Utilization of Business Intelligence in Sales Information Systems

AA Nurdin, GN Salmi, K Sentosa… - Journal of …, 2023 - shmpublisher.com
Business intelligence is one of the concepts that can facilitate the process of processing data
of a company which will later become the basis for the decision-making process of the sales …

Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2

GN Salmi, F Siagian - Journal of Soft Computing Exploration, 2022 - shmpublisher.com
Abstract Information has become precious and essential for all fields, so it is crucial to carry
out information security. The principle of information security is to protect and safeguard …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …

HexE-Securing Audio Contents in Voice Chat using Puzzle and Timestamp

A Aa - arXiv preprint arXiv:2401.00765, 2024 - arxiv.org
Cryptography is the study of securing information. It is the physical process that scrambles
the information by rearrangement and substitution of content, so that it becomes difficult for …

Sistem informasi penjualan tas berbasis web pada toko tas ud. a&n collection tanggulangin dengan metode waterfall

NI Pamungkas, IRI Astutik… - JIPI (Jurnal …, 2023 - jurnal.stkippgritulungagung.ac.id
Perkembangan teknologi yang semakin tinggi menyebabkan kebutuhan akan informasi
yang cepat tepat dan akurat dalam dunia usaha menjadi sangat dibutuhkan, kebutuhan …

Business process modeling at steak restaurant using business process model and notation

AA Nurdin, AN Pristanti… - Journal of Soft Computing …, 2022 - shmpublisher.com
The complexity of business processes occurring today makes the company try to find ways
to describe its business processes. Business processes are not only an operational …

Penerapan Metode K-Means Clustering Untuk Menentukan Status Negara

AA Nurdin, S Jamilah, RI Mustaib - 2022 - unisbank.ac.id
Status dari sebuah negara merupakan hal yang penting untuk diketahui. Hal tersebut
dikarenakan status negara dapat menunjang kesuksesan suatu investasi, bisnis, dan juga …

IMPLEMENTATION OF THE SYMMETRIC CRYPTOGRAPHIC ALGORITHMS RC2 AND TRIPLE DES IN ECB MODE USING CRYPTOGRAPHIC SOFTWARE …

P Boyanov - Journal scientific and applied research, 2024 - jsar.ftn.shu.bg
This paper presents an in-depth analysis of symmetric key cryptographic algorithms,
focusing on RC2 and Triple DES (ECB) as implemented in CrypTool. It is widely used …

[PDF][PDF] PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF …

P Boyanov - Journal scientific and applied research, 2024 - jsar.ftn.shu.bg
In this scientific paper hash functions such as MD5, SHA-1, and SHA-256 are widely utilized
in the field of cryptography to verify file integrity, confirming that files remain unaltered and …

[PDF][PDF] Web Based Bag Sales Information System AT. UD A&N Collection Of Tanggulangin Using The Waterfall Method [Sistem Informasi Penjualan Tas Berbasis Web …

NI Pamungkas, IRI Astutik - core.ac.uk
Perkembangan teknologi yang semakin tinggi menyebabkan kebutuhan akan informasi
yang cepat tepat dan akurat dalam dunia usaha menjadi sangat dibutuhkan, kebutuhan …