cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Jurnal Sistem Komputer
Published by Universitas Diponegoro
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol 2, No 2 (2012)" : 5 Documents clear
Security System Layanan Internet Banking PT BANK MANDIRI (Persero) Tbk. hastuti, maynina norshela; Annisya, Rialda
Jurnal Sistem Komputer Vol 2, No 2 (2012)
Publisher : Jurnal Sistem Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jsk.v2i2.38

Abstract

Berbagai layanan perbankan diberikan Bank kepada nasabahnya demi kepuasan pelanggan. Salah satu layanan yang mulai banyak dilirik dewasa ini adalah layanan Internet Banking. Dengan layanan ini, nasabah dapat melakukan berbagai macam transaksi perbankan dengan lebih mudah, hanya dengan koneksi internet semata. Hal ini mempermudah para nasabah, terutama mereka yang selalu sibuk, dalam mengelola keuangan mereka. Penggunaan akses internet dalam layanan ini mengharuskan keamanan data selalu terjaga dari pihak yang tidak bertanggung jawab. Oleh karena itu, layanan jenis ini menggunakan berbagai metode keamanan untuk menjaga privasi dan data nasabah. Pengamanan yang dilakukan biasanya meliputi penggunaan Secure Socket Layer (SSL, kriptografi Kunci Publik, dan Digital Signature. Namun, apakah dengan semua pengaman ini layanan ini sudah 100% aman? Dalam makalah ini, penulis akan menganalisis keamanan data, metode yang digunakan dalam Internet Banking Bank Mandiri, sehingga akan disimpulkan berdasarkan teori dan analisis, mengenai kualitas pengamanan yang diterapkan pada layanan ini.
PETRI NET MODELLING OF CONCURRENCY CONTROL IN DISTRIBUTED DATABASE SYSTEM Haryono, Djoko
Jurnal Sistem Komputer Vol 2, No 2 (2012)
Publisher : Jurnal Sistem Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jsk.v2i2.20

Abstract

The life time of transaction is divided into two stages: executing stage and committing stage. At the executing stage, transaction access data through a concurrency control, while at the committing stage, a commit protocol is executed to ensure failure atomicity. A transaction that requests a lock can be blocked by a committing transaction for a long time due to a long delay in completing the committing procedure. The potential long delay in transaction commitment makes concurrency control wait until transaction finish the committing stage. This study will modify concurrency control, the modified of concurrency control allows give the locks that are still on hold by another transaction in their completion of committing stage. In modeling the concurrency control, Petri Net is used. The simulation has show increase the commit throughput of transaction, but the issue of abort transaction has significant impact to modified concurrency control, the simulation has show increase the abort throughput of transaction.Permalink: http://jsiskom.undip.ac.id/index.php/jsk/article/view/20
A MANAGED APPROACH OF INTERACTION BETWEEN AGILE SCRUM AND SOFTWARE CONFIGURATION MANAGEMENT SYSTEM Parvez, ABU WAHID MD. MASUD
Jurnal Sistem Komputer Vol 2, No 2 (2012)
Publisher : Jurnal Sistem Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jsk.v2i2.32

Abstract

In current age the agile software development is one of the most popular software development methodology but due the mismanagement and lack of efficient handling of agile scrum and software configuration management system our software industry is facing a high rate of failed product, keeping this as my motivation, I have designed a efficient checklist which will help the industry to organized the interaction between agile scrum process and software configuration management system in a efficient and managed way and definitely that will increase the successful project in the software industry.
ANALISIS SINYAL ELECTRONIC NOSE BERBASIS WAVELET MENGGUNAKAN SUPPORT VECTOR MACHINE UNTUK IDENTIFIKASI JENIS TEH HITAM Eri, Marlus
Jurnal Sistem Komputer Vol 2, No 2 (2012)
Publisher : Jurnal Sistem Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jsk.v2i2.36

Abstract

Penelitian ini bertujuan untuk melakukan identifikasi terhadap aroma teh hitan. Aroma teh hitam didapat dari hasil pengukuran alat Electronic Nose (E-nose) yang menggunakan rangkaian sensor gas. Identifikasi aroma teh hitam menggunakan dilakukan dengan Principal Component AnalysisSupport (PCA) dan Support Vector Machine (SMV).   Penelitian ini dilakukan dengan tahapan analisis data keluaran dari rangkaian sensor yang berupa tegangan dengan menggunakan wavelet. Data tegangan listrik berasal dari 4 buah sensor TGS880, TGS826, TGS822, TGS825. Denoising dan kompres dari sinyal keluaran sensor ditransformasi menggunakan wavelet Daubechies yaitu D4, D8 dan D20, dengan tingkat dekomposisi 3 dan 6.   Transformasi PCA dilakukan terhadap fitur ekstrasi yang dihasilkan dari analisis wavelet, sebelum dimasukan ketahap klasifikasi pola. PCA digunakan untuk mengurangi dimensi dari data fitur ekstrasi tanpa kehilangan banyak informasi signifikan yang ada di dalamnya. Hasli pengujian menunjukan SVM mambu memberikan klasifikasi dengan akurasi 97,53% menggunakan wavelet Daubechies D20 dengan tingkat dekomposisi 6. Kata kunci : Electronic Nose, Wavelet,  Principal Component AnalysisSupport (PCA), Support Vector Machine (SVM) 
PENGGUNAAN APLIKASI BANTUAN (SAKPA) DALAM MEMPERMUDAH PEMBUATAN LAPORAN KEUANGAN nurhayati, oky dwi; Ningrum, Alifvia Arvi
Jurnal Sistem Komputer Vol 2, No 2 (2012)
Publisher : Jurnal Sistem Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jsk.v2i2.39

Abstract

Financial treasure at each agency is required to prepare financial statements which will be reconciled with the KPPN (Office of the State Treasury). The Treasurer shall make an accurate and in accordance with the provisions, it is necessary to review and analysis prior to the report. The reconciliation process must be manually where satker come back and forth to merekon KPPN same data that is not very efficient for satker less far away. So KPPN has done groundbreaking steps to overcome that is through the internet and applications prarekonsiliasi help the SAKPA. SAKPA application is an application used to process data in the User Authorization Budget Accounting System (SAKPA). SAKPA application developed by the Directorate of Treasury Systems as one of the Directorate under the auspices of the Directorate General of Treasury application was developed with the aim Provides ease of the Government Accounting Standard Reporting on Budget User Authorization unit.

Page 1 of 1 | Total Record : 5