Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : IJISTECH

Promotion Media Recommendations on The Acceptance of New Students In Private Educations With The Simple Additive Weighting Method R. Fanry Siahaan; Liber Simbolon
IJISTECH (International Journal of Information System and Technology) Vol 4, No 1 (2020): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v4i1.76

Abstract

Ensuring the existence of private universities (PTS) is the number of new students who enrol in each new academic year. One of the ways that private universities STMIK Pelita Nusantara to attract new student candidates is through promotion. Promotion is a communication activity carried out to introduce something to the public and simultaneously influence the wider community to buy and use the product. The purpose of this study was to determine which promotional media was more effective which had an impact on the number of new student enrollments at the private tertiary education institution STMIK Pelita Nusantara using the SAW method as a measuring instrument. The steps taken are: determining the value of the criteria for each alternative, determining the weight, normalizing the matrix, and normalizing the decision matrix to a scale that is compared to all the alternative ratings. The result of the research is the promotion mix with the alternative Worth of Mouth promotion as the best media with a value of 1.
Correlation of Ambiguity of Steganography with Cryptography in Text-Based Data Security R. Fanry Siahaan; Endra A.P. Marpaung; Gunung Juanda Tampubolon; Ayu Pelita Lumban Siantar
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.138

Abstract

The development of information technology began with advances in the field of computerization. The early use of computers to simply write, create graphics and images and store incredible data has been transformed into a communication tool with a soft network that can cover the entire world. With the advancement of technology, the process of interaction between humans can reach the layers of society in the back of any world becomes increasingly open. Along with the advancement of technology all the information needed can be obtained easily, not least information that is confidential or top secret. Because with the help of technology all confidential information is locked or stored properly even though it can be opened and accessed by irresponsible parties. The most popular methods today are steganography and cryptography. Steganography is where confidential data is hidden or pasted in other data such as images, text, audio, or video so as not to cause suspicion of others or steganalyst. Unlike the cryptographic method, where secret data messages are scrambled or encoded so that they cannot be understood by others. And this raises suspicions from the other party or often called cryptanalyst. Based on the results or outputs of a text-based steganography (stegoteks) process against a message, text steganography in Indonesian patterns can evoke a correlation of ambiguity with cryptography in avoiding disclosure of confidential messages with a 100% accuracy rate.