cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
SemanTIK : Teknik Informasi
Published by Universitas Halu Oleo
ISSN : 24601446     EISSN : 25028928     DOI : http://dx.doi.org/10.55679/semantik.v8i1
Jurnal "semanTIK" merupakan salah satu media publikasi hasil-hasil penelitian dalam bidang teknologi informasi. Kajian penelitian dalam jurnal yaitu Rekayasa Perangkat Lunak, Jaringan Komputer, Sistem Cerdas, Sistem Informasi dan Robotika. Sasaran dalam penerbitan jurnal ini adalah Dosen, Mahasiswa dan para Peneliti dalam bidang TI.
Arjuna Subject : -
Articles 345 Documents
KEAMANAN DAN PENYISIPAN PESAN TEKS PADA GAMBAR DENGAN KRIPTOGRAFI METODE HILL CIPHER DAN STEGANOGRAFI METODE END of FILE Miming Mardianti; Sutardi Sutardi; LM. Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (656.34 KB) | DOI: 10.55679/semantik.v5i1.6094

Abstract

The security and confidentiality of data are one of the aspects that are very important in information systems at this time. Rapidly development of science and technology allows the emergence of new techniques, which can be misused by certain parties that threaten the security of information systems. The existence of these things needs to be applied to data security techniques to anticipate threats such as techniques of cryptography and steganography. This study combines two techniques securing data i.e. cryptography Hill Cipher (HC) method and steganography End of File (EoF) method. The results obtained from a combination of methods HC and EoF were successfully implemented in the process of encryption and decryption text messages which will then be inserted into the picture. The message was successfully inserted and extracted back on all sample images either by formatting *.jpg and *.png as well as at a resolution of 256x256 pixels and 512x512 pixels. Based on the results of the test image using MSE and PSNR resulting image quality is not good because the average value of the MSE obtained high 11263.113 and the value of average PSNR low 15.299 dB good image resolution 256 x 256 pixels and 512x512 pixels.Keywords—End of File, Hill Cipher, Cryptography, SteganographyDOI : 10.5281/zenodo.3255127
PEMANFAATAN OPEN SOURCE OWNCLOUD SEBAGAI MEDIA PENYIMPANAN DATA BERBASIS CLOUD COMPUTING Firmansyah Amin; LM. Fid Aksara; Sutardi Sutardi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (531.892 KB) | DOI: 10.55679/semantik.v5i1.5205

Abstract

Cloud Computing technology can be a solution to overcome the problem of storing data on a computer that is often used by many people. One of them is the OwnCloud application service. OwnCloud is an open source software, which means that anyone can use it for free and change the contents of the service. With the concept of cloud storage, users who access OwnCloud must log in first to access data located in the cloud storage. By utilizing a WiFi network to access OwnCloud, all forms of data sharing and synchronization can be accessed on the features provided.Difficulties of staff, lecturers and students to share study program data become difficulties that hinder activities in the academic community. So the results of this study conclude that OwnCloud services can be an efficient solution in managing files if implemented on a centralized campus.Keywords—Cloud Computing, Cloud Storage, Storage, OwnCloudDOI : 10.5281/zenodo.3066822
KLASIFIKASI JENIS PELAPORAN DI LAMAN PROPAM POLDA SULAWESI TENGGARA MENGGUNAKAN METODE ROCCHIO Muh Saiful; Natalis Ransi; Jumadil Nangi
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (16.004 KB) | DOI: 10.55679/semantik.v5i1.5993

Abstract

Service is the major thing in an organization. PROPAM Polda Sultra is one of the government institutions that have utilized telecommunications technology, namely complaints or online reporting pages. This technology is used to simplify and accelerate the delivery of information from the public to PROPAM Polda Sultra either in the form of complaints or reports for police who violate. The increasing number of reports of public complaints every day resulted in many reports that have not been responded to or unread. Therefore, the need to classify complaints reports automatically is needed to make time and human resources effectively in grouping complaints reports. The research was conducted with using Text Mining, the Rocchio method and using Tf-IDF weighting.Based on the results of testing, Rocchio algorithm has a good performance for the classification of types complaint report. This is evidenced in manual testing and system testing using complain report and then classified into eighth categories of Immoral, Traffic Accident, Narcotics, Poor Service, Persecution, Threatening, Insult and Deviations in Carrying Out Tasks (Case Handling). The results of classification using 79 reports obtained 89,87% accuracy.Keywords—Service, Public Complaints, Rocchio, Text Mining, TF-IDFDOI : 10.5281/zenodo.3255093 
SISTEM KONTROL DAN MONITORING TANAMAN HIDROPONIK SECARA REAL TIME MENGGUNAKAN METODE FUZZY INFERENCE SYSTEM MODEL TSUKAMOTO Rizaldy Setiawan Hasanuddin; Isnawaty Isnawaty; Rizal Adi Saputra; Statiswaty Statiswaty
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.756 KB) | DOI: 10.55679/semantik.v5i1.4726

Abstract

The hydroponic plant is the technique of cultivating plants (fruits, vegetables, and flowers) by utilizing water and not using soil as a planting medium. Internet of Things (IoT) is the communication between one device and another with the help of software through the internet network. The one method for controlling IoT is using Fuzzy Tsukamoto. The Tsukamoto method is an extension of monotonous reasoning.In Tsukamoto's method, each consequence of  If-Then form rule must be represented by a fuzzy compilation with an affiliation function. The advantages of Fuzzy Tsukamoto system are the mathematical concepts that underlie fuzzy reasoning is very simple and easy to understand. In applying  Fuzzy Tsukamoto in the determination of control and monitoring of hydroponic plants in real-time-based, it functions very efficiently and simplifies work. Keywords—Hydroponic Plants, IoT, Fuzzy Tsukamoto.DOI : 10.5281/zenodo.2781533
IDENTIFIKASI CITRA TANDA TANGAN MENGGUNAKAN LOCAL BINARY PATTERN (LBP) PADA SMARTPHONE BERBASIS ANDROID Ayu Sabrina Syair; Muh. Ihsan Sarita; Ika Purwanti Ningrum
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1325.868 KB) | DOI: 10.55679/semantik.v5i1.5200

Abstract

Signatures are currently used by the majority of the public to authorize a document or as proof of transaction. The signature is a unique writing style of someone's name or as an identification sign of that person. This application uses the Local Binary Pattern (LBP) method as its feature extraction and Manhattan Distance as recognition. The LBP operator is a texture descriptor that uses a comparison of gray values of neighboring pixels. For training, data retrieval is done by collecting data 10 times from 50 participants with the amount of training data of 500 samples. The test is done 5 times each participant with the test results on average by 80.8% and the highest test by 94%.Keywords—Hand Signature, Local Binary Pattern, Manhattan Distance DOI : 10.5281/zenodo.2650530
PEMODELAN STABILITAS BENDUNG MAROS DENGAN MENGGUNAKAN APLIKASI SAP2000 Riswal Karamma; Ahmad Syarif Sukri
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1292.03 KB) | DOI: 10.55679/semantik.v5i1.6288

Abstract

Analysis of the stability of the weirs can be compared with the results of the modeling application using SAP2000 stability that can reveal a condition safe and critical of the results of the design of weirs. The results of modeling the structure of maximum voltage-generating dam hold 30.354186 t/m2 occurred in the bottom of the pond while the maximum voltage refuses 16.811126 t/m2 occurred in the top of the outdoor refuse. A load of mud shows a voltage of-4.194299 t/m2 and 2.626117 t/m2, load the normal voltage-generating water 47.18661 t/m2 and 31.412491 t/m2 load voltage-generating flood water 24.214049 t/m2 and 11.098479 t/m2. The results suggested the presence of part of the structure that is experiencing a critical condition. Part of the structure that has the maximum voltage value is the weakest part of the construction area.Keywords—Stabilility,Weir, SAP2000 DOI : 10.5281/zenodo.2652067
PERAPAN METODE CERTAINTY FACTOR PADA APLIKASI PAKAR SELEKSI TES KEPRIBADIAN CALON KARYAWAN Cep Adiwihardja; Puteri Syanti Mahadewi; Widiarina Widiarina
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (765.849 KB) | DOI: 10.55679/semantik.v5i2.8376

Abstract

Pada dunia kerja, banyak perusahaan yang memanfaatkan seorang psikolog (pakar psikologi) untuk menyeleksi calon karyawan karena penempatan karyawan yang tepat dapat membantu untuk meningkatkan produktivitas perusahaan.  Penyeleksian calon karyawan melalui metode wawancara saja tidak akan cukup untuk menentukan calon karyawan tersebut layak atau tidak diterima, karena pada prakteknya terkadang kinerja yang diberikan tidak sesuai dengan hasil wawancara (interview). Di samping itu, biaya seorang psikolog yang cukup mahal membuat beberapa perusahaan kecil dan menengah lebih memilih tidak merekrut seorang psikolog sebagai divisi human resource. Oleh karena itu sebuah sistem pakar analisa kepribadian diharapkan dapat menjadi salah satu alternatif solusi agar proses penyeleksian lebih efisien dan optimal. Metode yang digunakan adalah Certainty Factor, pada metode tersebut dapat mengatasi ketidakpastian pengambilan keputusan dikarenakan dibutuhkan beberapa tes yang lebih kompleks dan lengkap untuk menentukkan kepribadian seseorang. Aplikasi ini akan memberikan hasil analisa tes berupa kecenderungan terbesar tipe kepribadian yang dimiliki calon karyawan sesuai jawaban yang diberikan beserta jumlah persentasenya. Berdasarkan penilaian pakar untuk ketepatan sistem dalam menganalisa kepribadian calon karyawan, terlihat bahwa aplikasi sistem pakar analisa tipe kepribadian ini memiliki tingkat rata-rata akurasi sebesar 90.84%.
Implementasi Teknologi Enkripsi URL (Uniform Resource Locator) dan Login Form Menggunakan Algoritma Blowfish Untuk Mencegah Serangan SQL Injection Waode Hardianas Shalawati; Muhammad Yamin; Natalis Ransi
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.312 KB) | DOI: 10.55679/semantik.v5i2.7472

Abstract

Security of a website is a very important aspect. Because unsafe websites will easily be damaged the integrity of the data  and information through various attack. SQL Injection is one type of attack that often occurs on websites. SQL Injection is a method for entering SQL commands as an input through a web to get database access. Insecure URLs and Login forms are often targeted by SQL Injection attacks to exploit web databases. There are many ways to prevent SQL Injection attacks and one of them uses cryptographic techniques to encrypt URLs and Login Forms of websites into an incomprehensible codes or passwords. The cryptographic method used is blowfish algorithm. This research aims to  tests the performance of blowfish to prevent SQL Injection attacks through the implementation of URL and Login Form encryption. Web security from SQL Injection attacks is tested before and after encryption. Attack testing is done manually and automatically. Automatic testing using SQL Map and JSQL Injection applications. The test results prove that the implementation of URL and login form encryption uses blowfish algorithm is effective to prevent SQL Injection attacks because SQL Injection attacks always fail after implementation of URL and Login Form encryption.
PENERAPAN ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) UNTUK MENGAMANKAN FILE PADA LAYANAN INFRASTRUCTURE AS A SERVICE (PRIVATE CLOUD STORAGE) STUDI KASUS: FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Muh.Muchsin Al-As'Ad Mirsyah; LM Fid Aksara; Adha Mashur Sajiah
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.318 KB) | DOI: 10.55679/semantik.v5i2.6708

Abstract

A technological development has been affecting the advancement of storage media on computers from time to time. One of the advancement types is the cloud-based store media, in this case, Cloud refers to a metaphor of internet files and data stored on a computer where the users are required to create a Cloud Storage account. Cloud Storage is a storage media that requires access to an internet network. It means as long as the computers are connected to the internet, users no longer need to use a USB flash drive, hard drive or other storage hardware for data storage mobility. However, the security of files and data on Cloud Storage is still very vulnerable to be attacked or retrieved in the database, along with the development of increasingly sophisticated computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Most recently, the Advanced Encryption Standard (AES) is a secure cipher algorithm for protecting confidential data or information. The results of this study show that the Private Cloud Storage System is able to run well which can be seen from the results of testing this private cloud storage system, all existing menus can run and function properly and from the results of encryption and decryption tests that have been performed on eight types of files show that the  testing of six types of files are successful, namely images, .doc, .pdf, .xsls, .ppt, and .txt, whereby those of six types of files are safe based on security testing. For .doc, .xsls, and .txt files when those are opened the files become scrambled. Furthermore, for images, .pdf, and .ppt files an error display will appear when those are opened. Meanwhile, the other two files which are the .mp3 and video type files failed because the algorithm is not able to encrypt and decrypt the file types Keywords— Cloud Computing, Private Cloud Storage, AES, Encryption, Decryption
IMPLEMENTASI DEEP LEARNING DENGAN METODE CONVOLUTIONAL NEURAL NETWORK UNTUK IDENTIFIKASI OBJEK SECARA REAL TIME BERBASIS ANDROID Indra Fransiskus Alam; Muhammad Ihsan Sarita; Adha Mashur Sajiah
semanTIK Vol 5, No 2 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.817 KB) | DOI: 10.55679/semantik.v5i2.7554

Abstract

The development of artificial intelligence has now undergone significant changes. This underlies the birth of a method to deal with object detection in real time with high accuracy. Basically Deep Learning is the implementation of the basic concept of Machine Learning which applies the smart algorithm with more layers between the input layer and the output layer. Convolutional Neural Network (CNN) is one method of Deep learning (DL) that can be used to detect and recognize an object in a digital image. The ability of CNN is claimed to be the best model to solve the problem of object detection and object recognition because it is a development of the backpropagation method and does not require large computation in the process. The results obtained in this study that android applications can run well with an accuracy of 92.33% can be seen from the test results using the 10-fold cross validation method, all available menus can be run and the mention of object labels is appropriate for image recognition and classification. Calculation of precision and recall has good values, each at 97.51% and 94.33%. In the classification process, objects that do not exist in datasets that have been modeled by the system will be null or unrecognized, especially in the image of an object captured by an Android camera that has many objects and is close together