Claim Missing Document
Check
Articles

Found 19 Documents
Search

IMPLEMENTASI ALGORITMA J-BIT ENCODING PADA KOMPRESI FILE TEKS Mizwar, Tedi; Ginting, Guidio Leonarde; Mesran, Mesran; Fau, Alwin; Aripin, Soeb; Siregar, Dodi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.503

Abstract

Data is important and has a very important role in the activities of computer use. In general, the size of data that is at this time has a very large size. So at the time of sending large data through the network would lead to waste in the use of network resources when the data is accessed by other users and make the storage media more efficient in storing the data. In this study used J-BIT compression algorithm to reduce the size of text files, thus reducing the file size on storage media.
Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan Hulu, Delisman; Nadeak, Berto; Aripin, Soeb
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2645

Abstract

Data security is very important for all users of an information system, recently cryptography has become the method used in data. Cryptography is the study of mathematical techniques in an original information or message (plaintext) into a hidden text (Chipertext) and then converted into the original message again. Cryptography has three important elements, namely key generation, encryption and description. In cryptography, the block cipher algorithm is known, which includes AES (Advanced Encyption Standard) which is part of the Modern Symmetric Key Cipher, this algorithm uses the same key during the encryption and description processes so that the data we have will be difficult to cooperate with its meaning. The algorithmic technique is used to measure data in the form of certain codes, for the purpose of so that the stored information cannot be read by anyone except authorized people. Therefore, a data security system is needed in sending radiological results to patients because radiological results are confidential to patients.Keywords: Algorithm, AES, Encryption, Description, Cryptography
Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat Muhammad Fajar Rizky; Muhammad Syahrizal; Soeb Aripin
Journal of Computer System and Informatics (JoSYC) Vol 2 No 4 (2021): Agustus 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v2i4.819

Abstract

In securing voice messages, information sent through the internet network must be authenticated for its authenticity, data content, delivery time, and so on. To prevent data manipulation by irresponsible parties, the creation of a data leak that has a negative impact. The occurrence of data leaks that most users are still not aware of. This can happen due to the lack of security of the message itself which results in problems that arise and also losses by certain authoritarian parties. The solution in securing voice messages using modern cryptographic techniques that have been combined with NRZI encoding and the Feistel network by Pisanc Cipher, is a way to maintain the authenticity and accuracy of data or authentication in voice messages. It is useful to look for the characteristics of good encryption, namely confusion and diffusion. This results in a higher level of security. By using the Pisanc Cipher method to secure voice messages, it can generate security and authenticate data to prevent data leakage. In addition, another benefit of using the Pisanc Cipher method is to maintain the authenticity of voice messages.
Analisis Modifikasi Algoritma Kriptografi Klasik Menggunakan Algoritma Blum-Micali Generator Soeb Aripin; Muhammad Syahrizal
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.432

Abstract

Classical cryptography is the science of securing secret messages (plaintext) into disguised messages (ciphertext) in which each character is changed. The process of converting plaintext into ciphertext is called encryption, while the reverse process is called decryption. However, this classical crypto algorithm can still be solved using the Kasiski method, due to the mathematically regular pattern of repeating keywords. Therefore, in order not to be easily solved, another method is needed, namely by modifying the Caesar Cipher and Vigenere Cipher cryptographic algorithms. Therefore, to strengthen the security of the classical cryptography algorithm, it is necessary to carry out a modification process using an algorithm that is able to change the complexity of the encoding by using a randomization algorithm. By including a randomization algorithm, it is considered that it can eliminate the possibility of attackers guessing the results by knowing the algorithm used. The randomization algorithm used is the Blum-Micali Generator algorithm. The purpose of using the Blum-Micali Generator algorithm is that the encryption process is randomized so that the encryption results obtained are more difficult to guess, making it difficult for cryptanalysts to read the message or information
PEMANFAATAN APLIKASI GOOGLE MEET UNTUK MEDIA PEMBELAJARAN DIMASA PANDEMI COVID-19 PADA SMP IT AL-MUNADI Soeb Aripin; Lince Tomoria Sianturi; Muhammad Syahrizal
Jurnal ABDIMAS Budi Darma Vol 2, No 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (185.421 KB) | DOI: 10.30865/pengabdian.v2i1.3315

Abstract

Di masa pandemi corona virus disease 2019 (COVID-19) menjaga jarak fisik satu sama lain (physical distancing) dan tetap berada didalam rumah (stay at home) merupakan cara untuk memutus tali rantai penyebaran COVID-19. Di seluruh dunia Puluhan Juta orang telah meninggalkan kantor menyusul instruksi pemerintah agar karyawan bekerja dari rumah. Hal ini juga berlaku didunia pendidikan dikarenakan para peserta didik menghabiskan waktu belajar mereka di sekolah-sekolah dan kampus dimana didalam ruang bersama dan interaksi tinggi dapat menyebarkan virus apapun yang mereka miliki termasuk virus COVID-19 (jika ditemukan orang positip COVID-19) kepada kolega mereka. Belajar dari rumah adalah suatu pilihan di era pandemi COVID-19.  Belajar dari rumah telah mengubah sistem belajar yaitu melakukan proses belajar mengajar melalui daring (online). Sistem daring (online) dilakukan untuk mengimplementasikan protocol pencegahan COVID-19 yang dikeluarkan oleh pemerintah. Pengunaan google meet merupakan salah satu fitur dari google yang bisa dimanfaatkan untuk belajar dari rumah saat social distancing untuk mencegah penyebaran virus COVID-19. Google meet memungkinkan pengguna untuk melakukan panggilan video dengan banyak pengguna lainnya per pertemuan. Dengan kata lain, google meet bisa menjadi media alternatif untuk proses belajar mengajar, bersosialisasi dengan rekan kantor atau bahkan melakukan rapat kerja dari dalam rumah (work from home).COVID 19, Phyical distancing, Stay at home, Daring, Online, Google meet
Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack Soeb Aripin; Muhammad Syahrizal
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i2.2039

Abstract

The issue of security and confidentiality is one important aspect of a message, data or information. In this case it is closely related to how important the message, data, or information is sent and received by parties or people concerned, whether the message, data, or information is still authenticity. At present there are many conveniences in downloading and uploading videos that make videos vulnerable to hijacking, especially if the video is an important and highly confidential video, so an application that is able to encode this important video is needed so that its security can be protected from unauthorized people, except for people who are entitled to. The security technique used by the author in this study uses cryptographic technology. To be able to do well, we need an algorithm for encryption and decryption. The algorithm used here is the Merkle Hellman Algorithm. This Algortman can be used on a video file is something that needs to be considered in maintaining the confidentiality of the data itself, especially if the video file can only be known by certain parties. There are many ways of approach taken to realize the confidentiality of the data starting from security or protection. physical to the form of a mathematical-based algorithm that makes the data illegible. So that the data in it cannot be easily known by unauthorized parties and only the intended video file recipient is able to decipher the video file 
PENERAPAN METODE RETINEX UNTUK MENINGKATKAN KECERAHAN CITRA PADA HASIL SCREENSHOT Soeb Aripin; Guidio Leonarde Ginting; Natalia Silalahi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 1 (2017): Maret 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i1.319

Abstract

Improved quality is required because often the image tested has poor quality, one of which is image enhancement using Retinex method where Retinex is a technique used to get a new image with better contrast than contrast from its original image.There are four main stages to be done To obtain a new image up to the process of displaying image statistics, ie the process of displaying the initial image in the window, improving the image contrast, displaying the image histogram and display the image statistics. Quality improvement is required because the image on the screenshot has poor quality, By improving image quality using Retinex method. This Retinex method is a method used to get a new image with better contrast than the contrast of its original image.
Perbaikan Tingkat Kekaburan Gambar Akibat Pembesaran Pada Hasil Creenshot Dengan Metode Unsharp Mask Soeb Aripin
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 3, No 2 (2019): April 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v3i2.1096

Abstract

Screenshot is a display image taken from a monitor screen such as computers, tablet PCs and smartphones. The image results from the screenshot have a low level of sharpness and smoothness. If this image is enlarged, the quality becomes low like blur. To improve the quality of the image so that it is not blurred when enlarged, then the process of sharpening and smoothing. This process will improve the quality of the image to be better. The image that is processed in this research is the image screenshot. Furthermore, the image is processed using digital image processing using Matlab software. The processing stages are crop, image enhancement and unsharp mask. The image of the image enhancement and unsharp mask results are collaborated to increase and increase the sharpness and smoothness of the image in the results of the screenshot image being tested. The results of testing on this method with better sharpness quality with a comparison of images using the mean square error of 0.0627.2404%. The image of the test results can be concluded that the value of the pixels sought has a larger image size than the original and has a resolution greater than the initial image and sharpness and smoothness so that the unsharp mask method can improve the sharpness and smoothness of the image. But the changes produced using the method have not been significant enough.
Analisis Modifikasi Algoritma Kriptografi Klasik Menggunakan Algoritma Blum-Micali Generator Soeb Aripin; Muhammad Syahrizal
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.432

Abstract

Classical cryptography is the science of securing secret messages (plaintext) into disguised messages (ciphertext) in which each character is changed. The process of converting plaintext into ciphertext is called encryption, while the reverse process is called decryption. However, this classical crypto algorithm can still be solved using the Kasiski method, due to the mathematically regular pattern of repeating keywords. Therefore, in order not to be easily solved, another method is needed, namely by modifying the Caesar Cipher and Vigenere Cipher cryptographic algorithms. Therefore, to strengthen the security of the classical cryptography algorithm, it is necessary to carry out a modification process using an algorithm that is able to change the complexity of the encoding by using a randomization algorithm. By including a randomization algorithm, it is considered that it can eliminate the possibility of attackers guessing the results by knowing the algorithm used. The randomization algorithm used is the Blum-Micali Generator algorithm. The purpose of using the Blum-Micali Generator algorithm is that the encryption process is randomized so that the encryption results obtained are more difficult to guess, making it difficult for cryptanalysts to read the message or information
Sistem Pendukung Keputusan Pemilihan Aternatif Pengelolaan Limbah kelapa Sawit Pada PT.Austindo Nusantara Jaya Agri Siais Kabupaten Tapanuli Selatan Sumatera Utara Menggunakan Metode Analityc Network Process (ANP) Rizka Pratiwi; Mesran Mesran; Soeb Aripin; Chandra Frenki Sianturi; Lince Tomoria Sianturi
Bulletin of Computer Science Research Vol. 1 No. 2 (2021): April 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Oil palm is the largest commodity in several regions in Indonesia. Especially on the islands of Kalimantan and Sumatra. This requires the construction of a palm oil mill (PKS) to produce waste and a very large volume of solid waste and liquid waste. Several alternative solutions that will be considered to deal with this problem are designing a new location, implementing a new location and repairing / structuring an existing location and treating liquid waste and solid waste into appropriate commodities. In choosing this alternative, many criteria must be considered. Therefore, in the selection of alternative palm oil mill effluent using Analysis Network Process (ANP) in decision making.