cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 1,046 Documents
Prediksi Volume Penggunaan Air PDAM Menggunakan Metode Jaringan Syaraf Tiruan Backpropagation Budy Satria
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (725.435 KB) | DOI: 10.29207/resti.v2i3.575

Abstract

As the population growth rate in Duri increases, the need for clean water also increases as needed. In Indonesia, PDAM is an institution that regulates and manages the provision of clean water for the community. So the amount of water produced and distributed should be adjusted to the demand for water. However, the problem arises in the form of waste of water at PT. PDAM Duri. Purpose of this study is to predict the amount of water consumption at PT. PDAM Duri by implementing Backpropagation Artificial Neural Network method. Variables of data taken from customer data were social, general social, household 1, household 2, household 3, commerce 1, commerce 2 and commerce 3. Data used in the prediction process was training data in 2016 and data testing in 2017. Actual amount of data at PT. PDAM Duri City 2016 until 2017 was 2.840.165 when the prediction result using artificial neural network back propagation method was 2.843.388. The number of training epochs was 4595 and the achievement of MSE (Mean Squared Error) on the test was 0,001 and the result of accuracy was 99,99900000%. Final result of this research was artificial neural network using back propagation method could predict the using of water consumption at PT. PDAM Duri for next year.
Kontrol Bandwidth Dinamis Berbasis Algoritma Logika Fuzzy pada Jaringan Wireless Ad-Hoc Yedidio Purwodwiyogo; Alif Subardono
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (485.05 KB) | DOI: 10.29207/resti.v2i3.577

Abstract

Ad-Hoc network is a wireless network consisting of a collection of nodes that are connected spontaneously and dynamically. With the character of the Ad-Hoc network, this network is often used in the development of IoT devices (Internet of Things) or emergency conditions. But in the implementation of the Ad-Hoc network there are challenges that need to be addressed, one of which is the very limited bandwidth that can be provide. The existence of these things will lead to new problems, when network traffic is very busy, it will reduce the fairness level of bandwidth distribution. Therefore, the implementation of fuzzy logic is proposed as a reliable decision maker in managing bandwidth. From the results found in this study prove that the results of the obtained throughput performance is not found to be a significant increase, but the jitter and packet loss produces a better value than when the bandwidth management system is applied.
Implementasi Sidik Jari sebagai Otentikasi Parkir Kendaraan Menggunakan Raspberry Pi Mohamad Dimyati Ayatullah; Devit Suwardiyanto; I Wayan Suardinata
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.287 KB) | DOI: 10.29207/resti.v2i3.580

Abstract

Authentication of vehicle in and out of the parking lot is one of the problems that still need to be explored. Most parking lot authenticate the vehicle by record the number plate on the parking card. Officer verify the number plate on parking card with the vehicle registration certificate. This method requires accuracy of the parking attendant. Research carried out utilizing the vehicle driver's fingerprint identification and the introduction of vehicle number plates through photos by parking attendants as authenticator. The system is built from several devices, namely ultrasonic sensors to detect the presence of vehicles. Fingerprint sensor to detect fingerprints equipped with storage to store fingerprint templates. Webcam for taking photos of vehicles as verification when the vehicle exits the parking lot. While the portal door is driven by a servo motor. all systems are controlled using Raspberry Pi 3 using the python programming language. The test results on ultrasonic sensors are able to detect the presence of vehicles at a distance of 10-200 cm with an accuracy rate of 96%. Servo motor rotates position 0 ° if the Duty Cycle value is set 2.5 and rotates 90 ° if the DutyCycle 7.5 value. The webcam position is 2 meters from the location of the fingerprint sensor. The position of the pressed finger produces a faster process in identifying the character of the fingerprint during recording and matching fingerprints
Aplikasi Penerimaan Mahasiswa Baru Online Dengan Sms Gateway di STMIK Indonesia Padang Monanda Rio Meta; Ilham Eka Putra; Annisa Urfa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (507.197 KB) | DOI: 10.29207/resti.v2i3.582

Abstract

STMIK Indonesia Padang is one of the high school level education isntitutions in Padang. In Students admission activities, STMIK Indonesia is still announce the result conventionally, its affect the comfort of prospective students. Examinees have to wait until the reslut announced to know if they could register or not. There for, SMS Gateway system is neededto improve service to prospective students and improve the image of STMIK Indonesia Padang it self in society. This research intented to build a SMS Gateway aplication to help students admission activities at STMIK Indoenesia Padang. This SMS Gateway developed by waterfall method, with PHP programming language and Gamu aplication to integrate the System to SMS Gateway and tested with black box method. The result is a SMS Gateway Information System to inform students passing grade.
Implementasi Algoritma Backpropagation Prediksi Kegagalan Siswa Pada Mata Pelajaran Matematika Melladia Melladia; Iis Roza Mardani
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.122 KB) | DOI: 10.29207/resti.v2i3.588

Abstract

Students become those who can advance the nation. Schools and teachers are very helpful in creating smart and competent students. But often found students who fail, one of which is in the eyes of mathematics. With problems with students Mathematics study researchers want to help solve problems by using predictions on math subjects. In this study the researchers chose the object of research, namely in Padang State Middle School 39. This is quite a problem for students when teaching and learning mathematics subjects. Students do not understand mathematics and this problem will make students' grades decrease. By using student value data, a model is designed to predict students against mathematics subjects. The model uses the backpropagation algorithm. Data variables are taken from students' mathematical currency data, namely assignment 1, assignment 2, average, mid-semester and final semester grades. The data generated is 1 semester data and the number of students predicted is 30 students. The prediction results using the best model are training pattern data 5-2-1 with EPOCH process = 58 and MSE achievement when payment with MSE = 0,00989892 with an accuracy of 99,9901011. it can be cited that the backpropagation algorithm can be used to predict student errors in the eye Mathematics lessons as a guide for teachers
Pengamanan Ruangan Dengan Dfrduino Uno R3, Sensor Mc-38, Pir, Notifikasi Sms, Twitter Siswanto Siswanto; Gunawan Pria Utama; Windu Gata
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1251.822 KB) | DOI: 10.29207/resti.v2i3.592

Abstract

Security officers can not monitor the security of the financial space at all times especially outside working hours or evenings because the financial room is on the 3rd floor. Security guards are not warned quickly if there are people who do not have the right to enter the financial room at the time of blank or after hours. The purpose of this research is to design an application that can monitor the security of financial space by giving information or giving warning in the form of alarm and sending SMS and Twitter notification to security officer if there are people who do not have access rights of financial space, using DFRduino Uno R3 microcontroller, MC-38 magnets, PIR sensors, Alarms, Sony Ericsson Z530i phone, wifi modem, and Bluetooth. If a door or movement is detected the computer will send a command to DFRduino which is then forwarded to the alarm to give a sound alert. And with the Hanphone Sony Ericsson Z530i with a connection via Bluetooth Mobile can connect with the application so that the computer can send notification SMS alert to the number that has been registered as the recipient of SMS and notification via Twitter to the username that has been registered. With the magnet sensor it is possible to detect if the door or window is forced and PIR sensor is used as a support if the magnetic sensor is not working or if the thief enter the room not through the door or window. PIR Sensor installed in the room allows all activities that occur will be able to monitor well. If there is a security breach or infiltration it will be quickly known because there are warnings via SMS and Twitter that can provide information to security personnel to perform actions quickly so that cases can be resolved thoroughly.
Optimasi Aplikasi Penjadwalan Kuliah Menggunakan Algoritma Genetik Syahrul Mauluddin; Iskandar Ikbal; Agus Nursikuwagus
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (644.104 KB) | DOI: 10.29207/resti.v2i3.597

Abstract

Course Scheduling is a routine activity at a college and it is a very important activity for the implementation of condusive academic activities. Problems that often occur in course scheduling are the length of the schedule making process and the clashes due to the many rules that must be considered. This problem happened in Indonesian Computer University at accounting major because the lecture scheduling process was still done conventionally. Given the importance of this scheduling process, optimization steps are needed so that the scheduling process will be faster and the schedule clashes can be minimized. Based on the problems, this research purpose is to optimize course scheduling application using genetic algorithm. The system approach method used in the development of course scheduling applications is object-oriented approach, with system development methods namely prototype models. to build the application we use the Java SE programming language with MySQL database. The conclusion of this study is that the implementation of genetic algorithms to course scheduling applications is able to achieve 0 (zero) clash which means very optimal, and view by time the result is very fast with an average of 1.003 seconds from 10 times the schedule creation attempt.
Pengaruh Normalisasi Teks Dengan Text Expansion Dalam Deteksi Komentar Spam Pada Youtube Imam Thoib; Arief Setyanto; Suwanto Raharjo
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (886.168 KB) | DOI: 10.29207/resti.v2i3.602

Abstract

The popularity of Youtube as the largest video sharing website in the wolrd give spammers opportunities to get benefit from Youtube in illegal ways by putting spam comments on Youtube's videos. Spam comments are very troubling to channel owners. The variants of spam comments are becoming more difficult to detect. One of them is spam comments using abbreviations, symbols, terms or misspelled word to make detection difficult. This research evaluate some classification techniques and employ text normalization method called TextExpansion to deal with this problem. This research uses Youtube Spam Collections dataset from UCI Machine Learning Library composed by five different datasets, which each one contains text comments extracted from YouTube videos (Psy, Katty Perry, LMFAO, Eminem and Shakira). The evaluation results shows TextExpansion is able to produce the highest accuracy value of 90.23%. To determine the impact of applying the TextExpansion method, this research conducted t-test for each dataset. The results of t-test for each dataset shows P(T<=t) two-tail < 0.05 which indicates a significant impact after applying text normalization using TextExpansion.
Pembuatan Histogram Dan Pola Data Warna Urin Berdasarkan Urinalisis Menggunakan Mini PC Andrizal Andrizal; Anton Hidayat; Tuti Angraini; Yefriadi Yefriadi; Rusfandi Rusfandi; Rivanol Chadry
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (785.756 KB) | DOI: 10.29207/resti.v2i3.605

Abstract

The method for observing urine color to diagnose a disease of patient has done so far. The visual observation with human eyes has done to study and analyze human urine color and detect the connected disease. Human vision lately can be replaced with computer visual system or other sensor or camera to detect that color. The color of object is composed by two color components, they are frequency and spatial domain. Therefore, each color has wavelength and form in number of frequency. Color censor TCS 3200 produces output signals with different frequency based on scanned color through photodiode of the censor. Recognizing of the object in the form of shape, color and other variables of the object. Feature extraction is obtain from the data pattern as well as histogram. This research aims generate histogram and urine color pattern according to patient situation indication. The use of color reference is main color urinalysis, the result of method at Cleveland in Ohio in 2013. Based on the research, the pattern and color histogram were obtained in different style found in detected different urine color. This research would contribute to help identification process of diseases based on urine color thorough online.
Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA Nizirwan Anwar; Munawwar Munawwar; Muhammad Abduh; Nugroho Budhi Santosa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.009 KB) | DOI: 10.29207/resti.v2i3.606

Abstract

Along with the rapid development of information technology, the ability to access and provide information to users is getting quicker and more accurate, Therefore, protecting those from any unauthorized access is very important. Cryptography can be use as they’re one of the fields of information technology development to secure data or messages that are personal and confidential. So, it takes a security to prevent things that are not desired. In this case, the message sending process will be encrypted (plaintext to ciphertext) and the recipient of the message will need to be decrypted (ciphertext to plaintext). The algorithm that we will be using are 256-bit American Encryption Standard (AES) symmetric encryption and RSA asymmetric encryption. Performance testing (size and time-process), integrity ("data integrity"), confidentiality, and "non-repudiation" of data or message security with the algorithm method above will refer to 4 (four) modern cryptographic objectives developed. Those algorithm will be used to encode data stored in document files and implementing it using Python 3.0 language and some support applications. And the results of the process of designing and testing data (text and images) obtained did not experience significant growth, but the encryption / decryption of the RSA algorithm method is much slower than the performance of the AES algorithm time-processing method

Page 11 of 105 | Total Record : 1046