1–20 of
80 results.
-
Saut Mahulae
•
Tonni Limbong
Teacher certification is a government effort in improving teacher quality by increasing teacher welfare, so that it will improve the quality of learning and the quality of education in a sustainable m...
-
Muhammad Ramadani
The development of steganography began to penetrate into the digital world which in this study was devoted to mp3 audio files. The techniques for developing a steganography process are briefly discuss...
-
Magdalena Simanjuntak
•
Tioria Pasaribu
•
Semiati Rahmadilla
The development of information technology today has a huge impact, namely the issue of security and confidentiality of data. One solution that can be used to guarantee the confidentiality and security...
-
Hermansyah Sembiring
•
Fuzy Yustika Manik
•
Tengku Zaidah
Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet. Through an internet co...
-
Marto Sihombing
•
Juliana Naftali Sitompul
•
Tia Anggia Putri
This study is to solve the problem Cryptographic techniques used to protect and maintain the confidentiality of audio messages by changing audio messages into audio messages that cannot be played by d...
-
Muhammad Anas Fauzi
Security is a very important aspect of information systems. Some information is generally only intended for a certain group of people, therefore security is needed to prevent the information from reac...
-
Harvei Desmon Hutahaean
•
Paska Marto Hasugian
The source of science is still dominated by books, although with the internet students get information with diverse scientific fields, but actually the information comes from material in the book. To ...
-
Bosker Sinaga
•
Penda Sudarto Hasugian
Analytic Network Process (ANP) algorithm is used to find optimal alternatives from a set of alternatives with certain criteria. Selection or process is carried out by evaluating promotional media by d...
-
R. Mahdalena Simanjorang
The decision support system for the best lecturer selection has been made in this study so that it can be recommended to the foundation so that it is efficient compared to the use of the old system. I...
-
Insan Taufik
Notes are minutes of the results of a writing by the process of recording or writing ideas, lists, minutes or notations of a learning activity, research, meeting or other activities that are too many ...
-
Lamrianto Purba
•
Guidio Leonarde Ginting
Cryptography is the science and art of keeping messages safe. In cryptography there are two main concepts, namely encryption and decryption. The encoding is first created using the clasic algorithm. t...
-
Kristian Siregar
•
Edward Robinson Siagian
Shellfish is a type of seafood consumed by consumers. In selecting the right type of shellfish, it must be adjusted to the wishes of consumers. To get optimal results a system is needed that can help ...
-
Abed Nego Ompusunggu
•
Lamhot Sitorus
Practicum is one of the academic activities carried out by students in the laboratory. This activity was carried out to develop student motor competencies in several courses that have practicum. So th...
-
Matias Julius Fika Sirait
•
Sony Bahagia Sinaga
The communication path that will physically connect the two technologies conceptually works together such as cables. A special feature of a channel that resembles a cable is where the bits will be for...
-
Helmi Sahara
Along with the increasingly rapid development of technology at this time, causing security is a very important thing. In this era, there are many terms of chatting. Chatting is a form of communication...
-
Fricles Ariwisanto Sianturi
Graduation rate is one of the main problems in a college foundation. The higher graduation of students in an educational institution will further increase the popularity of the foundation. Likewise, i...
-
Habibi Z.
Tapping secret message information often occurs in communication media. Safeguarding information or data distributed is very important to maintain confidentiality, integrity and authenticity. In stega...
-
Hery Sunandar
•
Kristian Siregar
Contraception is an action to prevent pregnancy. Where currently there are enough tools, methods and types of contraceptives for men or women, implementation can be done in two ways, namely using cont...
-
Oktariani Laoly
•
Tonni Limbong
Standard Operational Procedure (SOP) is a collection of instructions that function as a guide in the process of administering government, especially the Faculty section that is in a university. Throug...
-
Francius Manurung
Encoding of text messages is very necessary to encode a message so that it is not stolen by irresponsible parties. Cryptography is one technique that can be used to carry out security messages, namely...