Claim Missing Document
Check
Articles

Found 19 Documents
Search

RETRACTED : SOCIAL NETWORK ANALYSIS TOWARD TWITTER'S USERS AGAINST HOAX IN INDONESIA WITH SINGLE CLUSTER MULTI-NODE METHOD USING APACHE HADOOP HORTONWORKSTM DISTRIBUTION Karimi, Husain Faiz; Arini, Arini; Masruroh, Siti Ummi
IJTB (International Journal of Technology And Business) Vol 2 No 2 (2018): IJTB | INTER1NATIONAL JOURNAL OF TECHNOLOGY AND BUSINESS
Publisher : LPPM of STIMIK ESQ

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article has been retracted at the request of the Editor-in-Chief. The author has plagiarized parts of the following papers:  Husain Faiz Karimi,Arini,Siti Ummi Masruroh,Fitri Mintarsi, The Influence of Iteration Calculation Manipulation On Social Network Analysis Toward Twitter's Users Against Hoax In Indonesia With Single Cluster Multi-Node Method Using Apache Hadoop Hortonworkstm Distribution. 2018 6th International Conference on Cyber and IT Service Management (CITSM), PP 1-6.  DOI :10.1109/CITSM.2018.8674374 One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to readers of the journal that this was not detected during the submission process.  
PERFORMANCE COMPARISON OF AODV AND AOMDV PROTOCOL ROUTING WITH TCP AND UDP ON MOBILE AD-HOC NETWORK (MANET) USING MALICIOUS NODE (BLACKHOLE ATTACK) Faizah, Nurul; Masruroh, Siti Ummi; Armenia, Ivan Gustra Manca
MULTINETICS Vol 5, No 2 (2019): Multinetics Nopember (2019)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.Vol5.No.2.2019.pp.21-29

Abstract

Transmission package delivery can be a problem of routes on the network, one of them is the Wireless network. Mobile Ad-Hoc Network (MANET) topology is often used on Wireless networks. The existence of a malicious node is a threat to MANET. Package delivery uses AODV and AOMDV Protocol Routing in TCP and UDP packet transmission. This study uses a simulation method using NS2, NAM and AWK. The Quality of Service (QoS) parameters used are throughput, packet loss, and jitter. Simulations are carried out using malicious nodes, the results on the AOMDV TCP graph have the highest input values and the best packets but are difficult to minimize energy, while for the TCP jitter values graph is best because it has a flow control function that can adjust the trajectory. The results in AOMDV TCP have the highest input value and the best packet loss but it is difficult to minimize energy, while for TCP value jitters it is best because it has a flow control function that can adjust the trajectory
Sistem Pendukung Keputusan Kelayakan Penerima Hadiah Tahunan Menggunakan Metode Simple Additive Weighting (SAW) Berbasis Android : (Studi Kasus: Koperasi Bunda Gandasari) Anggraini, Nenny; Siti Ummi Masruroh; Muhammad Yusuf Nurpariz; Cahya Wardhana, Ariq
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 4 No 2 (2020)
Publisher : Politeknik Dharma Patria Kebumen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v4i2.236

Abstract

Guna mempertahankan dan memotivasi anggota serta menarik non anggota menjadi anggota, koperasi Bunda mempunyai program kerja yaitu pemberian hadiah kepada anggota setiap tahunnya. Penentuan penerima hadiah, koperasi Bunda masih menggunakan cara manual yaitu melakukan pengundian, yang berpotensi terpilihnya anggota yang berkontribusi minimum yang dinilai kurang layak untuk menerima hadiah. Penentuan kelayakan penerima hadiah pengurus koperasi memberikan standar kriteria yaitu besarnya jumlah pinjaman, banyaknya jumlah tabungan, transaksi menabung, lama menjadi anggota dan banyaknya membawa nasabah non anggota. Upaya membantu koperasi menentukan anggota yang layak menerima hadiah, diperlukan sebuah sistem pendukung keputusan. Sistem dirancang mengggunakan metode Simple Additive Weighting (SAW) yang merupakan salah satu metode Multiple Attribute Decision Making (MADM). Hasil penelitian ini menyatakan bahwa dari 10 data sampel anggota koperasi, didapat nilai tertinggi adalah v_10 dengan nilai 0,861, yang artinya anggota koperasi tersebut layak menerima hadiah tahunan dari pihak koperasi.
Analisis Routing Protocol Is-Is Dengan MPLS Traffic Engineering Menggunakan GNS3 Hendra Bayu Susueno; Imam Tri Wibowo; Siti Ummi Masruroh; Dewi Khairani; I’im Umamil Khoiri
Jurnal Ilmiah FIFO Vol 13, No 1 (2021)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2021.v13i1.004

Abstract

In the digital era is , the internet becomes a necessity . the increasing number of internet usage by various parties encourages ISPs to improve their service quality . To overcome the problem the IETF has introduced a service Multiprotcol . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calculate the many routes efficiently through the network to the router tip of the tail of the LSP. TE consists of three steps principal that is the size , model, and control . MPLS-TE allows for schemes TE where the tip router of the label switched path (LSP) can calculate the many routes efficiently through the network to the router tip of the tail of the LSP. ISIS is one of the routing protocol that was created for the OSI mode, using the method of link state as a method of collecting the route , ISIS also will perform the collection of information and the status of all the links that exist in the network . Analysis of the IS-IS routing protocol with the Multiprotocol label switch Traffic Engineering based on the parameters of quality of service (QoS), namely throughput and packet loss where the simulation uses the GNS3 network emulator. The test results prove that the values of throughput and packet loss are not much different.
Analisa Forensik Whatsapp Messanger Pada Smartphone Android Nenny Anggraini; Siti Ummi Masruroh; Hapsari Tiaraningtias
Jurnal Ilmiah FIFO Vol 12, No 1 (2020)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2020.v12i1.008

Abstract

Abstract Internet technology and smartphones are increasingly rapidly followed by the rise of social media users, especially instant messaging that can be accessed using a smartphone, especially Android. One of the problems of social media is cyber crime that utilizes social media. Based on data from Instant Checkmate in 2014, 30,000 websites were hacked, and 12 casualties fell within a fraction of the crime from fraud to sex crimes, and it occurs in cyber crime involving social media, including instant media WhatsApp messenger. So it takes the forensic digital process to look for evidence of the crime, because basically there is no crime that does not leave a trace. This study was conducted to find the forensic evidence on the WhatsApp messenger application accessed on Android smartphones. WhatsApp messenger was chosen because it used to reach 1.5 billion users from over 2.7 billion users of social media worldwide. In this study, the simulation method used in the study to run 15 scenarios, including the return of the deleted files, the search for forensic evidence such as name and account number, a list of names and contact numbers, group chat, and text messages, pictures, video, and document files on personal chat, then text messages, pictures, videos, document files, voice notes, and location in group chat. The results of this study indicate that almost all forensic evidence traces in the WhatsApp messenger application are found, but the URL media can not be opened because it is encrypted by WhatsApp. Keyword: Digital Forensic, Forensic Evidence, Smartphone, WhatsApp Messenger.  Abstrak Perkembangan teknologi internet dan smartphone yang semakin pesat diikuti pula oleh meningkatnya pengguna media social pada instant messager yang diakses menggunakan smartphone khususnya Android. salah satu permasalahan yang tidak luput dari media sosial adalah tindak kejahatan dunia maya yang memanfaatkan media sosial. Berdasarkan data dari Instant Checkmate pada tahun 2014 sebanyak 30.000 website diretas, dan 12 korban perdetik berjatuhan dari berbagai aspek kejahatan dari penipuan hingga kejahatan seks, dan hal tersebut terjadi dalam praktek kejahatan internet (cyber crime) melibatkan media sosial, termasuk media instant messanger WhatsApp. Sehingga diperlukannya proses digital forensik untuk mencari bukti-bukti kejahatan tersebut, karena pada dasarnya tidak ada kejahatan yang tidak meninggalkan jejak. Penelitian ini dilakukan untuk menemukan bukti-bukti forensik tersebut pada aplikasi WhatsApp messanger yang diakses pada smartphone Android. WhatsApp messanger dipilih karena digunakan mencapai 1,5 tiliyun user dari lebih dari 2,7 triliyun pengguna media sosial seluruh dunia. Pada penelitian ini, metode simulasi digunakan dalam penelitian dengan menjalankan 15 skenario, diantaranya adalah pengembalian file yang dihapus, pencarian bukti forensik berupa nama dan nomor akun, daftar nama dan nomor kontak, group chat, kemudian pesan teks, gambar, video, dan file dokumen pada personal chat, kemudian pesan teks,  gambar, video, file dokumen, voice note, dan location pada group chat. Hasil dari penelitian ini menunjukkan bahwa hampir semua jejak bukti forensik pada aplikasi WhatsApp messanger berhasil ditemukan, namun media URL tidak dapat dibuka karena terenkripsi oleh WhatsApp.Keyword: Bukti Forensik, Digital Forensik, Smartphone, WhatsApp Messanger.
SISTEM OTOMASI RUANGAN DENGAN RASPBERRY PI BERBASIS MOBILE WEB STUDI KASUS: (LEMBAGA KURSUS CODY APP ACADEMY) Aditya Mirza Bahari; Nenny Anggraini; Siti Ummi Masruroh
JURNAL TEKNIK INFORMATIKA Vol 11, No 1 (2018): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2686.873 KB) | DOI: 10.15408/jti.v11i1.6261

Abstract

ABSTRAK Cody App Academy adalah sebuah tempat kursus berbasis teknologi di Bintaro, Jakarta Selatan. Berdasarkan observasi yang dilakukan penulis, Cody masih menerapkan cara manual untuk menyalakan dan mematikan listrik. Selain itu, hasil dari wawancara oleh pengelola Cody, dapat disimpulkan bahwa hal ini berdampak terhadap efisiensi penggunaan arus listrik yang ada di Cody, yang berkaitan langsung dengan besar atau kecilnya tagihan listrik yang harus dibayarkan oleh pengelola Cody. Maka penulis mengusulkan sebuah solusi berupa prototipe Sistem Pengendali Ruangan dengan teknologi motion berbasis mobile web yang merupakan aplikasi yang dapat merubah sistem manual menjadi sebuah sistem home automation. Aplikasi ini akan secara otomatis mematikan arus listrik ketika ruangan sedang kosong, dilihat dari tidak terdeteksinya gerakan dalam rentang waktu lebih dari 10 menit. Metode pengumpulan data yang yang penulis gunakan adalah pengumpulan data primer dan sekunder yang terdiri dari observasi, wawancara dan studi literatur sejenis. Sedangkan untuk metode pengembangan aplikasi adalah prototipe evolusioner dengan 4 tahap yang mencakup analisis kebutuhan pengguna, membuat satu prototipe. Hasil dari penelitian ini adalah  penerapan home automation yang berupa Sistem Pengendali Ruangan dengan teknologi motion  selama jangka waktu 2 bulan berbasis mobile web terbukti membuat penggunaan listrik di Cody lebih efisien berdasarkan perbandingan tagihan listrik sebelum dan sesudah menggunakan sistem yang penulis usulkan. Hal ini dapat terlihat dari perubahan signifikan pada biaya listrik yang harus dibayarkan Cody per bulan yakni sejumlah 20% lebih efisien dibandingkan tanpa menggunkan sistem yang penulis usulkan.   ABSTRACT Cody App Academy is a technology-based course place in Bintaro, South Jakarta. Based on observations made by the author, Cody is still applying the manual way to turn on and turn off the electricity. In addition, the results of interviews by Cody's managers, it can be concluded that this impacts on the efficiency of the use of electric current in Cody, which is directly related to the large or small bill of electricity that must be paid by the manager of Cody. So the author proposed a solution in the form of prototype Space Control System with motion technology based mobile web which is an application that can change the manual system into a home automation system. This application will automatically turn off the power when the room is empty, judging from the detection of movement in the span of more than 10 minutes. Data collection methods that the author uses is the collection of primary and secondary data consisting of observations, interviews and studies of similar literature. The method of application development is an evolutionary prototype with 4 stages that includes user needs analysis, making a prototype. The result of this research is the implementation of home automation in the form of Room Control System with motion technology for 2 months based on mobile web proved to cause the use of electricity in Cody more efficient based on the ratio of electric bill before and after using the system that the author proposed. This can be seen from the significant change in the cost of electricity that Cody has to pay per month which is 20% more efficient than without using the proposed system. How To Cite : Bahari, A.M. Anggraini, N. Masruroh, S.U. (2018). SISTEM OTOMASI RUANGAN DENGAN RASPBERRY PI BERBASIS MOBILE WEB STUDI KASUS: (LEMBAGA KURSUS CODY APP ACADEMY). Jurnal Teknik Informatika, 11(1), 55-66.  doi 10.15408/jti.v11i1.6261 Permalink/DOI: http://dx.doi.org/10.15408/jti.v11i1.6261 
SISTEM PENGAMBILAN KEPUTUSAN PEMETAAN PELATIHAN TEKNOLOGI INFORMASI UNTUK PENYANDANG DISABILITAS TUNA RUNGU HARD OF HEARING MENGGUNAKAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) Siti Ummi Masruroh; Ahmad Arya Swaraja; Imam Marzuki Shofi
JURNAL TEKNIK INFORMATIKA Vol 12, No 2 (2019): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.254 KB) | DOI: 10.15408/jti.v12i2.12203

Abstract

Law number 8 of 2016 states that disability is part of the Indonesian republic which has the same rights and obligations. Therefore the need to increase social welfare for persons with disabilities, one way to improve it is by providing information technology training. To support information technology training an appropriate training mapping is needed. In this study, a training mapping was carried out for persons with disabilities who were deaf where there was ranking at each information technology training based on the ability criteria. The ranking of information technology training is analyzed using the Analytical Hierarchy Process (AHP) method and for the system, development using Rapid Application Development (RAD). This research discusses the hard of hearing deafness disability, in which information technology training is used like the following attributes of Microsoft Word, Microsoft Excel, PowerPoint, Photoshop, Scratch Programming, Adobe illustration, e-marketing, internet browsing, and social media. The final results show the ranking of information technology training that is suitable for hearing deafness disability.
Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android Wisnu Ari Mukti; Siti Ummi Masruroh; Dewi Khairani
JURNAL TEKNIK INFORMATIKA Vol 10, No 1 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.191 KB) | DOI: 10.15408/jti.v10i1.6820

Abstract

ABSTRAK Perkembangan teknologi internet dan smartphone yang semakin pesat diikuti pula oleh meningkatnya pengguna media sosial yang mengakses menggunakan smartphone khususnya Android. Salah satu permasalahan yang tak luput dari media sosial adalah tindak kejahatan dunia maya yang memanfaatkan media sosial. Karena pada dasarnya tidak ada kejahatan yang tidak meninggalkan jejak. Penelitian ini dilakukan untuk menemukan dan membandingkan bukti-bukti forensik tersebut pada aplikasi media sosial Facebook dan Twitter yang diakses pada smartphone Android. Facebook dan Twitter dipilih karena memiliki beberapa fitur yang mirip. Pada penelitian ini, metode simulasi digunakan dalam penelitian dengan menjalankan 11 skenario diantaranya adalah pengembalian file yang dihapus, pencarian bukti forensik berupa nama akun, lokasi, nomor telpon, tanggal lahir, photo profile, cover photo, posting berupa teks, posting berupa gambar, isi private message berupa teks dan isi private message berupa gambar. Hasil dari penelitian ini menunjukkan bahwa semua bukti forensik pada aplikasi media sosial Facebook berhasil ditemukan semua. Sedangkan pada aplikasi media sosial Twitter hanya berhasil ditemukan berupa nama akun, data lokasi, photo profile, cover photo, posting berupa teks dan posting berupa gambar.  ABSTRACT The development of internet technology and smartphones are increasing rapidly followed by increasing social media users who access using a smartphone, especially Android. One of the problems that did not escape from social media is cyber crime acts that utilize social media. Because basically no crime does not leave a trace. This study was conducted to find and compare the forensic evidence on social media applications Facebook and Twitter are accessed on Android smartphones. Facebook and Twitter are selected for having some similar features. In this study, the simulation method used in the research by running 11 scenarios such as the return of deleted files, the search for forensic evidence in the form of account name, location, phone number, birth date, photo profile, photo cover, text posts, Private message in the form of text and private message content in the form of picture. The results of this study indicate that all forensic evidence on Facebook social media applications found all. While in the social media application Twitter only managed to be found in the form of account name, location data, photo profile, photo cover, text posts and post images. How to Cite : Mukti, W.A. Masruroh, S.U. Khairani, D. (2017). Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android. Jurnal Teknik Informatika, 10(1), 73-84. doi:10.15408/jti.v10i1.6820Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i1.6820
Performance Comparison of AODV and AOMDV Protocol Routing with TCP and UDP on Mobile Ad-Hoc Network (Manet) Using Malicious Node (Blackhole Attack) Nurul Faizah; Siti Ummi Masruroh; Ivan Gustra Manca Armenia
MULTINETICS Vol. 5 No. 2 (2019): MULTINETICS Nopember (2019)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v5i2.1447

Abstract

Transmission package delivery can be a problem of routes on the network, one of them is the Wireless network. Mobile Ad-Hoc Network (MANET) topology is often used on Wireless networks. The existence of a malicious node is a threat to MANET. Package delivery uses AODV and AOMDV Protocol Routing in TCP and UDP packet transmission. This study uses a simulation method using NS2, NAM and AWK. The Quality of Service (QoS) parameters used are throughput, packet loss, and jitter. Simulations are carried out using malicious nodes, the results on the AOMDV TCP graph have the highest input values and the best packets but are difficult to minimize energy, while for the TCP jitter values graph is best because it has a flow control function that can adjust the trajectory. The results in AOMDV TCP have the highest input value and the best packet loss but it is difficult to minimize energy, while for TCP value jitters it is best because it has a flow control function that can adjust the trajectory
DESIGN OF AN AUTOMATIC STERILIZATION GATE TOOL USING PIR MOTION SENSOR Faiq Fawwaz Amrullah; Dewi Khairani; Siti Ummi Masruroh
Jurnal Pilar Nusa Mandiri Vol 17 No 1 (2021): Publishing Period for March 2021
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i1.1937

Abstract

This automatic sterilization gate tool is a simple tool that changes the manual method to a systemized and more efficient way. This tool uses an infrared motion sensor in which there is a main component, namely the PIR (Pyroelectric Infra-Red) sensor, which is a material that reacts to radiation and movement in front of it. This tool also uses a 12v dc pump which is used to draw out the disinfectant liquid stored in the container. This gate tool is designed using the main material and some additional materials, the automatic gate can discharge about 11 seconds of liquid from objects or people that pass through the sensor range, 11 seconds is the minimum time for this tool to work while a distance of 6 meters is the range from where the sensor is located. From that time it proved that this gate tool has 100% accuracy and runs well. This gate tool is used every day, turned on from the morning, and turned off at night. Every 17.00 hours this gate tool is always replenished with supplies of disinfectant liquid. The automatic gate has helped the community to reduce the risk of transmission of the coronavirus, it also raises the awareness of the covid-19 pandemic. The whole system is implemented and is tested for real-time operation. It is found working satisfactorily. The gate tool can be further improved by adding a scanning device to perform tracing for passersby.