cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 1,046 Documents
Pengembangan Infrastruktur Pembelajaran Daring Menggunakan Antena Unidirectional Rufman Akbar; Chaerul Anwar; Johannes Hamonangan Siregar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.514 KB) | DOI: 10.29207/resti.v5i4.3219

Abstract

Situation during COVID19 pandemic, requires all schools to conduct online learning. This condition is done to prevent the spread of pandemic. The problem is that the infrastructure is not fully supported. Learning in marginal areas is still constrained by the difficulty of the signal or internet connection. This research was conducted to obtain an infrastructure design that can be used in areas with minimal internet connection, or even no internet network connection. Using R&D, the research begins by designing a network device on the school side – Acces Point, also a tool to expand coverage - repeater. Furthermore, design and testing of signal amplifier antennas that can be used on the client side is carried out. For the client side, several types of amplifier antennas are made that can be used to receive Wifi frequencies. There are three types of antennas that are made and tested, namely Yagi, Yagi Cross, and cantennas. Both are Unidirectional antenna. Connection quality is measured with a Wifi analyzer device to determine network quality. As for mobile phones, it is measured using the Wifi Master Key. The result obtained is a WELAN infrastructure design which is equipped with unidirectional antenna design with a total range of 8 Km.
Evaluasi Pengaruh Parameter TIM Berdasarkan Multirate Terhadap Konsumsi Energi Jaringan IEEE 802.11ah Daifi Afrila Riefi; Teuku Yuliar Arif; Syahrial
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (569.73 KB) | DOI: 10.29207/resti.v5i4.3224

Abstract

WLAN IEEE 802.11ah is wireless standard technology which potentially used for IoT networking to provide longer range transmission than WPAN and LPWAN. MAC layer IEEE 802.11ah introduces TIM segmentation scheme that provides effective management toward STA in large amount to make the energy consumption efficiently. STA is organized in hierarchical structure that allows TIM segmentation to reduce the length of frame beacon contains TIM. In case there’s no segmentation in a network with many STA, the TIM would be longer and requires all STA to wake-up receiving beacon TIM including STA without downlink data. This research intends to evaluate and analyze the TIM optimal parameters. Those are Page Period, Page Slice Length and Page Slice Count toward IEEE 802.11ah energy efficiency based on multirate using simulator NS-3 implemented on IEEE 802.11ah. As the result of STA experiment shows that Non-TIM is only optimal on sleep duration while TIM is optimal on energy consumption and delay packet. In the experiment of impact of STA/Slot amount based on Page Slice Length shows that sleep duration and energy consumption is optimal depends on the amount of the STA/Slot and data rate used while the optimal packet delay varies for each Page Slice Length.
Klasifikasi Citra Daging Menggunakan Deep Learning dengan Optimisasi Hard Voting Kade Bramasta Vikana Putra; I Putu Agung Bayupati; Dewa Made Sri Arsa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (616.603 KB) | DOI: 10.29207/resti.v5i4.3247

Abstract

Meat is a staple food for some Indonesian people, apart from the taste, meat also contains vitamins and minerals that are good for the human body, however, not all meat can be consumed by the Indonesian people. the texture and color of beef, pork and mutton have similarities and tend to be similar, therefore a system is needed to recognize the three types of meat. In this study, the authors use various types of Deep Learning architecture such as Resnet-50, VGG-16, VGG-19 and Densenet-121 with Hard Voting to improve the performance of Deep Learning in recognizing the three types of meat. The results show that Resnet-50 with Hard Voting can outperform Deep Learning Resnet-50, VGG-16, VGG-19 and Densenet-121- with f1 score 98.88%, precision 98.89% and recall 98.88%. in image classification of pork, beef and mutton.
Pengembangan Sistem Manajemen Event Pameran Karya Mahasiswa Menggunakan Metode Extreme Programming Ahmad Ali Mutezar; Umniy Salamah
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (748.779 KB) | DOI: 10.29207/resti.v5i4.3249

Abstract

An event is a means for students to improve their soft skill and hard skill. In college, one kind of event that usually held regularly is an exhibition. It is usually held around the universities environtment, but in practice there are still some shortcomings, such as the registration process is done manually, attendance of participants that are not integrated with the system, and unavailability of certificates for participants who have attended the event. Since the outbreak of Covid-19, organizing the events must be done online, so we need a system that can accommodate this. Therefore, this study aims to create an event management system that can manage exhibition event data. Besides, the system is also equipped with a feature to generate an E-Certificate that has a QR Code embedded. The method used in this study is Extreme Programming, with its flexible nature toward changes to facilitate the process of system development. The testing in this study is using black box method, with the test results show that all functional in the system can run well in accordance with user expectations. The use of the Extreme Programming method produces a quality system, because users are involved during the system development process.
Analisis Dampak Perubahan Artefak Kebutuhan Berdasarkan Kedekatan Semantik Pada Pengembangan XP Arrijal Nagara Yanottama; Siti Rochimah
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.057 KB) | DOI: 10.29207/resti.v5i4.3281

Abstract

The Extreme Programming (XP) development method is popular because of the flexibility of the development process, it can accommodate changes quickly. But this method has a weakness in terms of documentation. It is expected that the speed of discovering which parts of the source code need to be changed will be greatly improved by analyzing the impact of changes on the requirements document. In this study, a method of analyzing the impact of changes is proposed by tracing changes in the artifact of the need to find out the source code that occurs. Early language methods and semantic approaches are used. Based on the proximity of the semantics, it will be analyzed to find out the elements in the source code that use the Spearman Correlation Coefficient. The test dataset in this study consisted of the source code in the PHP programming language as well as the functional requirements of the software. Requirements change list is generated by analysis of the latest 2 (two) expert versions of the source code. The changing needs are described in a user story document. Based on the test results in this study, the average precision was 0.1725 and the average recall value was 0.6041.
Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat Aminudin; Ilyas Nuryasin
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (271.735 KB) | DOI: 10.29207/resti.v5i4.3297

Abstract

The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorithm has two keys, namely the public key and the private key. However, as time goes on, these algorithms are increasingly exposed to security holes and make this algorithm vulnerable to being hacked by people who do not have authority. The vulnerability stems from the algorithm's public keys (e and n). The strength of the RSA algorithm is based on the difficulty of factoring two prime numbers that are generated during the key generation process, if these values ​​can be known using certain methods, the public key and private key values ​​will be found. Therefore, there are many studies that improvise the RSA algorithm, one of which is the Dual Modulus RSA (DM-RSA) algorithm. The algorithm uses four prime numbers which produce 2 modulus and 4 keys (2 public keys and 2 private keys). From the results of the Kraitchik factorization test, it was found that the DM-RSA algorithm was proven to be more resistant up to 2 times or even more than the standard RSA algorithm. This is evidenced by the fact that the value of n is 24 bits, the RSA algorithm can last up to 63204 ms (1 minute 22 seconds) while the Dual Modulus RSA algorithm lasts up to 248494123 ms (142 minutes 47 seconds).
Desain Sistem Akuisisi Kecepatan Angin pada Menara SST Berbasis IoT Rachman Rohendi; Herry Sujaini; Redi R. Yacoub; Bomo W. Sanjaya; Purwoharjono
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (609.518 KB) | DOI: 10.29207/resti.v5i4.3307

Abstract

Wind energy is one of the new renewable energy sources that can be used to generate electricity. The application of microgrids is expected to reduce the use of fossil fuels. PT PLN UP3B West Kalimantan has a greenfield type SST (Self Support Tower) communication tower with a height of 52 meters. This study aims to test the wind speed acquisition system in real-time on the SST tower. This research was conducted because there is no research on the design of the wind speed acquisition system on the SST Tower. Wind speed measurement data is obtained from the anemometer sensor mounted on the top of the SST Tower. The wind speed measurement data is sent to the MQTT broker and database using the MQTT protocol with the help of a microcontroller and communication media so that the measurement data can be monitored in real-time using the Grafana application either through local or public networks. The study was conducted from February 6 to 27, 2021. As a result, the wind speed data acquisition system managed to collect 5,501,689 wind speed measurement data stored in the database with an average wind speed of 3.03 m/s.
Analisis Sentimen Tweet Vaksin COVID-19 Menggunakan Recurrent Neural Network dan Naïve Bayes Merinda Lestandy; Abdurrahim Abdurrahim; Lailis Syafa’ah
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.645 KB) | DOI: 10.29207/resti.v5i4.3308

Abstract

COVID-19 has become a global pandemic including Indonesia, so the government is taking vaccinations as a preventive measure. The public's response to this continues to appear on social media platforms, one of which is Twitter. Tweets about the COVID-19 vaccine have generated various kinds of positive and negative opinions in the community. Therefore, it is very important to detect and filter it to prevent the spread of incorrect information. Sentiment analysis is a method used to determine the content of a dataset in the form of negative, positive or neutral text. The dataset in this study was obtained from 5000 COVID-19 vaccine tweets with the distribution of 3800 positive sentiment tweets, 800 negative sentiment tweets and 400 neutral sentiment tweets. The dataset obtained is then pre-processed data to optimize data processing. There are 4 stages of pre-processing, including remove punctuation, case folding, stemming and tokenizing. This study examines the performance of RNN and Naïve Bayes by adding the TF-IDF (Term Frequency-Inverse Document Frequency) technique which aims to give weight to the word relationship (term) of a document. The test results show that RNN (TF-IDF) has a greater accuracy of 97.77% compared to Naïve Bayes (TF-IDF) of 80%.
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature Antika Lorien; Theophilus Wellem
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (608.051 KB) | DOI: 10.29207/resti.v5i4.3316

Abstract

The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents. Generally, digital documents can be authenticated by using digital signatures. This study aims to implement a document authentication system based on Quick Response (QR) code and digital signature. As the case study, the document authentication system is implemented to generate digital signatures for student’s certificate documents. Furthermore, the system can also verify the authenticity of the certificate documents. Creating a digital signature requires a hash function algorithm for generating the message digest of the document. In addition, an algorithm to generate the public key and the private key used in the encryption/decryption of the message digest is also needed. The hash function utilized in this study is the Secure Hash Algorithm-256 (SHA-256), while the algorithm used for encryption/decryption is the Rivest-Shamir-Adleman (RSA) algorithm. The system is evaluated by verifying 30 student certificate documents, of which 15 of them were certificates with QR code signature generated by the system and the other 15 were certificates with QR code signature generated using a random QR code generator. The system’s testing results demonstrate that the system can ensure the authenticity and integrity of the signed certificate documents to prevent document falsification. All documents that contain random QR codes were correctly identified as false documents.
Cancer Detection based on Microarray Data Classification Using FLNN and Hybrid Feature Selection Ghozy Ghulamul Afif; Adiwijaya; Widi Astuti
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (484.221 KB) | DOI: 10.29207/resti.v5i4.3352

Abstract

Cancer is one of the second deadliest diseases in the world after heart disease. Citing from the WHO's report on cancer, in 2018 there were around 18.1 million cases of cancer in the world with a total of 9.6 million deaths. Now that bioinformatics technology is growing and based on WHO’s report on cancer, an early detection is needed where bioinformatics technology can be used to diagnose cancer and to help to reduce the number of deaths from cancer by immediately treating the person. Microarray DNA data as one of the bioinformatics technology is becoming popular for use in the analysis and diagnosis of cancer in the medical world. Microarray DNA data has a very large number of genes, so a dimensional reduction method is needed to reduce the use of features for the classification process by selecting the most influential features. After the most influential features are selected, these features are going to be used for the classification and predict whether a person has cancer or not. In this research, hybridization is carried out by combining Information Gain as a filtering method and Genetic Algorithm as a wrapping method to reduce dimensions, and lastly FLNN as a classification method. The test results get colon cancer data to get the highest accuracy value of 90.26%, breast cancer by 85.63%, lung cancer and ovarian cancer by 100%, and prostate cancer by 94.10%.

Page 44 of 105 | Total Record : 1046