p-Index From 2021 - 2026
10.473
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Sistemasi: Jurnal Sistem Informasi Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) JSI (Jurnal sistem Informasi) Universitas Suryadarma Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

Analisis Forensics Untuk Mendeteksi Pemalsuan Video Umar, Rusydi; Fadlil, Abdu; Putra, Alfiansyah Imanda
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 2 (2019): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.85 KB) | DOI: 10.30645/j-sakti.v3i2.140

Abstract

The current technology is proving that the ease with which crimes occur using computer science in the field of video editing, in addition from time to time more and more video editing software and increasingly eassy to use, but the development of this technology is widely misused by video creators to manipulate video hoaxes that cause disputes, so many video cases are spread which cannot be trusted by the public. Counterfeiting is an act of modifying documents, products, images or videos, among other media. Forensic video is one of the scientific methods in research that aims to obtain evidence and facts in determining the authenticity of a video. This makes the basis of research to detect video falsification. This study uses analysis with 2 forensic tools, forevid and VideoCleaner. The result of this study is the detection of differences in metadata, hash and contrast of original videos and manipulated videos.
Pengembangan Sistem Informasi Penunjang Pelayanan Hotel (Studi Kasus: Hotel XYZ) Umar, Rusydi; Nugrahantoro, Achmad; Periyanto, Ari; Nugroho, Aji; Kharismajati, Gema; Susanto, Dwi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.216

Abstract

The hotel is a building that provides lodging services, restaurants, and other services that provide commercial for visitors. The use of hotel services that are still manual will be handled on the effectiveness of excellent service in hotel management. Computer technology support can be a solution in optimizing administrative activities, improving information, and making decisions. Hotel XYZ as one that still uses a manual transaction system. Then it is necessary to integrate data for each transaction using an interconnected database. Steps in the development of information systems need to be considered in improving the services of each hotel. The technique by collecting data to produce literature studies is an appropriate step to analyze the old system while developing the expected system. The results will be made on the design of the system for the database so that they are interconnected and the interface is easily understood by the user so that it facilitates the process of system implementation. After doing research, the black box test with a value of 100% with the results as expected is done. Comparison of the old system can be made by Microsoft Excel with interconnected databases presenting reports in printed form. It can meet the level of user satisfaction with a value of 95.3% of the results of the questionnaire from the five respondents involved.
Analisis Forensik Aplikasi Dropbox pada Android menggunakan Metode NIJ pada Kasus Penyembunyian Berkas Saad, Saleh Khalifah; Umar, Rusydi; Fadlil, Abdul
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.221

Abstract

Smartphones are a testament to the development of digital technology. At this time, the smartphone is also experiencing growth in storage media, one of which is the Cloud storage media. One cloud storage application is the Dropbox Application. The development of cloud storage media does not rule out the possibility of a negative impact on the use or can be used as a medium for crime, such as storing evidence of criminal transactions and cybercrime. This study uses conversation scenarios for application conditions, including data deletion in applications. Data for each experiment will be taken using the National Institute of Justice (NIJ) Method. The method used in dealing with crime with smartphone media evidence is the National Institute of Justice (NIJ) Method. The conclusion of this study is that the use of the National Institute of Justice (NIJ) method ranks the digital forensic stages, starting with identification, collection, examination, analysis, and reporting very well. This method is widely used in handling digital crime cases. The results of the acquisition will then be analyzed by translating the hex codes resulting from the acquisition to produce evidence that can be understood by the judge later.
Pengembangan Sistem Inventory Alat Tulis Kantor (ATK) Berbasis Web Umar, Rusydi; Muntiari, Novita Ranti; E, Ermin; Bustomi, Iqbal; Tella, Fitriyani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1175.712 KB) | DOI: 10.30645/j-sakti.v4i1.190

Abstract

Developments in the technological era are increasingly developing and people's needs vary with the desire to accelerate a job in a systematic and more effective and efficient manner. The problems faced by PT. XYZ in supplies of office equipment are still poorly organized and there is no reporting on the use of office stationery (ATK) and inhibitors of employee productivity because there is no precise inventory information and delays in making reports. Facilitates the company in the process of inventory input Application of the method in this research is to use the classic life cycle (CLC) method, known as the process design, which is carried out sequentially, with the research stages beginning with analysis, design, coding and testing.From the several stages that have been carried out in this researcher can produce reports stock of goods and office stationery information updated to users or visitors.
Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra H, Hermansa; Umar, Rusydi; Yudhana, Anton
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1145.597 KB) | DOI: 10.30645/j-sakti.v4i1.195

Abstract

Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.
Analisis Metode Forward Chaining Pada Sistem Pakar Diagnosa Penyakit Hewan Sapi Berbasis Android Putra, Fajar R. B; Fadlil, Abdul; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.827 KB) | DOI: 10.30645/j-sakti.v5i2.398

Abstract

In particular, Sorong Regency, West Papua, where the availability of veterinarians is still relatively low. The problems that occur in the regency make it difficult for experts to deal with a disease that occurs in livestock, especially cattle. This also makes it difficult for people to diagnose certain diseases experienced by their livestock, so that handling becomes slow and resulting in the risk of death for livestock. This research aims to create an application system to diagnose cattle disease base on android to make it easier for breeders to diagnose symptoms of a disease that occurs in their cattle (cow). The process carried out is by interviewing experts consisting of three paramedics, the results obtained are in the form of disease data, symptoms, and solutions which are used as data on the system. The data that has been analyzed using the Forward Chaining method results in an android-based expert system, help breeders’ difficulties in diagnosing cattle diseases. The results obtained are that the system created to produce a disease that is in accordance with the exiting symptoms. The system is very helpful for farmers in Sorong Regency, they hope that ini the future the system can be updated if there are new diseases or symptoms. The data provided by animal husbandry department and experts are very helpful in this research.`
Sistem Manajemen Percetakan pada CV. Sumber Bahagia Kreasindo Jakarta dengan Metode Prototyping Umar, Rusydi; P, Purwono; Hafidz, Muhammad Nasir; Hanif, Kharis Hudaibiy; Sakti, Fijaya Bima Dwi; Faroek, Dewi Astria
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.715 KB) | DOI: 10.30645/j-sakti.v4i1.191

Abstract

Companies that have two or three more people with an agreement between them is the understanding of the Vennootschap Commanditaire (CV). There are various kinds of CVs that are developing at this time, namely agricultural companies, industry, trade, extractives, and service companies. CV. Sumber Bahagia Kreasindo is a company that offers printing services located in Central Jakarta. Increasingly, customers in the company are increasing and expanding, so they need a system that can recapitulate order data from customers to be more efficient and systematic. The rapid development of technology today, so that it can help employees who previously wrote orders manually. Can write orders through the website. The system makes it easy for employees to see the order process from customers,
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST) Syahib, Muhammad Irwan; Riadi, Imam; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.196

Abstract

The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Sistem Informasi Laboratorium Klinik Berbasis Client Server Umar, Rusydi; Siswanto, Anwar; Abe, Tuska; Lestari, Tri; Dzakwan, M Sabiq; N, Musri Iskandar
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.215

Abstract

The copyright of recognition for software programmer is needed to improve their productivity. Linux is the right choice of software to use in their fieldwork. The information system is important to help a good service in a laboratory has taken quality competition—the development of technology base on client-servers supporting an expert application maker to get customer satisfaction. The Laboratory information system has developed using gambas 1.014, the databases using MySQL server five, and Linux operating system.
Analisis Forensics Untuk Mendeteksi Pemalsuan Video Umar, Rusydi; Fadlil, Abdu; Putra, Alfiansyah Imanda
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 2 (2019): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v3i2.140

Abstract

The current technology is proving that the ease with which crimes occur using computer science in the field of video editing, in addition from time to time more and more video editing software and increasingly eassy to use, but the development of this technology is widely misused by video creators to manipulate video hoaxes that cause disputes, so many video cases are spread which cannot be trusted by the public. Counterfeiting is an act of modifying documents, products, images or videos, among other media. Forensic video is one of the scientific methods in research that aims to obtain evidence and facts in determining the authenticity of a video. This makes the basis of research to detect video falsification. This study uses analysis with 2 forensic tools, forevid and VideoCleaner. The result of this study is the detection of differences in metadata, hash and contrast of original videos and manipulated videos.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Annafii, Moch. Nasheh Anton Yudhana Anton Yudhana Anwarudin, Aang Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arizona Firdonsyah Asruddin, Asruddin Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Juliansyah, Fitrah Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kusuma, Ridho Surya Kuswandani, Deni Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Murinto Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nagala Wangsa kencana Nasrulloh, Imam Mahfudl Nugroho, Ismail Adji Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Raden Mohamad Herdian Bhakti Ramdhani, Rezki Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Sidiq, Ahmad Fajar Siswanto, Anwar Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Suwanti Suwanti Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Widya Cholid Wahyudin Winoto, Sakti Yuminah yuminah yuminah, Yuminah Yuminah, Yuminah