7 research outputs found

    Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique and Merkle Hellman Method

    Get PDF
    This research was focused on explaining how the concept of simple multi attribute rating technique method in a decision support system based on desktop programming to solve multi-criteria selection problem, especially Scholarship. The Merkle Hellman method is used for securing the results of choices made by the Smart process. The determination of PPA and BBP-PPA scholarship recipients on STMIK Triguna Dharma becomes a problem because it takes a long time in determining the decision. By adopting the SMART method, the application can make decisions quickly and precisely. The expected result of this research is the application can facilitate in overcoming the problems that occur concerning the determination of PPA and BBP-PPA scholarship recipients as well as assisting Student Affairs STMIK Triguna Dharma in making decisions quickly and accuratel

    Python Application: Visual Approach of Hopfield Discrete Method for Hiragana Images Recognition

    Get PDF
    Python is a dynamic object-oriented programming language. Python provides strong support for integration with other programming languages and other tools. Python programming is rarely used in the field of artificial intelligence, especially artificial neural networks. This research focuses on running Python programming to recognize hiragana letters. In learning the character of Hiragana, one can experience difficulties because of the many combinations of vowels that form new letters by different means of reading and meaning. Discrete Hopfield network is a fully connected, that every unit is attached to every other unit. This network has asymmetrical weights. At Hopfield Network, each unit has no relationship with itself. Therefore it is expected that a computer system that can help recognize the Hiragana Images. With this pattern recognition Application of Hiragana Images, it is expected the system can be developed further to recognize the Hiragana Images quickly and precisely

    COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY

    Get PDF
    Steganography is a method that can be used to secure information. Steganography is hiding information or messages into other media such as digital images, text, voice or video so as not to arouse suspicion of others. Steganography methods that are widely used today still have shortcomings regarding quality, capacity, and robustness. Therefore, it needs steganography methods other better, and to add to the information security, steganography can combine with cryptography. Steganography method used is the method of pixel value differencing (PVD). This approach can insert a message more to the pixels you pick a high contrast value. To increase the security level of information to be embedded into the image, use cryptography such as Caesar cipher algorithm. Caesar cipher is an algorithm that used as a standard encryption by using an alphabet. Research conducted that combine cryptography steganography in digital imagery. Then testing the steganographymethods used to determine the capacity of the image, the performance of the method pixel value differencing (PVD), the resulting image quality, and resistance to manipulation of image and Steganalysis

    A new learning model of software engineering in vocational education

    Get PDF
    This research focused on the development a new learning model in Vocational Education to answer the challenges of this Industrial Revolution 4.0 era. The problem identified was the lack of learning outcomes, especially subjects oriented to software engineering for information systems students in particular and other computer science seen in the phenomenon of the inability of students to produce intelligent systems. From a series of validity, practicality, and effectiveness test results, use content validity with Aiken'V and construct validity with CFA (Confirmatory Factor Analysis) states that the model resulting from this study is stated, valid, practical and effective. This study also produced a new learning model with five syntaxes, namely (1) Define Problem and Design a Plan Project, (2) Interaction with Support System, (3) Create a Project, (4) Keep control and Monitoring Project, (4) Yield and Assessment of Project. And based on the test of the validity of the syntax of this model stated goodness-of-fit or valid

    Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)

    Get PDF
    Cryptography is a growing science of data security. The integrity of a data is an important thing to keep the secrets contained in the data. In this research will be visualized the efficient quantities that use elliptic curves and do not use them. The Elgamal method is an asymmetric cryptographic algorithm whose complexity of processes. It is especially for digital signatures. This research will discuss about the use of ECC to optimize and streamline the Encryption and Decryption process in particular 128-bit Elgamal method. The hope is that by using elliptic curves the timing of the encryption and decryption process can run faster in the computation of Elgamal Method
    corecore