cover
Contact Name
Sopiyan Dalis
Contact Email
sopiyan.spd@bsi.ac.id
Phone
+6281380852868
Journal Mail Official
jurnal.paradigma@bsi.a.cid
Editorial Address
Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
Paradigma
ISSN : 14105063     EISSN : 25793500     DOI : http://dx.doi.org/10.31294/p
Core Subject : Science,
The first Paradigma Journal was published in 2006, with the registration of the ISSN from LIPI Indonesia. The Paradigma Journal is intended as a media for scientific studies of research, thought and analysis-critical issues on Computer Science, Information Systems and Information Technology, both nationally and internationally. The scientific article refers to theoretical review and empirical studies of related sciences, which can be accounted and disseminated nationally and internationally. Paradigma Journal accepts scientific articles research at: Expert Systems, Information Systems, Web Programming, Mobile Programming, Games Programming, Data Mining, and Decision Support Systems.
Articles 5 Documents
Search results for , issue "Vol 10, No 1 (2008): Periode Januari 2008" : 5 Documents clear
SISTEM INFORMASI MANUFAKTUR DENGAN MATERIAL REQUIREMENT PLANNING DALAM KERANGKA KERJA SISTEM INFORMASI MANAJEMEN Heri Kuswara
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17053

Abstract

A tights competition between companies nowadays is triggered by the speeding development of information technology. Each company must arm itself with the best information technology that can be integrated with its main infrastructures to handle all company’s business activities. Two information systems that can increase company’s performance is the Material Requirement Planning information system (MRP) and the Manufacturing Resource Planning (MRP II) is the best solution to any company in controlling its production components supply. Applying one or both of these information systems is proven significant to increase company’s competitive power.
PENGENDALIAN INTERN PADA SISTEM INFORMASI AKUNTANSI BERBASIS KOMPUTER Ahmad Yani
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17049

Abstract

An Accounting Information System (AIS) is one of the subjects in a profit-oriented organization. In reality, AIS is very much influenced by the development of information technology, which result numerous computer-based AIS. The implementation of information technology in AIS does not make the system flawless (error free or corruption free). A good accounting information system (manual or computerized) must have a control. An internal control is thus needed to avoid such flaws. Furthermore, an internal control is useful for audit trail. The fact that implementing an internal control to an Accounting Information System is very important makes it a compulsory to create a high standard AIS output. This is like many other systems that are open to any errors or corruptions. The internal control covers the structure of organization, the coordinated methods, and the established measurements of a business organization to keep company’s assets, accuracy and truth of the accounting data as well as the efficiency of company operational.
SIX SIGMA STATISTIK DENGAN MINITAB DAN EXCEL Herlawati Herlawati
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17050

Abstract

Most companies, nowadays, are applying the six sigma approach to support the quality control of their products. The term six sigma is taken from statistic terms six and sigma. Six means number 6 and sigma means a symbol for a standard deviation. In other words, the standard deviation in use is 6s, meaning that to produce products with 0.002 per one million defect opportunity; the accepted limit of tolerance is 6 times as much as the standard deviation. The existence of noise factor theory which causes shift of mean to the right about 1.5s with 4.4 per one million defect opportunity (DPMO), initiate a number of practitioners to change the term six sigma with 3.4 DPMO, even though it is still controversial. Since most six sigma users are industries with great amount of products, which requires high level of accuracy and speed, thus the use of computer is inevitable. The most common six sigma software programs are Minitab and Excel. Nonetheless, software is only a means. IT is important to understand the essence of statistics so that not only enterprises (industry, trade, and the kind) but also service provider (education, medical, consultant, and etcetera) can apply it for quality control.
SENI KRIPTOGRAFI DAN ALGORITMA ENKRIPSI DATA SEDERHANA DENGAN MENGGUNAKAN VISUAL BASIC 6.0 Nandang Iriadi
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17051

Abstract

Cryptography is essential in information system. It provides information with a guarantee in its accuracy and secrecy. Cryptography can prevent deception in e-commerce and protect the legality of a financial transaction. It keeps identity originality and keeps an identity a secret. It also prevents acts of damaging documents and protects them from competitors or irresponsible parties. On the contrary, many of cryptography products on the markets do not emphasize on safety level. Many of those are not designed by cryptographers but by technical engineers who do not view cryptography as the essential part. A secure system cannot be designed only by “giving/attaching” cryptography inside but by knowing the procedures inside the system starting from its concept until it is attached on.             Millions of Rupiahs has been spent for computer security. Yet it seems ineffectual since computers are still insecure. A powerful and weak cryptography product looks alike. Two e-mail encryption products look the same. One is secure while the other is fragile. After being tested, both programs have specification similarities. Only there is one with security holes. A well-experienced cryptographer and criminals can only see this discrepancy.
ANALISA ALGORITMA DENGAN TABEL KEBENARAN OUTPUT PADA LOGIKA LOOPING DALAM PROGRAM APLIKASI BAHASA PEMROGRAMAN PASCAL VERSI 7.0 Rini Nuraini
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17052

Abstract

Repetition is considered a tiring and boring activity for human. Thus is not so for a machine. One of the superiorities of this machine called computer over human being is the ability to execute repeated commands without getting tired. The repetition or loop can run until it reaches its set condition. Logic is a form of reasoning. Algorithm is a series of procedures or instructions to solve a problem. Analysis is a study on a certain language to examine carefully the language structure by breaking it up into smaller parts that easier to learn, and therefore to draw a conclusion. Pascal is one of computer language programs. Language program is instructions or commands that are understood by the computer to execute certain tasks. These tasks are the application programs, which are designed by using one of the computer language programs. Visualization helps define a concept. Therefore, the writer uses flowcharts to visualize the concept. Flowchart is a series of symbols used to explain either the logic or the undergoing program.

Page 1 of 1 | Total Record : 5