cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 345 Documents
APLIKASI DAERAH RAWAN PENYAKIT MENGGUNAKAN ALGORITMA COMPLETE LINKAGE CLUSTERING Uun Amalia Ramadhani; Natalis Ransi; Jumadil Nangi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (16.865 KB) | DOI: 10.55679/semantik.v5i1.6033

Abstract

Kendari City Health Office is a group that has one task to control the spread of a certain particular disease. To carry out its duties and functions, ideally, the Health Office must have the ability to divide areas that are vulnerable and not prone to disease. To facilitate the dividing, this study was made which aims to build an application that is implemented using the complete-linkage clustering method by forming clusters of data on the number of cases of the disease in 10 sub-districts in Kendari City in 2012 to 2016. Identified diseases are DHF, Diarrhea, and TB. Algorithm Complete Linkage Clustering is a group analysis method that attempts to build a hierarchy of data groups, grouping data with two or more objects that have the closest similarity, then proceed to another object that has a second closeness. The results showed that the areas prone to DHF were Kadia and Wua-Wua sub-districts with an index value of 47.80. Areas that are prone to Diarrhea disease are Puuwatu sub-district with an index value of 1181.40, area which is susceptible to TB disease is West Kendari sub-district with an index value of 92.40. The system can group and map disease-prone areas in the city of Kendari, using Complete Linkage Clustering.Keywords—Complete-Linkage Clustering, Health Service, Dengue Fever, Diarrhea, Tuberculosis (TBC) DOI : 10.5281/zenodo.3183951
PEMODELAN PEMBEBENAN GAYA PADA STRUKTUR DERMAGA DENGAN APLIKASI SAP2000 Ahmad Syarif Sukri; Riswal Karamma
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1454.232 KB) | DOI: 10.55679/semantik.v5i1.6302

Abstract

The dock is one of the port facilities that serve as a place to dock the ship in the process of loading and unloading. This study only focuses on designing docks with Deck on Pile types. The Deck on Pile type dock structure is designed strongly against the loads that work on it both its own weight and those from the environment which include wind, waves, currents and earthquakes and the load due to activities on the dock include berthing load, mooring load, and vehicle load. In this study, an analysis of the data on the physical conditions of the field includes hydro oceanography, topography, bathymetry, ship design data and design of the pier. Dock structure design includes structural dimensions, structural strength analysis using SAP2000 application.Keywords—Pier Design, Deck on Pile, Structure DOI : 10.5281/zenodo.2783984
APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN MAN IN THE MIDDLE ATTACK (MITM) DENGAN METODE SNIFFING Sri Wayun Wardani; Sutardi Sutardi; Statiswaty Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.237 KB) | DOI: 10.55679/semantik.v5i1.6207

Abstract

An increasing number of mobile phone users and the number of Short Message Service (SMS) delivery between users, securities SMS sending an issue that deserves to be noticed. SMS industry into one vulnerable point to attack a security threat. The security hole on SMS communication is a message sent will be stored in the Short Message Service Center (SMSC), so that in case of attack Man In The Middle (MITM) at the SMSC then sent messages to be read by those who tapped one of them is sniffing activity. So, we need a safeguard against the activity of the exchange of messages via SMS. One of them is by using cryptography. Cryptography is a technique to secure the message so that the message conveyed to arrive to the person intended, receives the message. Cryptography is composed of two main concepts that encryption and decryption. Encryption is used to process information becomes unrecognized and decryption is used to change the information that was not recognized into information that is recognizable as before encryption. By encrypting text, the level of information security of the message can be improved. Currently, the Triple-DES (Triple Data Encryption Standard) is a secure cryptography algorithm for encryption process is carried out in 3 stages but did not change the algorithms of DES in order to ensure the complexity of solving the results of Triple-DES encryption. Therefore, it can be prepared that, if the intruder was given a person or an attack using a sniffing methods, the received message by the perpetrators are not illegible.Keywords—Cryptography, Man In The Middle Attack, Sniffing, SMS, Triple-DES DOI : 10.5281/zenodo.3227231
PERBANDINGAN ALGORITMA HORSPOOL DAN ALGORITMA RAITA PADA APLIKASI ISTILAH PSIKOLOGI BERBASIS ANDROID Mamta Culkari Puding; Jumadil Nangi; Adha Mashur Sajiah
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (37.065 KB) | DOI: 10.55679/semantik.v5i1.5996

Abstract

The lack of professional health personnel in Indonesia has resulted in many people with mental disorders who have not been treated medically. To make it easier for the mental health workers, especially psychology students to study the term in psychology. It is necessary to have a digital dictionary because a tick printed book dictionary makes it difficult to carry around and the search term desired requires a long time. Based on this, a dictionary application for the psychology term based on Android was made.To make this application implemented the string matching method on the codeword search. String matching has several algorithms, some of which are Horspool algorithm and Raita algorithm.In this research study an analysis of the comparison between the Horspool algorithm and Raita algorithm, to determine the most useful algorithms in the dictionary of psychological terms. The parameter used to compare the two algorithms search time (ms) and complexity algorithms (Big-O).The results of this study show that Raita Algorithm has a faster search than Horspool Algorithm and the complexity of Raita algorithm has faster than  Horspool algorithm. The average total velocity of time for Raita algorithm is 13,60 ms and Horspool algorithm are 14,79 ms.  The complexity of Raita algorithm is T(n) = Ɵ(MN) and the complexity of Horspool algorithm is T(n) = Ɵ(M(N-2)).Keywords—Dictionary, Psychology, String Matching, Horspool Algorithm, Raita AlgorithmDOI : 10.5281/zenodo.3242287
IMPLEMENTASI METODE nth LOAD BALANCING DENGAN BAHASA PEMROGRAMAN PHP PADA MIKROTIK MENGGUNAKAN INTERNET SERVICE PROVIDER STUDI KASUS: XL DAN TELKOMSEL Ita Asriani; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2233.995 KB) | DOI: 10.55679/semantik.v5i1.5274

Abstract

 The development of computer network technology, especially internet networks (interconnection networking) is currently increasing. The development of technology in the internet network which is increasing is directly proportional to the increasing number of users (users) of the internet network itself. The need for the internet now becomes a basic necessity both for seeking information, data communication and personal communication making many companies and agencies that have integrated the internet network into business processes or work processes, but the limitation of large bandwidth rental costs is a lack of bandwidth can be used. One of the contributions of technology to improve this is to use two ISPs and make it as load balancing. The mechanism, which is the proxy router, will mark the package that wants to access the internet, then choose which ISP path to pass and equalize the load on the two ISPs. The Load Balancing method has provided optimal bandwidth, but load balancing cannot accumulate a large bandwidth of the two connections, because load balancing technique does not mean 1 + 1 = 2 but 1 + 1 = 1 + 1 and the application of nth Load Balancing method has divided the traffic load balanced at ISP 1 and ISP 2.Keywords—Load Balancing, nth, Bandwidth. DOI : 10.5281/zenodo.2652059
PENERAPAN DATA MINING DENGAN METODE K-NEAREST NEIGHBOR (KNN) UNTUK MENGELOMPOKKAN MINAT KONSUMEN ASURANSI (PT.JASARAHARJA PUTERA) Wa Ode Nurhayah Kadir; Bambang Pramono; Statiswaty Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.624 KB) | DOI: 10.55679/semantik.v5i1.6141

Abstract

Insurance comes from the word insurance, which means insurance. Insurance is an agreement between the insured (customer) and the insurer (insurance company). Data Mining is a way of finding hidden information in a database and is part of the Knowledge Discovery in Databases (KDD) process to find useful information and patterns in data. K-Nearest Neighbor (KNN) is a method that uses supervised algorithms where the results of newly classified query instances are based on the majority of the label classes on KNN. The purpose of the KNN algorithm is to classify new objects based on attributes and training data. The KNN algorithm works based on the shortest distance from the query instance to training data to determine the KNN. One way to calculate the short distance or distance of a neighbor using the Euclidean distance method. Euclidean distance is often used to calculate distances. Euclidean distance functions to test the size that can be used as an interpretation of the proximity of the distance between two objects.Based on the results of the testing carried out this application is able to make predictions by looking at the smallest error value. In motor vehicle insurance the smallest average value is found at k  =  4 at 0.103 and the highest accuracy value is at k  =  2 by 42%, personal accident insurance the smallest average value is at k  =  2 at 0.116 and the highest accuracy value is at k  =  2 by 67%, and fire insurance the smallest average value is at k  =  2 at 0.088 and the highest accuracy value is at k  =  2 at 67%.Keywords—Data Mining, Insurance, K-Nearest Neighbor DOI : 10.5281/zenodo.3116132
ANALISIS PERBANDINGAN REAL TIME STREAMING PROTOCOL (RTSP) DAN HYPERTEXT TRANSFER PROTOCOL (HTTP) PADA LAYANAN LIVE VIDEO STREAMING Ady Nopaldi Rombe; LM Fid Aksara; La Surimi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.783 KB) | DOI: 10.55679/semantik.v5i1.5329

Abstract

Streaming media is a technology that allows the distribution of audio, video and multimedia data in real time via the internet. One category of streaming media is video streaming. Video streaming is sending digital media in the form of video, sound, and data so that it can be received continuously. Real Time Streaming Protocol (RTSP) is a protocol at the application level that functions to control sending data in real time. RTSP uses and provides an extensible framework to control on-demand data transmissions such as audio and video.HTTP (Hypertext Transfer Protocol) is a protocol for requesting and answering between client and server. An HTTP client such as a web browser usually starts a request by making a TCP/IP connection to a specific port in a remote place (usually port 80). Based on the results obtained from all experiments, it is known that the HTTP protocol is not recommended as a streaming media via the internet because based on the analysis of all tested parameters it has a very high Delay, Packet Loss, and small Throughput, whereas the RTSP from the results of the analysis on all that has been tested has the lowest QoS value.Keywords—Video Live Streaming, Real Time Streaming Protocol (RTSP), Hypertext Transfer Protocol (HTTP)DOI : 10.5281/zenodo.3243149
SISTEM PENDUKUNG KEPUTUSAN PEMBERIAN KREDIT MENGGUNAKAN METODE SIMPLE MULTI ATTRIBUTE RATING TECHNIQUE EXPLOITING RANK (SMARTER) PADA PT PERMODALAN NASIONAL MADANI (PNM) KOLAKA UTARA Arlingga Vanega Nurdin; Sutardi Sutardi; Ika Purwanti Ningrum
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (222.866 KB) | DOI: 10.55679/semantik.v5i1.4756

Abstract

The Decision Supporting System, known as DSS is part of a computer-based information system. DSS is expected to provide information that would provide an alternative solution to the problem that occurred. PT. Permodalan Nasional Madani through MMSU (Micro Model Service Unit), a product which was launched to bridge the limitation of customers in gaining access to credit decision. But in fact, there are some factors that hinder the process of granting credit financing facility to customers. The decision supporting system which is developed by the Writer is an application that can facilitate decision-making of granting credit in accordance with predefined criteria authorities in PT. Permodalan Nasional Madani North Kolaka branch using the Simple Multi-Attribute Rating Technique Exploiting Rank (SMARTER) method. This method is a method of comparing the criteria to reference criteria in order to find the value of the feasibility of each profile existing data. In the process of employee assessment using two criteria which consists of 5 sub-criteria and 15 sub-sub-criteria. The decision-making process of granting credit can be done quickly, accurately and in accordance with the criteria used in order to minimize the time. The result of the decision system generated by ranking the results of the feasibility form the highest to the lowest.Keywords—DSS, Credit Granting, SMARTER DOI : 10.5281/zenodo.3243149
IMPLEMENTASI WIRELESS SENSOR NETWORK PROTOTYPE SEBAGAI FIRE DETECTOR BERBASIS ANDROID MENGGUNAKAN PUSH NOTIFICATION Asril Azhar; Isnawaty Isnawaty; Subardin Subardin
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (782.079 KB) | DOI: 10.55679/semantik.v5i1.5109

Abstract

A fire detector is a device that serves to provide a signal or danger signal if there is a potential for fire. The Wireless Sensor Network (WSN) system that is implemented in this fire detector is built to detect fires in the form of smoke, gas, and temperature. The sensors used are smoke sensors (MQ-2) and temperature sensors (DHT11). This tool detects fires using sensors connected to the NodeMCU microcontroller. The detection data is then sent to Firebase continuously and sends push notifications to users or users in real time. The fire detector tool is able to detect early symptoms in a fire if the smoke sensor is worth 1 while the temperature sensor is worth above 30°C. From the results of the research obtained the success of the user receiving notifications is very dependent on the internet connection and the sensors used.Keywords—Fire Detector, Wireless Sensor Network, NodeMCU, Firebase DOI : 10.5281/zenodo.2636989
SISTEM MONITORING SERANGAN JARINGAN KOMPUTER BERBASIS WEB SERVICE MENGGUNAKAN HONEYPOT SEBAGAI INTRUSION PREVENTION SYSTEM Inda Sari; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1271.423 KB) | DOI: 10.55679/semantik.v5i1.5330

Abstract

Security is very important especially to maintain the integrity of data for internet service users. There are many ways to infiltrate computer networks, starting from just experimenting to trying to damage and steal important information on the server. One way to overcome this problem is by the existence of an attack prevention system or commonly referred to as the Intrusion Prevention System (IPS) so that an attack can not directly touch the data or files that others should not know.Honeypot is a system that is deliberately sacrificed in order to be attacked to obtain information from the activities of the attacker and to know the methods used in attacking a system. The results of attacks on the system can be displayed in a monitoring system and can also be displayed through a web service. The results obtained from this study that the creation of a web service -based computer network attack monitoring system uses a honeypot as an IPS successfully implemented. Attacks that enter through TCP ports are 33.96%, UDP 33.96%, and ICMP 32.07%.Keywords— Honeypot, Web Service, Intrusion Prevention System DOI : 10.5281/zenodo.2651714