Sutardi Sutardi
Jurusan Teknik Informatika, Fakultas Teknik, Universitas Halu Oleo, Kendari

Published : 18 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 18 Documents
Search

APLIKASI PENGAMANAN FILE BERTIPE *.PDF PADA VIDEO *.MP4 MENGGUNAKAN KRIPTOGRAFI VERNAM CIPHER DAN STEGANOGRAFI END of FILE Mulatifa Laliha; Sutardi Sutardi; Natalis Ransi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.051 KB) | DOI: 10.55679/semantik.v5i1.6203

Abstract

Security and confidentiality of messages in the communication process between the sender and receiver is an important thing that must be maintained so that the message would be difficult if not known by unauthorized parties. Cryptography Vernam Cipher is symmetric cryptography that used one time for a message and not reused. Steganography End of File (EoF) is one technique to insert data at the end of the file. Combine Vernam Cipher cryptography and EoF steganography on this research with a case study how the implementation of the security of *.pdf files on *.mp4 video. Based on the test results of *.pdf file encryption and steganography in video *.mp4 successfully performed on the size of small file size for use Vernam Cipher cryptography, plaintext length, and key length must be the same length, so that for large files will take a long time. The results of stegano show that the video files look like the original video can be viewed directly without that already is inserted in the video *.pdf, for EoF does not affect the quality of the video. It is concluded that the incorporation of Vernam Cipher Cryptography and EoF steganography successfully, where the process of implementing the algorithms when combined requires an average time of 65 seconds on the side Vernam Cipher cryptographic application due to the type of encryption key length is equal to the length of the plaintext.  Keywords—End of File, Cryptography,  Steganography, Vernam CipherDOI : 10.5281/zenodo.3253459
APLIKASI FORECASTING MENGENAI ANGKA KELAHIRAN DI KOTA KENDARI MENGGUNAKAN METODE REGRESI LINEAR BERGANDA (STUDI KASUS : DINAS KESEHATAN KOTA KENDARI) Nike Syafitri; Sutardi Sutardi; LM Tajidun
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (766.084 KB) | DOI: 10.55679/semantik.v4i1.4242

Abstract

Birth rate is a very useful indicator not only of health status but also of overall population status, and the economic conditions in which the population lives. Population density in Kendari city in 2015 reached 1,174 people / km2. Population density in 10 sub-districts is quite diverse with the highest population density located in Kadia with the lowest density of 6,180 people / km2 in Baruga of 472 people/ km2. The purpose of this application is to predict the birth rate in Kendari by using multiple linear regression method.The Multiple Linear Regression Method is the most appropriate approach to predict future birth rates. An analysis that has more than one independent variable is called multiple linear regression analysis. The result of this system in the form of forecasting applications that can predict the birth rate in every month from all sub-districts in the  Kendari and provide information about how strong the relationship between the factors that affect the birth rate.Keywords— Forecasting, Birth Rate, Multiple Linear Regression, Correlation DOI : 10.5281/zenodo.1402398
IMPLEMENTASI METODE ENKRIPSI ADVANCE VIGENERE CIPHER DALAM PENGAMANAN SISTEM TRANSAKSI PAYMENT POINT ONLINE BANK Muh Iskandar Z. A; Sutardi Sutardi; Yuwanda Purnamasari Pasrun
semanTIK Vol 3, No 2 (2017): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (232.381 KB) | DOI: 10.55679/semantik.v3i2.3758

Abstract

Advance vigenere cipher merupakan suatu modifikasi vigenere cipher yang memungkinkan metode enkripsi vigenere untuk tidak hanya mampu menyandikan karakter abjad, namun juga mampu menyandikan seluruh karakter yang ada termasuk angka dan simbol-simbol. Tujuan dari penelitian ini adalah membangun sistem transaksi Payment Point Online Bank (PPOB) yang aman dengan mengimplementasikan metode Advance Vigenere Cipher dalam pengamanan sistemnya.Dalam penelitian ini, sistem pengamanan transaksi PPOB dibagi menjadi dua tahapan utama yaitu tahapan enkripsi dan tahapan dekripsi. Data yang dienkripsi menggunakan metode Advance Vigenere Cipher merupakan detail data tagihan dari transaksi yang akan dilakukan. Hasil dari enkripsi menghasilkan ciphertext yang akan dikirimkan dan didekripsi oleh pihak penyedia layanan PPOB.Hasil dari penelitian ini menunjukkan karakteristik dari ciphertext yang dihasilkan sangat rumit, sehingga akan sulit bagi pihak luar untuk melakukan intervensi dan mengelola informasi yang dikirimkan dari pihak penyedia layanan PPOB kepada pengguna layanan PPOB.Kata Kunci—Enkripsi advance vigenere cipher, sistem transaksi Payment Point Online Bank  (PPOB)
APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN MAN IN THE MIDDLE ATTACK (MITM) DENGAN METODE SNIFFING Sri Wayun Wardani; Sutardi Sutardi; Statiswaty Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.237 KB) | DOI: 10.55679/semantik.v5i1.6207

Abstract

An increasing number of mobile phone users and the number of Short Message Service (SMS) delivery between users, securities SMS sending an issue that deserves to be noticed. SMS industry into one vulnerable point to attack a security threat. The security hole on SMS communication is a message sent will be stored in the Short Message Service Center (SMSC), so that in case of attack Man In The Middle (MITM) at the SMSC then sent messages to be read by those who tapped one of them is sniffing activity. So, we need a safeguard against the activity of the exchange of messages via SMS. One of them is by using cryptography. Cryptography is a technique to secure the message so that the message conveyed to arrive to the person intended, receives the message. Cryptography is composed of two main concepts that encryption and decryption. Encryption is used to process information becomes unrecognized and decryption is used to change the information that was not recognized into information that is recognizable as before encryption. By encrypting text, the level of information security of the message can be improved. Currently, the Triple-DES (Triple Data Encryption Standard) is a secure cryptography algorithm for encryption process is carried out in 3 stages but did not change the algorithms of DES in order to ensure the complexity of solving the results of Triple-DES encryption. Therefore, it can be prepared that, if the intruder was given a person or an attack using a sniffing methods, the received message by the perpetrators are not illegible.Keywords—Cryptography, Man In The Middle Attack, Sniffing, SMS, Triple-DES DOI : 10.5281/zenodo.3227231
APLIKASI ISTILAH AKUNTANSI SEBAGAI MEDIA PEMBELAJARAN BERBASIS ANDROID MENGGUNAKAN ALGORITMA REVERSE COLUSSI Annisyah Januarti; Sutardi Sutardi; Mutmainnah Muchtar
semanTIK Vol 3, No 2 (2017): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (472.321 KB) | DOI: 10.55679/semantik.v3i2.3653

Abstract

Akuntansi adalah proses dari transaksi yang dibuktikan dengan faktur, lalu dari transaksi dibuat jurnal, buku besar, neraca lajur, kemudian akan menghasilkan informasi dalam bentuk laporan keuangan yang digunakan pihak-pihak tertentu. Kamus akuntansi merupakan salah satu media pembelajaran yang sangat dibutuhkan dalam dunia pendidikan. Namun, seringkali ditemukan masalah waktu yang kurang efisien dan ukuran kamus yang biasannya besar dan berat untuk dibawa kemana-mana. Salah satu cara untuk mengatasi masalah ini adalah dengan membuat aplikasi istilah akuntansi berbasis android. Algoritma Reverse Colussi memiliki kinerja pencarian kata dimulai dari akhir pattern yang disesuaikan dengan sumber teks.Untuk mempermudah pengguna kamus dalam mencari istilah di bidang akuntansi, maka diperlukan integrasi dari sistem manual ke sistem otomatis dengan mengimplementasikan Algoritma Reverse Colussi. Algoritma Reverse Colussi memiliki kinerja pencarian kata dimulai dari pattern yang dicocokkan dengan sumber teks. Jika terjadi ketidakcocokkan pada pattern maka secara langsung akan dilakukan perpindahan posisi pengecekan. Hasil yang diperoleh dari penelitian ini adalah sebuah aplikasi istilah akuntansi berbasis android offline sangat efisien karena rata-rata waktu pencarian paling lambat kurang dari 2 detik, dan tepat dalam melakukan pencarian string, selama istilah yang dicari ada dalam database.Kata kunci—Android, Algoritma  Reverse  Colussi.
APLIKASI ENKRIPSI DAN DEKRIPSI DATA MENGGUNAKAN TINY ENCRYPTION ALGORITHM (TEA) BERBASIS JAVA Liana Liana; Sutardi Sutardi; Nur Fajriah Muchlis
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.954 KB) | DOI: 10.55679/semantik.v4i1.4243

Abstract

The need for data security is increasing along with the development of digital technology. Almost all communication and transaction activities are now done digitally so that worries about missing data will increase. Data is very important, so accuracy and precision of data is needed in the decision-making process. The importance of the value of a data causes the availability of data security, therefore data falls precisely and accurately to the right partyIn this study designed a data security application. Encryption method is used to secure data by applying algorithm of Tiny Encryption Algorithm (TEA). In the encryption process performed 16 rounds where each round consists of; additions, key substitutions, and data, and XOR.The results of the study built a data security application that can secure data by applying the algorithm Tiny Encryption Algorithm (TEA). From the test results prove that application is able to secure extension txt and docx. The larger the size of the encrypted data the more time it takes for the encryption process. Keywords— Data, TEA, Encryption, Decryption DOI : 10.5281/zenodo.1402400 
APLIKASI KAMUS TANAMAN OBAT MEGGUNAKAN ALGORITMA BOYER MOORE BERBASIS ANDROID Sumarni Sumarni; Sutardi Sutardi; Rizal Adi Saputra
semanTIK Vol 3, No 2 (2017): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1348.207 KB) | DOI: 10.55679/semantik.v3i2.3769

Abstract

Dengan semakin berkembangnya ilmu pengetahuan dan teknologi, beberapa jenis buku tanaman herbal yang ada di perpustakaan atau yang beredar dibeberapa toko buku dirasa masih kurang memenuhi kebutuhan manusia dan kurang praktis dalam menggunakannya karena bentuk buku yang tebal. Demikian juga yang dialami beberapa mahasiswa ataupun masyarakat sangat kesulitan bila harus membawa buku kemanapun dia pergi, sehingga diharapkan ada aplikasi berbasis mobile yang bisa membantu para mahasiswa ataupun masyarakat secara umum yang ingin mencari  tanaman herbal secara praktis dan efisien.Aplikasi Kamus tanaman obat berbasis android berhasil dibangun   dengan Algoritma Boyer Moore  dan dapat berjalan dengan baikdan Implementasi Algoritma Boyer Moore dalam pencarian nama tanaman pada aplikasi kamus tanaman obat sesuai dengan perencanaan. Semua nama tanaman berhasil ditampilkan dengan persentase keberhasilan 100% .Kata kunci—Boyer Moore,Kamus, Aplikasi Mobile, Android, Tanaman  Obat
APLIKASI PENENTUAN MINAT STUDI SISWA MENGGUNAKAN METODE SINGLE LINKAGE CLUSTERING (STUDI KASUS : SMK NEGERI 1 KENDARI) Nurfinasari Nurfinasari; Sutardi Sutardi; Mutmainnah Muchtar
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.622 KB) | DOI: 10.55679/semantik.v4i1.4211

Abstract

The process of determining the areas of interest (specialization) in Vocational Schools in Indonesia is organized to match the ability and interests of learners to the field of their choosing. SMK Negeri 1 Kendari is one of the institutions engaged in the field of education, especially vocational which stood under the auspices of Education Department of Kendari City and is located at Jl. Jend. A. Yani No. 17 Kota Kendari. This school has 4 majors that can be selected by students, among others: Accounting, Office Administration, Trade, Computer Engineering and Network (TKJ). The process of determining the program of expertise SMK Negeri 1 Kendari still using the manual way, if done by manual it will require extra precision because the data is quite a lot and has many weaknesses that allow errors in the process of majors. Therefore, proper classification of majors is required, one of them using technology in the field of data mining. In this research, single linkage clustering method is chosen, which is where the distance between clusters will get shorter time between clusters to achieve the final result and as media optimization in terms of facilitating the school in determining the majors of interest students. From the results of research and implementation note that the system can classify the data of student interest in SMKN 1 Kendari by using Single Linkage Clustering, Make it easier to clustering data by calculating the closest distance of each cluster object and student interest in SMKN 1 Kendari shows that 35.7 % Accounting and Finance, 28.6% Business and Marketing, 28.6% Office Management and 7.1% Computer & Network Engineering, from 438 student data.Keywords—Data Mining, Single Linkage Clustering, Interest in Studies DOI : 10.5281/zenodo.1402386