Mohammad Andri Budiman
Cited by
Cited by
The implementation of cosine similarity to calculate text relevance between two documents
D Gunawan, CA Sembiring, MA Budiman
Journal of Physics: Conference Series 978 (1), 012120, 2018
The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function
R Meiyanti, A Subandi, N Fuqara, MA Budiman, APU Siahaan
Journal of Physics: Conference Series 978 (1), 012051, 2018
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
AR Lubis, MS Lidya, MA Budiman
Dunia Teknologi Informasi-Jurnal Online 1 (1), 2012
On Using Goldbach G0 Codes and Even-Rodeh Codes for Text Compression
MA Budiman, D Rachmawati
Annual Applied Science and Engineering Conference (AASEC) 180 (1), 012062, 2017
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
H Wandani, MA Budiman, A Sharif
Alkhawarizmi 1 (1), 2012
Hybrid cryptosystem using tiny encryption algorithm and luc algorithm
D Rachmawati, A Sharif, MA Budiman
IOP Conference Series: Materials Science and Engineering 300 (1), 012042, 2018
An interactive augmented reality implementation of hijaiyah alphabet for children education
RF Rahmat, F Akbar, MF Syahputra, MA Budiman, A Hizriadi
Journal of Physics: Conference Series 978 (1), 012102, 2018
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
D Rachmawati, MA Budiman, L Aulya
IOP Conference Series: Materials Science and Engineering 308 (1), 012003, 2018
Implementasi Algoritma RC4A dan MD5 untuk menjamin Confidentiality dan integrity pada file teks
N Hayati, MA Budiman, A Sharif
SinkrOn 1 (2), 2017
An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security
D Rachmawati, MA Budiman, CA Saffiera
IOP Conference Series: Materials Science and Engineering 300 (1), 012040, 2018
An implementation of the H-Rabin algorithm in the Shamir three-pass protocol
D Rachmawati, MA Budiman
2017 2nd International Conference on Automation, Cognitive Science, Optics …, 2017
Perancangan Mobile Augmented Reality System untuk Wisata Sejarah
A Candra, D Rachmawati, MA Budiman
Senarai, 2014
Penggunaan Algoritma RSA dengan Metode The Sieve of Eratosthenes dalam Enkripsi dan Deskripsi Pengiriman Email
MS Lubis, MA Budiman, KL Manik
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 1 (1), 2013
Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm
D Rachmawati, MA Budiman, MI Wardhono
2018 IEEE International Conference on Communication, Networks and Satellite …, 2018
Teknik pemecahan kunci algoritma rivest shamir adleman (rsa) dengan metode kraitchik
BS Muchlis, MA Budiman, D Rachmawati
Sinkron: Jurnal dan Penelitian Teknik Informatika 2 (2), 49-64, 2017
Simulasi Pengamanan File Teks Menggunakan Algoritma Massey-Omura
M Reza, MA Budiman, D Arisandi
Dunia Teknologi Informasi-Jurnal Online 1 (1), 2012
Dijkstra's and A-Star in Finding the Shortest Path: a Tutorial
A Candra, MA Budiman, K Hartanto
2020 International Conference on Data Science, Artificial Intelligence, and …, 2020
On Using The First Variant of Dependent RSA Encryption Scheme to Secure Text: A Tutorial
D Rachmawati, MA Budiman
Journal of Physics: Conference Series 1542 (1), 012024, 2020
An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
MA Budiman, NI Chayanie
Journal of Physics: Conference Series 978 (1), 012086, 2018
Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform
MA Budiman, D Rachmawati
Journal of Physics: Conference Series 978 (1), 012088, 2018
The system can't perform the operation now. Try again later.
Articles 1–20