[PDF][PDF] Prototype file transfer protocol application for LAN and Wi-Fi communication

R Rahim, S Aryza, P Wibowo, AKZ Harahap… - Int. J. Eng …, 2018 - researchgate.net
Abstract FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An
FTP server can be accessed by using a URI (Universal Resource Identifier), using FTP file …

[PDF][PDF] Combination of levenshtein distance and rabin-karp to improve the accuracy of document equivalence level

AH Lubis, A Ikhwan, PLE Kan - International Journal of Engineering …, 2018 - academia.edu
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text
using hashing. It is beneficial for matching words with many patterns. One of the practical …

[PDF][PDF] The phenomenon of cyber-crime and fraud victimization in online shop

M Nasution, Y Rossanty, APU Siahaan, S Aryza - Int. J. Civ. Eng. Technol, 2018 - osf.io
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts
from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …

[PDF][PDF] Internet based remote desktop using INDY and socket component

R Rahim, J Simarmata, A Purba, MA Prayogi… - Int. J. Eng …, 2018 - researchgate.net
Remote Desktop is now a very necessary thing for many companies who want to control or
know all the activities happen-ing on the client computer both office employees, as well as …

Congklak, a traditional game solution approach with breadth first search

R Rahim, N Kurniasih, A Hasibuan… - MATEC Web of …, 2018 - matec-conferences.org
Congklak is a favorite populist game played at least 2 (two) players or in this article were
human user and computer (AI). An essential point of playing congklak is to collect as many …

[PDF][PDF] Ethical decision support system based on hermeneutic view focus on social justice

A Alesyanti, R Ramlan, H Hartono… - International Journal of …, 2018 - researchgate.net
Truth and justice can not be separated from the substance and purpose of the law. Law in
the sense of right and just is a concept to be con-sidered. Only through a fair legal system …

[PDF][PDF] Fuzzy model tahani as decision support system for employee promotion

D Abdullah, H Djanggih, S Suendri, H Cipta… - International Journal of …, 2018 - academia.edu
Human resources within organization is very important to support the progress and quality of
companies in achieving goals. Increased position is a very important factor for employee …

Comparative analysis of rsa and elgamal cryptographic public-key algorithms

APU Siahaan, BO Elviwani… - Proceedings of the Joint …, 2018 - books.google.com
An asymmetric algorithm is an encryption technique that uses different keys on the process
of encryption and decryption. This algorithm uses two keys, public key, and private key. The …

[PDF][PDF] Effect of matrix size in affecting noise reduction level of filtering

APU Siahaan, S Aryza, MDTP Nasution, D Napitupulu… - 2018 - researchgate.net
Improved image quality needs to be done to improve data processing on the image. This
quality improvement can be made by doing masking technique. Median Filter is one …

[PDF][PDF] Combination vigenere cipher and one time pad for data security

R Rahim, N Kurniasih, M Mustamam, L Andriany… - Int. J. Eng …, 2018 - academia.edu
Data security can be done with many techniques such as steganography and cryptography,
the use of cryptographic algorithms such as Vigenere Cipher and One Time Pad to secure …