cover
Contact Name
Ahmad Azhari
Contact Email
ahmad.azhari@tif.uad.ac.id
Phone
+6281294055949
Journal Mail Official
mf.mti@uad.ac.id
Editorial Address
Magister Teknik Informatika Jl. Prof. Dr. Soepomo SH, Janturan, Warungboto, Yogyakarta 55164
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Mobile and Forensics
ISSN : 26566257     EISSN : 27146685     DOI : https://doi.org/10.12928/mf
Mobile and Forensics (MF) adalah Jurnal Nasional berbasis online dan open access untuk penelitian terapan pada bidang Mobile Technology dan Digital Forensics. Jurnal ini mengundang seluruh ilmuan dan peneliti dari seluruh dunia untuk bertukar dan menyebarluaskan topik-topik teoritis dan praktik yang berorientasi pada kemajuan teknologi mobile dan digital forensics.
Articles 99 Documents
Decision Support System For Election Suppliers of Goods Using The Simple Method Additive Weighting (SAW) Aprilandri, Gusti; Rumini, Rumini; Maulina, Dina
Mobile and Forensics Vol. 6 No. 1 (2024)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i1.5522

Abstract

Selection of suppliers of goods is the main key to starting a retail business. The market will find it difficult to determine suppliers because it will have a big effect on the final selling price. The Diva Shop is a medium-sized business that is still growing in the city. The system run by the store is still running on experience. As a store that is ready to compete, the store needs a supporting design system in determining the selection of suppliers of goods. The system is run using the Simple Additive Weighting (SAW) method. That The system that will be created uses the criteria that will be applied by the user based on the SAW method. The SAW design method uses a weighted summation method with the accumulation of various data, each value from the weight results obtained becomes the final decision. The Simple Additive Weighting (SAW) method can be applied properly and correctly to the decision support system at the Diva Store. The steps and results of calculations manually are the same as the steps and results of calculations performed by the system. For testing applications based on the Confusion Matrix method, the accuracy is 73.77% with an error percentage of 26.23%.
Image Forensics Using Error Level Analysis and Block Matching Methods Sudianto, Iis; Anwar, Nuril
Mobile and Forensics Vol. 6 No. 2 (2024)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v6i2.5719

Abstract

The development of image editing tools today makes everyone able to manipulate images easily so that many images are doubtful of their authenticity. The current image can be used as evidence in a legal case in court. The authenticity of the image is a topic that many have tried to solve various studies. This study discusses the authenticity of the image using the Error Level Analysis (ELA) method to determine the authenticity of the image, especially in the JPEG image. Block Matching is used in the process of dividing an image into several square or block parts. The ELA method has been successfully implemented with 95% image compression resulting in MSE and PSNR values ​​in distinguishing the edited image. The average MSE is 23.8 dB and the average PSNR is 34.47 dB. Block Matching results as a whole show that the pixel value for x values ​​that reach 30 there are 9 images, x values ​​that reach 24 there are 9 images, x values ​​that reach 23 there are 1 image, and for x values ​​that reach 19 there is 1 image. The result of pixel (y) of all images exceeds the value of 12 which in pixel (y) undergoes many changes marked by the presence of white spots.
Motion Capture Technique with Enhancement Filters for Humanoid Model Movement Animation Habibillah, Ahmad Yasin; Prahara, Adhi; Murinto, Murinto
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.6534

Abstract

The definition of 3D animation is a representation of objects that are made into animation using characters or objects to look more alive and real. Making 3D animation itself requires a long process and a large amount of funding. This is because most 3D animated films still use key-framing technology which causes the process to make an animation to take a lot of steps. In this research, a motion capture technique with an enhancement filter is proposed to make humanoid movement animation using Kinect 2.0. The method consists of several steps such as recording every skeleton joint of human movements using a Kinect sensor, filtering the movements to minimize the shakiness and jitter from Kinect data, mapping skeleton data to the bones of a rigged humanoid model, and recording each movement to make animation. The final result is in the form of a 3D animation of modern dance movements. The method is tested by measuring the similarity between the 3D humanoid model and the user movement. From the 10 animations of modern dance generated by the method and performed by the user, a questionnaire to measure the MRI and MSE value is distributed and the result achieves 4.27 on a scale of 5 for the averaged MRI score and 0.0539 for the MSE score. The MSE value is less than 5% which means the system is categorized as acceptable.
K-Means for Majoring Informatics Students' Interests Based on Brainwave Signals Robin, Qori Aulia; Azhari, Ahmad
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.6629

Abstract

This study investigates the potential of utilizing EEG (electroencephalogram) as a determinant for the specialization choices of Informatics students. EEG, measuring brain activity patterns, is employed to discern majors of interest among students. A questionnaire revealed that some students opt for specializations due to class availability and peer influence, leading to potential mismatches between their abilities and interests, consequently affecting their final project or thesis. EEG data from 30 respondents, recorded using NeuroSky Mindwave and MyndPlayer Pro software, were subjected to K-Means Clustering after feature extraction through PCA. However, the evaluation using Silhouette indicated a low score of 0.453, possibly due to significant distance between cluster data and centroids, minimal dataset size, and random respondent selection without considering their specific areas of interest. This suggests limitations in using EEG alone for determining specialization choices, necessitating further refinement and integration with additional factors for more accurate predictions.
Forensic Digital Analysis of Telegram Applications Using the National Institute Of Justice and Naïve Bayes Methods Apriyani, Meyti Eka; Maskuri, Rahmad Alfian; Ratsanjani, M.Hasyim; Pramudhita, Agung; Rawansyah, Rawansyah
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.7893

Abstract

Currently, Telegram is an instant messaging application that is often used by the Indonesian people as a means of long-distance communication with other users. Telegram also has good security features to protect all data from its users. However, Telegram has a positive impact on its users. This security feature can be used by several people to protect against digital crimes, especially cases of sexual harassment. To overcome the existing crimes, analysis, and forensic methods are needed to help solve crimes. This research is guided by the investigation process using the National Institute Of Justice (NIJ) method and the Naïve Bayes method to classify the conversations found. It can be concluded that MOBILedit Forensic Express has a poor performance in finding digital evidence in the Telegram application and FTK Imager is very good at finding digital evidence in the Telegram application. In this research, the classification process using the Naïve Bayes method has been able to classify conversations that contain sexual harassment or not. Evaluation of the classification method uses a confusion matrix to determine the best classification model.
Development of Mandarin Education Quiz Game Using Android-Based Multimedia Development Life Cycle Topani, Muhammad Alfikri Maida; Azhari, Ahmad
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.7947

Abstract

Mandarin is a language that is widely spoken and studied by people all over the world. Parents who start enrolling their children in Mandarin language courses from an early age with the hope that their children will become accustomed and proficient in using Mandarin. However, for elementary school children, the difficulty of constructing sentences in Mandarin is a major obstacle for children in the process of learning Mandarin. The purpose of this research is to create a unity-based mandarin quiz educational game application that is useful as an alternative media in the learning process to make it easier to learn. which is useful for a. Help make it easier for tutors in learning activities teaching by utilizing media technology in the form of Android-based educational games. Help students learn Chinese HSK material with a happy feeling and don't feel bored, because the content in the educational game "Mandarin Quiz" is displayed in an attractive way with audio, animation, and games on an Android smartphone. Helping children's enthusiasm for learning to know Mandarin. System development for users will be developed using the Multimedia Development Life Cycle (MDLC) methodology. Each step or stage of this method is suitable for system development in multimedia applications and these stages can swap positions according to research needs. It is hoped that the results of testing and designing the Mandarin Quiz educational game application using Unity 2D can be further developed so that this application can help increase interest in learning. The test results and feasibility of this educational game used the Usability Scale System (SUS) which consisted of 46 functions with 10 questions, the final test result was obtained with a score of 88, so that the mandarin quiz educational game was declared acceptable.
Hybird Autokey Cipher Algorithm Implementation Reverse Key and Standard Data Encryption for App-Based Text Messages Lazuardi, Risandio Ilham; Anwar, Nuril
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.8451

Abstract

The development of the internet facilitates public communication in sharing information. Along with the advancement of technology in the communication segment, there were various threats to it. Many applications had sophisticated security systems, but the actions in exploiting these security systems were also increasingly diverse. This study implemented a combination of classic and modern algorithms, namely autokey cipher reverse key and DES to protect data from these crimes. This research develops encryption and decryption applications using the agile method, the technique used because of the time spent on the built progress of applications with a cycle for the development process. With this cycle utilized, the method was suitable for developing applications in the short term and revising or improving applications in each cycle. The research resulted in security applications having the function of helping people secure data so that they could prevent and complicate digital criminal acts.
Information Security Readiness Assessment at XYZ Agency Using KAMI Index 4.2 Rahayu, Risgi Sri; Afriyani, Febrilia Dinda
Mobile and Forensics Vol. 6 No. 1 (2024)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v6i1.8649

Abstract

Dinas Xyz is an agency owned by the government of the Special Region of Yogyakarta (DIY) Province. This agency is responsible for managing activities in a region. This research was conducted to evaluate the level of information security readiness at Dinas Xyz using the KAMI Index 4.2 based on ISO/IEC 27001:2013 criteria. This research involves data collection through interviews and observations, followed by data analysis using the KAMI Index categories. The results showed that Dinas Xyz has a sufficient level of information security readiness, with a score of 285 out of a total of 645. This article provides details of the evaluation results for each category. This research suggests improvements to information security management, especially on cloud storage, to meet the minimum requirements of ISO.
Impact Analysis of Web Application Firewall on Website-Based Application Security (Case Study PPDB Kak Seto School Website) Pratama, Krisna Dewa; Anwar, Nuril
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.8914

Abstract

The swift advancement of web-based applications has posed security challenges. Insufficient security awareness among web developers has resulted in a surge of cybercrime incidents due to website vulnerabilities. To counter this, implementing a Web Application Firewall (WAF) is proposed for the vulnerable PPDB Sekolah Kak Seto website, aiming to mitigate threats in the public network. The WAF acts as a defense against potential cyber breaches. Employing an experimental approach, this research encompasses identification, observation, literature review, analysis of WAF system requirements, implementation, testing, and pre/post-implementation analysis using ModSecurity as the security system. The study analyzes the impact of WAF adoption and provides recommendations for enhancing security. Findings demonstrate WAF's effectiveness in fortifying the Kak Seto School web application by efficiently identifying and blocking potential attacks, thereby reducing breach success rates. Post-WAF implementation, Pingdom tests show a slight drop in Performance Grade (70 to 69) and a minor increase in Load Time (2.76 to 3.23 seconds). GTmetrix tests reveal a Grade downgrade from B to C and an increase in Largest Contentful Paint time (2.2 to 2.7 seconds). In conclusion, despite minor performance effects, WAF significantly enhances security, as evident in improved loading times during tests.
EEG Classification for Brain Response Analysis through University Website Interface in Yogyakarta Using Naive Bayes and KNN Suhail, Faiq; Azhari, Ahmad
Mobile and Forensics Vol. 6 No. 1 (2024)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v6i1.9056

Abstract

One of the challenges high school students face is the abundant availability of information about various campuses through different media, making it difficult to accurately predict their interest in a particular campus. Electroencephalogram (EEG) technology can read human brain activity, such as when students access information on a campus website. The Naive Bayes and K-Nearest Neighbor (KNN) methods can be employed to predict student interest in a campus based on EEG signals recorded while they browse the official campus website. Naive Bayes is known for achieving high accuracy with small datasets, whereas KNN excels at classifying noisy data. These two methods offer variables that can be directly compared. Classification using Naive Bayes and KNN achieved the highest accuracy score of 92%. The most appropriate algorithm is determined by evaluating performance using a confusion matrix. In this case study, Naive Bayes slightly outperformed KNN, as evidenced by precision, recall, and f1-score matrices. The Naive Bayes method resulted in an F1-score of 94%, compared to KNN’s 92%.

Page 8 of 10 | Total Record : 99