cover
Contact Name
Paska Marto Hasugian
Contact Email
majelis@paspama.org
Phone
+6281264451404
Journal Mail Official
majelis@paspama.org
Editorial Address
Jl Piano N0 156 Selambo, Deliserdang, Sumatera Utara, Indonesia, Sumatera Utara, Indonesia , Kab. Deli Serdang, Provinsi Sumatera Utara, 20229
Location
Unknown,
Unknown
INDONESIA
Journal Majelis Paspama
Published by Paspama Institute
ISSN : -     EISSN : 29871379     DOI : https://doi.org/10.58471
Journal Majelis Paspama The following journals that receive a multidisciplinary research focus with a Scope of Engineering accept submissions of scientific articles for research in the form of research results, surveys, and literature in the fields of engineering, including: Informatics Engineering, Electrical engineering, Civil engineering, Architecture, Chemical engineering, Industrial engineering, Mechanical engineerin
Articles 37 Documents
Information Technology Resource Framework Hasugian, Paska Marto
Journal Majelis Paspama Vol. 2 No. 01 (2024): Journal Majelis Paspama, January 2024
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is a literature review that aims to investigate and analyze concepts and frameworks related to information technology resources. Through a literature review approach, this research collects, organizes, and analyzes previous research that has been conducted in this area. The main focus of this research is to gain an understanding of the role, components, and characteristics of the Information Technology Resource framework, as well as its impact on company performance. The method used in this research involved the search and selection of relevant scholarly articles, journals, and publications relating to the topic. After a careful selection process, literature studies that met the inclusion criteria were analyzed in detail, and important relevant information was retrieved for further analysis. The results of this literature review present various existing frameworks in the information technology resources domain. These frameworks cover important aspects such as information technology resource management, integration of information technology in business strategy, information technology performance measurement, and development of information technology competencies in organizations. In this context, this study identifies key concepts, theoretical perspectives, and recent trends in the development of information technology resource frameworks.
Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages Cahaya Elyzabeth Pangaribuan; Ogy Kevinta Surbakti; Fera Sihotang; Yosafat Tamba; Yordan Daniel Ndruru; Paskah Marto Hasugian
Journal Majelis Paspama Vol. 2 No. 2 (2024): Journal Majelis Paspama, July 2024
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Steganography is a technique of hiding information in other media to maintain the confidentiality of the message. One of the challenges in steganography is finding a method that can insert data without being detected while maintaining the quality of the original media. This study discusses the application of the Echo Hiding algorithm in audio steganography, which utilizes acoustic properties to insert information into sound signals. The main objective of this study is to analyze the effectiveness and security of the Echo Hiding algorithm in hiding data in audio signals. To achieve this goal, this study uses a digital signal processing method, which includes the stages of message insertion, hidden message extraction, and audio quality evaluation using objective and subjective parameters. Testing was carried out with various scenarios to assess the capacity of insertion, resistance to attacks, and changes in sound quality. The results showed that the Echo Hiding algorithm was able to store information efficiently with little impact on audio quality. Signal analysis showed that the modifications made were not significant to the listener's perception, thus increasing the security and transparency aspects in audio steganography. Thus, this study contributes to the development of a safe and effective steganography method to maintain the confidentiality of information in sound media.
Application of Diffie-Hellman Algorithm Method (Key-Exchange) in Cryptography Sarah Sagala
Journal Majelis Paspama Vol. 1 No. 02 (2023): Journal Majelis Paspama, July 2023
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In cryptography, key exchange security is essential. Because the message code can only be a message that is analyzed with a key offer that matches this message. Secret messages can be delivered through symmetric cryptographic algorithms with coded keys or with key exchange algorithms. One of the key exchange methods that has been developed is Diffie-Hellman Key-Exchange (DHKE). Diffie-Hellman is a simple method used to generate a key between two parties in order to communicate securely. The two parties running this algorithm have their own secret variables, by exchanging two public variable values and performing calculations using the received variables and secret variables obtained randomly shared secret. The security strength in this algorithm can be improved by combining an asymmetric key algorithm, namely RSA. This algorithm is not only in generating RSA keys, but also in calculating discrete logarithms in RSA and Diffie-Hellman. The results of this algorithm are key strength and confidentiality that can be used in symmetric cryptographic algorithms.
Implementation of DCT Based Steganography Algorithm to Hide Information in Images Septrian Napitupulu; Ryan Revaldo Siagian; Ramli Simanullang; Kelvin Daniel Manalu; Conglii Fao Silalahi
Journal Majelis Paspama Vol. 1 No. 02 (2023): Journal Majelis Paspama, July 2023
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Steganography is the art and science of hiding secret messages in digital media, ensuring that only the sender and intended recipient are aware of its existence. One of the widely used techniques in digital image steganography is the Discrete Cosine Transform (DCT) based method, which embeds secret data into the frequency domain of an image. This study explores the application of DCT-based steganography to hide information in an image while maintaining its visual integrity. The research methodology involves transforming the image into DCT coefficients, embedding the secret message into selected high-frequency coefficients, and then applying the Inverse Discrete Cosine Transform (IDCT) to reconstruct the stego image. The quality of the modified image is evaluated using the Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE) metrics. The results show that the proposed method effectively hides information while maintaining image quality, as indicated by the high PSNR value and minimal MSE. This study contributes to the field of secure data communication by presenting a reliable and undetectable approach to information hiding.
The Implememtation of Hiding Information by Using Discrete Wavelet Transform (DWT) Devi Silvia Simbolon; Kevin Enrique Keliat; Kristian Sigalingging; Vicky Nainggolan; Rifelson Sipayung
Journal Majelis Paspama Vol. 1 No. 02 (2023): Journal Majelis Paspama, July 2023
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Steganography using Discrete Wavelet Transform (DWT) is a technique for embedding information into an image without significantly altering its visual quality. This study aims to analyze the effectiveness of DWT in securing hidden messages within digital images. DWT decomposes image signals into approximation and detail coefficients, allowing data embedding in the high-frequency components while preserving the most essential image features. The research methodology involves converting secret messages into numerical form, applying DWT to the image, embedding data into the detail coefficients, and reconstructing the image using inverse DWT. The results show that this approach enables secure and imperceptible data hiding while maintaining image quality. Additionally, DWT provides advantages in signal analysis, data compression, and noise resistance, making it a robust technique for steganography. The study concludes that DWT is an effective method for secure data embedding with minimal distortion, offering potential applications in digital watermarking and confidential communication.
Steganography With End Of File Zuvernius Sitohang; Yohana Desma R. Munte; Pembinata Taringan; Hiskia Hasugian; Trihadi pinem
Journal Majelis Paspama Vol. 1 No. 02 (2023): Journal Majelis Paspama, July 2023
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

STEGANOGRAPHY WITH END Steganography is the science and art of hiding secret messages in other messages, so that the existence of the message cannot be known by third parties. One method used in steganography is the EOF (End of File) message insertion method, which is inserting data at the end of a file by providing a special mark to identify the beginning and end of the data. This technique is used to insert data as needed, and the steganographed file does not appear to change visually or audibly, even though the file size becomes larger. In this regard, this technique can be applied to protect the copyright of digital products, such as software or multimedia, through digital watermarking techniques that use the EOF method to insert information or messages as permanent identification in digital files. In addition, in an effort to improve security, a technique for combining Blowfish cryptography with Hexa steganography is also proposed. This technique has advantages over DCS steganography, namely fewer pixel color changes, so that the inserted data is more difficult to detect and easier to maintain even if the stego image is processed or edited. The results of the study show that the combination of Blowfish cryptography with Hexa steganography is more effective than DCS steganography in protecting the inserted data. The test was carried out by analyzing the robustness of Hexa steganography using the PNSR test to determine the level of change in the original image and the inserted image.
Cryptography with Ring Algorithm – LWE Paramita Lumban Gaol; Stephen Buulolo; Aritmen Andreas L. Manurung; Yeremia, Yeremia
Journal Majelis Paspama Vol. 2 No. 01 (2024): Journal Majelis Paspama, January 2024
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ring Learning With Errors (Ring-LWE) is one of the basic schemes used to develop cryptographic algorithms that are resistant to quantum attacks, offering better computational efficiency compared to standard Learning With Errors (LWE). Ring-LWE uses the algebraic characteristics of polynomial rings to create a robust and fast encryption system. This study implements and evaluates the Ring-LWE algorithm in the context of public key exchange and encryption. Simulations are performed with various security parameters, including modulus size and error rate, to test the resistance to brute force attacks and lattice-based attacks. The experimental results show that the Ring-LWE algorithm can achieve a balance between security and computational efficiency, with shorter processing time than conventional LWE while maintaining a high level of security even in the face of quantum computers. From this study, it can be concluded that Ring-LWE is an excellent choice for application in post-quantum security systems, especially in encrypted communication and digital authentication applications. The next step can be directed at optimizing resource utilization and testing against various types of attacks.
Analysis of the Effect of Padding Schemes on Entropy, Bit Distribution, Hash Collisions, and Processing Time in Merkle-Damgård Valois Vicenti Sirait; Mia Elisabet Malau; Jeni Percani Sinaga; Dian Pratama Gulo; Berkat Damai Halawa
Journal Majelis Paspama Vol. 1 No. 02 (2023): Journal Majelis Paspama, July 2023
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security in cryptographic systems is highly dependent on the strength of the hashing algorithm. One of the most commonly used hashing structures is Merkle-Damgård, which converts the compression function into a fixed-size hashing function. The padding technique in this structure plays an important role in determining the bit distribution, entropy, and the probability of collision in the hash results. This study aims to analyze and compare three padding methods, namely 1 & 0 bit padding, repeating pattern padding (0xAA), and 1 bit padding (0xFF), based on bit distribution parameters, Shannon entropy, hash collision, and processing time. The results show that 1 bit padding (0xFF) has the highest Shannon entropy value (0.9940), indicating a better level of randomness compared to other methods. In terms of bit distribution, this padding also produces better balance than other paddings. However, the hash collision rate (74.90%) is still relatively high, indicating that the padding method alone is not enough to significantly reduce the probability of collision. In terms of time efficiency, padding bits 1 & 0 have the fastest execution time (0.000132 seconds), while padding bit 1 (0xFF) has the longest processing time (0.000177 seconds). With these results, it can be concluded that the padding method affects the hash characteristics, but does not significantly reduce the collision probability. Therefore, further optimization is needed to improve the security of Merkle-Damgård-based hashing.
Evaluating Axial and Radial Compression-Induced Stress and Deformation in Watermelon Fruits Chibuzo Ndubuisi Okoye; Christian Ebele Chukwunyelu; John Chikaelo Okeke; Augustine Uzodinma Madumere; Chukwunonso Nnamdi chidiogo; Sunday Chimezie Anyaora
Journal Majelis Paspama Vol. 3 No. 02 (2025): Journal Majelis Paspama, 2025
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Understanding the mechanical behavior of biological materials such as watermelon fruits under compressive loading is essential for improving postharvest handling, packaging, and transport systems. This study utilized experimental and finite element methods to evaluate stress and deformation in watermelon fruits under axial and radial compression. Fresh, defect-free watermelons were measured and tested using a universal testing machine until failure. Mechanical properties such as modulus of elasticity, Poisson’s ratio, and bulk modulus were computed. Simulation in Autodesk® Inventor® used these parameters to model stress distribution, safety factors, and deformation under a 95 N load. The elliptical mesh model included 3529 nodes and 2264 elements. Each test was repeated thrice for accuracy. The result revealed that Axial loading showed higher modulus of elasticity (2.68 MPa), Poisson’s ratio (0.43), and bulk modulus (0.94 MPa) compared to radial loading (2.41 MPa, 0.33, and 0.91 MPa respectively). Fracture load remained consistent (95 N). Von Mises stress under axial loading peaked at (1.238 MPa) versus radial (0.02701 MPa). Safety factor under axial loading was critically low (0.14), unlike radial (5.71). Orthogonal stress components (XX, YY, ZZ) revealed greater stress concentration under axial loading (e.g., −1.02 MPa to 0.059 MPa in XX). Finite element modeling used (3529) nodes and (2264) elements for analysis. These findings reveal that axial compression presents a higher risk of structural failure in watermelons, highlighting the importance of orientation during handling and mechanical design for fruit protection.
Anambra State Vigilante Services and Crime Reduction in Anambra State Nigeria (2014-2022) Gideon Chinedu Okafor; Nonso Sunday Okoye; Fidelia Nzekwe-Chinwuko; Uchenna Emmanuel Umeagugesi
Journal Majelis Paspama Vol. 3 No. 02 (2025): Journal Majelis Paspama, 2025
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Crime remains a significant challenge to human security and development in Nigeria, including Anambra State. To address this issue, the Anambra State government established the Anambra State Vigilante Services (AVS) to complement the efforts of the Nigeria Police Force and other security agencies. This study examined the Anambra State Vigilante Services and crime reduction in Anambra State, for the period, 2014 - 2022. Specifically, the study sought to analyze the effect of collaboration between Anambra State Vigilante Services and other security agencies has reduced armed robbery and kidnapping in Anambra State. In line with the objectives of the study, one research question and hypothesis were formulated. The work is anchored on Broken Windom Theory by James Wilson and George Kelling (1982). The study adopted descriptive research design for the study. A sample of 340 drawn from a population of 340 because the population is small and manageable. Judgmental sampling techniques was used for the study. A structured Likert-type questionnaire was developed for data collection, and found reliable at Cronbach alpha coefficient of 0.80. A structured Likert-type questionnaire was developed for data collection. The econometric technique including Descriptive statistics, Pearson Product – Moment Correlation analysis was used to test the hypotheses. The findings confirms that the collaboration between Anambra State Vigilante Service and security agencies has significant effect on reduction of the rate of armed robbery and kidnapping in Anambra State, which is a crucial factor in reducing armed robbery and kidnapping in Anambra State. Based on the findings, the study concludes that Anambra State vigilante services have played a significant role in reducing crime in Anambra State. Through their community-based approach, intelligence gathering and collaboration with other security agencies. Amongst the recommendations is that Anambra State Government and security agencies should further strengthen and sustain the collaboration with Vigilante Services to leverage their community-based intelligence and enhance crime reduction efforts.

Page 1 of 4 | Total Record : 37