ABSTRAKKemajuan perkembangan teknologi komputer dan telekomunikasi dapat membantu menyelesaikan pekerjaan dengan cepat, akurat dan efisien. Alat komunikasi yang banyak digunakan pada saat ini adalah mobile phone atau disebut juga telepon seluler. Salah satu teknologi yang digunakan untuk berkomunikasi pada mobile phone adalah dengan mengirimkan data berupa pesan singkat atau SMS (Short Message Service). Permasalahan yang ditemukan dalam berkomunikasi menggunakan mobile phone adalah pencurian, penyadapan, atau penghapusan data khususnya data SMS (Short Message Service) sehingga aspek keamanan data dianggap penting. Oleh karena itu dibutuhkan sistem kriptografi enkripsi dan dekripsi SMS, disini digunakan enkripsi simetris. Sistem ini merupakan aplikasi yang menerapkan metode zig zag cipher yang menggunakan kunci simtetris. Hasil pengujian dari sistem ini adalah pesan SMS dienkripsi dengan pola zig zag menggunakan kunci dan didekripsi menggunakan kunci yang sama dengan enkripsi.
Ikonos imagery is a satellite image that has high spatial resolution with an accuracy of one meter pixels for panchromatic and four meters to multispektral. Ikonos imagery is often used to map the process, view, measure and memoniotring areas of work/activities on the Earth. Ikonos image of Government also often use it for things like national security evaluation against the occurrence of the disaster, city planning, mineral exploration and mine planning monitoring of agriculture, and others. Image digital imaging results over long distances using satellite is often there are disturbances in the form of light distortion, noise or other distractions that cause the object on the image less obvious or obscure. This discussion on the research being done is knowing the process of detection on image by calculating the difference between two dots are bertetanggan, and is in the process of smoothing and thresholding on image ikonos. The methods used in this research is a method of Marr-Hilderth. In addition, a process that is done on this research is conducting a testing method against Marr-Hilderth, which can be implemented to fix the blurry objects on images ikonos. The results of this research is to generate image ikonos with display clear object with the menerapakan method of the Marr-Hilderth and tested using the matlab application version 7.8 (r2009a).Keywords: Ikonos image, image processing, method of Marr-Hilderth, Matlab 7.8
ABSTRAKBantuan Rastra merupakan program pemerintah yang diberikan kepada masyarakat untuk meningkatkan kesejahteraan dan ketahanan pangan dalam rumah tangga, mengatasi kemiskinan dan sekaligus memberikan perlindungan sosial kepada masyarakat yang tidak mampu. Pemilihan penerima bantuan rastra sudah menjadi tugas perangkat desa memilih siapa saja layak untuk mendapatkan bantuan rastra. Mendukung keputusan pemilihan penerima bantuan rastra yang sifatnya multi alternative maka diperlukan metode pendukung keputusan. Metode MABAC adalah salah satu metode pendukung keputusan yang jenis keputusannya multi alternative, metode ini dapat membantu proses pengambilan keputusan pemilihan bantuan rastra dengan optimal. MABAC merupakan metode perbandingan multikriteria. Metode ini dipilih karena, metode ini menyediakan stabil (konsisten) solusi dan handal untuk pengambilan keputusan rasional, dibandingkan dengan metode lain multi-kriteria pengambilan keputusan (SAW, COPRAS, Moora, TOPSIS dan VI-KOR). Menerapkan metode MABAC dalam proses pendukung keputusan pemilihan penerimaan bantuan ranstra, metode MABAC memiliki 6 langkah proses yaitu Forming initial decision matrix, Normalization of initial matrix, Calculation of weighted matrix, Determination of border approximate area matrix, Calculation of matrix elements of alternative distance from the border approximate area, Ranking alternatives.
ABSTRAKData teks pada umumnya yang tersimpan di dalam database masih persis sama dengan teks yang ditampilkan sebagai informasi akhir bagi pengguna. Hal ini dapat mempermudah seorang kriptanalis maupun orang lain yang tidak mempunyai hak akses untuk dapat mengetahui secara langsung isi dari database. Paper ini bertujuan untuk meminimalisir masalah terhadap database tersebut dengan melakukan kegitan penyandian record table database dengan menggunakan algoritma triangle chain cipher (TCC). Pendekatan eksperimental digunakan untuk menguji algoritma Triangle Chain yang merupakan salah satu algoritma penyandian yang beroperasi berdasarkan penyandian (kriptografi) klasik khususnya dalam teknik subtitusi terhadap karakter. Setiap karakter akan disubtitusi berdasarkan kunci dan faktor pengali yang telah ditetapkan berdasarkan formula yang berlaku dalam algoritma ini. Algoritma ini melakukan penyandian pada record sebanyak dua kali dan selalu bergantung pada hasil proses sebelumnya. Hal inilah yang mendasari rumitnya pemecahan dari algoritma penyandian berantai ini. ABSTRACTIn generall, database record contains an array of operational data available to a company or organization, as a source of any information system that is running. Generally, text data is stored in database which is still exactly the same as the text displayed as the final information for the user. This can facilitate a cryptanalyst and others who do not have access rights to be able to know the contents of the database directly. This study aims to minimize the problem by performing record encryption using the triangle chain cipher algorithm (TCC). Triangle chain algorithm is one of the encryption algorithms that operate based on encryption (cryptography), especially in classic substitution of character technique. Each character will be substituted by a key and a multiplier factor that has been determined based on a formula that applies in this algorithm. These algorithms perform encryption on the record twice and always rely on the results of the previous process. This is what underlies the complexity of solving this chain encryption algorithms.
Compressed files require less disk space than files that are not compressed, so compressing is useful for backing up data by using storage space to be small or to send information over the Internet faster. MP3 makes the audio format often used because the data stored resembles the original data when recorded and has a size that is not too large compared to other formats. Users besides storing song files, they also store videos and other files and users also want the highest quality data and minimum quantity (size). So to make a lot of empty space and have a size of data that is not large on storage media, a compression method that means to shorten the size of the bits needed for data is needed. Algorithms used in the compression process, including the Levenstein algorithm which is a type of lossless compression. Applying the Levenstein algorithm to the compression process the author wants to know the performance of compression when done by compressing MP3 files, so that large MP3 files will be compressed into smaller sizes, so that the transmission process is carried out faster and reduces the data storage location.Keywords: MP3, File, Levenstein
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.