Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analysis and recommendations for business process improvement for retail companies using the business process improvement (BPI) method Raihan, Ahmad; Kanza, Adam Satrio; Rohmah, Ahlam Umniyatur; Khairani, Dina Zhafira
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.109

Abstract

Retail companies are businesses that involve direct interaction between sellers of goods or services and consumers, meaning that retail businesses do not have a processing process from raw materials to finished products. In the process of editing and recapping goods data, there are 2 main businesses, namely editing data, sending copies of goods data, and storing new data in the cashier’s GIS database. After the evaluation, it was found that simplification could be made to make it more efficient. Based on the results of the evaluation of the business process, it was found that the root cause of the editing time and recap of goods data was long. Business process recommendations are made and the results are obtained, eliminating the process of providing a copy of new item data to the warehouse clerk and storing new item data in the cashier’s GIS database.
Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes Rohmah, Ahlam Umniyatur; Djuniadi, Djuniadi
Journal of Student Research Exploration Vol. 1 No. 1: January 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/josre.v1i1.111

Abstract

Data security is one of the main factors in the world of information technology. The human need for information is increasing along with the changing times today. To maintain the authenticity of the information presented, it is necessary to have a high level of security. In this study, a data security simulation will be designed using the TEA (Tiny Encryption Algorithm) algorithm which includes a block cipher encryption algorithm and includes a symmetric key cryptography algorithm with the advantage of being on the Feistel network. The practicum was analyzed based on the process of encrypting and decrypting messages in text format. The software used to simulate the TEA (Tiny Encryption Algorithm) algorithm using Cryptool2 software which is open source software is used to explain the concept of cryptography. This research is used to decipher, schema, and implement the TEA (Tiny Encryption Algorithm) algorithm in the form of simulating encryption and decryption of text messages (both text and text files) so that text messages are sent in the safest way from the sender to the recipient.