Claim Missing Document
Check
Articles

Found 3 Documents
Search

Enhancing Text Messages with a Combination of Vigenère Cipher and One Time Pad Using Random Key LFSR Ibezato Zalukhu, Anzas; Sitorus, Zulham; Suhardiansyah, Suhardiansyah; Septiani, Nadya
Jurnal Sains dan Teknologi Vol. 6 No. 1 (2024): Jurnal Sains dan Teknologi
Publisher : CV. Utility Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/saintek.v6i1.3190

Abstract

In today's global era, the development of information systems is rapidly advancing and becoming increasingly sophisticated, with nearly all elements utilizing information and communication technology in their daily activities. One frequent activity is the transmission or exchange of data over the internet. However, this advancement also raises concerns about the security of messages or data being sent. To mitigate the risk of message misuse, cryptographic techniques can be used to maintain data or message confidentiality by encrypting the information before transmission. This research aims to combine the Vigenère cipher algorithm with a one-time pad using a random key generated by a linear feedback shift register (LFSR) method to enhance the security of text messages. The research methodology involves generating a public key for the One-Time Pad algorithm using LFSR. The encryption process is initially performed with the Vigenère cipher, and the resulting encrypted message is further encrypted using the one-time pad with a key generated by the LFSR method. This algorithm is implemented using the Visual Basic programming language. The research findings indicate that the combination of the two algorithms, with the random key generated by the LFSR for the One-Time Pad, is capable of enhancing text message security by producing random and unique ciphertexts. By using Modulo 256 and ASCII conversion, random ciphertexts can be generated, thereby reducing the likelihood of message breaches. Additionally, this research provides further insights into the process of text message encryption and decryption.
Optimization of Kaayana Store Inventory through Transaction Pattern Analysis Using the Apriori Algorithm Suhardiansyah, Suhardiansyah; Muhammad Iqbal
Journal Of Data Science Vol. 3 No. 01 (2025): Journal Of Data Science, March 2025
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/jds.v3i01.6398

Abstract

This study aims to optimize inventory management at Kaayana Store by analyzing sales transaction patterns using the Apriori algorithm. The transaction data collected shows that products with the codes ACC (accessories) and BJU (clothing) dominate purchases, accounting for 71.4% of total transactions. The analysis results identify a strong relationship between these products, which are frequently purchased together by consumers. Based on these findings, Kaayana Store needs to ensure the availability of ACC and BJU stocks to meet high demand, avoid stockouts, and improve operational efficiency. Proposed inventory management strategies, such as more precise product placement and bundling promotions, are expected to enhance customer satisfaction and support the sustainability of Kaayana Store's business
Sistem Pendukung Keputusan Rekomendasi Calon Ketua BEM Pada Perguruan Tinggi Menggunakan Metode Weighted Product (WP) dan MOORA Syahputra, Irwan; Zalukhu, Anzas Ibezato; Hulu, Adil Priman Hati; Sartika, Dewi; Suhardiansyah, Suhardiansyah
Bulletin of Computer Science Research Vol. 6 No. 2 (2026): February 2026
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v6i2.992

Abstract

The BEM Chairperson is the highest position in an intra-campus organization elected by students. The process of selecting the BEM chairperson begins with a selection and choice based on several specific criteria that have different assessment weights. To determine the decision-making process, a decision support system (DSS) is one of the tools in solving this problem. Weight Product (WP) and MOORA are methods in SPK that are widely used to resolve decision-making that has many criteria and ranking systems. This study compares the WP and MOORA methods in selecting BEM chairperson candidates. Based on the calculation results, it is found that both methods can produce a sequence of BEM chairperson candidates. The stages of completing the WP and MOORA methods are determining the decision criteria, determining the weight of each criterion, determining alternatives and their values ??for each criterion, creating a decision matrix, normalizing the decision matrix, calculating the preference value for each alternative, sorting the largest value as a decision recommendation. Based on the results of the calculations for both methods, we can compare that the MOORA method, based on the Recommendation Assessment for the Election of Student Executive Board Chairperson at Budidarma University, Medan, selected alternative A1, Muhammad Aldi, S.Kom, with an optimization value of 0.4572. However, using the WP method, the selection of alternative A1, Muhammad Aldi, with a preference value of 0.193116, was selected as BEM Chairperson.