Claim Missing Document
Check
Articles

Found 2 Documents
Search

ENHANCING 5TH GRADE READING SKILL IN DESCRIPTIVE TEXT AT YP HKBP 1 PEMATANGSIANTAR THROUGH GENRE-BASED APPROACH Duma Simanjuntak; Netania Saragih; Frans Panjaitan; Herman
JURNAL AKADEMIK PENGABDIAN MASYARAKAT Vol. 3 No. 4 (2025): Juli
Publisher : CV. KAMPUS AKADEMIK PUBLISING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61722/japm.v3i4.5834

Abstract

This community service aimed to enhance fifth-grade students' reading comprehension in descriptive texts using the Genre-Based Approach (GBA). The issue addressed was students' limited reading proficiency in recognizing text structure, vocabulary, and detailed information in descriptive texts. The program applied a systematic instructional model consisting of preparation, implementation, and evaluation phases. Nineteen students from SD YP HKBP 1 Pematangsiantar participated. Data were collected through pre-tests, post-tests, classroom observations, and interviews. This study confirmed the effectiveness of GBA as a sustainable method for early literacy development in elementary education.
Penerapan Teknik Steganografi Teks pada Format File PDF Silaen, Calvin; Frans Panjaitan; Marihot Tambunan
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 2 (2025): Desember 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i2.420

Abstract

This research aims to implement steganography by embedding text messages into PDF files using metadata methods and securing the messages through AES encryption. The project consists of several stages, beginning with the selection of a PDF file to serve as the medium for embedding. Users can then input the message they wish to embed. This message will subsequently be encrypted using the AES method, which is designed to protect the content from unauthorized access. Following this, the encrypted message will be embedded into the PDF file via metadata, ensuring that the structure and appearance of the PDF remain unchanged. During the extraction phase, users possessing the appropriate key can retrieve the embedded message and decrypt it to read its content. The implementation results demonstrate that this method successfully maintains the confidentiality of the message without compromising the structure or appearance of the PDF file, ensuring that the message is accessible only to those with the correct decryption key, thereby enhancing the security of sensitive information storage and transmission.