Marzuki Marzuki Marzuki
dosen

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

COMPANIES IN THE DATA WAREHOUSE IMPLEMENTATION Marzuki Marzuki Marzuki
JAKSTIK Journal Vol 3, No 1 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data warehouse is a concept and a combination of technologies that facilitate theorganization to manage and maintain historical data obtained from the system or operationalapplications. Data warehouses collect historical data which can then be used as material to becomprehensive for management decisions, organizational needs analysis, through forecastingorganizations based on the data. Data warehouse allows integration of various types of datafrom a variety of applications or systems. This ensures the access mechanism 'one-stop shop'for management to obtain information and analyze it for the decision organizationaldevelopment. Within an organization, data warehouse can be used as weapons in competing.This paper will discuss the implementation of enterprise data warehouse.
BUILDING MANAGEMENT INFORMATION SYSTEM NATIONAL FINAL EXAM QUESTIONS tryout Marzuki Marzuki Marzuki
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In order to improve the quality of a high school graduate / vocational school, various effortshave been made by the respective - respective schools in order to improve the quality of thesegraduates. This effort is intended to improve the quality of education. Which in turn canimprove the academic quality of universities, whereby universities receive only qualifiedapplicants. Evaluation of the monitoring process is carried out continuously and continuousin the end will be able to fix the quality of education. One effort is developing a managementinformation system design problem tryout. With the availability of information about thetryout system was expected that users can perform a variety of analysis and also can providea more accurate exam. Development of information system design is intended as a first stepin increasing the academic quality of universities.
COMPANIES IN THE DATA WAREHOUSE IMPLEMENTATION Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 4, No 1 (2004): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data warehouse is a concept and a combination of technologies that facilitate theorganization to manage and maintain historical data obtained from the system or operationalapplications. Data warehouses collect historical data which can then be used as acomprehensive material for management to be able to take decisions, the analysis oforganizational needs, to forecasting organizations based on the data. Data warehouse allowsintegration of various types of data from a variety of applications or systems. This ensures theaccess mechanism 'one-stop shop' for management to obtain information and analyze it forthe decision organizational development. Within an organization, data warehouse can be usedas weapons in competing. This paper will discuss the implementation of data warehousewithin the company.
Twofish cryptographic APPLICATION FOR SAFETY DATA COMPUTER Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Twofish is a 128-bit block cipher that can accept variable length keys up to 256 bits. Cipheris a 16 round Feistel network with a bijective F function consists of four key-dependent 8-by-8-bit S-Box, a constant of 4-by-four as the maximum distance to the reference matrix areseparated on GF teripisah ( 28), a "pseudo-Hadamard transformation, according to the roundbit, and a key schedule that is designed carefully. Twofish can be implemented in hardwarewith 14 000 gates. The design works for both rounds of the key schedule permits a widetradeoff between speed, software size, setting time, the composition of the gates, andmemory. Kriptanalisis Twofish has extensive property, ie attacks can be solved in five roundswith 222.5 plaintexts and 251 effort choices.
SECURITY ENCAPSULATING PAYLOAD IP SECURITY PROTOCOL IN AS Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today's world of information about crime on the Internet computer network, such as attacks,especially viruses, worms, Trojans, Denial of Service (DoS), Web defacement, hijackingsoftware, up to the problem of theft of credit card more often adorned the pages of massmedia. Crime in the world of computers continues to increase in line with the developmentand advancement of science and technologies in this field. This challenge is actually alreadyappeared since the beginning. Encapsulating security payload (ESP) is a protocol used inInternet Protocol Security (IPSec) and in addition the Authentication Header (AH) is anotherprotocol which is a service that provides confidentiality, and authentication.In this article will discuss about the encapsulating protocol IPsec Security as a service.