Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Infotekmesin

Implementasi Metode Waterfall dalam Sistem Informasi Knowledge Management untuk Digital Marketing Nur Chasanah; Prih Diantono Abda’u; Muhammad Nur Faiz
Infotekmesin Vol 12 No 1 (2021): Infotekmesin: Januari 2021
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v12i1.363

Abstract

The development of digital technology directs organizations to be able to cultivate knowledge as an asset that can help its business activities. Knowledge management is considered necessary to be implemented in organizations involving many stakeholders. The implementation of annual management needs to be implemented by involving the utilization. This research was conducted to implement knowledge management in organizations that involve many knowledge assets in the business process, especially related to digital marketing activities. The purpose of this research is to identify organizational knowledge and produce knowledge sharing media systems. This research uses waterfall method in the development of its system so that the result of this research is a knowledge management information system that facilitates knowledge sharing activities that have been identified and can facilitate users in finding data, information and knowledge that is useful in fostering innovations related to digital marketing in the organization.
Pengembangan Perangkat Lunak Untuk Deteksi DDoS Berbasis Neural Network Arif Wirawan Muhammad; Muhammad Nur Faiz; Ummi Athiyah
Infotekmesin Vol 13 No 2 (2022): Infotekmesin: Juli, 2022
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v13i2.1544

Abstract

System security issues are a vital factor that needs to be considered in the operation of systems and networks, which will later be used for disaster mitigation and preventing attacks on the network. Distributed Denial of Services (DDoS) is a form of attack carried out by individuals or groups to damage data through servers or malware in the form of flooding packets, therefore it can paralyze the network system used. Network security is a factor that must be maintained and considered in an information system. DDoS can take the form of Ping of Death, flood, Remote control attack, User Data Protocol (UDP) flood, and Smurf Attack. This study aims to develop software to detect DDoS attacks based on network traffic logs. The software has been tested and run according to the neural network algorithm. This software was developed with an interface that makes it easier for users to detect the source IP whether the IP is carrying out a DDoS attack or normal.
Metode Pengembangan Perangkat Lunak MDLC Pada Rancang Bangun Media Pembelajaran Planet Berbasis Teknologi Augmented Reality Abdul Rohman Supriyono; Anggita Dwi Fatimah; Isa Bahroni; Linda Perdana Wanti; Muhammad Nur Faiz
Infotekmesin Vol 14 No 1 (2023): Infotekmesin: Januari, 2023
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v14i1.1689

Abstract

Along with the development of smartphones, Augmented Reality technology has begun to be used as a medium of interaction, although it has not been properly implemented and applied as a supporting medium. The use of still image objects in textbooks can make students tend to be more passive and less interactive because media images are unable to provide a reciprocal response. In science subjects, there is solar system material regarding planet recognition. Props are needed as learning media because the object of observation from the planet is too large. Several props are used as imitations of the planets, such as the use of drawing paper, audio, and video. The purpose of this research is to make a breakthrough in the use of Augmented Reality technology to support media for understanding planet recognition material by creating digital teaching aids that can be installed on smartphone devices. The MDLC method is an alternative method for developing multimedia applications that are easy to understand. The results of the test show that the application can function as expected, where each planetary marker that has been made can be recognized properly according to the intended planetary object.
Comparison Analysis of Cloning-Hashing Applications for Digital Evidence Security Muhammad Nur Faiz
Infotekmesin Vol 14 No 2 (2023): Infotekmesin: Juli, 2023
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v14i2.1844

Abstract

The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage.