Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Building of Informatics, Technology and Science

Analisis Pola Asosiasi Data Transaksi Penjualan Minuman Menggunakan Algoritma FP-Growth dan Eclat Najmi, Risna Lailatun; Irsyad, Muhammad; Insani, Fitri; Nazir, Alwis; ., Pizaini
Building of Informatics, Technology and Science (BITS) Vol 5 No 1 (2023): June 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v5i1.3592

Abstract

Every day transaction activities between companies and consumers continue to be carried out. This makes transaction data more and more and accumulate. This transaction data can be processed into more useful information using technology. Data mining is a technology that can work on a collection of transaction data into information that can be taken by companies as decision makers. The association rule method is used as a method to see the relationship between items in a transaction data. To analyze transaction data, researchers used the FP-Growth and Eclat algorithms. There are three stages of association in this study which are distinguished from the confidence value. The results in the first stage have a minimum confidence value of 0.4, the FP-Growth algorithm produces 41 association pattern rules, while the Eclat algorithm produces 32 association pattern rules. Then in the second stage the minimum trust value is 0.5, the FP-Growth algorithm produces 40 association pattern rules, for the Eclat algorithm it produces 32 association pattern rules. In the third stage, the minimum trust value is 0.6, the FP-Growth algorithm generates 32 association pattern rules, while the Eclat algorithm generates 30 association pattern rules. The results of the association pattern rules show that the Eclat algorithm is more efficient in determining the association pattern rules than the Fp-Growth algorithm
Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR Adha, Martin; Yanto, Febi; Handayani, Lestari; Pizaini, Pizaini
Building of Informatics, Technology and Science (BITS) Vol 6 No 1 (2024): June 2024
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v6i1.5262

Abstract

One way to secure secret messages from other unauthorized parties is steganography. One of the most widely used methods in steganography is Least Significant Bit. This research uses images as cover images and secret images. The image is resized to a resolution of 512x512 pixels, The cover image uses an RGB channel image and the secret image also uses an RGB channel image. In this research, LSB will be combined with triple XOR so that it can increase the security of this message hiding method. Triple XOR is used to provide extra security to images that have a secret image (Stego Image) inserted. In this research, several tests were also carried out, including testing the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), for robustness testing it was also carried out by making modifications to the stego image such as resizing, compressing, and adding and reducing contrast. The results of this research's PSNR testing are very good, namely approximately 49 dB and lower MSE. With the PSNR and MSE results, it can be proven that the LSB method has a good level of imperceptibility. In experiments on image resistance to modification, several experimental results show that secret image extraction in the stego image failed to be extracted, and from several experiments such as adding and reducing contrast, image rotation and lossless compression, the image inserted in the stego image was successfully extracted.
Co-Authors Abdillah, Rahmad Adha, Martin Aditya Dyan Ramadhan Afdhalel Vickro Agung Teguh Wibowo Almais Ahmad Fauzan Akhyar, Amany Albis Ya Albi Alwis Nazir Alwis Nazir Andrian Wahyu Arvansyah, M Afdhol Aslis Wirda Hayati Ayu Fransiska Bebi Oktaviani Che Hussin, Ab Razak citra ainul mardhia putri Deny Dewana Hastanto Dhymas Julyan Riyanto Eka Pandu Cynthia Elin Haerani Elvia Budianita Fadhilah Syafria Fahmi Kasri Fajar Febriyadi Fakhrezi, Muhammad Dzaki Faris Apriliano Eka Fardianto Faris Fauzan Ray T Febi Yanto Fitra Kurnia Fitri Insani Fitri Insani Fitri Insani Fitri, Dina Deswara Gusti, Siska Kurnia Haikal Zikri Hasibuan, Ilham Habibi Heru Sukoco Husnan Husnan Ibrahim Armadian Pujakesuma Iwan Iskandar Iwan Iskandar Iwan Iskandar Iwan Iskandar Iwan Jasril Jasril Jesi Alexander Alim Jesi Alexander Alim Kana Saputra S Khonofi, Khoidir Lestari Handayani Lola Oktavia m azwan M Wandi Dwi Wirawan M. Saski Mandiro, Mulia Anton Muhammad Affandes Muhammad Affandes Muhammad Fauzan Muhammad Fikry Muhammad Irsyad Muhammad Irsyad Muhammad Ridha Mulia Anton Mandiro Musa Thahir Muslimin, Al’hadiid Najmi, Risna Lailatun Nanda Sepriadi Nazir, Alwis Nazruddin Safaat H Neni Hermita Novi Yanti Novialdi T Novri Rahman Novriyanto Novriyanto Nur Iza Nuradha Liza Utami Okfalisa Okfalisa Okfalisa Okfalisa Putri, Adilah Atikah Rahmad Abdillah Rahmad Kurniawan Reski Mai Candra Reski Mai Chandra Rometdo Muzawi, Rometdo Roziana Roziana, Roziana Saktioto Saktioto Suci Rahayu Sugi Guritman Sukma Evadini Surya Agustian Suwanto Sanjaya Syarifuddin Syarifuddin Teddie Darmizal Thahir, Musa Tommy Tanu Wijaya Umar Syarif Vebrianto, Rian Wenny Tarisa Oktaviany Wirdiani, Putri Syakira Yelfi Vitriani Yusra Yusra, Yusra Zuriati Ardila Safitri