Articles
Analisis Forensics Untuk Mendeteksi Pemalsuan Video
Umar, Rusydi;
Fadlil, Abdu;
Putra, Alfiansyah Imanda
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 2 (2019): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (990.85 KB)
|
DOI: 10.30645/j-sakti.v3i2.140
The current technology is proving that the ease with which crimes occur using computer science in the field of video editing, in addition from time to time more and more video editing software and increasingly eassy to use, but the development of this technology is widely misused by video creators to manipulate video hoaxes that cause disputes, so many video cases are spread which cannot be trusted by the public. Counterfeiting is an act of modifying documents, products, images or videos, among other media. Forensic video is one of the scientific methods in research that aims to obtain evidence and facts in determining the authenticity of a video. This makes the basis of research to detect video falsification. This study uses analysis with 2 forensic tools, forevid and VideoCleaner. The result of this study is the detection of differences in metadata, hash and contrast of original videos and manipulated videos.
Pengembangan Sistem Informasi Penunjang Pelayanan Hotel (Studi Kasus: Hotel XYZ)
Umar, Rusydi;
Nugrahantoro, Achmad;
Periyanto, Ari;
Nugroho, Aji;
Kharismajati, Gema;
Susanto, Dwi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v4i2.216
The hotel is a building that provides lodging services, restaurants, and other services that provide commercial for visitors. The use of hotel services that are still manual will be handled on the effectiveness of excellent service in hotel management. Computer technology support can be a solution in optimizing administrative activities, improving information, and making decisions. Hotel XYZ as one that still uses a manual transaction system. Then it is necessary to integrate data for each transaction using an interconnected database. Steps in the development of information systems need to be considered in improving the services of each hotel. The technique by collecting data to produce literature studies is an appropriate step to analyze the old system while developing the expected system. The results will be made on the design of the system for the database so that they are interconnected and the interface is easily understood by the user so that it facilitates the process of system implementation. After doing research, the black box test with a value of 100% with the results as expected is done. Comparison of the old system can be made by Microsoft Excel with interconnected databases presenting reports in printed form. It can meet the level of user satisfaction with a value of 95.3% of the results of the questionnaire from the five respondents involved.
Analisis Forensik Aplikasi Dropbox pada Android menggunakan Metode NIJ pada Kasus Penyembunyian Berkas
Saad, Saleh Khalifah;
Umar, Rusydi;
Fadlil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v4i2.221
Smartphones are a testament to the development of digital technology. At this time, the smartphone is also experiencing growth in storage media, one of which is the Cloud storage media. One cloud storage application is the Dropbox Application. The development of cloud storage media does not rule out the possibility of a negative impact on the use or can be used as a medium for crime, such as storing evidence of criminal transactions and cybercrime. This study uses conversation scenarios for application conditions, including data deletion in applications. Data for each experiment will be taken using the National Institute of Justice (NIJ) Method. The method used in dealing with crime with smartphone media evidence is the National Institute of Justice (NIJ) Method. The conclusion of this study is that the use of the National Institute of Justice (NIJ) method ranks the digital forensic stages, starting with identification, collection, examination, analysis, and reporting very well. This method is widely used in handling digital crime cases. The results of the acquisition will then be analyzed by translating the hex codes resulting from the acquisition to produce evidence that can be understood by the judge later.
Pengembangan Sistem Inventory Alat Tulis Kantor (ATK) Berbasis Web
Umar, Rusydi;
Muntiari, Novita Ranti;
E, Ermin;
Bustomi, Iqbal;
Tella, Fitriyani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1175.712 KB)
|
DOI: 10.30645/j-sakti.v4i1.190
Developments in the technological era are increasingly developing and people's needs vary with the desire to accelerate a job in a systematic and more effective and efficient manner. The problems faced by PT. XYZ in supplies of office equipment are still poorly organized and there is no reporting on the use of office stationery (ATK) and inhibitors of employee productivity because there is no precise inventory information and delays in making reports. Facilitates the company in the process of inventory input Application of the method in this research is to use the classic life cycle (CLC) method, known as the process design, which is carried out sequentially, with the research stages beginning with analysis, design, coding and testing.From the several stages that have been carried out in this researcher can produce reports stock of goods and office stationery information updated to users or visitors.
Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra
H, Hermansa;
Umar, Rusydi;
Yudhana, Anton
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1145.597 KB)
|
DOI: 10.30645/j-sakti.v4i1.195
Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.
Analisis Metode Forward Chaining Pada Sistem Pakar Diagnosa Penyakit Hewan Sapi Berbasis Android
Putra, Fajar R. B;
Fadlil, Abdul;
Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (789.827 KB)
|
DOI: 10.30645/j-sakti.v5i2.398
In particular, Sorong Regency, West Papua, where the availability of veterinarians is still relatively low. The problems that occur in the regency make it difficult for experts to deal with a disease that occurs in livestock, especially cattle. This also makes it difficult for people to diagnose certain diseases experienced by their livestock, so that handling becomes slow and resulting in the risk of death for livestock. This research aims to create an application system to diagnose cattle disease base on android to make it easier for breeders to diagnose symptoms of a disease that occurs in their cattle (cow). The process carried out is by interviewing experts consisting of three paramedics, the results obtained are in the form of disease data, symptoms, and solutions which are used as data on the system. The data that has been analyzed using the Forward Chaining method results in an android-based expert system, help breeders’ difficulties in diagnosing cattle diseases. The results obtained are that the system created to produce a disease that is in accordance with the exiting symptoms. The system is very helpful for farmers in Sorong Regency, they hope that ini the future the system can be updated if there are new diseases or symptoms. The data provided by animal husbandry department and experts are very helpful in this research.`
Sistem Manajemen Percetakan pada CV. Sumber Bahagia Kreasindo Jakarta dengan Metode Prototyping
Umar, Rusydi;
P, Purwono;
Hafidz, Muhammad Nasir;
Hanif, Kharis Hudaibiy;
Sakti, Fijaya Bima Dwi;
Faroek, Dewi Astria
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1150.715 KB)
|
DOI: 10.30645/j-sakti.v4i1.191
Companies that have two or three more people with an agreement between them is the understanding of the Vennootschap Commanditaire (CV). There are various kinds of CVs that are developing at this time, namely agricultural companies, industry, trade, extractives, and service companies. CV. Sumber Bahagia Kreasindo is a company that offers printing services located in Central Jakarta. Increasingly, customers in the company are increasing and expanding, so they need a system that can recapitulate order data from customers to be more efficient and systematic. The rapid development of technology today, so that it can help employees who previously wrote orders manually. Can write orders through the website. The system makes it easy for employees to see the order process from customers,
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST)
Syahib, Muhammad Irwan;
Riadi, Imam;
Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v4i1.196
The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Sistem Informasi Laboratorium Klinik Berbasis Client Server
Umar, Rusydi;
Siswanto, Anwar;
Abe, Tuska;
Lestari, Tri;
Dzakwan, M Sabiq;
N, Musri Iskandar
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v4i2.215
The copyright of recognition for software programmer is needed to improve their productivity. Linux is the right choice of software to use in their fieldwork. The information system is important to help a good service in a laboratory has taken quality competition—the development of technology base on client-servers supporting an expert application maker to get customer satisfaction. The Laboratory information system has developed using gambas 1.014, the databases using MySQL server five, and Linux operating system.
Analisis Forensics Untuk Mendeteksi Pemalsuan Video
Umar, Rusydi;
Fadlil, Abdu;
Putra, Alfiansyah Imanda
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 2 (2019): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v3i2.140
The current technology is proving that the ease with which crimes occur using computer science in the field of video editing, in addition from time to time more and more video editing software and increasingly eassy to use, but the development of this technology is widely misused by video creators to manipulate video hoaxes that cause disputes, so many video cases are spread which cannot be trusted by the public. Counterfeiting is an act of modifying documents, products, images or videos, among other media. Forensic video is one of the scientific methods in research that aims to obtain evidence and facts in determining the authenticity of a video. This makes the basis of research to detect video falsification. This study uses analysis with 2 forensic tools, forevid and VideoCleaner. The result of this study is the detection of differences in metadata, hash and contrast of original videos and manipulated videos.