Arya Bima Mohammad Heriansyah
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Penerapan Algoritma Prim dalam Menentukan Rute Prioritas Pengiriman Paket Express Arya Bima Mohammad Heriansyah; Rinaldi Rizwar; Muhamad Rafliansyah; Efrans Christian; Viktor Handrianus Pranatawijaya
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 3 (2024): July : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i3.1550

Abstract

This research analyzes the use of the Prim Algorithm in determining priority routes for package delivery by express service couriers. Through case studies, this research evaluates the efficiency of package delivery by considering delivery priority and the distance the courier will travel. The research results show that the Prim Algorithm is effective in minimizing delivery loads by connecting priority delivery points with minimal travel distance. This research method uses the Prim Algorithm to create a delivery route graph that connects all priority delivery points with a minimum travel distance, with data including the location of the delivery point, priority and distance between locations. The results show that the Prim Algorithm is effective in minimizing delivery load by generating optimal routes, allowing couriers to prioritize package delivery efficiently. This proves the important role of the Prim Algorithm in package delivery strategies for express service couriers.
IMPLEMENTATION OF A COMBINATION OF FERNET ENCRYPTION AND LSB STEGANOGRAPHY IN AN IMAGE-BASED INFORMATION SECURITY SYSTEM Jadiaman Parhusip; Muhammad Arifin Ilham; Rinaldi Rizwar; Arya Bima Mohammad Heriansyah; Raydamar Rizkyaka Riyadi
Jurnal Informatika dan Teknik Elektro Terapan Vol. 14 No. 1 (2026)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v14i1.8521

Abstract

Information security is an essential aspect in the digital era, where data exchange is highly vulnerable to misuse. The combination of cryptography and steganography provides dual protection by securing message confidentiality and concealing its presence. This study implements the Fernet Encryption algorithm for data encryption and the Least Significant Bit (LSB) technique for embedding encrypted messages into digital images. The system is developed using Python with the cryptography, Pillow, and NumPy libraries. In this study, the cover medium is a randomly generated noise image, chosen to ensure sufficient embedding capacity, making visual distortion irrelevant to the analysis. Experimental results show that the encrypted token can be successfully embedded, extracted, and decrypted using the correct key. These findings demonstrate that the combination of Fernet and LSB serves as an effective proof-of-concept for layered security mechanisms in digital image media, with potential for further development using natural images for practical steganography applications.