Bintang Putra Aryatama
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Perancangan dan Implementasi Sistem Manajemen Inventory Barang Berbasis CRUD Menggunakan Metode Waterfall Nikodemus Christiano David; Bintang Putra Aryatama; Muh Rizky Anggara Yunan Putra; Firman Andriyanto Arief; Riyan Abdul Aziz
Jurnal Riset Multidisiplin Edukasi Vol. 2 No. 10 (2025): Jurnal Riset Multidisiplin Edukasi (Edisi Oktober 2025)
Publisher : PT. Hasba Edukasi Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.71282/jurmie.v2i10.1075

Abstract

Efficient inventory management is crucial for company operations, especially in today's digital era. The implementation of an inventory management system based on CRUD (Create, Read, Update, Delete) offers a structured solution for managing stock, allowing users to easily add, view, update, and delete inventory data. This system enhances efficiency and accuracy in stock record-keeping but still has limitations, such as the lack of advanced automation features and more complex data analysis. This study evaluates the benefits and challenges of implementing the CRUD system and provides guidelines for further development to ensure the system meets the evolving operational needs. In conclusion, while the system is effective, adjustments and enhancements are needed to improve its scalability and flexibility in the future.
Implementasi Steganografi untuk Keamanan Jaringan Teknik Tersembunyi dalam Komunikasi Data Muh Rizky Anggara Yunan Putra; Bintang Putra Aryatama; Nikodemus Christiano David; Gilang Pamungkas; Indrawan Ady Saputro
Jurnal Riset Multidisiplin Edukasi Vol. 2 No. 10 (2025): Jurnal Riset Multidisiplin Edukasi (Edisi Oktober 2025)
Publisher : PT. Hasba Edukasi Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.71282/jurmie.v2i10.1093

Abstract

In the current digital era, where data threats are increasingly sophisticated and varied, network security measures such as steganography are essential. Steganography is a method used to conceal information within other media, such as images, audio, or video, so that the existence of the information is not detected by unauthorized parties. This method aims to maintain the confidentiality of the embedded message, ensuring that only the sender and the recipient are aware of its content. This research employs a literature study involving the collection of data from various sources, reading, noting, and processing the research materials. The results indicate that the implemented steganography method successfully embeds data with a low detection rate by third parties while maintaining good image quality. However, performance varies depending on the format and size of the digital media used. Overall, the implemented steganography method has proven effective in concealing sensitive data within digital media without compromising the quality of the media.