p-Index From 2021 - 2026
12.649
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IJCCS (Indonesian Journal of Computing and Cybernetics Systems) JURNAL SISTEM INFORMASI BISNIS Proceedings of KNASTIK Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika SPEKTRUM INDUSTRI Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Jurnal Teknik Elektro Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Jurnal Teknologi Elektro INFORMAL: Informatics Journal Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics JOIN (Jurnal Online Informatika) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Jurnal Informatika Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT InComTech: Jurnal Telekomunikasi dan Komputer Insect (Informatics and Security) : Jurnal Teknik Informatika JURNAL REKAYASA TEKNOLOGI INFORMASI PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Applied Information System and Management ILKOM Jurnal Ilmiah Compiler MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) JURTEKSI RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Systemic: Information System and Informatics Journal EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Journal of Robotics and Control (JRC) Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Cyber Security dan Forensik Digital (CSFD) JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) International Journal of Advances in Data and Information Systems Edunesia : jurnal Ilmiah Pendidikan Journal of Innovation Information Technology and Application (JINITA) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) JURPIKAT (Jurnal Pengabdian Kepada Masyarakat) Humanism : Jurnal Pengabdian Masyarakat International Journal of Robotics and Control Systems J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Jurnal Pengabdian Informatika (JUPITA) Jurnal INFOTEL Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Jurnal Karya untuk Masyarakat (JKuM) Control Systems and Optimization Letters Signal and Image Processing Letters Scientific Journal of Engineering Research SEMINAR TEKNOLOGI MAJALENGKA (STIMA) Edumaspul: Jurnal Pendidikan Methods in Science and Technology Studies
Claim Missing Document
Check
Articles

Seleksi Peserta Didik Baru Menggunakan Metode AHP Dan SAW Lestari, Yuniarti; S, Sunardi; Fadlil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.253 KB) | DOI: 10.30645/j-sakti.v4i1.183

Abstract

The admission activity of new students is an administrative process that is sure to occur every new school year and always repeats every year as a starting point for the search for quality resources in accordance with the criteria of each school. Selection is done manually such as using a spreadsheet or number processor still raises several problems including the length of the selection process. At the time of the participant selection process, it involved many criteria that were assessed (multi criteria). Efforts to assist the school in selecting participants from the results considered to be acceptable results require a decision support system for selecting new students. The method used to support students' selection decisions is AHP and SAW. AHP method is used to determine the weight of predetermined criteria, while the SAW method is used for alternative ranking. The purpose of alternative ranking is who has the right to be accepted as a new student based on predetermined criteria.
Sistem Pemilihan Karyawan Terbaik Menggunakan Metode TOPSIS Nasution, Musri Iskandar; Fadlil, Abdul; Sunardi, S
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.219

Abstract

Merapi Online Corporation is a company located in Yogyakarta which is engaged in internet access services. Merapi Online Corporation gives rewards by selecting the best employees based on criteria as a provision of the company. This study designed a system to determine the best employee selection using a Decision Support System (DSS) with the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method. The TOPSIS method has the principle chosen because it has the shortest distance to positive ideal solution and the farthest distance from the negative ideal solution from a geometric point of view using Euclidean distance to determine the relative closeness of choice with the best solution. The stages of this research are the collection of employee and criteria data, then weighting the criteria and assessment, after that the calculation uses the TOPSIS method, and the final step is the analysis of the calculation results. The criteria used in this study are attendance, years of service, permission, and discipline. Research has been successfully carried out on a sample of four employees for ease in presenting the data. The results of this study obtained the preferences of each employee, which is then ranked. The biggest preference value is chosen to be the best employee.
Segmentasi Citra Kupu-Kupu Menggunakan Metode Multilevel Thresholding Maftukhah, Ainin; Fadlil, Abdul; Sunardi, S
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.665

Abstract

Land conversion, pollution, logging, and the use of pesticides are the main causes of butterfly extinction. This used 50 types of butterflies using different RGB colors obtained from the Kaggle website. The goal is to separate the butterfly object from the background and produce the best accuracy from the segmentation proses. The method used is Multilevel Thresholding. The results of preprocessing on the image using Multilevel Thresholding segmentation are able to identify colors and butterfly objects. The first step is RGB image input, then the image is Segmented using Multilevel Thresholding. After that, the output is displaying the image, and using a threshold value of 0-255 with the results of image segmentation, the threshold value separates the object and the background. Multilevel Thresholding segmentation with color and shape identification obtains threshold values of 100 from the dataset train, 100, and 110 from the test dataset and 140, and 150 from the validation dataset. It was concluded that the results of threshold value of the Multilevel Thresholding segmentation obtained good results
Identifikasi Tulisan Tangan Huruf Katakana Jepang Dengan Metode Euclidean Riadi, Imam; Fadlil, Abdul; Annisa, Putri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.749 KB) | DOI: 10.30645/j-sakti.v4i1.184

Abstract

Katakana is one of the traditional Japanese letters used to absorption words from other languanges. In the inttroduction of an object a learning process is needed, which is obtained through the characteristics and experience of observing similar objects after being acquired. But manually it is quite difficult to distinguish between 5 hiragana vowels starting from the image data acquisition process, image processing, feature extraction using Gray Level Co-occurance Matrix (GLCM) while classifiers use the euclidean distance method. The results of the tests carried out showed an accuracy rate of around 78% using the euclidean method.
Analisis Forensik Aplikasi Dropbox pada Android menggunakan Metode NIJ pada Kasus Penyembunyian Berkas Saad, Saleh Khalifah; Umar, Rusydi; Fadlil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.221

Abstract

Smartphones are a testament to the development of digital technology. At this time, the smartphone is also experiencing growth in storage media, one of which is the Cloud storage media. One cloud storage application is the Dropbox Application. The development of cloud storage media does not rule out the possibility of a negative impact on the use or can be used as a medium for crime, such as storing evidence of criminal transactions and cybercrime. This study uses conversation scenarios for application conditions, including data deletion in applications. Data for each experiment will be taken using the National Institute of Justice (NIJ) Method. The method used in dealing with crime with smartphone media evidence is the National Institute of Justice (NIJ) Method. The conclusion of this study is that the use of the National Institute of Justice (NIJ) method ranks the digital forensic stages, starting with identification, collection, examination, analysis, and reporting very well. This method is widely used in handling digital crime cases. The results of the acquisition will then be analyzed by translating the hex codes resulting from the acquisition to produce evidence that can be understood by the judge later.
Optimalisasi Layanan Keamanan Captive Portal Menggunakan Klasifikasi Logistic Regression Riadi, Imam; Fadlil, Abdul; Prabowo, Basit Adhi
INFORMAL: Informatics Journal Vol 9 No 3 (2024): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189

Abstract

Privacy has become a major concern with the rapid adoption of various smart devices and internet connections. The randomized MAC (Media Access Control) address for each device was implemented for privacy. Problems arose when implementing randomized MAC addresses on captive portals with connection limitations per user. Random classification by VOUI of the device used to assist the device elimination decisions in the captive portal. MAC address data was obtained from devices connected to the captive portal. The data is processed to be grouped into two separate classes, whether random or not, with four device Mac address threshold and four random percentage threshold. Logistic regression was used to determine the classification with the highest level of accuracy. Of the 16 experiments, it was found that all of them had an accuracy above 92%. The maximum accuracy of 95% was obtained in an experiment using a Mac address threshold of 6 and a random percentage threshold of 50%. This indicates that a value of 6 for the Mac address threshold and a value of 50% for the random percentage threshold can be used for random Mac address classification.
Tinjauan Pustaka Sistematis: Tantangan Dan Faktor-Faktor Pengembangan Kesiapan Forensik Digital Rochmadi, Tri; Fadlil, Abdul; Riadi, Imam
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861

Abstract

Teknologi informasi telah mengubah hampir segala lini kehidupan dari konvensional ke digitalisasi. Digitalisasi yang begitu cepat, menimbulkan permasalahan pada serangan siber yang belum diimbangi oleh penanganan insiden siber. Kesiapan forensik digital menjadi hal penting bagi organisasi agar proses penanganan insiden lebih efektif dan efisien. Tujuan penelitian ini adalah mengidentifikasi faktor-faktor dan tantangan terkait topik kesiapan digital forensik. Metode yang digunakan dalam penelitian ini menggunakan metode tinjauan pustaka sistematis. Hasil yang didapatkan pada penelitian ini memberikan informasi jurnal yang paling banyak mempublikasikan topik kesiapan forensik digital, obyek penelitian, metode yang digunakan, standarisasi yang diintegrasikan, faktor-faktor dan tantangan dalam pengembangan kesiapan forensik digital. Penelitian ini bisa menjadi rujukan peneliti akademisi ataupun praktisi pada bidang forensik digital ataupun pengembang aplikasi. Kata kunci: tinjauan pustaka sistematis, kesiapan forensik digital, ISO/IEC 27043, COBIT.  ------------------------------------ Abstract Information technology has changed almost all lines of life from conventional to digitalization. Rapid digitalization has led to problems with cyber-attacks that the handling of cyber incidents has not matched. Digital forensic readiness is important for organizations to make the incident-handling process more effective and efficient. The purpose of this research is to identify factors and challenges related to the topic of digital forensic readiness. The method used in this research is a systematic literature review. The results obtained in this study provide information on the journals that publish the most digital forensic readiness topics, research objects, methods used, standardization integrated, factors, and challenges in developing digital forensic readiness. This research can be a reference for academic researchers or practitioners in digital forensics or application developers. Keywords: systematic literatur review, digital forensic readiness, ISO/IEC 27043, COBIT.  
Sistem Pengenalan Wajah pada Keamanan Ruangan Berbasis Convolutional Neural Network Sunardi, S; Fadlil, Abdul; Prayogi, Denis
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.480

Abstract

Face recognition is a biometric system that is widely applied in various fields especially in the security for identify and verify purposes. For every method of face recognition, they have a unique ways on the process with their advantages and disadvantages themselves. This study designs a face recognition system that is applied to a room security system using the Convolutional Neural Network (CNN). This method works by imitating the way nerve cells to communicate with interrelated neurons or rather mimics how artificial neural networks work in humans. The process of taking images as training data and the face recognition process using a webcam camera installed on a Raspberry pi-based device and python programming language with tensorflow library. Based on the results of research obtained using 875 data samples which were divided into 75% for training and 25% (or 219 data) for testing data produce predictions with 100% accuracy that means all data were successfully recognized.
Analisis Metode Forward Chaining Pada Sistem Pakar Diagnosa Penyakit Hewan Sapi Berbasis Android Putra, Fajar R. B; Fadlil, Abdul; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.827 KB) | DOI: 10.30645/j-sakti.v5i2.398

Abstract

In particular, Sorong Regency, West Papua, where the availability of veterinarians is still relatively low. The problems that occur in the regency make it difficult for experts to deal with a disease that occurs in livestock, especially cattle. This also makes it difficult for people to diagnose certain diseases experienced by their livestock, so that handling becomes slow and resulting in the risk of death for livestock. This research aims to create an application system to diagnose cattle disease base on android to make it easier for breeders to diagnose symptoms of a disease that occurs in their cattle (cow). The process carried out is by interviewing experts consisting of three paramedics, the results obtained are in the form of disease data, symptoms, and solutions which are used as data on the system. The data that has been analyzed using the Forward Chaining method results in an android-based expert system, help breeders’ difficulties in diagnosing cattle diseases. The results obtained are that the system created to produce a disease that is in accordance with the exiting symptoms. The system is very helpful for farmers in Sorong Regency, they hope that ini the future the system can be updated if there are new diseases or symptoms. The data provided by animal husbandry department and experts are very helpful in this research.`
Enterprise Architecture Planning Sistem Informasi Akademik Dengan TOGAF ADM Basir, Azhar; Fadlil, Abdul; Riadi, Imam
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 1 (2019): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91

Abstract

The role of information technology greatly influences the improvement of a higher education governance, so that universities today should have models and standards that can be implemented as a reference in enhancing harmony between business strategies and information technology. Enterprise Architecture planning (EAP) is one of the methodologies that can be applied in planning information architecture, the stages in EAP consist of data architecture, application architecture, technology architecture and how the design that has been made can be implemented to support business activities, to achieve the organization's mission.
Co-Authors Aang Anwarudin Abdul Azis Achmad Nugrahantoro Aditiya Dwi Candra Ahmat Taufik Aji Pamungkas Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Amiruddin, Nanda Fahmi Andrianto, Fiki Anggit Pamungkas Annisa, Putri Anton Yudhana Anwar Siswanto ANWAR, FAHMI Arief Setyo Nugroho Arief Setyo Nugroho Arif Budi Setianto Arif Budiman Arif Budiman Arif Wirawan Muhammad Aris Rakhmadi Asno Azzawagama Firdaus Atmojo, Dimas Murtia Aulia, Aulia Az-Zahra, Rifqi Rahmatika Aznar Abdillah, Muhamad Bagus Primantoro Basir, Azhar Candra, Aditiya Dwi Darajat, Muhammad Nashiruddin Davito Rasendriya Rizqullah Putra Dewi Soyusiawaty Dhimas Dwiki Sanjaya Dian Permata Sari Dianda Rifaldi Dikky Praseptian M Dimas Murtia Atmojo Doddy Teguh Yuwono Dwi Susanto Dwi Susanto Edy Fathurrozaq Egi Dio Bagus Sudewo Eko Prianto Eko Prianto Elvina, Ade Ermin Al Munawar Ermin Ermin Esthi Dyah Rikhiana Fahmi Anwar Fahmi Auliya Tsani Fahmi Auliya Tsani Fahmi Fachri Fanani, Galih Faqihuddin Al-anshori Faqihuddin Al-Anshori, Faqihuddin Fathurrahman, Haris Imam Karim Fauzi Hermawan Fiki Andrianto Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitri Muwardi Furizal Gusrin, Muhaimin Gustina, Sapriani Hafizh, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Harman, Rika Helmiyah, Siti Hendril Satrian Purnama Herdiyanto, Erik Herman Herman Herman Yuliansyah, Herman Herman, - Ibnu Rifajar Ibrahim Mohd Alsofyani Ihyak Ulumuddin Ikhsan hidayat Ilhamsyah Muhammad Nurdin Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irjayana, Rizky Caesar Irwansyah Irwansyah Izzan Julda D.E Purwadi Putra januari audrey Jayawarsa, A.A. Ketut Jogo Samodro, Maulana Muhamammad Joko Supriyanto Joko Supriyanto Kamilah, Farhah Kartika Firdausy Khoirunnisa, Itsnaini Irvina Kusuma, Nur Makkie Perdana Laura Sari Lestari, Yuniarti Lestari, Yuniarti Lin, Yu-Hao Luh Putu Ratna Sundari M. Nasir Hafizh Maftukhah, Ainin Maulana Muhammad Jogo Samudro Mini, Ros Mohd Hatta Jopri Muammar Mudinillah, Adam Mufaddal Al Baqir Muh. Fadli Hasa Muhaimin Gusrin Muhajir Yunus Muhamad Daffa Al Fitra Muhamad Rosidin Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Johan Wahyudi Muhammad Kunta Biddinika Muhammad Ma’ruf Muhammad Nasir Hafizh Muhammad Nur Faiz Muhammad Nurdin, Ilhamsyah Muhammad Rizki Setyawan Muntiari, Novita Ranti Murinto Murinto - Murinto Murinto Murni Murni Musliman, Anwar Siswanto Mustofa Mustofa Muwardi, Fitri Nasution, Dewi Sahara Nasution, Musri Iskandar Nurwijayanti Pahlevi, Ryan Fitrian Ponco Sukaswanto Poni Wijayanti Prabowo, Basit Adhi Prayogi, Denis Priambodo, Bambang Putra, Fajar R. B Putri Annisa Putri Annisa Putri Purnamasari Putri Silmina, Esi Ramadhani, Muhammad Ramdhani, Rezki Razak, Farhan Radhiansyah Rezki Rezki Rifqi Rahmatika Az-Zahra Rizky Andhika Surya Rochmadi, Tri Roni Anggara Putra Rusydi Umar Rusydi Umar S Sunardi S, Sunardi Saad, Saleh Khalifah Safiq Rosad Saifudin Saifudin Saifullah, Shoffan Saleh khalifa saad Santi Purwaningrum Sarmini Sarmini Septa, Frandika Setyaputri, Khairina Eka Setyaputri, Khairina Eka Setyaputri, Khairina Eka Shinta Nur Desmia Sari Siti Helmiyah Subandi, Rio Sukaswanto, Ponco Sukma Aji Sulis Triyanto Sunardi Sunardi Sunardi Sunardi, Sunardi Surya Yeki Surya Yeki Syamsiar, Syamsiar Syarifudin, Arma Tole Sutikno Tresna Yudha Prawira Tresna Yudha Prawira Tri Ferga Prasetyo Tristanti, Novi Tuswanto Tuswanto Virdiana Sriviana Fatmawaty Wahju Tjahjo Saputro Wahyusari, Retno Winoto, Sakti Wintolo, Hero Wulandari, Cisi Fitri Yana Mulyana Yana Mulyana Yasidah Nur Istiqomah Yeki, Surya Yohanni Syahra Yossi Octavina Yulianto, Dinan Yulianto, Muhammad Anas Yuminah yuminah yuminah, Yuminah Yuminah, Yuminah Yuwono Fitri Widodo Zein, Wahid Alfaridsi Achmad Zulhijayanto -