Claim Missing Document
Check
Articles

Found 32 Documents
Search

Optimization of The use of Wireless Lan Devices to Minimize Operational Costs Achmad Rian Tarmizi; Ahmat Adil; Lilik Widyawati
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 19 No. 2 (2020)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v19i2.665

Abstract

WLAN technology has been widely developed for the needs of internet access in people's lives. Several generations of WLAN technology include IEEE 802.11b, IEEE 802.11a, IEEE 802.11g and IEEE 802.11n. At the STAHN Rectorate Building, Gde Pudja Mataram, WLAN technology in its application requires financial consideration because excessive use of Internet Service Provider services results in a waste of operational costs. The application of WLAN is still not optimal, because there are not too many users, but the operational costs of implementing the local wireless network are very large, due to less optimal application of network infrastructure. The recommended WLAN technology is IEEE 802.11n, while the technology is the latest technology that has better quality than the previous generation technology. The research methodology uses the Network Development Life Cycle (NDLC). Of the 6 stages available, only 3 stages are used, namely Analysis, Design and Simulation of Prototyping. The results obtained from this study are models that design a WLAN that suits your needs, and complements the entire Building area. Optimization has succeeded in reducing the need for ISP and client services while still being able to enjoy services as needed and cost optimization can be reduced by around 28%.
Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm Lilik Widyawati; Imam Riadi; Yudi Prayudi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 20 No. 1 (2020)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v20i1.701

Abstract

Steganography is an interesting science to be studied and researched at this time, because steganography is the science of hiding messages on other digital media so that other parties are not aware of the existence of information in the digital media. Steganography is very effective in maintaining information security, because the existence of this information is obscured so that it is difficult to know where it is. This paper discusses hiding text into images using the Slantlet Transform (SLT) method, Descreate Cosine Transform (DCT) and Hybrid of SLT and DCT. The three methods are implemented in the frequency domain where steganographic imagery is transformed from the spatial domain to the frequency domain and the message bit is inserted into the cover image frequency component. The comparison parameters of these three techniques are based on MSE, PSNR, Capacity & Robustness. From the results of the tests that have been done, it is obtained that the highest PSNR value is generated using the SLT-DCT method, the largest storage capacity is the SLT method while the resistance, SLT-DCT method and DCT method are more resistant to attack than the SLT method.