cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Journal
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
JAKSTIK jurnal adalah kumpulan jurnal penelitian dari semua fakultas yang ditulis oleh dosen dan mahasiswa STMIK Jakarta. Kami jurnal yang diterbitkan setiap 6 bulan yang menunjukkan jurnal Studi yang berbeda Program studi.
Arjuna Subject : -
Articles 64 Documents
THE ROLE OF INFORMATION TECHNOLOGY IN EDUCATION THROUGH THE INTERNET WORLD Melani Dewi Lusita
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of rapid information technology becomes a facilitator for information. TheInternet is one way to get information. With the Internet students can get the rightinformation to and as a means of interaction between students with different culturalbackground.
Database encryption USING Transparent Data Encryption Rahayu Noveandini Noveandini
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThe development of global data communications network providing challenges in data andinformation security. Sharing of methods are used to maintain the confidentiality of data,either from application or database level. There are three basic types of encryption, namelymanual, semi-transparent, and transparent. Transparent Data Encryption is one type ofencryption that has advantages in ease of the user because the user does not need to doencryption and decryption process management data directly because the database has to doit. This research will discuss the workings of Transparent Data Encryption, superiority, andits implementation in the encryption database. From this discussion of the benefits of EFTcan be known, such as performance degradation due to lack of data encryption and ease ofimplementation offered to the user.
PASCAL Compiler HOW TO WORK FREE AND OPEN ON PPC386 Sutarno Sutarno Sutarno
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pascal is a procedural programming language including higher level languages, certainly can not be understood by the machine language so we need a software that will translate. It could be a software interpreter or compiler. For interpreters program will directly translated or executed, so that the program was not changing the shape and each instruction is what it is. While the compiler kesuatu transaction object shape and then by the linker and loader transformed into executable programs. At this time a lot of compiler that was developed to meet the supply needs of the programming language Pascal is no exception. Of course with different objectives and with the shortcomings and strengths of each. The goal is to provide a mini-howto to use and free pascal compiler optimization and provides an understanding of how the compiler creates an object-code compiler is roughly the same performance.
Performance optimization SYSTEM FOR USING THE WORLD INDUSTRIES PLC Syahril Syahril Syahril
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PLC at the beginning of his birth is known as a Programmable Controller (PC), known as theproduct of a project with a view to obtaining a compact instrument that can be programmedand direprogram like computers, do not take place as well as energy-based digital technology,which can replace a relay circuit complex, rigid (hard-wired, inflexible) and takes place aswell as a large energy. Meanwhile, a series of relays in question are the backbone ofindustrial control systems and manufacturing processes. In other words, today's PLC productsis actually departing from the need to run the industry to be more cheaply and efficiently.
DATA SECURITY DESIGN HEALTH SYSTEM USING cryptographic SmartCard Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Person's medical record information is one factor that determines the quality of serviceprovided by central health care services to patients and, therefore, this medical recordinformation should always be there when needed. Confidentiality of medical recordinformation is very important because this information to explain the special relationshipbetween patient and physician, which must be protected from leakage according to the codeof medical ethics and the applicable legislation.Smart card technology (smartcard) offers convenience and security of data storage because ofthe mechanism for data encryption before the data is stored in memory, and the pin (secretcode) that maintain such data in order not to be read by unauthorized parties. Smartcard canalso be easily carried so as to ensure the availability of data whenever needed.
SYSTEM SECURITY SYSTEM USING ROOM TYPE CARDLOCK AL5H Elly Agustina Julisawati
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the flexibility of key electrical current, the current key system can be combined withhotel management system, so the hotel can easily modify the model code generation cardlockcombination. With the above considerations, the authors tried to simplify the front office or athotels and apartment buildings to make the process of "Room Security System usingCardlock System Type AL5H"
IMPLEMENTATION OF SECURITY IN DYNAMIC BINARY TRANSLATION Hariyanto Hariyanto Hariyanto
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computers at this time is not an expensive item that only owned by a group of people, but itis a tool that can help in completing one's work. It is worth a secure and protect their datafrom data-interference and virus attacks coming from inside and outside the system. At theend of computer security will play an important role in data security.A dynamic binary translation is a dynamic system in the machine code fragment damage thatmay directly or enclosed diesekusi interpreter software. When mengesekusi interpreters, thestatistics are collected to determine how often these fragments diesekusi and how often takenbranches. Fragments of the most frequently used and transformed in the cache for subsequentexecution. Once the fragment is in the cache, they may be merged with other fragments whenthey were found separately by direction of an unconditional branch. This architecture is usedfor optimizing the dynamic programs, instruments and translational arsitetur intropeksi
In order to access WAP SITE DEVELOPMENT ON-LINE LIBRARY CATALOG Maria Maria Ulfa
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Library is one library in terms of a fairly complete collection of books, magazines, VCD, andcassette which is supported also by accessing the service catalog via the Internet. However,not all library users can access them by because they do not have personal internet access, aswell as for those who are mobile. For that, they need the service WAP (Wireless ApplicationProtocol) to make information access library catalogs, more practical and easier, but still ableto provide important information needed in the form of a book title, author name, book status,no.panggil books and no. parent books as well as the location where and how the book wason the floor, in accordance with the existing data in a database. Results from Catalog AccessLibrary Services Development using WAP is, capable of carrying out the process of findingbooks and ordering books for every book that was borrowed, so that during this process isstill done manually, can be done faster and more practical.
APPLICATION PROGRAMMING LANGUAGE C SEARCH FOR ERRORS RELATIVE VALUE AND LITERATURE IN practicum MATHEMATICAL pendulum CASE STUDY: BASIC PHYSICS LABORATORY STMIK JAKARTA STI&K Melani Dewi Lusita
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This writing describes how to find the value of relative error and the literature on experimentsconducted by the lab in the Laboratory of Basic Physics with Mathematical pendulummodule. The need for accurate data is needed. In the case of a mathematical pendulum labwork, data processing will be computerized using C language.
USE AS AN ANTENNA cans amplifier BASED IN COMPUTER NETWORK ACCESS POINT Nenny Anggraini Anggraini
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Writing is about the use of tin as the antenna amplifier in a network without cables based onthe access point. Limited funds to implement a network, either wired or wireless antennasusing a major factor in the use of tin as a wireless antenna that can strengthen the wave fromthe receiving antenna (receiver) to the access point.Counting cans that will become an antenna to it that can not be ignored in order to obtain agood signal amplification.