cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Magazine
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 39 Documents
BUILD COMPUTER NETWORK USING TCP / IP VERSION 6 Yudi Irawan Chandra
Majalah SIKOMTEK Vol 4, No 1 (2004): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper will explain about IP version 6 and how pengalokasiannya. This time to request anIP address that has been done through agencies appointed by the IANA (Internet AssignedNumbers Authority) which is determined on a regional basis, such as APNIC (Asia PacificNetwork Information Center), which handles special requests IP addresses for the AsiaPacific region, including areas served by APNIC is Indonesian. Similar organizations thathandle regions of North America, South America, the Caribbean, and Sub-Saharan Africa isARIN, whereas in Europe, the Middle East, and parts of Africa is the RIPE-NCC.
Science Applications Using Solar System Macromedia FlashMX, Swift 3D and Swishmax Elly Agustina Julisawati
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Until now we know the fruit of nine planets that circulate around the sun through specificpathways called the orbit or elliptical orbit. The planets orbit around the sun because ofgravity or the gravitational force of the sun and this is what binds the planets remain in orbit.The order of the planets from closest to the sun are: Mercury, Venus, Earth, Mars, Jupiter,Saturn, Uranus and Pluto.Multimedia applications that provides three-dimensional images with forms like Swift 3Dand an application example that presents images such as Flash and swish animation that canprovide or produce an interactive application that can be expressed as in the form of "SolarSystem Science Applications Using Macromedia FlashMX, Swift 3D and Swishmax "
Market basket ANALYSIS ANALYSIS METHOD WITH FUZZY C-Covering Rahayu Noveandini Noveandini
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As one application of data mining, market basket analysis is generally performed usingApriori method. This method of looking for associations between items by simply countinghow many times the items appear in the overall transaction, regardless of quantity of items inthe transaction. Therefore, the researchers propose a new method based on the perception thatthe more items purchased in a transaction, then the relationship between items in atransaction is getting weaker.To test the realization of the concept, we collect the sales transaction data from a supermarketfor a month. The collected data were converted to a form that can be processed by theprogram. Then, an algorithm created to process data in order to generate association rulesfrom those items in the transaction. Rule can be displayed in the form of tables or graphs.Experiment was made using a software program Borland Delphi and MS Access.By using the output from this program, which is an association rule, we can know the level ofassociations between items that are useful for helping the decision makers in determining themarketing policy. From the test results, we can conclude that the smaller the minimumsupport and confidence are determined, the more rules that can be generated and the time ittakes more and more. In addition, the higher the number of combinations to be searched, theless time is needed.
Generalized Multiprotocol Label Switching convergence NETWORKS IN THE SCHEME Eriek Eriek Orlando
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Convergence of Internet and telecommunications, with applications in it that more and morebandwidth with QoS penqaturan it finally takes the network and element in it which gave fullsupport to the preservation and improvement of network performance. If the first object thatbandwidth is always a predictable, so this time some applications already require schemes"bandwidth on demand". On the other hand the network efficiency by leveraging publicnetworks to be the main constraint in the deployment of services, especially for commercialpurposes. Trasnport technology is required which not only facilitate the best path routing anddiscovery, yet can also accommodate non-package existing technologies. The authordescribes the development of GMPLS today, particularly in the scheme of networkconvergence with other transport technologies. Also described brieflyabout the relationship pengembanngannya MPLS as the base.
Twofish cryptographic APPLICATION FOR SAFETY DATA COMPUTER Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Twofish is a 128-bit block cipher that can accept variable length keys up to 256 bits. Cipheris a 16 round Feistel network with a bijective F function consists of four key-dependent 8-by-8-bit S-Box, a constant of 4-by-four as the maximum distance to the reference matrix areseparated on GF teripisah ( 28), a "pseudo-Hadamard transformation, according to the roundbit, and a key schedule that is designed carefully. Twofish can be implemented in hardwarewith 14 000 gates. The design works for both rounds of the key schedule permits a widetradeoff between speed, software size, setting time, the composition of the gates, andmemory. Kriptanalisis Twofish has extensive property, ie attacks can be solved in five roundswith 222.5 plaintexts and 251 effort choices.
CONCEPT OF PROTECTION AGAINST COMPUTER VIRUSES AND DETECTION PERFORMANCE Trojan trojan virus Maria Sri Wulandari
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer security is not considered important by many people apparently can take a big lossfor that person. If further research proved many things - things that can threaten data -personal data through computer media. There is now a lot of programs - programs that aremalicious as viruses, worms, trojans and other when infecting our computer system mayresult in losses for us. Trojan Horse or better known as the "Trojan" in the computer system ispart of a digital infection whose presence is not expected by the owner of the computer.Trojan consisting of the functions of unknown purpose, but in broad outline has destructiveproperties.Trojans go into a computer over a network is inserted at the time by surfing with physicalmedia. Trojan does not take effect directly as well as computer viruses, but the potentialhazards can be far greater than computer viruses. Trojans can be activated and controlledremotely or by timer. Remote control as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active events.Handling Trojan can be done in two ways, n
CARD READER RISTYAWATI RISTYAWATI RISTYAWATI
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of electronic world-sized chips are currently produced many havebeen implemented in a card-card technology that will replace the previously used magneticdata. With the addition of the processor chip in a data card allows card data to further processthe data contained in it so many additional features such as additional data security featuresand other applications become increasingly easy to do.Card Reader Technology has entered a new phase, with a starting number of applications thatare built based card reader resulted in a lot of hardware manufacturers to produce devicescard reader, but to get the card reader is still to be imported. Also generally Card Reader onthe market still need a computer card reader because it was designed for a variety ofapplications that need to be flexible with the application to be built by the consumer.
Implementation of Encryption Techniques on Computer Networks For Data Security In Review of reliability Maria Maria Ulfa
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Issues of security and confidentiality of data is one important aspect of information systems.In this case, is closely related to how important such information and data sent and receivedby a person of interest. Information will be no longer useful in the middle of the road whenthe information was intercepted (dihecker) by people who are not responsible or eligible. Inthis paper we discuss about the security of data in a computer network system usingencryption techniques (encryption) PGP (Pretty Good Privacy) are reviewed in terms ofreliability. PGP is used to encode a file so that only the intended person or the owner re-filesthat can describe and create digital signatures.In this proposal also exemplified how to use PGP as a reliable security systems, engineeringand implementation of PGP encryption in PGP in the digital signature. PGP is also used tosecure e-mail sent or received by users. [1]
PROJECTION ANALYSIS OF CHANGES IN FIXED ASSETS grouping LISTED ON COMPUTER ACCOUNTING Ministerial decree BASED No.KMK138/KMK.03/2002. HERU HERU SUHARJO
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The policy changes in the grouping of Fixed Assets will be an obstacle for Accountants and taxpayers to analyze the projections pencataatn, particularly the application of Computer Equipment pencataan calculations. While the goals to be reach of this paper is: To determine changes in the grouping of Fixed Assets by application of recording fixed assets, especially Computer calculations are based on the Decree of the Minister of Finance KMK 138/KMK..03/2002. The method used to compare the analysis with the method of calculating the projection of a straight line and declining balance method. As a result of this discussion, because the value of obsolete and value the benefits of Fixed Assets Computers so quick to encourage policy changes in the grouping of Fixed Assets, the Fixed Assets Computer need penyesuaikan groupings.
DATA STORAGE PROJECT ON THE LINE WEB-BASED Linda Wahyu Widianti
Majalah SIKOMTEK Vol 5, No 2 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data storage is the most important things done because it is a way for archiving files. Data storage is also a documentation of all activities will be oriented on the use and processing. In terms of data storage can not only be done on a computer or data storage across local network only, but in the current world development technology that is growing and the mobility of its users to follow the development of data storage can be done online. It is intended to facilitate the users to be able to store data anywhere, anytime. Will fully understand the performance of its users to be able to continue to work as closely as possible without knowing, time and place. So this is where the role of information technology is actually in use. With web media, it would not only be used for media publications, but also able to be used for storing data online.

Page 3 of 4 | Total Record : 39