AH Lubis, A Ikhwan, PLE Kan - International Journal of Engineering …, 2018 - academia.edu
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical …
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …
Remote Desktop is now a very necessary thing for many companies who want to control or know all the activities happen-ing on the client computer both office employees, as well as …
R Rahim, N Kurniasih, A Hasibuan… - MATEC Web of …, 2018 - matec-conferences.org
Congklak is a favorite populist game played at least 2 (two) players or in this article were human user and computer (AI). An essential point of playing congklak is to collect as many …
A Alesyanti, R Ramlan, H Hartono… - International Journal of …, 2018 - researchgate.net
Truth and justice can not be separated from the substance and purpose of the law. Law in the sense of right and just is a concept to be con-sidered. Only through a fair legal system …
Human resources within organization is very important to support the progress and quality of companies in achieving goals. Increased position is a very important factor for employee …
An asymmetric algorithm is an encryption technique that uses different keys on the process of encryption and decryption. This algorithm uses two keys, public key, and private key. The …
Improved image quality needs to be done to improve data processing on the image. This quality improvement can be made by doing masking technique. Median Filter is one …
Data security can be done with many techniques such as steganography and cryptography, the use of cryptographic algorithms such as Vigenere Cipher and One Time Pad to secure …