cover
Filter by Year
semanTIK
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Articles
159
Articles
PEMBANGUNAN APLIKASI KEAMANAN PESAN CHATTING DENGAN MENERAPKAN ALGORITMA TINY ENCRYPTION ALGORITHM (TEA) BERBASIS CLIENT SERVER

Asprina, Tasya, Yamin, Muh., Sutardi, Sutardi

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The development of information technology now allows one to exchange information through a computer network. One that is used in exchanging information is a chat application. The chat application is used to chat two people or more in realtime via the internet network. In exchanging information, a data security is needed, one of the data security that is done is encryption on the message. Encryption is done to change from the original message to a message that is not easy to read (ciphertext). Then a TEA (Tiny Encryption Algorithm) algorithm is applied.The results obtained in this study that the TEA algorithm can be implemented on chat messages for encryption and decryption of text messages. The process of testing encryption and decryption on messages is fast. Can be seen from the test table the application that encrypts text messages of various sizes using the same key produces a difference in the encryption and decryption time is not too large, with only a few seconds difference.Keywords—Chatting, Cryptography, TEA, Encryption, DecryptionDOI : 10.5281/zenodo.1468233

DESAIN DAN IMPLEMENTASI VIRTUALISASI BERBASIS DOCKER UNTUK DEPLOYMENT APLKASI WEB

Apridayanti, Sulastri, Isnawaty, Isnawaty, Saputra, Rizal Adi

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Building a program through virtualization, developers usually run virtualization on the server so that the process of making the program can run on various platforms and hardware configurations. The problem with virtualization is the need to set up a complete operating system, including the various applications that the system brings. You can imagine with the number of virtualization that runs on a server will burden the system.Docker is one platform built on container technology. Docker is an open-source project that provides an open platform for developers and sysadmins to build, package and run applications anywhere as a lightweight container.The results obtained in research conducted is a web application wherein implementing server virtualization techniques using Docker for application deployment is successful. The application used is a trading application that is stored on Docker Server where both Client successfully using the application on different platforms that are Windows 7 and Windows 8 without experiencing any obstacles at all.Keywords— Virtualization, Docker, Web Application

ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK

Zamalia, Wa Ode, Aksara, LM. Fid, Yamin, Muh.

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to apply to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.Keywords— Layer 2 Tunneling Protocol, Point to Point Tunneling Protocol, Quality of Service (QoS), Secure Socket Tunneling Protocol, Virtual Private Network DOI : 10.5281/zenodo.1444898

ANALISIS PERBANDINGAN TOOLKIT RECUVA DATA RECOVERY DAN STELLAR PHOENIX WINDOWS DATA RECOVERY UNTUK DIGITAL FORENSIK

Handrizal, Handrizal

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

This paper presents an analysis with two digital forensic toolkits for deleted data scenarios. The used toolkit is Recuva Data Recovery and Stellar Phoenix Windows Data Recovery. They can recover data that is being and analyzed in a USB flash drive. The results of the comparison that the two toolkits can work well regarding finding data that has been discarded or in recovering the deleted data.Keywords—Data, Recovery, Forensic, Recuva, Stellar DOI : 10.5281/zenodo.1438737

IMPLEMENTASI KEAMANAN SERVER PADA JARINGAN WIRELESS MENGGUNAKAN METODE INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) (STUDI KASUS : TECHNO’S STUDIO)

Husain, Muhammad Sadam, Aksara, LM Fid, Ransi, Natalis

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Technos Studio is a company engaged in technology and is a company that uses wireless technology as one of the important components in the activities of everyday employees. Therefore, server security issues on wireless networks become very important, because without any security support can lead to system failure and can be a gap of the occurrence of hacking.The IDPS method (Intrusion Detection & Prevention System) is used as an attack detection and prevention system by blocking Internet Protocol (IP) attackers. The results obtained from this research is the use of Snort and IPTables as a server security system on the wireless network successfully overcome the type of attack on ICMP ports, FTP, SSH, TELNET, and HTTP using various tools of attackers such as angry ip scanner, filezilla, putty, mozila firefox and zenmap.Keywords— Server, Wireless, Intrusion Detection & Prevention Sytem (IDPS), Snort, IPTables DOI : 10.5281/zenodo.1407864

RANCANG BANGUN APLIKASI PENDETEKSIAN KESAMAAN PADA DOKUMEN TEKS MENGGUNAKAN ALGORITMA ENHANCED CONFIX STRIPPING DAN ALGORITMA WINNOWING

Khidfi, Muhammad Nur, Isnawaty, Isnawaty, Sari, Jayanti Yusmah

semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

With the development of technology, the increase of acts of plagiarism in the world of education. Many students who did plagiarism in doing their task, thesis etc. Therefore, an application that can detect the similarity between text documents is required. This research used Enhanced Confix Stripping (ECS) Stemmer algorithm for text stemming process and Winnowing algorithm to calculate the similarity between documents. By specifying the gram and window values of the Winnowing algorithm, it made easier for the user to use the application without being confused to determine the value of the gram and the window to produce an accurate equality value. From the test results 5 pairs of chapters 1 thesis of students who categorized together produced a similarity score of about 45-20%.Keywords : Enhanced Confix Stripping (ECS) Stemmer, Winnowing, Similarity, Plagiarisme.DOI : 10.5281/zenodo.407866

IDENTIFIKASI LANDMARK ORBITAL CEPHALOMETRY MENGGUNAKAN METODE FUZZY C-MEANS CLUSTERING

Munandar, Hasnawati, Ningrum, Ika Purwanti, Sari, Jayanti Yusmah

semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Orthodontics is a branch of dentistry. In orthodontic treatment, several analyzes are needed, one of them is cephalometry analysis. Basically, cephalometry analysis is done manually, but this method requires a lot of time. In line with this, a computerized application is needed as a solution. In cephalometry analysis some landmarks are used as reference fields. Orbital is one of the landmarks that are difficult to identify. Orbital is located at the lowest point between the region of the eye cavity and the lower edge of the Orbital bone. One way to find Orbital landmarks is to segment the Orbital region. The segmentation aims to clearly separate the eye regions and Orbital bone in the cephalogram image. Fuzzy C-Means Clustering method is a segmentation method that can produce a clearer region partition. For this reason, the Fuzzy C-Means Clustering method is applied to get better segmentation results of the Orbital region so that the results of identification of the correct Orbital landmarks are obtained. Based on the results of testing on 90 image data provide an accuracy of 82.2% identification results with a cropping template size of 180 x 180 pixels.Keywords—Cephalometry Analysis, Fuzzy C-Means Clustering,  Landmark Cephalometry, Orbital  

IMPLEMENTASI PENGENALAN FINGER VEIN PADA SISTEM PEMBAYARAN MENGGUNAKAN METODE LLBPh

Hastuti, Dewi, Ningrum, Ika Purwanti, Sajiah, Adha Mashur, Sari, Jayanti Yusmah

semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Payment is one of the important activities that in the transaction process. Currently, technology that supports payment system is quite a lot, however in implementation technology used still has a various of a problem such as, pin code used can be stolen, duplicated, and didnt possibility someone can forge wt the pin code of the plastic card owned. One way that can be used to resolve this is identification by taking the unique characteristics of limb.Finger vein is one of the biometric images that can be used to recognize a person. Finger vein can be used as an effective, efficient, and economical tool of payment the role of plastic cards. In this research, the method used is Local Line Binary Pattern horizontal (LLBPh). This method has a good ability to recognize of patterns, can resolve the shading irregular image  and the image area that has a high saturation. Based on the experimental results that used, the LLBPh method produces an accuracy of 92.08 with the threshold value.Keywords—Finger Vein recognition, LLBPh, Payment

APLIKASI FORECASTING JUMLAH FREKUENSI PENUMPANG PESAWAT TERBANG LION AIR PADA BANDAR UDARA HALU OLEO DENGAN MENGGUNAKAN METODE LEAST SQUARE

Ruamiana, Waode Berlian, Nangi, Jumadil, Tajidun, LM

semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

As the era develops really quickly, the development of technology in transportation also changing rapidly. One of the most transport demands by the public for a long journey today is air transport. Along with the increase of population, the need for air transportation also increased.The airport Halu Oleo is one example of a company that offers its services in the field of aviation. Therefore, the forecast of the number of passengers have become important factors for the company Lion Air, because by knowing the predicted number of passengers in the future of Lion Air can prepare facilities in anticipation of rising passenger numbers.Least Square method (least squares method) or a simple regression analysis is an effective and simple approach to measure the average change in the dependent variable that is related to the increase in the number of units of one or more independent variables. The least squares method is used to determine the linear relationship of the best ways that minimize the number of errors squared data generated by mathematical functions. This method is most often used to predict Y, because the calculation more accurately.Keywords— Lion Air, Least Square method, Forecasting.

KAMUS PENYAKIT DAN TANAMAN OBAT MENGGUNAKAN ALGORITMA SEQUENTIAL SEARCH WITH SENTINEL BERBASIS ANDROID

Suprapti, Dewi Dessy, Isnawaty, Isnawaty, Nangi, Jumadil

semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Original Source | Check in Google Scholar |

Abstract

Various kinds of plants are all around us, and most of these plants can be used as medicinal plants. Most people would know that there are many plants that have benefits and efficacy as a healer of diseases. But, there are many people who don’t know how to make those plants so that they can be functioned as a medicinewhich can cure diseases. Traditional medicine whichmade of plants also can cure a variety of diseases, wether the mild diseases or even a disease that has entered the stages of malignancy.In this study, the searchin gsystem was performed using Sequential Search with Sentinel algorithm on 50 testing data. The keywords that used in the searching process to be compared one by one with the existing data in the database. If the data that searched is located in the original index (L [1..N]), then it means that the data exist (found). However, if the data searched is in the sentinel index (L [n + 1]), then it means the data does not exist (not found).The results of this study shows that the Sequential Search with Sentinel algorithm can be implemented in a dictionary of diseases and medicinal plants application. The system can serve a good result that match the searched data.Keywords—Sequential Search with Sentinel, Searching system, Dictionary of Medicinal Plants