Pengamanan Email melalui Steganografi Penerapan One Time Pad dan Metode LSB pada Gambar Lampiran

RR Santosa, AR Pamungkas… - Prosiding Sains dan …, 2024 - jurnal.pelitabangsa.ac.id
Tingkat ancaman yang meningkat terhadap keamanan komunikasi digital, terutama melalui
email, mendorong penelitian untuk mencari solusi baru. Studi ini menggabungkan …

The Skincare Selection Application That Best Suits The Method Analytical Hierarchy Process (AHP)

I Zufria, M Fakhriza, NNA Srg - INFOKUM, 2021 - infor.seaninstitute.org
The number of beauty and care products is widespread outside, the more skin problems
people experience. Various problems of this disease are also caused by allergies due to the …

Study of reliability of smart parking systems based on microcontroller esp 8266 nodemcu

A Arnas, S Aryza - INFOKUM, 2021 - seaninstitute.org
Automatic system is a process to control the operation of an a tool that can automatically
replace the role of humans. One of the industries that is also experiencing rapid progress is …

Digital Image Security System Using Spritz Algorithm

M Furqan, R Kurniawan, AH Hasugian, IZH Nst - INFOKUM, 2021 - infor.seaninstitute.org
Private and confidential digital imagery is particularly vulnerable to eavesdropping by
irresponsible parties. Especially when distributed through the internet network such as on …

Implementation Of Neural Network With Perceptron Method For Letters Or Text Recognition

E Ayuningsih, E Afrianto - INFOKUM, 2021 - infor.seaninstitute.org
Modeling with neural networks is the learning and adjustment of an object. The perceptron
method is a learning method with supervision in a neural network system. In designing a …

Aplikasi Pembalajaran Struktur Data Dengan Index Model Splay Tree Dengan Menggunakan Metode Binary Search Treeeac

SB Sinaga - Jurnal Multimedia dan Teknologi Informasi …, 2020 - journal.cattleyadf.org
Index is a method used to test the process of retrieving data records in the process of
searching for records that are commonly used in databases. Making an index simulation …

Combination of Shamir Adleman's Elgamal Rivest Algorithm and Least Significant Bit in Securing Files

JP Sikumbang - INFOKUM, 2021 - seaninstitute.org
The security condition of a file can be determined by means of several algorithms. So far, the
identification of file security levels generally only uses the Google Drive link. Such security …

Application Of Security System Of Motorcycle Used Fingerprint Optical Sensor And Vibration Sensor With Fuzzy Logic Based On Arduino Uno R3

M Furqan, M Ikhsan, AH Hasugian, MR Hasibuan - INFOKUM, 2021 - infor.seaninstitute.org
The Increasing case of motorcycle theft in North Sumatera and lack of human control of
safety locks is an important factor for every motorcycle owner to ad dual security system. The …

Design Of Vehicle Data Security System And Vehicle Number Certificate Of UNPAB Lecturers And Students Based On NFC

MSP Batubara, S Aryza, A Tarigan - INFOKUM, 2021 - seaninstitute.org
Design Of Vehicle Data Security System And Vehicle Number Certificate Of UNPAB
Lecturers And Students Based On NFC Page 1 http://infor.seaninstitute.org/index.php/infokum/index …

Smart Infusation Patient Based On Microcontroller And Ecogreen

Z Syahluthfy, S Aryza, A Tarigan - INFOKUM, 2021 - infor.seaninstitute.org
An infusion Patient is a device used to provide food or medicine to patients in liquid form. In
some hospitals, intravenous fluids were still administered manually, patients were given …