cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
lontarkomputer@unud.ac.id
Editorial Address
Research institutions and Community Service, University of Udayana, Kampus Bukit Jimbaran Bali
Location
Kota denpasar,
Bali
INDONESIA
Lontar Komputer: Jurnal Ilmiah Teknologi Informasi
Published by Universitas Udayana
ISSN : 20881541     EISSN : 25415832     DOI : 10.24843/LKJITI
Core Subject : Science,
Lontar Komputer [ISSN Print 2088-1541] [ISSN Online 2541-5832] is a journal that focuses on the theory, practice, and methodology of all aspects of technology in the field of computer science and engineering as well as productive and innovative ideas related to new technology and information systems. This journal covers research original of paper that has not been published and has been through the double-blind reviewed journal. Lontar Komputer published three times a year by Research institutions and community service, University of Udayana. Lontar Komputer already indexing in Scientific Journal Impact Factor with impact Value 3.968. Lontar Komputer already indexing in SINTA with score S2 and H-index 5.
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol. 9, No. 1 April 2018" : 6 Documents clear
Requirements Association Extraction based on Use Cases Diagram Peter Gelu; Riyanarto Sarno; Daniel Siahaan
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.97 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p02

Abstract

Requirements are the initial step in the software development process. It is very important to ensure the association (relationship) of requirements and high quality of specification as more than three-quarters failure of software derives from the software requirement process. Therefore, the analysis process is required to ensure the association between requirements and the requirements of other users. As a result, interdependency requirements association is essential. This research proposes an approach of software requirements association. These are based on the reference of interdependency in the user case, namely the result of collaboration of the association of the dependency of requirements based on Unified Modeling Language (UML) design in the Use cases diagram. In this research, the mapping between requirements and use cases and interdependencies between use cases are used to determine the interdependency between requirements. The analysis presented is the association of similar requirements, requires, or, temporal, elaborates dan generalises. The purpose of this research is to generate a requirements dependency graph that models the type of dependency between requirements within a software project.
Poisonous Shrimp Detection System for Litopenaeus Vannamei using k-Nearest Neighbor Method Abdullah Husin; Othman Mahmod; Lisa Afrinanda
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.003 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p03

Abstract

One of the important seafoods in the food consumption of humans is shrimp. Although shrimp contains proteins that are needed by the human body, sometimes it contains toxins. This is due to environmental factors or catching processes that may use toxins. Therefore, the community should take precautions when consuming shrimp. White shrimp (Litopenaeus vannamei) is one type of shrimp that is preferred because of its delicious taste. The purpose of this research is to develop a computerized system for poisonous white shrimp detection. The category of white shrimps consists of two kinds, i.e., fresh white shrimps that are caught in a natural way (class A), and poisonous white shrimps that are caught by using toxin (class B). The features used are RGB colors (red, green, and blue) and texture (energy, contrast, correlation, and homogeneity). A similarity-based classification is performed by the k-Nearest Neighbor (k-NN) algorithm. The experiment was conducted on a dataset consisting of 90 white shrimp images. The holdout validation method was used to evaluate the system. The original dataset was divided into two parts, whereby 60 images were used as training samples and 30 images were used as testing images. Based on the evaluation results, it can be concluded that the classification accuracy is 73.33%. The benefit of the developed system is to help the community in selecting good and safe white shrimps.
Sistem Perpustakaan Menggunakan Radio Frequency Identification (RFID) dan Telegram Bot API Dewa Agung Krishna Arimbawa P; I Ketut Gede Darma Putra; I Made Sukarsa
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.23 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p05

Abstract

Libraries as a service provider to the user that needs fast, easy, and efficient services. Optimization of the services performed by the application of information technology such as utilizing barcode technology for the library system. Along with the development, there were some shortcomings in the use of barcode technology. Barcode technology can be replaced by RFID (Radio Frequency Identification) in order to further improve the operational and library services. RFID has some advantages over the barcode system is the possibility of data can be read automatically without regard to alignment readings, past the non conductor materials like cardboard paper with access speeds of several hundred tags per second at a distance of several meters. The advantages and capabilities of RFID can be applied in a library system in the inventory, self-service, and security so as to generate optimal library services more than manual systems or even a barcode system. Utilization of RFID technology in the library and then combined with technology Telegram Bot API as a medium to facilitate user access such as notification, accessing history, and others.
Modified Background Subtraction Statistic Models for Improvement Detection and Counting of Active Spermatozoa Motility I Gede Susrama Masdiyasa; I D. G. Hari Wisana; I K. Eddy Purnama; M. Hery Purnomo
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (437.904 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p04

Abstract

An important early stage in the research of sperm analysis is the phase of sperm detection or separating sperm objects from images/video obtained from observations on semen. The success rate in separating sperm objects from semen fluids has an important role for further analysis of sperm objects. Algorithm or Background subtraction method is a process that can be used to separate moving objects (foreground) and background on sperm video data that tend to uni-modal. In this research, some of the subproject model statistics of substrata model are Gaussian single, Gaussian Mixture Model (GMM), Kernel Density Estimation and compared with some basic subtraction model background algorithm in detecting and counting the number of active spermatozoa. From the results of the tests, the Grimson GMM method has an f-measure value of 0.8265 and succeeded in extracting the sperm form near its original form compared to other methods
Safety Helmet Implementation with Centralized Information System on Remote Monitoring Applications Alvinas Deva Sih Illahi; Anatasya Bella; Sugondo Hadiyoso; Suci Aulia
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (460.92 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p01

Abstract

Personal Protective Equipment (PPE) is standard equipment that required to ensure safety of workers. PPE equipment that used during work such as: Safety helmet, safety glass, and ear plug. PPE that being used by workers doesn’t informative yet, only serve as personal protective so evacuation prevention still looks difficult to do prior accident happened. In this research, Safety Helmet Project has been implemented with pulse sensor, temperature sensor, carbon monoxide gas sensor, and transmission media which able transmitting data to control and monitoring center. The system also supports multiuser monitoring applications that can be accessed simultaneously through the internet network. Based on test results, the comparison of measurement gap with standard tool has been obtained as temperature sensor is 0,07%, heart sensor is ± 4%. Accuracy level for temperature sensor and heart rate are 99,67% and 95,45% by various condition of test. Another test is delay of the transmitting sensor data to the website around ± 10 seconds and controlling around ± 5 seconds.
Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm Taronisokhi Zebua
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.233 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p06

Abstract

Computer utilization in the execution of the computer-based test is currently no strange. Almost all government agencies and companies at the time of conducting the test acceptance of new employees have been using computer-based test system online or often referred to as Computer Based Test (CBT). One of the important aspects to be considered and must be maintained in the execution of computer-based exams is the problem of question security and exam answers to abuse actions. One technique that can be done to solve the problems above is the use of cryptographic techniques. This research describes the use of spritz algorithm which is one of the cryptographic algorithms to encode the text database record of the computer-based test. The results of the encoding process can make it harder for the attackers to know the original text of the exam, so as to minimize the abuse of the exam.

Page 1 of 1 | Total Record : 6