cover
Contact Name
Sopiyan Dalis
Contact Email
sopiyan.spd@bsi.ac.id
Phone
+6281380852868
Journal Mail Official
jurnal.paradigma@bsi.a.cid
Editorial Address
Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
Paradigma
ISSN : 14105063     EISSN : 25793500     DOI : http://dx.doi.org/10.31294/p
Core Subject : Science,
The first Paradigma Journal was published in 2006, with the registration of the ISSN from LIPI Indonesia. The Paradigma Journal is intended as a media for scientific studies of research, thought and analysis-critical issues on Computer Science, Information Systems and Information Technology, both nationally and internationally. The scientific article refers to theoretical review and empirical studies of related sciences, which can be accounted and disseminated nationally and internationally. Paradigma Journal accepts scientific articles research at: Expert Systems, Information Systems, Web Programming, Mobile Programming, Games Programming, Data Mining, and Decision Support Systems.
Articles 7 Documents
Search results for , issue "Vol 11, No 3 (2009): Periode September 2009" : 7 Documents clear
MODEL PENANGANAN E-MAIL SPAM DENGAN PENDEKATAN TEKNIK SMTPI Nandang Iriadi
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4835.729 KB) | DOI: 10.31294/p.v11i3.4735

Abstract

The ability to use e-mail as essential to the ability to use the phone. E-mail system is very important thatmany people would complain if the e-mail system can not waste bekerja.E-mail (SPAM) is a problem almostall Internet users and the various efforts to control has been done. Without knowing the factors that causethe occurrence of SPAM, then this problem will still continue. This paper set forth an analysis of SPAM withSMTP Method I, to find fault in the system and the significant factors that cause other Spam.Analisisontology of the system architecture of e-mail describing the parts and systems so that such connectednesscan identify system weaknesses. Then all the significant factors associated with each other by relations ofcausality and proven method SMTPI messages sent by SMTP will be sent in the queue. SMTP will avoidreplying to the message from the queue if connected to a remote machine .. is the use of filtering solutionsthat are considered quite effective from the technical point of view. filtering is essentially aimed at helpinge-mail recipients to filter (select) which automatically e-mail right from spam e-mail, saving time andtenaga.Hasil analysis showed that not only technical factors such as the architecture of e-mail system andauthentication process that factors in SPAM, but also other factors such as less sweeping application ofsecurity policy (security policy), and economic factors such as cost of sending an e-mail is low.Keyword: E-mail, Spam, E-mail filter,SMTPI Methodics
KAJIAN PENERAPAN SISTEM INFORMASI KARYAWAN BERBASIS WEB BERDASARKAN PENDEKATAN TAM Mochamad Wahyudi
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (193.107 KB) | DOI: 10.31294/p.v11i3.4731

Abstract

The purposes of this study are to find the dominant factors which correlate and influence the level of technology acceptance, particularly Web-Based Employee Information System to its end users, of which are the employees of Bina sarana Informatika (BSI), and to know how an accepted model of new technology in a form of Web-Based Employee Information System is emplemented in a tertiary education institution.The Web-Based Employee Information System used in this study is one of information systems implemented by BSI, all of which were web-based designed that require an internet browser, such as: Internet Explorer or Mozilla Firefox. It is computer-accessible to employees both from within or outside BSI campus since the system is connected with local computer network via both intranet as well as internet facilities. This Web-based Employee Information System, which is stored in a webserver of the Internet, has a domain address “bsi.ac.id” and it is accessible via BSI website at http://www.bsi.ac.id. Some facilities available are: employee data processing, academic service, prospective students information, courses and programs, Jabatan Fungsional Dosen.The instrument for this study is questioner with Semantic Differential Scale ranging from 1 to 7, representing answers ranging from ‘extremely disagree’ to ‘extremely agree’. This study also makes use of both Technology Accepted Model (TAM) to describe the relationship between factors influencing the use of Web-Base Employee Information System and Structural Equation Modelling (SEM) to analyse data. The software used are AMOS and SPSS for Mindows 16.0.1 version.The result of this study is useful for identifying and putting in mind the role of Web-Based Employee Information System, which is accessible at http://www.bsi.ac.id, as a facility to support employees’ working accomplishment.Key words : Web-Based Employee Information System, Technology Accepted Model (TAM), Structural Equations Modelling (SEM), Analysis of MOment Structure (AMOS)
MEMPERCEPAT USIA PROYEK MENGGUNAKAN METODE PERT DAN CPM UNTUK PENGEMBANGAN SISTEM APLIKASI KOMPUTER Rachmat Adi Purnama
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1464.497 KB) | DOI: 10.31294/p.v11i3.4737

Abstract

At the time a development project application systems are often responsible for the projectconstraints of time needed to complete the project itself, where the time is set based on the approximateduration of each activity that must be done according to the plan changes from manejement. Based onthe problems, then a solution is required to determine the activities which can be complete. Thepurpose of writing this journal is to provide a solution in overcoming the problems associated with theacceleration time of a project application development system, while the purpose of writing thisjournal is to apply methods of PERT and CPM in the age of speed or time required in completing aproject according to the age plan (UREN). Research methods that do the authors use the method ofstudy literature, and descriptive method by using the table-table operational variables. At the end ofthe discussion of the results will be described how the age estimates (UPER) can be adjusted to the ageof the plan (UREN) long with a new activity, so that the responsible project can implement the projectin accordance with the target time is planned by managementKeys : PERT, CPM, UPER, UREN
KAJIAN PENGGUNAAN PACKET FILTERING FIREWALL MENGGUNAKAN CISCO IP ACCESS CONTROL LIST Imam Sutoyo; Mochamad Wahyudi
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (121.191 KB) | DOI: 10.31294/p.v11i3.4732

Abstract

A computer network has become a necessity for any organization implementing a computer-based information system. Hence, keeping the security aspect is important to maintain the network performance so as to provide optimum service to its users and to be up against any attacks especially when it is connected to the Internet. This paper is intended to give input to computer network administrators who implement IP Access Control List (ACL) network security system as firewall. Itdiscusses the strengths and vulnerabilities of packet filtering firewall using Cisco IP Access Control List (ACL). The findings of this study will give computer network administrators better understanding on implementing Packet filtering firewall with Cisco IP ACL and comprehending the potential security holes due to its vulnerabilities.Keywords : Vulnerabilities, Packet Filtering Firewall, Cisco IP Access Control List (ACL), Cracker
APLIKASI VISUALISASI MATERI PEMBELAJARAN KIMIA DAN BIOLOGI BERBASIS WEB Anita Octasia; Dwiza Riana
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1899.758 KB) | DOI: 10.31294/p.v11i3.4738

Abstract

Limitations and difficulties of teachers in delivering materials to make software in educational environments haveincreased, especially at the senior high school level. That's what makes the writer develops software learning thataims to assist teachers in presenting materials. The materials can help students more easily understand the lessonsin school, especially for a chemistry and biology subjects in senior high school. Research methods used in thewriting of this research is the analysis of the program. First, the authors analyze the previous program, learn thereference related to the study. They collect the data from books, literature and also from internet browsing. Next,they improve the program by creating new program and proposed in web base aplication. Visualisation andpresenting the developed applications uses software such as Adobe Flash CS3 and Macromedia Dreamweaver 8 sothat they can create visualized applications of learning materials for biology and chemistry at the high schoollevel. The proposed program is expected to help the teachers in solving the problem of delivering materials.KeywordsBiologi, Berbasis Web,Kimia, Materi Pembelajaran
INSTALLASI DESAIN DAN PENGEMBANGAN JARINGAN KOMPUTER BERSKALA KECIL (STUDI KASUS : INSTALASI ONLINE WIRELESS DI RUMAH ) Agus Dendi Rachmatsyah
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5073.319 KB) | DOI: 10.31294/p.v11i3.4733

Abstract

Computer and network technology evolve very rapidly and is advancing. There are a lot of connectedcomputers in the network which facilitate effective and efficient working activities. This also increases theefficiency in computer usage since many resources are available at the same time. In this writing, theauthor uses library research and direct observation. Based on the case study done on the installationdesign of small-scale computer network at home and at work, it can be concluded that the small-scalecomputer network is very appropriate to be applied in housing and in the community. It is due to theincreasing needs on technology in Indonesia, especially in the field of computers and wireless technology,simple computers without a LAN card and the wireless (wifi) suitable for workplaces and homes.Keyword: wireless, network, internet protocol
PENERAPAN INTRUSION DETECTION SYSTEM SEBAGAI FIREWALL DAN SARANA UNTUK MENANGKAL PENYUSUPAN HACKER PADA JARINGAN LOKAL ASURANSI JIWA INHEAL INDONESIA DI JAKARTA Hendra Supendar; Tunggul Yogi Herno
Paradigma Vol 11, No 3 (2009): Periode September 2009
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4073.629 KB) | DOI: 10.31294/p.v11i3.4734

Abstract

The attack on internet systems increasingly rampant, almost all of the information in the system vulnerableto attack and also generated a lot of financial losses due to these attacks, of course, as networkadministrators, is not an easy job to monitor the hundreds of IP in and out of clients. Install the honeypot tofool hackers also not the only way to better secure the internal regions and Demilitary Zone (DMZ). Weneed the help of a system that can monitor the data packet and record it and provide further information tobe analyzed further. System Intrusion Detection System (IDS) can help users monitor and analyze problemsin network security. In this case the IDS used a snort for windows software to monitor user activities on thesystem and out of the corporate network. The expected result is to know how much inconvenience caused tothe system through a corporate network traffic. Data Base created using MySQL and what actions shouldbe taken on these disorders will be the future. Testing of IDS performed on a local network of PT. AsuransiJiwa Inhealth Indonesia for six days. Observations were made to the directory the user can monitor thedaily activities in the network and the result will be a reference in determining how much disk capacity isneeded for the system is not disturbed or damaged. Observations also held with the activities of suspectedhacker activities, such as sending large data packets that can make the system unstable or monitor activityin and out of IP networks that are not known or suspected. The results of this analysis is that with as manyas 45 (fourty five) user disk capacity to be provided for one year is 40 GB.Keywords : hacker, Intrusion Detection System, snort for windows

Page 1 of 1 | Total Record : 7