cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 345 Documents
PERANCANGAN DAN IMPLEMENTASI PRIVATE CLOUD STORAGE STUDI KASUS : JURUSAN TEKNIK INFORMATIKA UNIVERSITAS HALU OLEO LM Fid Aksara; Sitti Najmia Rifai; Sutardi Sutardi
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.349 KB) | DOI: 10.55679/semantik.v4i1.4337

Abstract

Teknologi penyimpanan data secara terpusat dengan Cloud Computing berbasis Cloud Storage menjadi salah satu solusi dari permasalahan penyimpanan data secara fisik. Cloud Storage sendiri merupakan media penyimpanan yang dalam pengaksesannya memerlukan jaringan internet. File dan data disimpan di komputer dimana pengguna harus membuat akun Cloud Storage terlebih dahulu. Selama komputer yang digunakan terhubung dengan internet, pengguna tidak perlu lagi menggunakan flashdisk, hardisk atau perangkat keras penyimpanan lainnya untuk keperluan mobalitas penyimpanan data. Hasil yang didapatkan pada penelitian ini bahwa sistem Private Cloud Storage dapat berjalan dengan baik. Tolak ukur keberhasilan dapat dilihat dari hasil pengujian sistem Private Cloud Storage menu yang ada dapat berjalan dan berfungsi dengan baik. Pemberitahuan aktivasi akun menggunakan SMS Gaateway, pemberitahuan melalui SMS Gateway ini akan secara realtime memberikan pemberitahuan kepada user apabila user telah diterima oleh admin apabila tidak terkendala masalah koneksi signal yang kurang baik, user dapat mengupoload file tanpa batasan ukuran file tetapi disesuaikan dengan kapasitas server.
IMPLEMENTASI PENGENALAN FINGER VEIN PADA SISTEM PEMBAYARAN MENGGUNAKAN METODE LLBPh Dewi Hastuti; Ika Purwanti Ningrum; Adha Mashur Sajiah; Jayanti Yusmah Sari
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (236.126 KB) | DOI: 10.55679/semantik.v4i1.4483

Abstract

Payment is one of the important activities that in the transaction process. Currently, technology that supports payment system is quite a lot, however in implementation technology used still has a various of a problem such as, pin code used can be stolen, duplicated, and didn't possibility someone can forge wt the pin code of the plastic card owned. One way that can be used to resolve this is identification by taking the unique characteristics of limb.Finger vein is one of the biometric images that can be used to recognize a person. Finger vein can be used as an effective, efficient, and economical tool of payment the role of plastic cards. In this research, the method used is Local Line Binary Pattern horizontal (LLBPh). This method has a good ability to recognize of patterns, can resolve the shading irregular image  and the image area that has a high saturation. Based on the experimental results that used, the LLBPh method produces an accuracy of 92.08 with the threshold value.Keywords—Finger Vein recognition, LLBPh, Payment
IDENTIFIKASI LANDMARK ORBITAL CEPHALOMETRY MENGGUNAKAN METODE FUZZY C-MEANS CLUSTERING Hasnawati Munandar; Ika Purwanti Ningrum; Jayanti Yusmah Sari
semanTIK Vol 4, No 1 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (634.464 KB) | DOI: 10.55679/semantik.v4i1.4486

Abstract

Orthodontics is a branch of dentistry. In orthodontic treatment, several analyzes are needed, one of them is cephalometry analysis. Basically, cephalometry analysis is done manually, but this method requires a lot of time. In line with this, a computerized application is needed as a solution. In cephalometry analysis some landmarks are used as reference fields. Orbital is one of the landmarks that are difficult to identify. Orbital is located at the lowest point between the region of the eye cavity and the lower edge of the Orbital bone. One way to find Orbital landmarks is to segment the Orbital region. The segmentation aims to clearly separate the eye regions and Orbital bone in the cephalogram image. Fuzzy C-Means Clustering method is a segmentation method that can produce a clearer region partition. For this reason, the Fuzzy C-Means Clustering method is applied to get better segmentation results of the Orbital region so that the results of identification of the correct Orbital landmarks are obtained. Based on the results of testing on 90 image data provide an accuracy of 82.2% identification results with a cropping template size of 180 x 180 pixels.Keywords—Cephalometry Analysis, Fuzzy C-Means Clustering,  Landmark Cephalometry, Orbital  
RANCANG BANGUN APLIKASI PENDETEKSIAN KESAMAAN PADA DOKUMEN TEKS MENGGUNAKAN ALGORITMA ENHANCED CONFIX STRIPPING DAN ALGORITMA WINNOWING Muhammad Nur Khidfi; Isnawaty Isnawaty; Jayanti Yusmah Sari
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.875 KB) | DOI: 10.55679/semantik.v4i2.4335

Abstract

With the development of technology, the increase of acts of plagiarism in the world of education. Many students who did plagiarism in doing their task, thesis etc. Therefore, an application that can detect the similarity between text documents is required. This research used Enhanced Confix Stripping (ECS) Stemmer algorithm for text stemming process and Winnowing algorithm to calculate the similarity between documents. By specifying the gram and window values of the Winnowing algorithm, it made easier for the user to use the application without being confused to determine the value of the gram and the window to produce an accurate equality value. From the test results 5 pairs of chapters 1 thesis of students who categorized together produced a similarity score of about 45-20%.Keywords: Enhanced Confix Stripping (ECS) Stemmer, Winnowing, Similarity, Plagiarism.DOI: 10.5281/zenodo.1407866
ANALISIS PERBANDINGAN TOOLKIT RECUVA DATA RECOVERY DAN STELLAR PHOENIX WINDOWS DATA RECOVERY UNTUK DIGITAL FORENSIK Handrizal Handrizal
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1834.304 KB) | DOI: 10.55679/semantik.v4i2.4692

Abstract

This paper presents an analysis with two digital forensic toolkits for deleted data scenarios. The used toolkit is Recuva Data Recovery and Stellar Phoenix Windows Data Recovery. They can recover data that is being and analyzed in a USB flash drive. The results of the comparison that the two toolkits can work well regarding finding data that has been discarded or in recovering the deleted data.Keywords—Data, Recovery, Forensic, Recuva, Stellar DOI: 10.5281/zenodo.1438737
ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK Wa Ode Zamalia; LM. Fid Aksara; Muh. Yamin
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.307 KB) | DOI: 10.55679/semantik.v4i2.4338

Abstract

Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to apply to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.Keywords— Layer 2 Tunneling Protocol, Point to Point Tunneling Protocol, Quality of Service (QoS), Secure Socket Tunneling Protocol, Virtual Private Network DOI: 10.5281/zenodo.1444898
IMPLEMENTASI KEAMANAN SERVER PADA JARINGAN WIRELESS MENGGUNAKAN METODE INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) (STUDI KASUS : TECHNO’S STUDIO) Muhammad Sadam Husain; LM Fid Aksara; Natalis Ransi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.922 KB) | DOI: 10.55679/semantik.v4i2.4310

Abstract

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Techno's Studio is a company engaged in technology and is a company that uses wireless technology as one of the important components in the activities of everyday employees. Therefore, server security issues on wireless networks become very important, because without any security support can lead to system failure and can be a gap in the occurrence of hacking.The IDPS method (Intrusion Detection & Prevention System) is used as an attack detection and prevention system by blocking Internet Protocol (IP) attackers. The results obtained from this research is the use of Snort and IPTables as a server security system on the wireless network successfully overcome the type of attack on ICMP ports, FTP, SSH, TELNET, and HTTP using various tools of attackers such as angry IP scanner, FileZilla, Putty, Mozilla Firefox, and Zenmap.Keywords— Server, Wireless, Intrusion Detection & Prevention System (IDPS), Snort, IPTables DOI: 10.5281/zenodo.1407864
DESAIN DAN IMPLEMENTASI VIRTUALISASI BERBASIS DOCKER UNTUK DEPLOYMENT APLKASI WEB Sulastri Apridayanti; Isnawaty Isnawaty; Rizal Adi Saputra
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.774 KB) | DOI: 10.55679/semantik.v4i2.4413

Abstract

Building a program through virtualization, developers usually run virtualization on the server so that the process of making the program can run on various platforms and hardware configurations. The problem with virtualization is the need to set up a complete operating system, including the various applications that the system brings. You can imagine with the number of virtualization that runs on a server will burden the system.Docker is one platform built on container technology. Docker is an open-source project that provides an open platform for developers and sysadmins to build, package and run applications anywhere as a lightweight container.The results obtained in research conducted is a web application wherein implementing server virtualization techniques using Docker for application deployment is successful. The application used is a trading application that is stored on Docker Server where both Client successfully using the application on different platforms that are Windows 7 and Windows 8 without experiencing any obstacles at all.Keywords— Virtualization, Docker, Web Application
PEMBANGUNAN APLIKASI KEAMANAN PESAN CHATTING DENGAN MENERAPKAN ALGORITMA TINY ENCRYPTION ALGORITHM (TEA) BERBASIS CLIENT SERVER Tasya Asprina; Muh. Yamin; Sutardi Sutardi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.067 KB) | DOI: 10.55679/semantik.v4i2.4669

Abstract

The development of information technology now allows one to exchange information through a computer network. One that is used in exchanging information is a chat application. The chat application is used to chat two people or more in realtime via the internet network. In exchanging information, a data security is needed, one of the data security that is done is encryption on the message. Encryption is done to change from the original message to a message that is not easy to read (ciphertext). Then a TEA (Tiny Encryption Algorithm) algorithm is applied.The results obtained in this study that the TEA algorithm can be implemented on chat messages for encryption and decryption of text messages. The process of testing encryption and decryption on messages is fast. Can be seen from the test table the application that encrypts text messages of various sizes using the same key produces a difference in the encryption and decryption time is not too large, with only a few seconds difference.Keywords—Chatting, Cryptography, TEA, Encryption, DecryptionDOI: 10.5281/zenodo.1468233
ANALISIS DAN PERBANDINGAN WIRELESS DISTRIBUTION SYSTEM (WDS) DAN NON WIRELESS DISTRIBUTION SYSTEM (NON WDS) BERBASIS OPENWRT MENGGUNAKAN ACCESS POINT PADA JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Wahyuddin Aluddin; LM Fid Aksara; Jumadil Nangi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.842 KB) | DOI: 10.55679/semantik.v4i2.4699

Abstract

The wireless network is one of the best alternatives in building a network of computers that is practical, in some agencies and the commercial wireless network is used to support an existing wired network. But its implementation is still used cable network that became the backbone of the access point so that a client that is connected can access the internet. Wiring problems can be a considerable obstacle in places that are hard to reach.The wireless distribution system is a system for developing a wireless internet network without having to use a cable as a backbone for the access point but instead of utilize a wireless line of the access point. At the time of the wireless distribution system network, topology and network topology of the non-wireless distribution system is applied, will be on analysis using Wireshark, the QoS parameter application that consists of a Delay, Throughput, and Packet Loss.The testing performed against the clients who are numbered six (6) is each connected to the access point. Scenario testing is done i.e. the conditions streaming and download, made during the three (3) days. Of test results obtained, the wireless distribution system network topology has the value throughput, delay; packet loss is a little less useful than a non-network topology wireless distribution system. But the differences in the average value of the QoS parameters that are generated are not too significant.Keywords—Wireless Distribution System, Non-Wireless Distribution System, Quality of Service (QoS)