cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 13 Documents
Search results for , issue "Vol 5, No 2 (2019): semanTIK" : 13 Documents clear
PERAPAN METODE CERTAINTY FACTOR PADA APLIKASI PAKAR SELEKSI TES KEPRIBADIAN CALON KARYAWAN Cep Adiwihardja; Puteri Syanti Mahadewi; Widiarina Widiarina
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (765.849 KB) | DOI: 10.55679/semantik.v5i2.8376

Abstract

Pada dunia kerja, banyak perusahaan yang memanfaatkan seorang psikolog (pakar psikologi) untuk menyeleksi calon karyawan karena penempatan karyawan yang tepat dapat membantu untuk meningkatkan produktivitas perusahaan.  Penyeleksian calon karyawan melalui metode wawancara saja tidak akan cukup untuk menentukan calon karyawan tersebut layak atau tidak diterima, karena pada prakteknya terkadang kinerja yang diberikan tidak sesuai dengan hasil wawancara (interview). Di samping itu, biaya seorang psikolog yang cukup mahal membuat beberapa perusahaan kecil dan menengah lebih memilih tidak merekrut seorang psikolog sebagai divisi human resource. Oleh karena itu sebuah sistem pakar analisa kepribadian diharapkan dapat menjadi salah satu alternatif solusi agar proses penyeleksian lebih efisien dan optimal. Metode yang digunakan adalah Certainty Factor, pada metode tersebut dapat mengatasi ketidakpastian pengambilan keputusan dikarenakan dibutuhkan beberapa tes yang lebih kompleks dan lengkap untuk menentukkan kepribadian seseorang. Aplikasi ini akan memberikan hasil analisa tes berupa kecenderungan terbesar tipe kepribadian yang dimiliki calon karyawan sesuai jawaban yang diberikan beserta jumlah persentasenya. Berdasarkan penilaian pakar untuk ketepatan sistem dalam menganalisa kepribadian calon karyawan, terlihat bahwa aplikasi sistem pakar analisa tipe kepribadian ini memiliki tingkat rata-rata akurasi sebesar 90.84%.
Implementasi Teknologi Enkripsi URL (Uniform Resource Locator) dan Login Form Menggunakan Algoritma Blowfish Untuk Mencegah Serangan SQL Injection Waode Hardianas Shalawati; Muhammad Yamin; Natalis Ransi
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.312 KB) | DOI: 10.55679/semantik.v5i2.7472

Abstract

Security of a website is a very important aspect. Because unsafe websites will easily be damaged the integrity of the data  and information through various attack. SQL Injection is one type of attack that often occurs on websites. SQL Injection is a method for entering SQL commands as an input through a web to get database access. Insecure URLs and Login forms are often targeted by SQL Injection attacks to exploit web databases. There are many ways to prevent SQL Injection attacks and one of them uses cryptographic techniques to encrypt URLs and Login Forms of websites into an incomprehensible codes or passwords. The cryptographic method used is blowfish algorithm. This research aims to  tests the performance of blowfish to prevent SQL Injection attacks through the implementation of URL and Login Form encryption. Web security from SQL Injection attacks is tested before and after encryption. Attack testing is done manually and automatically. Automatic testing using SQL Map and JSQL Injection applications. The test results prove that the implementation of URL and login form encryption uses blowfish algorithm is effective to prevent SQL Injection attacks because SQL Injection attacks always fail after implementation of URL and Login Form encryption.
PENERAPAN ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) UNTUK MENGAMANKAN FILE PADA LAYANAN INFRASTRUCTURE AS A SERVICE (PRIVATE CLOUD STORAGE) STUDI KASUS: FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Muh.Muchsin Al-As'Ad Mirsyah; LM Fid Aksara; Adha Mashur Sajiah
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.318 KB) | DOI: 10.55679/semantik.v5i2.6708

Abstract

A technological development has been affecting the advancement of storage media on computers from time to time. One of the advancement types is the cloud-based store media, in this case, Cloud refers to a metaphor of internet files and data stored on a computer where the users are required to create a Cloud Storage account. Cloud Storage is a storage media that requires access to an internet network. It means as long as the computers are connected to the internet, users no longer need to use a USB flash drive, hard drive or other storage hardware for data storage mobility. However, the security of files and data on Cloud Storage is still very vulnerable to be attacked or retrieved in the database, along with the development of increasingly sophisticated computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Most recently, the Advanced Encryption Standard (AES) is a secure cipher algorithm for protecting confidential data or information. The results of this study show that the Private Cloud Storage System is able to run well which can be seen from the results of testing this private cloud storage system, all existing menus can run and function properly and from the results of encryption and decryption tests that have been performed on eight types of files show that the  testing of six types of files are successful, namely images, .doc, .pdf, .xsls, .ppt, and .txt, whereby those of six types of files are safe based on security testing. For .doc, .xsls, and .txt files when those are opened the files become scrambled. Furthermore, for images, .pdf, and .ppt files an error display will appear when those are opened. Meanwhile, the other two files which are the .mp3 and video type files failed because the algorithm is not able to encrypt and decrypt the file types Keywords— Cloud Computing, Private Cloud Storage, AES, Encryption, Decryption
IMPLEMENTASI DEEP LEARNING DENGAN METODE CONVOLUTIONAL NEURAL NETWORK UNTUK IDENTIFIKASI OBJEK SECARA REAL TIME BERBASIS ANDROID Indra Fransiskus Alam; Muhammad Ihsan Sarita; Adha Mashur Sajiah
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.817 KB) | DOI: 10.55679/semantik.v5i2.7554

Abstract

The development of artificial intelligence has now undergone significant changes. This underlies the birth of a method to deal with object detection in real time with high accuracy. Basically Deep Learning is the implementation of the basic concept of Machine Learning which applies the smart algorithm with more layers between the input layer and the output layer. Convolutional Neural Network (CNN) is one method of Deep learning (DL) that can be used to detect and recognize an object in a digital image. The ability of CNN is claimed to be the best model to solve the problem of object detection and object recognition because it is a development of the backpropagation method and does not require large computation in the process. The results obtained in this study that android applications can run well with an accuracy of 92.33% can be seen from the test results using the 10-fold cross validation method, all available menus can be run and the mention of object labels is appropriate for image recognition and classification. Calculation of precision and recall has good values, each at 97.51% and 94.33%. In the classification process, objects that do not exist in datasets that have been modeled by the system will be null or unrecognized, especially in the image of an object captured by an Android camera that has many objects and is close together
IMPLEMENTATION OF REDUNDANCY PROTOCOL LOAD BALANCING VIRTUAL ROUTER (VRRP) USING ROUND ROBIN ALGORITHM IN DATA SERVICES Muhamad Amsyar; Isnawaty Isnawaty; Natalis Ransi
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (890.528 KB) | DOI: 10.55679/semantik.v5i2.7552

Abstract

Computer networks are the most important part of communication systems in our lives, without a computer network we cannot communicate with one another. For that we need to maintain the quality level of network services by minimizing the occurrence of failures in a network device, by which it is necessary to have a network device that can take over from the main device. Protokoli Virtual VR Redundancy (VRRP) is a protocol that is responsible for running the backup router functions when the master router has a fault condition.            Mikrotik is a router that can implement load balancing techniques. Load balancing has four methods that can be applied, one of which is the Nth method, the Nth method is the development of the round robin algorithm. Load balancing is a technique for distributing traffic loads on two or more connection lines in a balanced manner. The system that was built using VRRP load balancing, was able to solve the problem when one ISP experienced a connection breakup. Systems that are built using the Nth load balancing method can divide the load equally from one gateway to another gateway. Based on the Quality of Service test on load balancing devices using the microtic routerboard 951Ui-2HnD, the results of the delay, packet loss and throughput values are good as well as the average values obtained in the Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) category .
Penerapan FGS-PID pada Muffle Furnace untuk Kendali Temperatur Pembakaran Silika Sekam Padi Mochamad Yusuf Santoso; Sryang Tera Sarena
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.896 KB) | DOI: 10.55679/semantik.v5i2.7064

Abstract

Pada proses penggilingan padi, sekitar 20-22 persen dari berat padi akan menjadi sekam. Salah satu potensi dari sekam padi adalah kandungan silikanya. Untuk menghasilkan silika tersebut, dapat dilakukan dengan cara ekstaksi alkalin atau dengan membakar sekam di dalam tungku. Namun, pembakaran sekam padi untuk menddapatkan silika amorf membutuhkan temperatur dan waktu pembakaran yang tepat. Untuk mengendalikan temperatur ruang pembakaran seperti yang diinginkan, peran dari operator tungku menjadi sangat penting. Beberapa studi pengendalian tungku pembakaran telah dilaksanakan, baik teknik konvensional (kendali PID) maupun teknik kendali modern. Penelitian ini akan mengaplikasikan teknik kendali gabungan konvensional dan modern, yaitu FGS-PID, untuk mengontrol temperatur pembakaran sekam padi. Berdasarkan hasil simulasi, teknik FGS-PID memberikan performansi yang lebih baik dibandingkan dengan kendali PID konvensional, baik untuk tungku yang kosong maupun saat pembakaran sekam padi.
SISTEM PAKAR PENYAKIT KUCING MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB Miryam Petrus; Ilin Sukma; Gafrun Gafrun
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (858.621 KB) | DOI: 10.55679/semantik.v5i2.8544

Abstract

Cats are one of the animals that are popular among people of various backgrounds and ages. Often cat owners feel confused about the disease suffered by their pets so that they need the help of an expert who understands cat disease. So we need an application that can help in solving problems. The design of the system used is UML (Unified Modeling Language). While the method used in the application built is Forward Chaining using the Depth First Search algorithm. The expected outcome of this research is an application that can help the public know the disease as well as quick solutions and prevention to take action on pet cats. Keywords-Expert System, Depth First Search.
Penerapan Metode Naïve Bayes Clasification Dalam Klasifikasi Jenis Penyakit ISPA Yuwanda Purnamasari Pasrun
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2154.732 KB) | DOI: 10.55679/semantik.v5i2.8588

Abstract

ARI is the leading cause of infectious disease morbidity and mortality in the world. Nearly four million people die from ARI each year, 98% of which are caused by lower respiratory tract infections. Mortality rates are very high in infants, children and the elderly, especially in countries with low and medium per capita incomes. Likewise, ARI is one of the main causes of consultation or hospitalization in health care facilities, especially in the child care department. Lepo-Lepo is one of the health service units in the Lepo-Lepo sub-district of Kendari, which has data on patients with ARI. From the recapitulation results and medical reports of UPT Lepo-Lepo Puskesmas, ISPA is one of the diseases that is often suffered by patients in the Lepo-Lepo Puskesmas. The diagnosis results given are only in the form of positive or negative information, there is no information on the category of ARI suffered by patients including ISPaA or ISPbA so it is necessary to recognize patterns. One of the tasks of Data Mining is data classification, which is mapping (classifying) data into one or several classes that have been previously defined. From the research results obtained, from 50 data of ISPA patients tested, the results obtained using the naïve bayes method, using cross validation with 10 training data from 50 data, 96% correct and 4% wrong so that the application of the naïve bayes method in the type classification ARI can be applied ..
Penerapan Algoritma Apriori Sebagai Rekomendasi Menu Itemsets di Trotoar Steak Kafe Susanto Susanto; Budi Santoso; Putri Danisa
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1284.755 KB) | DOI: 10.55679/semantik.v5i2.7078

Abstract

Bisnis kecil dibidang makanan dan minuman  sekarang sedang marak. Terutama pembisnis yang mengedepankan konsep  kafe dan online. Trotoar steak cafe, sebagaimana prinsip berbisnis, mencari keuntungan merupakan tujuan operasional kafe, maka untuk memenuhi tujuan operasional sekaligus mempertahankan kegiatan operasional dalam persaingan dunia bisnis, diperlukan suatu strategi yang dapat meningkatkan penjualan. Tidak mudah untuk menumbuhkan minat beli sebelum akhirnya konsumen memutuskan untuk membeli suatu produk. Salah satu bentuk promosi agar lebih terarah dan tepat sasaran salah satu caranya adalah mengetahui selera beli konsumen  yang  dapat diamati melalui data-data pembelian di Trotoar Steak Kafe Lubuklinggau. Minimnya alat hitung untuk menentukan pola kombinasi menu yang paling di minati oleh konsumen maka dibutuhkan sistem  yang nantinya dapat membantu proses promosi penjualan di Trotoar Steak Kafe menggunakan data mining algoritma apriori. Algoritma Apriori sangat dimanfaatkan dalam proses penjualan, dengan memberikan hubungan antar data dan penjualan, dalam hal ini makanan atau minuman yang dipesan sehingga akan didapat pola pembelian konsumen. Pihak kafe memanfaatkan informasi tersebut untuk mengambil tindakan bisnis yang sesuai, dalam hal ini informasi dapat menjadi bahan pertimbangan untuk menentukan strategi penjualan selanjutnya.
Comparison of the Effectiveness of the Weighted Moving Average Method and Single Exponential Smoothing for Forecasting the Number of Telkomsel Customers Idzanul Iksan Sinatra; Bambang Pramono; Statiswaty Statiswaty
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3878.905 KB) | DOI: 10.55679/semantik.v5i2.7210

Abstract

PT. Telkomsel almost controls 90% market share in Indonesia with more than 196 million subscribers in 2017. Grapari Kendari City as a service center for Telkomsel customers in Southeast Sulawesi still does not have a system to predict the number of its customers. This resulted in the loss of potential services that should have been able to be provided such as the construction of branch offices in areas that have the potential to have a high number of customers to provide overall service to customers. To overcome this problem, a system will be created that can assist in managing customer data and predict the number of customers using forecasting algorithms with weighted moving average methods and single exponential smoothing methods as a comparison to see the effectiveness of the methods used. After a comparative analysis was found, 6 of the 8 cities / regencies used as the research data showed the Mean Absolute Error (MAD), the Mean Squared Error (MSE) and the Mean Absolute Percentage Error (MAPE) Single Exponential Smoothing method smaller than the Weighted Moving Average method. This is because the Single Exponential Smoothing method is in accordance with the data pattern of growth in the number of Telkomsel Region Southeast Sulawesi customers, namely horizontal data patterns or data patterns that fluctuate around a constant average value.

Page 1 of 2 | Total Record : 13