13 articles in this issue
Ronsen Purba,Frans Agus,Sari Fatmawati
An image encryption is a technique to protect the image secrecy from illegal accessing. One of the encryption algorithm that are used is Rubik's Cube where this algorithm used to permute the pixel in the color image. However, the key used in the Rubik's C... see more
Fati G.N Larosa
Today, Server Administration is very important to optimize some services given by Server to all users. DHCP (Dynamic Host Control Protocol) is one of the services provided by Server. In this paper, DHCP is configured on Mikrotik RouterOS 5.25 as a Router ... see more
Imelda Sri Duma Yanti
Hash Methods Search efficiency use of a better place. Search relative (Hash Search) is divided into two kinds, namely Hash Closed (Closed Hashing) and Hash Open (Open Hashing). On Closed Hash there is the possibility of more than one data has a value the ... see more
Yongki Iswo,Poltak Sihombing
Data security in the delivery of online file becomes very important in the world of information itself. One way that can be done for the security of the data is to perform encryption before the data is sent. Cryptographic message encoding divided into two... see more
Lalu Delsi Samsumar
The use of electronic money (e-money) in the next few years in Indonesia will grow significantly. With e-money, willfacilitate public transactions without the need to use cash. E-money is a non-cash payment instruments, these products savesome money value... see more
Mendarissan Aritonang
Windows operating system security system was needed to the things that are not expected, like perubahan configurations andsettings on the Windows operating system that can automatically change the windows registry values can be fatal in windowsoperating s... see more
Petrus Dwi Ananto,Helenia Touana
In activities based on services, the customer satisfaction becomes very important thing to be noted. It is similarlywith education. The student’s satisfaction towards academic services could be something that needs to be noted by thecollege. The measureme... see more
Rijois Iboy Saragih
Genetic algorithm is heuristic searching algorithm which based on nature selection of mechanism and nature genetic. Thebasic concept that inspires the genetic algorithm is that evolution theory. In the process of searching the best solution onclassic gene... see more
Roni Jhonson Simamora
Queue associated with all aspects of a situation where customers have to wait for a given service, such as thequeue with the arrival of customers in groups providing mass broadly in the real world, for example, the elevatorin the buildings, visitors to th... see more
Rimbun Siringoringo
Steganography is the art of hiding data on a medium other. Today, steganography is used to secure data by hiding it in othermedia so that the existence of the message is unintelligible. LSB steagnografi is the simplest method among other methods.LSB stega... see more
Benget Rumahorbo,Darwis Robinson Manalu
In general, students are more tightly when faced with personal problems, financial problems, family and moral issues. Sooften there is a failure as a result of the issue unresolved. So expect the need for an application or system for mediaconsulting exper... see more
Khairul Saleh
The issue of decision-making, is essentially a form of selection of various alternative actions that may be selected whichprocess a particular mechanism, with the hope of producing a best decision. Fuzzy logic can be used to describe a chaoticdynamic syst... see more
Data security in the delivery of online file becomes very important in the world of information itself. One way that can bedone for the security of the data is to perform encryption before the data is sent. Cryptographic message encoding dividedinto two s... see more