http://journal2.uad.ac.id/index.php/mf/issue/feedMobile and Forensics2024-09-09T06:36:44+00:00Ahmad Azhariahmad.azhari@tif.uad.ac.idOpen Journal Systems<div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/cover-mf.jpg" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing & computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&ouid=104327450475612404767&rtpof=true&sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> </div> <div id="additionalHomeContent"> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&sort=plf-f&st1=%22Mobile+and+Forensics%22&st2=%22Mob.+Forensics%22&sid=0bc95bcb81b6dd3473c4963df21dafee&sot=b&sdt=b&sl=54&s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&cl=t&ss=plf-f&ws=r-f&ps=r-f&cs=r-f&origin=resultslist&zone=queryBar&sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> </ul> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&gs=NDzfOxEAAAAJ&sc=13" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div>http://journal2.uad.ac.id/index.php/mf/article/view/5719Image Forensics Using Error Level Analysis and Block Matching Methods2022-02-10T06:01:03+00:00Iis Sudiantoiis1700018071@webmail.uad.ac.idNuril Anwarnuril.anwar@tif.uad.ac.id<p>The development of image editing tools today makes everyone able to manipulate images easily so that many images are doubtful of their authenticity. The current image can be used as evidence in a legal case in court. The authenticity of the image is a topic that many have tried to solve various studies. This study discusses the authenticity of the image using the Error Level Analysis (ELA) method to determine the authenticity of the image, especially in the JPEG image. Block Matching is used in the process of dividing an image into several square or block parts. The ELA method has been successfully implemented with 95% image compression resulting in MSE and PSNR values in distinguishing the edited image. The average MSE is 23.8 dB and the average PSNR is 34.47 dB. Block Matching results as a whole show that the pixel value for x values that reach 30 there are 9 images, x values that reach 24 there are 9 images, x values that reach 23 there are 1 image, and for x values that reach 19 there is 1 image. The result of pixel (y) of all images exceeds the value of 12 which in pixel (y) undergoes many changes marked by the presence of white spots.</p>2024-08-08T00:00:00+00:00Copyright (c) 2024 Iis Sudianto, Nuril Anwarhttp://journal2.uad.ac.id/index.php/mf/article/view/11261Identification of Plasmodium Vivax in Blood Smear Images Using Otsu Thresholding Algorithm2024-08-16T09:06:43+00:00Nurul Hudanurul.huda@itesa.ac.idLatifathul Aulialathifatul.aulia@itesa.ac.idMaulany Citra Pandinimaulanycitra26@gmail.com<div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p>In this research, we explore the efficacy of Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) in identifying Plasmodium vivax from blood smear images. We utilized a dataset comprising images of Plasmodium vivax and non-infected cells, applying CNN for deep feature extraction and SVM with otsu’s thresholding for segmentation. The dataset was preprocessed and augmented to enhance model performance. The CNN architecture, consisting of multiple convolutional and dense layers, achieved an accuracy of 98.46% on the validation set. For comparison, features extracted using Otsu’s Thresholding were fed into an SVM classifier, yielding an accuracy of 82%. Confusion matrix was generated to evaluate the classification performance of both models. The CNN model demonstrated superior accuracy and robustness in classification tasks compared to the SVM model. This research shows how deep learning frameworks can be used to analyse medical images and how important it is to have methods for extracting and choosing features to make machine learning models work better.</p> </div> </div> </div>2024-09-18T00:00:00+00:00Copyright (c) 2024 Nurul Huda, Aulia, Citrahttp://journal2.uad.ac.id/index.php/mf/article/view/11287National Institute of Standard Technology Approach for Steganography Detection on WhatsApp Audio Files2024-08-13T01:35:35+00:00Abdul Haris Muhammadagry.arisansi@gmail.comGamaria Mandargamariamandar20@gmail.com<p><em>Audio steganography in instant messaging applications such as WhatsApp poses new challenges in the field of digital security, especially due to the ability to hide data in frequently used formats. This research examines the effectiveness of steganography detection on WhatsApp audio files by applying a method developed by the National Institute of Standards and Technology (NIST). This approach was chosen due to its reputation in security testing standards, but its use in the context of audio steganography on instant messaging platforms has not been widely explored. The novelty of this research lies in the adaptation of the NIST method specifically for audio steganography analysis in WhatsApp, which includes testing against various compression and end-to-end encryption scenarios. The main findings of this research show that the NIST method successfully improves the accuracy of hidden message detection compared to conventional steganalysis techniques, especially under the condition of compressed audio files. In addition, this research also found that the integration of the NIST method enables more effective detection of steganographic data in encrypted audio files. These results confirm that the NIST method can be successfully adapted for instant messaging applications such as WhatsApp, making a significant contribution in the improvement of digital security. This research not only identifies weaknesses in existing steganography techniques, but also introduces a new framework for more accurate and efficient detection in encrypted environments.</em></p>2024-09-18T00:00:00+00:00Copyright (c) 2024 Abdul Haris Muhammad, Gamaria Mandarhttp://journal2.uad.ac.id/index.php/mf/article/view/11388Rediscover Story Of Muhammadiyah Through 3D Game By Applying Game Development Life Cycle2024-08-17T08:42:31+00:00Achmad Nur Hafizhhafizh.246@gmail.comAhmad Azhariahmad.azhari@tif.uad.ac.id<p>Though specifically in Indonesia, Muhammadiyah is already well known but there are still some who do not know their history. This makes people that do not know about Muhammadiyah and the history behind it to make unfounded assumptions about the Islamic refined organization. The purpose is to make an educational game based on Muhammadiyah Museum to further increase the wisdom of players about Muhammadiyah’s history and also to remember and know the history behind each artifact is visualized in form of a game to increase the player’s knowledge. The game development for players will be developed using the Game Development Life Cycle (GDLC) methodology and mostly the modelling technique that will be used is mesh modelling technique in Blender. Each step of this methodology is fitting for the game development and the step might be skipped or swapped according to the needs of research. There are 2 black box tests conducted, the first black box test that has 15 functions result is 47% in accordance with several bugs found which was fixed in the second black box test that resulted 87% in accordance, 13% not in accordance because of the feature was not yet implemented but listed in the main menu. The second test conducted which results and practicality of this educational game using the System Usability Scale (SUS) which consists of 10 instrument statements were scored 85.3 which means that this educational game was declared excellent and acceptable.</p>2024-09-20T00:00:00+00:00Copyright (c) 2024 Achmad Nur Hafizh, Ahmad Azharihttp://journal2.uad.ac.id/index.php/mf/article/view/11529Hybrid ABC–K Means for Optimal Cluster Number Determination in Unlabeled Data 2024-09-09T06:36:44+00:00Harunur Rosyidharun@umg.ac.idMuhammad Modi bin Lakulumodi@meta.upsi.edu.myRamlah bt. Mailok mramlah@meta.upsi.edu.my<p><em>This study presents the ABC K Means GenData algorithm, an enhancement over traditional K Means clustering that integrates the Artificial Bee Colony (ABC) optimization approach. The ABC K Means GenData algorithm addresses the issue of local optima commonly encountered in standard K Means algorithms, offering improved exploration and exploitation strategies. By utilizing the dynamic roles of employed, onlooker, and scout bees, this approach effectively navigates the clustering space for categorical data. Performance evaluations across several datasets demonstrate the algorithm's superiority. For the Zoo dataset, ABC K Means GenData achieved high Accuracy (0.8399), Precision (0.8089), and Recall (0.7286), with consistent performance compared to K Means and Fuzzy K Means. Similar results were observed for the Breast Cancer dataset, where it matched the Accuracy and Precision of K Means and surpassed Fuzzy K Means in Precision and Recall. In the Soybean dataset, the algorithm also performed excellently, showing top scores in Accuracy, Precision, Recall, and Rand Index (RI), outperforming both K Means and Fuzzy K Means.. The comprehensive results indicate that ABC K Means GenData excels in clustering categorical data, providing robust and reliable performance. Future research will explore its application to mixed data types and social media datasets, aiming to further optimize clustering techniques.</em></p> <p><em>.</em></p>2024-09-30T00:00:00+00:00Copyright (c) 2024 harunur rosyid, Muhammad Modi bin Lakulu, Ramlah bt. Mailok http://journal2.uad.ac.id/index.php/mf/article/view/5644Design Job Vacancy Website Using The Laravel Framework2022-02-01T10:57:16+00:00Moch Farid Fauzifaridfauzi@amikom.ac.idGovin Yudian Pradiptagovin.pradipta@students.amikom.ac.idDeny Setiyawandeny.se@students.amikom.ac.idMuhammad Nur Ichsanmuhammad.ichsan@students.amikom.ac.idDzaki Ahsana Reyhandhipadzaki.02@students.amikom.ac.id<p><em>Job vacancies are the most sought after during the current COVID-19 pandemic—the number of layoffs by companies experiencing problems in their business. Many people become unemployed, and income levels decrease while their needs must still be met. This has an impact on the number of people looking for job vacancies. Often found job seekers and job seekers seeking information still through mass media, banners, posters, billboards, and word of mouth. This search and recruitment model will not be efficient and will not be right on target. The solution offered to overcome these problems is to create a website for job vacancies, recruitment, and job applications. The research method used is Rapid Application Development (RAD) to find out the website creation process carried out in a short and influential period. The research flow is looking for references, determining project needs by making UI design and database design, making prototypes, testing, refining, developing features, feedback questionnaires, and project implementation. This research resulted in a job vacancy website called "AntiNggur". This website is expected to facilitate the dissemination of information on job vacancies, the job search process, and the process of recruiting new workers that are more effective and more targeted.</em></p>2024-10-26T00:00:00+00:00Copyright (c) 2024 Moch Farid Fauzi, Govin Yudian Pradipta, Deny Setiyawan, Muhammad Nur Ichsan, Dzaki Ahsana Reyhandhipa