Claim Missing Document
Check
Articles

SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN DOSEN BERPRESTASI MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING DI LINGKUNGAN UNIVERSITAS LAMPUNG Didik Kurniawan; Wamiliana Wamiliana; Rizqi Chandra Aditya
Jurnal Komputasi Vol. 3 No. 2 (2015)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v3i2.1137

Abstract

The selection of good achievement lecturers is a recognition for those lecturers who already had been conducting three principles of higher education with very good results. The selection of those lecturers in The University of Lampung is conducted annually. In the process of selection, the university will appoint assessing team to conduct assessments to the candidates. However, this assessment process is still conducted manually so that it will take a time to process the data. In addition, the assessment is still subjective in nature and is not yet relevant to the real conditions. Based on this background, the objective of this research was to build a decision support system to use in conducting selection process of good achievement lecturers in The University of Lampung. This decision support system was built based on web by using PHP programming language and MySQL as database, and Simple Additive Weighting method for making the decision. This method was used to determine point values of each criterion, and then ranked score was made to determine the best solution. The testing of the application using black box showed that this system was able to run properly. The results also influence the academic atmosphere and institutional quality. Keywords: decision support system, selection of good achievement lecturers , simple additive weighting
ANALISIS PERBANDINGAN ALGORITMA SIMETRIS TINY ENCRYPTION ALGORITHM DAN LOKI DALAM ENKRIPSI DAN DEKRIPSI DATA Pradana Marlando; Wamiliana Wamiliana; Rico Andrian
Jurnal Komputasi Vol. 4 No. 1 (2016)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v4i1.1153

Abstract

Information can be kept secure by an encryption process in cryptography technique. In this research we discussed comparative analysis of symmetric algorithms: Tiny Encryption Algorithm (TEA) and LOKI in terms of their complexity, time and speed performances. The testing was conducted using 30 data with size varies between 50 bytes and 1500 bytes. Thirty data were tested 50 times. The result shows that TEA is faster in encryption and decryption compared to LOKI  and the complexity of both algorithms are linear algorithms (O (n)).
RANCANG BANGUN APLIKASI SEARCH ENGINE REPOSITORY SOFTWARE DESKTOP MENGGUNAKAN TEKNIK WEB EXTRACTION Dako Adi Ahmadi; Wamiliana Wamiliana; Wisnu Wardhana
Jurnal Komputasi Vol. 4 No. 1 (2016)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v4i1.1182

Abstract

The System Search Engine Repository Software Desktop was created with the aim for facilitating the users to get the software to be installed or used by the user. For Windows operating systems and Macintosh, the system can download and check the latest version of the software that is already available. The system created provides a freeware software for Windows and Macintosh operating systems. For Linux, the system displays and generates sources.list of Debian. In this research the system made using Extreme Programming and using web extraction techniques to extract data from website www.filehippo.com. Keywords: web scraping, search engine, extreme programming, web extraction.
Implementasi Kriptografi Dan Steganografi Pada Media Gambar Menggunakan Hill Cipher Dan Least Significant Bit (LSB) Eka Fitri Jayanti; Wamiliana Wamiliana; Rico Andrian
Jurnal Komputasi Vol. 5 No. 1 (2017)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v5i1.1411

Abstract

Cryptography can be used to process message using a specific algorithm that make the message difficult to be understood. After that, steganography is used to hide the message in other forms. This research used modified Hill Cipher and Least Significant Bit (LSB) to build a web based application for sending message and get the original message using an android application. The title and cipher key will be sent automatically by the application to the recipient's email. This application can be used by organizations or companies and use stego cover with file type .jpg and message with file type .txt. The modified Hill Cipher and LSB method can be used to encrypt message, embed it to a image and reveal it to the original message. Our research show that the LSB method has the best possibility to reveal message on image manipulated by changing brightness and contrast if the cover in grayscale, and dominant red and white colours image quality. 
PERBANDINGAN METODE DYNAMIC CELL SPREADING (DCS) DAN SPREAD SPECTRUM PADA STEGANOGRAFI BERBASIS APLIKASI WEB Wamiliana Wamiliana; Astria Hijriani; pita utari ningtyas
Jurnal Komputasi Vol. 5 No. 1 (2017)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v5i1.1522

Abstract

The security is the most important thing in sending a secret message and there are many ways to send a message safely, one of those is steganography. In this research we will compare Dynamic Cell  Spreading (DCS) and Spread Spectrum method based on web application using image as the media and hide the secret message. The file format used are (.jpg) as input cover,(.png) as output stegoimage, and  (.txt) as data that can be inserted. Doing some test to manipulate brightness, contrast, and cropping the results show that Spread Spectrum method better than Dynamic Cell Spreading method. The Spread Spectrum method mostly returns the message in the brightness and contrast manipulation. Cropping stegoimage on the right area or bottom image has less risk of losing data depend on the cropping scale and image resolution.
Implementasi Pengamanan Text File Pada Hybrid Sistem Menggunakan Algoritma Vigenere dan Algoritma Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) Wamiliana Wamiliana; Tryo Romadhoni Pujakusuma; Febi Eka Febriansyah; Dwi Sakethi
Jurnal Komputasi Vol. 6 No. 2 (2018)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v6i2.1663

Abstract

The development of technology and the internet allows everyone to exchange data andinformation. Problems arise when the information is confidential, especially for a company,institution and also individuals who have important documents and data. Therefore, the securityof the data is a must. In this case cryptography plays a role of encrypting secret messages intothe form of unreadable messages and steganography that hides the irregular messages into theimage media, resulting in double security in the delivery of secret messages. In this research wedevelop a hybrid system using Vigenere and AMELSBR with cover media in the form of (.jpg)format as input (cover), file type (.png) as output (stegoimage) and data be inserted as a file withtext format. The conclusion of this research is that the hybrid system can be used to encrypt thesecret message and hide it into the cover media to make it more secure in data transmission.Therefore, the use of AMELSBR method is good used in steganography. Stegoimage canwithstand the process of manipulating the brightness and contrast with the image record musthave the dominant black color value (rgb (0,0,0)) or white (rgb (255,255,255)) and not manycolor variants, in other words the image can restore the file without experiencing excessivereduction of meaning after the manipulation of brightness and contrast is an image with binaryimage quality and grayscale image.
Bandwidth Shaping Menggunakan Proxy Squid Dwi Yatmoko Siambudi; wamiliana .; wisnu wardhana
Jurnal Komputasi Vol. 6 No. 1 (2018)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v6i1.1644

Abstract

The development of technology is very fast. Nowadays, technology has influenced human life. For most people, handphone and computer now become a necessity. Computer can give  information as we need with internet, but internet can cause a negative influence as well. In this research, we build an web base application which can block a negative-influence sites using Squid Proxy. Squid is a daemon that used as a proxy server and web cache. It can work as a connection sharing, filtering and caching. The web which domain block is successfully built which can create a bandwidth share and domain block web base application.
PERBANDINGAN METODE ADAPTIVE MINIMUM ERROR LEAST SIGNIFICANT BIT REPLACEMENT (AMELSBR) DAN DISCRETE COSINE TRANSFORM (DCT) UNTUK STEGANOGRAFI CITRA DIGITAL Fajar Sidik; wamiliana wamiliana; Febi Eka Febriansyah
Jurnal Komputasi Vol. 6 No. 1 (2018)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v6i1.1563

Abstract

Insertion of secret messages with steganography is one way to hide secret messages. In this research we will compare AMELSBR and DCT methods based on web application using image as the media for hiding the secret message. The file format used are (.png) as input cover and stegoimage, and  (.txt) as data inserted. The result shows that AMELSBR method better than DCT method for manipulation of brightness, contrast, and cropping.
Comparison of the Cheapest Insertion Heuristic Algorithm, Christofides Algorithm, and Nearest Neighbor Algorithm for Determining Hospital Tours in Bandar Lampung City Thomas Juliansyah; Riska Aulia Putri; Roro Ayu Martinez; Muslim Ansori; Wamiliana Wamiliana
Jurnal Komputasi Vol. 13 No. 2 (2025)
Publisher : Jurusan Ilmu Komputer Fakultas MIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v13i2.332

Abstract

Determining the optimal route is one of the important aspects in planning the distribution of health services, especially in emergency conditions in Bandar Lampung City. This study compares three algorithms for solving tour problems, namely Cheapest Insertion Heuristic, Nearest Neighbor (NN), and Christofides Algorithm, in determining the fastest tour to a number of hospitals. Calculations were performed manually and also implemented using the Python programming language. The results obtained show that manually and using Python programming, the Cheapest Insertion Heuristic algorithm produced 152 minutes, the Nearest Neighbour algorithm 142 minutes, and the Christofides Algorithm 147 minutes.
Co-Authors . Amanto Aang Nuryaman Ade Hardiyanti Ady Candra Afdi Patria Ahmad Faisol Ahya Shofa Ananda Akmal Junaidi Akmal Junaidi Alifah Zahroh Amanto Amanto Amanto Andikha Yunar Cornelius Dabukke Andrian, Rico Andriyan Hutomo Astri Reformasari Astria Hijriani Astria Hijriani Astria Hijriani Attiya Yuliana Azharico Darusman Bainah Sari Dewi Cut Shavitri Nursanti Fauzi Dako Adi Ahmadi Depriyanto Depriyanto Desiana Putri Dian Kurniasari Dian Kurniasari Dian Kurniasari Didik Kurniawan Didik Kurniawan Dina Eka Nurvazly Dolly Yudhistira Dwi Sakethi Dwi Yatmoko Siambudi Dyan Shandy Utama Edwin Russel Edwin Russel Eka Fitri Jayanti Ervan Heppyda Fadila Cahya Puri Fadila Cahya Puri Fahmi Kharismaldie Faiz AM Elfaki Fajar Sidik Fatkur Rokhman Fauzi, Cut Shavitri Nursanti Febi Eka Febriansyah Febi Eka Febriansyah Fitriani Grita Tumpi Nagari Irwan Adi Pribadi Ismail Indra Pratama Ismawati Ismawati Izzatuz Zakiyah Mukhtarisa Jamal I. Daoud Jani Suparman Jevri Setia Nugraha Karina Sylfia Dewi La Zakaria La Zakaria Louis Caccetta Marisa Ayu Rahmadhani Mas Dafri Maulana Mira Mustika Misgiyati Misgiyati Muslim Ansori Muslim Ansori Muslim Ansori Mustofa Usman Mustofa Usman Mustofa Usman Mustofa Usman Nairobi Notiragayu Notiragayu Notiragayu Novi Hardiansyah Ossy Dwi Endah Wulansari Pandya Panditatwa pita utari ningtyas Poetri Hana Nurhandayani Pradana Marlando Reni Permata Sari Reni Permata Sari Riska Aulia Putri Rizky Indah Melly Rizqi Chandra Aditya Roro Ayu Martinez Shara Siti Zahroh Silvi Fitriani Siti Laelatul Chasanah Sulistian Oskavina Thomas Juliansyah Tryo Romadhoni Pujakusuma Warsono Warsono Wisnu Wardhana Wisnu Wardhana Wiwin Susanty Yudi Antoni