Pub Date : 2023-08-30DOI: 10.24843/lkjiti.2023.v14.i01.p01
I Gusti Agung Indrawan, Putu Andy Novit Pranartha, I Wayan Agus Surya Darma, Ni Putu Sutramiani, I Putu Eka Giri Gunawan
The high fruit production during the harvest season is a challenge in the process of sorting fresh fruit and rotten fruit in plantations. Automatic fruit freshness classification based on deep learning can speed up the sorting process. However, building a model with high accuracy requires the right strategy based on the dataset's characteristics. This research aims to apply optimization strategies to deep learning models to improve model performance. The optimization strategy is implemented by optimizing the model using fine-tuning strategy by selecting the best parameters based on learning rate, optimizers, transfer learning, and data augmentation. The transfer learning process is applied based on the dataset's characteristics by training some parameters with a size of 30% and 60%, which were tested in four scenarios. The fine-tuning strategy is applied to three Deep Learning models, i.e., MobileNetv2, ResNet50, and InceptionResNetV2, which have various parameter sizes. Based on test results, fine-tuning strategy produces the best performance up to 100% with a learning rate of 0.01, the SGD optimizers on the InceptionResNetV2 model are trained on 60% of the parameters.
{"title":"Optimization Strategy on Deep Learning Model to Improve Fruit Freshness Recognition","authors":"I Gusti Agung Indrawan, Putu Andy Novit Pranartha, I Wayan Agus Surya Darma, Ni Putu Sutramiani, I Putu Eka Giri Gunawan","doi":"10.24843/lkjiti.2023.v14.i01.p01","DOIUrl":"https://doi.org/10.24843/lkjiti.2023.v14.i01.p01","url":null,"abstract":"The high fruit production during the harvest season is a challenge in the process of sorting fresh fruit and rotten fruit in plantations. Automatic fruit freshness classification based on deep learning can speed up the sorting process. However, building a model with high accuracy requires the right strategy based on the dataset's characteristics. This research aims to apply optimization strategies to deep learning models to improve model performance. The optimization strategy is implemented by optimizing the model using fine-tuning strategy by selecting the best parameters based on learning rate, optimizers, transfer learning, and data augmentation. The transfer learning process is applied based on the dataset's characteristics by training some parameters with a size of 30% and 60%, which were tested in four scenarios. The fine-tuning strategy is applied to three Deep Learning models, i.e., MobileNetv2, ResNet50, and InceptionResNetV2, which have various parameter sizes. Based on test results, fine-tuning strategy produces the best performance up to 100% with a learning rate of 0.01, the SGD optimizers on the InceptionResNetV2 model are trained on 60% of the parameters.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136242472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.V08.I02.P02
S. Susanto
{"title":"Implementasi Keamanan Data Menggunakan Algoritma Rivest Code 4 (RC4) Pada Sistem Informasi Inventory Stock Barang Pada Distributor PT.Wings Food","authors":"S. Susanto","doi":"10.24843/LKJITI.2017.V08.I02.P02","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I02.P02","url":null,"abstract":"","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"77"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I02.P02","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48867353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.V08.I02.P01
Aditya Bhaskara Gde Sang, Putu Wira Buana, I. Purnawan
{"title":"Permainan Edukasi Labirin Virtual Reality Dengan Metode Collision Detection Dan Stereoscopic","authors":"Aditya Bhaskara Gde Sang, Putu Wira Buana, I. Purnawan","doi":"10.24843/LKJITI.2017.V08.I02.P01","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I02.P01","url":null,"abstract":"","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"65"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I02.P01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47048962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.v08.i02.p03
Gede Anantaswarya Abhisena, I. M. Sukarsa, D. P. Githa
Database auditing can be an important component in database security and governance regulations. Database Administrator needs to be more alert in the methods used to maintain the corporate data, and standards and requirements available against available data. At high level, databases auditing are facility to search the usage of database authority and resources. When auditing is active, every database operation that audited generates an audit trails of the information changes made. Database synchronization is a form of replication, which is a process to convincing every copy of database comprise the same data. Database synchronization allows to utilized many purposes, one of which builds auditing that records every activities occur at database. The audit trails from the resulting of data operations allows DBAs (Database Administrators) maintained audit trails time to time, to perform an analysis of access patterns and modifications to data in DBMS (Database Management System).
{"title":"Implementasi Database Auditing dengan Memanfaatkan Sinkronisasi DBMS","authors":"Gede Anantaswarya Abhisena, I. M. Sukarsa, D. P. Githa","doi":"10.24843/LKJITI.2017.v08.i02.p03","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.v08.i02.p03","url":null,"abstract":"Database auditing can be an important component in database security and governance regulations. Database Administrator needs to be more alert in the methods used to maintain the corporate data, and standards and requirements available against available data. At high level, databases auditing are facility to search the usage of database authority and resources. When auditing is active, every database operation that audited generates an audit trails of the information changes made. Database synchronization is a form of replication, which is a process to convincing every copy of database comprise the same data. Database synchronization allows to utilized many purposes, one of which builds auditing that records every activities occur at database. The audit trails from the resulting of data operations allows DBAs (Database Administrators) maintained audit trails time to time, to perform an analysis of access patterns and modifications to data in DBMS (Database Management System).","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"89"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.v08.i02.p03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42785937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.v08.i02.p06
I. Joni, I. Permana
Community service activities is one activity that takes the role of Information Technology (IT). IT utilization minimize the possibility of the emergence of various problems in the activities. Documents such as decrees, letters of assignment, proposals and reports of activities is often inconsistent. In the evaluation of the activities also has many limitations. If the required information such as who the lecturer is involved in the activities, how much total cost for each activity or completely very hard to know. A system built to help manage community service activities (CS) both institutional and group of lecturers CS. Users can manage at the beginning of each submission period CS activity. When necessary administrative documents such as decree and Letter of Assignment, can be generated automatically from the system. The proposal documents, reports and documentation of evidence can be uploaded into the system in order to be archived digitally and structured. The system is expected to be a solution of the problems experienced. With the new system, human error can be minimized and management activities can be done more easily with the help of IT.
{"title":"Pengelolaan Kegiatan Pengabdian Masyarakat dengan Sistem Informasi Manajemen","authors":"I. Joni, I. Permana","doi":"10.24843/LKJITI.2017.v08.i02.p06","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.v08.i02.p06","url":null,"abstract":"Community service activities is one activity that takes the role of Information Technology (IT). IT utilization minimize the possibility of the emergence of various problems in the activities. Documents such as decrees, letters of assignment, proposals and reports of activities is often inconsistent. In the evaluation of the activities also has many limitations. If the required information such as who the lecturer is involved in the activities, how much total cost for each activity or completely very hard to know. A system built to help manage community service activities (CS) both institutional and group of lecturers CS. Users can manage at the beginning of each submission period CS activity. When necessary administrative documents such as decree and Letter of Assignment, can be generated automatically from the system. The proposal documents, reports and documentation of evidence can be uploaded into the system in order to be archived digitally and structured. The system is expected to be a solution of the problems experienced. With the new system, human error can be minimized and management activities can be done more easily with the help of IT.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"124"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.v08.i02.p06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44067884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.V08.I02.P05
Putu Satya Saputra, I. M. Sukarsa, Putu Agung Bayupati, Fakultas Teknik
Education is a means to advance human resources. Achieving educational progress requires a tool for managing data such as curriculum data, students and grades. This tool can be used to control student activities in school so that the results can be delivered immediately and the monitoring process can run effectively because of communication between the school and parents. Child Development Monitoring Information System at Cloud-Based Kindergarten School is a Web-based Software As A Services (SaaS) service. This information system created by using cloud technology provides facilities to perform the management of various academic data such as student data, values and so forth. A cloud-based academic information system service that can be relied on to operate online without servers and installations for every system in school. The use of cloud technology in making this application is expected to further simplify the process of academic data management and school data that is generally done conventionally. The results of research conducted by spreading the questionnaire using Likert scale calculations show more than 50% of users agree with the statement already made.
{"title":"Sistem Informasi Monitoring Perkembangan Anak di Sekolah Taman Kanak – kanak Berbasis Cloud","authors":"Putu Satya Saputra, I. M. Sukarsa, Putu Agung Bayupati, Fakultas Teknik","doi":"10.24843/LKJITI.2017.V08.I02.P05","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I02.P05","url":null,"abstract":"Education is a means to advance human resources. Achieving educational progress requires a tool for managing data such as curriculum data, students and grades. This tool can be used to control student activities in school so that the results can be delivered immediately and the monitoring process can run effectively because of communication between the school and parents. Child Development Monitoring Information System at Cloud-Based Kindergarten School is a Web-based Software As A Services (SaaS) service. This information system created by using cloud technology provides facilities to perform the management of various academic data such as student data, values and so forth. A cloud-based academic information system service that can be relied on to operate online without servers and installations for every system in school. The use of cloud technology in making this application is expected to further simplify the process of academic data management and school data that is generally done conventionally. The results of research conducted by spreading the questionnaire using Likert scale calculations show more than 50% of users agree with the statement already made.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"112"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I02.P05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45485204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-06DOI: 10.24843/LKJITI.2017.V08.I02.P04
Ni Kadek Ariasih, Manajemen Informatika
adalah model prototype dan berbasis Web PHP dan database MySQL. Abstract STMIK STIKOM Indonesia is one of the institutions in the field of computer-based education. In order to support the effectiveness of the implementation of teaching and learning activities that take place, it is need a service that support the availability of adequate class facilities and complaints services if there are constraints on facilities in the classroom. So far, the management of complaints complaints against classroom facilities or in the labarotorium which is handled by the Household Management Section is still on manua basis. In terms of record and handle complaints it is required information system which called STIKI Class Facilities E-Complaint. This system can assist the Household Management Section in monitoring complaints from the condition of existing room facilities if experiencing problems and also can improve the quality of service in handling complaints. The software development process model used is prototype and Web-based model with PHP and MySQL database.
adalah模型原型dan berbasis Web PHP dan数据库MySQLSTMIK STIKOM印度尼西亚是计算机教育领域的机构之一。为了支持教学活动的有效实施,需要一项服务来支持足够的课堂设施和投诉服务,如果教室里的设施受到限制的话。到目前为止,有关教室或实验室设施的投诉,仍以手工方式处理,由住户管理组处理。在投诉的记录和处理方面,需要一个名为STIKI类设施电子投诉的信息系统。该系统可协助住户管理科在现有客房设施出现问题时监测投诉情况,并可提高处理投诉的服务质素。采用的软件开发过程模型是基于PHP和MySQL数据库的原型模型和基于web的模型。
{"title":"Rancang Bangun STIKI Class Facilities E-Complaint","authors":"Ni Kadek Ariasih, Manajemen Informatika","doi":"10.24843/LKJITI.2017.V08.I02.P04","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I02.P04","url":null,"abstract":"adalah model prototype dan berbasis Web PHP dan database MySQL. Abstract STMIK STIKOM Indonesia is one of the institutions in the field of computer-based education. In order to support the effectiveness of the implementation of teaching and learning activities that take place, it is need a service that support the availability of adequate class facilities and complaints services if there are constraints on facilities in the classroom. So far, the management of complaints complaints against classroom facilities or in the labarotorium which is handled by the Household Management Section is still on manua basis. In terms of record and handle complaints it is required information system which called STIKI Class Facilities E-Complaint. This system can assist the Household Management Section in monitoring complaints from the condition of existing room facilities if experiencing problems and also can improve the quality of service in handling complaints. The software development process model used is prototype and Web-based model with PHP and MySQL database.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"101"},"PeriodicalIF":0.0,"publicationDate":"2017-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I02.P04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68899674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.24843/LKJITI.2017.V08.I02.P07
Mirqotussa’adah Mirqotussa’adah, M. Muslim, Endang Sugiharti, Budi Prasetiyo, S. Alimah
Pada bidang kesehatan, data mining dapat dimanfaatkan untuk memprediksi suatu penyakit dari data rekam medis pasien, diantaranya diabetes. Ada beberapa model data mining salah satunya klasifikasi. Di bidang klasifikasi, ada banyak cabang yang berkembang yaitu pohon keputusan (decision tree). Salah satu decision tree yang populer adalah C4.5. Dalam riset ini, data yang digunakan adalah pima indian diabetes dataset yang diambil dari UCI repository of machine learning. Pada dataset ini seluruh atributnya bertipe numerik yang bersifat continuous dan untuk menangani data continuous digunakan discretization. Akurasi sangat penting dalam pengklasifikasian, ensemble method adalah metode yang digunakan untuk meningkatkan akurasi algoritma klasifikasi dengan membangun beberapa classifier dari data training. Dari hasil penelitian, dengan menerapkan discretization dan teknik bagging untuk klasifikasi berbasis ensemble pada algoritma C4.5 dapat meningkatkan akurasi sebesar 6,26%. Dengan akurasi awal 68,61%, setelah diterapkan discretization dan teknik bagging menjadi 74,87%.
{"title":"Penerapan Dizcretization dan Teknik Bagging Untuk Meningkatkan Akurasi Klasifikasi Berbasis Ensemble pada Algoritma C4.5 dalam Mendiagnosa Diabetes","authors":"Mirqotussa’adah Mirqotussa’adah, M. Muslim, Endang Sugiharti, Budi Prasetiyo, S. Alimah","doi":"10.24843/LKJITI.2017.V08.I02.P07","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I02.P07","url":null,"abstract":"Pada bidang kesehatan, data mining dapat dimanfaatkan untuk memprediksi suatu penyakit dari data rekam medis pasien, diantaranya diabetes. Ada beberapa model data mining salah satunya klasifikasi. Di bidang klasifikasi, ada banyak cabang yang berkembang yaitu pohon keputusan (decision tree). Salah satu decision tree yang populer adalah C4.5. Dalam riset ini, data yang digunakan adalah pima indian diabetes dataset yang diambil dari UCI repository of machine learning. Pada dataset ini seluruh atributnya bertipe numerik yang bersifat continuous dan untuk menangani data continuous digunakan discretization. Akurasi sangat penting dalam pengklasifikasian, ensemble method adalah metode yang digunakan untuk meningkatkan akurasi algoritma klasifikasi dengan membangun beberapa classifier dari data training. Dari hasil penelitian, dengan menerapkan discretization dan teknik bagging untuk klasifikasi berbasis ensemble pada algoritma C4.5 dapat meningkatkan akurasi sebesar 6,26%. Dengan akurasi awal 68,61%, setelah diterapkan discretization dan teknik bagging menjadi 74,87%.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"135-143"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I02.P07","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45783418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-14DOI: 10.24843/LKJITI.2017.V08.I01.P01
D. Kristianto, C. Fatichah, B. Amaliah, K. Sambodho
The hassle of analytical and numerical solution for liquefaction modeling, repetitive laboratory testing and expensive field observations, have opened opportunities to develop simple, practical, inexpensive and valid prediction of wave-induced liquefaction. In this study, Artificial Neural Network (ANN) regression modeling is used to predict the depth of liquefaction. Despite of using Back Propagation (BP) to train ANN, a modified Genetic Algorithm (called as Wide GA, WGA) is used as ANN training method to improve ANN prediction accuracy and to overcome BP weaknesses such as premature convergence and local optimum. WGA also aim to avoid conventional GA weaknesses such as low population diversity and narrow search coverage. Key WGA operations are Wide Tournament Selection, Multi-Parent BLX-? Crossover, Aggregate Mate Pool Mutation and Direct Fresh Mutation-Crossover. ANN prediction accuracy measured by Median APE (MdAPE). Global optimum solution of WGA is best ANN connections weights configuration with smallest MdAPE.
{"title":"Prediction of Wave-induced Liquefaction using Artificial Neural Network and Wide Genetic Algorithm","authors":"D. Kristianto, C. Fatichah, B. Amaliah, K. Sambodho","doi":"10.24843/LKJITI.2017.V08.I01.P01","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.V08.I01.P01","url":null,"abstract":"The hassle of analytical and numerical solution for liquefaction modeling, repetitive laboratory testing and expensive field observations, have opened opportunities to develop simple, practical, inexpensive and valid prediction of wave-induced liquefaction. In this study, Artificial Neural Network (ANN) regression modeling is used to predict the depth of liquefaction. Despite of using Back Propagation (BP) to train ANN, a modified Genetic Algorithm (called as Wide GA, WGA) is used as ANN training method to improve ANN prediction accuracy and to overcome BP weaknesses such as premature convergence and local optimum. WGA also aim to avoid conventional GA weaknesses such as low population diversity and narrow search coverage. Key WGA operations are Wide Tournament Selection, Multi-Parent BLX-? Crossover, Aggregate Mate Pool Mutation and Direct Fresh Mutation-Crossover. ANN prediction accuracy measured by Median APE (MdAPE). Global optimum solution of WGA is best ANN connections weights configuration with smallest MdAPE.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.V08.I01.P01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43509681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-14DOI: 10.24843/LKJITI.2017.v08.i01.p05
Dandy Pramana Hostiadi, Ida Bagus Suradarma
Electronic mail is a communication model that are fundamental in the era of globalization. Proven on any form of registration data or information requires the presence of e-mail address(electronic mail). The use of e-mail itself cannot be separated from the abuse (such as stelling password and mail spoofing) from some parties so it needs security form in e-mail communication. Communication security on mail server such as ZIMBRA mail server has been well-implemented, such as the use of ssl certificate. But the security is still standard. So, when user and password has been found out by third party, e-mail content will be read easily (in cryptography technique it is called plaintext reading). On research that was conducted with pretty good privacy (PGP) method email communication security was focused on the e-mail content by encrypting mail text along with the attachment file. In a study conducted, using the mail engine Zimbra mail server. Result of research shows that PGP security is able to secure e-mail content whether the text or the attachment, showing difference of attachment file size is bigger on PGP using and change mail header from the standard mail.
{"title":"Implementasi Pengamanan PGP Pada Platform Zimbra Mail Server","authors":"Dandy Pramana Hostiadi, Ida Bagus Suradarma","doi":"10.24843/LKJITI.2017.v08.i01.p05","DOIUrl":"https://doi.org/10.24843/LKJITI.2017.v08.i01.p05","url":null,"abstract":"Electronic mail is a communication model that are fundamental in the era of globalization. Proven on any form of registration data or information requires the presence of e-mail address(electronic mail). The use of e-mail itself cannot be separated from the abuse (such as stelling password and mail spoofing) from some parties so it needs security form in e-mail communication. Communication security on mail server such as ZIMBRA mail server has been well-implemented, such as the use of ssl certificate. But the security is still standard. So, when user and password has been found out by third party, e-mail content will be read easily (in cryptography technique it is called plaintext reading). On research that was conducted with pretty good privacy (PGP) method email communication security was focused on the e-mail content by encrypting mail text along with the attachment file. In a study conducted, using the mail engine Zimbra mail server. Result of research shows that PGP security is able to secure e-mail content whether the text or the attachment, showing difference of attachment file size is bigger on PGP using and change mail header from the standard mail.","PeriodicalId":31196,"journal":{"name":"Lontar Komputer","volume":"1 1","pages":"41-52"},"PeriodicalIF":0.0,"publicationDate":"2017-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24843/LKJITI.2017.v08.i01.p05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48817518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}