cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 28 Documents
Search results for , issue "Vol 2 No 3 (2018): Desember 2018" : 28 Documents clear
Deteksi Bot Spammer Pada Twitter Menggunakan Smith Waterman Similarity Dan Time Interval Entropy Syafii, Imam; Setyanto, Arief; Raharjo, Suwanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.549

Abstract

Twitter is a social media that interacts through 140-character text-based tweet posts including photos, videos and hyperlinks. Spam tweets contain harmful messages sent continuously. Besides disturbing it is also dangerous for the recipient, exacerbated by the use of bots that automatically and quickly spread spam messages that can cause data damage. This study aims to detect spam bots by utilizing the similarity of tweets using Smith Waterman and the posting time interval. Data tweets are collected using scrap libraries in python in the form of id, text, time, link, based on datasets labeled as available. The data is carried out by text preprocessing steps to clean the text and then do the calculations. The calculation results of both the similarity method and the post time interval are then classified with k-Neaset Neighbor with the previous dataset that has been labeled to get the spam or legitimate bot prediction results. The results of classification experiments with several combinations of k to detect spam bots with similarity criteria and entropy interval obtained the best results k = 3 Neirest Neighbor and 10 fold Cross Validation with a predictive value of detection accuracy of 80%, 84% precission and 84% recall.
Rancang Bangun Alat Pengontrol Penyiram Tanaman Otomatis Menggunakan Sensor Kelembaban Tanah Di Area Pertanian Prayama, Deddy; Yolanda, Amelia; Pratama, Andi Wellyno
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.621

Abstract

One of the factors causing the lack of agricultural productivity in Indonesia is the majority of farmers in Indonesia still rely on climate change in the processing of agricultural land. The Design of Automatic Plant Sprinklers Control Devices Using Soil Humidity Sensor in the Agricultural Area was created aimed at helping farmers in Indonesia to manage agricultural land without the need to manually water and see weather conditions. How it works This tool is by using Arduino as a brain movement tool and Soil Moisture Sensor to retrieve data from plants. Then the data that has been obtained by the tool will be sent to the web-based monitoring system using Ethernet Shield. The experimental results and implementation in the field shows that this prototype or prototype can work according to its function and purpose.
Pengujian Sistem Pendukung Keputusan Penjurusan SMA di Banten menggunakan Metode Black Box Akhirina, Tri Yani; Yulistyanti, Dwi; Rusmardiana, Ana; Pauziah, Ulfa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.615

Abstract

Abstract The Decision Support System (DSS) of SMA major which had been tested in Banten was a system obtained from the former research, as it was expected to help private schools in Banten for students' major. This system has been developed through Fuzzy Tsukamoto's method in obtaining students' major. Fuzzy Tsukamoto requires three determinant factors, namely: skill, interest and aptitude. Fuzzyfication is carried out to get a firmed score of IPA and IPS. After the two scores are obtained, the comparison of those highest scores is conducted to determine the recommendation. In the process of manual data testing, Fuzzy Tsukamoto can be applied in students' major in Banten, with 98% of its accuracy level. After manual testing, Decision Support System of SMA major is designed by using Research and Development (R & D) as its developing system and by Unified Modeling Language (UML) as its designing analysis. The objective of this research aims at measuring the quality testing process of the application that is based on the aspects of functionality, reliability, usability, dan efficiency testingby employing the black box method. Based on the measurement Black Box Method, the Decision Support System of SMA major gets very goodvield, as it can be applied to be as SMA major recommendation in Banten.
Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA Anwar, Nizirwan; Munawwar, Munawwar; Abduh, Muhammad; Santosa, Nugroho Budhi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.606

Abstract

Along with the rapid development of information technology, the ability to access and provide information to users is getting quicker and more accurate, Therefore, protecting those from any unauthorized access is very important. Cryptography can be use as they’re one of the fields of information technology development to secure data or messages that are personal and confidential. So, it takes a security to prevent things that are not desired. In this case, the message sending process will be encrypted (plaintext to ciphertext) and the recipient of the message will need to be decrypted (ciphertext to plaintext). The algorithm that we will be using are 256-bit American Encryption Standard (AES) symmetric encryption and RSA asymmetric encryption. Performance testing (size and time-process), integrity ("data integrity"), confidentiality, and "non-repudiation" of data or message security with the algorithm method above will refer to 4 (four) modern cryptographic objectives developed. Those algorithm will be used to encode data stored in document files and implementing it using Python 3.0 language and some support applications. And the results of the process of designing and testing data (text and images) obtained did not experience significant growth, but the encryption / decryption of the RSA algorithm method is much slower than the performance of the AES algorithm time-processing method
Pembuatan Histogram Dan Pola Data Warna Urin Berdasarkan Urinalisis Menggunakan Mini PC Andrizal, Andrizal; Hidayat, Anton; Angraini, Tuti; Yefriadi, Yefriadi; Rusfandi, Rusfandi; Chadry, Rivanol
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.605

Abstract

The method for observing urine color to diagnose a disease of patient has done so far. The visual observation with human eyes has done to study and analyze human urine color and detect the connected disease. Human vision lately can be replaced with computer visual system or other sensor or camera to detect that color. The color of object is composed by two color components, they are frequency and spatial domain. Therefore, each color has wavelength and form in number of frequency. Color censor TCS 3200 produces output signals with different frequency based on scanned color through photodiode of the censor. Recognizing of the object in the form of shape, color and other variables of the object. Feature extraction is obtain from the data pattern as well as histogram. This research aims generate histogram and urine color pattern according to patient situation indication. The use of color reference is main color urinalysis, the result of method at Cleveland in Ohio in 2013. Based on the research, the pattern and color histogram were obtained in different style found in detected different urine color. This research would contribute to help identification process of diseases based on urine color thorough online.
Pengaruh Normalisasi Teks Dengan Text Expansion Dalam Deteksi Komentar Spam Pada Youtube Thoib, Imam; Setyanto, Arief; Raharjo, Suwanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.602

Abstract

The popularity of Youtube as the largest video sharing website in the wolrd give spammers opportunities to get benefit from Youtube in illegal ways by putting spam comments on Youtube's videos. Spam comments are very troubling to channel owners. The variants of spam comments are becoming more difficult to detect. One of them is spam comments using abbreviations, symbols, terms or misspelled word to make detection difficult. This research evaluate some classification techniques and employ text normalization method called TextExpansion to deal with this problem. This research uses Youtube Spam Collections dataset from UCI Machine Learning Library composed by five different datasets, which each one contains text comments extracted from YouTube videos (Psy, Katty Perry, LMFAO, Eminem and Shakira). The evaluation results shows TextExpansion is able to produce the highest accuracy value of 90.23%. To determine the impact of applying the TextExpansion method, this research conducted t-test for each dataset. The results of t-test for each dataset shows P(T<=t) two-tail < 0.05 which indicates a significant impact after applying text normalization using TextExpansion.
Optimasi Aplikasi Penjadwalan Kuliah Menggunakan Algoritma Genetik Mauluddin, Syahrul; Ikbal, Iskandar; Nursikuwagus, Agus
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.597

Abstract

Course Scheduling is a routine activity at a college and it is a very important activity for the implementation of condusive academic activities. Problems that often occur in course scheduling are the length of the schedule making process and the clashes due to the many rules that must be considered. This problem happened in Indonesian Computer University at accounting major because the lecture scheduling process was still done conventionally. Given the importance of this scheduling process, optimization steps are needed so that the scheduling process will be faster and the schedule clashes can be minimized. Based on the problems, this research purpose is to optimize course scheduling application using genetic algorithm. The system approach method used in the development of course scheduling applications is object-oriented approach, with system development methods namely prototype models. to build the application we use the Java SE programming language with MySQL database. The conclusion of this study is that the implementation of genetic algorithms to course scheduling applications is able to achieve 0 (zero) clash which means very optimal, and view by time the result is very fast with an average of 1.003 seconds from 10 times the schedule creation attempt.
Pengamanan Ruangan Dengan Dfrduino Uno R3, Sensor Mc-38, Pir, Notifikasi Sms, Twitter Siswanto, Siswanto; Utama, Gunawan Pria; Gata, Windu
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.592

Abstract

Security officers can not monitor the security of the financial space at all times especially outside working hours or evenings because the financial room is on the 3rd floor. Security guards are not warned quickly if there are people who do not have the right to enter the financial room at the time of blank or after hours. The purpose of this research is to design an application that can monitor the security of financial space by giving information or giving warning in the form of alarm and sending SMS and Twitter notification to security officer if there are people who do not have access rights of financial space, using DFRduino Uno R3 microcontroller, MC-38 magnets, PIR sensors, Alarms, Sony Ericsson Z530i phone, wifi modem, and Bluetooth. If a door or movement is detected the computer will send a command to DFRduino which is then forwarded to the alarm to give a sound alert. And with the Hanphone Sony Ericsson Z530i with a connection via Bluetooth Mobile can connect with the application so that the computer can send notification SMS alert to the number that has been registered as the recipient of SMS and notification via Twitter to the username that has been registered. With the magnet sensor it is possible to detect if the door or window is forced and PIR sensor is used as a support if the magnetic sensor is not working or if the thief enter the room not through the door or window. PIR Sensor installed in the room allows all activities that occur will be able to monitor well. If there is a security breach or infiltration it will be quickly known because there are warnings via SMS and Twitter that can provide information to security personnel to perform actions quickly so that cases can be resolved thoroughly.
Aplikasi Penerimaan Mahasiswa Baru Online Dengan Sms Gateway di STMIK Indonesia Padang Meta, Monanda Rio; Putra, Ilham Eka; Urfa, Annisa
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.582

Abstract

STMIK Indonesia Padang is one of the high school level education isntitutions in Padang. In Students admission activities, STMIK Indonesia is still announce the result conventionally, its affect the comfort of prospective students. Examinees have to wait until the reslut announced to know if they could register or not. There for, SMS Gateway system is neededto improve service to prospective students and improve the image of STMIK Indonesia Padang it self in society. This research intented to build a SMS Gateway aplication to help students admission activities at STMIK Indoenesia Padang. This SMS Gateway developed by waterfall method, with PHP programming language and Gamu aplication to integrate the System to SMS Gateway and tested with black box method. The result is a SMS Gateway Information System to inform students passing grade.
Implementasi Algoritma Backpropagation Prediksi Kegagalan Siswa Pada Mata Pelajaran Matematika Melladia, Melladia; Mardani, Iis Roza
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v2i3.588

Abstract

Students become those who can advance the nation. Schools and teachers are very helpful in creating smart and competent students. But often found students who fail, one of which is in the eyes of mathematics. With problems with students Mathematics study researchers want to help solve problems by using predictions on math subjects. In this study the researchers chose the object of research, namely in Padang State Middle School 39. This is quite a problem for students when teaching and learning mathematics subjects. Students do not understand mathematics and this problem will make students' grades decrease. By using student value data, a model is designed to predict students against mathematics subjects. The model uses the backpropagation algorithm. Data variables are taken from students' mathematical currency data, namely assignment 1, assignment 2, average, mid-semester and final semester grades. The data generated is 1 semester data and the number of students predicted is 30 students. The prediction results using the best model are training pattern data 5-2-1 with EPOCH process = 58 and MSE achievement when payment with MSE = 0,00989892 with an accuracy of 99,9901011. it can be cited that the backpropagation algorithm can be used to predict student errors in the eye Mathematics lessons as a guide for teachers

Page 1 of 3 | Total Record : 28