p-Index From 2019 - 2024
12.445
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Proceedings of KNASTIK Techno.Com: Jurnal Teknologi Informasi Perfecting a Video Game with Game Metrics Bulletin of Electrical Engineering and Informatics Jurnal Informatika SPEKTRUM INDUSTRI Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Jurnal Teknik Elektro Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) JURNAL PENGABDIAN KEPADA MASYARAKAT Jurnal Teknologi Elektro Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Jurnal Informatika Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT InComTech: Jurnal Telekomunikasi dan Komputer JURNAL REKAYASA TEKNOLOGI INFORMASI ILKOM Jurnal Ilmiah Matrik : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Edumaspul: Jurnal Pendidikan RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Systemic: Information System and Informatics Journal EDUMATIC: Jurnal Pendidikan Informatika Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Journal of Robotics and Control (JRC) JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) Edunesia : jurnal Ilmiah Pendidikan Jurnal Teknologi Informatika dan Komputer Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) International Journal of Robotics and Control Systems J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Implementasi Anti Forensik pada Harddisk Menggunakan Metode DoD 5220.22 M dan British HMG IS5 E Muh Fadli Hasa; Anton Yudhana; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 4 (2020): Agustus 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.743 KB) | DOI: 10.29207/resti.v4i4.2165

Abstract

The process of securing data is related to anti-forensic science, one of the anti-forensic techniques that can be used to safeguard data security, namely by deleting data on storage media. This study examines the implementation of data deletion using the DoD 5220.22 M and British HMG IS5 E methods, then compares these methods. The comparison of the two methods includes performance tests, forensic tests, and data recovery tests. The results of the performance test show that the two methods are strongly influenced by the anti-forensic tools used and do not provide a significant difference when applied using one of the tools. The results of the implementation of data deletion using both methods on the hard disk drive are declared safe to delete data, as evidenced by the extraction results in the forensic test using the Autopsy tool found files on the partition :F with the number of 252 files and on the partition :I with the number of 1 file and the extraction results from the test Forensics using the Recover My File tool managed to find files with the number of 102 files on different partitions, but all the files found in the forensic test process cannot be accessed. The results of the recovery test show that the safest method in the process of deleting data is the British HMG IS5 E method using the Active @ Kill Disk tool, as evidenced by all the results of the recovery process using three tools that do not find any files. Meanwhile, the application of the deletion method that is generally carried out by users, namely the shift + delete method, is declared unsafe, as evidenced by the results of the recovery tests conducted showing that the deleted files can be recovered 100% and can be reaccessed using recovery tools.
Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST) Imam Riadi; Abdul Fadlil; Muhammad Immawan Aulia
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (628.662 KB) | DOI: 10.29207/resti.v4i5.2224

Abstract

DVD-R is a type of optical drive that can store data in one burning process. However, there is a feature that allows erasing data in a read-only type, namely multisession. The research was conducted to implement the data acquisition process which was deleted from a DVD-R using Autopsy forensic tools and FTK Imager. The National Institute of Standards and Technology (NIST) is a method commonly used in digital forensics in scope storage with stages, namely collection, examination, analysis, and reporting. The acquisition results from Autopsy and FTK-Imager show the same results as the original file before being deleted, validated by matching the hash value. Based on the results obtained from the analysis and presentation stages, it can be concluded from the ten files resulting from data acquisition using the FTK Imager and Autopsy tools on DVD-R. FTK Imager detects two file systems, namely ISO9660 and Joliet, while the Autopsy tool only has one file system, namely UDF. The findings on the FTK Imager tool successfully acquired ten files with matching hash values and Autopsy Tools detected seven files with did not find three files with extensions, *.MOV, *.exe, *.rar. Based on the results of the comparative analysis of the performance test carried out on the FTK Imager, it got a value of 100% because it managed to find all deleted files and Autopsy got a value of 70% because 3 files were not detected because 3 files were not detected and the hash values ​​were empty with the extensions * .exe, * .rar and *.MOV. This is because the Autopsy tool cannot detect the three file extensions.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Pengambilan Keputusan Sistem Penjaminan Mutu Perguruan Tinggi menggunakan MOORA, SAW, WP, dan WSM Sunardi; Abdul Fadlil; Ryan Fitrian Pahlevi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (413.839 KB) | DOI: 10.29207/resti.v5i2.2977

Abstract

Higher Education Quality Assurance (QA) is regulated in Quality Standards and the number of criteria as well as its relationship with the implementation of the Quality Assurance System (QAS), namely the Internal and External Quality Assurance System (IHSG). . The research is focused on analyzing 4 decision-making methods or Decision Support Systems (DSS) for QAS in MAC. The purpose of this study is to classify standard data and MAC criteria in business processes into a database that is integrated with the QAS decision-making method. The analysis was carried out on 4 multi-criteria decision-making methods that will be used in the QAS-MAC decision-making process, namely: Moora, SAW, WP, and WSM. These methods were tested on a quality standard database and then assessed by comparison, namely relevance, features, accuracy, precision, reliability, effectiveness, efficiency, strengths, and weaknesses. Decision Making Methods as a determinant of Business Process priorities become information for PTMA Leaders in predicting strategic activities. The value of the method analysis shows that 4 decision-making methods are Moora (75%), SAW (75%), WP (94%), and WSM (94%).
Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital Alfiansyah Imanda Putra Alfian; Rusydi Umar; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.282 KB) | DOI: 10.29207/resti.v5i2.3015

Abstract

The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve this digital crime case is to use the NIST (National Institute of Standards and Technology) method for video forensics. The initial stage is carried out by collecting data and carrying out the process of extracting the collected results. A local hash and noise algorithm can then be used to analyze the resulting results, which will detect any digital video interference or manipulation at each video frame, and perform hash analysis to detect the authenticity of the video. In digital video engineering, histogram analysis can be performed by calculating the histogram value metric, which is used to compare the histogram values ​​of the original video and video noise and make graphical comparisons. The results of the difference in frame analysis show that the results of the video show that the 2nd to 7th frames experience an attack while the histogram calculation of the original video centroid value and video tampering results in different values ​​in the third frame, namely with a value of 124.318 and the 7th frame of the video experiencing a difference in the value of 105,966 videos. tampering and 107,456 in the original video. Hash analysis on video tampering results in an invalid SHA-1 hash, this can prove that the video has been manipulated.
K Nearest Neighbor Imputation Performance on Missing Value Data Graduate User Satisfaction Abdul Fadlil; Herman; Dikky Praseptian M
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 4 (2022): Agustus 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (346.44 KB) | DOI: 10.29207/resti.v6i4.4173

Abstract

A missing value is a common problem of most data processing in scientific research, which results in a lack of accuracy of research results. Several methods have been applied as a missing value solution, such as deleting all data that have a missing value, or replacing missing values with statistical estimates using one calculated value such as, mean, median, min, max, and most frequent methods. Maximum likelihood and expectancy maximization, and machine learning methods such as K Nearest Neighbor (KNN). This research uses KNN Imputation to predict the missing value. The data used is data from a questionnaire survey of graduate user satisfaction levels with seven assessment criteria, namely ethics, expertise in the field of science (main competence), foreign language skills, foreign language skills, use of information technology, communication skills, cooperation, and self-development. The results of testing imputation predictions using KNNI on user satisfaction level data for STMIK PPKIA Tarakanita Rahmawati graduates from 2018 to 2021. Where using the five k closest neighbors, namely 1, 5, 10, 15, and 20, the error value of the k nearest neighbors is 5 in RMSE is 0, 316 while the error value using MAPE is 3,33 %, both values are smaller than the value of k other nearest neighbors. K nearest neighbor 5 is the best imputation prediction result, both calculated by RMSE and MAPE, even in MAPE the error value is below 10%, which means it is very good.
The Application of The Manhattan Method to Human Face Recognition Sunardi; Abdul Fadlil; Novi Tristanti
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4265

Abstract

In face recognition, the input image used will be converted into a simple image, which will then be analyzed. The analysis was carried out by calculating the distance of data similarity. In the process of measuring data similarity distances, they often experience problems implementing complex algorithm formulas. This research will solve this problem by implementing the Manhattan method as a method of measuring data similarity distances. In this study, it is hoped that the Manhattan method can be used properly in the process of matching test images and training images by calculating the proximity distance between the two variables. The distance sought is the shortest distance; the smaller the distance obtained, the higher the level of data compatibility. The image used in this study was converted into grayscale to facilitate the facial recognition process by thresholding, namely the process of converting a grayscale image into a binary image. The binary image of the test data is compared with the binary image of the training data. The image used in this study is in the Joint Photographic Experts Group (JPEG) format. Testing was carried out with 20 respondents, with each having two training images and two test images. The research was conducted by conducting experiments as many as 20 times. Facial recognition research using the Manhattan method obtains an accuracy of 70%. The image lighting used as the dataset influenced the accuracy results obtained in this study. Based on the results of this study, it can be concluded that the Manhattan method is not good for use in facial recognition research with poor lighting.
Analysis of the Saintekmu Website Quality on User Satisfaction Using the Modified System Usability Scale and Webqual 4.0 Method Fitrah Juliansyah Fitrah; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 6 (2023): December 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i6.5116

Abstract

Today, websites are a major means of finding or providing information. The Saintekmu website was created to offer top-notch service to students. One way to ensure that the website's services are appropriate and that information technology is being used to its fullest potential is to evaluate the level of service provided and improve its quality. This study aims to compare the results of two methods - the System Usability Scale (SUS) and Webqual - used to determine the quality and expectations of website users. The study distributed questionnaires online using Google Forms and had a sample size of 20 students. The data collected was analyzed using the SPSS program. The results of the SUS method indicated that the website acceptability range was in the marginal category, with a score of 69.9 and a classification rating of OK. The Webqual method yielded an R square of 0.948, indicating that the website's usability, quality, and interaction variables had a significant effect on user satisfaction. All WebQual 4.0 dimensions had a positive and significant effect on user satisfaction, both partially and simultaneously. This study provides Muhammadiyah Saintek University with reference material to evaluate its website in the future.
Co-Authors Aang Anwarudin Abdullah Hanif Achmad Nugrahantoro Achmad Nugrahantoro Aditiya Dwi Candra Ahmat Taufik Ainin Maftukhah Aji, Sukma Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Ketut Sudharmawan Anggit Pamungkas Anton Yudhana Anwar Siswanto ANWAR, FAHMI Arief Setyo Nugroho Arief Setyo Nugroho Arif Budi Setianto Arif Budiman Arif Budiman Atmojo, Dimas Murtia Aulia, Aulia Az-Zahra, Rifqi Rahmatika Aznar Abdillah, Muhamad Bagus Primantoro Basir, Azhar Candra, Aditiya Dwi Darajat, Muhammad Nashiruddin Denis Prayogi Denis Prayogi Dhimas Dwiki Sanjaya Dian Permata Sari Dikky Praseptian M Dimas Murtia Atmojo Doddy Teguh Yuwono Dwi Susanto Dwi Susanto Edy Fathurrozaq Eko Prianto Eko Prianto Ermin Al Munawar Ermin Ermin Esthi Dyah Rikhiana Fahmi Anwar Fahmi Auliya Tsani Fahmi Auliya Tsani Fahmi Fachri Fajar R. B Putra Faqihuddin Al-anshori Faqihuddin Al-Anshori, Faqihuddin Farhah Kamilah Fathurrahman, Haris Imam Karim Fauzi Hermawan Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Fitri Muwardi Frandika Septa Gusrin, Muhaimin Gustina, Sapriani Hafizh, Muhammad Nasir Hendril Satrian Purnama Herman Ibnu Rifajar Ibrahim Mohd Alsofyani Ihyak Ulumuddin Ikhsan hidayat Ilhamsyah Muhammad Nurdin Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Izzan Julda D.E Purwadi Putra januari audrey Joko Supriyanto Joko Supriyanto Kartika Firdausy Lestari, Yuniarti Luh Putu Ratna Sundari M. Nasir Hafizh Mini, Ros Mohd Hatta Jopri Mudinillah, Adam Muh. Fadli Hasa Muhaimin Gusrin Muhamad Daffa Al Fitra Muhamad Rosidin Muhammad Johan Wahyudi Muhammad Nasir Hafizh Muhammad Nurdin, Ilhamsyah Muhammad Rizki Setyawan Murni Murni Musri Iskandar Nasution Mustofa Mustofa Muwardi, Fitri Novi Tristanti Novita Ranti Muntiari Novita Ranti Muntiari Nur Makkie Perdana Kusuma Ponco Sukaswanto Poni Wijayanti Putri Annisa Putri Annisa Putri Annisa Putri Purnamasari Ramadhani, Muhammad Rezki Ramdhani Rifqi Rahmatika Az-Zahra Rio Subandi Rizky Andhika Surya Roni Anggara Putra Rosad, Safiq Rusydi Umar Rusydi Umar Ryan Fitrian Pahlevi Saifudin Saifudin Saifullah, Shoffan Saleh khalifa saad Saleh Khalifah Saad Septa, Frandika Setyaputri, Khairina Eka Setyaputri, Khairina Eka Setyaputri, Khairina Eka Shinta Nur Desmia Sari Siti Helmiyah Siti Helmiyah Sukaswanto, Ponco Sukma Aji Sulis Triyanto Sunardi Sunardi Sunardi, Sunardi Surya Yeki Surya Yeki Syarifudin, Arma Tiara Widyakunthaningrum Tole Sutikno Tresna Yudha Prawira Tresna Yudha Prawira Tuswanto Tuswanto Winoto, Sakti Yana Mulyana Yasidah Nur Istiqomah Yeki, Surya Yossi Octavina Yu-Hao Lin Yuminah yuminah Yuminah, Yuminah Yuwono Fitri Widodo Zulhijayanto -