Claim Missing Document
Check
Articles

Penerapan Algoritma Ternary Comma Code Pada Aplikasi Kompresi File Gambar Nurma Ningsih; Surya Darma Nasution; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the discovery of a tool to capture an image (image) in the form of a camera making technological developments not only focus on the tools but also must focus on where the data is stored. The need for storage media is something that is needed in every communication tool. Data and information communication systems are not only in the form of text but can also be in the form of images, videos and audio. Image file size that is relatively larger compared to text files is one of the causes of the amount of memory used for storing image files. The size of the image file can also cause the length of time to send the image file. Image file compression process is one way that can be done to overcome the problem of image file size. Image compression is an attempt to minimize the file size or bytes of a graphic file without reducing the quality of existing images. A certain amount of storage, such as disk space or memory, makes it possible to reduce the image file size. Many algorithms that can be used to compress image file sizes include the ternary comma code algorithm that can help reduce image file sizes. The ternary comma code algorithm has a faster time space compared to other algorithms.
Pengenalan Dasar Aplikasi Blender 3D dalam Pembuatan Animasi 3D Taronisokhi Zebua; Berto Nadeak; Soni Bahagia Sinaga
Jurnal ABDIMAS Budi Darma Vol 1, No 1 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (714.8 KB) | DOI: 10.30865/pengabdian.v1i1.2288

Abstract

Teknologi di bidang desain animasi saat ini sangat berkembang dan banyak diminati oleh kalangan milenial. Salah satu bidang yang banyak memanfaatkan animasi adalah pada bidang iklan dan perfileman. Informasi yang disampaikan melalui animasi menjadi sangat menarik dan mudah dipahami oleh audiens. Pembuatan animasi sangat membutuhkan konsentrasi, pemahaman konsep desain serta imajinasi terhadap kontent yang akan dibuat. Ada banyak aplikasi yang dapat digunakan dalam pembuatan animasi, salah satunya adalah aplikasi Blender Kegiatan pengabdian ini akan menguraikan pengenalan dasar-dasar penggunaan aplikasi blender 2,74 untuk membuat animasi 3d. Kegiatan ini dilaksanakan di LPK Ernala Medan yang merupakan salah satu LPK pelaksanan program pelatihan desain grafis.Kata Kunci: Pelatihan, Desain, Animasi, Aplikasi, Blender 3D
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERUMAHAN DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) Hartika Manao; Berto Nadeak; Taronisokhi Zebua
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i2.327

Abstract

Housing is a basic human need and needs to be nurtured and developed for the sake of the continuity and improvement of people's lives and settlements that can not be seen as a means of necessity solely, but more than that is the process of human settlements in creating a space of life to socialize themselves in expressing their identity. During this time customers make housing selection based on information from others, observing housing and experience by not considering the criteria needed so often cause new problems for the customer after buying housing. Problems such as inconvenience, credit installment problems and so forth. Decision support systems are generally defined as a system capable of producing solutions and problem- solving. Decision support systems are not intended to replace decision-making roles, but to assist and support decision makers. One of the most commonly used methods in decision support systems is the simple additive weighting (SAW) method. This simple additive weighting method can determine the preference value of each alternative, then perform the warfare process that can select the best alternative from a number of alternatives available.
Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force Taronisokhi Zebua; Natalia Silalahi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v3i0.67

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.109 KB) | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital Sri Wahyuni; Surya Darma Nasution; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.128

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
SISTEM INFORMASI ABSENSI MAHASISWA STMIK BUDI DARMA MEDAN BERBASIS WEB MOBILE Taronisokhi Zebua; Pristiwanto Pristiwanto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.480

Abstract

Pendataan kehadiran atau absensi mahasiswa sangat penting dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi termasuk di STMIK Budi Darma Medan. Masalah yang sering terjadi selama ini adalah banyaknya kesalahan penginputan jumlah kehadiran mahasiswa ke dalam sistem informasi akademik kampus yang dilakukan oleh pegawai program studi. Kesalahan tersebut sangat berpengaruh pada penentuan keikutsertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah. Hal inilah yang menjadi salah satu faktor terjadinya complain nilai akhir ujian semester dari mahasiswa kepada program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap efektif untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa berbasis web yang langsung dapat diakses oleh masing-masing dosen pada saat melaksanakan absensi mahasiswa. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
TEKNIK PENYEMBUNYIAN PESAN TEKS TERENKRIPSI ALGORITMA MERKLE-HELLMAN KNAPSACK MENGGUNAKAN METODE PIXEL VALUE DIFFERENCING KE DALAM CITRA DIGITAL Agung Lestari; Abdul Sani Sembiring; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1590

Abstract

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image