Andysah Putera Utama Siahaan | Universitas Pembangunan Pancabudi Medan (original) (raw)
Uploads
Papers by Andysah Putera Utama Siahaan
International Journal of Research and Review
The text format is a character format that can be read directly with any software. This format is... more The text format is a character format that can be read directly with any software. This format is used in sending data to facilitate sending and speed up sending data to message recipients. The text format is the message storage format with he least security because it can be directly read by the person who gets the message. The author wants to build a cryptographic application that can secure text formats using the character transposition technique. Character transposition is used based on the formation of a square matrix which is used as a key in the encryption and decryption process. The size of the matrix used is 4 x 4. The results of the study found that the text format was successfully transformed into ciphertext so as to avoid the possibility of data theft. Keywords: square, security, block, encryption
Journal of the Science of Food and Agriculture, 2020
BackgroundExternal preference mapping is a powerful tool to explain consumer preference or reject... more BackgroundExternal preference mapping is a powerful tool to explain consumer preference or rejection. Combining the technique for order of preference by similarity to ideal solution (TOPSIS) multicriteria analysis with rapid descriptive techniques can improve preference map (PREFMAP) results. This study was conducted to compare the PREFMAPs generated with rapid descriptive flash profile (FP), check‐all‐that‐apply (CATA), and Napping® versus PREFMAPs constructed with FP‐TOPSIS, CATA‐TOPSIS, and Napping‐TOPSIS.ResultsOnly 38.46%, 63.66%, and 42% of sensory attributes initially generated by FP, CATA, and Napping techniques respectively were considered for the determination of their weight W and allocation as positive or negative in the TOPSIS technique. The PREFMAPs constructed with FP‐TOPSIS, CATA‐TOPSIS, and Napping‐TOPSIS presented a better explanation of the preference and rejection than the PREFMAPs directly generated with rapid sensory techniques. The results of the multiple fact...
Performance is a process of assessment of the algorithm. Speed and security is the performance to... more Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations...
Most universities are already implementing wired and wireless network that is used to access inte... more Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present, it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It ...
Processing of the data generated from transactions that occur every day which resulted in nearly ... more Processing of the data generated from transactions that occur every day which resulted in nearly thousands of data per day requires software capable of enabling users to conduct a search of the necessary data. Data mining becomes a solution for the problem. To that end, many large industries began creating software that can perform data processing. Due to the high cost to obtain data mining software that comes from the big industry, then eventually some communities such as universities eventually provide convenience for users who want just to learn or to deepen the data mining to create software based on open source. Meanwhile, many commercial vendors market their products respectively. WEKA and Salford System are both of data mining software. They have the advantages and the disadvantages. This study is to compare them by using several attributes. The users can select which software is more suitable for their daily activities.
Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted ... more Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.
Rail Fence Cipher is a further development method of Caesar Cipher. In Caesar algorithm, the resu... more Rail Fence Cipher is a further development method of Caesar Cipher. In Caesar algorithm, the results derived from the ciphertext letters shifting each character in the plaintext. While in the Rail Fence, it is taken from the ciphertext block formation matrix diagonally. The level of security in this method has advantages than in the previous method. In this study, the research tries to encrypt and decrypt the message using the Rail Fence algorithm. The ciphertext is obtained by taking a certain set of characters in the line that has been determined earlier.
Determination of the adviser is one of the academic obligations. Undesirable things always happen... more Determination of the adviser is one of the academic obligations. Undesirable things always happen in getting optimal decisions in which faculty is assigned not the most appropriate to the topic of the thesis. This matter can affect the result and the quality of the thesis. The research process uses the input variable of lecturers criteria. The data will be treated by using the method of fuzzy logic to obtain the output consists of advisers. In this case, the students do not have to worry about the competence of the lectures since the lecturers who have been given to them are fully filtered.
The visual integrity needs to be implemented in sending a picture. There is various image receive... more The visual integrity needs to be implemented in sending a picture. There is various image received have no originality. The small change of the pixels does not make the picture content detected by the eye. The integrity validation is very important to be applied. The picture captured by a camera has two dimensions. It is described in pixels such as Width and Length. This study is to validate all the pixels data or the color intensity of both dimensions. If there are a modification in the pixel, this method will give the wrong hash data. The validator will analyze the pixels in every layer such as red, green and blue to ensure the data transmitted is correct. Once there is a slight change in the pixels, the calculation gives the wrong value. It is very useful to compare the image before and after transmission.
The content of the SMS is very crucial. It consists of an imperative information. Unknown partici... more The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique character before it is completely sent. The cryptography technique is needed. The plaintext has to be encrypted before transmitted. The one-time pad method can be applied to the plaintext. The one-time pad is one of the easiest cryptography methods. It turns the plaintext into the ciphertext by doing XOR operation to every character. It generates the new ASCII as the cipher character.
In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The en... more In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The encryptor usually makes the core. Sometimes the encryptor does not feel that the key made is breakable. The Blum Blum Shub method can generate random key more secure. It means that the key generated can help the data from being solved by a hijacker. Blum Blum Shub uses two prime numbers to generate a key. When attached in RC4, a user does not need to create its key; and fully produced by the Blum Blum Shub module. The ciphertext will be more secure and robust after being combined with Blum Blum Shub.
This study aims to maintain the authenticity of the data to assure the recipient that the data is... more This study aims to maintain the authenticity of the data to assure the recipient that the data is free from modifications made by other parties, and if there is a modification to the data, then the recipient will know that the data is no longer maintained authenticity. The digital signature technique is used by using a combination of the MD5 algorithm as a hash function algorithm to generate the message digest, and ElGamal algorithm as a public key algorithm, with the combination of the two algorithms, will be generated the digital signature of each data that will be preserved. The ElGamal algorithm is used to encrypt message digest from the process of the MD5 algorithm to files where the digital signature is the result of encryption of message digest. The private key is used for the encryption process, while the public key is used to process the digital signature description when the file testing process is received. The results of the combination of the two algorithms are implemen...
International Journal of Recent Trends in Engineering and Research, 2017
International Journal of Recent Trends in Engineering and Research, 2017
IOSR Journal of Electronics and Communication Engineering, 2016
International Journal of Engineering Trends and Technology, 2016
Pesan teks merupakan cara berkomunikasi yang dikirim dalam bentuk tulisan, pesan teks saat ini sa... more Pesan teks merupakan cara berkomunikasi yang dikirim dalam bentuk tulisan, pesan teks saat ini sangat banyak digunakan dalam media electronik, yang sangat populer yaitu pesan SMS (short message service) yang dikirimkan dengan memanfaatkan jasa operator selular, namun pesan tersebut, terancam tidak aman karna bisa terjadi pencurian data pesan. Untuk itu perlu terdapat pengamanan pada pesan teks yang dikirimkan dengan menggunakan teknik enkripsi dan dekripsi. Banyak algoritma kriptografi yang digunakan untuk pengamanan, diantaranya algoritma super playfair cipher dan two square cipher merupakan perkembangan dari metode playfair cipher. Metode ini cukup rumit cara pemecahannya dibanding metode klasik lainnya. Metode super playfair cipher dan two square cipher tergolong dalam algoritma kriptografi klasik yang menggunakan teknik penyandian subtitusi dan tranposisi karakter yang memiliki kunci simetri atau kunci yang sama dalam melakukan enkripsi dan dekripsinya.
International Journal of Research and Review
The text format is a character format that can be read directly with any software. This format is... more The text format is a character format that can be read directly with any software. This format is used in sending data to facilitate sending and speed up sending data to message recipients. The text format is the message storage format with he least security because it can be directly read by the person who gets the message. The author wants to build a cryptographic application that can secure text formats using the character transposition technique. Character transposition is used based on the formation of a square matrix which is used as a key in the encryption and decryption process. The size of the matrix used is 4 x 4. The results of the study found that the text format was successfully transformed into ciphertext so as to avoid the possibility of data theft. Keywords: square, security, block, encryption
Journal of the Science of Food and Agriculture, 2020
BackgroundExternal preference mapping is a powerful tool to explain consumer preference or reject... more BackgroundExternal preference mapping is a powerful tool to explain consumer preference or rejection. Combining the technique for order of preference by similarity to ideal solution (TOPSIS) multicriteria analysis with rapid descriptive techniques can improve preference map (PREFMAP) results. This study was conducted to compare the PREFMAPs generated with rapid descriptive flash profile (FP), check‐all‐that‐apply (CATA), and Napping® versus PREFMAPs constructed with FP‐TOPSIS, CATA‐TOPSIS, and Napping‐TOPSIS.ResultsOnly 38.46%, 63.66%, and 42% of sensory attributes initially generated by FP, CATA, and Napping techniques respectively were considered for the determination of their weight W and allocation as positive or negative in the TOPSIS technique. The PREFMAPs constructed with FP‐TOPSIS, CATA‐TOPSIS, and Napping‐TOPSIS presented a better explanation of the preference and rejection than the PREFMAPs directly generated with rapid sensory techniques. The results of the multiple fact...
Performance is a process of assessment of the algorithm. Speed and security is the performance to... more Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations...
Most universities are already implementing wired and wireless network that is used to access inte... more Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present, it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It ...
Processing of the data generated from transactions that occur every day which resulted in nearly ... more Processing of the data generated from transactions that occur every day which resulted in nearly thousands of data per day requires software capable of enabling users to conduct a search of the necessary data. Data mining becomes a solution for the problem. To that end, many large industries began creating software that can perform data processing. Due to the high cost to obtain data mining software that comes from the big industry, then eventually some communities such as universities eventually provide convenience for users who want just to learn or to deepen the data mining to create software based on open source. Meanwhile, many commercial vendors market their products respectively. WEKA and Salford System are both of data mining software. They have the advantages and the disadvantages. This study is to compare them by using several attributes. The users can select which software is more suitable for their daily activities.
Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted ... more Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.
Rail Fence Cipher is a further development method of Caesar Cipher. In Caesar algorithm, the resu... more Rail Fence Cipher is a further development method of Caesar Cipher. In Caesar algorithm, the results derived from the ciphertext letters shifting each character in the plaintext. While in the Rail Fence, it is taken from the ciphertext block formation matrix diagonally. The level of security in this method has advantages than in the previous method. In this study, the research tries to encrypt and decrypt the message using the Rail Fence algorithm. The ciphertext is obtained by taking a certain set of characters in the line that has been determined earlier.
Determination of the adviser is one of the academic obligations. Undesirable things always happen... more Determination of the adviser is one of the academic obligations. Undesirable things always happen in getting optimal decisions in which faculty is assigned not the most appropriate to the topic of the thesis. This matter can affect the result and the quality of the thesis. The research process uses the input variable of lecturers criteria. The data will be treated by using the method of fuzzy logic to obtain the output consists of advisers. In this case, the students do not have to worry about the competence of the lectures since the lecturers who have been given to them are fully filtered.
The visual integrity needs to be implemented in sending a picture. There is various image receive... more The visual integrity needs to be implemented in sending a picture. There is various image received have no originality. The small change of the pixels does not make the picture content detected by the eye. The integrity validation is very important to be applied. The picture captured by a camera has two dimensions. It is described in pixels such as Width and Length. This study is to validate all the pixels data or the color intensity of both dimensions. If there are a modification in the pixel, this method will give the wrong hash data. The validator will analyze the pixels in every layer such as red, green and blue to ensure the data transmitted is correct. Once there is a slight change in the pixels, the calculation gives the wrong value. It is very useful to compare the image before and after transmission.
The content of the SMS is very crucial. It consists of an imperative information. Unknown partici... more The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique character before it is completely sent. The cryptography technique is needed. The plaintext has to be encrypted before transmitted. The one-time pad method can be applied to the plaintext. The one-time pad is one of the easiest cryptography methods. It turns the plaintext into the ciphertext by doing XOR operation to every character. It generates the new ASCII as the cipher character.
In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The en... more In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The encryptor usually makes the core. Sometimes the encryptor does not feel that the key made is breakable. The Blum Blum Shub method can generate random key more secure. It means that the key generated can help the data from being solved by a hijacker. Blum Blum Shub uses two prime numbers to generate a key. When attached in RC4, a user does not need to create its key; and fully produced by the Blum Blum Shub module. The ciphertext will be more secure and robust after being combined with Blum Blum Shub.
This study aims to maintain the authenticity of the data to assure the recipient that the data is... more This study aims to maintain the authenticity of the data to assure the recipient that the data is free from modifications made by other parties, and if there is a modification to the data, then the recipient will know that the data is no longer maintained authenticity. The digital signature technique is used by using a combination of the MD5 algorithm as a hash function algorithm to generate the message digest, and ElGamal algorithm as a public key algorithm, with the combination of the two algorithms, will be generated the digital signature of each data that will be preserved. The ElGamal algorithm is used to encrypt message digest from the process of the MD5 algorithm to files where the digital signature is the result of encryption of message digest. The private key is used for the encryption process, while the public key is used to process the digital signature description when the file testing process is received. The results of the combination of the two algorithms are implemen...
International Journal of Recent Trends in Engineering and Research, 2017
International Journal of Recent Trends in Engineering and Research, 2017
IOSR Journal of Electronics and Communication Engineering, 2016
International Journal of Engineering Trends and Technology, 2016
Pesan teks merupakan cara berkomunikasi yang dikirim dalam bentuk tulisan, pesan teks saat ini sa... more Pesan teks merupakan cara berkomunikasi yang dikirim dalam bentuk tulisan, pesan teks saat ini sangat banyak digunakan dalam media electronik, yang sangat populer yaitu pesan SMS (short message service) yang dikirimkan dengan memanfaatkan jasa operator selular, namun pesan tersebut, terancam tidak aman karna bisa terjadi pencurian data pesan. Untuk itu perlu terdapat pengamanan pada pesan teks yang dikirimkan dengan menggunakan teknik enkripsi dan dekripsi. Banyak algoritma kriptografi yang digunakan untuk pengamanan, diantaranya algoritma super playfair cipher dan two square cipher merupakan perkembangan dari metode playfair cipher. Metode ini cukup rumit cara pemecahannya dibanding metode klasik lainnya. Metode super playfair cipher dan two square cipher tergolong dalam algoritma kriptografi klasik yang menggunakan teknik penyandian subtitusi dan tranposisi karakter yang memiliki kunci simetri atau kunci yang sama dalam melakukan enkripsi dan dekripsinya.
Penentuan rute optimum sering menghasilkan nilai yang berbeda. Ini disebabkan oleh metode yang di... more Penentuan rute optimum sering menghasilkan nilai yang berbeda. Ini disebabkan oleh metode yang digunakan mempunyai perhitungan yang berbeda-beda. Tujuan dari rute optimum itu sendiri adalah untuk mencari lintasan terbaik dari 2 pasang verteks yang terdapat pada suatu peta atau graph. Algoritma pencarian yang diterapkan pada pengujian adalah A*. Algoritma ini mempunyai fungsi evaluasi yang berfungsi untuk membantu pencarian, yaitu fungsi heuristik. Untuk mendapatkan nilai optimum global bergantung pada kinerja fungsi. Dua buah metode yang telah diperkenalkan sebagai langkah untuk mendapatkan nilai fungsi heuristik, antara lain dengan menggunakan jarak Euclidean dan jarak Manhattan. Kedua metode ini telah menghasilkan jarak yang optimum pada permasalahan shoretest path, tetapi kedua fungsi ini menghasilkan jarak yang berbeda. Dengan itu, telah dilakukan penelitian terhadap fungsi heuristik dengan menggunakan metode Euclidean, Manhattan, Euclidean Kuadrat dan dengan menggunakan metode yang baru (ANDYSAH).
Digital Forensics is a technique used to search for evidence of events that have occurred. This q... more Digital Forensics is a technique used to search for evidence of events that have occurred. This quest aims to reveal the hidden truth. The existence of digital forensic activities due to the occurrence of crimes both in the field of computers or other. Legal treatment in digital forensic field makes this area of science a compulsory device to dismantle crimes involving the computer world. In general, the cyber crime leaves a digital footprint, so it is necessary for a computer forensics expert to secure digital evidence. Computer forensics necessarily requires a standard operational procedure in taking digital evidence so as not to be contaminated or modified when the data is analyzed. The application of digital forensic is beneficial to the legal process going well and correctly.
Internet Protocol Security (IP Security) is a security protocol that serves to secure information... more Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.
The decision taken in the selection of scholarship recipients for students is one of the responsi... more The decision taken in the selection of scholarship recipients for students is one of the responsibilities held by the stakeholders at the high school leadership level. The decision-making stage consists of compliance with the terms or criteria set by the government as the scholarship provider. Implementation of decision support methods for selection of scholarship recipients is required. This can help the leadership to make the selection better. Many methods in decision support systems can solve and make decisions better, including preference selection index. The use of preference selection index applied in the decision support system will result in a more effective decision.
Knowledge discovery is the process of adding knowledge from a large amount of data. The quality o... more Knowledge discovery is the process of adding knowledge from a large amount of data. The quality of knowledge generated from the process of knowledge discovery greatly affects the results of the decisions obtained. Existing data must be qualified and tested to ensure knowledge discovery processes can produce knowledge or information that is useful and feasible. It deals with strategic decision making for an organization. Combining multiple operational databases and external data create data warehouse. This treatment is very vulnerable to incomplete, inconsistent, and noisy data. Data mining provides a mechanism to clear this deficiency before finally stored in the data warehouse. This research tries to give technique to improve the quality of information in the data warehouse.
In the problem of determining the proper level of sequence in a sorting problem, the Simple Addit... more In the problem of determining the proper level of sequence in a sorting problem, the Simple Additive Weighting (SAW) method is an easy-to-use technique. It can analyze cases based on the criteria used. The use of criteria values in this approach has an unlimited amount. The more criteria used, the higher the accuracy of the results obtained. There are two types of criteria, cost, and benefits. Cost is used if the higher the criterion value, the lower the chance to get the top score while the benefit is used if the higher the criterion value, the greater the chance to get the top position. This study explains how to apply SAW algorithm in solving sequence problems in various cases encountered. Using this method will solve decisions that can not be completed manually. It helps the admin in choosing the best decision in any particular instance.
Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a co... more Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.
Technological developments in computer networks increasingly demand security on systems built. Se... more Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
The transition of copper cable technology to fiber optic is very triggering the development of te... more The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a partic... more An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.