Rojali, Rojali
Bina Nusantara University

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Program Aplikasi Steganografi Menggunakan Metode Spread Spectrum pada Perangkat Mobile Berbasis Android Rojali, Rojali; Salman, Afan Galih; Nugraha, Teddy
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 2 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i2.2305

Abstract

The exchange of traffic information in cyberspace grows fast. In all areas of life utilize technology to exchange information. One of the media owned by many people is mobile device such as mobile phone and tablet computer. In fact many people have been using mobile devices for information exchange function, and expect information to be transmitted quickly, accurately, and safely. The information security sent will be very important when the information is confidential. One way to secure information sent is the concealment of information into a media so that information hidden is beyond recognition by the human senses, which is commonly referred to steganography. This research studied and implemented steganography using spread spectrum Method on Android-based mobile devices. The results showed that the inserted image before and after the message was inserted is not different with PSNR value of about 75.
Program Aplikasi Steganografi Menggunakan Metode Spread Spectrum pada Perangkat Mobile Berbasis Android Rojali Rojali; Afan Galih Salman; Teddy Nugraha
ComTech: Computer, Mathematics and Engineering Applications Vol. 3 No. 2 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i2.2305

Abstract

The exchange of traffic information in cyberspace grows fast. In all areas of life utilize technology to exchange information. One of the media owned by many people is mobile device such as mobile phone and tablet computer. In fact many people have been using mobile devices for information exchange function, and expect information to be transmitted quickly, accurately, and safely. The information security sent will be very important when the information is confidential. One way to secure information sent is the concealment of information into a media so that information hidden is beyond recognition by the human senses, which is commonly referred to steganography. This research studied and implemented steganography using spread spectrum Method on Android-based mobile devices. The results showed that the inserted image before and after the message was inserted is not different with PSNR value of about 75.
Perancangan Program Aplikasi Penentuan Portofolio Investasi dengan Metode Dempster Shafer Fuzzy-Analytical Hierarchy Process Rojali Rojali; Syaeful Karim; Edgar Gerriano
ComTech: Computer, Mathematics and Engineering Applications Vol. 2 No. 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2726

Abstract

Investment is very popular nowadays to gain profits of the available property. Many investment portfolios are available but there are still a handful of users who have not been able to determine the best type of investment. Surely it would be very unfortunate if the property can not be well invested. Therefore, it is necessary to propose another alternative method that can determine the existing investment portfolio. This method begins by a process which details existing factors in every investment portfolio. Then, it takes intuition properly to give weight to the initial calculation. After that, it takes a Fuzzy concept as a tool to provide a numerical weight to each of the parameters. The final step is weighting process using Dempster Shafer method. With the use of three basic concepts, investors are expected to obtain objective and optimal computing results related to the profitable investment portfolio selection.