Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : ILKOM Jurnal Ilmiah

The weighted product method and portfolio assessment in ranking student achievement Andi Tenri Sumpala; Muhammad Nurtanzis Sutoyo; Huzain Azis; Fadhila Tangguh Admojo
ILKOM Jurnal Ilmiah Vol 13, No 2 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i2.827.148-154

Abstract

The learning process has a correlation with learning achievement which can be shown through the marks given by a teacher to students from several fields of study. The ranking of student learning achievements performed by the school refers to the grades of the subject is important for the SNMPTN (National Selection for State Higher Education). To determine student achievements, the method used in the current study is the weighted product. If the results of student ranking using the WP method have the same value, then a portfolio assessment is used. Of the 127 student achievement ratings, there were seven people who had the same Vector value. Then, the seven people who have the same vector value were graded using portfolio assessment. The results showed that the implementation of the WP method and portfolio assessment could determine the ranking of student achievement.
Steganographic techniques using modified least significant bit and modification reshape transposition methods Guntoro Barovih; Fadhila Tangguh Admojo; Yoda Hersaputra
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i1.848.67-77

Abstract

A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done at 90, 180, 270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside