Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Journal of Computer Networks, Architecture and High Performance Computing

Analisa Metode Least Significant Bit Dalam Penyisipan Pesan Terenkripsi Terhadap Citra Digital: Analysis of the Least Significant Bit Method in Inserting Encrypted Messages against Digital Images Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 1 No. 1 (2019): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v1i1.45

Abstract

Berkembangnya jaringan komunikasi membuat pertukaran informasi semakin sering terjadi, baik dalam bentuk teks, audio, dan video. Semakin banyaknya pesan yang yang ingin dikirimkan maka keamanan dan kerahasiaan dari pesan tersebut semakin sulit dijaga. Keamanan dan kerahasiaan adalah aspek yang penting pada proses pertukaran informasi atau pesan. Untuk melindungi kerahasiaan pesan bisa menggunakan teknik kriptografi. Kriptografi adalah ilmu yang mempelajari teknik – teknik matematika yang berhubungan dengan aspek keamanan seperti kerahasiaan, integritas data, serta otentikasi. Sedangkan Steganografi adalah salah satu teknik yang dilakukan dalam mengamankan pesan yaitu dengan cara menyembunyikan pesan ke sebuah media digital. Pada penelitian ini dilakukan analisis untuk mengimplementasikan keamanan file txt dan rtf dengan kombinasi algoritma kriptografi One Time Pad dengan steganografi least significant bit (LSB). Pada tahap kriptografi pesan yang telah berhasil diinput akan dienkripsi dengan kunci yang telah diberikan kemudian dilanjutkan dengan proses penyisipan pesan di tahap steganografi.. Pesan yang dapat dibaca oleh sistem adalah pesan berformat .txt dan .rtf. Pada Algoritma LSB penyisipan dilakukan dengan menggantikan bit terakhir citra dengan bit pesan yang akan disisipkan. Pada tahap enkripsi dan penyisipan akan dihasilkan stego image, stego image merupakan citra yang sudah disisip oleh pesan. Kemudian pada tahap ekstraksi dan dekripsi yang dihasilkan adalah plaintext, plaintext merupakan pesan yang belum diberikan kunci apapun.
Decision Support System of The People's Business Credit Method Using Analytical Hierarchy Process at Bank Syariah Mandiri Kc. Lubuk Pakam Dhini Andika; Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.371

Abstract

Decision support system (DSS) system that can help someone in making decisions that are accurate and right on target. Many problems can be solved by using the SPK. One of them is Determining the eligibility of customers receiving the People's Business Credit (KUR). There are Several methods that can be used in building a DSS, Including Analytical Hierarchy Process (AHP). The application of the AHP method to the decision support system of people's business credit through a number of processes of data transformation starts from Determining the priority scale of each criterion, to getting the final grade and ranking. In Determining the eligibility of KUR recipient customers, there are Several criteria that are the basis for decision making, Including Credit Status, Productive Business, Business Conditions, Collateral and Collectibility.
Expert System Diagnoses Damage to Injection Motorcycles with the Certainty Factor Method Feryanto Ginting; Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.372

Abstract

Motorcycles are the main means of transportation that is widely used to support the activities of their societies. Prior to the development of technology, motorcycles still use carburetors. But motorcycles are still using carburetor system is still quite wasteful. With the development of technology, there is now applying the Yamaha brand motorcycles capable of supplying petrol injection engine needs. Motorcycles injection technology is much more efficient compared to motorcycle carburetor technology, in addition to economical motorcycle of this type has a performance engine and a reliable power. But frequent obstacles that cause damage to the injection Yamaha motorcycle, disrupting users.An expert system is a system that adopts the expertise of an expert an expert in a particular field into the system or a computer program is presented with a display that can be used by a user who is not an expert so that system users can make a decision or set policy like an expert in finishing problem. Certainty factor method used to obtain the value of the certainty of damage from an expert motorcycle injection, so that the user also gets the value of the damage certainty selected symptoms of the experience of experts. The results of diagnostics in expert system that has been made that if the user mencheklis symptoms such as clogged when rotated gas engine, electric distater difficult / lift, lights up when the engine is difficult to use the kick starter, often emit exhaust sound of an explosion, it can be concluded from the analysis that the damage found on the spark plug with a value of MB = 0.99, MD = 0:22 and Certainty Factor value of 76.66%. The diagnosis ever made by a visitor or mechanical accessible again by entering an email to the database.
Shortest These search Heading Attractions Lubukpakam Using Greedy Algorithm IRMA YOLANDA SITORUS; PENDA SUDARTO HASUGIAN
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 2 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i2.417

Abstract

In the case of this shortest route search actually has many different types of solutions for path searching, for example the greedy algorithm, dijkstra, floyd-warshall and bellman-ford but what is commonly used to solve this problem is the Greedy algorithm because this algorithm is an algorithm that uses a problem solving approach with look for a temporary maximum value at each step. Of all the tourist attractions such as the Fruit Garden, Deli Serdang Swimming Pool, Deli Serdang Museum, Deli Serdang Regency Government Square, Tengku Raja Muda Field, the writer will look for the shortest path to take the closest route because of the many paths that can be taken to get the optimum path as well as using google maps. This application is made web-based with PHP and MySQL scripts as a database manager so that it is enough to connect to the internet network that everyone can easily access.
Decision Support System On Court Judge Lubukpakam Method Using SAW (Simple Additive weighting) Diana Sari Muliani Saragih; Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 2 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i2.427

Abstract

In the legal world, especially in trials that took place in the Court, the law is the most important system in the implementation of a series of institutional strength.The cornerstone of judicial justice in Indonesia is based on Pancasila and the human dignity and the protection of human rights guarantees contained in Law No. 8 In 1981 the Code of Criminal Procedure (Criminal Procedure Code).Various studies have been conducted to assist in the termination of a case, as is done by Rumodar RF et al (2016) on the use of one of the MADM method, namely Simple Additive weighting. The analysis result is a system that can display information on article associated with a form of crime that is done that ensnared or incriminate the perpetrator, the system will also feature a sanction that is given of each chapter are violated.