cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 345 Documents
KOMPARASI METODE TOPSIS DAN MFEP DALAM PENENTUAN PEMENANG TENDER Ariska Rohanda Pakpahan; Dwi Indah Safitri; Horainim Sibarani; Puspa Ramadani; Ramainim Deviana Sibarani
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (491.063 KB) | DOI: 10.55679/semantik.v4i2.5195

Abstract

This study proposes a comparison between the TOPSIS and MFEP methods to get tender winners using the 2014 Distarukim data sample. This study was conducted to determine which method is better between the TOPSIS and MFEP methods in determining the tender winner. Tender Winners are companies that will carry out a job in accordance with a predetermined plan. Where the criteria used in this study are an arithmetic correction, administrative evaluation, technical evaluation, price fairness evaluation, evaluation of qualifications and verification of qualifications. This study took a case study in Distarukim with a sample of data using six alternatives that had different values for each of the criteria. The ranking results of the two methods are different where the results using the TOPSIS method are better because they match the sample data used. Using the TOPSIS method, the results of CV. Doly Prima Jaya as the winner of the tender followed by CV. Fira, CV. Abdi Jaya, CV. Raflindo, CV. Citra Abadi, CV. Zara Diva.Keywords— Comparison, DSS, TOPSIS, MFEP, TenderDOI : 10.5281/zenodo.2528141
CLUSTERING KABUPATEN/KOTA PROVINSI SULAWESI TENGGARA BERDASARKAN INDIKATOR KESEJAHTERAAN RAKYAT Andi Tenriawaru
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.478 KB) | DOI: 10.55679/semantik.v4i2.5235

Abstract

The problem of people's welfare is a problem that must be faced by developing countries such as Indonesia. Many indicators affect the level of people's welfare, such as population, education, levels and patterns of consumption, poverty, housing, and the environment. To make it easier in preparing plans or making decisions on issues of people's welfare, the government needs data and information regarding the level of people's welfare. Therefore, determining the level of people's welfare needs to be done.This study is intended to produce information on clustering districts/cities in Southeast Sulawesi Province based on indicators of people's welfare using the K-Means algorithm. The process of determining clusters consists of three processes i.e. Process of Collecting Datasets, Process of Clustering, and Process of Cluster Interpretation.The data used are data on people's welfare indicators from 12 districts/cities in Southeast Sulawesi for 2014. The data consists of seven variables, i.e. the Number of Health Facilities, Life Expectancy, the Projected Total Population, the Percentage of Non-Poor People, the Number of Administrative Regions, the Average Length of School, and Spending Per Capita. Based on the results of cluster analysis, it was found that the number of cluster members with low, medium, and high welfare indicators are 3, 6, and 3, respectively.Keywords—K-Means Algorithm, Cluster Analysis, Social WelfareDOI : 10.5281/zenodo.2528154
PERAMALAN TINGKAT PRODUKTIVITAS KEDELAI DI INDONESIA MENGGUNAKAN ALGORITMA BACKPROPAGATION Irvan Leonardo Sirait; Janter Manuel Gultom; Joel Tindaon; Rizki Josua Tampubolon; Widya Juli Mawaddah
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.569 KB) | DOI: 10.55679/semantik.v4i2.5196

Abstract

The soybean is an important food commodity in Indonesia. That's because soybean is one of the main sources of vegetable protein for the community. Therefore this research is done to know how big the development of productivity level of soybean in Indonesia in the future, so that later can be used as a reference for government and farmer to maximal again in managing soybean crop to avoid import soybean from other countries. The data used in this research is data of soybean productivity by the province in Indonesia year 2005-2015. The algorithm used is an Artificial Backpropagation Neural Network. This research uses 5 architecture, the best architecture is 5-12-1 with 82% accuracy percentage and MSE value equal to 0,00904753. Thus, this model is good enough to predict soybean productivity in every province of Indonesia.Keywords— Forecasting, Productivity, Soybean, Indonesia, BackpropagationDOI : 10.5281/zenodo.2528152
PEMILIHAN TOKO HANDPHONE TERBAIK DI KOTA PEMATANGSIANTAR MENGGUNAKAN METODE ORESTE Agustian Sinaga; Andri Andri; Mhd Ilham; Muhammad Fadly; Muhammad Irfan
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.734 KB) | DOI: 10.55679/semantik.v4i2.5189

Abstract

This study will discuss the selection of the best handphone stores in Pematangsiantar city. This research was conducted to find out the best handphone shop in Pematangsiantar city according to consumers given to consumers through questionnaires. This study uses the Decision Support System with the Oreste method. The Oreste method is one of the methods of Decision Support Systems that adopts Besson Rank, which is a priority scale approach from each indicator. The data used as alternatives are mobile shop data in Pematangsiantar with a sample of 5 stores with 5 assessment criteria, including Price, Quality on Mobile, Service, Consumer Attractiveness and Store Location. The steps carried out in choosing a mobile shop begin by analyzing the system that is running on the handphone shop, then from the results of the analysis the criteria are weighted on the handphone shop, then an alternative weighting is done at the handphone shop. After that, the results of the alternative weight ranking of the handphone shop are carried out. Based on alternative data and criteria using the Oreste method, it can be concluded that the best mobile shop is Selamat Cellular Shop with Preference Value from Distance Score value of 5.3556. Smaller than the other 4 stores.Keywords— Election, Handphone Stores, Pematangsiantar, Decision Support System, Oreste DOI : 10.5281/zenodo.2527918
PENERAPAN PROTOKOL ROUTING PROAKTIF OLSR PADA JARINGAN MOBILE AD HOC NETWORK (MANET) MENGGUNAKAN RASPBERRY PI UNTUK TRANSFER FILE Rico Dwi Kurniawan; Muh. Yamin; LM. Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (815.488 KB) | DOI: 10.55679/semantik.v5i1.6303

Abstract

The wireless network's users are increasingly used compared to wired networks. One of the developments of wireless networks is the existence of a technology called Ad Hoc network. Ad Hoc network is a solution where mobile devices such as laptops, tablets, smartphones, etc. can communicate with each other without the support of network infrastructure in the form of access points or means of supporting data transmission. Mobile Ad Hoc Network (MANET) is a multi-hop wireless network consisting of a collection of dynamic mobile nodes.Along with the development of technology, MANET began to be developed in anticipation if the central infrastructure of a network cannot be used. In this network, each node is a router that functions to determine the route that is closest to the nodes that communicate. Each node on the MANET network is also mobile so it is possible to be free to move, but this has an impact on the topology which keeps changing along with the movement of nodes.  In the test carried out file transfer is applied to the scenario of MANET infrastructure testing with three nodes with two conditions, namely the condition of the absence of interference with the MANET network and the condition when there is interference with the MANET network. file transfer testing on the MANET network can work in accordance with nature and network conditions that MANET has, but from the results of the analysis, the file transfer speed will decrease as the gateway nodes increase on the communication route between the node server and the client. Keywords—MANET, File Transfer Protocol (FTP), Optimized Link Stated Routing (OLSR)DOI : 10.5281/zenodo.2650753
ANALISIS PERFORMASI WIRELESS MESH MENGUNAKAN PROTOKOL HYBRID WIRELESS MESH PROTOCOL (HWMP) PADA JARINGAN MOBILE AD HOC NETWORK(MANET) Muhammad Darman Saleh; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (773.007 KB) | DOI: 10.55679/semantik.v5i1.6106

Abstract

The growing development of wireless technology in communication between users requires high-quality networks. This study aims to design a network and as a test parameter on the Wireless Mesh Network (WMN) using the routing protocol Hybrid Wireless Mesh Protocol (HWMP). This network is connected by using several access points that have been modified using OpenWRT software. The test parameters to be carried out are by testing the performance of the HWMP routing protocol in self-configure and self-healing as well as some supporting data from Throughput and Jitter. The data generated by using several access points and two (2) users produce data whereon self-configure can be done very quickly, unlike the case with self-healing which requires more time, the effect of inadequate access point location gives rise to network performance, not yet maximal, the existence of routing HWMP affects Throughput and Jitter generated by the user if the exchange of information in the condition always changes from one place to another. The average result of self-configuration is 100 bytes / 64ms, self-healing is 100 bytes / 187ms. Users of bandwidth 1 and 2 are 5,930 Kbyte / s and 5,210,170 Kbyte / s. Jitter values for users 1 and 2 are 1.554 ms and 1,699 ms. Throughput on users 1 and 2 is 0.283 Mbit / s and 4 Mbit/s. Keywords—WMN, HWMP, Firmware openWRT, Self-Configure, Self-Healing DOI : 10.5281/zenodo.3233134
IMPLEMENTASI ALGORITMA RC4 STREAM CIPHER SEBAGAI METODE OBFUSCATION STRING PADA DATABASE MySQL Muhammad Sholeh; Isnawaty Isnawaty; Bambang Pramono
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (903.853 KB) | DOI: 10.55679/semantik.v5i1.5199

Abstract

A database is a set of structured data and related to one another to form information. In the current technological development database management is very important considering the amount of information stored in the database of a system. One management that needs to be considered is the management of Database security.In securing the database there are many ways that can be used. One of them is by randomizing the contents of the database to confuse users who access the Database illegally. This randomization technique is called the Obfuscation String.One algorithm that can be used to randomize the database is the RC4 algorithm. This algorithm uses key lengths from 1 to 256 bits which are used to initialize tables as long as 256 bytes. This table is used to generate tables from a pseudo-random array using XOR operations with text to produce a ciphertext.The results of this study are a system that can randomize cell contents in a MySQL Database table using the RC4 Stream Cipher algorithm. From this study, it can also be concluded that the key length and the amount of data in the database table can affect the speed of program execution.Keywords—Database, Obfuscation String, RC4 AlgorithmDOI : 10.5281/zenodo.3066721
PENERAPAN METODE REGRESI POLINOMIAL ORDE n PADA PENGEMBANGAN APLIKASI INVENTORY (STUDI KASUS PT. LANDIPO NIAGA RAYA) Fitria Rihin Uyun; La Ode Muh. Golok Jaya; Natalis Ransi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (462.568 KB) | DOI: 10.55679/semantik.v5i1.6027

Abstract

Inventory or inventory management system is one of the problems often faced by the distributor company. Processing and analyzing data on the sale of goods at the company is very important to get an overview and information about inventory data in the coming period by using sales data in the previous period, then an application or system is made with the Data Mining field with one of its predictions with using the Polynomial Regression method. This system predicts by selecting products, orders and periods with prediction results of 324,076 for Indomie Goreng Spesial Jumbo products. After making a prediction, a forecasting test is carried out by calculating the error value and relative errors with the result of error value = 2,595 and relative error = 1.82%.Keywords— Forecasting, Polynomial Regression, InventoryDOI : 10.5281/zenodo.3255112
PERBANDINGAN MOTHER WAVELET DALAM SISTEM TEMU KEMBALI INFORMASI KEMIRIPAN MOTIF KAIN TENUN SULAWESI TENGGARA Wa Ode Rizqanun Karyima Bolu; Muh. Ihsan Sarita; Ika Purwanti Ningrum
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (986.563 KB) | DOI: 10.55679/semantik.v5i1.5309

Abstract

Information retrieval is a process, method, and procedure used to select relevant information and stored in a database. In libraries and archives, information retrieval is usually for known documents or for information about certain subjects. Information Retrieval System is used to rediscover information that is relevant to the needs of users of a collection of information automatically. Weaving motifs can be distinguished by the naked eye but not all people can distinguish motifs from each type of woven fabric due to the difficulty in defining the characteristics of woven fabric motifs from an area and the variety of motifs and compositions of colors available. Based on the data and facts that have been mentioned, wavelet can be used for extracting texture features in the Information Retrieval System, but further research is nApplication of Mother Wavelet in Retrieval System Similarity Information on Southeast Sulawesi Woven Fabric Motives gives good results needed to compare the optimal mother wavelet for the system. and among 4 types of wavelets, Haar with decomposition level 7 is the best feature extraction method compared to Daubechies 4, Symlets 2 and Coiflets 1. This is evidenced by faster computing time and the best percentage of precision, which is 95%.Keywords— Mother Wavelet, Information Retrieval, Weaving. DOI : 10.5281/zenodo.2649780
APLIKASI PENGAMANAN FILE BERTIPE *.PDF PADA VIDEO *.MP4 MENGGUNAKAN KRIPTOGRAFI VERNAM CIPHER DAN STEGANOGRAFI END of FILE Mulatifa Laliha; Sutardi Sutardi; Natalis Ransi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.051 KB) | DOI: 10.55679/semantik.v5i1.6203

Abstract

Security and confidentiality of messages in the communication process between the sender and receiver is an important thing that must be maintained so that the message would be difficult if not known by unauthorized parties. Cryptography Vernam Cipher is symmetric cryptography that used one time for a message and not reused. Steganography End of File (EoF) is one technique to insert data at the end of the file. Combine Vernam Cipher cryptography and EoF steganography on this research with a case study how the implementation of the security of *.pdf files on *.mp4 video. Based on the test results of *.pdf file encryption and steganography in video *.mp4 successfully performed on the size of small file size for use Vernam Cipher cryptography, plaintext length, and key length must be the same length, so that for large files will take a long time. The results of stegano show that the video files look like the original video can be viewed directly without that already is inserted in the video *.pdf, for EoF does not affect the quality of the video. It is concluded that the incorporation of Vernam Cipher Cryptography and EoF steganography successfully, where the process of implementing the algorithms when combined requires an average time of 65 seconds on the side Vernam Cipher cryptographic application due to the type of encryption key length is equal to the length of the plaintext.  Keywords—End of File, Cryptography,  Steganography, Vernam CipherDOI : 10.5281/zenodo.3253459