cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 21 Documents
Search results for , issue "Vol 4, No 2 (2018): semanTIK" : 21 Documents clear
RANCANG BANGUN APLIKASI PENDETEKSIAN KESAMAAN PADA DOKUMEN TEKS MENGGUNAKAN ALGORITMA ENHANCED CONFIX STRIPPING DAN ALGORITMA WINNOWING Muhammad Nur Khidfi; Isnawaty Isnawaty; Jayanti Yusmah Sari
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.875 KB) | DOI: 10.55679/semantik.v4i2.4335

Abstract

With the development of technology, the increase of acts of plagiarism in the world of education. Many students who did plagiarism in doing their task, thesis etc. Therefore, an application that can detect the similarity between text documents is required. This research used Enhanced Confix Stripping (ECS) Stemmer algorithm for text stemming process and Winnowing algorithm to calculate the similarity between documents. By specifying the gram and window values of the Winnowing algorithm, it made easier for the user to use the application without being confused to determine the value of the gram and the window to produce an accurate equality value. From the test results 5 pairs of chapters 1 thesis of students who categorized together produced a similarity score of about 45-20%.Keywords: Enhanced Confix Stripping (ECS) Stemmer, Winnowing, Similarity, Plagiarism.DOI: 10.5281/zenodo.1407866
ANALISIS PERBANDINGAN TOOLKIT RECUVA DATA RECOVERY DAN STELLAR PHOENIX WINDOWS DATA RECOVERY UNTUK DIGITAL FORENSIK Handrizal Handrizal
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1834.304 KB) | DOI: 10.55679/semantik.v4i2.4692

Abstract

This paper presents an analysis with two digital forensic toolkits for deleted data scenarios. The used toolkit is Recuva Data Recovery and Stellar Phoenix Windows Data Recovery. They can recover data that is being and analyzed in a USB flash drive. The results of the comparison that the two toolkits can work well regarding finding data that has been discarded or in recovering the deleted data.Keywords—Data, Recovery, Forensic, Recuva, Stellar DOI: 10.5281/zenodo.1438737
ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK Wa Ode Zamalia; LM. Fid Aksara; Muh. Yamin
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.307 KB) | DOI: 10.55679/semantik.v4i2.4338

Abstract

Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to apply to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.Keywords— Layer 2 Tunneling Protocol, Point to Point Tunneling Protocol, Quality of Service (QoS), Secure Socket Tunneling Protocol, Virtual Private Network DOI: 10.5281/zenodo.1444898
IMPLEMENTASI KEAMANAN SERVER PADA JARINGAN WIRELESS MENGGUNAKAN METODE INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) (STUDI KASUS : TECHNO’S STUDIO) Muhammad Sadam Husain; LM Fid Aksara; Natalis Ransi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.922 KB) | DOI: 10.55679/semantik.v4i2.4310

Abstract

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Techno's Studio is a company engaged in technology and is a company that uses wireless technology as one of the important components in the activities of everyday employees. Therefore, server security issues on wireless networks become very important, because without any security support can lead to system failure and can be a gap in the occurrence of hacking.The IDPS method (Intrusion Detection & Prevention System) is used as an attack detection and prevention system by blocking Internet Protocol (IP) attackers. The results obtained from this research is the use of Snort and IPTables as a server security system on the wireless network successfully overcome the type of attack on ICMP ports, FTP, SSH, TELNET, and HTTP using various tools of attackers such as angry IP scanner, FileZilla, Putty, Mozilla Firefox, and Zenmap.Keywords— Server, Wireless, Intrusion Detection & Prevention System (IDPS), Snort, IPTables DOI: 10.5281/zenodo.1407864
DESAIN DAN IMPLEMENTASI VIRTUALISASI BERBASIS DOCKER UNTUK DEPLOYMENT APLKASI WEB Sulastri Apridayanti; Isnawaty Isnawaty; Rizal Adi Saputra
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.774 KB) | DOI: 10.55679/semantik.v4i2.4413

Abstract

Building a program through virtualization, developers usually run virtualization on the server so that the process of making the program can run on various platforms and hardware configurations. The problem with virtualization is the need to set up a complete operating system, including the various applications that the system brings. You can imagine with the number of virtualization that runs on a server will burden the system.Docker is one platform built on container technology. Docker is an open-source project that provides an open platform for developers and sysadmins to build, package and run applications anywhere as a lightweight container.The results obtained in research conducted is a web application wherein implementing server virtualization techniques using Docker for application deployment is successful. The application used is a trading application that is stored on Docker Server where both Client successfully using the application on different platforms that are Windows 7 and Windows 8 without experiencing any obstacles at all.Keywords— Virtualization, Docker, Web Application
PEMBANGUNAN APLIKASI KEAMANAN PESAN CHATTING DENGAN MENERAPKAN ALGORITMA TINY ENCRYPTION ALGORITHM (TEA) BERBASIS CLIENT SERVER Tasya Asprina; Muh. Yamin; Sutardi Sutardi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.067 KB) | DOI: 10.55679/semantik.v4i2.4669

Abstract

The development of information technology now allows one to exchange information through a computer network. One that is used in exchanging information is a chat application. The chat application is used to chat two people or more in realtime via the internet network. In exchanging information, a data security is needed, one of the data security that is done is encryption on the message. Encryption is done to change from the original message to a message that is not easy to read (ciphertext). Then a TEA (Tiny Encryption Algorithm) algorithm is applied.The results obtained in this study that the TEA algorithm can be implemented on chat messages for encryption and decryption of text messages. The process of testing encryption and decryption on messages is fast. Can be seen from the test table the application that encrypts text messages of various sizes using the same key produces a difference in the encryption and decryption time is not too large, with only a few seconds difference.Keywords—Chatting, Cryptography, TEA, Encryption, DecryptionDOI: 10.5281/zenodo.1468233
ANALISIS DAN PERBANDINGAN WIRELESS DISTRIBUTION SYSTEM (WDS) DAN NON WIRELESS DISTRIBUTION SYSTEM (NON WDS) BERBASIS OPENWRT MENGGUNAKAN ACCESS POINT PADA JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Wahyuddin Aluddin; LM Fid Aksara; Jumadil Nangi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.842 KB) | DOI: 10.55679/semantik.v4i2.4699

Abstract

The wireless network is one of the best alternatives in building a network of computers that is practical, in some agencies and the commercial wireless network is used to support an existing wired network. But its implementation is still used cable network that became the backbone of the access point so that a client that is connected can access the internet. Wiring problems can be a considerable obstacle in places that are hard to reach.The wireless distribution system is a system for developing a wireless internet network without having to use a cable as a backbone for the access point but instead of utilize a wireless line of the access point. At the time of the wireless distribution system network, topology and network topology of the non-wireless distribution system is applied, will be on analysis using Wireshark, the QoS parameter application that consists of a Delay, Throughput, and Packet Loss.The testing performed against the clients who are numbered six (6) is each connected to the access point. Scenario testing is done i.e. the conditions streaming and download, made during the three (3) days. Of test results obtained, the wireless distribution system network topology has the value throughput, delay; packet loss is a little less useful than a non-network topology wireless distribution system. But the differences in the average value of the QoS parameters that are generated are not too significant.Keywords—Wireless Distribution System, Non-Wireless Distribution System, Quality of Service (QoS)
PENDEKATAN BPMN DALAM MEMBUAT ABSTRAKSI PROSES BISNIS PENGELOLAAN PENELITIAN DI UNIVERSITAS SILIWANGI Irani Hoeronis
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (636.891 KB) | DOI: 10.55679/semantik.v4i2.4788

Abstract

Research is one of the higher education dharma which is the leading business in Siliwangi University. The primary business abstraction process at Siliwangi University became important in assisting the implementation of Tridharma, especially the management of the research. In addition to the primary business abstraction process, simulation is also needed to clearly see the role of each part in the development of the quality and quantity of research.This study aims to model the development of the quality and quantity of research using the BPMN approach. From the BPMN simulation results, currently, (as-is) Siliwangi University shows a balanced role between LP2M-PMP, Academic Bureau, and Rectorate. To maximize the role of each part, this research creates a scenario by targeting the implementation of the development of the quality and quantity of research in a period of 6 months from the scenario simulation results, it can be seen that the role of the Academic Bureau dominates by 71.85% compared to the Rectorate by 63.08% and LP2M-PMP by 50.97%.Keywords—Development of Quality and Quantity of Research, Business Processes, BPMN.DOI: 10.5281/zenodo.1471134
PERANCANGAN DAN IMPLEMENTASI SISTEM REPLIKASI DATABASE TERDISTRIBUSI PADA FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Muhammad Hidayat Darmawan; Isnawaty Isnawaty; Subardin Subardin
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1012.596 KB) | DOI: 10.55679/semantik.v4i2.4715

Abstract

Current technological developments are very influential on the process of data distribution that is demanded fast because every second of information can change. One of the methods used in data exchange is to use data replication in a distributed database. The speed of the process and the number of rows that can be replicated in units of time are some of the things that can be taken into consideration when trying to determine how to replicate data in a distributed database.In replication, a software is used to find or more precisely track changes that occur in a database. After changes in one database are identified and known, then changes are made so that all databases are the same as other databases.This study implements two computers consisting of master and slave, each of which is a database server that is connected to each other in the network. The test results obtained in this study are that with the database replication, every data that is stored periodically always backups the slave computer.Keywords—Replication, Database, Distributed Database DOI : 10.5281/zenodo.1493829
PENERAPAN WEB SERVICES DAN ALGORITMA GENETIKA UNTUK MENAMPILKAN JADWAL UJIAN TUGAS AKHIR STUDI KASUS : JURUSAN TEKNIK INFORMATIKA UNIVERSITAS HALU OLEO Waode Nur Lailah; L.M Fid Aksara; Natalis Ransi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (717.335 KB) | DOI: 10.55679/semantik.v4i2.4670

Abstract

The role of web service is needed as a medium for sharing data and inter-process functionality so that an application can connect with other applications without depending on the programming language or operating system. By using the web service Final Project exam schedule is not only known by students who will do the trial examination but can also be known by all students where the exam schedule will be sent to the web service provider then the web service engine will work to display the exam schedule on several websites that have been provided and by using genetic algorithms direct exam schedules can be determined automatically. This is where the role of web service is in carrying out the data exchange process. In this study, the technology that will be used is SOAP (Simple Object Access Protocol) because SOAP is a standardized protocol by W3C (World Wide Web Consortium), besides that it is also used Genetic Algorithm to automatically set exam schedules.The results obtained in this study that the application of web services can run well. Success can be seen from the results of testing the system where the exam schedule The final task can appear on several different websites and can change the data that is on the system that runs without entering into the system.Keywords - Web Service, SOAP, Genetic Algorithm DOI: 10.5281/zenodo.1471102

Page 1 of 3 | Total Record : 21