cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 22 Documents
Search results for , issue "Vol 5, No 1 (2019): semanTIK" : 22 Documents clear
PENERAPAN PROTOKOL ROUTING PROAKTIF OLSR PADA JARINGAN MOBILE AD HOC NETWORK (MANET) MENGGUNAKAN RASPBERRY PI UNTUK TRANSFER FILE Rico Dwi Kurniawan; Muh. Yamin; LM. Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (815.488 KB) | DOI: 10.55679/semantik.v5i1.6303

Abstract

The wireless network's users are increasingly used compared to wired networks. One of the developments of wireless networks is the existence of a technology called Ad Hoc network. Ad Hoc network is a solution where mobile devices such as laptops, tablets, smartphones, etc. can communicate with each other without the support of network infrastructure in the form of access points or means of supporting data transmission. Mobile Ad Hoc Network (MANET) is a multi-hop wireless network consisting of a collection of dynamic mobile nodes.Along with the development of technology, MANET began to be developed in anticipation if the central infrastructure of a network cannot be used. In this network, each node is a router that functions to determine the route that is closest to the nodes that communicate. Each node on the MANET network is also mobile so it is possible to be free to move, but this has an impact on the topology which keeps changing along with the movement of nodes.  In the test carried out file transfer is applied to the scenario of MANET infrastructure testing with three nodes with two conditions, namely the condition of the absence of interference with the MANET network and the condition when there is interference with the MANET network. file transfer testing on the MANET network can work in accordance with nature and network conditions that MANET has, but from the results of the analysis, the file transfer speed will decrease as the gateway nodes increase on the communication route between the node server and the client. Keywords—MANET, File Transfer Protocol (FTP), Optimized Link Stated Routing (OLSR)DOI : 10.5281/zenodo.2650753
ANALISIS PERFORMASI WIRELESS MESH MENGUNAKAN PROTOKOL HYBRID WIRELESS MESH PROTOCOL (HWMP) PADA JARINGAN MOBILE AD HOC NETWORK(MANET) Muhammad Darman Saleh; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (773.007 KB) | DOI: 10.55679/semantik.v5i1.6106

Abstract

The growing development of wireless technology in communication between users requires high-quality networks. This study aims to design a network and as a test parameter on the Wireless Mesh Network (WMN) using the routing protocol Hybrid Wireless Mesh Protocol (HWMP). This network is connected by using several access points that have been modified using OpenWRT software. The test parameters to be carried out are by testing the performance of the HWMP routing protocol in self-configure and self-healing as well as some supporting data from Throughput and Jitter. The data generated by using several access points and two (2) users produce data whereon self-configure can be done very quickly, unlike the case with self-healing which requires more time, the effect of inadequate access point location gives rise to network performance, not yet maximal, the existence of routing HWMP affects Throughput and Jitter generated by the user if the exchange of information in the condition always changes from one place to another. The average result of self-configuration is 100 bytes / 64ms, self-healing is 100 bytes / 187ms. Users of bandwidth 1 and 2 are 5,930 Kbyte / s and 5,210,170 Kbyte / s. Jitter values for users 1 and 2 are 1.554 ms and 1,699 ms. Throughput on users 1 and 2 is 0.283 Mbit / s and 4 Mbit/s. Keywords—WMN, HWMP, Firmware openWRT, Self-Configure, Self-Healing DOI : 10.5281/zenodo.3233134
IMPLEMENTASI ALGORITMA RC4 STREAM CIPHER SEBAGAI METODE OBFUSCATION STRING PADA DATABASE MySQL Muhammad Sholeh; Isnawaty Isnawaty; Bambang Pramono
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (903.853 KB) | DOI: 10.55679/semantik.v5i1.5199

Abstract

A database is a set of structured data and related to one another to form information. In the current technological development database management is very important considering the amount of information stored in the database of a system. One management that needs to be considered is the management of Database security.In securing the database there are many ways that can be used. One of them is by randomizing the contents of the database to confuse users who access the Database illegally. This randomization technique is called the Obfuscation String.One algorithm that can be used to randomize the database is the RC4 algorithm. This algorithm uses key lengths from 1 to 256 bits which are used to initialize tables as long as 256 bytes. This table is used to generate tables from a pseudo-random array using XOR operations with text to produce a ciphertext.The results of this study are a system that can randomize cell contents in a MySQL Database table using the RC4 Stream Cipher algorithm. From this study, it can also be concluded that the key length and the amount of data in the database table can affect the speed of program execution.Keywords—Database, Obfuscation String, RC4 AlgorithmDOI : 10.5281/zenodo.3066721
PENERAPAN METODE REGRESI POLINOMIAL ORDE n PADA PENGEMBANGAN APLIKASI INVENTORY (STUDI KASUS PT. LANDIPO NIAGA RAYA) Fitria Rihin Uyun; La Ode Muh. Golok Jaya; Natalis Ransi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (462.568 KB) | DOI: 10.55679/semantik.v5i1.6027

Abstract

Inventory or inventory management system is one of the problems often faced by the distributor company. Processing and analyzing data on the sale of goods at the company is very important to get an overview and information about inventory data in the coming period by using sales data in the previous period, then an application or system is made with the Data Mining field with one of its predictions with using the Polynomial Regression method. This system predicts by selecting products, orders and periods with prediction results of 324,076 for Indomie Goreng Spesial Jumbo products. After making a prediction, a forecasting test is carried out by calculating the error value and relative errors with the result of error value = 2,595 and relative error = 1.82%.Keywords— Forecasting, Polynomial Regression, InventoryDOI : 10.5281/zenodo.3255112
PERBANDINGAN MOTHER WAVELET DALAM SISTEM TEMU KEMBALI INFORMASI KEMIRIPAN MOTIF KAIN TENUN SULAWESI TENGGARA Wa Ode Rizqanun Karyima Bolu; Muh. Ihsan Sarita; Ika Purwanti Ningrum
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (986.563 KB) | DOI: 10.55679/semantik.v5i1.5309

Abstract

Information retrieval is a process, method, and procedure used to select relevant information and stored in a database. In libraries and archives, information retrieval is usually for known documents or for information about certain subjects. Information Retrieval System is used to rediscover information that is relevant to the needs of users of a collection of information automatically. Weaving motifs can be distinguished by the naked eye but not all people can distinguish motifs from each type of woven fabric due to the difficulty in defining the characteristics of woven fabric motifs from an area and the variety of motifs and compositions of colors available. Based on the data and facts that have been mentioned, wavelet can be used for extracting texture features in the Information Retrieval System, but further research is nApplication of Mother Wavelet in Retrieval System Similarity Information on Southeast Sulawesi Woven Fabric Motives gives good results needed to compare the optimal mother wavelet for the system. and among 4 types of wavelets, Haar with decomposition level 7 is the best feature extraction method compared to Daubechies 4, Symlets 2 and Coiflets 1. This is evidenced by faster computing time and the best percentage of precision, which is 95%.Keywords— Mother Wavelet, Information Retrieval, Weaving. DOI : 10.5281/zenodo.2649780
APLIKASI PENGAMANAN FILE BERTIPE *.PDF PADA VIDEO *.MP4 MENGGUNAKAN KRIPTOGRAFI VERNAM CIPHER DAN STEGANOGRAFI END of FILE Mulatifa Laliha; Sutardi Sutardi; Natalis Ransi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.051 KB) | DOI: 10.55679/semantik.v5i1.6203

Abstract

Security and confidentiality of messages in the communication process between the sender and receiver is an important thing that must be maintained so that the message would be difficult if not known by unauthorized parties. Cryptography Vernam Cipher is symmetric cryptography that used one time for a message and not reused. Steganography End of File (EoF) is one technique to insert data at the end of the file. Combine Vernam Cipher cryptography and EoF steganography on this research with a case study how the implementation of the security of *.pdf files on *.mp4 video. Based on the test results of *.pdf file encryption and steganography in video *.mp4 successfully performed on the size of small file size for use Vernam Cipher cryptography, plaintext length, and key length must be the same length, so that for large files will take a long time. The results of stegano show that the video files look like the original video can be viewed directly without that already is inserted in the video *.pdf, for EoF does not affect the quality of the video. It is concluded that the incorporation of Vernam Cipher Cryptography and EoF steganography successfully, where the process of implementing the algorithms when combined requires an average time of 65 seconds on the side Vernam Cipher cryptographic application due to the type of encryption key length is equal to the length of the plaintext.  Keywords—End of File, Cryptography,  Steganography, Vernam CipherDOI : 10.5281/zenodo.3253459
APLIKASI DAERAH RAWAN PENYAKIT MENGGUNAKAN ALGORITMA COMPLETE LINKAGE CLUSTERING Uun Amalia Ramadhani; Natalis Ransi; Jumadil Nangi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (16.865 KB) | DOI: 10.55679/semantik.v5i1.6033

Abstract

Kendari City Health Office is a group that has one task to control the spread of a certain particular disease. To carry out its duties and functions, ideally, the Health Office must have the ability to divide areas that are vulnerable and not prone to disease. To facilitate the dividing, this study was made which aims to build an application that is implemented using the complete-linkage clustering method by forming clusters of data on the number of cases of the disease in 10 sub-districts in Kendari City in 2012 to 2016. Identified diseases are DHF, Diarrhea, and TB. Algorithm Complete Linkage Clustering is a group analysis method that attempts to build a hierarchy of data groups, grouping data with two or more objects that have the closest similarity, then proceed to another object that has a second closeness. The results showed that the areas prone to DHF were Kadia and Wua-Wua sub-districts with an index value of 47.80. Areas that are prone to Diarrhea disease are Puuwatu sub-district with an index value of 1181.40, area which is susceptible to TB disease is West Kendari sub-district with an index value of 92.40. The system can group and map disease-prone areas in the city of Kendari, using Complete Linkage Clustering.Keywords—Complete-Linkage Clustering, Health Service, Dengue Fever, Diarrhea, Tuberculosis (TBC) DOI : 10.5281/zenodo.3183951
PEMODELAN PEMBEBENAN GAYA PADA STRUKTUR DERMAGA DENGAN APLIKASI SAP2000 Ahmad Syarif Sukri; Riswal Karamma
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1454.232 KB) | DOI: 10.55679/semantik.v5i1.6302

Abstract

The dock is one of the port facilities that serve as a place to dock the ship in the process of loading and unloading. This study only focuses on designing docks with Deck on Pile types. The Deck on Pile type dock structure is designed strongly against the loads that work on it both its own weight and those from the environment which include wind, waves, currents and earthquakes and the load due to activities on the dock include berthing load, mooring load, and vehicle load. In this study, an analysis of the data on the physical conditions of the field includes hydro oceanography, topography, bathymetry, ship design data and design of the pier. Dock structure design includes structural dimensions, structural strength analysis using SAP2000 application.Keywords—Pier Design, Deck on Pile, Structure DOI : 10.5281/zenodo.2783984
APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN MAN IN THE MIDDLE ATTACK (MITM) DENGAN METODE SNIFFING Sri Wayun Wardani; Sutardi Sutardi; Statiswaty Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.237 KB) | DOI: 10.55679/semantik.v5i1.6207

Abstract

An increasing number of mobile phone users and the number of Short Message Service (SMS) delivery between users, securities SMS sending an issue that deserves to be noticed. SMS industry into one vulnerable point to attack a security threat. The security hole on SMS communication is a message sent will be stored in the Short Message Service Center (SMSC), so that in case of attack Man In The Middle (MITM) at the SMSC then sent messages to be read by those who tapped one of them is sniffing activity. So, we need a safeguard against the activity of the exchange of messages via SMS. One of them is by using cryptography. Cryptography is a technique to secure the message so that the message conveyed to arrive to the person intended, receives the message. Cryptography is composed of two main concepts that encryption and decryption. Encryption is used to process information becomes unrecognized and decryption is used to change the information that was not recognized into information that is recognizable as before encryption. By encrypting text, the level of information security of the message can be improved. Currently, the Triple-DES (Triple Data Encryption Standard) is a secure cryptography algorithm for encryption process is carried out in 3 stages but did not change the algorithms of DES in order to ensure the complexity of solving the results of Triple-DES encryption. Therefore, it can be prepared that, if the intruder was given a person or an attack using a sniffing methods, the received message by the perpetrators are not illegible.Keywords—Cryptography, Man In The Middle Attack, Sniffing, SMS, Triple-DES DOI : 10.5281/zenodo.3227231
PERBANDINGAN ALGORITMA HORSPOOL DAN ALGORITMA RAITA PADA APLIKASI ISTILAH PSIKOLOGI BERBASIS ANDROID Mamta Culkari Puding; Jumadil Nangi; Adha Mashur Sajiah
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (37.065 KB) | DOI: 10.55679/semantik.v5i1.5996

Abstract

The lack of professional health personnel in Indonesia has resulted in many people with mental disorders who have not been treated medically. To make it easier for the mental health workers, especially psychology students to study the term in psychology. It is necessary to have a digital dictionary because a tick printed book dictionary makes it difficult to carry around and the search term desired requires a long time. Based on this, a dictionary application for the psychology term based on Android was made.To make this application implemented the string matching method on the codeword search. String matching has several algorithms, some of which are Horspool algorithm and Raita algorithm.In this research study an analysis of the comparison between the Horspool algorithm and Raita algorithm, to determine the most useful algorithms in the dictionary of psychological terms. The parameter used to compare the two algorithms search time (ms) and complexity algorithms (Big-O).The results of this study show that Raita Algorithm has a faster search than Horspool Algorithm and the complexity of Raita algorithm has faster than  Horspool algorithm. The average total velocity of time for Raita algorithm is 13,60 ms and Horspool algorithm are 14,79 ms.  The complexity of Raita algorithm is T(n) = Ɵ(MN) and the complexity of Horspool algorithm is T(n) = Ɵ(M(N-2)).Keywords—Dictionary, Psychology, String Matching, Horspool Algorithm, Raita AlgorithmDOI : 10.5281/zenodo.3242287

Page 1 of 3 | Total Record : 22