cover
Contact Name
Yuhefizar
Contact Email
jurnal.resti@gmail.com
Phone
+628126777956
Journal Mail Official
ephi.lintau@gmail.com
Editorial Address
Politeknik Negeri Padang, Kampus Limau Manis, Padang, Indonesia.
Location
,
INDONESIA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
ISSN : 25800760     EISSN : 25800760     DOI : https://doi.org/10.29207/resti.v2i3.606
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Perangkat Lunak Rekayasa Perangkat Keras Keamanan Informasi Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Sistem Kecerdasan Buatan/Artificial Intelligent System Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Internet of Things Enterprise Computing Machine Learning Topik kajian lainnya yang relevan
Articles 25 Documents
Search results for , issue "Vol 5 No 1 (2021): Februari 2021" : 25 Documents clear
Analisis Kesiapan Masyarakat Pada Penerapan Smart City di Sosial Media Menggunakan SNA M. Khairul Anam; Tri Putri Lestari; Latifah; Muhammad Bambang Firdaus; Sofiansyah Fadli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1159.489 KB) | DOI: 10.29207/resti.v5i1.2742

Abstract

Smart People, which means smart city residents or people, not only refers to one's education but also the quality of social interactions that are formed. This Social Network Analysis (SNA) emphasizes the relationship between actors / users rather than the attributes of these actors. This analysis aims to see whether the people of Pekanbaru are ready to face changes to a Smart City. Pekanbaru is a civil city that will build a Smart City, with a concept that adopts 6 pillars, one of which is Smart People. There are 720,000 Twitter users in Pekanbaru City, while the people who actively interact are only 227 users or around 0.031%. Meanwhile, a city that can be said to be ready should be around 60-80% of active users who provide opinions or comments to the government of Pekanbaru City. From this research, it can be concluded that the people of Pekanbaru City are not ready to face Smart City Madani as seen from the interaction of the community on social media Twitter.
Implementasi Virtual Reality Berbasis Foto 360o Untuk Memvisualisasikan Fasilitas Perguruan Tinggi Surabaya Nadiah Ratnaduhita; Ian Mahendra Putra; Ully Asfari; Yupit Sudianto; Benazir Imam Arif Muttaqin
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (725.806 KB) | DOI: 10.29207/resti.v5i1.2759

Abstract

The college selection process is an important phase because this process affects the future achievement targets of prospective students. One of the factors that is considered in determining a university is the supporting facilities provided during the lecture process. prospective students will continue to search and at the same time consider universities despite the pandemic COVID-19. By implementing 3600 photo-based virtual reality (VR), prospective students or external parties can get information about university facilities anytime and anywhere because it can be accessed online. This study uses the Multimedia Development Life Cycle (MDLC) method in application development, then uses a quantitative approach to test the feasibility of the application. The results showed that 3600 photo-based virtual reality (VR) is an alternative media in conveying information related to the facilities and logistics owned by universities, the variables of smoothness and convenience of operating 3600 photo-based videos have a high enough influence, but on user motivation to use VR is worth less. This happens because users are not used to using this technology.
Perbandingan Kualitas Suara Smartphone Menggunakan Metode Dynamic Time Warping (DTW) Inas Salsabila; Samsul Anwar; Radhiah Radhiah
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.341 KB) | DOI: 10.29207/resti.v5i1.2764

Abstract

Smartphones are telecommunication devices that play a significant role in daily life. The sound quality produced by a smartphone becomes important for users, considering that poor sound quality might cause misunderstandings in communication. This study provides an illustration of the application of Dynamic Time Warping (DTW) in the comparison of the sound quality produced by a smartphone. In addition to the DTW, the median test and its confidence interval are also used to determine the sound quality of a smartphone. The data employed are primary data in the form of voice recordings of six people that saying five sample sentences, each of which is repeated five times through four different smartphone types that are used as examples. So that the total voice recordings for each smartphone are 150 pieces. This study aims to compare the sound quality produced by those smartphones. The results of this study indicate that although smartphones type 2, 3 and 4 have similar sound quality, the sound quality produced by smartphones type 4 is more stable than other types. Therefore, this study concludes the smartphone type 4 is the smartphone with the most satisfying sound quality. Furthermore, this study showed that the DTW method is effective in analyzing the sound quality of a smartphone.
Classification of Malaria Complication Using CART (Classification and Regression Tree) and Naïve Bayes Rachmadania Irmanita; Sri Suryani Prasetiyowati; Yuliant Sibaroni
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (618.483 KB) | DOI: 10.29207/resti.v5i1.2770

Abstract

Malaria is a disease caused by the Plasmodium parasite that transmitted by female Anopheles mosquitoes. Malaria can become a dangerous disease if late have the medical treatment. The late medical treatment happened because of misdiagnosis and lack of medical staff, especially in the countryside. This problem can cause severe malaria that has complications. This study creates a system prediction to classify the severe malaria disease using Classification and Regression Tree (CART) method and the probability of malaria complication using Naïve Bayes method. The first step of this study is classifying the patients that have symptom are infected severe malaria or not based on the model that has been built. The next step, if the patient classified severe malaria then the data predicted if there any probability of complication by the malaria. There are 8 possibilities of complication malaria which are convulsion, hypoglycemia, hyperpyrexia, and the combinations of these four. The first step will evaluate by using F-score, precision and recall while the second step will evaluate by using accuracy. The highest result F-score, precision and recall are 0.551, 0.471 and 0.717. The highest accuracy 81.2% which predicted the complication is Hypoglycemia.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Pengenalan Karakter Optis untuk Pencatatan Meter Air dengan Long Short Term Memory Recurrent Neural Network Victor Utomo; Agusta Praba Ristadi Pinem; Bernadus Very Christoko
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.153 KB) | DOI: 10.29207/resti.v5i1.2807

Abstract

Clean water service providers in Indonesia are still recording water meters as water usage data with manual recording by record collector. Alternative solutions for recording water meters from previous research use the Internet of Things (IoT) or image recognition that is processed on a server. The solutions rely on the Internet which is unsuitable with Indonesia’s condition. This study proposes a water meter reading system that can work on mobile devices without using the Internet. The system works by utilizing optical character recognition (OCR) using the Long Short Term Memory Recurrent Neural Network (LSTM-RNN) method. LSTM-RNN is a classification method in artificial neural network which has feedback. The results show that the water meter reading system could work without using an Internet connection. The average time it takes to perform the reading process is 2285ms even on Android device with low specification. The overall reading accuracy is 86%. Single value reading accuracy, when the digit meter displays only 1 number, is 97%, while the accuracy of double value reading, when the digit meter displays 2 numbers, is 18%.
Analisis Perbandingan Algoritma Optimasi pada Random Forest untuk Klasifikasi Data Bank Marketing Yoga Religia; Agung Nugroho; Wahyu Hadikristanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (271.874 KB) | DOI: 10.29207/resti.v5i1.2813

Abstract

The world of banking requires a marketer to be able to reduce the risk of borrowing by keeping his customers from occurring non-performing loans. One way to reduce this risk is by using data mining techniques. Data mining provides a powerful technique for finding meaningful and useful information from large amounts of data by way of classification. The classification algorithm that can be used to handle imbalance problems can use the Random Forest (RF) algorithm. However, several references state that an optimization algorithm is needed to improve the classification results of the RF algorithm. Optimization of the RF algorithm can be done using Bagging and Genetic Algorithm (GA). This study aims to classify Bank Marketing data in the form of loan application receipts, which data is taken from the www.data.world site. Classification is carried out using the RF algorithm to obtain a predictive model for loan application acceptance with optimal accuracy. This study will also compare the use of optimization in the RF algorithm with Bagging and Genetic Algorithms. Based on the tests that have been done, the results show that the most optimal performance of the classification of Bank Marketing data is by using the RF algorithm with an accuracy of 88.30%, AUC (+) of 0.500 and AUC (-) of 0.000. The optimization of Bagging and Genetic Algorithm has not been able to improve the performance of the RF algorithm for classification of Bank Marketing data.
Prediksi Belanja Pemerintah Indonesia Menggunakan Long Short-Term Memory (LSTM) Sabar Sautomo; Hilman Ferdinandus Pardede
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (833.892 KB) | DOI: 10.29207/resti.v5i1.2815

Abstract

Abstract Estimates of government expenditure for the next period are very important in the government, for instance for the Ministry of Finance of the Republic of Indonesia, because this can be taken into consideration in making policies regarding how much money the government should bear and whether there is sufficient availability of funds to finance it. As is the case in the health, education and social fields, modeling technology in machine learning is expected to be applied in the financial sector in government, namely in making modeling for spending predictions. In this study, it is proposed the application of Long Short-Term Memory (LSTM) Model for expenditure predictions. Experiments show that LSTM model using three hidden layers and the appropriate hyperparameters can produce Mean Square Error (MSE) performance of 0.2325, Root Mean Square Error (RMSE) of 0.4820, Mean Average Error (MAE) of 0.3292 and Mean Everage Presentage Error (MAPE) of 0.4214. This is better than conventional modeling using the Auto Regressive Integrated Moving Average (ARIMA) as a comparison model.
Segmentasi Citra Kanker Serviks Menggunakan Markov Random Field dan Algoritma K-Means Raihana Salsabila Darma Wijaya; Adiwijaya; Andriyan B Suksmono; Tati LR Mengko
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.838 KB) | DOI: 10.29207/resti.v5i1.2816

Abstract

Cervical cancer is a dangerous disease caused by malignant tumors that grow on the cervix and has globally attacked many women. Pap smear test is one of the early prevention efforts for cervical cancer. Medical personnel often have difficulty identifying images of cervical cancer cells. Several studies have used the K-Means clustering method to identify cervical cancer cell images from Herlev dataset. This study uses the Herlev dataset with the K-Means clustering algorithm and also used the Markov Random Field parameter as a feature for the process of identifying cervical cancer cell images. This study compared the results of the proposed method with some differences in the preprocessing process. The experimental results show an accuracy of 74,51% for RGB channels without low pass filter. Accuracy of 75,11% is obtained from the segmentation process using RGB channels with low pass filter. A further increase in accuracy was obtained by 75,76% when the segmentation process used the grayscale channel with low pass Filter. Based on the segmentation experiment with the highest segmentation accuracy results, the classification process using K-Nearest Neighbor (KNN) gives an accuracy of 89,29%.
Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System Tati Ernawati; Fikri Faiz Fadhlur Rachmat
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (408.781 KB) | DOI: 10.29207/resti.v5i1.2825

Abstract

Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the stages of analysis, design, implementation, and monitoring. The content analysis method has been using to explore the problems and requirements of the system built. The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). The test has been carrying out on 3 test parameters (confidentiality, availability, and integrity), comparison testing method has been using to test the integrity parameters. The test results indicate that the system functionality test for user needs have fulfilled, the results of the confidentiality test (83.3%), availability (93.3%), and the integrity of the inline-mode snort show faster response time (0.069 seconds on average) and more CPU resource usage efficient (0.04% average) than the cowrie honeypot. IPS snort inline-mode overall integrity parameter testing is more recommended for used network security systems than cowrie honeypots.

Page 2 of 3 | Total Record : 25