scholarly journals A Visualization Approach to Analyze Android Smartphone Data

2018 ◽  
Vol 2 (3-2) ◽  
pp. 184
Author(s):  
Nurul Adhlina Hani Roslee ◽  
Nurul Hidayah Bt Ab Rahman

This study aims to design and develop an interactive system that can visualize evidence collected from Android smartphone data. This project is developing to support forensic investigator in investigating the security incidents particularly involving Android smartphone forensic data. The used of smartphone in crime was widely recognized. Several types of personnel information are stored in their smartphones. When the investigator analyses the image data of the smartphone, the investigator can know the behaviour of the smartphone’s owner and his social relationship with other people. The analysis of smartphone forensic data is cover in mobile device forensic. Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence from a mobile device under forensically sound condition. The digital investigation model used in this project is the model proposed by United States National Institute of Justice (NIJ) which consists four phases, which are collection phase, examination phase, analysis phase and presentation phase. This project related with analysis phase and presentation phase only. This paper introduces Visroid, a new tool that provides a suite of visualization for Android smartphone data.

2020 ◽  
Vol 3 (2) ◽  
pp. 72-81
Author(s):  
Khairunnisak Khairunnisak ◽  
Hamid Ashari ◽  
Adam Prayogo Kuncoro

Currently, the changes in image quality resulting a low-resolution images, faded colors, and so on. This condition potentially attract irresponsible parties to take advantage of the situation for certain purposes. Nowadays, it is very easy for people to manipulate, change, or delete the original information from a digital image thus cause the authenticity and integrity of the image to be doubted. This study is conducted in a specific objective to prove the authenticity of a digital evidence for analysis by providing detailed illustrations of the role of Digital Forensics in accordance with applicable legal regulations in Indonesia using the NIST workflow. The research flow begins with uncovering the background of the problem, collecting data, making scenarios, applying the NIST method, and making conclusions. The illustration used in the scenario is a video inserted into a digital evidence. The video used in this research is the Cyanide Coffee Case with the suspect Wayan Mirna Salihin, happened in August 16, 2016 which was uploaded by Kompas TV channel on Youtube. The NIST analysis phases used several tools: Exiftools, Forevid, and Video Cleaner. The result indicates that all phases in the NIST method are correlated to each other. The result is specifically very clear in the collection phase. The discovery of hidden information causes the examination and analysis process to be more complex especially the extraction process of digital evidence in the form of images. Indeed, the use of various tools are more helpful in disclosing the existing information. This information can be seen from the results of metadata, hash value, and image sharpness from the analyzed digital evidence.


2019 ◽  
Vol 10 (2) ◽  
pp. 107-128
Author(s):  
Jerzy Kosiński ◽  
Tomasz Gontarz ◽  
Robert Kośla

The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the abuse of the term cybernetic. The author refers to information as a new “centre of gravity” of the nation’s power and special attention is paid to activities aimed at ensuring a high level of information security in Poland. The assumptions of the draft Act on the national cybersecurity system are described and particular emphasis is placed on the issues of technical and organisational reporting and the handling of ICT security incidents. The author points out that handling incidents violating cyber security at a strategic level for a country ought to be considered as an intentional action of a definite and repeatable character. Here the reference to the ISO/IEC standards and recommendations can be found. Moreover, behaviours related to securing digital evidence after an incident, including the so-called good practice in relation to the reaction in the event of an incident, are presented. A simplified procedure for securing computer hardware, as a recommended method of action in case of the triage and live data forensics, are suggested in the article. The recommendations of the FORZA methodology and frameworks are also discussed. When summarising, the author underlines that it is essential to prepare appropriate procedures and personnel for the broadly understood handling of incidents violating cybersecurity. This includes protection of digital evidence according to the procedures, good practice and suggestions contained in normative documents, as well as implementing cybersecurity policy, bringing legislation into line with international standards and educating users and the judiciary.


2020 ◽  
Vol 5 (2) ◽  
pp. 13-18
Author(s):  
Muhammad Rizki Setyawan ◽  
Anton Yudhana ◽  
Abdul Fadlil

The development of instant messenger, especially Skype applications is growing rapidly. Skype users are usually used as tools to share information using an Android smartphone. The large number of Skype users can be misused for carrying out criminal activities such as illegal goods transactions in the form of vape drugs among Skype users. This case can be resolved by getting digital evidence from the Skype application left on an Android smartphone using the Forensic Digial method. The forensic method used in this study is the National Institute of Justice (NIJ) with several stages, namely identification, collection, examination, analysis, and reporting while the Oxygen Forensic Suite software is used for data acquisition. The results obtained successfully obtained all the desired evidence from the two smartphones that installed Skype, namely EVERCROSS and SAMSUNG J2 in the form of a profile account, contact person, conversation text and image file with the percentage of Skype data acquisition results from the EVERCROSS B75 smartphone succeeding in getting 48% data, and Skype data acquisition results from SAMSUNG J2 managed to get 100% data.


Author(s):  
Indrabudhi Lokaadinugroho ◽  
Abba Suganda Girsang ◽  
Burhanudin Burhanudin

This paper discusses about how to build a data warehouse (DW) in business intelligence (BI) for a typical marketing division in a university. This study uses a descriptive method that attempts to describe the object or subject under study as it is, with the aim of systematically describing the facts and characteristics of the object under study precisely. In the elaboration of the methodology, there are four phases that include the identification and source data collection phase, the analysis phase, the design phase, and then the results phase of each detail in accordance with the nine steps of Kimball’s data warehouse and the Pentaho Data Integration (PDI). The result is a tableau as a tool of BI that does not have complete ETL tools. So, the process approach in combining PDI and DW as a data source certainly makes a tableau as a BI tool more useful in presenting data thus minimizing the time needed to obtain strategic data from 2-3 weeks to 77 minutes.


SinkrOn ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 161
Author(s):  
Asmaidi Asmaidi ◽  
Darma Setiawan Putra ◽  
Muharratul Mina Risky ◽  
Fitria Ulfa R

Edge detection is the first step to cover information in the image. The edges characterize the boundaries of objects and therefore edges are useful for the process of segmentation and identification in the image. The purpose of edge detection is to increase the appearance of the boundary line of the object in the image. The sobel method is a method that uses two kernels measuring 3x3 pixels for gradient calculations so that the estimate gradient is right in the middle of the window. Digital image processing aims to manipulate image data and analyze an image with the help of a computer. Matlab is made to facilitate the use of two collections of subroutines in the fortran library, linpack and eispack, in handling matrix computing, and develops into an interactive system as a programming language. Experimental results from the input image research, namely the flower image have different MSE values because each input image has a different pixel value


2019 ◽  
Author(s):  
Didit Darmawan

ABSTRACTThe study was conducted in Sajen Village, Pacet District, Mojokerto Regency. The purpose of this studywas to describe and analyze the strategy of developing farming to improve the welfare of the onionfarmers in that area. In the Data Collection Phase, use the IFAS and EFAS matrices. The next stage,namely the Analysis Phase, is to collect all information that affects the development of the business.Next is to place the information gathered into the strategy formulation model, namely the SWOT matrixin internal and external factors, then the appropriate results are determined. In the final stage, use theSWOT Matrix. From the IFAS and EFAS Matrix, the value of x is 0.49 and the value of y is 0.57. Thestrategy of developing shallot farming in Sajen village is in quadrant I, meaning that onion has strengthfactors in good conditions but onion farmers have not taken advantage of the opportunities that existso that onion has not yet developed. For this reason, aggressive strategy is needed, namely expandingand maximizing growth by utilizing existing opportunities and strengths (strength-opportunitiesstrategy).Keywords: strategy, farming, Allium cepa var oggregatum Sin Allium ascalonicum, SWOTABSTRAKPenelitian dilakukan di Desa Sajen, Kecamatan Pacet, Kabupaten Mojokerto. Tujuan Penelitian iniadalah mendeskripsikan serta menganalisis strategi pengembangan usahatani untuk meningkatkankesejahteraan petani bawang merah di tersebut. Pada Tahap Pengumpulan Data menggunakan matriksIFAS dan EFAS. Tahap selanjutnya yakni Tahap Analisis yaitu mengumpulkan semua informasi yangberpengaruh terhadap pengembangan usahtani., Selanjutnya adalah menempatkan informasi yangterkumpul ke model perumusan strategi yaitu matriks SWOT dalam faktor internal dan eksternalkemudian dari hasil yang ada ditentukan pengambilan keputusan yang tepat. Pada tahap akhir yaitumenggunakan Matriks SWOT. Dari Matriks IFAS dan EFAS diketahui nilai x adalah 0,49 dan nilai yadalah 0,57. Strategi pengembangan usahatani bawang merah di desa Sajen berada di kuadran I, artinyabawang merah tersebut memiliki faktor-faktor kekuatan dalam kondisi yang baik namun petani bawangmerah belum memanfaatkan peluang yang ada sehingga bawang merah belum berkembang. Untuk itudiperlukan sterategi agresif yaitu melakukan ekspansi dan meningkatkan pertumbuhan secara maksimaldengan memanfaatkan peluang dan kekuatan yang ada (strength-opportunities strategy).Kata Kunci : strategi, usahatani, bawang merah, SWOT


Author(s):  
Robert M. Glaeser ◽  
Bing K. Jap

The dynamical scattering effect, which can be described as the failure of the first Born approximation, is perhaps the most important factor that has prevented the widespread use of electron diffraction intensities for crystallographic structure determination. It would seem to be quite certain that dynamical effects will also interfere with structure analysis based upon electron microscope image data, whenever the dynamical effect seriously perturbs the diffracted wave. While it is normally taken for granted that the dynamical effect must be taken into consideration in materials science applications of electron microscopy, very little attention has been given to this problem in the biological sciences.


Author(s):  
Richard S. Chemock

One of the most common tasks in a typical analysis lab is the recording of images. Many analytical techniques (TEM, SEM, and metallography for example) produce images as their primary output. Until recently, the most common method of recording images was by using film. Current PS/2R systems offer very large capacity data storage devices and high resolution displays, making it practical to work with analytical images on PS/2s, thereby sidestepping the traditional film and darkroom steps. This change in operational mode offers many benefits: cost savings, throughput, archiving and searching capabilities as well as direct incorporation of the image data into reports.The conventional way to record images involves film, either sheet film (with its associated wet chemistry) for TEM or PolaroidR film for SEM and light microscopy. Although film is inconvenient, it does have the highest quality of all available image recording techniques. The fine grained film used for TEM has a resolution that would exceed a 4096x4096x16 bit digital image.


Sign in / Sign up

Export Citation Format

Share Document