cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
lontarkomputer@unud.ac.id
Editorial Address
Research institutions and Community Service, University of Udayana, Kampus Bukit Jimbaran Bali
Location
Kota denpasar,
Bali
INDONESIA
Lontar Komputer: Jurnal Ilmiah Teknologi Informasi
Published by Universitas Udayana
ISSN : 20881541     EISSN : 25415832     DOI : 10.24843/LKJITI
Core Subject : Science,
Lontar Komputer [ISSN Print 2088-1541] [ISSN Online 2541-5832] is a journal that focuses on the theory, practice, and methodology of all aspects of technology in the field of computer science and engineering as well as productive and innovative ideas related to new technology and information systems. This journal covers research original of paper that has not been published and has been through the double-blind reviewed journal. Lontar Komputer published three times a year by Research institutions and community service, University of Udayana. Lontar Komputer already indexing in Scientific Journal Impact Factor with impact Value 3.968. Lontar Komputer already indexing in SINTA with score S2 and H-index 5.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol. 10, No. 1 April 2019" : 5 Documents clear
Identifying Requirements Association Based on Class Diagram Using Semantic Similar;ity Hernawati Susanti Samosir; Daniel Siahaan
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (367.713 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p03

Abstract

RRequirements association depicts inter-relation between two or more requirements within a software project. It provides necessary information for developers during decision-making processes, such as change management, development milestones, bug prediction, cost estimation, and work breakdown structure generation. Modeling association between requirements became a focus of software requirements researchers. Previous studies indicate that requirements association was pre-defined by requirements engineer based on their expert judgments. The judgments require knowledge on requirements and their class realizations. This paper introduces a method to generate a mapping between a set of requirement statements and a set of classes of a given project that realized the respected requirements. The method also generates associations among requirements based on information on associations between classes and the class-requirement mapping. The method utilizes element of relational information resided in a class diagram of respected project. A semantic similarity method was used to define the requirements with their realization classes. A class is considered realizing a requirement if and only if their semantic similarity is higher than a certain threshold. A set of experimentation on four different projects was conducted. The result of the approach was compared with the output produced by human annotators using kappa statistics. The approach is considered as having a fair agreement level (i.e. with kappa value 0.37) with the human annotators to identify and model requirement associations.
Security Analysis of Grr Rapid Response Network using COBIT 5 Framework Imam Riadi; Sunardi Sunardi; Eko Handoyo
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.805 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p04

Abstract

Connection from the Internet is required to always be maintained under any conditions, but not always connectivity will run smoothly, lots of crowds or problems that require connections do not run smoothly. Application of security systems to overcome all problems and difficulties, both technical and non-technical which can affect system performance. GRR Rapid Response is the answer to internet network security. GRR asks for a client-server model, agents installed on the machine (client) to be able to communicate with the Grr server to access and provide unique client IDs. After setting this active and running, the server can send a request to the client who collects information, and the client sends a response to the request. After Grr is made, it is necessary to do a system evaluation and evaluation. The COBIT 5 framework is a good standard for determining the level of maturity of network security. The maturity level obtained is 2.899 can be decided at an institutional maturity level defined. The level of support the institution has agreed to, supports and supports all activities related to network security.
Implementasi Zoning dan K-Nearest Neighbor dalam Pengenalan Karakter Aksara Wrésastra I Wayan Agus Surya Darma
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.763 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p02

Abstract

Balinese script is an important aspect that packs the Balinese culture from time to time which continues to experience development along with technological advances. Balinese script consists of three types (1) Wrésastra, (2) Swalalita and (3) Modre which have different types of characters. The Wrésastra and Swalalita script are Balinese scripts which grouped into the script criteria that are used to write in the field of everyday life. In this research, the zoning method will be implemented in the feature extraction process to produce special features owned by Balinese script. The results of the feature extraction process will produce special features owned by Balinese script which will be used in the classification process to recognize the character of Balinese script. Special features are produced using the zoning method, it will divide the image characters area of ??Balinese scripts into several regions, to enrich the features of each Balinese script. The result of feature extractions is stored as training data that will be used in the classification process. K-Nearest Neighbors is implemented in the special feature classification process that is owned by the character of Balinese script. Based on the results of the test, the highest level of accuracy was obtained using the value K=3 and reference=10 with the accuracy of Balinese script recognition 97.5%.
The Simulation of Access Control List (ACLs) Network Security for Frame Relay Network at PT. KAI Palembang Kurniati Kurniati; Rahmat Novrianda Dasmen
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (566.036 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p06

Abstract

PT. KAI Palembang is a branch of PT. Kereta Api Indonesia (KAI) Persero located in South Sumatra Province, where PT. KAI Persero is an Indonesian State-Owned Enterprise that organizes railway transportation which provide services including passenger and goods transportation. PT. KAI Palembang has a computer network connected to PT. KAI Persero central is located in Jakarta. Now, PT. KAI Palembang is trying to improve computer network security, where one of them is limiting the access of users who connected to PT. KAI Palembang computer network. This can be done by implementing Access Control Lists (ACLs) and Frame Relay on PT. KAI Palembang computer network. In this research used the Network Development Life Cycle (NDLC) method which has several stages, namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. This research method is used because the results of this research will be displayed in the Cisco packet tracer simulator. In addition, the results of this research were tested using a ping test between computers to show that the ACLs design had been running well.
Decision Support System for the Selection of Outstanding Students Using the AHP-TOPSIS Combination Method Varindya Ditta Iswari; Florentina Yuni Arini; Much Aziz Muslim
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 1 April 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.839 KB) | DOI: 10.24843/LKJITI.2019.v10.i01.p05

Abstract

This research develops a decision support system for the selection of outstanding students by combining AHP and TOPSIS methods. AHP method was used because it could be implemented to this data and do the priority ranking process for each criterion based on pairwise comparison matrix. The TOPSIS method was used because the concept of the chosen alternative does not only have the shortest distance from the positive ideal solution, but also has the longest distance from the negative ideal solution. The purpose of this study was finding out the workings of the TOPSIS method and the AHP-TOPSIS combination method, as well as to find out the comparison of the best methods between TOPSIS and the combination method of AHP-TOPSIS in the selection of outstanding students. The concept of TOPSIS is simple and easy to understand and has the ability to measure decision alternatives while AHP is not chosen because the AHP method is widely used in the case of criteria weighting and priority determination of each criterion. However, if the two methods were combined the results will be better because in AHP there is an eigenvector concept which is used to do the priority ranking process for each criterion based on pairwise comparison matrix, then the results of the weighting criteria are processed by the TOPSIS method for ranking process. The application of the TOPSIS method on the selection of outstanding students can be analyzed with the results of the presentation using Hamming Distance incompatibility is 93%. Meanwhile, the application of the AHP-TOPSIS combination method gets the presentation results using Hamming Distance incompatibility is 91%. Based on these results in this study it can be concluded that the AHP-TOPSIS combination method is better than the TOPSIS method.

Page 1 of 1 | Total Record : 5