Claim Missing Document
Check
Articles

Found 12 Documents
Search

PELATIHAN PENGUTIPAN DAN CARA MENGHINDARI TINDAKAN PLAGIAT BAGI GURU SMK MUHAMMADIYAH 3 PEKANBARU Januar Al Amien; Sunanto Sunanto; Desti Mualfah; Baidarus Baidarus; Evans Fuad; Febby Apri Wenando; Soni Soni
Jurnal Pengabdian UntukMu NegeRI Vol 2 No 2 (2018): Pengabdian Untuk Mu negeRI
Publisher : LPPM UMRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3335.441 KB) | DOI: 10.37859/jpumri.v2i2.878

Abstract

Nowadays there are many cases of plagiarism that are becoming our concern. Therefore, the writings on plagiarism are one of the things that is important to be understood by the world of education, to avoid plagiarism. Respect, acknowledge and give credit for the work of others is a necessity in producing writing. We all know that science is developed based on pre-existing science. So that there is no need to hesitate for anyone among Educators when composing scientific papers / written works, mentioning the reference sources. This must be understood as intellectual honesty that will not reduce the weight of our writing. Mention honestly, the source of reference that we use, or quote, so that it will be seen clearly, which parts of our work are ideas or taken from dictionaries, encyclopedias, articles, reports, books, magazines, internet, and others.
Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology) Desti Mualfah; Rizdqi Akbar Ramadhan
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5731

Abstract

Conventional crimes recorded on CCTV (Closed Circuit Television) cameras are increasing, every criminal who is proven to have committed a certain crime will be punished in accordance with statutory regulations. The problem is how a case recorded on a CCTV camera can be used as digital evidence. Digital evidence is closely related to ensuring data security, privacy and integrity while following the stages of the digital forensic identification process. The identification stage using the NIST (National Institute of Standard Technolog) method is used for investigations in finding information related to metadata on CCTV camera footage so that it can provide structured information, describe and process information obtained from digital forensic investigation sources that can be implemented into the Chain of Custody document which aims to be used as legal digital evidence in court
Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh Rizdqi Akbar Ramadhan; Desti Mualfah
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5750

Abstract

Solid State Drive (SSD) is the latest solution to speed up data processing from various multiplatform desktop computers. The TRIM features on SSDs has contribute for eliminating garbage data which is permanently deleted by users, where this method has the benefit of extending the service life of SSD devices. Contradiction of implement this method is obstacle potential for forensic investigators to recover deleted data in term of cyber crime in the case of evidence in the form of computers with SSD storage. The experimental object in this study is based on the perspective of mainstream operating systems, namely Windows, Linux and Macintosh installed on the SSD where each operating system simulates the deletion of stored data with a comparison of TRIM enable and TRIM disabled configurations. National Institute of Justice (NIJ) Digital Forensic method implemented in this case, because this method serves as a reference in the practice of Digital Forensics in this study. The SLEUTH KIT Autopsy software is a Digital Forensic tool being used in the perspective of investigators in the acquisition and analysis of SSD evidence in the case simulation of this study. Novelti obtained from the research content is that the operating system which is the object of experimentation is the latest release of Windows, Linux and Macintosh operating systems which certainly has great potential in terms of exploration, especially Digital Forensics. Windows has the greatest chance of recovery results among the other 2 operating systems in this study.
Pengenalan Dan Pelatihan Implementasi Tool Mendeley Guna Efektivitas Penyususnan Karya Ilmiah Desti Mualfah; Harun Mukhtar; Soni Soni; Sunanto; Yoze Rizki; Reny Medikawati Taufik; Febby Apri Wenando; Diah Angraina Fitri
Jurnal Pengabdian UntukMu NegeRI Vol 6 No 1 (2022): Pengabdian Untuk Mu negeRI
Publisher : LPPM UMRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/jpumri.v6i1.3741

Abstract

The management of citations and reference articles from various scientific journals must be mastered by students in order to produce good scientific works. One of the tools that can be used in managing scientific work citations is the Mendeley tool. The Mendeley tool provides a lot of convenience in improving the quality of writing scientific articles, namely making it easier for students to make citations and bibliography. This training is held at the Universitas Islam Indragiri (UNISI) by involving students who will carry out final research (scripts).
PENGEMBANGAN SISTEM PEMBAYARAN NON TUNAI MEMANFAATKAN TEKNOLOGI NEAR FIELD COMMUNICATION (NFC) Harun Mukhtar; Efry Hady Nata; Desti Mualfah; Syahril Syahril; Rahmad Firdaus
Rabit : Jurnal Teknologi dan Sistem Informasi Univrab Vol 7 No 2 (2022): Juli
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/rabit.v7i2.2212

Abstract

The demands of rapid technology development test the need and necessity for implementation. Coercion of implementation seems to be happening in recent conditions, where the world is being hit by a virus that requires social distancing. Transaction processes that always interact with touch will be replaced by technology. Near-field Communication (NFC) which relies on magnetic technology has been designed on various objects as a means of connecting with financial data, making it easier for users to make transactions
Investigasi Bukti Digital Aplikasi We Chat Menggunakan Framework Integrated Digital Forensics Proses Model (IDFPM) Berbasis Sni 27037:2014 Soni Soni; Eka Ramadhan; Desti Mualfah
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 4 No. 1 (2021)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v4i1.1114

Abstract

Social media is an alternative means of communication on smartphones, as many as 28% of the WeChat instant messenger application is used as a social interaction for the delivery of messages by senders and recipients, Cyberbullying on the WeChat application results in intimidation by users, so to deal with the crime of Cyberbullying applications WeChat on Smartphones requires a Mobile Forensic technique to identify digital evidence of verbal conversations on the WeChat ap-plication using the Framework In- tegrated Digital Forensics Process Model (IDFPM) method based on SNI 27037: 2014 which is carried out on Smartphones. WeChat application which was previously encrypted and hashing values of md5 and sha1 are authentic, as well as metadata or timestamp in the WeChat application conversation mes- sages using the Mobileedit Forensic Express Tools, and successfully implemented Frame Work Inte- grated Digital Forensic Process Model (IDFPM) based on SNI 27037: 2014 on the forensic investiga- tion process using Android Smartphone media. Keywords: Cyberbullying, WeChat, Mobile Forensics, Framework, SNI 27037: 2014
Analisis Sentimen Kepuasan Pengguna Terhadap Layanan Streaming Mola Menggunakan Algoritma Random Forest Setya Nanda; Desti Mualfah; Diah Angraina Fitri
Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) Vol 3 No 2 (2022): Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) Oktober 2022
Publisher : Universitas Islam Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31102/jatim.v3i2.1592

Abstract

Pada masa sekarang ini perkembangan teknologi berkembang sangat cepat, salah satunya dalam bidang penyediaan informasi, teknologi informasi dapat digunakan untuk melengkapi sebuah data dan biasa digunakan sebagai dasar dalam pengambilan sebuah keputusan. Platform streaming yang digandrungi masyarakat saat ini yaitu MOLA. MOLA merupakan aplikasi platform streaming video yang menyajikan program hiburan dan olahraga. Aplikasi MOLA dirilis di Google Play Store pada tanggal 19 Juli 2019. Namun dengan banyaknya aplikasi serupa yang tersedia tidak menutup kemungkinan para pengguna untuk berkomentar bebas mengeluarkan pendapatnya melalui fitur ulasan yang tersedia di playstore dengan banyaknya ulasan komentar peneliti membuat sistem analisis sentimen yang bertujuan untuk mengelompokan ulasan komentar pengguna dalam bentuk sentimen positif negatif dan netral. nertal dengan menggunakan Algoritma Random Forest dan menggunakan 520 dataset dengan teknik scrapping per tanggal 06 Mei 2022 sampai dengan 22 Juli 2022. Mendapatkan hasil klasifikasi pada kelas positif dengan jumlah 126, negatif 196 dan netral 198. Pembagian data training 90% dan testing 10% menghasilkan nilai accuracy 98%, nilai precision 1,00%, nilai recall 95% dan nilai f1-score 98%. Kata kunci: Mola, platform streaming, playstore, sentimen, random forest
Klasifikasi Multi-Class Penyakit Jantung Dengan SMOTE dan Pearson’s Correlation menggunakan MLP Rahmad Firdaus; Desti Mualfah; Julian Silvia Hasanah
Computer Science and Information Technology Vol 4 No 1 (2023): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v4i1.4769

Abstract

Penyakit jantung merupakan penyakit paling mematikan didunia. Laporan WHO tahun 2019 menyebutkan penyakit jantung sebagai penyebab kematian tertinggi didunia dengan persentase 16% dari jumlah kematian atau 8.9 juta kematian. Tingginya kematian yang disebabkan oleh penyakit ini terjadi karena penyakit ini biasanya timbul tanpa adanya gejala sehingga sulit untuk diketahui sejak dini oleh penderita. Salah satu cara untuk mengatasi permasalahan tersebut adalah dengan pemanfaatan metode klasifikasi. Hasil klasifikasi multi-class pada penelitian sebelumnya dengan dataset dan metode yang sama masih terbilang rendah yang salah satunya disebabkan oleh adanya imbalace data. Untuk itu dibutuhkan teknik balancing data serta feature selection (FS) untuk melihat pengaruh imbalance data dan pengaruh korelasi fitur pada klasifikasi multi-class. Pada penelitian ini menggunakan Synthetic Minority Over-sampling Technique (SMOTE) untuk balancing data dan Pearson’s Correlation (PS) untuk memilih fitur dengan korelasi yang baik pada klasifikasi penyakit jantung menggunakan metode Multi-Layer Perceptron (MLP). Penelitian ini dengan MLP+Pearson’s Correlation hanya mendapatkan akurasi tertinggi sebesar 63.33%. Akurasi tertinggi dengan penggabungan metode MLP+SMOTE+Pearson’s Correlation sebesar 92.5%. Serta akurasi tertinggi pada penelitian ini didapat menggunakan metode MLP+SMOTE yaitu sebesar 97.5%.
Analisis Sentimen Komentar YouTube TvOne Tentang Ustadz Abdul Somad Dideportasi Dari Singapura Menggunakan Algoritma SVM Desti Mualfah; Ramadhoni; Rahmad Gunawan; Danang Mulyadipa Suratno
JURNAL FASILKOM Vol 13 No 01 (2023): Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer)
Publisher : Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/jf.v13i01.4920

Abstract

Interactions in social media can be seen from comments as feedback from every activity on social media, starting from statuses in the form of text, images or videos. One area of computer technology that can study the meaning of text is text mining. Sentiment analysis or opinion mining is a solution to solving problems to automatically classify opinions into positive and negative. Comments from YouTube video viewers on the TvOne channel about Ustadz Abdul Somad being deported from Singapore. From the various responses in the comment column, information is obtained from unstructured data, so there is a needfor a technique to define the value of information. The focus in this research is to verify the truth and explore the value of structured information so that itcan describe events and topics that are connected from the comments in the YouTube videos which are the object of this research. From the test results above, it can be seen that the performance values from the test results using the Support Vector Machine method get 95.02% Accuracy, 95.02% Recall, 95.18% Precision and 95.01% F1-Score.
Implementation of Live Forensic Method on Fusion Hard Disk Drive (HDD) and Solid State Drive (SSD) RAID 0 Configuration TRIM Features Desti Mualfah; Rizdqi Akbar Ramadhan; Muhammad Arrafi Arrasyid
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.19508

Abstract

One of the solutions used for access speeds is to maximize non-volatile storage functions by a conventional Hard Disk Driver with Solid State Drive that has the TRIM architecture using the Redundant Array of Inexpensive Disks 0 configuration or the commonly known RAID 0. RAID 0 is a stripping technique that has the highest speed among other RAID configurations. However, this configuration has a disadvantage in that when there is damage to one of the storage disks all the data will be corrupted and lost. It's becoming one of the challenges in digital forensic investigation when it comes to computer crime. Furthermore, this research uses experimental practices using live forensic methods to perform analysis and examination against the merger of HDD and SSD configuration RAID 0 TRIM features. The expected is an overview of the characteristics of recovery capability to find out the authenticity integrity values of files that have been lost or permanently deleted on both TRIM SSD functions disable and enable. Furthermore, this research is expected to be a solution for the experimental and practical investigation of computer crime especially in Indonesia given the increasing development of technology that is directly compared with the rise in computer crime.