8i1.503

Abstract

Task manager software is useful to support the management of the assignment of the work programs to personnel, monitoring the progress of the tasks and evaluating the personnel performance in an engineering functional organization. Implementation of this software is expected to increase the personnel productivity as well as to provide inputs for the management, which can be utilized to support further decision making activities. To realize such software, an engineering activity is initialized by firstly analyzing the requirement and designing the operational framework, which is used as the base to construct the functional product in the subsequent implementation phases. Index Terms—software engineering, Engineers, engineering functional organization, prototyping
Pengembangan dan Integrasi Piranti Lunak Pendukung Sistem Akuisisi dan Reduksi Data Terowongan Angin Kecepatan Rendah Indonesia Ivransa Zuhdi Pane
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1023.061 KB) | DOI: 10.31937/ti.v8i1.504

Abstract

Data acquisition and reduction system plays important roles in a wind tunnel test and determine the validity of aerodynamic characteristics information of the test object in Indonesian Low Speed Tunnel. Although it has been modernized recently, the main software components of the system are still requiring supporting counterparts to optimize the efficiency and the effectivity of the test execution. Several supporting softwares have been engineered so far and further developments are still in progress as attempts to fulfill those needs. Coordinating both main and supporting softwares in a well manner should be considered to realize fully integrated system which functions from the pre-test to the post-test phases as well as to anticipate various possible needs in the future. Index Terms—data acquisition and reduction system, software engineering, wind tunnel test
Perkembangan Bioinformatics dalam Ruang Lingkup Ilmu Komputer Irma Yunita; Kristian Tjandradiredja; Seng Hansun
Ultimatics : Jurnal Teknik Informatika Vol 8 No 1 (2016): Ultimatics: Jurnal Ilmu Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (342.247 KB) | DOI: 10.31937/ti.v8i1.505

Abstract

Bioinformatics is a research topic which is very attractive in this era. Bioinformatics combines biology and computer science. It means that biology problem can be solved by using methods and techniques in solving problems in computer science. There are some terms of bioinformatics such as DNA, RNA, and protein. In addition, there are several methods described in this paper, which can be used in solving the problem bioinformatics following with the tools and software which are available and free in internet. Keywords—bioinformatics, tools of bioinformatics, methods of bioinformatics

Page 1 of 1 | Total Record : 10


Filter by Year

2016 2016