cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
Seminar Nasional Aplikasi Teknologi Informasi (SNATI)
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 69 Documents
Search results for , issue "2004" : 69 Documents clear
Aplikasi Berbasis Smartcard pada Lingkungan Sistem Operasi Windows Basuki Winoto
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Integrated Circuit Card or commonly named as smartcard is a properiatery devicewhich is based on ISO/IEC 7816 standard. In order to expand smartcard capabilities andinteroperabilites, PC/SC Workgroup defines a specification on interoperabilities between PCand smartcard. With this specification, which also has been implemented by Microsoft asWin32 API, one can develop applications which is using smartcard as small amount datastorage (identification key, password, or else).Smartcard-based applications can be developed in Windows operating systemenvironment easily by using Win32 API library, user interface library or Win32 COM library.The application development itself can be done by using Microsoft Visual C++ or MicrosoftVisual Basic.Keywords: ICC, smartcard, interoperable, PC/SC workgroup, win32
Analisis Sandi Algoritma Enkripsi Substitusi permutasi 4 Ronde Yusuf Kurniawan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Encryption is one of the most important components in security of application ofinformation technology. We need the good knowledge of encryption attack, to create thestrong, rapid, and flexible encryption algorithm. This research shows that security ofencryption algorithm does not only depend on the bits number of key, but also depend on thestructure of algorithm itself. The more complicated the algorithm is (it is hoped more secure)the slower the algorithm runs, so the algorithm is not comfortable to be used. This researchincludes cryptanalysis and programming to attack the algorithm of simple encryption, 80-bitkey, which can be broken theoretically in 19 years using 1 million computers, with brute forceattack. In this research, this algorithm can be broken less than one minute with 10 thousandcharacters of known plain text with one personal computer, although the algorithm has goodstatistical property.Keywords: encryption, cryptanalysis, brute force attack, statistical property, known plaintext
Comparison of Smart Antenna Technique Based on Adaptive Antenna Systems and Switched Beam Systems Tito Yuwono; Mahamod Ismail; Zuraidah Zainudin
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The continuous increment of mobile communication subscribers, require a highercapacity and spectrum efficiency of the cellular system especially in an urban area where thetraffic density is high. In order to accommodate the increasing number of subscribers, smartantenna technology is used to improve system’s performance, which could increase thenumber of call and data transmission as well as simplifying the networking management. Thebasic principle of a smart antenna is to control and reduce the effect of interference toprovide the user with the highest quality of uplink and downlink signal. This can be achievedby using narrow beams with signal processing capability at the base sites and to optimize itsradiation pattern, which automatically updated according to MS movement or as signalsconditions change. In this study, two types of smart antenna were considered, which are theswitched beam systems and adaptive antenna systems. The significant difference betweenthese two systems is from the beamforming point of view. The key part of this study is todevelop a simulator for adaptive antenna systems (AAS) and switched beam systems (SBS)based on GSM 900 in order to determine the factors that could affect network’s quality andcapacity. Simulation results of different techniques are compared and the performanceevaluations of C/I are discussed. Results show that the AAS gives a better performancecompared to SBS, with average improvement of C/I around 5 to 10 dB.Keywords: smart antenna, adaptive, switched beam,C/I
The Impact of Information Technology Investment on the Hospitality Industry Gede Sri Darma
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Teknologi informasi semakin berkembang dengan cepat. Hal ini merupakantantangan spesial bagi para eksekutif senior yang harus memutuskan apakah akanmelanjutkan investasi di bidang teknologi baru ataukah tidak. Dilain pihak, pengambilankeputusan ini sering sangat sulit untuk menentukan apakah manfaat nyata apabila melakukaninvestasi dibidang teknologi informasi dalam sebuah organisasi. Tulisan inimempertimbangkan pertanyaan ini dalam ruang lingkup industri pariwisata, yang sangattergantung pada penggunaan teknologi informasi dalam kegiatan operasionalnya seharihari.Lebih khusus, penelitian ini menginvestigasi hubungan diantara investasi teknologiinformasi, penggunaan teknologi informasi, kepuasan pengguna komputer, kinerja penggunakomputer dan kinerja hotel.Sebuah survey terhadap 945 EUC (computer end-user) yang bekerja di beberapahotel di Bali, Indonesia telah dilakukan untuk menilai persepsi mereka tentang dampakteknologi informasi pada sebuah organisasi. Hasilnya menunjukkan bahwa ada hubunganyang signifikan diantara kelima variabel yang diinvestigasi. Lebih lanjut, telah diketemukanbahwa level investasi dibidang teknologi informasi dan level kinerja user secara langsungdapat mempengaruhi kinerja hotel, akan tetapi jumlah penggunaan teknologi informasi danlevel kepuasan user dapat mempengaruhi kinerja hotel secara tidak langsung melalui levelkinerja user. Dilain pihak, kepuasan user juga diketemukan memiliki pengaruh yang sangatkecil terhadap kinerja hotel. Level investasi dibidang teknologi informasi memiliki hubunganyang signifikan dengan level kepuasan user, dimana diketemukan pula secara langsungmempengaruhi jumlah penggunaan teknologi informasi. Yang tidak kalah penting adalahinvestasi dibidang teknologi informasi diketemukan memiliki pengaruh secara langsungterhadap penggunaan teknologi informasi dan kinerja user di beberap hotel. Penemuan inimenyarankan bahwa generalisasi di beberapa organisasi yang akan melakukan investigasipengaruh investasi teknologi informasi terhadap kinerja organisasi, dan hal ini tidak dapatdiabaikan.Kata kunci: information technology, organization performance, hospitality industry.
MIX Design Beton Metode SKSNI dan ACI dengan Bantuan Bahasa Pemrograman Komputer Widi Hartono
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper presented computer programming of concrete mix design used Microsoft®Visual Basic™: NCMD. The procedures use by this computer program are based on SKSNIand ACI method of concrete mix design. The method was developed for use with cement,aggregates, and water, which conform to the relevant Indonesian and American standard.However since this standards lay down requirements which materials must meet in order tobe suitable for good quality concrete, the procedures of SKSNI and ACI method can beapplied to concrete mix design generally. The object of this computer program is to find theproprotions in which the concrete material - cement, water, fine aggregate, and coarseaggregate - should be combined in order to provide the specified strength, workability,durability, and possibly meet other requirements, as listed in standard such the SKSNI andACI standard.Keywords: mix design, concrete, computer programming, visual basic™.
Penjadualan Produksi Flowshop dengan Availability Constraints Genetic Algorithm dan Tabu Search untuk Minimalisasi Makespan Time Wawan Indarto
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This work describes a genetic algorithm and tabu search approach that will behybrided to CDS algorithm to solve the flowshop scheduling with availability constraint. Insuch problem, machine are not available to work with, because it must entering themaintenance time. In this paper, two variant of non preemptive with an arbitrary number ofmachines and arbritary number of unavailability constrainton each of them considered.Computational experiments are performed on randomly generated instances to show theefficiency of the proposed approaches.Keywords: flowshop, multiple objectives, genetic algorithm, availability constraint, tabusearch.
Pengukuran Kompetensi Teknologi Informasi dan Komunikasi Carles Sitompul
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi informasi dan komunikasi membawa dampak yang besarpada perkembangan peradaban manusia. Manusia yang ingin tetap bertahan hidup di duniainformasi ini harus memiliki kemampuan memanfaatkan teknologi informasi dan komunikasi.Organisasi-organisasi akan dihadapkan pada kebutuhan untuk mendapatkan pekerja yangmemiliki kompetensi teknologi informasi dan komunikasi. Pengukuran kompetensi teknologiinformasi dan komunikasi merupakan salah satu langkah yang penting dalam manajemensumber daya manusia. Pengukuran kompetensi ini dilakukan berdasarkan model kompetensiSpencer. Pengukuran kompetensi Spencer memiliki ciri yang utama, yaitu bebas dari biasatau kesalahan akibat pengaruh subyektifitas. Pengukuran dilakukan dengan carawawancara berbasis perilaku (behavioral event interview) serta analisis isi (contentanalysis).Kata kunci: teknologi informasi dan komunikasi, kompetensi, pengukuran, manajemensumber daya manusia.
Pengkayaan UML dengan Metoda Formal Pujianto Yugopuspito
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Unified Modeling Language (UML) is a de-facto object-orieted model standard. Manymodels can be visualized and designed by using UML tool, e.g. Rational Rose. We enrich theUML by means of adding a capability to produce a set of formal specifiation of Z notation.This additonal capability is a part of a studi on formal framework of transformationrelational databases to object-relational databases. The enrichment of UML in formalspecification will give an opportunity to explore UML class diagram in the sense of formalmethods. This approach will enable to use the streght of formal methods within UML.Keywords: class diagram, UML, formal methods, formal specification, Z.
Aplikasi Virtual Driver NDIS (Network Device Interface Specification) untuk Pengembangan Network Analyzer Sujoko Sumaryono
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The network analyzer instruments are needed for monitoring, and fault identificationsin a local network. An application program in PC based can realize this instrument. Theinformation MAC (Medium Access Control) frames are needed to develops these applications.In Microsoft Windows environment, there are three methods to capture the MAC frames inthe local network that are direct NIC (Network Interface Controller) chip access, real NICdriver access, and virtual driver NDIS access. Virtual driver NDIS is used in this research,because the methods are independent from kinds of NIC. The result of the research shows: theapplication can to identify MAC address, IP address, protocol transport, services, the packetcontent, and statistically to analyze every packet has passed in the local network. Themonitoring report can be store in a file. The application has successfully analyzed some localnetwork technology, a UTP-Ethernet LAN, a wireless LAN, and a dial-up connection.Keywords: Network analyzer, MAC (Medium Access Control), NIC (Network InterfaceController), and Virtual driver NDIS
Management of Information Technology in Indonesian Construction Industry Muhammad Sapri Pamulu
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2004
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper presents findings of a research project, which explores the current use ofinformation technology (IT) in the Indonesian construction Industry. The findings are basedon a questionnaire survey taken during December 2002 and April 2003 among 250construction companies registered in the National Construction Industry Development Board(CIDB). The CIDB listed and classified these companies as B group or large company. Atotal of 48 valid replies were received, representing a response rate of 44%. The surveyincludes IT environment and management, use of software, hardware, internet applicationand staff competency, Investment in IT, benefits gained and problems associated with itsimplementation, and an assessment of the exploitation of IT for business strategic purposes.Survey reveals that (1) Level of IT applications among contractors in the industry is relativelylow in their core activity; (2) There is growing gap in managing IT, where high investmentand expenditure on hardware and software on one hand with poor human resourcesdevelopment on other hand; (3) From strategic point of view, Indonesian constructionindustry is still in reactive mode of managing IT, and the industry has a limited understandingof the value and potential of IT. The paper also suggests a need to aggressively push relevantgovernment initiatives that would increase strategic use and adoption of IT. Government andpublic agencies should consider policies, which encourage the use of IT in the constructionindustry thus making this industry sector more competitive.Keywords: IT, construction, Indonesia, management, strategic, application.