cover
Contact Name
Rika Susanti
Contact Email
rika.susanti@uin-suska.ac.id
Phone
-
Journal Mail Official
sntiki@uin-suska.ac.id
Editorial Address
-
Location
Kab. kampar,
Riau
INDONESIA
Seminar Nasional Teknologi Informasi Komunikasi dan Industri
ISSN : 25797271     EISSN : 25795406     DOI : -
SNTIKI adalah Seminar Nasional Teknologi Informasi, Komunikasi dan Industri yang diselenggarakan setiap tahun oleh Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau. ISSN 2579 7271 (Print) | ISSN 2579 5406 (Online).
Arjuna Subject : -
Articles 68 Documents
Search results for , issue "2012: SNTIKI 4" : 68 Documents clear
Sistem Informasi Inventory Pengeboran Minyak Menerapkan Metode Material Requirement Planning (MRP) Rice Novita; Ressy Afrianti
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Inventory Information System is an information system which manages data transactions and inventory in the warehouse. Implementation of this research was conducted at TIMAS SUPLINDO Duri. TIMAS SUPLINDO Duri is one of the contractors company which cooperate with Chevron and focus on oil drilling is engaged in oil drilling. Inventory of material on TIMAS SUPLINDO Duri not be well planned so that the inventory of existing materials in the company is often a delay in delivery so that the oil drilling process could not proceed smoothly. Objectives to be achieved in this study was to plan the inventory of materials used in oil drilling process which is on TIMAS SUPLINDO thorns. Reasons for using the method of Material Requirements Planning (MRP) is expected to take into account the amount of material goods with the required capacity of production and material procurement time appropriately based on the size and type specified.The output is obtained using the method of material requirements planning (MRP) was able to determine what, when, and how the number of components and materials required to meet the needs of a production planning oil drilling.Key words: Inventory, Material Requirements Planning (MRP), TIMAS SUPLINDO Duri,
Kriptografi Dan Kompresi Pesan Singkat Pada Android Pizaini Pizaini; Febi Yanto
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (772.079 KB)

Abstract

Communication via Short Message Service (SMS) messaging is a technology that still has some problems that limited message size and message content security. Message size is greater than 140 bytes are sent over the SMS and the message can be read by others if they have access to the SMS Center. Implementation of cryptographic and compression on the SMS message can increase security and improve the efficiency of the delivery of the message. Algorithm Advanced Encryption Standard (AES) is one of the reliable cryptographic methods to secure data and combined with Huffman compression that uses statistical principles to produce data that are smaller. The combination of encryption and compression can result in four modes, namely messaging Only Compress, Compress and Encrypt, Encrypt and Compress and Encrypt Only. Only Compress delivery mode can reduce the size of the message with a compression ratio of 72.87%. Only while the Encrypt transmission mode can improve the security of a message, but it produces a larger message of the original message. If the combined compression and encryption menghasilakan compression ratio of 75.94%.Keywords: AES, Encryption, Huffman, Compression, SMS
Perancangan Perangkat Lunak Kriptografi Citra Digital dengan FFT Kunci Chaos Linna Oktaviana Sari
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.712 KB)

Abstract

Cryptography can be performed on the image. The image is a type of digital media is most vulnerable to illegal actions. To secure the transmitted digital image, digital image must be encrypted into an image that has no meaning. However, not all encryption methods used in the text can be applied to image encryption because a slow process. This can be solved by applying a special encryption method for digital images. In this study, cryptographic software has been designed to secure the digital image using FFT as the encryption algorithm, inverse FFT as the decryption algorithm and the logistic equation of chaos as the key. The software designed to use GUI Matlab R2010a. The results showed that the cryptographic software has been designed, can make the process of encryption and decryption on digital images using algorithms FFT, IFFT and chaos as the key, with less than 1 second.Keywords: Cryptography, digital Image, FFT, Chaos.
Pengukuran Maturity Level E-Learning Nurva Widia; Idria Maita
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Maturity Level is a method of the COBIT Framework (Control Objectivitas for Information and Related Technology that can measure the maturity level of the scale of a system. Utilization of information technology such as E-learning can enhance the effectiveness and flexibility in teaching and learning, By measuring the maturity level at E Labor-Learning in vocational Guidance and Counseling University of Riau Patronage, can help users and management with effective decision making to overcome the problems that occur, and can control the use of information technology that supports the use of E-learning. So it can achieve the expected goals based on strategic plans and recommendations obtained from the measurements of the level of maturity level.Keywords: E-learning, Framework COBIT, Maturity Level
Klasifikasi Citra Content-Based Image Retrieval Dengan Metode Shape Base Threshold Pandapotan Siagian; Erick Fernando
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (516.831 KB)

Abstract

Content Based Image Retrieval (CBIR) bekerja dengan cara mengukur kemiripan citra dengan semua citra yang ada dalam database sehingga ketepatan pencarian berbanding lurus dengan jumlah citra dalam database. Pencarian citra yang paling mirip mempunyai tingkat lamanya pencarian dengan melakukan klasifikasi citra yang bertujuan untuk mengurangi waktu pencarian lebih singkat dan akurat pada CBIR.Implementasi Shape Base Thresholding untuk klasifikasi citra serta mengukur tingkat akurasi dan waktu klasifikasinya. Penelitian ini, dirancang aplikasi perangkat lunak dengan pemograman java JDK, aplikasi klasifikasi citra CBIR yang akan mampu mengekstrak fitur warna dan tekstur dari sebuah citra dengan menggunakan Shape Base Thereshold Color Histogram dan Entropi Base Histogram. Hasil dari proses ekstraksi fitur kemudian digunakan oleh perangkat lunak dalam proses learning dan klasifikasi dengan metode Shape Base Threshold. Perangkat lunak dibangun dengan metode analisis dan perancangan terstruktur kemudian diimplementasikan dengan Java JDK. Adapun Citra learning yang terdapat pada 8 kelas citra fitur yang di simpan quary database yaitu 596 citra bmp dan jpg dengan ukuran 400x400, sebagai sample pengujian dan masing masing citra yang terdapat pada quary data base yaitu Color Histogram dan Shape Base Thereshold Histogram yang berbeda.Aplikasi klasifikasi citra CBIR yang dihasilkan kemudian diuji dengan parameter tingkat akurasi dan waktu klasifikasi. Hasil pengujian menunjukkan bahwa kombinasi fitur warna dan tekstur memberikan tingkat akurasi yang lebih tinggi dibandingkan dengan klasifikasi berdasarkan fitur warna saja atau tekstur saja namun membutuhkan waktu klasifikasi yang lebih lama.Kata kunci : Klasifikasi Citra CBIR, Ekstraksi fitur, Shape Base Threshold, Entropy Base Threshold
Analisis Implementasi Penanganan Distributed Heterogenous Database pada Arsitektur Cloud Ria Aniansari; Warih Maharani; Alfian Akbar Gozali
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (657.565 KB)

Abstract

Development of information technology makes management of information and ease of accessing a database become an important element in information systems. A decrease in performance on a centralized architecture causes can be handle by changing to the architecture of a distributed database. In addition, the architecture of cloud on the database is an architecture database that can be accessed by a client with cloud service. This provides a convenience when accessing information on demand. Therefore, in this research, author implemented how to handling of heterogeneous distributed database that was built as a Database as a Service (DBaaS) on cloud relational architecture. The case study used is the distro database and using 3 different data storage in distributed database that is vertical fragmentation, horizontal fragmentation, and replication. The results in this research are the performance of DBaaS system using the test parameter of response time, throughput and memory usage. Where performed on the implementation of a distributed database by storing data in vertical fragmentation has a better performance results than horizontal fragmentation, and replication. Based on the test results, the vertical fragmentation better than horizontal fragmentation and replication.Keywords: : response time, throughput, memory usage, fragmentation, replication
Robot Pembawa Barang Berbasis Mikrokontroler ATMega8535L Dengan Pengendali Remote Muhammad Taufik; Erma Triawati
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.853 KB)

Abstract

Goods Carriers Robot based Microcontroller ATMega 8535L with Remote control is a tool that has function to transport goods from one place to another is controlled automatically. The goal is to alleviate human work, especially the work of carrying in shopping center. The tool consists of several circuit blocks. There are the battery circuit to output 3V, 5V, and 12V, motion sensor, transmitter module 27 MHz, receiver module 27 MHz, and the limit switch as an input, the controller circuit using ATMega 8535L and gearbox motor circuits as output. The automation of robot movement with transmitter and receiver modules with a range of up to 540 cm to regulate the movement of the robot in four directions, namely forward, backward, right, and left. When the presence of human movement to the distance 1.9 m in front of the robot, the motion sensor will detect it, the robot will stop moving. The total of heavy loads can be carried by the robot up to 660 gr limited by limit switches.Keywords: Microcontroller ATMega 8535L, Motion Sensor, Limit switch, Transmitter 27 MHz, Receiver 27 MHz.
Pendekatan QFD dalam Perancangan Alat Angkut Cangkang Buah Sawit yang Ergonomis Nofirza Nofirza; Supardi Supardi
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (591.184 KB)

Abstract

The transfer of palm fruit shells from the storage space to the conveyor of chain grate stoker in PT. Sari Lembah Subur II was done manually using traditional cart and shovel. The unergonomic position of operator during this task, the repetitive motions and the difficulties of shells casting to the conveyor made this task having a high work load. This research aimed to produce an ergonomic material handling for palm fruit shells based on operator needed. With the Quality Function Deployment approach, the House of Quality of material handling specification needed was built. The design proceed has done with the combination of operator appropriate antropometric data.The result showed the designed of material handling can give a big contribute to minimized the problem persisted like the ergonomic position of operator during the task, the procces to handling the shells become more simple, no need additional tools, and also minimizing the operator.Keywords: antropometric, chain grate stoker, ergonomic, material handling, QFD
Aplikasi Mobile Doa dan Dzikir Berbasis Android 2.2 Lely Prananingrum; Budi Utami Fahnun
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.509 KB)

Abstract

Every Muslim prayer and dhikr is a liability and needs to be performed. In practice prayer andremembrance can not be done just in the middle of dense activity and high mobility. With the mobiletechnology user application would be more practical if we read it through mobile media. We no longer needto carry a book everywhere. Reading and listening will be easier because we can read and listen to it viamobile phone anytime and anywhere. That's what the author wants to make the application of prayer anddhikr is android based.With the above problems, the authors intend to design an application that can allow users to getprayer and dhikr information quickly and accurately by using mobile devices based on Android. In thispaper the authors discuss how to design applications using SDLC (System Development Lie Cycle) with awaterfall process model.Keywords: Android, Mobile Application, Prayer and Dhikr, Mobile
Analisis Perbandingan Metode Bayesian Network dan Dempster-Shafer Pada Sistem Pakar Diagnosis Penyakit Mata Luh Kesuma Wardhani; Rahmad Kurniawan
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (649.554 KB)

Abstract

There are many methods that have been used in researches of expert system for diagnosing diseases, such as Bayesian Network and Dempster-Shafer. In this research, the main aim is to compare and to analyze the expert system for diagnosing eye disesases by using Bayesian Network with the expert system for diagnosing eye disesases by using Demspter-Shafer. From testing phase, it can be concluded that there is no significant difference in accuracy value from those two methods. The diagnosis resulting from expert system using Bayesian Network obtained accuracy of 85.7%. Similar results were also obtained from expert system using Dempster-Shafer method. Nevertheless, the inference process of Dempster-Shafer method is more complicated, where there are some combination of rules that are used to combine the evidence. While using the Bayesian inference network is easier because of the structure of the Bayesian network.Keyword : Bayesian Network, Dempster-Shafer, Expert System, Eye Disease