cover
Contact Name
Achmad Solichin
Contact Email
achmad.solichin@budiluhur.ac.id
Phone
+628568198436
Journal Mail Official
bit@budiluhur.ac.id
Editorial Address
Jl. Ciledug Raya, Petukangan Utara, Jakarta Selatan, 12260. DKI Jakarta, Indonesia. Telp: 021-585 3753 Fax: 021-585 3752
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur)
ISSN : 16939166     EISSN : 2685127X     DOI : http://dx.doi.org/10.36080/bit.v18i2.1618
JURNAL BIT (Budi Luhur Information Technology) merupakan Jurnal yang diterbitkan oleh Fakultas Teknologi Informasi, Universitas Budi Luhur dengan jadwal publikasi dua kali dalam satu tahun (April dan September). Jurnal BIT bertujuan sebagai media pertukaran informasi, pengetahuan mengenai pengembangan dan ilmu komputer serta keterkaitan dengan disiplin ilmu lainnya. Fokus dan Ruang Lingkup pada Jurnal BIT: System Engineering, Expert System, Decision Support System, Data Mining, Artificial Intelligence (AI), Computer Network, Computer Engineering, Image Processing, Genetic Algorithm, Information System, Business Intelligence dan Knowledge Management, Database System, Big Data, Enterprise Computing, Robotic, Internet of Things, Data Science, dan Topik studi lain yang relevan
Articles 3 Documents
Search results for , issue "Vol 8, No 2 (2011): SEPTEMBER 2011" : 3 Documents clear
PERANCANGAN SISTEM INFORMASI PERPUSTAKAAN PADA SMP NEGERI 134 JAKARTA Muhammad Ainur Rony
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 8, No 2 (2011): SEPTEMBER 2011
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.062 KB) | DOI: 10.36080/bit.v8i2.487

Abstract

The library is a tool that is on an organization to educate members of the organization. A good library should ideally have a number of books a lot and has a number of active members whose numbers too much. Compensation obtained from the library of the large number of books is the difficulty of administering the library. So as to facilitate the administrative process library that has the number of lots, it would require an information system intended to assist the process of library administration and can provide useful information for library management. In addition to improving the administration process and provide information, library information systems can also improve service to its members. The design of the library information system using the waterfall method using VB-based application. Net. This system will use a one-tier model where applications and databases are on one computer. The method used in this design by using observation, interviews and analysis of related documents.Keywords : Library, waterfall, VB. Net, Information System, Database
PEMANFAATAN PROTOKOL TCP/IP UNTUK PROGRAM CHATTING DENGAN VISUAL BASIC Pipin Farida Ariyani
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 8, No 2 (2011): SEPTEMBER 2011
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (374.33 KB) | DOI: 10.36080/bit.v8i2.488

Abstract

In recent years, computer technology has developed very rapidly. Due to the very rapid development of this technology, then one technology with others should become interlinked. The differences that occur in the collection, transmission, storage and processing of information can be overcome. In this case allows the user to obtain information quickly and accurately. The need for exchange information between those computers requires connection among them. The problem that arises in the delivery of information among them is the lack of computer facilities that support user activities in the delivery of information. From those existing computers, not all of them have a good external drive. Some of them are error or they do not have those facilities in their computer. For example not all computers are connected to the internet, so the users do not freely send files via e-mail. Since there many constrains that exist, the communication should be fast and precise. The chatting program installed is necessary to be built in a small network called Local Area Network (LAN). Information exchange carried out in the form of text, pictures (emotion icons), and sending a file can be selected by the use according to the current needs.Keywords: LAN, chatting, protocol TCP/IP, Visual Basic
WEBCAM MONITORING RUANGAN MENGGUNAKAN SENSOR GERAK PIR (PASSIVE INFRA RED) Jati Lestari; Grace Gata
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 8, No 2 (2011): SEPTEMBER 2011
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.565 KB) | DOI: 10.36080/bit.v8i2.489

Abstract

Security aspects are the most important thing for the time being, since there are many higher crime rate and thus require innovation in overseeing inhabited places and to create a sence of security. Making security applications to monitor the incidence of theft or negative things such as criminal acts by those strangers which generally occurs in a room. Having the ability to monitor the condition of a room through the PIR sensor (Passive Infrared Receiver) and recorded by the camera as a webcam which can turn on the buzzer alarm. In this study, we described how the system will respond to any movement and it will be detected then inform and visualization an images and a buzzer as an alarm call that indicates a person who entered the room. And there is a camera view so the webcam can see a real incident. The equipment that has been designed and implemented this will certainly be very helpful in terms of improving security with the concept of real time and video recorder that can be run as the evidence at the police when a time there was a criminal act. Security application software design is done by using waterfall method and implementation analysis using the SWOT method is used to view a topic or problems from four different sides. Results of analysis is a referral or recommendation to retain strength and adds to the advantage of existing opportunities, accompanied by decresing shortages and avaid Threats.Keywords : Application Security, Webcam, PIR, arduino

Page 1 of 1 | Total Record : 3