Claim Missing Document

Found 4 Documents

Penerapan Algoritma Ternary Comma Code Pada Aplikasi Kompresi File Gambar Nurma Ningsih; Surya Darma Nasution; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar


Since the discovery of a tool to capture an image (image) in the form of a camera making technological developments not only focus on the tools but also must focus on where the data is stored. The need for storage media is something that is needed in every communication tool. Data and information communication systems are not only in the form of text but can also be in the form of images, videos and audio. Image file size that is relatively larger compared to text files is one of the causes of the amount of memory used for storing image files. The size of the image file can also cause the length of time to send the image file. Image file compression process is one way that can be done to overcome the problem of image file size. Image compression is an attempt to minimize the file size or bytes of a graphic file without reducing the quality of existing images. A certain amount of storage, such as disk space or memory, makes it possible to reduce the image file size. Many algorithms that can be used to compress image file sizes include the ternary comma code algorithm that can help reduce image file sizes. The ternary comma code algorithm has a faster time space compared to other algorithms.
Implementasi Algoritma Mars Pada Penyandian Record Database Alimah Alimah; Nelly Astuti Hasibuan; Taronisokhi Zebua
Bulletin of Information Technology (BIT) Vol 1 No 1: Maret 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (802.855 KB)


Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the image. This research uses the Mars Algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This research describes the process of securing a database record by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records
Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text Fitarius Humendru; Taronisokhi Zebua
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.421 KB) | DOI: 10.30865/ijics.v2i1.997


Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal
Sistem Pakar Diagnosa Penyakit Pada Sistem Pencernaan Kelinci Menggunakan Metode Fuzzy Expert System Tiffani Astrid; Taronisokhi Zebua; Anggiat M Hatuaon Sihite
Journal of Information System Research (JOSH) Vol 1 No 3 (2020): April 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (373.667 KB)


Diseases of the digestive system are a type of disease that often attacks rabbits. This disease is also one of the causes of death in rabbits. This is based on interviews with veterinarians who say that, if diseases of the digestive system are not given the treatment quickly and precisely it will cause death in rabbits. Most veterinarians only open practices in big cities, so it is not uncommon for rabbit breeders who are late in giving treatment to diseases of the digestive system suffered by their pet rabbits. Based on the above problems, it is necessary to create an expert system that can help rabbit keepers and veterinarians in diagnosing diseases in the digestive system of rabbits, because so far there has not been any application to deal with this. The Fuzzy Expert System method will calculate every symptom experienced by rabbits by using the inference method from mamdani. In the Mamdani method, both input and output variables are divided into one or more fuzzy sets. The end result will be done by the process of processing a fuzzy set obtained from the composition of fuzzy rules to produce output in the form of a number in the fuzzy set domain, while this process is called affirmation (defuzzification). From the results of testing the system using the visual basic 2008 program is good to use, but still needs a lot of development in applying it to the expert system