Claim Missing Document
Check
Articles

Found 2 Documents
Search

MEMBANGUN SENTRA KELENGKENG NEW CRYSTAL BERBASIS TEKNOLOGI INFORMASI : STUDI KEDUNGWERU AYAH Yulianto, Yulianto; Sarjimin, Sarjimin; Wibisonya, Irawan
Jurnal Abdi Insani Vol 11 No 4 (2024): Jurnal Abdi Insani
Publisher : Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/abdiinsani.v11i4.2053

Abstract

Poverty is one of the problems faced by almost all regions in Indonesia. The concept of poverty relates to the estimated amount of income and the estimated amount of needs, especially needs related to basic needs or minimum basic needs so that a person can be said to live a decent life. This is often referred to as the concept of absolute poverty. Poverty is a person's inability to meet food needs. Based on data from the Central Java Province Village Information System, the population of Kedungweru village which falls into decile 1 to decile 4 is a number of 108 households classified as poor. The method of implementing this activity consists of providing socialization, discussion, training to the evaluation stage. It is hoped that several approaches at each stage will be able to increase the information and capabilities of partner farmer groups. The results of this activity include that partner farmer groups ultimately have knowledge related to management in managing longan farming, such as farming management, risk management and marketing management. Apart from that, future longan cultivation farming activities will have data recording related to the need for plant inputs and other supporting systems based on a system that is relatively easier and more efficient to manage in the future. In the end, this activity was able to make the partner group better at managing the longan cultivation business technically and also improve the economy of individual farmers and villages by increasing the longan seeds provided.
Digital Forensic Process via Parallel Data Acquisition Technic: Experimental Case Study Sarjimin, Sarjimin; Yudhana, Anton
International Journal of Artificial Intelligence Research Vol 6, No 1 (2022): June 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.703 KB) | DOI: 10.29099/ijair.v6i1.354

Abstract

Digital Forensics (DF) is an essential tool for solving cases of crimes committed. Based on the type of action performed, DF is classified into static forensics and live forensics. The limitations of static forensics in this method are that data collection is carried out on permanent storage media, while processes in the running system are not obtained. On the other hand, live forensics provides an opportunity to perform data retrieval on the ongoing process. Generally, live forensics is used to acquire Volatile Memory (RAM) data but can be extended on mobile devices, internet/LAN networks, and cloud systems. Browsing in private mode leaves no traces and information about what the user has done during the browsing session. This feature is often used by criminals to hide the crimes committed or at least to slow down the forensic process. To overcome this problem, it is important to do forensics on RAM and Network Forensics to obtain evidence of these crimes. This study aims to conduct DF to obtain potential evidence in criminal cases of misuse of private browsing. The evidence is expected to be used as evidence in court. The parties involved in the crime can be prosecuted in court through such evidence. This research offers Digital Forensics Process Via Parallel Data Acquisition Technic. Parallel data acquisition is a method for retrieving data on a computer or other smart device when the computer or other smart device is on through two different data sources. The first source is RAM and the second is Network Traffic. A case study on a criminal case of misuse of private browsing with Digital Forensics Process Via Parallel Data Acquisition Technic was able to obtain evidence in the form of the website visited, URL, traffic timestamp performed, source address, destination address, transmission protocol, length (size of the packet transmitted), source last node mac address, destination last node mac address, source port, destination port, and detail information. The evidence is expected to be used to reconstruct a crime of misuse of private browsing.