Claim Missing Document
Check
Articles

Found 12 Documents
Search

Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video Siregar, Manutur; Jinan, Abwabul; Muhammad Raja Gunung, Tar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4217

Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.
Penerapan Metode K-Means untuk Optimalisasi Strategi Bisnis pada TB Rifky Berdasarkan Laris dan Tidak Laris Barang Lubis, Siti Sahara; Gunung, Tar Muhammad Raja; Muis, Abdul; Ningtyas, Alyiza Dwi; Siregar, Manutur Pandapotan
Journal of Information System and Technology (JOINT) Vol. 6 No. 3 (2025): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v6i3.11443

Abstract

Penelitian ini bertujuan untuk menganalisis dan mengelompokkan tingkat kelarisan stok barang pada Toko Bangunan (TB) Rifky agar dapat memberikan informasi yang berguna bagi pemilik usaha dalam pengambilan keputusan terkait pengelolaan persediaan dan strategi penjualan. Metode yang digunakan dalam penelitian ini adalah algoritma K-Means, yaitu salah satu metode klasterisasi dalam data mining yang bekerja dengan membagi data ke dalam beberapa kelompok (cluster) berdasarkan tingkat kemiripan antar data. Hasil pengelompokan menghasilkan dua kategori utama, yaitu kelompok barang laris yang terdiri dari Kawat Beton, Kaca, Kuas Cat, dan Kerikil/Split, serta kelompok barang tidak laris yang mencakup Semen, Pasir, Batu Bata, Besi Beton, Kayu, Keramik, dan berbagai bahan bangunan lainnya. Informasi yang diperoleh dari hasil analisis ini diharapkan dapat membantu pemilik TB Rifky dalam mengambil keputusan strategis terkait pengelolaan stok dan peningkatan penjualan. Keterbatasan penelitian ini terletak pada jumlah centroid yang digunakan, yaitu hanya dua (C1 untuk barang laris dan C2 untuk barang tidak laris), sehingga variasi informasi yang dihasilkan masih terbatas.