This Author published in this journals
All Journal SISFOTENIKA
A. Murtado, A.
STMIK Pontianak

Published : 3 Documents
Articles

Found 3 Documents
Search

APLIKASI VISUALISASI DAN PERBANDINGAN METODE – METODE PENGURUTAN DATA Murtado, A.; ., Harsamuda
SISFOTENIKA Vol 4, No 1 (2014): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v4i1.27

Abstract

Abstrak Pengurutan data adalah suatu proses yang dilakukan terhadap sekumpulan data yang sebelumnya masih acak atau tidak terurut. Tujuan dari pengurutan data adalah menyelesaikan permasalahan proses pengurutan data yang masih belum efektif dalam mencari data. Kesimpulan dari penelitian ini adalah dapat melakukan pengurutan terhadap data bilangan bulat positif dengan alat bantu algoritma dan prototype sebagai alat analisis, sehingga aplikasi dapat digunakan untuk menampilkan proses atau tahapan yang terjadi pada metode pengurutan data secara visual sehingga memudahkan proses pembelajaran metode pengurutan data. Kata kunci : Algoritma Sortir, Visualisasi, Perbandingan, Visual Basic.NET
STEGANOGRAFI PADA CITRA BMP 24-BIT MENGGUNAKAN METODE LEAST SIGNIFICANT BIT David, David; Murtado, A.; Kasma, Utin
SISFOTENIKA Vol 2, No 1 (2012): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract : Steganography is the art and science of hiding messages in a message. In the world of modern technology, the secret messages can be hidden behind the image (image), for example. Messages can be encoded in the low-order bits so as not to interfere with media images (image) is displayed. Research Application System Method of Least Significant Bit Steganography aims to provide data security facilities, particularly in terms of hiding data that is intended for corporate, business or personal. The study was based on increased traffic flow data packet delivery via email or other media that directly impact the growing threats and data theft against itself. The research was shaped by the method of experimental study of literature and data collection techniques using literature and documentation. Approach to problem solving using problem identification approach to identify exactly what problems to look for a solution. Design method used is a Rapid Application Development by applying a 5-step design, namely business modeling, data modeling, process modeling, generation and application testing and turnover. The software performs the analysis by comparing the features and the existing criteria and is built using Borland Delphi 7.0 which make the process of concealment and recall data that is hidden as a solution for end-users in terms of the need for data security warnings.Keywords : Data Security, Steganography, Encryption, Decryption, Least Significant Bit (LSB)
APLIKASI PEMILIHAN KETUA BADAN EKSEKUTIF MAHASISWA STMIK PONTIANAK BERBASIS DESKTOP Murtado, A.
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.8

Abstract

Abstract : The use of information technology in the voting process expected to help solving problems them. The use of computer technology in the implementation of voting is known as electronic voting. The purpose of this study was to help Badan Eksekutif Mahasiswa (BEM) STMIK Pontianak in implementing the Chief Electoral BEM with a computerized system. The research method used is descriptive method. Software design method used is RAD. Programming language used Visual Basic 6. The results of this study tested the Network Local Area Network (LAN), where several computers as a client computer and a computer unit as a data bank or as a server with a database that has been in sharingkan. With the BEM application program in STMIK Pontiaanak Based Desktop allows the user (users) the easier it is to perform the E-Voting election.Keyword : E-Voting, BEM STMIK Pontianak, RAD, Visual Basic 6