Claim Missing Document

Found 4 Documents

Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB) Yulia Fatma; Afdhil Hafid; Heru Oktavian Dani
JUSIFO : Jurnal Sistem Informasi Vol 6 No 2 (2020): JUSIFO (Jurnal Sistem Informasi) | December 2020
Publisher : Program Studi Sistem Informasi, Fakultas Sains dan Teknologi, Universitas Islam Negeri Raden Fatah Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19109/jusifo.v6i2.6746


Confidentiality in transfer the messages is an important thing to maintain. Increased security in transfer the messages can be improved using cryptography and steganography. This article aims to apply a combination of AES 128 cryptography and LSB steganography in an application, and measures the quality of the stego-image. In this article, the AES 128 algorithm is used for the encryption process of secret messages and the LSB algorithm for the process of inserting secret messages in the cover image. PSNR is used to measure the quality of the stego-image, by comparing the cover image and the stego-image. This research produces an application that can be used for the security of sending text messages by combining the AES 128 algorithm in the plaintext encryption and the LSB algorithm in the secret message insertion process. In term of measuring the quality of the stego-image, it was found that the character length of the secret message would have an impact on the MSE and PSNR values. This means, the longer the character of the secret message will affect the quality of the stego-image.
Short Text Messages Gateway-Based Expert System for Diagnosis of Skin Disease Afdhil Hafid; Hasanuddin Hasanuddin; Muhammad Ismail
Insearch : Information System Research Journal Vol 1, No 01 (2021): Insearch (Information System Research) Journal
Publisher : Fakultas Sains dan Teknologi UIN Imam Bonjol Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (313.084 KB) | DOI: 10.15548/isrj.v1i01.2062


Skin disease is the most common infectious disease in people of all ages. In Indonesia, skin diseases are mostly caused by bacterial, fungal, parasitic, and allergic basic diseases. This is different from western countries which are more influenced by degenerative factors. Apart from differences in causes, other factors such as climate, habits and environment also contribute to differences in the clinical picture of skin diseases. Health service policy is one of the main components. Improving good services should not stop with the development of good infrastructure, or only to the examination or diagnosis of doctors for patients, but good health care also lies in how to do it so that people can get health services easily. Cases of ineffective health services often occur in the community, ranging from slow hospital services, practice malls, to a common problem, namely the queuing process that must be carried out by prospective patients who are going to a general practitioner or specialist. In improving the service, you want to develop a problem using the system. the system to be developed is a system that will adopt expert knowledge into a server or also known as an expert system. The expert system to be built will be based on Short text messages or SMS (Short Message Service). This system provides SMS sending services from a website or server to a cellphone number, either free or for a fee. Technology like this is called the SMS Gateway.
Jurnal Teknologi Terapan Vol 9, No 1 (2023): Jurnal Teknologi Terapan
Publisher : P3M Politeknik Negeri Indramayu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31884/jtt.v9i1.467


This research is intended to build a network that that can connect branch offices with main office buildings in a company. This is done in order to create all performance connected to a company network that can improve and run well, so as to be able to support the company's business processes. At the stage of meeting company needs and in an effort to overcome problems in the network used technology that can always be online with the expectation of quality of services (QoS) approaching 100%.. The technology applied uses two communication lines, the first connection line is point-to-point wireless and the second connection line applies a Virtual Private Network (VPN) with the use of the internet. Handles failover on both network communication connections used by the mikrotik router. This allows if one connection is lost, the other connection line will automatically become a backup line. In this failed network simulation, it shows satisfactory results, as can be seen from the communication performance that runs without feeling tired of traffic. The application of this method can also operate without involving humans. In addition, the results of the measurement of the time lag required for switching connection lines have an average delay value of not more than 4.97 seconds.
Al-Ma'arif: Ilmu Perpustakaan dan Informasi Islam Vol. 2 No. 02 (2022): Jurnal Ma'arif
Publisher : Prodi S1 Ilmu Perpustakaan dan Informasi Islam. Fakultas Adab dan Humaniora UIN Imam Bonjol Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar


This study looks at the issue of e-inclusion in the field of school education. It aims to explain the potential that Information and Communication Technology (ICT) offers to avoid any form of discrimination among students. The basic idea underlying this paper is that the process of school inclusion can be fostered through new technological tools only if, in parallel, educational approaches, methods and strategies are easily revised and improved. Taking the point of view of both educational tools and methods, this paper discusses the key issues of the “accessibility” of educational tools and the “new competencies” required by teachers. To build truly inclusive classrooms on the one hand, key educational tools (including ICT-based ones) need to be barrier-free and fully accessible to all students, and, on the other hand, for teachers to have them. competence to carefully select e-tools and plan/utilize them properly.