Claim Missing Document
Check
Articles

Found 8 Documents
Search

IMPLEMENTASI HILL CIPHER PADA CITRA MENGGUNAKAN KOEFISIEN BINOMIAL SEBAGAI MATRIKS KUNCI Supiyanto, Supiyanto
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2015): Informatika Dalam Pengelolaan Sumber Daya Alam
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hill cipher merupakan sebuah teknik kriptografi klasik, yang menggunakan matriks sebagai kunci dalam proses meng-enkripsi dan men-dekrispsi pesan dengan tipe kunci yang digunakan adalah tipe kunci simetris. Hal ini menjadi keunggulan dalam algoritma hill cipher tapi kekurangannya, tidak semua matriks kunci yang digunakan untuk mengenkripsi plaintext mempunyai invers. Menggunakan matriks kunci yang tidak mempunyai invers, akan menyebabkan pesan hasil enkripsi tidak bisa didekripsi untuk menjadi pesan asli kembali. Tujuan dari penelitian ini adalah untuk mengatasi kekurangan dari algoritma Hill Cipher yakni menentukan matrik kunci yang dijamin mempunyai invers atau dapat dibalik. Dan pada penelitian ini menggunakan Koefisien-koefesien Binomial Newton sebagai entri-entri dari matriks kunci. hasil penelitian ini berupa program aplikasi yang dapat digunakan untuk mengenkripsi dan mendekripsi gambar menggunakan algoritma Hill Cipher dengan matriks kunci yang selalu mempunyai invers karena determinant dari matriks kunci ini sama dengan satu. Penyandian citra dengan Hill Cipher menunjukkan keteracakan warna yang cukup signifikan, hal ini menunjukkan bahwa proses enkripsi berhasil dengan baik.
PENGENALAN CITRA WAJAH MANUSIA DENGAN MENGGUNAKAN METODE EIGENFACE supiyanto, Supiyanto; suparwati, Titik
MATEMATIKA Vol 12, No 2 (2009): JURNAL MATEMATIKA
Publisher : MATEMATIKA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6.732 KB)

Abstract

Face applicable to identify the somebody identity for security. Intention of this research is study the face recognition by using eigenface method and make the application program which can be used to recognize the face in so many expression, position as well as face experienced of the trouble  effect  existence of noise. In Eigenface method, decoding is done by calculating eigenvector then represented in a large matrix. Eigenvector is also declared as facial characteristics, therefore why this method is called with Eigenface. Face input which at this application is in the form of face image of the size and same resolution. Output Application is in the form of class closest from face which wish recognized. This application made with the program delphi 7 which enough rely on and easy to in calculation mathematic. Result of examination of face recognition by using approach eigenface to used sampel, program can recognize the face truly with the efficacy 88,2%.  
Implementasi Augmented Reality di TK Papua Harapan Jenifer Margareth Supriyadi; . Supiyanto; Mingsep Rante Sampebua; Remuz Maurenz Bertho Kmurawak
EDUCATE Vol 7, No 2 (2022)
Publisher : Program Studi Teknologi Pendidikan FKIP Universitas Ibn Khaldun, Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32832/educate.v7i2.6719

Abstract

Augmented Reality (AR) merupakan salah satu terobosan baru dunia yang dapat diadaptasikan ke dalam berbagai bidang. Pendidikan.. Penelitian ini bertujuan untuk mengembangkan aplikasi Enchanted Forest Augmented Reality (AR) Berbasis Android, yang diterapkan di sekolah Papua Harapan Sentani, dalam aplikasi ini terdapat fitur Marker based tracking, quiz, serta beberapa aktivitas lainnya yang dapat menolong siswa untuk memahami materi pembelajaran tentang hewan. Hasil penelitian menunjukan bahwa orang tua murid serta guru setuju bahwa AR mendorong siswa belajar lebih baik dan terbantu dengan adanya aplikasi ini.
PERBAIKAN CITRA MENGGUNAKAN METODE CONTRAST STRETCHING Supiyanto Supiyanto; Titik Suparwati
Jurnal Siger Matematika Vol 2, No 1 (2021): Jurnal Siger Matematika
Publisher : FMIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.95 KB) | DOI: 10.23960/jsm.v2i1.2743

Abstract

Contrasting images that are not good because they are too bright or too dark cannot provide good information. Therefore, a method is needed to improve the image quality, so that the information in the image can be conveyed properly. Contrast stretching is one of the methods for improving image quality. With this method is expected to produce a new image that is better. The purpose of this research is to apply contrast stretching method to an application or software that can be used to improve image quality. Data used in this study in the form of grayscale image data and RGB imagery (true color), with the format . BMP or .JPG, while the application development uses the Matlab programming language.The results of the study, contrast stretching method can be used to repair image that affects bad or poor image quality such as too bright / dark image, less sharp image, blurry, and so on. Contrast stretching method can also be used to improve image enhancement by leveling the histogram that was collected in an area, so that the information contained in the image is more clearly visible compared to the original image.
Text Data Security Using Stream Cipher Algorithm S Supiyanto; Agung Dwi Saputro; Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.278

Abstract

The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
Text Data Security Using Stream Cipher Algorithm S Supiyanto; Agung Dwi Saputro; Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.278

Abstract

The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
Penerapan Version control system Berbasis Web Menggunakan Next.JS, Nest.JS, Node.JS, dan MongoDB Pada Proses Pengerjaan Skripsi Mahasiswa Axsel Riando Soplanit; S Supiyanto; Agung Dwi Saputro; Remuz MB Kmurawak; Mingsep Rante Sampebua
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 2 (2023): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i2.621

Abstract

In the education systems, particularly in college, thesis courses are one of the determinants of a student's graduation. However, while working on the thesis, many students are still unable to manage their own thesis files, many factors trigger this to happen, one of which is the number of revisions which causes a loss of enthusiasm in students. This can cause students forget where he/she store the files or accidentally delete their thesis files because they have not been done for a long time. To record the entire history of thesis files, a web-based version control system must be implemented which functions to record the entire history of student thesis files. The web was created using Typescript and Javascript programming languages with the Next.JS and Nest.JS frameworks that run on the Node.JS runtime, for the database using MongoDB. Based on the test results, it is concluded that this system runs well and this system is made very private so that one user cannot enter another user's repository. The system has been tested using black box testing.
Penerapan Version control system Berbasis Web Menggunakan Next.JS, Nest.JS, Node.JS, dan MongoDB Pada Proses Pengerjaan Skripsi Mahasiswa Axsel Riando Soplanit; S Supiyanto; Agung Dwi Saputro; Remuz MB Kmurawak; Mingsep Rante Sampebua
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 2 (2023): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i2.621

Abstract

In the education systems, particularly in college, thesis courses are one of the determinants of a student's graduation. However, while working on the thesis, many students are still unable to manage their own thesis files, many factors trigger this to happen, one of which is the number of revisions which causes a loss of enthusiasm in students. This can cause students forget where he/she store the files or accidentally delete their thesis files because they have not been done for a long time. To record the entire history of thesis files, a web-based version control system must be implemented which functions to record the entire history of student thesis files. The web was created using Typescript and Javascript programming languages with the Next.JS and Nest.JS frameworks that run on the Node.JS runtime, for the database using MongoDB. Based on the test results, it is concluded that this system runs well and this system is made very private so that one user cannot enter another user's repository. The system has been tested using black box testing.