cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceedings of KNASTIK
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 34 Documents
Search results for , issue "2012" : 34 Documents clear
IT VALUE AND RISK PADA PT. X FINANCE Budi Setiawan, Eko
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sebagai perusahaan pembiayaan kendaraan terbesar di Indonesia dilihat dariperolehan laba bersih dan jumlah aset perusahaan, PT. X Finance terusbertekad untuk menjadi perusahaan pembiayaan kelas dunia. Untukmewujudkan tujuan tersebut, strategi yang dilakukan oleh PT. X Financediantaranya dengan memanfaatkan Teknologi Informasi (TI) dalam semuakegiatan operasionalnya. Nilai IT (IT Value) pada perusahaan dapat dilihatdari beberapa variabel, diantaranya firm performance, firm value dancompetitive advantage dari perusahaan. Dalam penerapan TI tidak semuanyaakan berjalan sesuai dengan tujuan perusahaan, sehingga akan menimbulkanrisiko. Untuk mengantisipasi atau mengurangi kemungkinan terjadi risikotersebut, perlu adanya suatu manajemen resiko. Salah satu penerapanmanajemen resiko TI (IT Risk) di PT. X Finance dapat menggunakan standarISO 31000. Implementasinya mencakup penentuan konteks resiko, asesmenresiko, penanganan, review dan monitoring terhadap risiko.
PEMODELAN DOWNSCALING LUARAN GCM DAN ANOMALI SST NINO 3.4 MENGGUNAKAN SUPPORT VECTOR REGRESSION (Studi Kasus Curah Hujan Bulanan Indramayu) Maesya, Aries; Buono, Agus; Mushthofa, Mushthofa
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

anomaly Nino 3.4 as input in the training to predict a rainfall monthly in Indramayu.The techniques of a downscaling is used for a phenomenon indicators of El Nino andSouthern Oscillation (ENSO) climate anomaly such as a Global Circulation Model(GCM) and Sea Surface Temperature (SST) nino 3.4 are commonly used as a primarystudy learn and understand the climate system. This research propose a method fordeveloping a downscaling model GCM output and SST anomaly Nino 3.4 by usingSupport Vector Regression (SVR). The research result showed that GCM output andSST anomaly Nino 3.4 can be approach the average value of monthly rainfall. The bestresult of prediction is Bondan station which has average correlation that is 0.700.
SISTEM INFORMASI GEOGRAFIS (Geographic Informational System) A Local Road Mapping and Second Collector in South Jakarta Using OpenGeo Suite and PostgreSQL Chairunnas, Andi; Yusuf, Daud
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Jakarta is Indonesian’s capital city which is the central of the most activity andeconomical activity for the people from all around Indonesia. The High mobility ofroad user is one of the things that become a problem in Jakarta. A road is a primaryaspect for a good traffic. The road itself is depend on how good or how bad thecondition itself, such as the construction, aging and a weight of the vehicle and There isa possibility of the quality of road is going to change depend on the situation.A road mapping is needed to deciding, planning and to caring the road by thegovernment to build a good traffic of people’s transportation. That is why, the localroad mapping is very important. The present writer is making a Sistem InformasiGeografis (Geographic informational system-SIG) which is talking about local roadmapping and a second collector which is using an OpenGeo Suite with the support fromframework OpenLayers. OpenGeo Suite is used for mapping digitalization process.PostgreSQL 8.2.4. Is used as a data base and Adobe Dreamweaver CS 3 is used to editthe PHP coding system. The mapping system from the layer is contains of roaddimension, technique of the road, road location, road condition and road user. By theSIG local road mapping site and second collector, people is be able to know about theroad mapping easily and it also be able to be the key for a planning and caring of theroad in the south Jakarta.
ENKRIPSI FILE GAMBAR MENGGUNAKAN METODE GOVERNMENT STANDARD (GOST) Hadi Rantelinggi, Parma; Yoanti Wattimena, Fegie
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam beberapa kasus, data gambar memerlukan pengamanan agar tidak dapatdibuka dan dilihat oleh pihak yang tidak berkepentingan misalnya gambarperencanaan denah sebuah proyek perumahan pada perusahaan kontraktor yangmenjadi rahasia perusahaan. Solusi dari permasalahan ini adalah menggunakankriptografi. Salah satu metode kriptografi adalah Metode Government Standart(GOST), dimana Metode GOST merupakan suatu algoritma enkripsi sederhana yangmemiliki jumlah proses sebanyak 32 round (putaran) dan menggunakan 64 bit blockcipher dengan 256 bit key. Metode GOST juga menggunakan 8 buah S-Box yangberbeda-beda dan operasi XOR serta Left Circular Shift. Pembuatan Sistem EnkripsiGambar dengan metode GOST adalah dengan menyeleksi warna RGB (Red, Green,Blue) pada gambar dan dirubah ke bilangan heksadesimal, lalu di enkrip menggunakanMetode GOST. Hasil dari sistem ini adalah dapat mengenkrip sebuah gambar yangutuh menjadi seperti sebuah gambar yang tidak mempunyai arti (gambar terenkrip),sehingga kerahasiaan gambar tersebut tetap terjaga.
IMPLEMENTATION OF BRANCH AND BOUND METHOD FOR CONVEX OPTIMIZATION PROBLEM Hariadi, Victor; Soelaiman, Rully
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Convex optimization is one of important areas in nonlinear programming, both fromthe mathematical and application viewpoints. Numerous real world problems arenaturally expressed as quadratic programming problems. In non linear programming,it is necessary to use a method to get global optimal value in order to not get trapped inlocal optimal value. Branch and bound method in non linear programming known asone of global optimization technique.In this research we implement branch and boundmethod with relaxation process in the problem to get global optimization from convexprogramming. The boundary of sub problem will be considering using reformulationfrom quadratic with KKT condition. Experiment was accomplished on quadra1ticprogramming problems. The results showed that using reformulation from quadraticwith Karush-Kuhn-Tucker (KKT) condition for bounding the problems helps to getoptimal solution in branch and bound method.
DEVELOMENT OF THE A TELEOBSERVATION MEDIC MODULE IN TELEMEDICINE SYSTEM AT MAJALAYA REGIONAL GENERAL HOSPITAL Abadi, Iwan; Ilman, Benie
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper aims to describe a development of teleobservation medic module. Thismodule is a module that was developed in the development of telemedicine systems atMajalaya Regional General Hospital. Some of the reason why Majalaya RegionalGeneral Hospital develop telemedicine system, including the geographical areaMajalaya and desire to make hospital management Majalaya become one of hospitalsin the utilization of information technology (internet technology) in all its activities.Teleobservation medic assisting the physician in making observations on patients,especially patients who are in the ICU. Doctors can take immediate action againstpatients who are in critical condition, though at the time the doctor was no longer inMajalaya Regional General Hospital environment. Software developed from this resultsof this research, showing a display screen with two windows. One windows displays thepatient’s condition that reads information from the patien monitor. Another videowindows displays the patient’s physical condition in real times.
KLASTERING INDUSTRI DI KABUPATEN KUDUS MENGGUNAKAN FUZZY C-MEANS Setiawan, Arif; Setiaji, Pratomo
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini dibuat dengan tujuan untuk membuat sistem aplikasi berbasis fuzzy yangdapat melakukan klastering industri di Kabupaten Kudus, menggunakan metodeklastering Fuzzy C-Means (FCM).Sistem aplikasi ini digunakan untuk mengolah dataindustri sehingga menghasilkan informasi klastering industri di Kabupaten Kudus.Informasi yang dihasilkan adalah kelompok skala industri dari industri kecil,menengah dan besar di Kabupaten Kudus. Langkah-langkah yang digunakan dalammetode FCM adalah sebagai berikut : input parameter data, input variabel awal,tentukan bilangan random, hitung pusat klaster, hitung fungsi obyektif, hitungperubahan matriks partisi U, dan proses iterasi sampai maksimal iterasi. Yangkemudian perumusan dan perhitungannya disajikan kedalam sistem.Dalam penelitianini disimpulkan bahwa dari pengujian sistem yang dilakukan diperoleh klaster ideal,yaitu klaster yang mempunyai sebaran jarak antar klaster kecil (Vmin), dan sebaranjarak antar klaster besar (Vmax) dan setelah diimplementasikan ke data asli terbentukkelompok industri berdasar skala yaitu besar, menengah dan kecil.
SISTEM PENDUKUNG KEPUTUSAN PENERIMA BEASISWA MENGGUNAKAN METODE ANALYTHICAL HIERARCHY PROCESS PADA STT MUSI Wijaya, Andri; Wulan P, Maria
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In determining the scholarship recipients at the Sekolah Tinggi Teknik Musi there areseveral criteria used to conduct the assessment. Criteria - such criteria as grade pointaverage (GPA), parental income, elderly dependents, semester, TOEFL, and religion.For efficiency and effectiveness of work then the right decision making is needed.Thisfinal report aims to create a decision support system using the method of AnalyticHierarchy Process to assist decision makers in determining who will receivescholarships based on established criteria. Decision support system scholarshiprecipient has the ability to analyze the scholarship recipients by using AHP method,which will be comparisons between the criteria with other criteria and alternatives inthis case the student compared to each other to obtain comparison graphs.The methodused in the writing of this report is a waterfall method by conducting interviews andreferences to obtain data. Making this system starts from the analysis of systems usingmodeling in the form, Context Diagram, DFD, process specifications, data dictionaryand ERD, design, implementation, and testing the system. All the stages passedthrough, except for installation and maintenance phases. The implementation usingprogramming language Visual Basic 6.0 and SQL Server 2000 database. Testsconducted only limited to the functional system of just using black-box testing. It isexpected that awardees decision support system can be implemented at Sekolah TinggiTeknik Musi.
TEKNIK PENGAMANAN PESAN DENGAN ALGORITMA RC4 DAN METODA LSB J. Bendi, R. Kristoforus; Budiman, Erwin
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

information. By using various techniques, many people are trying to accessinformation that they are should not have access to. With the development ofscience, the application of information security techniques and data that have beenused in ancient times can be an alternative in securing datacommunications. Cryptography is a science and art to maintain the security ofmessages sent from one place to another. RC4, one cryptographic algorithm, is widelyapplied to encrypt information. Cryptography can still be broken even if the processtakes time, cost and effort. Other data security techniques are also quite popular issteganography. In contrast to cryptographic techniques, steganography can reducesuspicion because the message is disguised is hidden in another file. LSB is one ofsteganographic methods. LSB widely applied to insert a secret message into a digitalimage.This software is made in order to secure the secret message into a digital imageusing the RC4 algorithm and the method of LSB. The software is built using thewaterfall model of software development.The results of the development of this softwarehas been able to secure the secret message in the form of text into a digital image witha BMP format using RC4 algorithm and the method of LSB.
PEMANFAATAN MODIFIED AUTHENTICATED KEY AGREEMENT PROTOCOL WITH TIME STAMP PADA APLIKASI SECURE INSTANT MESSAGING Binsar Mangisi Tobing, Deny; Setiyo Sukarno, Aji
Proceedings of KNASTIK 2012
Publisher : Duta Wacana Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Instant messaging (IM) a service that is used as a communication medium has severaladvantages since we can communicate in real-time, fast, and with very low cost. Theseadvantages led to the growing number of IM users of the service both from business,military, and government. However, since security aspects were not a design prioritythe emergence of threats such as eavesdropping and replay attacks also increased inrecent years. Therefore,additional security measures are required to prevent the threat.Secure Instant Messaging (SIM) is a software that implements the technique IMencryption, key agreement and authentication with the aim of preventing eavesdroppingand replay attacks. SIM the encryption of the message before it is transmitted overcommunication channels. Based on the results of testing, the process of authentication,encryption and decryption do not degrade performance significantly based on time andmemory used. Key agreement requires an average time of 25-32 seconds. This causesconsiderable delay occurred in the SIM application. On memory testing, key agreementrequires a 56% memory.

Page 2 of 4 | Total Record : 34


Filter by Year

2012 2012