Khairunnisak Khairunnisak
Universitas AMIKOM Purwokerto

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

ALGORITMA GENERATE AND TEST UNTUK OPTIMALISASI MASALAH RUTE PERJALANAN Khairunnisak Khairunnisak; Dina Fajar Sulistiyani; Zezya Ramadhany
SINTECH (Science and Information Technology) Journal Vol. 4 No. 2 (2021): SINTECH Journal Edition Oktober 2021
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/sintechjournal.v4i2.719

Abstract

The common of urban city problem is a traffic jam, and it is heavily affect the public transportation service quality. Many cities in tropical countries suffer of heavy traffic jam due to the populaition of motorbike. According to Central Java Province Government, in 2014 the population of motorcycle is 439.418 units with the ownership ratio at 0.75 unit/person. Solo is one of typical middle size city in Central Java, Indonesia. Solo suffers from traffic jam in particular time of the day and it affect the quality of service of batik solo as the mass transportation service in Surakarta. This research would like to help the community get the optimal travel route with the fastest time, especially at the busiest times. The method used is Generate and Test algorithm. This method is a combination of Depth First Search and Backtracking. This research is conducted to get information about the influence of traffic volume, service road level and traffic jam level toward the time needed for Batik Solo Trans to find the optimal route. There is a route that been selected to be the most optimal route by considering the factors that influence it and the algorithm applied
ANALISIS FORENSIK UNTUK MENDETEKSI KEASLIAN CITRA DIGITAL MENGGUNAKAN METODE NIST Khairunnisak Khairunnisak; Hamid Ashari; Adam Prayogo Kuncoro
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol. 3 No. 2 (2020): Jurnal RESISTOR Edisi Oktober 2020
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/jurnalresistor.v3i2.634

Abstract

Currently, the changes in image quality resulting a low-resolution images, faded colors, and so on. This condition potentially attract irresponsible parties to take advantage of the situation for certain purposes. Nowadays, it is very easy for people to manipulate, change, or delete the original information from a digital image thus cause the authenticity and integrity of the image to be doubted. This study is conducted in a specific objective to prove the authenticity of a digital evidence for analysis by providing detailed illustrations of the role of Digital Forensics in accordance with applicable legal regulations in Indonesia using the NIST workflow. The research flow begins with uncovering the background of the problem, collecting data, making scenarios, applying the NIST method, and making conclusions. The illustration used in the scenario is a video inserted into a digital evidence. The video used in this research is the Cyanide Coffee Case with the suspect Wayan Mirna Salihin, happened in August 16, 2016 which was uploaded by Kompas TV channel on Youtube. The NIST analysis phases used several tools: Exiftools, Forevid, and Video Cleaner. The result indicates that all phases in the NIST method are correlated to each other. The result is specifically very clear in the collection phase. The discovery of hidden information causes the examination and analysis process to be more complex especially the extraction process of digital evidence in the form of images. Indeed, the use of various tools are more helpful in disclosing the existing information. This information can be seen from the results of metadata, hash value, and image sharpness from the analyzed digital evidence.
Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network Khairunnisak Khairunnisak; Gilang Miftakhul Fahmi; Didit Suhartono
SINTECH (Science and Information Technology) Journal Vol. 6 No. 1 (2023): SINTECH Journal Edition April 2023
Publisher : Prahasta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/sintechjournal.v6i1.1258

Abstract

Abstract In the era of information technology, it is very important to protect data and information so that irresponsible parties do not misuse it. One technique for securing data is steganography. Steganography is a technique of hiding messages in a medium. One of the media for hiding messages is pictures. However, steganography techniques can still be detected by steganalysis techniques. Steganalysis is a technique for analyzing hidden messages in steganography. Therefore this study applies image processing techniques with the Generative Adversarial Network algorithm model, which aims to manipulate images so that steganalysis techniques cannot detect hidden messages. Proof of the results of applying the Generative Adversarial Network algorithm using a web-based application containing message hiding and extraction functions. The results obtained are that the Generative Adversarial Network algorithm can be applied to create mock objects, and images can revive based on training data which is a model for how the algorithm works. In addition, the results of testing the Generative Adversarial Network algorithm were successfully applied to image steganography which functions to prevent steganalysis techniques from trying to detect messages in images. Future research is expected to be able to select steganographic images other than the results from the training data model according to the original size chosen randomly according to the selection of the user.