Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOURNAL OF APPLIED INFORMATICS AND COMPUTING

Penerapan Algoritma Elephant Herding Optimization (EHO) pada Masalah Hybrid Flowshop Scheduling (HFS) Ahmad Kamsyakawuni; Khurnia Palupi; Agustina Pradjaningsih
Journal of Applied Informatics and Computing Vol 4 No 1 (2020): Juli 2020
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (717.361 KB) | DOI: 10.30871/jaic.v4i1.1834

Abstract

The industry is the driving force for the economy in Indonesia. One of the problems faced by industrial companies in the production process is determining the production schedule. The production schedule that is not according to the specified target can cause losses to the company. Scheduling is the allocation of resources to carry out a set of work at a specified time. The problem solved in this article is hybrid flowshop scheduling (HFS), it’s will be applied to companies engaged in bread making. A solution to solve the HFS problem using elephant herding optimization (EHO) algorithm. For the company to complete the production process by minimizing makespan, effective scheduling is needed, taking into account the number of parallel machines. The results of this article are 9 jobs and makespan 11.270 seconds using the MATLAB software.
Text Insertion and Encryption Using The Bit-Swapping Method in Digital Images Santoso, Kiswara Agung; Fakih, Muhammad Fahmil; Kamsyakawuni, Ahmad
Journal of Applied Informatics and Computing Vol. 8 No. 1 (2024): July 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i1.7395

Abstract

Communication is an essential aspect of everyday life, involving the transmission of information through various media. Technological advances have made communication easier but have also increased privacy and data security risks. Several efforts are made to maintain the security of digital information, including coding information (cryptography) and hiding information (steganography). In this article, the author secures information through a combination of cryptography and steganography. To secure text data, we encrypt by exchanging bits between adjacent characters. Subsequently, the encrypted text is hidden within an image. The security analysis results show the successful reconstruction of the message from the stego image and the successful restoration of the message to its original form. The use of the bit swapping method in the text message encryption process has been proven to enhance the security level of the ciphertext, as indicated by the lower TPK calculation value of 0.33 compared to the TPK value in previous studies. Additionally, embedding the ciphertext into digital images has been demonstrated to further increase the security level of the message, evidenced by the NPCR calculation value of 0.0000109% and the UACI calculation value of 0.000000555%. These very small values indicate no significant changes.