Pages

Saturday, February 9, 2019

MATERI UJIAN TERTULIS PKKP 2019

Selamat bagi yang lolos seleksi Administrasi PKKP 2019 Propinsi Jawa Tengah, selanjutnya mempersiapkan diri untuk daftar ulang di http://disporapar.jatengprov.go.id/pkkp/, untuk materi dapat di download di link di bawah.

Materi ujian tertulis dapat di download :
1. Peraturan Pemerintah No. 72 Th. 2005 ttg Desa
2. UU No. 23 Th. 2014 ttg Pemerintah Daerah
3. UU No. 40 Th. 2009 ttg Kepemudaan
4. UU No. 6 Th. 2014 ttg Desa
5. Materi Pemberdayaan Masyarakat Pedesaan
6. Materi Kepeloporan Pemuda dalam Masyarakat

Untuk bantuan pendaftaran dapat akses di Telegram @pkkp2019jatengBot.

#semuanyaajib

Read More...

Thursday, February 7, 2019

Proceeding ICITACEE : A Comparative Study of Image Cryptographic Method

Abstract:

Cryptography is a technique that is widely used to secure data transactions, this technique has also been widely used to secure digital images. There are several cryptographic techniques that are widely used in digital imagery, such as Arnold Transform, Rivest Code 4 (RC4) and One-time pad (OTP). This research aims to compare the performance of these three techniques on digital images. Performance of each encryption method is measured using entropy, SSIM, NPCR, UACI, computation time and histogram analysis. While the decrypted image is measured by the correlation coefficient and computation time using tic toc function. Based on the test results can be concluded that Arnold transforms algorithm only do a scramble on the image based on a certain iteration, so that the entropy and histogram values remain the same as the original image, only visually the image looks random and meaningless. RC4 has an advantage on entropy value and should not require a very long key, so it does not have to be a special memory to store the key. While OTP has advantages in the fastest computing time, and also superior values in NPCR, UACI, and SSIM. A random key of the same size as the original image makes encryption hard to decrypt. Although the size of the key to making the algorithm must provide a larger space for key storage.

Download di sini.

Read More...

Monday, January 28, 2019

PENDAFTARAN PKKP 2019, DIBUTUHKAN 200 SARJANA

Pemerintah Provinsi Jawa Tengah (Dinas Kepemudaan, Olahraga dan Pariwisata) membutuhkan 200 (Dua Ratus) orang lulusan sarjana (S-1) untuk ditugaskan di Desa sebagai peserta Program Pengembangan Kepedulian dan Kepeloporan Pemuda (PKKP) dengan masa kontrak 10 (sepuluh) bulan.

Untuk pendaftaran klik di PKKP 2019. Pendaftaran Mulai Tgl 28-30 Januari 2019.

Untuk panduan pendaftaran dan syarat silahkan klik di sini.

Untuk bantuan pendaftaran dapat akses di Telegram @pkkp2019jatengBot.

Materi ujian tertulis dapat di download :
1. Peraturan Pemerintah No. 72 Th. 2005 ttg Desa
2. UU No. 23 Th. 2014 ttg Pemerintah Daerah
3. UU No. 40 Th. 2009 ttg Kepemudaan
4. UU No. 6 Th. 2014 ttg Desa
5. Materi Pemberdayaan Masyarakat Pedesaan
6. Materi Kepeloporan Pemuda dalam Masyarakat

#semuanyaajib

Read More...

Tuesday, January 15, 2019

Penerimaan SIPSS (Sekolah Inspektur Polisi Sumber Sarjana) 2019

Penerimaan polisi jalur sarjana atau SIPSS (Sekolah Inspektur Polisi Sumber Sarjana) sudah dibuka, yang berminat dapat melihat informasi berikut :

Pendaftaran Online

  1. Pendaftar membuka website penerimaan.polri.go.id;
  2. Tekan tombol Daftar, pilih salah satu macam seleksi;
  3. Isi Form Registrasi dengan data yang sebenarnya, catat nomor registrasi & password (untuk melakukan login, perubahan data dan cetak biodata pendaftar);
  4. Tekan tombol printer untuk mencetak biodata, yang nantinya digunakan untuk melakukan verifikasi di Polres atau Polda sebagai Panbanrim;
  5. Tekan ikon Microsoft Word untuk mengunduh berkas persyaratan.

Lebih lanjut dapat dikunjungi di situs Penerimaan Polri.

sumber : http://penerimaan.polri.go.id/sosialisasi_tingkat_daerah_sipss

#semuanyaajib

Read More...

Friday, December 28, 2018

Jurnal JOINS : Sistem Push Notification Life@BankJateng Sebagai Penunjang Layanan Pegawai PT. Bank Jawa Tengah Menggunakan Socket.IO

Abstract

Sistem Push Notification Life@BankJateng merupakan sistem yang dirancang untuk melayani kepegawaian Bank Jawa Tengah. Sistem tersebut berupa aplikasi web sebagai admin dan aplikasi mobile sebagai client yang dapat memudahkan pertukaran informasi antar keduanya. Sistem Life@BankJateng dapat diakses menggunakan komputer, android dan IOS dan perangkat lain yang mendukungnya. fitur-fitur yang disediakan bertujuan untuk memudahkan pengelolaan informasi karir. Fitur yang disediakan meliputi pengaksesan informasi berita terbaru, akses profil tentang pencapain jabatan kerja, pengelolaan cuti, fasilitas kesehatan dan surat pengantar perjalanan dinas (SPPD) dan lain lain. Sebagai tambahannya sistem tersebut berjalan secara realtime dengan memanfaatkan library Socket.IO yang dapat memberikan pemberitahuan pesan khusus pada setiap pegawai yang telah terdaftar di database sistem. Sistem ini telah teruji kulitasnya dengan menggunakan pengujian black box testing dan white box testing.

Download : PDF

#semuanyaajib

Read More...

Tuesday, December 18, 2018

Proceeding ICITACEE : A Comparative Study of Image Cryptographic Method

Abstract:

Cryptography is a technique that is widely used to secure data transactions, this technique has also been widely used to secure digital images. There are several cryptographic techniques that are widely used in digital imagery, such as Arnold Transform, Rivest Code 4 (RC4) and One-time pad (OTP). This research aims to compare the performance of these three techniques on digital images. Performance of each encryption method is measured using entropy, SSIM, NPCR, UACI, computation time and histogram analysis. While the decrypted image is measured by the correlation coefficient and computation time using tic toc function. Based on the test results can be concluded that Arnold transforms algorithm only do a scramble on the image based on a certain iteration, so that the entropy and histogram values remain the same as the original image, only visually the image looks random and meaningless. RC4 has an advantage on entropy value and should not require a very long key, so it does not have to be a special memory to store the key. While OTP has advantages in the fastest computing time, and also superior values in NPCR, UACI, and SSIM. A random key of the same size as the original image makes encryption hard to decrypt. Although the size of the key to making the algorithm must provide a larger space for key storage.

Download : IEEEXplore

#semuanyaajib

Read More...

Monday, December 10, 2018

Conference iSemantic 2018 : A Robust Non-Blind Image Watermarking Method Using 2-Level HWT-DCT

Abstract:

The current technology allows to distribute digital images quickly and easily over the internet. Some digital images have copyright that needs to be protected. Watermarking is a technique for protecting copyright. In order for copyright is not easily lost with image manipulation, then watermarking technique must be robust. This study proposes a combination of Discrete Cosine Transform (DCT) based on two levels of the Haar Wavelet Transform (HWT) on image watermarking method with the aim of improving aspects of robustness and imperceptibility. The first step, host image is transformed with DWT as much as two levels to get LL2 subband. LL2 subband is a subband containing the image core information of two levels of wavelet transformation. Furthermore, LL2 subband split into small sub-blocks with the size of 4 * 4. The sub-blocks are transformed again using DCT. Insertion of watermarks using alpha variables with a certain value on the DC coefficient matrix. This value is used for managing the quality and strength of the watermark. To test the imperceptibility and watermark resistance used measuring instruments MSE, PSNR, and correlation coefficient. Based on the simulation results obtained a watermarked image is quite satisfactory with a relatively good imperceptibility value and resistant to various attacks.

Download : IEEE, researchgate

#semuanyaajib

Read More...

Friday, November 16, 2018

JURNAL : Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit)

Abstract

The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR[1]. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.

Keywords

Cryptography, Vigenere Cipher, Steganography, LSB, WAV

Download jurnal di sini.

#semuanyaajib

Read More...

Friday, October 19, 2018

TIPS & TUTORIAL : INSTALL VB.6 DI WINDOWS 10

Error yang sering muncul ketika install VB.6 adalah Not Responding........

Berikut ini tips untuk menginstall di Windows 10 :

1. Siapkan Visual Basic 6.0 Enterprise Edition
2. Buka folder VB.6 EE, cari file SETUP.EXE, klik kanan properties, klik tab compatibility, centrang run this program in..... (Win XP SP2), klik OK.

3. Di File SETUP.EXE klik kanan Run Administrator

4. Pilih Custom

5. Pilih Data Access Component

6. Uncheck ADO & RDS

7. Klik OK, tunggu proses install sampai proses selesai.

8. Restart dan Jalankan VB.6

9. Untuk project lama yang menggunakan OCX tambahan silahkan di register dengan regsvr32 di command line, Win32 di c:\windows\system32 dan Win64 di c:\winsdows\SysWow64

Semoga tips & tutorial ini bisa membantu, terima kasih. #semuanyaajib

Untuk install Vb6 di Win8 silahkan baca di sini.

Referensi di sini.

Read More...

Monday, September 10, 2018

PENDAFTARAN EMAIL SEMESTER GANJIL 2018-2019

Formulir pendaftaran email, mohon mengisi formulir secara lengkap, email harus valid. Silahkan meng-upload hasil dokumentasi dengan membuat satu folder sendiri lengkap nim dan nama di DRIVE untuk memudahkan pemantauan perkembangan dokumentasi yang telah dibuat. Batas akhir tugas untuk pertemuan 1-7 sebelum ujian tengah semester, untuk dokumentasi komplet 1-14 saat presentasi tugas akhir.


Read More...

Popular Posts

 

Translate

My Calendar