cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Magazine
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 4 Documents
Search results for , issue "Vol 5, No 1 (2005): Sikomtek" : 4 Documents clear
Science Applications Using Solar System Macromedia FlashMX, Swift 3D and Swishmax Elly Agustina Julisawati
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Until now we know the fruit of nine planets that circulate around the sun through specificpathways called the orbit or elliptical orbit. The planets orbit around the sun because ofgravity or the gravitational force of the sun and this is what binds the planets remain in orbit.The order of the planets from closest to the sun are: Mercury, Venus, Earth, Mars, Jupiter,Saturn, Uranus and Pluto.Multimedia applications that provides three-dimensional images with forms like Swift 3Dand an application example that presents images such as Flash and swish animation that canprovide or produce an interactive application that can be expressed as in the form of "SolarSystem Science Applications Using Macromedia FlashMX, Swift 3D and Swishmax "
Market basket ANALYSIS ANALYSIS METHOD WITH FUZZY C-Covering Rahayu Noveandini Noveandini
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As one application of data mining, market basket analysis is generally performed usingApriori method. This method of looking for associations between items by simply countinghow many times the items appear in the overall transaction, regardless of quantity of items inthe transaction. Therefore, the researchers propose a new method based on the perception thatthe more items purchased in a transaction, then the relationship between items in atransaction is getting weaker.To test the realization of the concept, we collect the sales transaction data from a supermarketfor a month. The collected data were converted to a form that can be processed by theprogram. Then, an algorithm created to process data in order to generate association rulesfrom those items in the transaction. Rule can be displayed in the form of tables or graphs.Experiment was made using a software program Borland Delphi and MS Access.By using the output from this program, which is an association rule, we can know the level ofassociations between items that are useful for helping the decision makers in determining themarketing policy. From the test results, we can conclude that the smaller the minimumsupport and confidence are determined, the more rules that can be generated and the time ittakes more and more. In addition, the higher the number of combinations to be searched, theless time is needed.
Generalized Multiprotocol Label Switching convergence NETWORKS IN THE SCHEME Eriek Eriek Orlando
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Convergence of Internet and telecommunications, with applications in it that more and morebandwidth with QoS penqaturan it finally takes the network and element in it which gave fullsupport to the preservation and improvement of network performance. If the first object thatbandwidth is always a predictable, so this time some applications already require schemes"bandwidth on demand". On the other hand the network efficiency by leveraging publicnetworks to be the main constraint in the deployment of services, especially for commercialpurposes. Trasnport technology is required which not only facilitate the best path routing anddiscovery, yet can also accommodate non-package existing technologies. The authordescribes the development of GMPLS today, particularly in the scheme of networkconvergence with other transport technologies. Also described brieflyabout the relationship pengembanngannya MPLS as the base.
Twofish cryptographic APPLICATION FOR SAFETY DATA COMPUTER Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Twofish is a 128-bit block cipher that can accept variable length keys up to 256 bits. Cipheris a 16 round Feistel network with a bijective F function consists of four key-dependent 8-by-8-bit S-Box, a constant of 4-by-four as the maximum distance to the reference matrix areseparated on GF teripisah ( 28), a "pseudo-Hadamard transformation, according to the roundbit, and a key schedule that is designed carefully. Twofish can be implemented in hardwarewith 14 000 gates. The design works for both rounds of the key schedule permits a widetradeoff between speed, software size, setting time, the composition of the gates, andmemory. Kriptanalisis Twofish has extensive property, ie attacks can be solved in five roundswith 222.5 plaintexts and 251 effort choices.

Page 1 of 1 | Total Record : 4