Claim Missing Document
Check
Articles

Found 3 Documents
Search

Penerapan Pemilihan Model Dinamis Algoritma Behaviour Tree Decision dalam Third Person Game pada Musuh Non-Playable Charater Qowy, Bilal Abdul; Hanafi, Faiz; Riandi, M.Akbar; Nuraminah, Ahlijati
Jurnal Teknik Informatika dan Elektro Vol 3 No 1 (2021): Januari : Jurnal Teknik Informatika dan Elektro
Publisher : Universitas Gajah Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55542/jurtie.v3i1.424

Abstract

Teknologi kian melesat di era ini. Kebutuhan manusia untuk mendapatkan hiburan melalui teknologi informasi yang mudah dan cepat sangatlah dibutuhkan. Artificial intelligence menjadi pelopor yang mendukung berbagai bentuk kebutuhan yang dibuuthkan dalam pembuatan berbagai macam kemudahan manusia di era modern. Tak lepas dari itu semua, Artificial intelligence atau biasa disebut kecerdasan buatan dengan algorithma menjadi salah satu factor utama dari berkembangnya kebutuhan manusia dalam media informasi hingga hiburan. Dalam dunia hiburan algorithma juga digunakan untuk media pendukung dalam permainan. Salah satu penerapan Artificial intelligence dengan algoritma adalah berkembangnya permainan yang menerapkan algotima sperti beahviour tree yang bertujuan untuk menciptakan permainan yang lebih dinamis. Ketika sebuah algorithma ini diterapkan maka akan memberikan sebuah system permainan yang dinamis, membuka peluang lebih jauh dalam meningkatkan keseruan bermain, hingga berbagai kebermanfaatan yang dapat dirasakan seterusnya.
Implementation of Sorting Algorithm in Marketplace to Sort Price Using Insertion Sort Qowy, Bilal Abdul; Chalik, Amanda Muchsin; Hanafi, Faiz; Sundawijaya, Andika
Jurnal Teknik Informatika dan Elektro Vol 4 No 1 (2022): Januari: Jurnal Teknik Informatika dan Elektro
Publisher : Universitas Gajah Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55542/jurtie.v4i1.428

Abstract

Price is the first thing that customers look at before they buy something. So, sorting is the most important feature that every single person needs when we want to shop on the online marketplace or we can call it e-commerce. In this case we would focus on the price, because price is the most important thing that customers consider before they buy something. However, customers see each other too closely but price is the most important thing. Sort Algorithm is not just about Insertion Sort , there are many of them, like bubble sort , Quicksort, mergesort, etc. but we use insertion sort based on the runtime complexities and find the fastest time to reach the final results. And our implementation in the website base, it is common to use and implement on that scope.
Penerapan Fault Injection based Security Testing untuk Menemukan Potensi Celah Keamanan Indor pada Platform XYZ Purnomo, Andi; Hanafi, Faiz
FORMAT Vol 14, No 1 (2025)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/format.2025.v14.i1.001

Abstract

Security Disclosure has become an important program in identifying and addressing vulnerabilities in software systems across various organizations and institutions by providing an opportunity for system testing through collaboration with external parties. This research aims to provide a deeper understanding of security disclosure through the Security Disclosure program on Platform XYZ, with a focus on Fault Injection techniques through parameter manipulation to discover IDOR (Insecure Direct Object Reference) vulnerabilities. The research begins by explaining the importance of the Security Disclosure program in the context of software security and system improvement. Furthermore, this study conducts testing on Fault Injection techniques through parameter manipulation, which is used to search for IDOR vulnerabilities on Platform XYZ. By manipulating input parameters, researchers can test the system by inducing unexpected behavior that can reveal sensitive information or grant unauthorized access to permissions. Case studies and real-world examples are used to demonstrate the effectiveness and impact of Fault Injection techniques in enhancing system security. The research findings have shown a high level of IDOR vulnerability with an impact on thousands of users. This research also highlights the importance of broader understanding of software security and security awareness for organizations and individual users. It is expected that this research will contribute to improving understanding of security disclosure and Fault Injection techniques through parameter manipulation, as well as promoting higher security awareness in protecting software systems from attacks and safeguarding sensitive user data on Platform XYZ.