cover
Contact Name
David
Contact Email
david_liauw@yahoo.com
Phone
-
Journal Mail Official
sisfotenika@gmail.com
Editorial Address
-
Location
Kota pontianak,
Kalimantan barat
INDONESIA
SISFOTENIKA
ISSN : 20877897     EISSN : 24605344     DOI : -
Core Subject : Science,
Jurnal Ilmiah SISFOTENIKA diterbitkan oleh LPPM STMIK Pontianak dan IndoCEISS. Frekuensi Terbit Tengah Tahunan (2 kali dalam setahun, yaitu bulan Januari dan Juli). Topik yang akan dipublikasikan oleh jurnal SISFOTENIKA berhubungan dengan teknologi informasi, komunikasi dan komputer yang berbentuk kumpulan/akumulasi pengetahuan baru, pengamatan empirik atau hasil penelitian, dan pengembangan gagasan atau usulan baru.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue " Vol 1, No 1 (2011): SISFOTENIKA" : 8 Documents clear
ETIKA DAN PENGGUNAAN TEKNOLOGI INFORMASI: FAKTOR-FAKTOR YANG MEMPENGARUHI INTENSI MAHASISWA AKUNTANSI UNTUK MELAKUKAN PEMBAJAKAN PERANGKAT LUNAK Prihatini, Dwi
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.5

Abstract

Abstracts: Software Piracy has become a serious global problem, not only in the industrial world but also happened in the world of education. This research conducted to investigate what kind of factors causing software piracy intention in academic institution. Former research used the attitude variable, gender, majors, student’s family income, ownership of computer, and institutional monitoring and clarification. This research added the education level variable with the 79 responses and found that attitude variable, gender, the level of education, and ownership of computer influence the student intention to do the software piracy.Keyword: software piracy, student’s attitude, academic institution
PROBLEM SOLVING SUDOKU MENGGUNAKAN ALGORITMA GENETIKA Hadinata, Jimmy
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.6

Abstract

Abstracts: Sudoku is a logical puzzle that using numbers as the symbol to play, it has a quite interesting problem to be solved, Genetic Algorithm is suited as a problem solving for sudoku because Genetic algorithm method is to find solution with an optimization when Sudoku need an optimization to find the solution. Designing Sudoku with Genetic Algorithm as the problem solver could solve sudoku faster because Genetic Algorithm always produce a new better solution every loop that called Generations with selection, crossover and mutation process to create a new solution.Keywords: Sudoku, Genetic Algorithm, Problem Solving, Generations, Selection, Crossover, Mutation
PERANCANGAN DAN IMPLEMENTASI PERANGKAT LUNAK PROXY TUNNEL DENGAN ENKRIPSI KUNCI SIMETRISASIMETRIS UNTUK MANIPULASI PAKET DATA Gat, Gat
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.3

Abstract

Abstracts: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that encrypts data communications conducted. Forms of research that the author did was experimental data collection techniques onegroup posttest-pretest, the authors study variable is the security of data packets transmitted between website and browser. Design method used is the Extreme Programming with 4 ways to apply the practical development of XP, namely coding, testing, listening and designing. The result is a software design software called "Crypto Tunnel Proxy", according to the function of encryption, tunneling and proxy. The software engineering author uses Visual Basic 6.0 and uses 2 types of encryption, namely symmetrical and asymmetrical. The authors also apply the hash function as a fingerprint or fingerptint of keys that are sent. This application can improve security in computer networks. By encrypting all data packets between the browser and the website are symmetrical and asymmetrical. Tests conducted with several commonly used browsers.Keywords: RC4 and RSA Encryptiom, Tunneling, Proxy 
TELAAH TEORITIS FINITE STATE AUTOMATA DENGAN PENGUJIAN HASIL PADA MESIN OTOMATA widyasari, Widyasari
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.7

Abstract

Abstracts: Otomata and language theory cannot be separated in the world of informatics and represents compulsory subjects that must be provided. Therefore, to produce software in engineering requires a model which can be the solution of a problem later, because the model is an idea that will be applied to generate a software engineering. As one model that mean in here is otomata machine which is the model that can recognize, accept/ generate a sentence in a particular language. It is necessary to understand how to do modeling and testing so that it can be concluded on otomata engine if the string entered correct or wrong. This study will only discuss about the correctness of the theory of otomata machine. The benefits of this research are expected to provide input in order to prove the truth of a study. From the results, some conclusions that prove the truth of the review. Keywords: Automata, FSA, DFA, NFA.
MANAJEMEN PERUBAHAN DAN IMPLEMENTASI DALAM PROYEK SISTEM INFORMASI Kosasi, Sandy
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.1

Abstract

Abstracts : The introduction or replacement of an information system and organizational behavioral impact is very complicated. Changes in how information is defined, accessed, and used to manage organizational resources often result in power sharing and a new strength. This condition is usually caused by mistakes in managing the transition phase. A process of change and implementation have a psychological impact on those affected by change (internal), where if the changes actually happen, will cause the impact ofsituational for others associated with the organization. Control project risk fa ctors to some extent by the approach just in case. This research uses the concept of integrated project management with a total solution approach, namely awareness, alignment, action, adoption, assurance. This total solution approach through four important stages, namely the determination of the diagnostic phase, redesigning the organization, organizational transformation and continuous improvement with diagrams aids Delta Matrix. Overall information system design and implementation process should be managed as a planned organizational change. Social and technical design aims to obtain an optimal combination of design solutions to social and technical. Key to the success of change management and implementation also relies heavily on the company's commitment, communication skills, focus on implementing change and not be bothered with other things, and utilize human resources to be able to implement the change process and implementation.Keywords: Change management, Implementation, total solution approach,and the delta matrix diagram
APLIKASI PEMILIHAN KETUA BADAN EKSEKUTIF MAHASISWA STMIK PONTIANAK BERBASIS DESKTOP Murtado, A.
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.8

Abstract

Abstract : The use of information technology in the voting process expected to help solving problems them. The use of computer technology in the implementation of voting is known as electronic voting. The purpose of this study was to help Badan Eksekutif Mahasiswa (BEM) STMIK Pontianak in implementing the Chief Electoral BEM with a computerized system. The research method used is descriptive method. Software design method used is RAD. Programming language used Visual Basic 6. The results of this study tested the Network Local Area Network (LAN), where several computers as a client computer and a computer unit as a data bank or as a server with a database that has been in sharingkan. With the BEM application program in STMIK Pontiaanak Based Desktop allows the user (users) the easier it is to perform the E-Voting election.Keyword : E-Voting, BEM STMIK Pontianak, RAD, Visual Basic 6
PERANCANGAN PERANGKAT LUNAK PENGENALAN POLA KARAKTER MENGGUNAKAN JARINGAN SYARAF TIRUAN PERCEPTRON David, David
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.2

Abstract

Abstracts: Artificial Neural Net is a method in soft computing that imitate the structure of biological nervous, where multiple nodes communicate with each other through synapses that interconnect them. That method can be utilized for pattern recognition processes, such as hand writing character recognition. This paper is aimed to develop hand writing character recognition using Artificial Neural Net method. Perceptron neural network is adopted in Artificial Neural Net. A mapping method is used for preprocessing to segment a character image to be processed by Artificial Neural Net. The experimental results show that among all of successful segmented characters of all the training data. the system recognizes the characters with an accuracy close to 79,2%.Keywords: Character Recognition, Artificial Neural Net, Image Processing,Perceptron
ANALISIS DAN IMPLEMENTASI SISTEM INFORMASI PENJUALAN PADA PD. CITRA KOMPUTER PONTIANAK Oktavianus, Rian
SISFOTENIKA Vol 1, No 1 (2011): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v1i1.4

Abstract

Abstracts: Research on PD Citra Computer of Pontianak include the company's working procedures from receipt of goods orders, sales returns, revenue service, and making reports. The problems are found process of slow sales transaction handling, storage and recording of sales data in the sales book,its makes finding data and presenting the information to be ineffective and inefficient. The research method used descriptive method, that is conducted in a systematic, factual, and actual. The design and developed a protoype of sales information system using Microsoft Visual Fox Pro 9.0 programming language, also the database is already integrated in Visual Fox Pro 9.0. The proposal of system generate expected to answer a variety of problems that are found, mainly for the provision of various reports with more specific information, such as sales per customer report, sales report per period, the report returns per subscriber, the report returns per period, per period of service reports, and other reports useful for leadership in conducting the analysis and decision making.Keywords : Sales Information System, Protoype, System Development Methodology, Microsoft Visual Fox Pro 9.0 .

Page 1 of 1 | Total Record : 8