Articles

APLIKASI GENERATOR AKORD DENGAN MENGGUNAKAN FONT NOTANGKA.TTF DAN MENGADAPTASI LOGIKA DIRECT PRODUCT PADA NOTASI MUSIKAL ANGKA

Jurnal Informatika Vol 10, No 1 (2009): MAY 2009
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Original Source | Check in Google Scholar | Full PDF (89.792 KB)

Abstract

Information technology has brought a big influence in other fields of science, especially in music. One part of the musical arrangement process is chord defining. Direct product is one of vector multiplication types. Although its using in vector, but in music, it can be used for searching all possibilities of chord arrangement. This chord generator will use NotAngka2.ttf as a basic for input writing. Because of the unexistence of application for writing song in number notation with NotAngka2 font type and generating some chord arrangements for the song, so this topic become a focus for application designing and implementing. Abstract in Bahasa Indonesia: Paper ini membahas perancangan aplikasi pembangkit akord dari not angka yang ditulis dengan editor teks dengan font NotAngka2.ttf. Langkah-langkah yang digunakan untuk membangkitkan akord menggunakan teknik kompilasi. Tahap pertama adalah lexical analysis yang menyaring string dan membentuk token. Tahap ke dua adalah syntax analysis dimana input yang masuk diteliti struktur gramarnya. Selanjutnya dengan menggunakan logika perkalian langsung (direct product logic), maka dapat dibentuk akord yang sesuai dengan lagu masukannya. Aplikasi yang dibangun masih dalam tahap awal, sehingga inputnya masih terbatas pada lagu yang sangat sederhana, yang dibatasi pada patokan nada dasar, ketukan, jenis akord, serta tangga nada yang digunakan Kata kunci: akord, direct product, syntax analysis, lexical analysis

Desain Sistem Keamanan Distribusi Data Dengan Menerapkan XML Encryption Dan XML Signature Berbasis Teknologi Web Service

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose. The Rural Bank of Boyolali is conducting online financial transactions rather intensively, thus it requiring a security system on the distribution of data and credit transactions for their customer among branches offices to head office. The purpose of this study was to build a security system in credit transactions in Rural Bank of Boyolali for their customers among branches offices to head office. One way in protecting data distribution was used XML encryption and XML signature. The application of encryption technique in XML and digital signature in XML by using web service by using the AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) algorithms. This study was resulted the SOAP (Simple Object Access Protocol) message security system, with XML and WSDL (Web Services Description Language), over HTTP (Hypertext Transfer Protocol) to protect the customers’ credit transactions from intruders. Analysis of examination indicated that the data size (bytes) transferred as results of uncompressed XML encryption were larger than compressed XML Encryption, which leads to significant changes between the data transferred that was the processing time of the compressed data was faster than uncompressed XML encryption.

Perbandingan Algoritma Enkripsi GGHN(8,8) dan RC4 Untuk Video Conference

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

Encryption is a solutions to secure the information transmitted through the medium of communication that can not be intercepted by unauthorized parties. This study implemented two algorithms i.e. RC4 and GGHN (8.8) in video conference. This study compared the speed of both encryption and decryption of the encryption algorithm, and perform measurements of bandwidth. From the results of measurements of the speed can be concluded that the RC4 algorithm is 1.53 times and 1.34 times faster than GGHN(8,8) for encryption and decryption audio data. The encryption and decryption video data RC4 are 1.44 times and 1.09 times faster than GHN(8,8). Bandwidth usage for video conferencing without encryption and bandwidth usage on a video conference with RC4 encryption and GGHN (8.8) is the same.

Perbandingan Kinerja Jaringan Saraf Tiruan Model Backpropagation dan General Regression Neural Network Untuk Mengidentifikasi Jenis Daging Sapi

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

The research on image identification has been conducted to identify the type of beef. The research is aimed to compare the performance of artificial neural network of backpropagation and general regression neural network model in identifying the type of meat. Image management is processed by counting R, G and B value in every meat image, and normalization process is then carried out by obtaining R, G, and B index value which is then converted from RGB model to HSI model to obtain the value of hue, saturation and intensity. The resulting value of image processing will be used as input parameter of training and validation programs. The performance of GRNN model is more accurate than the backpropagation with accuracy ratio by 51%.

Desain Sistem Keamanan Distribusi Data Dengan Menerapkan XML Encryption Dan XML Signature Berbasis Teknologi Web Service

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose. The Rural Bank of Boyolali is conducting online financial transactions rather intensively, thus it requiring a security system on the distribution of data and credit transactions for their customer among branches offices to head office. The purpose of this study was to build a security system in credit transactions in Rural Bank of Boyolali for their customers among branches offices to head office. One way in protecting data distribution was used XML encryption and XML signature. The application of encryption technique in XML and digital signature in XML by using web service by using the AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) algorithms. This study was resulted the SOAP (Simple Object Access Protocol) message security system, with XML and WSDL (Web Services Description Language), over HTTP (Hypertext Transfer Protocol) to protect the customers’ credit transactions from intruders. Analysis of examination indicated that the data size (bytes) transferred as results of uncompressed XML encryption were larger than compressed XML Encryption, which leads to significant changes between the data transferred that was the processing time of the compressed data was faster than uncompressed XML encryption.

Perbandingan Algoritma Enkripsi GGHN(8,8) dan RC4 Untuk Video Conference

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

Encryption is a solutions to secure the information transmitted through the medium of communication that can not be intercepted by unauthorized parties. This study implemented two algorithms i.e. RC4 and GGHN (8.8) in video conference. This study compared the speed  of  both  encryption  and  decryption  of  the  encryption  algorithm,  and  perform  measurements  of  bandwidth .  From  the  results  of measurements of the speed can be concluded that the RC4 algorithm is 1.53 times and 1.34 times faster than GGHN(8,8) for encryption and  decryption  audio  data.  The  encryption  and  decryption  video  data  RC4  are  1.44  times  and  1.09  times  faster  than  GHN(8,8). Bandwidth  usage  for  video  conferencing  without  encryption  and  bandwidth  usage  on  a  video  conference  with  RC4  encryption  and GGHN (8.8) is the same.Keywords: Video Conference; RC4; GGHN(8,8); Real Time Protocol.

Perbandingan Kinerja Jaringan Saraf Tiruan Model Backpropagation dan General Regression Neural Network Untuk Mengidentifikasi Jenis Daging Sapi

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (645.868 KB)

Abstract

The research on image identification has been conducted to identify the type of beef. The research is aimed to compare the performance of  artificial  neural  network  of  backpropagation  and  general  regression  neural  network  model  in  identifying  the  type  of  meat.  Image management is processed by counting R, G and B value in every meat image, and normalization process is then carried out by obtaining R, G, and B index value which is then converted from RGB model to HSI model to obtain the value of hue, saturation and intensity. The resulting value of image processing will be used as input parameter of training and validation programs. The performance of  G RNN model is more accurate than the backpropagation with accuracy ratio by 51%.Keyword: Identification; Backpropagation; GRNN

Desain Sistem Keamanan Distribusi Data Dengan Menerapkan XML Encryption Dan XML Signature Berbasis Teknologi Web Service

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 1 (2011): Volume 1 Nomor 1 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (662.95 KB)

Abstract

Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to stealand modify information in the data distribution for evil criminal purpose. The Rural Bank of Boyolali is conducting online financialtransactions rather intensively, thus it requiring a security system on the distribution of data and credit transactions for their customeramong branches offices to head office. The purpose of this study was to build a security system in credit transactions in Rural Bank ofBoyolali for their customers among branches offices to head office. One way in protecting data distribution was used XML encryptionand XML signature. The application of encryption technique in XML and digital signaturein XML by using web service by using theAES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) algorithms. This study was resulted the SOAP (Simple ObjectAccess  Protocol)  message  security  system,  with  XML  and  WSDL  (Web  Services  Description  Language),  over  HTTP  (HypertextTransfer  Protocol)  to  protect  the  customers’  credit  transactions  from  intruders.  Analysis  of  examination  indicated  that  the  data  size(bytes) transferred as results of uncompressed XML encryption were larger than compressed XML Encryption, which leads to significantchanges  between  the  data  transferred  that  was  the  processing  time  of  the  compressed  data  was  faster  than  uncompressed  XMLencryption.Keywords: Web Service; HTTP; SOAP; XML Encryption; XML Signature; WSDL

Identifikasi Citra Untuk Mengidentifikasi Jenis Daging Sapi Menggunakan Transformasi Wavelet Haar

JURNAL SISTEM INFORMASI BISNIS Vol 1, No 2 (2011): Volume 1 Nomor 2 Tahun 2011
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar | Full PDF (718.603 KB)

Abstract

In this research, conducted research on the identification of the image to  identify the type of ground beef using the Haar wavelet transform. The study was intended To check the performance of Haar wavelet in identifying the types of beef. The process  of  image  processing  is  done  by  calculating  the  value  of  R,  G  and  B  in  each  image  of  the  meat,  then  do  the normalization process to get the index value of R, G and the index B index and do the conversion from RGB to a model of HSI models to get the magnitude of the hue, saturation and intensity. The resulting value of the image processing used as input parameter verification program. The highest accuracy produced by the Haar wavelet is 80% on the kind of fresh beef, fresh frozen beef, beef rotten, rotten dried beef, while the lowest accuracy was 0% for frozen beef rotten.Keywords: Identification; Haar Wavelet Transformation

Perancangan Web Komersial dan Analisis Pengaruhnya Pada UMKM Makanan Kabupaten Boyolali Terhadap Transaksi Penjualan

JURNAL SISTEM INFORMASI BISNIS Vol 2, No 1 (2012): Volume 2 Nomor 1 Tahun 2012
Publisher : Magister Sistem Informasi

Show Abstract | Original Source | Check in Google Scholar

Abstract

Penelitian berupa pemanfaatan internet atau web komersial di lingkungan UMKM Boyolali untuk memasarkan produknya menarik dan perlu untuk diteliti. Dengan sinyalemen bahwa melalui web komersial pelaku UMKM semakin kreatif mengembangkan deversifikasi usahanya dan tidak hanya menembus pasar lokal tetapi juga pasar internasional. Tujuan dari penelitian ini adalah untuk merancang sistem informasi berbasis web berwujud web komersial untuk UMKM dan menganalisis pengaruh web komersial terhadap pendapatan, biaya pemasaran dan transaksi penjualannya. Untuk mengukur pengaruh web komersial, digunakan analisis perhitungan dengan menggunakan paired samples test. Hasil yang diperoleh dari penelitian ini dengan menggunakan paired samples test adalah ada peningkatan yang positif terhadap pendapatan sebesar 9,1 % dan penurunan biaya pemasaran sebesar 48,3 %. Sehingga dapat disimpulkan bahwa penggunaan web komersial membawa pengaruh yang positif terhadap pendapatan, biaya pemasaran dan transaksi penjualan UMKM makanan di kabupaten Boyolali.   Keywords: Paired samples test; UMKM; Web Komersial