[PDF][PDF] Simple additive weighting as decision support system for determining employees salary

N Setiawan, M Nasution, Y Rossanty… - Int. J. Eng …, 2018 - researchgate.net
Employees are seen as one of the important company assets and need to be managed and
developed to support the survival and achievement of corporate goals. One form of …

A novelty of data mining for promoting education based on FP-growth algorithm

APU Siahaan, A Ikhwan, S Aryza - 2018 - osf.io
The development of education at this time the increasing number of campuses are growing.
Therefore every university wants to gain a lot of students in promoting the university. Many …

[PDF][PDF] Combination of levenshtein distance and rabin-karp to improve the accuracy of document equivalence level

AH Lubis, A Ikhwan, PLE Kan - International Journal of Engineering …, 2018 - academia.edu
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text
using hashing. It is beneficial for matching words with many patterns. One of the practical …

[PDF][PDF] Man-in-the-middle-attack prevention using interlock protocol method

R Rahim - ARPN J. Eng. Appl. Sci, 2017 - researchgate.net
In the process of data communications, although data has been encrypted, there is the
possibility of such data can be known by others. One possibility is that the person intercepts …

Keylogger application to monitoring users activity with exact string matching algorithm

R Rahim, H Nurdiyanto, A Saleh A… - Journal of Physics …, 2018 - iopscience.iop.org
The development of technology is very fast, especially in the field of Internet technology that
at any time experiencing significant changes, The development also supported by the ability …

Combination Base64 Algorithm and EOF Technique for Steganography

R Rahim, H Nurdiyanto, R Hidayat… - Journal of Physics …, 2018 - iopscience.iop.org
The steganography process combines mathematics and computer science. Steganography
consists of a set of methods and techniques to embed the data into another media so that …

[DOC][DOC] Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression

R Rahim - 2017 - osf.io
Delivery of secure information and small size becomes a necessity in a communication
within the network, to accommodate it needs to be cryptographic process which in this …

[PDF][PDF] The phenomenon of cyber-crime and fraud victimization in online shop

M Nasution, Y Rossanty, APU Siahaan, S Aryza - Int. J. Civ. Eng. Technol, 2018 - osf.io
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts
from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …

Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm

Z Qowi, N Hudallah - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
There is a risk in the process of exchanging information, especially text information. To
reduce that risk, one of cryptographic method can be applied. That is Vigenere Cipher …

Super-encryption cryptography with IDEA and WAKE algorithm

D Abdullah, R Rahim, AP Utama Siahaan… - Journal of Physics …, 2018 - iopscience.iop.org
The security and confidentiality of information becomes an important factor in
communication, the use of cryptography can be a powerful way of securing the information …