Journal Basic Science and Technology
Latest Publications


TOTAL DOCUMENTS

5
(FIVE YEARS 5)

H-INDEX

0
(FIVE YEARS 0)

Published By Institute Of Computer Science

2808-1498, 2089-8185

2021 ◽  
Vol 10 (3) ◽  
pp. 86-92
Author(s):  
Rinaldy Valendry

A three-channel concentric pipes heat exchanger is a development or improvement of a two-channel concentric heat exchange apparatus. This study was conducted to determine the output temperature of each channel, and compare the results of theoretical calculations using mathematical modeling of experimental results conducted in the field. So that obtained difference of value between result of experiment to result of theory calculation. In this study have 3 variations of temperature data that is 50 °C, 55°C, and 60 °C with two streams namely CounterFlow and PararellFLow and discharge 2.5 l/minute, while cold fluid with 25 °C discharge 1.5 l/minute. From the above analysis it can be concluded that the temperature of the hot fluid coming out of the APK in the experiment tends to be higher than the temperature of the hot fluid coming out of the APK on theoretical calculations of mathematical modeling methods. Meanwhile, the cold cold fluid temperature coming out of the APK in experimental tends to be lower than the temperature of the cold fluid coming out of the APK on theoretical calculations of mathematical modeling methods.


2021 ◽  
Vol 10 (3) ◽  
pp. 78-85
Author(s):  
Ismail Sati Alom Harahap

One aspect of success in data communication is security. Data security can be done by using steganography. Steganography is a way to hide messages in the media in such a way that other people do not realize there is a message in the media. Many of the algorithms used in steganography one of which is the Least Significant Bit. In this research, the authors modify Least Significant Bit algorithms with Alternate Insertion method. Modification is doing of embedding and extracting messages process by changing the RGB values ??at each pixel of image data with confidential file by inserting message alternately and insertionly until the all message inserted. This steganography applications have input password that is used as the key of a message can't be opened in addition to the addressee so that the data will be kept confidential. The parameters used to measure the performance of the Least Significant Bit and Alternate Insertion are using runtime program and analysist algorithms of Big . The message insertion applications built by using C# (C Sharp) programming language. From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy). From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy). From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy).


2021 ◽  
Vol 10 (3) ◽  
pp. 93-98
Author(s):  
Muhammad Alfian

Security and confidentiality of data is one important aspect of an information system. The information can be misused very large losses in high-profile cases such as vital information confidential corporate, customer data banks and etc. Information security solutions in one of them can be used with cryptography. Cryptographic algorithms used in this study is a tiny encryption algorithm. Cryptographic data security attacks can always wear can occur, with this in mind the authors added security techniques to perform data hiding with the media as a placeholder, this term is called steganography. Steganography is used in this study is the end of the file. These techniques make the process of data hiding which is located at the end of the image, so it does not affect the image quality of the reservoir. In this study, a system built using microsoft visual studio 2010 C#. This system can work well, but has a color image blur caused to the container caused by the inserted message, where the greater the size of the message was inserted then color the image blur that arises will be many more.


2021 ◽  
Vol 10 (3) ◽  
pp. 105-110
Author(s):  
Al Zimy Siregar

In data communication, the aspect of security and confidentiality data is needed. To maintain the security and confidentiality of the data is by using cryptography. Cryptography is the science of mathematical techniques related to aspects of information security such as data confidentiality, data authenticity, data integrity, and authentication data. Text security is done by a hybrid cryptography in a text file that is first performed using ADFGVX Cipher encryption, then the results of ADFGVX Cipher encryption is encrypted using the RSA. Testing primes using the Fermat algorithm. Implementation of the system using C# programming language in Microsoft Visual Studio 2010. The system on RSA was tested with a maximum key length of 256 bits to 32 bits intervals.


2021 ◽  
Vol 10 (3) ◽  
pp. 99-104
Author(s):  
Liyun Arun Hutagalung

Heat exchanger is an exchange device with three concentric pipe tubes with direct flow used to reduce hot fluid to cold fluid using cold water fluid. the research was carried out triple pipes that flowed in the same direction with 3 variationsin the temperature pipe of the hot water fluid th with a temperature of 50oC, 55oC and 60oC with temperature of cold water fluid tc 25oC and this study used a flow rate of 0.000025 m3/s = 0.000033 m3/s and 0.000041 m3/s.The results of this study showed that the equilibrium temperature obtained from the experimental results of the effectiveness of the one-way pipeline flow was 1 = 32.99% the effectiveness of thr second channel pipe of 2 = 66.48% and ont the effectiveness of the third channel pipe of 3 = 33.57% 3rd data with a debut of 0.000025 m3/s and the effectiveness of the opposite flow the channel one pipe is 1 = 55.16% on the effectiveness of the second channel pipe of 2 = 66.48% and on the effectiveness of the third channel pipe of 3 = 60.59% it is obtained in the with to 7 with a discharge of 0.000041 m3/s.


Sign in / Sign up

Export Citation Format

Share Document