Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Informatika Upgris

Penerapan Metode Perbandingan Eksponensial Pada Penilaian Proses Belajar Mengajar di Fakultas Teknik Universitas Muhammadiyah Bengkulu ujang juhardi; Rozali Toyib; Agusdi Syafrizal
Jurnal Informatika Upgris Vol 5, No 2: Desember (2019)
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v5i2.4532

Abstract

Problems that often occur in the field of education are the teaching and learning process of lecturers to students, the assessment of the teaching and learning process of lecturers is still number two or eliminated and the assessment through eye screen, without having to be given a special assessment of the concerned. This actually creates a problem, namely, it cannot be known how the progress of teaching and learning process of lecturers towards students. The Exponential Comparison method can reduce the bias that might occur in the analysis, because the resulting score illustrates the order of priorities that becomes large so that the priority order of alternative decisions becomes more apparent. Test Results Based on the results of tests that have been done, found the results of 6 (six) Very Good Lecturers, 11 (eleven) Good Lecturers, and 2 (two) Sufficient Lecturers, If the value entered on each criterion exceeds the range of scores has been determined, then the value is automatically returned empty, and must fill the value with a range of values.
IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA Yuza Reswan; ujang juhardi; Bobi Tri Yuliansyah
Jurnal Informatika Upgris Vol 4, No 2: Desember (2018)
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v4i2.2812

Abstract

Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties.The columnar transposition algorithm is one simple transposition password. Columnar transposition is one of the classic cryptographic algorithms. Columnar transposition is one part of the transposition cipher with cryptographic method where the message is written in a row from a specified length, and then the column per column is read again with a reading sequence based on a keyword. Series length is determined by the length of the keyword. The order of column readings is based on column order.RSA Algorithm is one of asymmetric cryptography, which is a type of cryptography that uses two different keys: public key and private key. Thus, there is one key, namely the public key, which can be sent through a free channel, without any particular security. In this case there are two keys arranged so that they have a relationship in modulo arithmetic equation. In this case, combining both columnar transposition algorithms and RSA algorithms allows security in the form of message data to be very effective for locking the data even better.Keywords: Cryptography, Columnar Transposition, RSA, Java