p-Index From 2021 - 2026
12.535
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IJCCS (Indonesian Journal of Computing and Cybernetics Systems) JURNAL SISTEM INFORMASI BISNIS Proceedings of KNASTIK Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika SPEKTRUM INDUSTRI Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Jurnal Teknik Elektro Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi JURNAL PENGABDIAN KEPADA MASYARAKAT Jurnal Teknologi Elektro INFORMAL: Informatics Journal Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics JOIN (Jurnal Online Informatika) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer JOIV : International Journal on Informatics Visualization Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Jurnal Informatika Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT InComTech: Jurnal Telekomunikasi dan Komputer Insect (Informatics and Security) : Jurnal Teknik Informatika JURNAL REKAYASA TEKNOLOGI INFORMASI PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer Applied Information System and Management ILKOM Jurnal Ilmiah Compiler MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) JURTEKSI RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Systemic: Information System and Informatics Journal EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Journal of Robotics and Control (JRC) Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Cyber Security dan Forensik Digital (CSFD) JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) International Journal of Advances in Data and Information Systems Edunesia : jurnal Ilmiah Pendidikan Journal of Innovation Information Technology and Application (JINITA) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) JURPIKAT (Jurnal Pengabdian Kepada Masyarakat) Humanism : Jurnal Pengabdian Masyarakat International Journal of Robotics and Control Systems J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Jurnal Pengabdian Informatika (JUPITA) Jurnal INFOTEL Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Jurnal Karya untuk Masyarakat (JKuM) Control Systems and Optimization Letters Signal and Image Processing Letters Scientific Journal of Engineering Research SEMINAR TEKNOLOGI MAJALENGKA (STIMA) Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic Hasa, Muh Fadli; Yudhana, Anton; Fadlil, Abdul
Mobile and Forensics Vol. 1 No. 2 (2019)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v1i2.1217

Abstract

Secure Digital Card (SD Card) merupakan salah satu media untuk mendapatkan bukti digital dalam proses penyelidikan suatu kasus cybercrime. Oleh kerena itu, perlu adanya penelitian tentang analisa bukti digital pada media penyimpanan SD Card. Penelitian ini membahas tentang proses eksaminasi dan analisis bukti digital yang terdapat pada media penyimpanan SD Card yang bertujuan untuk membantu proses penyelidikan kasus cybercrime. Proses penelitian menggunakan tools forensic FTK Imager dan Autopsy serta menggunakan metode forensic static dimana barang bukti eletronik diproses secara bit-by-bit image dalam melakukan proses forensik. Hasil dari penelitian ini adalah barang bukti yang berupa SD Card dilakukan proses examinasi dan recovery data yang hilang, data yang berhasil di recovery dibedakan berdasarkan cara pelaku menghapus datanya. Data yang didapatkan pada SD Card dapat dijadikan sebagai barang bukti pada proses persidangan kasus cybercrime.
Internet of things-based photovoltaics parameter monitoring system using NodeMCU ESP8266 Tole Sutikno; Hendril Satrian Purnama; Anggit Pamungkas; Abdul Fadlil; Ibrahim Mohd Alsofyani; Mohd Hatta Jopri
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5578-5587

Abstract

The use of the internet of things (IoT) in solar photovoltaic (PV) systems is a critical feature for remote monitoring, supervising, and performance evaluation. Furthermore, it improves the long-term viability, consistency, efficiency, and system maintenance of energy production. However, previous researchers' proposed PV monitoring systems are relatively complex and expensive. Furthermore, the existing systems do not have any backup data, which means that the acquired data could be lost if the network connection fails. This paper presents a simple and low-cost IoT-based PV parameter monitoring system, with additional backup data stored on a microSD card. A NodeMCU ESP8266 development board is chosen as the main controller because it is a system-on-chip (SOC) microcontroller with integrated Wi-Fi and low-power support, all in one chip to reduce the cost of the proposed system. The solar irradiance, ambient temperature, PV output voltage and PV output current, are measured with photo-diodes, DHT22, impedance dividers and ACS712. While, the PV output power is a product of the PV voltage and PV current. ThingSpeak, an open-source software, is used as a cloud database and data monitoring tool in the form of interactive graphics. The results showed that the system was designed to be highly accurate, reliable, simple to use, and low-cost.
Performance Analysis of Hashing Methods on the Employment of App Anton Yudhana; Abdul Fadlil; Eko Prianto
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (604.931 KB) | DOI: 10.11591/ijece.v8i5.pp3512-3522

Abstract

The administrative process carried out continuously produces large data. So the search process takes a long time. The search process by hashing methods can save time faster. Hashing is methods that directly access data in a table by making references to the key that hashing becomes the address in the table. The performance analysis of the hashing method is done by the number of 18 digit character values. The process of analysis is done on applications that have been implemented in the application. The algorithm of hashing method analyzed is progressive overflow (PO) and linear quotient (LQ). The main purpose of performance analysis of hashing method is to know how gig the performance of each method. The results analyzed showed the average value of collision with 15 keys in the analysis of 53.3% yield the same value, while 46.7% showed the linear quotient has better performance.
Sistem Identifikasi Jamur Menggunakan Metode Ekstraksi Ciri Statistik Orde 1 dan Klasifikasi Jarak Sapriani Gustina; Abdul Fadlil; Rusydi Umar
Techno.Com Vol 16, No 4 (2017): November 2017
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.277 KB) | DOI: 10.33633/tc.v16i4.1490

Abstract

Sistem pengenalan identifikasi jamur berbasis komputer merupakan suatu proses memasukkan informasi berupa citra jamur ke dalam sebuah komputer. Selanjutnya komputer akan menerjemahkan serta mengidentifikasi jenis jamur tersebut. Pada penelitian ini telah dilakukan perancangan sistem identifikasi jamur dengan memanfaatkan kamera untuk akuisisi data pada citra jamur. Langkah yang dilakukan yaitu pemrosesan awal, ekstraksi ciri dan pengklasifikasan. Pengembangan sistem tahap pertama yang dilakukan adalah tahap penentuan pola standar referensi  dan tahap kedua yaitu pengujian. Data yang digunakan sebagai standar referensi sebanyak 3 sampel jamur dari 5 jenis jamur yang akan diteliti yaitu Jamur Kancing, Jamur Kuping, Jamur Merang, Jamur Lingzhi Kerang dan Jamur Tiram Merah. Sedangkan untuk pengujian unjuk  kerja sistem menggunakan 27 sampel untuk masing- masing jenis jamur. Pengujian unjuk kerja sistem dilakukan menggunakan metode klasifikasi jarak. Hasil pengujian untuk sistem identifikasi citra jamur menunjukkan tingkat akurasi yang tinggi sebesar 82% dengan metode ekstraksi ciri Statistik Orde 1 dan metode klasifikasi jarak.
Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology Imam Riadi; Abdul Fadlil; Muhammad Nasir Hafizh
Jurnal Pendidikan Informatika (EDUMATIC) Vol 4, No 1 (2020): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v4i1.2046

Abstract

This research intends to find information about evidence of Address Resolution Protocol (ARP) Spoofing attacks that is the MAC address of the attacker and victim also the time of the attack. This research uses Wireshark tools to inspect network traffic, especially on the ARP protocol. It uses the National Institute of Technology Technology (NIST) method as a framework in the simulation process to produce evidence reports. ARP Spoofing attacks can lead to other attacks, such as Denial of Service and Man in the Middle Attack, this attack allows users not to be able to access the network and data theft. During the simulation stage, 2 ARP Spoofing attacks are carried out on 1 laptop and 1 router connected to the network. The results of the attack simulation found 2 attacks and obtained information about the MAC address of the attacker and victim and also the time of the attack. Based on the results of tests carried, successfully found all ARP Spoofing attacks that occur on the network with a success rate of 100%
PURWARUPA SISTEM PEMBATAS KECEPATAN SEPEDA MOTOR BERBASIS MIKROKONTROLER AT89S52 Ikhsan hidayat; Abdul Fadlil; Edy Fathurrozaq
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 7, No 2: August 2009
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v7i2.582

Abstract

Security riding is very important in the aspects of traffic. One of the main factors of traffic accidents is high speed. Therefore, it is required a speed restraint equipment for pressing the number of accidents. The car speed restraint system is available in the market, but on a motorcycle is not available yet. This paper presents a design of speed restraint equipment for motorcycle that safe for users, and is expected to reduce traffic accident. The Main idea this speed restriction is cutting off the flow of electrical signals from the pulser (the time ignition trigger sensor) to the CDI for 1 second. The cutting Signal with mechanical relays controlled by microcontroller AT89S52 using the on-off algorithm. Speed sensor use optocoupler is used to detect the number of rounds wheel motorcycle. If a result of measurement is more than the speed setpoint, microcontroler make a decission to cut motorcycle ignition signal. Results of this research is a prototype speed restraint shown that it able to process data from the measurement of the speed limit on the speed of a motorcycle. This prototype safe for all users and accordance with the set value and the level of success is above 90% for speed of 10 km/hr to 40 km/hr.
PENGEMBANGAN SISTEM BASIS DATA PRESENSI PERKULIAHAN DENGAN KARTU MAHASISWA BER-BARCODE Abdul Fadlil; Kartika Firdausy; Fauzi Hermawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 6, No 1: April 2008
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v6i1.552

Abstract

The level of attendance in an institution is very important because the credibility of a person seen from the high level of diligent presence or absence of the person. Like for example in activities at a university, data on the level of attendance of a student in a lecture to be very important because there are professors that considers presence as one of the components in the assessment. However, the system manually presence there it is less effective in storing the data. This study aims to design a system using barcode presence as presensinya data input. Presence system design includes three components namely the barcode found on the student card, barcode scanners Series CD-108E CCD (CCD scanner) and the computer. Attendance management through this system enables the optimization function Student Identity Card (KTM) equipped with a Student Identification Number. Use of this system will facilitate the presence to monitor student attendance mengontrolan the student. Presence system has been tested with several different variations of the KTM through the distance and position of the barcode on the barcode scanner. Test results obtained ideal position to barcode scanners barcode reading is at a distance of 2 cm with an accuracy rate of 100% and at an angle of 900 accuracy rate of 100%.
PROGRAM SEDERHANA SISTEM PENGENALAN WAJAH MENGGUNAKAN FUNGSI JARAK Abdul Fadlil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 4, No 3: December 2006
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v4i3.1310

Abstract

Over the years, face recognition ones of biometric characteristic has attracted attention of many researchers and scientists. Many efforts has been done to built an automatic system capable of recognizing faces with several different techniques. The simple program for face recognition has been developed. The purpose of this program is to compare efectifity two simple distance functions namely Manhattan (L1) and Euclidean (L2) as classifier for face recognition system. In this research, system is trained and tested using dataset images of the five persons with different expresion faces. The results of our experiments show that the system could be more accurate from 95% for Manhattan distance function (L1) to be 100% for Euclidean distance function (L2). 
An Automatic Identification System of Human Skin Irritation Abdul Fadlil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 8, No 3: December 2010
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v8i3.627

Abstract

Quantitative characterization of human skin irritation is important but it is difficult task to be done. Recently, an identification of human skin is still doing manually. Indeed, the identification of the human skin irritation sample can be very subjective. The analysis of the skin irritation could be conducted using biochemical test, but it is not simple. In this research, a new approach of an automatic human skin identification system based on image pattern recognition is developed to obtain a decision of sample test (whether it has irritation or not). This system design was developed using the following features extraction: gray level histogram (GLH) feature and texture gray level co-occurrence matrices (GLCM). Meanwhile, for a classification  process, using the following distance metric: Manhattan distance and Euclidean distance, or learning vector quantization neural network (LVQ-NN). The combination between feature extractor and classifier methods proposed was used to evaluate the performance system. The experimental results show that the best accuracy for 83.33% was obtained when design system was implementated using GLH or GLCM features through LVQ-NN classifier.     
Analisis Keamanan Webserver menggunakan Penetration Test Fahmi Fachri; Abdul Fadlil; Imam Riadi
Jurnal Informatika Vol 8, No 2 (2021): September 2021
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (312.905 KB) | DOI: 10.31294/ji.v8i2.10854

Abstract

Keamanan adalah faktor penting yang harus diperhatikan dalam membangun sebuah web server. Pengujian Penetrasi didefinisikan sebagai upaya legal dan resmi untuk mengekploitasi sistem komputer dengan tujuan mencari kerentanan pada web server serta meningkatkan keamanan sistem. Pengujian penetrasi ini dilakukan pada web server yang merupakan Sistem Informasi Akademik pada perguruan tinggi. Metode yang digunakan dalam penelitian ini mencakup  Information Gathering, Vullnerability Assessmant, gaining acces, maintaining acces, Clearing Track. Hasil penelitian menampilkan bahwa terdapat empat kelemahan pada web server yaitu level high, empat kelemahan level medium, dan dua kerentanan dengan level low. Ditemukannya beberapa port yang masih terbuka dalam web server yang menyebabkan peretas dengan mudah masuk kedalam sistem untuk mengekploitasi informasi yang terdapat dalam Sistem Informasi Akademik. Hasil ujicoba simulasi serangan terhadap sistem berhasil masuk dengan mendapatkan username dan password
Co-Authors Aang Anwarudin Abdul Azis Achmad Nugrahantoro Aditiya Dwi Candra Ahmat Taufik Aji Pamungkas Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Amiruddin, Nanda Fahmi Andrianto, Fiki Anggit Pamungkas Annisa, Putri Anton Yudhana Anwar Siswanto ANWAR, FAHMI Arief Setyo Nugroho Arief Setyo Nugroho Arif Budi Setianto Arif Budiman Arif Budiman Arif Wirawan Muhammad Aris Rakhmadi Asno Azzawagama Firdaus Atmojo, Dimas Murtia Aulia, Aulia Az-Zahra, Rifqi Rahmatika Aznar Abdillah, Muhamad Bagus Primantoro Basir, Azhar Candra, Aditiya Dwi Darajat, Muhammad Nashiruddin Davito Rasendriya Rizqullah Putra Dewi Soyusiawaty Dhimas Dwiki Sanjaya Dian Permata Sari Dianda Rifaldi Dikky Praseptian M Dimas Murtia Atmojo Doddy Teguh Yuwono Dwi Susanto Dwi Susanto Edy Fathurrozaq Egi Dio Bagus Sudewo Eko Prianto Eko Prianto Elvina, Ade Ermin Al Munawar Ermin Ermin Esthi Dyah Rikhiana Fahmi Anwar Fahmi Auliya Tsani Fahmi Auliya Tsani Fahmi Fachri Fanani, Galih Faqihuddin Al-anshori Faqihuddin Al-Anshori, Faqihuddin Fathurrahman, Haris Imam Karim Fauzi Hermawan Fiki Andrianto Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitri Muwardi Gusrin, Muhaimin Gustina, Sapriani Hafizh, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Harman, Rika Helmiyah, Siti Hendril Satrian Purnama Herdiyanto, Erik Herman Herman Herman Yuliansyah, Herman Herman, - Ibnu Rifajar Ibrahim Mohd Alsofyani Ihyak Ulumuddin Ikhsan hidayat Ilhamsyah Muhammad Nurdin Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irjayana, Rizky Caesar Irwansyah Irwansyah Izzan Julda D.E Purwadi Putra januari audrey Jayawarsa, A.A. Ketut Jogo Samodro, Maulana Muhamammad Joko Supriyanto Joko Supriyanto Kamilah, Farhah Kartika Firdausy Khoirunnisa, Itsnaini Irvina Kusuma, Nur Makkie Perdana Laura Sari Lestari, Yuniarti Lestari, Yuniarti Lin, Yu-Hao Luh Putu Ratna Sundari M. Nasir Hafizh Maftukhah, Ainin Maulana Muhammad Jogo Samudro Mini, Ros Mohd Hatta Jopri Muammar Mudinillah, Adam Mufaddal Al Baqir Muh. Fadli Hasa Muhaimin Gusrin Muhajir Yunus Muhamad Daffa Al Fitra Muhamad Rosidin Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Johan Wahyudi Muhammad Kunta Biddinika Muhammad Nasir Hafizh Muhammad Nur Faiz Muhammad Nurdin, Ilhamsyah Muhammad Rizki Setyawan Muntiari, Novita Ranti Murinto Murinto - Murinto Murinto Murni Murni Musliman, Anwar Siswanto Mustofa Mustofa Muwardi, Fitri Nasution, Dewi Sahara Nasution, Musri Iskandar Nurwijayanti Pahlevi, Ryan Fitrian Ponco Sukaswanto Poni Wijayanti Prabowo, Basit Adhi Prayogi, Denis Priambodo, Bambang Putra, Fajar R. B Putri Annisa Putri Annisa Putri Purnamasari Putri Silmina, Esi Ramadhani, Muhammad Ramdhani, Rezki Razak, Farhan Radhiansyah Rezki Rezki Rifqi Rahmatika Az-Zahra Rizky Andhika Surya Rochmadi, Tri Roni Anggara Putra Rusydi Umar Rusydi Umar S Sunardi S, Sunardi Saad, Saleh Khalifah Safiq Rosad Saifudin Saifudin Saifullah, Shoffan Saleh khalifa saad Santi Purwaningrum Sarmini Sarmini Septa, Frandika Setyaputri, Khairina Eka Setyaputri, Khairina Eka Setyaputri, Khairina Eka Shinta Nur Desmia Sari Siti Helmiyah Subandi, Rio Sukaswanto, Ponco Sukma Aji Sulis Triyanto Sunardi Sunardi Sunardi Sunardi, Sunardi Surya Yeki Surya Yeki Syamsiar, Syamsiar Syarifudin, Arma Tole Sutikno Tresna Yudha Prawira Tresna Yudha Prawira Tri Ferga Prasetyo Tristanti, Novi Tuswanto Tuswanto Virdiana Sriviana Fatmawaty Wahju Tjahjo Saputro Wahyusari, Retno Winoto, Sakti Wintolo, Hero Wulandari, Cisi Fitri Yana Mulyana Yana Mulyana Yasidah Nur Istiqomah Yeki, Surya Yohanni Syahra Yossi Octavina Yulianto, Dinan Yulianto, Muhammad Anas Yuminah yuminah yuminah, Yuminah Yuminah, Yuminah Yuwono Fitri Widodo Zein, Wahid Alfaridsi Achmad Zulhijayanto -