Jurnal Informatika https://ojs.petra.ac.id/ojsnew/index.php/inf <table cellpadding="7"><tbody><tr><td valign="middle"><a href="http://jurnalinformatika.petra.ac.id"><img style="border-style: none;" src="http://puslit2.petra.ac.id/ejournal/cover/informatika.jpg" alt="" /></a></td><td valign="top">Jurnal Informatika is published biannually, in May and November, by Petra Christian University.<br />Jurnal Informatika aims to:<br />Promote a comprehensive approach to informatics engineering and management incorporating viewpoints of different applications (computer graphics, comp. networks, comp. vision, operating systems, Internet/Intranet developments, computational intelligent, databases, IT project management, etc.).<br />Strengthen academic exchange with other institutions in the area of informatics engineering and management.<br />Encourage scientist, practicing engineers, and others to conduct research and other similar activities.</td></tr></tbody></table> en-US <p>Authors who publish with this journal agree to the following terms:</p><ol type="a"><br /><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><br /><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><br /><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</li></ol><p> </p> <p><a href="http://creativecommons.org/licenses/by/3.0/"><img src="http://puslit2.petra.ac.id/ejournal/88x31.png" alt="" /></a></p> puslit@petra.ac.id (I Ketut Bagiartha) puslit@petra.ac.id (I Ketut Bagiartha) Wed, 24 Jan 2018 00:00:00 +0000 OJS 2.4.8.4 http://blogs.law.harvard.edu/tech/rss 60 THE ROLE OF SAP BUSINESS OBJECT TO SUPPORT A BUSINESS INTELLIGENCE PERFORMANCE https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20545 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in; line-height: 95%;"><span style="font-size: small;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">As the world of information and communication technology grows, it is becoming increasingly important for the role of technology as the primary information processor in every line of human life today. It can be concluded that the current role of technology has evolved into needs, not just corporate or academic interests. This creates the birth of a new economy marked by the high penetration of the use of IT (Information Technology) in the business transaction process, so the concept evolves into a smart business, thus improving business performance. So the concept of SAP Business Object to be applied this can help improve the company's performance to continue to innovate on an ongoing basis</span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en">.</span></span></span></span></p> Eileen Fransisca Abadi, Aleksandar Terziev, Alexander Setiawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20545 Mon, 01 May 2017 00:00:00 +0000 INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20544 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in;"><span style="font-size: small;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en">Internet of thing has been able to attract people compete to create various devices. Devices developed have various benefits, but the point is to make life easier. So many vendors create products related to the internet of things, so the user gets confused to determine which is good and appropriate for the needs. To simplify the user in choosing IoT product, this research will discuss about technology that is widely used in IoT, the advantages of each technology, in terms of security, operating system, microcontroller, IoT platform, tools and communication technology. This research makes prototype with one of existing technology. The results of this research provide knowledge, skills and experience in the field of IoT as well as information related to IoT technology, which is widely in the market. Furthermore, the prototype also has the expected functionalities, but it does not close the opportunity for further improvements. The results of this research provide knowledge, skills and experience in the field of IoT as well as information related to IoT technology, which is widely in the market. Furthermore, the prototype also has the expected functionalities, but it does not close the opportunity for further improvements.</span></span></span></span></p> Anthony Sutera Genadiarto, Agustinus Noertjahyana, Vladimir Kabzar Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20544 Mon, 01 May 2017 00:00:00 +0000 MIGRATING AUTOLUX WEBSITE FROM MODX TO PHALCONPHP WITH FURTHER DEVELOPMENTS (Search Engine Optimization and Mobile Application Support Implementation) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20543 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in;"><span style="font-size: small;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Autolux Project is owned by DTT Multimedia B.V. Autolux is a platform for car lovers sharing their information about favorite or latest cars. The website was built in MODx (CMS framework) which considered being old and heavy by the company. With that very reason, a project to migrate the website from MODx into PhalconPHP (pure PHP framework) was started. Migrating website from MODx to PhalconPHP was a success, and to boost the website popularity, the first thing to do is to implement the SEO standards. Another demand by the company was for the website to be responsive and using OOP standarts. Responsive website can be reached by using the help of libraries. PhalconPHP already implemented OOP, thus the developer will follow the MVC pattern given and refine it by doing more separation of concerns. Later on, the developer also put more refinements on the website to boost the speed of page loading, support multilingual, and management system.</span></span></span></p> Hana Tanjung, Bert van Gestel, Justinus Andjarwirawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20543 Mon, 01 May 2017 00:00:00 +0000 DIGITAL LOYALTY FOR SOCIAL MEDIA, A CASE STUDY ON BOXPLOSIVE B.V. https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20542 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in; line-height: 95%;"><span style="font-size: small;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Digital loyalty is the process of providing incentives to customers through digital media to increase customer loyalty. Nowadays, </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Boxplosive B.V. using app to distribute deal and saver cards from retailers like AH to go and Etos to their customer. But the problem is that not all the customers are willing to download the app. To overcome this problem, this research investigate how social media app can be used for distributing deal and saver card. Therefore, a prototype program will be built for the implementation to show that social media app can be used for business purposes. The result shows that now the customer do not need to download the separate apps to get the deas and saver card.</span></span></span></p> Christopher Pandoyo, Djoni Haryadi Setiabudi Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20542 Mon, 01 May 2017 00:00:00 +0000 RANCANG BANGUN APLIKASI PREDIKSI PENJUALAN MENGGUNAKAN ALGORITMA DOUBLE EXPONENTIAL SMOOTHING BERBASIS WEB (STUDI KASUS: PT. SANPAK UNGGUL) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20541 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.48in; margin-bottom: 0in; background: #ffffff; line-height: 95%;"><span style="font-size: small;"><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Penelitian ini bertujuan untuk melakukan peramalan penjualan di masa mendatang beserta fitur-fitur aplikasi lainnya seperti kemampuan untuk menambahkan (</span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>insert</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">), mengubah (</span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>edit</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">), dan menghapus (</span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>delete</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">) data produk dan ringkasan penjualan yang akan atau telah disimpan dalam suatu </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>database</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> untuk studi kasus perusahaan tertentu. Aplikasi yang dibangun menggunakan algoritma </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>double exponential smoothing</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">. Alasan pemanfaatan algoritma ini adalah nilai </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>smoothing</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> akan diperoleh tepat waktu sebelum data aktual saat data historis memiliki komponen </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>trend</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">. Oleh karena itu, untuk nilai </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>smoothing</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> tunggal, perlu ditambahkan nilai dari </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>double smoothing</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> untuk menyesuaikan </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>trend</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> tersebut. Metode yang dapat digunakan untuk memprediksi </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>trend linear</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> adalah metode dua parameter Holt. Pada metode Holt, nilainya bukan </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>trend</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> halus dari </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>double smoothing</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> secara langsung, melainkan penghalusan </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>trend</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> dilakukan dengan menggunakan parameter yang berbeda dengan yang digunakan untuk menghaluskan data aslinya. Hasil penelitian menunjukkan bahwa aplikasi yang dibangun memiliki persentase kesalahan sekitar 28,38%. Aplikasi yang dibangun juga mampu memenuhi fitur-fitur yang dikehendaki oleh </span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>user</em></span></span></span><span style="color: #212121;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> dalam pemrosesan produk dan rekapitulasi.</span></span></span></span></p> Richard John, Seng Hansun Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20541 Mon, 01 May 2017 00:00:00 +0000 APLIKASI CERDAS CERMAT ONLINE REALTIME UNTUK SEKOLAH DASAR https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20540 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in; line-height: 95%;"><span style="font-size: small;"><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">Berbagai macam aplikasi open source menjadi peluang untuk dapat menciptakan aplikasi permainan yang bernilai positif bagi perkembangan kecerdasan anak Sekolah Dasar (SD) dan dapat digunakan untuk berkompetisi </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">dan berprestasi </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">dalam</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB"> hal</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> wawasan </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">ilmu </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">pengetahuan</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">.</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> Kegiatan cerdas cermat pendidikan dasar khususnya pada tingkat SD menjadi objek potensial dalam pemanfaatan tekn</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">o</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">logi berbasis open source. Aplikasi cerdas cermat online realtime untuk Sekolah Dasar merupakan salah satu perangkat teknologi untuk ber</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">m</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">ain</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">, berkompetisi, dan berprestasi,</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> sebagai sarana meningkatkan </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">ilmu </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">pengetahuan </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">siswa </span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">di tingkat pendidikan dasar. Aplikasi berbasis web ini dibangun </span></span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">dengan menggunakan metode prototipe. </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">H</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">asil penelitian ini</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB"> adalah</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> 1) Requirement aplikasi untuk permainan </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">cerdas cermat online ini</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> berdasarkan tiga requirement, yaitu teknik menjawab pertanyaan secara realtime, leveling, dan </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">banyak </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">pengguna; 2) Aplikasi cerdas cermat online realtime</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB"> ini </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> diimplementasikan di dalam fungsi pertanyaan babak rebutan; 3) Perilaku kompetisi yang diterapkan dalam aplikasi cerdas cermat online realtime dapat digunakan untuk meningkatkan motivasi belajar, pengetahuan dan kompetisi siswa SD dalam </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">ruang </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">lingkup yang lebih luas. Aplikasi yang telah dibangun dapat dikembangkan lagi dengan menambahkan fitur leveling</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB"> yang sudah ada</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> dengan </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">semua </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">tingkatan kelas di sekolah dasar dan </span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">progress peningkatan kemampuan pengetahuan pengguna.</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"> Monitoring ini dapat digunakan sebagai nilai tambah dan penghargaan (</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID"><em>reward</em></span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="id-ID">) bagi sekolah maupun masyarakat kepada para siswa yang berkompetisi di dalamnya</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span lang="en-GB">, dan sebagai dasar pengembangan bahan ajar guru</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">.</span></span></span></p> Mohamad Nurkamal Fauzan, Widia Resdiana, Dini Hamidin Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20540 Mon, 01 May 2017 00:00:00 +0000 IMPLEMENTASI ALGORITMA NAÏVE BAYES MENGGUNAKAN ISEAR UNTUK KLASIFIKASI EMOSI LIRIK LAGU BERBAHASA INGGRIS https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20539 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }em.ctl { font-family: "Times New Roman", serif; font-style: normal; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in; line-height: 95%;"><span style="font-size: small;"><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Lirik lagu merupakan</span></span></span><span style="font-size: xx-small;"><em><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span style="background: #ffffff;"> </span></span></span></span></em></span><em class="western"><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span style="background: #ffffff;">suatu ungkapan </span></span></span></span></em><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><span style="background: #ffffff;">perasaan seseorang terhadap sesuatu hal yang sudah dilihat, didengar maupun dialaminya</span></span></span></span><span style="color: #000000;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> sehingga</span></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> tidak jarang emosi menjadi salah satu kriteria </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>user </em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">dalam melakukan pencarian. Pencarian lirik melekat pada kategori yang tidak hanya terbatas berdasarkan </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>genre</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> atau judul lagu, namun juga melalui emosi dari lirik lagu yang diungkapkan. Agar dapat mencapai tujuan tersebut, diperlukan suatu sistem pengkategori yang mengenali lirik lagu secara otomatis dengan salah satu metode klasifikasi yaitu Naïve Bayes. Faktor yang mendorong tingginya tingkat akurasi bukan hanya terletak pada metode klasifikasi saja, namun proses sebelum menuju tahap klasifikasi juga berpengaruh pada hasil yang didapatkan. Maka dari itu, penulis melakukan penelitian melalui beberapa tahap yaitu </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>preprocessing </em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">berupa </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>tokenisasi</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">, </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>stopword</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> dan </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>stemming, </em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">kemudian </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>feature selection</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> yang digunakan adalah TF-IDF dengan bantuan ISEAR karena mengandung 7 emosi dasar. Dari ketujuh emosi dasar tersebut, tiga diantaranya merupkan emosi yang akan digunakan dalam penelitian ini yaitu </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>anger, sadness</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> dan </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>joy</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">. Hasil dari penelitian ini menunjukkan dengan menggunakan ISEAR akurasi tertinggi terdapat pada </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>feature set </em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">60% dan 100% yaitu sebesar 82,2%. Perbedaan signifikan dihasilkan pada penggunaan ISEAR dengan akurasi rata-rata keseluruhan porsi </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>featureset </em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">sebesar 77% sedangkan tanpa menggunakan ISEAR rata-rata akurasi sebesar 53%. Dokumen paling relevan untuk pengujian menggunakan ISEAR terdapat pada kategori </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>angry</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> dengan rata-rata </span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"><em>f-measure</em></span></span><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;"> sebesar 0.7267.</span></span></span></p> Laksmita Widya Astuti, Antonius Rachmat C., Yuan Lukito Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20539 Mon, 01 May 2017 00:00:00 +0000 ANALISIS FAKTOR-FAKTOR YANG MEMPENGARUHI ADOPSI APLIKASI UBER SEBAGAI PENYEDIA JASA TRANSPORTASI DI SURABAYA https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20537 <!-- p { margin-bottom: 0.17in; direction: ltr; color: rgb(0, 0, 0); text-align: justify; }p.western { font-family: "Times New Roman", serif; font-size: 10pt; }p.cjk { font-family: "Times New Roman", serif; font-size: 10pt; }p.ctl { font-family: "Times New Roman", serif; font-size: 12pt; }a:visited { color: rgb(128, 0, 128); }a.western:visited { }a.cjk:visited { }a.ctl:visited { }a:link { color: rgb(0, 0, 255); } --> <p class="western" style="margin-left: 0.39in; margin-right: 0.39in; margin-bottom: 0in; line-height: 95%;"><span style="font-size: small;"><span style="font-size: x-small;"><span style="letter-spacing: -0.4pt;">Seiring berjalannya waktu, Teknologi Informasi dan Komunikasi (TIK) di dunia ini semakin berkembang dengan pesat. Permintaan masyarakat akan kebutuhan jasa transportasi semakin tinggi. Kemajuan internet dan canggihnya telepon genggam semakin lama semakin canggih, yang membuat lebih nyaman dan efisiensi untuk memanjakan masyarakat. Dari fenomena tersebut lahirlah Uber. Penelitian ini menggunakan teori Technology Acceptance Model (TAM) dengan populasi user Uber Kota Surabaya. Penelitian ini bertujuan untuk mengetahui faktor-faktor yang mempengaruhi adopsi aplikasi Uber sebagai penyedia jasa Transportasi di Surabaya. Hasil yang diperoleh setelah di analisis oleh peneliti adalah kepercayaan pengguna dalam mengadopsi aplikasi Uber yang sangat berpengaruh signifikan terhadap keinginan seseorang untuk menggunakan aplikasi Uber.</span></span></span></p> Edwin Hendrani, Rinabi Tanamal Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/20537 Mon, 01 May 2017 00:00:00 +0000 IOS APPLICATION FOR FINDING HALAL FOOD, MOSQUE, QIBLA DIRECTION AND PRAYER TIME https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19490 Muslim sometimes has trouble when they travel to a new place for find where the location of the halal food and mosque near their location is. Other things that Muslim will have difficulty when they travel in to a new place are find the Qibla direction, pray time in local time and the mosque location near their location. From that problem MLH (Muslim Little Helper) want to help them to solve their problem. The process is carried out as follows: The app get the user location, send the location to the YELP API server and muslimshalat.com API to get the location of halal food, and mosque (using YELP) and for find the direction of Qibla and the prayer schedule (by using muslimshalat.com API). After the system get the data, then it will show on the Map (using apple map inside the app) and put the data as marker. For the Qibla direction and prayer time, it will show in arrow image and listview. This app will be use Swift for the development language. The test result shows that the YELP API can be use only in USA, and internet play as the main rule in this app, because to create connection to the server to pull the data, the system need internet to pass all the data to server. Febria Roosita Dwi Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19490 Mon, 01 Feb 2016 00:00:00 +0000 THE CPA QUALIFICATION METHOD BASED ON THE GAUSSIAN CURVE FITTING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19489 The Correlation Power Analysis (CPA) attack is an attack on cryptographic devices, especially smart cards. The results of the attack are correlation traces. Based on the correlation traces, an evaluation is done to observe whether significant peaks appear in the traces or not. The evaluation is done manually, by experts. If significant peaks appear then the smart card is not considered secure since it is assumed that the secret key is revealed. We develop a method that objectively detects peaks and decides which peak is significant. We conclude that using the Gaussian curve fitting method, the subjective qualification of the peak significance can be objectified. Thus, better decisions can be taken by security experts. We also conclude that the Gaussian curve fitting method is able to show the influence of peak sizes, especially the width and height, to a significance of a particular peak. M.T. Adithia Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19489 Mon, 01 Feb 2016 00:00:00 +0000 LOAD BALANCING DINAMIS MENGGUNAKAN ALGORITMA DYNAMIC DISTRIBUTION UPON DEMAND PADA SISTEM ENKRIPSI/DEKRIPSI DATA TERDISTRIBUSI https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19488 The diversity of capability of computers worker in distributed system influences resource allocation and completion time for each jobs on the system. This study aims to implement a dynamic load balancing technique using dynamic distribution upon demand (DDD) algorithm to optimize the resource allocation in distributed data encryption/decryption system. Evaluating was performed by comparing the proposed system with two other models that is a system without load balancing and with static load balancing method. Evaluation result showed that the resource allocation in the proposed system using DDD algorithm more optimized and at the decryption process of three and four characters with proper workload initialization values presented that the job completion time much faster than the two other systems. Lauw Reduardy I. Laulyta, Mohammad Fajar, Syamsul Bahri Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19488 Mon, 01 Feb 2016 00:00:00 +0000 PENGUKURAN TINGKAT MOTILITAS SPERMA BERDASARKAN LINEARITAS SPERMA MENGGUNAKAN METODE ADAPTIVE LOCAL THRESHOLD DAN ELLIPSE DETECTION https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19487 Technology that can be used toassist sperm examination is Computer-Aided Sperm Analysis (CASA). The problems with this technology are expensive and the methods are not open for public. A lot of researches have been done to have an altenative CASA’s method to examine sperm quality accurately, inexpensively, and fast. This research is focused on measuring the level of sperm motility. Visual observations of sperm motility greatly depend on each andrologists which are subjective and also the possibility of repetition for the examined sample does not exist. Moreover, visual observation cannot provide precise values for parameters that affect the sperm motion patterns which are Velocity Straight Line, Velocity Curvilinear Line, and Linearity. Focus of this research is to create an application using sperm detection method, Local Adaptive Threshold and Ellipse Detection to measure sperm linearity to determine the level of sperm motility based on the WHO standard. Experiment produces result with the smallest difference 5.7333% and the biggest difference 10.4667% compared to the result of visual analysis by andrologist. Priyanto Hidayatullah, M. Nuriyadi, Iwan Awaludin, Reyhan Damar Kusumo Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19487 Mon, 01 Feb 2016 00:00:00 +0000 REKAYASA PERANGKAT LUNAK DETEKSI DINI KECENDERUNGAN GANGGUAN KESEHATAN MASYARAKAT TERTINGGAL DAN PESISIR DENGAN BAYESIAN NETWORK https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19486 This study was conducted to see the trend of diseases caused by unhealthy lifestyles on disadvantaged communities and coastal villages around Gresik and Tuban using hybrid algorithms through the construction of the structure of Bayesian Network. The problem to be solved in this study is no system that can detect a relationship between unhealthy behavior that caused the disease. Model of this structure has never been applied directly in the field to detect a causal events for example, if a behavior is unhealthy will arise disease. Application of this model needs to be done with a field study to determine and prove the actual benefits of the concept of a hybrid construction of Bayesian network structure. The purpose of this research is to produce a software model capable of early detection of disease risk propensity underdeveloped rural and coastal communities who have unhealthy lifestyles in the form of construction of the structure and generates a probability value with a tendency disease. The comparison between the structure of the origin of the structure of the trial results indicate the level of suitability for complete test data difference of 10% to the original structure, and suitability for the test data is incomplete for more than 20% depending on the amount of his missing value. The validity of that smoke will have the tendency has tuberculosis disease, bronchitis or Lung Cancer through the test system is 80% to 90%. Ilham Ilham Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19486 Mon, 01 Feb 2016 00:00:00 +0000 AUDIT AWAL SISTEM INFORMASI PADA PT. X BERDASARKAN STANDAR CONTROL OBJECTIVES FOR INFORMATION AND RELATED TECHNOLOGY (COBIT 4.1) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19485 PT. X is a company engaged in the field of iron and steel construction, located in Surabaya. Not easy for a large company with business processes that are also wide enough to carry out all processes in the company by way of the manual. This is because in the era of globalization, companies must be able to address the issues and changes that occur quickly and on target. Therefore, companies urgently need an integrated application. However, the factor that must be considered not only focuses on the acquisition of application systems needed by the company alone. But companies also need to focus on maintaining the quality of the application system. Because the application system useful to support and enhance the company's management in order to improve company performance and effectiveness in delivering services to the public. Therefore, the researcher wants to conduct the audit planning of application system for PT. X with analysis on the condition of IT at PT. X to determine the COBIT domains that need to be audited. Cindy Monica, Leo Willyanto Santoso, Yulia Yulia Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19485 Mon, 01 Feb 2016 00:00:00 +0000 PEMBUATAN APLIKASI AUDIENCE RESPONSE SYSTEM BERBASIS WEB DAN ANDROID https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19484 Audience Response Systems are widely used in various events as a media to gather information, to collect data, and to know the opinions of the general public towards particular issues, topics, news. Audience Response System can also be used to find out the client or customer satisfaction to the quality of products or services. Unfortunately most of the audience response systems that exist today are in the form of a physical (or remote) device which is severely limited in use. Along with the development of technology, almost all people have a smartphone to support their daily activities. The physical remote device called a clicker can be replaced with an application or program that can be installed on smartphones, while the polls are created through the website. In this research, the Audience response system was built using Node.js, PhoneGap platform, and the WebSocket Socket.IO as Javascript library to support bi-directional data communications. Based on testing result, this application can run properly all the functionalities that have been mentioned such as login to the system, create a poll, join a poll, and give a vote. The realiability of the system is 93%.. Albert Leonardo Pisa, Henry Novianus Palit, Justinus Andjarwirawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19484 Mon, 01 Feb 2016 00:00:00 +0000 PEMAHAMAN TEORI DATA WAREHOUSE BAGI MAHASISWA TAHUN AWAL JENJANG STRATA SATU BIDANG ILMU KOMPUTER https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19483 As a Computer scientist, a computer science students should have understanding about database theory as a concept of data maintenance. Database will be needed in every single human real life computer implementation such as information systems, information technology, internet, games, artificial intelligence, robot and so on. Inevitably, the right data handling and managament will produce excellent technology implementation. Data warehouse as one of the specialization subject which is offered in computer science study program final semester, provide challenge for computer science students.A survey was conducted on 18 students of early year of computer science study program at Surya university and giving hypothesis that for those students who ever heard of a data warehouse would be interested to learn data warehouse and on other hand, students who had never heard of the data warehouse will not be interested to learn data warehouse. Therefore, it is important that delivery of the Data warehouse subject material should be understood by lecturers, so that students can well understoodwith the data warehouse. Harco Leslie Hendric Spits Warnars, Epafras Suria, Darren Kent Jeremy Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19483 Mon, 01 Feb 2016 00:00:00 +0000 APLIKASI SURABAYA HERITAGE BERBASIS WEBSITE https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19482 Utilization of communication and computer technology has spread into various fields. Begin from the world of entertainment, education, business, health, life-style, and also the tourist field. Nowadays, still lack of the information related to the city of Surabaya as historical information, information about tourist sites, and others. This research conduct to develop an application to explore the history of the city of Surabaya as historic sites, tourist sites, museums, and the event agenda in town. With this application, the user is expected to be able to learn about the history of the city of Surabaya in the interesting form by combining text, picture, sound, and Google map facilities, as well as well as the promotion of tourism and events agenda are hosted in the city of Surabaya. Surabaya Heritage Applications created on a web-based application that is intended for public to know better about the history, tourism objects, as well as the event agenda in the city of Surabaya. Based from the testing results, the application was able to perform functions such as pre-planned. Meanwhile, testing by sampling questionnaires to the user produce that the application is attracting interest from users by 85%. It can be concluded that the applications made quite meet the target research. Andreas Handojo, Resmana Lim, Robby Christian, Robert Gosal, Yulius Bastion Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19482 Mon, 01 Feb 2016 00:00:00 +0000 KEAMANAN CITRA DENGAN WATERMARKING MENGGUNAKAN PENGEMBANGAN ALGORITMA LEAST SIGNIFICANT BIT https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19481 Image security is a process to save digital. One method of securing image digital is watermarking using Least Significant Bit algorithm. Main concept of image security using LSB algorithm is to replace bit value of image at specific location so that created pattern. The pattern result of replacing the bit value of image is called by watermark. Giving watermark at image digital using LSB algorithm has simple concept so that the information which is embedded will lost easily when attacked such as noise attack or compression. So need modification like development of LSB algorithm. This is done to decrease distortion of watermark information against those attacks. In this research is divided by 6 process which are color extraction of cover image, busy area search, watermark embed, count the accuracy of watermark embed, watermark extraction, and count the accuracy of watermark extraction. Color extraction of cover image is process to get blue color component from cover image. Watermark information will embed at busy area by search the area which has the greatest number of unsure from cover image. Then watermark image is embedded into cover image so that produce watermarked image using some development of LSB algorithm and search the accuracy by count the Peak Signal to Noise Ratio value. Before the watermarked image is extracted, need to test by giving noise and doing compression into jpg format. The accuracy of extraction result is searched by count the Bit Error Rate value. Kurniawan Kurniawan, Indah Agustien Siradjuddin, Arif Muntasa Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19481 Mon, 01 Feb 2016 00:00:00 +0000 SEGMENTASI OBYEK PADA CITRA DIGITAL MENGGUNAKAN METODE OTSU THRESHOLDING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19480 Digital image has size and object in the form of foreground and background. To separate it, it is necessary to be conducted the image segmentation process. Otsu thresholding method is one of image segmentation method. In this research is divided into five processes, which are input image, pre-processing, segmentation, cleaning, and accuracy calculation. First process was input color images which consists of multiple objects. Second process was conversion from color image to grayscale image. Third process was automatically calculated threshold value using Otsu thresholding method, followed by binary image transformation. The fourth process, the result of third process is changed into negative image as the segmentation results, noise removal with a threshold value of 150, and morphology. The last accuracy calculation is conducted to measure proposed segmentation method performance. The experimental result have been compared to the image of Ground Truth as the direct user observation to calculate accuracy. To examine the proposed method, Weizmann Segmentation Database is used as data set. It conconsist of 30 color images. The experimental results show that 93.33% accuracy were achieved. Slamet Imam Syafi’i, Rima Tri Wahyuningrum, Arif Muntasa Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19480 Mon, 01 Feb 2016 00:00:00 +0000 PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19147 <em>The rapid</em><em> development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.</em> Lanny Sutanto, Gregorius Satia Budhi, Leo Willyanto Santoso Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19147 Thu, 01 Jan 2015 00:00:00 +0000 SISTEM DETEKSI WAJAH PADA OPEN SOURCE PHYSICAL COMPUTING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19146 <em>Face detection is one of the interesting research area. Majority of this research implemented on a computer. Development of face detection on a computer requires a significant investment costs. In addition to having to spend the cost of procurement of computers, is also required for operational cost such as electricity use, because the computer requires large power/watt.This research is proposed to build a face detection system using Arduino. The system will be autonomous, in other word the role of computer will be replaced by Arduino. Arduino is used is Arduino Mega 2560 with specifications microcontroller AT MEGA 2560, a speed of 16 MHz, 256 KB flash memory, 8 KB SRAM, 4 KB EEPROM. So not all face detection algorithm can be implemented on the Arduino. The limitations of memory owned by the arduino will be resolved by applying the method of template matching using the facial features in the form of a template that is shaped like a mask. Detection rate achieved in this study is 80% - 100%. Where, in the Arduino's success in identifying the face are influenced by the distance between the camera with the human face and human movement.</em> Yupit Sudianto, Febriliyan Samopa Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19146 Thu, 01 Jan 2015 00:00:00 +0000 PREDIKSI CUACA MENGGUNAKAN METODE CASE BASED REASONING DAN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19145 <em>Weather is one of the nature elements that can influence decision making in human's life. Based on that issue, the author wants to make an application that is able to predict weather with good accuracy. The application is a weather forecasting system, using computer technology that implements expert system. The methods used are Adaptive Neuro Fuzzy Inference System (ANFIS) and Case Based Reasoning (CBR), and a combination of both methods will applied to the system. The system also has learning methods like Backpropagation Error (BPE) and Recursive Least Error (RLSE), to increase its accuracy. Clustering and data cleaning also done inside the system, as it needed by forecasting process to achieve a good result. K-Means is the clustering algorithm, while Box and Whisker Plot is the algorithm for data cleaning. The result from this project is to create a weather forecasting system with high accuracy.</em> Ria Chaniago, The Houw Liong, Ken Ratri Retno Wardani Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19145 Thu, 01 Jan 2015 00:00:00 +0000 APLIKASI VIRTUAL TOUR 3D PABRIK PT. X https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19144 <em>Company X is a reputable company that has more than 1000 people employees. One of the routines that performed by company X is orientation for new employees, and there is an event that invites them to visit the factory. The location of the main office and the factory is far, so this activity lacks time efficiency. This application aims to facilitate company X in conducting new employee orientation so that the location can be seen in the virtual world. The first thing in the process of making the application is visiting the factory to determine the shape and position of the object, so that the expected results are shown to resemble its original condition. 3d object and its texture are created using Blender application that can be imported into the made application. Collision feature aims to prevent users from penetrating the objects.The position, shape and location of objects contained in the application already resemble the original plant site. The main obstacle in making this application is the creation time, so the detailed map of the plant cannot be completed. The main building, the production building and the warehouse have been made, only small objects contained in the main building have not been contained.</em> Willy Nugraha Utomo, , Liliana, Kartika Gunadi Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19144 Thu, 01 Jan 2015 00:00:00 +0000 INTERPRETASI E-LEARNING SEBAGAI SUPPORT MEDIA UNTUK PEMBELAJARAN BAHASA MANDARIN BAGI SISWA SEKOLAH DASAR https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19143 <em>Nowadays, many schools are teaching the Chinese Language as curriculum, including elementary school. While the major problems in Chinese language learning is a form of pronunciation or intonation that much different from the Indonesia language who does not pay attention to the tone. In the Chinese language curriculum students are expected to be able to listen, to pronounce, to read and to write. Furthermore, learning arithmetic subject in Chinese language is quite difficult, because besides being able to pronounce the numbers correctly, the student should be able to count it. Hence the limitations of print media is not able to accommodate learning in listening, especially pronunciation or intonation correctly and also the writing. This led to the emergence of the spatian contiguity between text books with information on what is perceived by the learner. This study attempts to bridge these limitations by accommodating a media in web-based learning that also train the ability to listen and write, so that the spatial distance between the information in the book with a learner can be reduced . The results of this study are expected to provide a new alternative as a model for Chinese language learning, especially in Indonesia.</em> Yulius Hari, Darmanto Aspali, Budi Hermawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19143 Thu, 01 Jan 2015 00:00:00 +0000 IDENTIFIKASI FAKTOR PREDIKSI DIAGNOSIS TINGKAT KEGANASAN KANKER PAYUDARA METODE STEPWISE BINARY LOGISTIC REGRESSION https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19142 <p class="Isi"><em>The World Health Organization (WHO) reported that deaths caused by cancer in the world these last four years has increased significantly. The data also reflected in the increase in breast cancer cases. In Indonesia, two cases also the highest cases of adult female deaths. Based on Hospital Information System, the number of breast cancer patients either inpatient or outpatient care amounted to 28.7%. This fact revealed more than 40% of all cancers can be prevented with early detection cancer. Role of Information Technology can implemented by data mining techniques to shorten the diagnosing time, accuracy and selection of factors early detection of breast cancer. Stepwise binary logistic regression method has the advantage to add and subtract the independent variables in accordance with level of significance of the model. Based on the analysis of weighting method, the highest four variables that should be more aware is the area of cancer (area), fineness (smoothness), the number of dots (concave points) or the nucleus of cancer and grayish level of cancer (texture). So the accuracy and processing speed of diagnosis of the severity of breast cancer can be improved through this method.</em></p> Retno Aulia Vinarti, Wiwik Anggraeni Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19142 Thu, 01 Jan 2015 00:00:00 +0000 DATA MODEL CUSTOMIZATION FOR YII BASED ERP APPLICATION https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19141 <em>As UD. Logam Utama’s business grow, trigger the need of fast and accurate information in order to improve performance, efficiency, control and company’s values. The company needs a system that can integrate each functional area. ERP has centralized database and able to be configured, according to company’s business processes.First phase of application development is analysis and design the company’s business processes. The design phase produce a number of models that will be used to created application.The final result of application development is an ERP application that can be configured with the company’s business process. The ERP application consist of warehouse or production module, purchasing module, sales module, and accounting module.</em> Andre Leander, Adi Wibowo, Lily Puspa Dewi Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19141 Thu, 01 Jan 2015 00:00:00 +0000 SKIN SEGMENTATION AND SKULL SEGMENTATION FOR MEDICAL IMAGING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19140 In this paper aims we present tools for medical imaging applications to do skin and skull segmentation in a short time. The desired output for skin segmentation is a 3D visualization of the facial skin without any cavities or holes inside the head, while skull segmentation aims to create a 3D visualization of the skull bones. The algorithm used for skin segmentation is thresholding the image, extracting the largest connected component, and holefilling to fill the unnecessary holes. As for the skull segmentation, the process is done by removing the spines which is connected to the skull, and then extracting the largest connected component. Afterwards, mesh generation is done to produce the 3D objects from the processed images. This mesh generation process is done using the marching cubes algorithm. The testing results show that the skin and skull segmentation process will work well when there are no other objects that are connected to the skin or the skull. Skin segmentation process takes a significant amount of time, primarily caused by the holefilling process. Eric Yogi Tjandra, , Liliana, Leow Wee Kheng Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19140 Thu, 01 Jan 2015 00:00:00 +0000 SETTING UP AN INDUSTRIAL CONTROL SYSTEMS LABORATORY https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19139 With the evolution of Industrial Control Systems, many solutions from vendors are offered for industries. But sadly, most of those solutions are close-sourced, delivering lack of support for third parties who aim to develop Industrial Control Systems further. A start-up company named SecurityMatters needs an industrial instrument to simulate industrial environment to have a better idea how a particular protocol works. The application made in this project was developed using Java programming language to have compatibilities across platforms. An Object-Oriented-Programming and Model-View-Controller pattern are used as well to ensure maintainability. This application can be used to demonstrate capabilities of Modbus protocol and test industrial devices for vulnerabilities. Haryanto Natalius Liuwan, Casper Schellekens, Daniel Trivellato Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19139 Thu, 01 Jan 2015 00:00:00 +0000 ANALISIS STRATEGI CUSTOMER RELATIONSHIP MANAGEMENT DI PT. XYZ https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18988 <em>PT. XYZ is a company that prioritizes loyal customers. However, in its operation, PT. XYZ still has no marketing management that can support the customer loyalty, especially the electronic system ones. It can be seen when this company makes an event. The selection of the customers who can participate is done manually. In addition, there is still no system that handles the complaints from customers. Moreover, the product offering for loyal customer still has no clear system, only based on the knowledge and experience coming from sales force. On the other hand, the technology nowadays is already very developed, making it possible to make it systematic and result in high customer loyalty. The analysis results are CRM strategies, especially electronic-based (e-CRM) strategies to keep the customers loyalty and to attract new customers.</em> Dion Christian Halim, Adi Wibowo, Anita Nathania Purbowo Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18988 Thu, 01 May 2014 00:00:00 +0000 KAJIAN INVESTASI SISTEM INFORMASI BERDASARKAN DOMAIN BISNIS PADA UNIVERSITAS X https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18994 <p><em>Appropriate investment on information technology is needed t</em><em>o obtain the information technology systems that are reliable. University ' X ' has decided to do technology investments by developing academic information systems to support business processes. It is necessary to analyze the advantages and disadvantages of the systems and technology investments, and assess whether the investment has been supporting the organization's business processes . In addition, knowing the economic value of investments/ IT and ROI calculation is crucial . The purpose of the study is to analyze and assess the extent to which the success of information systems investments made ​​by the company by using a business domain analysis method on Information Economics (IE). The method used was the literature research, surveys, interviews, questionnaires, documentation studies and methods of analysis. At the end of the study, </em><em>it </em><em>has successfully made ​​the investment analysis of the University Academic Information Systems, a ROI calculation and IE Score as well as tools for storing project data and calculation results and ROI Score</em></p> Leo Willyanto Santoso, Yulia Yulia, Aldy Wirawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18994 Thu, 01 May 2014 00:00:00 +0000 KLASTERISASI DAN ANALISIS TRAFIK INTERNET MENGGUNAKAN FUZZY C MEAN DENGAN EKSTRAKSI FITUR DATA https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18993 <em>Internet facilities is one important part of the infrastructure of the campus at this time. Internet facility is a part of teaching and learning activities. Important part of the internet facility is the internet bandwidth, which is often deemed less bandwidth for certain majors at certain hours of lecture hours especially active. To overcome this there needs to be an analysis and clustering of the internet traffic at each point where the distribution of bandwidth is done so that in the end can provide information that can support decision granting bandwidth at each point there. One algorithm for clustering algorithms used are Fuzzy C-Mean, in which the clustering process before the beginning of the internet bandwidth usage data that exists in one period will be collected to be input to the Fuzzy C-Mean algorithm for the distribution of clusters on the use of existing bandwidth based applications that use the internet and network users. But the initial dataset that of the Fuzzy C Mean is not optimal, so we need some optimization dataset using feature extraction data so that the resulting clusters by Fuzzy C Mean algorithm has the accurate output. Results to be obtained from this study is the extraction of feature data that is most appropriate to perform clustering and analysis of Internet traffic based on user applications and the amount of capacity used by the user, which information the clustering results can be used to optimize internet bandwidth</em> Adi Suryaputra P., Febriliyan Samopa, Bekti Cahyo Hindayanto Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18993 Thu, 01 May 2014 00:00:00 +0000 PEMANFAATAN KURVA B-SPLINES UNTUK MEMPERHALUS VISUALISASI OBYEK MESH https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18992 <p>Ray tracing is one of the photorealistic rendering method. Ray tracing process takes a long time because of the calculation of lighting effects and optical effects caused by the material of the object. The length of rendering time increases with the increasing complexity of the shape of the object, such as a mesh object. To minimize processing time, generally done by reducing the complexity of the mesh, which reduces the number of face that forms a mesh object. How to reduce the number of face is to combine adjacent face to face. The downside of this method is that the object surface resulting display will look grainy/triangular - facet (checkered). The proposed method in this study aims to refine the visualization of objects that complexity is not high. Triangular surface mesh - terms appear due to the calculation of the same color for each face that form a mesh. If the face has a color gradation, the mesh will look smooth surface. To produce a color gradation on a broad face, normal calculation was used, ie in proportion adopting b - splines curve calculations. Testing is done by comparing the results of the use of normal B - splines to the simple method of subdivision (a method of face vast divide into several smaller face , so that the finer the mesh surface) with ray tracing rendering method. From the experimental results, it can be concluded that the results of ray tracing using b - splines normal when compared with the subdivision, the results are not too different. From the aspect of long rendering process, the more the number of face of a mesh, it also increase the effectiveness of rendering time process. However, the increase is not proportional to the increase in the number of mesh</p> Liliana Liliana, Gregorius Satia Budhi, Erick Leonardo, Evans Sanjaya Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18992 Thu, 01 May 2014 00:00:00 +0000 RANCANG BANGUN SALES FORCE AUTOMATION BERBASIS ANDROID DI PT. X https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18991 <em>The existing system of PT. X used to insert sales data manually. While in field, Sales Force noted of the order from dealer/customer manually, then later insert it into company’s database. The repetitive data copying causes bigger risk of mistyping and unreliability, because Sales Force travels for weeks. Other problem is that too many paper wasted on Sales Order and Invoice. Furthermore, PT. X needs comprehensive document support for Sales Force to fulfill customer’s need of information. In this research, Sales Force Automation (SFA) software that works online is chosen to meet the expectations. For document supply, due to the amount of documents needed, business taxonomy is made. Because the software is demanded to be easily accessed from wherever and whenever, Android is chosen as the hardware. The results obtained are various features for sales data management, such as view, add, edit, delete, and verification. The admin program supports the Sales Force work appraisal, notification, calculating Sales Force’s earnings per target ratio, Sales Force’s commission, et cetera. The SFA program supports the making of Sales Order, which is to be verified through SMS Gateway before inserted into company’s database, scheduling, et cetera.</em> Glenda Sogo Fanrensen, Yulia ,, Adi Wibowo Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18991 Thu, 01 May 2014 00:00:00 +0000 INTEGRASI PROSES BISNIS PADA PERUSAHAAN GALANGAN KAPAL PT “XYZ” SHIPYARD MENGGUNAKAN OPENERP https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18990 <em>In the shipyard industry, ships produced by order and adjust to consumer demand. Business processes that occur at the shipyard company in the shipbuilding process through several stages, ranging from design to delivery. Processes are still done manually so it may cause some difficulty and time. For the solution, system capability is needed to accelerate the business process. This research considers the OpenERP implementation at PT. XYZ as an application for integrating business processes. The results of this study indicate that OpenERP can answer the problems faced by the business process shipyard company. By using this ERP system offers company integrated system, but success depends on the ERP system implementation strategies are applied. Users can take benefit from the ERP system. The problems of this migration system are on tradition, culture, time and cost.</em> Lily Puspa Dewi, Yulius Hari S., Uce Indahyanti Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18990 Thu, 01 May 2014 00:00:00 +0000 EVALUASI KUALITAS WEBSITE DITINJAU DARI KEPUASAN USER DENGAN WEB ANALYTIC (STUDI KASUS PADA WEBSITE MAJALAH LIVINGETC INDONESIA) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18989 <p><em>The purpose of this study is to evaluate livingetcindonesia.com website, in order to improve user satisfaction as an online media and the extent to which the level of user satisfaction to the presentation of the website. The website criteria: perceived usefulness, ease of use, ease of finding information, and the design/layout of page is examined to determine the effect on user satisfaction. Analysis of site infrastructure has been meeting the needs of web and database servers, database structure, web analytics to determine the user visits the website and area/location where a user visiting the website. The survey results showed variable Perceived usefullness, Ease of use, Ease of finding information, and Design/Layout of page significant effect on user satisfaction</em>.</p> Kim Ming Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18989 Thu, 01 May 2014 00:00:00 +0000 SISTEM PENILAIAN ESAI OTOMATIS PADA E-LEARNING DENGAN ALGORITMA WINNOWING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19138 Exam essay is an evaluation of learning in the form of essay questions that have answers more variable than multiple choice questions. Variations of these answers provide its own difficulties for teachers in assessing response. Essay grading system is built to be one solution that can speed up and simplify the process of grading. Essay grading system in this study was done by measuring the similarity of responses of the students and teacher answer key. This research use winnowing algorithm. Winnowing algorithm is an algorithm for text similarity measure. Winnowing algorithm produces fingerprint of text that will represent the answer to the calculation of similarity with jaccard coeficient equation. Testing was conducted to determine the ability of the algorithm winnowing to provide an essay grading using n-gram and window value changes of the winnowing algorithm. The test results showed the use of the value of n-grams and window on the method of winnowing effect on fingerprint similarities were found. The more similarities fingerprint found, the value of the resulting system also be higher. The accuracy of the grading system showed better results on text answers that have the answer sentence structure same with key answer. Sariyanti Astutik, Andharini Dwi Cahyani, Mochammad Kautsar Sophan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/19138 Wed, 01 Jan 2014 00:00:00 +0000 PENGUKURAN KINERJA BEBERAPA SISTEM BASIS DATA RELASIONAL DENGAN KEMAMPUAN MENYIMPAN DATA BERFORMAT GML (GEOGRAPHY MARKUP LANGUAGE) YANG DAPAT DIGUNAKAN UNTUK MENDASARI APLIKASI-APLIKASI SISTEM INFORMASI GEOGRAFIS https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18257 If we want to represent spatial data to user using GIS (Geographical Information System) applications, we have 2 choices about the underlying database, that is general RDBMS (Relational Database Management System) for saving general spatial data (number, char, varchar, etc.), or saving spatial data in GML (Geography Markup Language) format. (GML is an another XML’s special vocabulary for spatial data.) If we choose GML for saving spatial data, we also have 2 choices, that is saving spatial data in XML Enabled Database (relational databases that can be use for saving XML data) or we can use Native XML Database (NXD), that is special databases that can be use for saving XML data. In this paper, we try to make performance comparison for several XML Enabled Database when we do GML’s CRUD (Create-Read-Update-Delete) operations to these databases. On the other side, we also want to see flexibility of XML Enabled Database from programmers view. Adi Nugroho, Sri Hartati Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18257 Sat, 01 Oct 2011 10:04:08 +0000 APLIKASI PERENCANAAN PEMBELIAN BARANG PADA PERUSAHAAN MANGGALA MOTOR DENGAN MENGGUNAKAN METODE ARIMA https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18256 Manggala Motor is a vehicles selling company. Occasionally the company lacks goods stock so that it can not obtain maximal profit because the customer needs can not be compiled by the company directly. The company needs an application that can forecast the motorcycles selling for next period, the application is expected to solve the company’s problem. The application is made by using ARIMA method (Autoregressive-Integrated-Moving Average). The result of this application is information about the selling forecasting in the next period. It is hoped that the selling forecasting can help the company to prepare the goods stock and fulfill the costumers demand. Yulia ., Tanti Octavia, Danny Wijaya Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18256 Sat, 01 Oct 2011 10:03:47 +0000 2 METODA SIGNIFIKAN PENDONGKRAK POSISI DOMAIN PADA MESIN PENCARI https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18255 Based on data from the Internet survey from independent institutions in the United States named pewinternet as on 6 August 2008 by Deborah Fallow stating that using search engine is the second largest activity of the Internet user after e-mail, so it can not be denied that the main key to the success of a website is how the website domain listed first on the search results of a search engine. One way to ensure this is to have a high SEO score. This makes the writer is interested to conduct experiments on the relationship SEO score and ranking of a domain in search engines. Experiments carried out in an e-business lecture class, where there are 5 groups with their own domain and then we optimized their SEO. The results obtained were surprising, it turns out that high SEO score does not guarantee a high ranking and the top of the list of a search engine. This journal will explain in detail how it is done. Ibnu Gunawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18255 Sat, 01 Oct 2011 10:03:28 +0000 SISTEM PERHITUNGAN HARGA POKOK PRODUKSI PADA PERUSAHAAN FARMASI PT. BALATIF DENGAN METODE PROCESS COSTING https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18254 Nowadays, PT. Balatif has the calculation system for production cost that can only include the calculation of cost of materials based on standard Bill of Material (BOM), while record of factory overhead cost, direct labor cost and report that relating to the calculation of Cost of Goods Manufactured of product still cannot be handled by the system. So that the current costs that really occurred in the production process will be difficult to trace and the production cost not based on reality process. Based on that problem, this research design a system to calculate production cost that can handle that problem. This application used Microsoft Visual Studio .Net 2005 as the programming tool and Oracle 10g as the database. Results that obtained from the application that have been made are raw material usage can be saved based on BOM or additional, machine usage, operator usage, and so on associated with the production process. In addition, the application that has been made can be used to allocate the costs that occur during the production process and to generate reports related to the calculation of Cost of Goods Manufactured of a product automatically. Andreas Handojo, Robby Adrian Joesoef, Yulia . Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18254 Sat, 01 Oct 2011 10:03:08 +0000 APLIKASI BIBLE PADA MOBILE PHONE DENGAN MENGGUNAKAN JAVA MICRO EDITION (JAVA ME) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18253 The Bible is a guidebook for the Christian life, the development of mobile technology allows to create applications Bible on mobile phones. This research aims to develop applications of existing Bible by providing new features. These features include, that can display two types of the same Bible (New International Version and the King James Version), features of note to the bookmark application, clear visibility on the in-verse bookmarks, display, grouping the bookmarks and search results clustering words, the application daily devotional, and maps. Database Bible is a database used Go Bible, and the search string using the Turbo Boyer Moore. Tests on the application made on the Nokia N78, Sony Ericsson W910i, K800 as a sample. From the results of testing, applications have been made to run well on all three mobile phone. Alexander Setiawan, Agustinus Noertjahya, Eriek Tjung Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18253 Sat, 01 Oct 2011 10:02:46 +0000 APLIKASI PENULISAN NOTASI BALOK DARI FILE MIDI MONOPHONIC https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18252 Music is interested for many people, from different generations. Not only to be sung but also to be played. The most matter is midi music files downloaded from any website are not combined with their music sheet. This condition makes users have a difficulty in playing the song. Consider this problem, this apllication is developed to support user with partitur crated from midi music file. This application is designed to produce a music sheet aoutomatically in music notation. This application is created using Borland Delphi 7. This application receives monophonic midi music file as input. This application will read and processes the midi file be a music string, then the music string will be kept in a data structure. Output from this application is a music sheet from midi music file chosen by user. User also can save and print the music sheet. This application success to create the music sheet from midi music file, but it still has limitation, for example is drawing the rest symbol. If there are so many rest symbols, application will draw from the rest symbol whose biggest value. Liliana ., Sukanto Tedjokusuma, Richie Alamveta Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18252 Sat, 01 Oct 2011 10:02:28 +0000 BOUNDARY DETECTION ALGORITHMS IN WIRELESS SENSOR NETWORKS: A SURVEY https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18251 Wireless sensor networks (WSNs) comprise a large number of sensor nodes, which are spread out within a region and communicate using wireless links. In some WSN applications, recognizing boundary nodes is important for topology discovery, geographic routing and tracking. In this paper, we study the problem of recognizing the boundary nodes of a WSN. We firstly identify the factors that influence the design of algorithms for boundary detection. Then, we classify the existing work in boundary detection, which is vital for target tracking to detect when the targets enter or leave the sensor field. Lanny Sitanayah Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18251 Sat, 01 Oct 2011 10:02:06 +0000 DESAIN ETL DENGAN CONTOH KASUS PERGURUAN TINGGI https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18250 Data Warehouse for higher education as a paradigm for helping high management in order to make an effective and efficient strategic decisions based on reliable and trusted reports which is produced from Data Warehouse itself. Data Warehouse is not a software, hardware or tool but Data Warehouse is an environment where the transactional database is modelled in other view for decision making purposes. ETL (Extraction, Transformation and Loading) is a bridge to build Data Warehouse and transform data from transactional database. In every fact and dimension table will be inserted with fields which represent the construction merge loading as an ETL (Extraction, Transformation and Loading) extraction. ETL needs an ETL table and ETL process where ETL table as table connectivity between tables in OLTP database and tables in Data Warehouse and ETL process will transform data from table in OLTP database into Data Warehouse table based on ETL table. The extraction process will be run with a table database as differentiate ETL process and an ETL algorithm which will be run automatically in idle transactional process, along with daily transactional database backup when the information system are not used. Spits Warnars Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18250 Sat, 01 Oct 2011 10:01:45 +0000 PENGEMBANGAN EVALUASI PEMBELAJARAN BERBASIS MULIMEDIA DENGAN FLASH, PHP, DAN MYSQL https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18249 Computer-Based Testing (CBT) program was launched for years to give testtakers the options of taking computerized version of test. The application which genarate academic score is developed as a server-side with Adobe Flash. Flash is well known as a powerful and dynamic front-end for the Web. However, Flash is also great interface for server-side applications. PHP can launch server-side script using Flash as a front-end and pass variables back and forth between Flash and the PHP pages. Along with PHP, MySQL can be used to store data and later retrieve it. Using Flash as a front-end, data and variables are passed between the MySQL database, PHP, and Flash to enchance aplication's functionality in managing databases. Hadi Sutopo Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18249 Sat, 01 Oct 2011 10:01:22 +0000 KEYWORD AND IMAGE CONTENT FEATURES FOR IMAGE INDEXING AND RETRIEVAL WITHIN COMPRESSED DOMAIN https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18248 The central problem of most Content Based Image Retrieval approaches is poor quality in terms of sensitivity (recall) and specificity (precision). To overcome this problem, the semantic gap between high-level concepts and low-level features has been acknowledged. In this paper we introduce an approach to reduce the impact of the semantic gap by integrating high-level (semantic) and low-level features to improve the quality of Image Retrieval queries. Our experiments have been carried out by applying two hierarchical procedures. The first approach is called keyword-content, and the second content-keyword. Our proposed approaches show better results compared to a single method (keyword or content based) in term of recall and precision. The average precision has increased by up to 50%. Irianto ., Y. Suhendro Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18248 Sat, 01 Oct 2011 10:01:02 +0000 PENGGUNAAN ALGORITMA NEWTON – RAPHSON UNTUK MEMBUAT SOFTWARE PENENTUAN DOSIS OBAT https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18054 USCPACK Software from University of Carolina is one of the pioneers of computerized drug dosage system. This software uses Bayesian method. The algorithm that used in this software is known as NPEM (Non Parametric Expectation Maximization). After knowing how USCPACK work, then we made new software that has the same use like USCPACK but with new algorithm that different from NPEM. These paper will describe the how to make the software based on NPAG algorithm. Abstract in Bahasa Indonesia: Software USCPACK buatan University of Carolina merupakan salah satu pelopor dimungkinkannya penentuan dosis obat persatuan waktu tertentu untuk pasien secara umum menggunakan komputer. Software ini bekerja dengan menggunakan metode dasar Bayesian. Algoritma yang digunakan oleh software ini adalah NPEM (Non Parametric Expectation Maximization). Setelah mengetahui cara kerja dari USCPACK maka dibuatlah sebuah software pendosisan obat menggunakan algoritma non parametrik lain selain NPEM. Paper ini akan membahas pembuatan software pendosisan obat menggunakan algoritma newton – raphson dalam penentuan dosis obat terkomputerisasi. Kata kunci: Pendosisan terkomputerisasi, optimasi, Bayesian, NPEM, Newton Raphson, USCPACK Ibnu Gunawan Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18054 Thu, 02 Dec 2010 14:14:19 +0000 ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18053 ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of the research are that management practices are an important factor that influences the value from ICT, and that the more management practices organisations implement, the greater the business value from ICT. Further findings of this study deduced that organisations that are more ICT aware, gain greater business value from ICT, with value achievement from ICT largely within the organisation’s control. This paper concludes with recommendations for future research. K. Johnston, S. Parker, K.D. Tu, F. Mosoval Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18053 Thu, 02 Dec 2010 14:13:51 +0000 ALGORITMA RC4 DALAM PROTEKSI TRANSMISI DAN HASIL QUERY UNTUK ORDBMS POSTGRESQL https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18052 In this research will be worked through about how cryptography RC4's algorithm implementation in protection to query result and of query, security by encryption and descryption up to both is in network. Implementation of this research which is build software in client that function access databases that is placed by the side of server. Software that building to have facility for encryption and descryption query result and of query that is sent from client goes to server and. transmission query result and of query can secure its security. Well guaranted transmission security him of query result and of query can be told to succeed if success software can encryption query result and of query which transmission so that in the event of scanning to both, scanning will not understand data content. Conclusion of this research that is woke up software succeed encryption query and result of query which transmission between application of client and of server databases. Abstract in Bahasa Indonesia: Pada penelitian ini dibahas mengenai bagaimana mengimplementasikan algoritma kriptografi RC4 dalam proteksi terhadap query dan hasil query, pengamanan dilakukan dengan cara melakukan enkripsi dan dekripsi selama keduanya berada di dalam jaringan. Pengimplementasian dari penelitian ini yaitu membangun sebuah software yang akan diletakkan di sisi client yang berfungsi mengakses database yang diletakkan di sisi server. Software yang dibangun memiliki fasilitas untuk mengenkripsi dan mendektipsi query dan hasil query yang dikirimkan dari client ke server dan juga sebaliknya. Dengan demikian tramsmisi query dan hasil query dapat terjamin keamanannya.Terjaminnya keamanan transmisi query dan hasil query dapat dikatakan berhasil jika software berhasil mengenkripsi query dan hasil query yang ditransmisikan sehingga apabila terjadi penyadapan terhadap keduanya, penyadap tidak akan mengerti isi data tersebut. Kesimpulan dari penelitian ini yaitu software yang dibangun berhasil mengenkripsi query dan hasil query yang ditransmisikan antara aplikasi client dan server database. Kata kunci: enkripsi, transmisi, RC4, query, database Yuri Ariyanto Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18052 Thu, 02 Dec 2010 14:13:20 +0000 PEMBUATAN RENCANA KEAMANAN INFORMASI BERDASARKAN ANALISIS DAN MITIGASI RISIKO TEKNOLOGI INFORMASI https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18051 An information security plan consists of strategies and shared responsibility, the main aim is to reduce the risk of a potential threat to the company's operations. If the security plan is not based on the results of risk analysis, can cause weakness in the strategy to anticipate the threat of disruption and attacks on corporate assets. Weak strategy, caused by the process of identifying weaknesses and vulnerabilities of information technology is not done properly. Instead of the security plan should be based on the results of analysis and information technology risk mitigation, so that the security of the proposed strategy can effectively reduce the risks identified through risk analysis and mitigation. The process of risk analysis in addition to producing the identification of risk, also providing recommendations appropriate security controls with the risk would be reduced. The recommended security controls on risk analysis, will then be evaluated from the aspects of effectiveness and efficiency in reducing any risk, the risk mitigation process, so that this process will provide a strong foundation in information security plan to determine an overall, effective and efficient, since it is based with the impelementasinya priority. Sebuah rencana keamanan informasi terdiri atas strategi dan pembagian tanggungjawab, yang bertujuan utama untuk menurunkan risiko yang berpotensi menjadi ancaman terhadap operasional perusahaan. Jika penyusunan rencana keamanan tidak berdasarkan hasil analisis risiko, akan dapat menyebabkan lemahnya strategi dalam mengantisipasi ancaman gangguan dan serangan terhadap aset perusahaan. Lemahnya strategi tersebut, disebabkan oleh proses identifikasi kelemahan dan kerawanan teknologi informasi yang tidak dilakukan dengan baik. Sebaliknya dalam penyusunan rencana keamanan seharusnya didasari oleh hasil analisis dan mitigasi risiko teknologi informasi, agar strategi keamanan yang diusulkan dapat secara efektif menurunkan risiko yang telah diidentifikasi melalui analisis dan mitigasi risiko. Proses analisis risiko selain menghasilkan identifikasi risiko, juga memberikan rekomendasi kontrol keamanan yang sesuai dengan risiko yang akan diturunkan. Kontrol keamanan yang direkomendasikan pada analisis risiko, selanjutnya akan dinilai kembali dari aspek efektivitas dan efisiensi dalam menurunkan setiap risiko, pada proses mitigasi risiko, sehingga proses ini akan memberikan dasar yang kuat dalam menentukan rencana keamanan informasi yang menyeluruh, efektif dan efisien, karena didasarkan dengan prioritas implementasinya. Kata kunci: Analisis risiko, Mitigasi risiko, Rencana Keamanan Informasi Aan AlBone Copyright (c) https://ojs.petra.ac.id/ojsnew/index.php/inf/article/view/18051 Thu, 02 Dec 2010 14:12:55 +0000