Journal title
ISSN:    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 2 Number 1 Year 2016

13 articles in this issue 

Ronsen Purba,Frans Agus,Sari Fatmawati

An image encryption is a technique to protect the image secrecy from illegal accessing. One of the encryption algorithm that are used is Rubik's Cube where this algorithm used to permute the pixel in the color image. However, the key used in the Rubik's C... see more

 

Fati G.N Larosa

Today, Server Administration is very important to optimize some services given by Server to all users. DHCP (Dynamic Host Control Protocol) is one of the services provided by Server. In this paper, DHCP is configured on Mikrotik RouterOS 5.25 as a Router ... see more

 

Imelda Sri Duma Yanti

Hash Methods Search efficiency use of a better place. Search relative (Hash Search) is divided into two kinds, namely Hash Closed (Closed Hashing) and Hash Open (Open Hashing). On Closed Hash there is the possibility of more than one data has a value the ... see more

 

Yongki Iswo,Poltak Sihombing

Data security in the delivery of online file becomes very important in the world of information itself. One way that can be done for the security of the data is to perform encryption before the data is sent. Cryptographic message encoding divided into two... see more

 

Lalu Delsi Samsumar

The use of electronic money (e-money) in the next few years in Indonesia will grow significantly. With e-money, willfacilitate public transactions without the need to use cash. E-money is a non-cash payment instruments, these products savesome money value... see more

 

Mendarissan Aritonang

Windows operating system security system was needed to the things that are not expected, like perubahan configurations andsettings on the Windows operating system that can automatically change the windows registry values can be fatal in windowsoperating s... see more

 

Petrus Dwi Ananto,Helenia Touana

In activities based on services, the customer satisfaction becomes very important thing to be noted. It is similarlywith education. The student’s satisfaction towards academic services could be something that needs to be noted by thecollege. The measureme... see more

 

Rijois Iboy Saragih

Genetic algorithm is heuristic searching algorithm which based on nature selection of mechanism and nature genetic. Thebasic concept that inspires the genetic algorithm is that evolution theory. In the process of searching the best solution onclassic gene... see more

 

Roni Jhonson Simamora

Queue associated with all aspects of a situation where customers have to wait for a given service, such as thequeue with the arrival of customers in groups providing mass broadly in the real world, for example, the elevatorin the buildings, visitors to th... see more

 

Rimbun Siringoringo

Steganography is the art of hiding data on a medium other. Today, steganography is used to secure data by hiding it in othermedia so that the existence of the message is unintelligible. LSB steagnografi is the simplest method among other methods.LSB stega... see more

 

Benget Rumahorbo,Darwis Robinson Manalu

In general, students are more tightly when faced with personal problems, financial problems, family and moral issues. Sooften there is a failure as a result of the issue unresolved. So expect the need for an application or system for mediaconsulting exper... see more

 

Khairul Saleh

The issue of decision-making, is essentially a form of selection of various alternative actions that may be selected whichprocess a particular mechanism, with the hope of producing a best decision. Fuzzy logic can be used to describe a chaoticdynamic syst... see more

 

Yongki Iswo,Poltak Sihombing

Data security in the delivery of online file becomes very important in the world of information itself. One way that can bedone for the security of the data is to perform encryption before the data is sent. Cryptographic message encoding dividedinto two s... see more