This study aims to hide data or information on pixel image using EOF method and to improve the security of hidden data than combine with cryptography algorithm Modular Multiplication Block Cipher algorithm for the enc...
This study aims to hide data or information on pixel image using EOF method and to improve the security of hidden data than combine with cryptography algorithm Modular Multiplication Block Cipher algorithm for the encryption process. The image file used as the test sample consists of 3 types of image types (JPG, BMP, PNG), this file type is the most widely used by users with different width and height as well as various file sizes. The results of this study prove that the data could embed in pixel image using EOF method and the file size of carrier will increase its capacity as byte of embedded text.
The library procurement materials is one of the technical services activities in a library as an effort to provide information needed by librarians. in doing the calculation of the procurement book (stock) of in libra...
The library procurement materials is one of the technical services activities in a library as an effort to provide information needed by librarians. in doing the calculation of the procurement book (stock) of in library Universitas Malikussaleh still not automated and computerized and common error occurred on the the given amount of procurement the library because calculation was carried out using the tools count, with the application calculation book of stock it would make simply in calculation stock in library of Universitas malikussaleh. This application calculation stock of book is using deterministic dynamic programming algorithm for calculation process, deterministic dynamic programming itself is a method with gradually solutions and every stage will get an optimal solutions. By using this method it would know whether are the amount of stock of book has been Optimal. This Research conducted by the writer in unit. The library of Universitas Malikussaleh are taking total which start in 2012-2016 and the result by using dynamic programming deterministic algorithm is 270,779 as the optimal solutions in 2016.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Mana...
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Utilization of Information and communication Technology (ICT) is still relatively low in the level of SMEs due to various limitations ranging from access to capital, till the marketing network. ICT is present to provi...
Utilization of Information and communication Technology (ICT) is still relatively low in the level of SMEs due to various limitations ranging from access to capital, till the marketing network. ICT is present to provide the ability for SMEs in improving the benefits and competitive advantage of the organization. This study aims to determine the level of readiness of SMEs in utilizing technology, especially ICT. The methodology used is a survey to see the technology readiness of 107 SMEs in South Tangerang selected by purposive sampling. The approach used is TRI (Technology Readiness Index) which is the individual perception of technology based on four criteria that is optimism, innovativeness, discomfort and insecurity. The results showed that the optimism and innovativeness variables significantly positively influence the technology readiness while the variables of discomfort and insecurity also significantly positively influence the readiness of ICT.
E-learning nowadays has become a requirement for institutions to support their learning activities. To adopt e-learning, an institution requires a large strategy and resources for optimal application. Unfortunately, n...
E-learning nowadays has become a requirement for institutions to support their learning activities. To adopt e-learning, an institution requires a large strategy and resources for optimal application. Unfortunately, not all institutions that have used e-learning got the desired results or expectations. This study aims to identify the extent of the level of readiness of e-learning implementation in institution X. The degree of institutional readiness will determine the success of future e-learning utilization. In addition, institutional readiness measurement are needed to evaluate the effectiveness of strategies in e-learning development. The research method used is survey with questionnaire designed based on integration of 8 best practice ELR (e-learning readiness) model. The results showed that from 13 factors of integrated ELR model being measured, there are 3 readiness factors included in the category of not ready and needs a lot of work. They are human resource (2.57), technology skill (2.38) and content factors (2.41). In general, e-learning implementation in institutions is in the category of not ready but needs some of work (3.27). Therefore, the institution should consider which factors or areas of ELR factors are considered still not ready and needs improvement in the future.
Keeping the data intact without changing becomes an important factor in a communication, the data itself has many forms such as text data, audio data, image data and for secure every form data an algorithm Base64 are ...
Keeping the data intact without changing becomes an important factor in a communication, the data itself has many forms such as text data, audio data, image data and for secure every form data an algorithm Base64 are needed, Base64 algorithm is used as data format to transmit data due to the result of base64 itself, but Base64 algorithm is not safe enough because it is easy to decoding and get the original form data, therefore need additional security and in this research combined with Hashing Variable Length (HAVAL) algorithm, HAVAL algorithm has a way work secures and compresses plaintext, so the encoding result from Base64 is re-secured and compressed using HAVAL algorithm with length of hashing 32 bit or 4 bytes so when data transmission process will not take many bytes of data compared with Base64 algorithm
Decision Support system is a system commonly used to assist management in assisting decision-making in top managerial sections, Multi-Criteria Decision Making (MCDM) is one of many decision-making methods that can be ...
Decision Support system is a system commonly used to assist management in assisting decision-making in top managerial sections, Multi-Criteria Decision Making (MCDM) is one of many decision-making methods that can be used to select the best alternative from a number of alternatives based on certain criteria, one of the methods that can be utilized is the Elimination Et Choix Traduisant la Realite (ELECTRE) method that works based on the concept of outranking using pairwise comparisons of each alternative based on appropriate criteria, this paper applies the ELECTRE method in a web based application that can be employed for input and output dynamic for alternative, criteria, user values and also a fast ranking process, the choice of web based application because there is many research about decision support system but only few that applied to application, and this research tries to applied ELECTRE method to web based application.
Implementation of Decision Support system for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decis...
Implementation of Decision Support system for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support system is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
The application security of information systems is essentially to ensure the safety of business processes elements (BPEs) supported by information system, that is, by implementing appropriate security measures to ensu...
详细信息
The application security of information systems is essentially to ensure the safety of business processes elements (BPEs) supported by information system, that is, by implementing appropriate security measures to ensure that the business processes operate in a well-defined and logical manner. A security model based on business process is proposed in this paper, through defining basic safe attributes of business process, also the security target recognition and consistency test of the model are given.
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptogra...
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.
暂无评论