Thesis TITLE OF ENGINEERING INFORMATICS

1.Pembangunan Application Hiding Encrypted Messages with MARS Methods in Image by Zhang LSB Method Image (Download PDF) (Ferry Pangaribuan)Sender 2.Implementasi Encryption System Instant Messaging Java with the Blowfish algorithm (Download PDF) (Mohammad Gilang Kautzar HW)Protocol Implementation 3.Perancangan and SMS-Banking (Download PDF) (Herdyanto Soeryowardhana)4.Studi and Implementation of Model Job-Shop Rescheduling Train Travel Reschedulling Method Pattern (Irfan Hanif)5.Studi and Implementation of Voice Mail with Delivery Encryption Algorithm Serpent (Download PDF) (Anggi Alisa Princess)6.Pembangunan Add-on in Mozilla Thunderbird for Electronic Mail Encryption with Corrected Block Tiny Encryption Algorithm (Download PDF) (Rick Gilbert Fernando)7.Penyembunyian messages in JPEG Compressed Images Using Spread Spectrum Method (Download PDF) (Winda Winanti)8.Penyembunyian Message on GIF Image Using Adaptive Methods (Download PDF) (Prasetyo Andy Wicaksono)9.Klasifikasi Based Digital Music Genres by Using Artificial Neural Networks (Steady Nasrul Wicaksono)10.Studi and Implementation of Non-Blind Watermarking Spread Spectrum Method (Download PDF) (Bayu Adi Persada)11.Pengamanan Sites with Head and Body HTML Encryption Algorithm Using RC4 (Download PDF) (Yudi Harobowo)12.Pengamanan transmission of results and Query Database with Cryptography Algorithm RC4 (Download PDF) (Mohamad Fauzan Firda)RC6 Encryption Algorithm 13.Implementasi for SMS on Mobile Phones (Download PDF) (Vishnu Adi Permana Rangga)14.Studi and Optimization Algorithm Implementation Cutting Steel Bar (Download PDF) (Odit Ekwardo)15.Studi and Implementation of Public Key Cryptography for Authentication Devices and Users in Bluetooth (Download PDF) (Made Treasure Dwijaksara)16.Studi and Implementation of Steganography on Digital Video in Mobile Phone with DCT Modification (Download PDF) (Paul Gunawan Hariyanto)17.Program LSB steganalysis method with Enhanced Image Florentine LSB, Chi-Square, and RS-Analysys (Download PDF) (Yulie Anneria Sinaga)18.Implementasi Steganography with Bit-Plaane Method Complexity Segmentation (BPCS) to Compressed Document Images (Download PDF) (Arya Widyanarko)Convex polygon 19.Optimasi Pattern Placement Using Genetic Algorithm (Download PDF) (Hadi Saloko)20.Perbandingan Ranked Positional Weight Method and Kirbridge Wester on Line Balancing Problem-Based Production of Single Track Model (Download PDF) (Dyah Saptanti Perwitasari)21.Studi and Implementation Kolisi on MD5 Hash Functions (Download PDF) (Ade Gunawan)22.Studi and Implementation of Steganography on MP3 with Spread Spectrum Technique (Download PDF) (Tara Baskara)Conversion of Various Types Archives 23.Teknik into Encrypted Text Form (Download PDF) (Dadan Ramdan Mangunpraja)24.Implementasi Algorithm Elliptic Curve Public Key Cryptography Application E-mail on Mozilla Thunderbird (Download PDF) (Ibn Qoyyim)25.Studi Use EXIF ​​Data for Measuring Results On Improved Performance Image Search Engine (Download PDF) (Nugroho Herucahyono)26.Program Convert File Not Score to MIDI music format (Download PDF) (Selvira Afifa)27.Pembangunan Software for Security at Samart Contactless Card with RC4 algorithm (Download PDF) (Stephen Astrianto)28.Study, Analysis, and Comparison Between Impelmentation JPEG and JPEG2000 (Download PDF) (Thazin Aungsoe)Add-ins 29.Pembandungan oprasi Construction Simulation Modeling Technique Returning to the Cyclone in Microsoft Excel (Download PDF) (Muhammad Ihsan)30.Pembangunan Steganography Software Audio MP3 with Parity Coding Techniques in Mobile Phone Tools (Download PDF) (Herianto)31.Kriptografi Audio Engineering Interference with Non Binary Data (Download PDF) (Fajrin Mohammed Rashid)Encryption Software 32.Perangkat Video MPEG-1 with modifications Video Encryption Algorithm (VEA) (Download PDF) (Tessa Ramsky)Selective Video MPEG Video 33.Enkripsi with Serpent Algorithm (Download PDF) (Ariel Pratt)Modification and Implementation 34.Perancangan VEA (Video Encryption Algorithm) for Video Streaming (Download PDF) (Diane Intania Savitri)35.Implementasi Digital Signature Algorithm Using RSA on the World Wide Web-Based Applications AJAX (Anna Maria)36.Studi and Implementation Using Voice Messaging Encryption Algorithm Twofish (Download PDF) (Ruth)Digital Hand Signs 37.Penerapan for SMS-Banking Authentication (Download PDF) (Budiono)38.Kriptografi Visual Binary and Color Images with Steganography And The development and function of XOR (Download PDF) (Muhammad Arif Romdhoni)39.Implementasi Disk Encryption algorithm Rijndael (Download PDF) (Elfi Yolanda)40.Implementasi Job-Shop Scheduling Model in Railway Penjadwan Problems with Single Path Constraint Programming Approach (Download PDF) (Dawn Yuliawan)41.Watermarking on Digital Image Using Discrete Wavelet Transform (Download PDF) (Dean Fathony Alfatwa)42.Pembangunan Prototype Compiler for Platform Language Groovy. NET with Library Utilizing Microsoft DLR (Yogi Adrisatria)43.Studi and Implementation of Linear Algorithm Cryptonalysis on FeAl (Masagus Krisna He)44.Studi Comparison and Implementation of Algorithm BFS and DFS on Explorers Machine Directory Documents in Microsoft Windows (Nurshanti)45.Studi and Implementation of Audio File Compression Method Using Linear Prediction (Aulia Judge)46.Studi and Relationship-Based Authentication Implementation Method In lossy JPEG Image Compression (Ajie Satria Wijaya)47.Studi and Implementation of Steganography in video format matroska Method Using Discrete Wavelet Transform (Muchamad Surya Prasad)48.Studi and Implementation of Fingerprint Recognition Algorithm Using the Boyer-Moore String Matching (Amir Muntaha)49.Pembangkit Cross Puzzle with Backtracking Algorithm (Hafni Syaeful Sulun)50.Studi and Implementation Algoritam F5 for Hiding Messages Steganography in JPEG Image Files (Hadyan Ghaziani Fadl