Claim Missing Document
Check
Articles

Found 13 Documents
Search

Analisa Algoritma Noekeon Untuk Mengamankan File Video Milawati Milawati; Natalia Silalahi; Kennedi Tampubolon
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.2840

Abstract

Along with the times, human needs are increasing, including the need for information. Therefore, sending and storing files via electronic media requires a process that is able to guarantee the safety and integrity of the file. To ensure the safety and integrity of a file, it requires a file. The encryption process is carried out when the file is sent. This process will change the original file into a secret file that cannot be read. Meanwhile, the decryption process is carried out by the recipient of the sent file. The secret file received will be changed back to the original file. By means of this encryption, the original file will not be read by unauthorized parties, but only by the recipient who has decryption key. Currently, one of the methods used to secure files is to use a cryptographic system by encoding the contents of the information (plaintext) into incomprehensible content through an encryption process (enchiper), and to retrieve the original information, a encryption process is carried out ( dechiper). accompanied by using the correct key. However, in line with the development of encryption or cryptography, efforts to obtain this key can be done by anyone, including those who are not authorized to choose the information. Therefore, research on cryptography will always evolved to obtain ever stronger cryptographic algorithms, making attempts to illegally decode cryptography illegally become more difficult
Penerapan Algoritma Naïve Bayes Dalam Diagnosa Penyakit Covid-19 Guidio Leonarde Ginting; Natalia Silalahi
BEES: Bulletin of Electrical and Electronics Engineering Vol 3 No 1 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bees.v3i1.3159

Abstract

Covid-19 is a virus that is so small that you cannot see it with the naked eye, you need the help of a magnifying device such as a microscope and this virus is very dangerous which causes respiratory problems in humans and can even kill humans who have been exposed to the Covid-19 virus or other viruses. this crown. Where in general, the community and medical teams diagnose someone who has been exposed to Covid-19 based on a symptom including: fever, cough, runny nose, shortness of breath, unable to smell and feel on the tongue. But not everyone who suffers from such a disease can be classified as Covid -19 disease. So to make sure someone has Covid-19, an antigen test or PCR test is carried out. Examination data related to Covid-19 from the results of symptoms with the results of antigen or PCR tests has been collected and has not been used to diagnose someone who has symptoms of Covid-19. From the problems that exist, the medical team really needs help in diagnosing Covid-19 disease in patients easily and quickly, namely by using the Naïve Bayes algorithm data mining, where the Naïve Bayes algorithm can produce correct and real data. The results of this study are based on the Naïve Bayes data mining algorithm in the diagnosis of Covid-19, namely Alex is positive for Covid-19 while Imam is negative for Covid-19.
Penerapan Algoritma Rabin-Public Key Untuk Pengamanan File Audio Rusdianto Rusdianto; Natalia Silalahi; Norenta Sitohang
Bulletin of Artificial Intelligence Vol 2 No 1 (2023): April 2023
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data encoding problems such as text files, images, audio and video are used more often as messages or information. However, with advances in technology that are increasingly developing, it is increasingly possible for messages or information to be stored in the form of other files such as images, audio and video. For example, a music recording company wants to release the latest album and they want to get a big profit from selling CDs or downloading legally (paid) through the site. Before the album officially goes out to the public, they want to make sure that no one party gets a leak or listens to the audio file first. One of the technical solutions that can be used to protect the confidentiality of audio files is cryptography by applying the Rabin-Public Key algorithm. The Rabin-p algorithm is an algorithm that implements an asymmetric key. An asymmetric key is a key that uses two types of keys, namely the public key which is used to encrypt the message and the secret key which is used to decrypt the message. Rabin-p is named rabin with an additional p which symbolizes that the proposed scheme uses only one prime p as the decryption key. The results for encoding audio files are based on an asymmetric cryptographic system that uses a public key and a private key for encoding audio files (the key used for the encryption process). and decryption) into a cipher so that the security and confidentiality of messages are maintained. Audio file analysis is the stage where analysis is carried out on any files that are processed in a design system or procedure, in this case the audio files to be encrypted and decrypted in cryptographic applications are audio files in wave format (*.WAV).