cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 8, No 1 (2012): Jurnal Informatika" : 9 Documents clear
Pembuatan Aplikasi Dokumentasi Jaringan Albert Briliakta G.S; Nugroho Agus Haryono; Joko Purwadi
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (178.388 KB) | DOI: 10.21460/inf.2012.81.114

Abstract

Company networks are continually expanding to meet the needs of the company. Therefore the company must add or even change the structure of the network or network topology. In this case a network administrator must also change the network documentation ​​in accordance with the development, The documentation contains information from every device on the network. Topology changes can be difficult for network administrators in managing the network if it does not have good documentation. The application built by the author proved helpful in making the network documentation. It provide and assist network administrators in making the topology and document in the printed form that can be used as documentation of the network by the company. So it can help network administrators manage and maximize the network. Kata kunci : Network Documentation.
IT Security In The Higher Education Institutions Dave E. Marcial
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (127.586 KB) | DOI: 10.21460/inf.2012.81.110

Abstract

This paper investigates the level of prioritization and degree of implementation of IT security in higher education institutions (HEIs) in the Philippines. A total of 95 HEIs in the Philippines were evaluated in the study. The study reveals that the level of prioritization of IT security in the Philippines HEIs is high. This signifies that IT security is prioritized and there is need to be done in the next 3 years in these HEIs. The degree of implementation of IT security in the HEIs is moderately implemented indicating that although this component is in the strategic plan of the HEIs, little or no action has been undertaken in this regard. The study further reveals that the level of prioritization of IT security has a significant correlation at 0.01 level of confidence with the degree of implementation of IT security in the HEIs in the Philippines. Keywords : security, privacy, risk, IT in education
Pengembangan Aplikasi Konversi Representasi Not Balok Ke Not Angka Untuk Paduan Suara Campur Lukas Chrisantyo; Rudy Hartanto; Lukito Edy Nugroho
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (263.073 KB) | DOI: 10.21460/inf.2012.81.115

Abstract

Beam notation is a notation that is officially used in the whole world as an intermediary to do musical communication. In Indonesia, notation that is more absorbed and mostly easy to learn autodidactly is numbered notation, while beam notation is more difficult to learn and tend to be avioded. Traditionally, beam notation can be converted to numbered notation by fully relying on human skills and abilities. It is obvious that the conversion process would require much time and energy. Therefore, a new conversion application is developed to cope the conversion from beam notation into numbered notation specally for mixed choir, with representated in a XML file called MusicXML. MusicXML is a representation of beam notation that are more easily to be compressed and has a universal characteristic, can be opened in a wide range of applications. The purpose of this research was to design a fast, reliable and accurate application to convert beam notation into numbered notation for mixed choir which consist of multiple voice parts, according to the prevailing theory of music. Kata-kunci: rekayasa perangkat lunak, konversi notasi musik, MusicXML
Penerapan Social Network Analysis dalam Penentuan Centrality Studi Kasus Social Network Twitter Budi Susanto; Herlina Lina; Antonius Rachmat Chrismanto
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (620.011 KB) | DOI: 10.21460/inf.2012.81.111

Abstract

The twitter provides a kind of relation between users in specific form. When someone follow others, it doesn’t mean that she/he know well about them. We have defined a friend relationship between users in twitter as connection following and follower between two users. Based on this definition we develop a system to get friends and also friends of friends relation from a specific user. We use twitter API to get following and follower list and then construct a graph that represent a social network between those users. From this graph, we analyse the centrality using SNA (Social Network Analysis) method, i.e. closeness and betweeness. We propose to use these methods in order to find out who is the most influence user in the his/her social network to spread out the tweet or information. With this system, user can know about their social network based on their friend list on twitter.   Kata Kunci : Social Network Analysis, Betweenness Centrality, Closeness Centrality
Pengambilan Keputusan Dalam Penerimaan Karyawan Bank Dengan Pendekatan Terstruktur Berbasis Sistem Pakar N. Tri Suswanto Saptadi; Vini Silviani Sebukita
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (328.962 KB) | DOI: 10.21460/inf.2012.81.116

Abstract

Development of the information services in recruitment bank employees cannot be supported the availability of the information system component. Meeting the need of the availability of good and competence employees needs to key attention to the recruitment and placement of the employees effectively. The use of expert system in recruitment helps the decision making contribute to the placement of the employees. This effort greatly assists personnel managers in making decisions in a way to minimize the positioning error and to know the characteristics of prospective employees of the bank. The research method begins by collecting facts through interviews and questionnaires. Stages followed by analysis of the problem to get answers. To connect the user to use an expert systems with a system modeling. Development in the addition of applied knowledge through system programming. Application of the system to help managers in making decisions on personnel recruitment. Keywords: recruitment, expert systems and decision making
Implementasi Algoritma Negascout Untuk Permainan Checkers Aditya Kurniawan Effendi; Rosa Delima; Antonius Rachmat Chrismanto
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.445 KB) | DOI: 10.21460/inf.2012.81.112

Abstract

Checker is a zero sum game which means if one player is declared win then the other player is declared lose, if one player gets 1 point then the other player gets -1 point. In this type of game every player have full knowledge of other player condition, like every move the other player has, what kind of pawn and the position of other player's pawn. This game will be implemented with Negascout and compared to Alpha-Beta to see wether it offer better or worse performance than Alpha-Beta. Both algorithm will be given 5 identical board condition to solve and the search depth will be limited to 4, 6 and 8 level. The result showed Negascout outperformed Alpha-Beta on 86% of the test performed. It searched less node than Alpha-Beta especially with depth 8. The result also showed Negascout found one difference node solution compared to Alpha-Beta with identical heuristic score. Negascout returned identical heuristic score with Alpha-Beta on all test. Kata Kunci : Negascout, Permainan, Checkers, Kecerdasan Buatan
The Study On The Applicability Of AHO-CORASICK Algorithm In Identifying Tests’ Validity Ed O. Omictin III; Rodrigo Gante Jr; Robby Rosa P. Villaflores; Ma. Bryne Catherine M. Marchan; Rodolfo T. Noblefranca Jr
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.969 KB) | DOI: 10.21460/inf.2012.81.117

Abstract

Aho-Corasick Algorithm (ACA) is a kind of dictionary-matching algorithm that locates elements of finite set of strings within an input text. It matches all patterns “at once”, so the complexity of the algorithm is linear in the length of the patterns plus the length of the searched text plus the number of output matches. This paper discusses the applicability of Aho-Corasick algorithm in identifying test validity using the standard Guidelines in Evaluating Tests. A proposed Quiz-Zone system was developed in order to evaluate and test the applicability of the algorithm used. Quiz-Zone allows the user to create exam that will check the test’s validity. It also allows the user to choose five types of exam namely: Matching Type, Multiple Choice, Essay, True or False and Short-Answer. The researchers revealed that there are some rules in identifying test validity that ACA can’t be applied. Keywords : Aho Corasick Algorithm, string-matching algorithm, test validity
Implementasi Prinsip Usability F-Shape Pattern Pada Konten Website Jimmy Hendisaro Zebua; Restyandito Dito; Lucia Dwi Krisnawati
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2874.746 KB) | DOI: 10.21460/inf.2012.81.113

Abstract

Website as a medium of information can not be separated from website content itself. How visitors get the information they want is very dependent on the placement of such information. This research which involve the design and testing of respondents concluded that in general, users tend to read using n “F” pattern , therefore the lay out of the most important content must be placed on both the recommended reading area of the “F” pattern. This research is using the Informatics Engineering’s website as case study and propose a better design to improve the readibility of the information based on “F” pattern. Kata Kunci : Website, F-Pattern, Konten Website, Usability
Clustering Tagg Status Facebook Dengan Menggunakan Algoritma K-MEDOIDS Sefia Chandra; Antonius Rachmat Chrismanto; Lucia Dwi Krisnawati
Jurnal Informatika Vol 8, No 1 (2012): Jurnal Informatika
Publisher : Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (373.092 KB) | DOI: 10.21460/inf.2012.81.118

Abstract

This research is implementing K-Medoids algorithm to discover clusters on a friend list of a Facebook user. To find those clusters, the system uses the strongest path which is based on the tag frequency of status update of the facebook user to measure the tie strength from a friend to other friends. The experiments of using 3 clusters, 5 clusters, and 7 clusters, which resulted in average purity score 0.7430. The experiment resulted in rank of highest average purity score, at the first rank is experiment which used 3 clusters with the average score 0.8806, at the second rank is experiment which used 7 clusters with the average score 0.7114, and the third rank is experiment which used 5 clusters with the average score 0.6368.   Keywords: cluster, Dijkstra, Facebook, strongest path, K-Medoids, purity, status update, tag

Page 1 of 1 | Total Record : 9