Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Deli Sains Informatika

PENERAPAN MAJORITY VOTE METHOD DALAM PENENTUAN PEMBOBOTAN PADA METODE WEIGHTED PRODUCT (WP) PADA PEMERINGKATAN KAMPUS DI KOTA MEDAN Adidtya Perdana; Nurul Ain Farhana
Deli Sains Informatika Vol. 2 No. 1 (2022): Artikel Riset Desember 2022
Publisher : LPPM Universitas Deli Sumatera

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

There are many campuses in the city of Medan that can be used as a place for anyone to study. But not all campuses have good quality and ranking. For this reason, it is necessary to know which campuses have the best rankings. In this article, it is a publication of ongoing research that the author has conducted on the ranking of campuses or colleges in the city of Medan by applying methods to the Decision Support System. And in this article, the author makes a slight modification using the Majority Vote method which is part of the Bagging in the Random Forest Classification at the stage of determining weighting with the main method being Weighted Product (WP). The purpose of this modification is to see the results displayed in determining whether the campus ranking gives optimal results or not. After the analysis and calculations were carried out, the result was that modifying the weighting process using the Majority Vote could provide optimal and varied results in solving the problem of ranking campuses in the city of Medan. And in the future, modifications can use other methods or equations and compare the results given.
IMPLEMENTASI RCCM (RIVEST CIPHER 4 BASED ON CHAOTIC MAPPING) PADA PESAN TEKS MENGGUNAKAN GUI PYTHON Adidtya Perdana; Nurul Ain Farhana
Deli Sains Informatika Vol. 2 No. 2 (2023): Artikel Riset Juni 2023
Publisher : LPPM Universitas Deli Sumatera

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In securing a message, especially digital messages, a technique or algorithm is needed in the field of cryptography. Where cryptography itself is a scientific field in informatics and computer science that discusses and learns about securing a secret message. One of the algorithms or in cryptography is called a Cipher, which can be used to secure secret messages, namely RCCM. RCCM or Rivest Cipher 4 base on Chaotic Mapping is a development of RC4 which combines it with the Chaotic Map technique. RC4 itself is a cryptographic algorithm that belongs to the Stream Cipher. In the process of securing messages on RC4, key generation is carried out using KSA (Key Scheduling Algorithms) and PRGA (Pseudo-Random Generation Algorithm) which are processed based on the key entered by the user to produce a keystream. The keystream itself consists of a series of random numbers, each of which will be exclusive or (XOR) to the plaintext that produces the ciphertext. By applying the Chaotic Map, inputting the key by the user is not necessary. And for implementation, you can use Python programming and are GUI-based using the help of the Tkinter library.