Resolusi : Rekayasa Teknik Informatika dan Informasi最新文献

筛选
英文 中文
Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia 采用Xtea算法与集成库密钥生成器的方法进行秘密文本安全
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2022-01-30 DOI: 10.30865/resolusi.v2i3.272
Nusra Anwar, Sinar Sinurat, I. Saputra
{"title":"Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia","authors":"Nusra Anwar, Sinar Sinurat, I. Saputra","doi":"10.30865/resolusi.v2i3.272","DOIUrl":"https://doi.org/10.30865/resolusi.v2i3.272","url":null,"abstract":"Confidential text data is very vulnerable to wiretapping by irresponsible parties. The text is still plaintext, making it easier for the attacker to make use of it. Text data can be secured by several techniques. One of them is cryptographic techniques. Cryptographic techniques can secure secret text data by randomizing the hex value of the data into a data that cannot be recognized and read. One of the reliable algorithms is the eXtended Tiny Encryption Algorithm (XTEA) symmetry algorithm. The XTEA algorithm is a simple algorithm that is lightweight and fast in the encryption and decryption process. However, the concept of the symmetry algorithm is the encryption and decryption process using the same key. The security of this concept is very vulnerable if the key is leaked and is public. So that this can be optimized by generating keys using the Linear Congruential Generator (LCG) method. Key generation is used with prime numbers. The key sent to an eligible recipient is only the initial prime number. So that the recipient has to do key assembly first to carry out the decryption process. This can optimize the encrypted ciphertext using the XTEA algorithm.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Watermarking File Pdf Menggunakan Metode One-To-One Mapping 水印文件Pdf Menggunakan方法一对一映射
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2022-01-30 DOI: 10.30865/resolusi.v2i3.273
Jefri Andreas Sitohang
{"title":"Watermarking File Pdf Menggunakan Metode One-To-One Mapping","authors":"Jefri Andreas Sitohang","doi":"10.30865/resolusi.v2i3.273","DOIUrl":"https://doi.org/10.30865/resolusi.v2i3.273","url":null,"abstract":"Technological developments make it easy for internet users to get digital data in the form of text, audio, images, videos that are widely used and no longer pay attention to copyright protection of digital data. Watermarking is a technique that can be used to determine the validity of digital data copyright. PDF digital document data that is not inserted with a watermark, the information is very vulnerable to change and can cause problems such as the authenticity of the information in it being doubted because everyone can be free to manipulate the information and then redistribute it. The one-to-one mapping method is used for the watermarking process by inserting images into a pdf file. The process is done by taking the intensity value in the pdf file and the watermark image for mapping the pixel values. The result is a watermarked pdf file. The results of the watermaking process of this pdf file can be used to determine the validity of the copyright so that the authenticity of the information in it is safely maintained. Thus, the owner of the digital data feels that he will send his data to other parties.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sistem Pakar Diagnosa Penyakit Skistosomiasis Menggunakan Kombinasi Forward Chaining Dan Fuzzy Logic Takagi Sugeno Kang
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2022-01-30 DOI: 10.30865/resolusi.v2i3.310
Sarma Tampubolon
{"title":"Sistem Pakar Diagnosa Penyakit Skistosomiasis Menggunakan Kombinasi Forward Chaining Dan Fuzzy Logic Takagi Sugeno Kang","authors":"Sarma Tampubolon","doi":"10.30865/resolusi.v2i3.310","DOIUrl":"https://doi.org/10.30865/resolusi.v2i3.310","url":null,"abstract":"The purpose of this study was to determine the procedure for diagnosing Schistosomiasis at the Royal Maternity Hospital. The data collection technique used is the observation method. Schistosomiasis diagnosis expert system in this study was built using Visual Basic.Net 2008. The expert system method applied was Forward Chaining and Fuzzy Logic Takagi Sugeno Kang. From the results of the research conducted, it is known that Forward Chaining and Fuzzy Logic Takagi Sugeno Kang can provide diagnostic results that are relevant to the knowledge possessed by experts.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Penerapan Algoritma Text Mining Dan TF-RF Dalam Menentukan Promo Produk Pada Marketplace
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2022-01-30 DOI: 10.30865/resolusi.v2i3.309
Charles Joergensen E Munthe, Nelly Astuti Hasibuan, Hukendik Hutabarat
{"title":"Penerapan Algoritma Text Mining Dan TF-RF Dalam Menentukan Promo Produk Pada Marketplace","authors":"Charles Joergensen E Munthe, Nelly Astuti Hasibuan, Hukendik Hutabarat","doi":"10.30865/resolusi.v2i3.309","DOIUrl":"https://doi.org/10.30865/resolusi.v2i3.309","url":null,"abstract":"In the development of an increasingly sophisticated and modern era like today, the online marketplace is one of the e-commerce services or virtual buying and selling services which is a meeting place between sellers and buyers online to process buying and selling transactions. Determining the Algorithm Text mining is a process of mining data in the form of text where the data source is usually obtained from documents and the goal is to find words that can represent the contents of the document so that an analysis of the connectivity between documents can be carried out. Processes in text mining include tokenization, stemming and filtering processes. The method of collecting data is the library method. The stages of application development include process design, table design, implementation and system testing. The work in this final project uses a case study on a marketplace. In which this final project uses the Text Mining algorithm and the TF-RF algorithm in determining product promotions in the marketplace.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114429491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Penerapan Preference Selection Index (PSI) Dalam Sistem Pendukung Keputusan Pengangkatan Supervisor Housekeeping
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2020-11-28 DOI: 10.30865/resolusi.v1i2.70
Rikky Panggabean, Nelly Astuti Hasibuan
{"title":"Penerapan Preference Selection Index (PSI) Dalam Sistem Pendukung Keputusan Pengangkatan Supervisor Housekeeping","authors":"Rikky Panggabean, Nelly Astuti Hasibuan","doi":"10.30865/resolusi.v1i2.70","DOIUrl":"https://doi.org/10.30865/resolusi.v1i2.70","url":null,"abstract":"Hotels are services that are managed commercially in order to provide lodging facilities to the general public. Grand Antares Hotel is a 4 (four) star hotel or \"The Best Four Star Hotel in Medan\" whose existence describes it as a resting place. Hotel Grand Antares started operation on February 10, 2008 which has a hotel room capacity of 143 rooms. To provide good service to guests, the hotel has several departments that have duties and responsibilities for each department. One of the departments in the hotel is the housekeeping department, where the duties and responsibilities of the housekeeping department are the cleanliness of the entire public area of ??the hotel. At Hotel Grand Antares, housekeeping supervisors are part of the company's management who play an important role in increasing productivity. Being a housekeeping supervisor means occupying a position that demands responsibility and is hard and challenging. Supervisors must be responsible for other people's work and for their own work. Supervisors must solve problems, make decisions, and act","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133032384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Penerapan Metode MABAC Untuk Mendukung Pengambilan Keputusan Pemilihan Kepala Cabang Pada PT. Cefa Indonesia Sejahtera Lestari MABAC方法的应用,以支持对印尼有限责任有限公司主席选举的决定
Resolusi : Rekayasa Teknik Informatika dan Informasi Pub Date : 2020-09-20 DOI: 10.30865/resolusi.v1i1.11
Noveriang Ndruru, Mesran Mesran, Fince Tinus Waruwu, Dito Putro Utomo
{"title":"Penerapan Metode MABAC Untuk Mendukung Pengambilan Keputusan Pemilihan Kepala Cabang Pada PT. Cefa Indonesia Sejahtera Lestari","authors":"Noveriang Ndruru, Mesran Mesran, Fince Tinus Waruwu, Dito Putro Utomo","doi":"10.30865/resolusi.v1i1.11","DOIUrl":"https://doi.org/10.30865/resolusi.v1i1.11","url":null,"abstract":"The election of the branch head is prioritized to support the performance process and the continuous control process so in the election must have criteria that are able to give the right decision the criteria in question are education, experience, absenteeism and responsibility. Election of branch heads at PT. Cefa Indonesia Prosperous Lestari is carried out by receiving files from the company secretary's report, then an assessment is made based on predetermined criteria. The author chose the MABAC method (MULTI ATTRIBUTIVE BORDER APPROXIMATION AREA COMPARISON). used to analyze different alternatives and estimate alternatives according to their level of ultility where the values of the attributes are expressed in intervals to increase efficiency and improve accuracy in the decision making process.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信