p-Index From 2019 - 2024
14.72
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi Perfecting a Video Game with Game Metrics Jurnal Informatika Jurnal Sarjana Teknik Informatika CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) BACA: Jurnal Dokumentasi dan Informasi Edu Komputika Journal Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Edumaspul: Jurnal Pendidikan Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Jurnal Informatika dan Rekayasa Elektronik RADIAL : Jurnal Peradaban Sains, Rekayasa dan Teknologi Mobile and Forensics Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno Insand Comtech : Information Science and Computer Technology Journal Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 11 Documents
Search
Journal : Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Perbandingan Metode Profile Matching Dengan Metode SMART Untuk Seleksi Asisten Laboratorium Sri Rahayu Astari; Rusydi Umar; Sunardi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.176 KB) | DOI: 10.29207/resti.v4i2.1723

Abstract

Laboratory assistant in university are the main factors in determining the course of practical in the laboratory. So it needs to be selected to get an assistant with good competence. Assistant selection is done by assessing four aspects namely administration, competence, microteaching, and interview. So far the assessment is still done manually, the criteria value still has the same importance. The calculation method which is also not optimal has an impact on the results and the long time of decision making. So we need a method to overcome these problems. In this study the calculation methods used are Profile Matching and SMART (Simple Multi Attribute Rating Technique). Based on research conducted both methods work by grouping criteria according to their level of importance. There are 12 criteria divided into four aspects, and alternative data of 7 participants were taken from 2019 participant data. The results of the two methods are ranking sequences compared with ranking results in 2019 selection. The results of this study show better profile matching because it has an accuracy value 100% is exactly the same as the results of the previous selection, while SMART is only 42.8%.
Perbandingan Metode SVM, RF dan SGD untuk Penentuan Model Klasifikasi Kinerja Programmer pada Aktivitas Media Sosial Rusydi Umar; Imam Riadi; Purwono
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (561.928 KB) | DOI: 10.29207/resti.v4i2.1770

Abstract

The failure of most startups in Indonesia is caused by team performance that is not solid and competent. Programmers are an integral profession in a startup team. The development of social media can be used as a strategic tool for recruiting the best programmer candidates in a company. This strategic tool is in the form of an automatic classification system of social media posting from prospective programmers. The classification results are expected to be able to predict the performance patterns of each candidate with a predicate of good or bad performance. The classification method with the best accuracy needs to be chosen in order to get an effective strategic tool so that a comparison of several methods is needed. This study compares classification methods including the Support Vector Machines (SVM) algorithm, Random Forest (RF) and Stochastic Gradient Descent (SGD). The classification results show the percentage of accuracy with k = 10 cross validation for the SVM algorithm reaches 81.3%, RF at 74.4%, and SGD at 80.1% so that the SVM method is chosen as a model of programmer performance classification on social media activities.
Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital Hermansa; Rusydi Umar; Anton Yudhana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.519 KB) | DOI: 10.29207/resti.v4i3.1877

Abstract

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.
Komparatif Analisis Keamanan Aplikasi Instant Messaging Berbasis Web Imam Riadi; Rusydi Umar; Muhammad Abdul Aziz
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.857 KB) | DOI: 10.29207/resti.v4i5.2213

Abstract

Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media. This research was conducted to determine the comparability of the vulnerability value of the web-based WhatsApp, Telegram, and Skype applications using the Association of Chief Police Officers (ACPO) method. Digital artifacts in the form of text messages, picture messages, video messages, telephone numbers, and user IDs have been acquired in this research process using FTK imager and OSForensic tools. The results of the study using the FTK imager and OSForensic tools show that the web-based Skype application has a vulnerability value of 92%, while WhatsApp and Web-based Telegram have the same vulnerability value with 67% each based on all digital artifacts that successfully acquired.
Acquisition of Digital evidence Android-Based Viber Messenger App Imam Riadi; Rusydi Umar; Muhammad Irwan Syahib
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1032.475 KB) | DOI: 10.29207/resti.v5i1.2626

Abstract

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.
Identification of Forensic Evidence for Virtual Router Networks Using the National Institute of Standard and Technology (NIST) Method Firmansyah Yasin; Abdul Fadlil; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.568 KB) | DOI: 10.29207/resti.v5i1.2784

Abstract

The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital Alfiansyah Imanda Putra Alfian; Rusydi Umar; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 2 (2021): April 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.282 KB) | DOI: 10.29207/resti.v5i2.3015

Abstract

The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve this digital crime case is to use the NIST (National Institute of Standards and Technology) method for video forensics. The initial stage is carried out by collecting data and carrying out the process of extracting the collected results. A local hash and noise algorithm can then be used to analyze the resulting results, which will detect any digital video interference or manipulation at each video frame, and perform hash analysis to detect the authenticity of the video. In digital video engineering, histogram analysis can be performed by calculating the histogram value metric, which is used to compare the histogram values ​​of the original video and video noise and make graphical comparisons. The results of the difference in frame analysis show that the results of the video show that the 2nd to 7th frames experience an attack while the histogram calculation of the original video centroid value and video tampering results in different values ​​in the third frame, namely with a value of 124.318 and the 7th frame of the video experiencing a difference in the value of 105,966 videos. tampering and 107,456 in the original video. Hash analysis on video tampering results in an invalid SHA-1 hash, this can prove that the video has been manipulated.
Classification is one method in image processing. Image processing to search for similar images or with similarity ownership is called image matching or image matching. In the measurement of image matching, the original and fake logo objects are used. Ide Dewi Astria Faroek; Rusydi Umar; Imam Riadi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (981.272 KB) | DOI: 10.29207/resti.v6i2.3826

Abstract

The random noise signal is widely used as a test signal to identify a physical or biological system. In particular, the Gaussian distributed white noise signal (Gaussian White Noise) is popularly used to simulate environmental noise in telecommunications system testing, input noise in testing ADC (Analog to Digital Converter) devices, and testing other digital systems. Random noise signal generation can be done using resistors or diodes. The weakness of the noise generator system using physical components is the statistical distribution. An alternative solution is to use a Pseudo-Random System that can be adjusted for distribution and other statistical parameters. In this study, the implementation of the Gaussian distributed pseudo noise generation algorithm based on the Enhanced Box-Muller method is described. Prototype of noise generation system using a minimum system board based on Cortex Microcontroller or MCU-STM32F4. The test results found that the Enhanced Box-Muller (E Box-Muller) method can be applied to the MCU-STM32F4 efficiently, producing signal noise with Gaussian distribution. The resulting noise signal has an amplitude of ±1Volt, is Gaussian distributed, and has a relatively broad frequency spectrum. The noise signal can be used as a jamming device in a particular frequency band using an Analog modulator.
Implementation of Naïve Bayes for Fish Freshness Identification Based on Image Processing Sabarudin Saputra; Anton Yudhana; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (746.63 KB) | DOI: 10.29207/resti.v6i3.4062

Abstract

Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of huge amounts of fish in the market in order to determine the freshness of the fish before it reaches the hands of consumers. So far, market managers have relied on traditional ways to determine the freshness of fish in circulation. The issue is that traditional solutions, such as the use expert assessment, demand a human physique that quickly experiences fatigue. Technological developments can be a solution to these problems, such as utilizing image processing techniques classification method. Image processing with the use of color features is an effective method to determine the freshness of fish. The classification method used in this research is the Naive Bayes method. This study aims to identify the freshness of fish based on digital images and determine the performance level of the method. The identification process uses the RGB color value feature of fisheye images. The stages of fish freshness identification include cropping, segmentation, RGB value extraction, training, and testing. The classification data are 210 RGB value of extraction images which are divided into 147 data for training and 63 data for testing. The research data were divided into fresh class, started to rot class, and rotted class. The research shows that the Naive Bayes algorithm can be used in the process of identifying the freshness level of fish based on fisheye images with a test accuracy rate of 79.37%.
Best Employee Decision Using Multi Attribute Utility Theory Method Sunardi; Rusydi Umar; Dewi Sahara
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4318

Abstract

Selection of the best employee is a form of appreciation that can be shown by the company for the achievements of its employees. This appreciation can motivate employees to be more enthusiastic in improving their performance at work. Appropriate evaluation and decision-making methods need to be taken so that the best employee selection process runs objectively, transparently, and in accordance with established standards. This study aimed to select the best employee candidates at PT Kerry Express Indonesia using the multi attribute utility theory (MAUT) method. The criteria for the selection process as follows: attendance (weight = 2), output obtained (weight = 3), discipline (weight = 3), and reporting (weight= 2). The employees in this study were 30 respondents from 150 populations. The assessment was carried out for three months from January to April 2022. The calculations were carried out using the Microsoft Access tool. The results of calculations using the MAUT method show that the highest rank among all candidates has a score of 7.75 while the lowest rank had a score of 3.25. It can be concluded that the MAUT method can be used to select the best employees at PT. Kerry Express Indonesia effectively and efficiently.
Co-Authors Aang Anwarudin Abdu Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abdullah Hanif Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmadi, Ahwan ahmadi, ahwan Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anton Yudhana Anton Yudhana Anwar Siswanto Ardi Pujiyanta Arfiani Nur Khusna Ari Periyanto Ari Peryanto Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arif Wirawan Muhammad, Arif Wirawan Arizona Firdonsyah Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bintang, Rauhulloh Noor Busthomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dwi Susanto Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fajar R. B Putra Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Fitrah Juliansyah Fitrah Fitriyani Tella Frandika Septa Gema Kharismajati Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Herman Hermansa Hermansa H Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Iqbal Bustomi Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Kgs Muhammad Rizky Alditra Utama Kiagus Muhammad Rizky Aditra Utama Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim M Sabiq Dzakwan Mardhiatul Ihsaniah Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Musri Iskandar N Mustafa Mustafa Muzakkir Pangri Nasrulloh, Imam Mahfudl Novita Ranti Muntiari Ockhy Jey Fhiter Wassalam Panggah Widiandana Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono, Purwono Putra, Fijaya Dwi Bima Sakti Resmi - Aini Rezki Ramdhani Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Rio Anggara Sabarudin Saputra Sahiruddin Sahiruddin Saleh khalifa saad Saleh Khalifah Saad Sarjimin Sarjimin Siti Helmiyah Siti Helmiyah Sri Rahayu Astari Sri Rahayu Astari Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Tarisno Amijoyo Tri Lestari Tri Lestari Tri Lestari Tuska Abe Wasito Sukarno Winoto, Sakti Yuminah yuminah Yuminah, Yuminah