Claim Missing Document
Check
Articles

Found 25 Documents
Search

ANALISA SISTEM RESERVASI TIKET PADA PT XYZ Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 6, No 2 (2019): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v6i2.309

Abstract

The use of the computer and its systems has become a major necessity to improve the the company performance. Each of the company's manual processes can be subtituted by computers because of the provision of more sophisticated information and to support the decision making process undertaken by management. PT XYZ is engaged in serving the Tourism Services Business travel and requested by one airline of Saudi Arabia, AIR NAS (National Air Service) to become a GSA (Ground Service Agent) official in Indonesia on 19 November 2012. As Ground Service Agent (GSA), PT XYZ  serves Umrah flight ticket sales. In the system analysis conducted by the author is found a problems in the system include: the lack of a computerized and automation systems that can make the work more efficient , the reservation process is still done manually so that the customer must come to the office , the process of checking and inputting the data of available seat still done manually cause inefficient of time, the manual reporting process by collecting data from payment and ticket printing so spend much time , the ticket printing process is inefficient because after paying  the consumer must return again to the reservation. In order to minimize the existing problems, it is needed to develop information systems and computerized ticket reservation web-based in PT XYZ Keywords: Information System, Analyse, Reservations, Tickets
PERANCANGAN APLIKASI PENENTUAN HASIL KINERJA KARYAWAN AVIATION SECURITY BERBASIS DESKTOP DENGAN MENGGUNAKAN VISUAL STUDIO DAN MYSQL Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 7, No 2 (2020): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v7i2.447

Abstract

ABSTRACTDevelopment One of the most important elements in a company is the human resources department. The personnel management of a company has great influence on many aspects that determine the success of the company's work. If the human resources department is well organized, it is expected that the company can handle all business processes well. There are several limitations in personnel management. One is that with a large number of employees in a company, planning each employee's career path and the results of employee performance in the organization becomes difficult and timeconsuming, as not every HR department recognizes this closely with each of the existing employees , In this work, an object-oriented desktop analysis modeling tool and tools (Unified Modeling Language) are used to describe functional and non-functional models and diagrams that are used, namely use case diagrams, activity diagrams, component diagrams, and relation table schema. The programming language used to build this program uses MySQL with other supporting software, such as XAMPP. It is expected that the application will be a more accurate and efficient processing container, which will make it easier for administrators to input the work of the employees in accordance with the provisions of Annex 17. This application makes it easy to access and view the results of Aviation Security Employee Performance Reports, as well as to evaluate the performance of the next one. Once the phases have been run according to the chosen development method, the system for the implementation of this application no longer needs to be tested, the user questionnaire. This test uses a questionnaire that focuses on the look and functionality of this application. After testing, it can be concluded that the system can functionally produce the expected output with an advertisement that is highly interactive and facilitates users to process data and display the results of performance reports. Keywords: Desktop Application - Employee Performance, Aviation Security, Performance Assessment
PENGENALAN TEKNOLOGI INTERNET SERTA DAMPAKNYA Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 2, No 2 (2015): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v2i2.49

Abstract

With the presence of the Internet which is the development of information and communications technology, it is increasingly easy to access a variety of information internationally. The Internet is a global Interconnection Networking as a computer network on an international scale. Internet is one source of learning for all, because by using the internet to access information quickly and easily. Even the various sources of information from various media can be modified via the internet. The development of modern technology and the increasingly sophisticated not only benefits the user but also creates a negative effect for users of a country is no exception, because the Internet has become a staple for some people so it is this which can underlie a country vying for control of the internet.
CYBERCRIME (KEJAHATAN BERBASIS KOMPUTER) Alcianno Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 5, No 1 (2018): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v5i1.18

Abstract

Information technology plays an important role, both in the present and in the future. The Internet is one part of the development of information technology that has opened new horizons in human life. The Internet can be interpreted as an information and communication space that penetrates the boundaries between countries and accelerates the spread of science and simplifies all human activities.However, every positive side must have a negative side. The Internet applies in this case many crimes that can occur in cyberspace called cybercrime. Currently, we cannot feel the word "safe" in the cyber world. Various countermeasures that are considered effective are still being done to date, although not avoiding Cybercrime perpetrators, at least it can downplay the possibility of someone becoming one of the victims of Cybercrime or countermeasures when Cybercrime occurs.With so many emerging Cybercrime, a law is urgently required. The right laws and methods to prevent Cybercrime. Keywords: Internet, Cyberspace, Cybercrime, Cyber, Law.
ANALISIS SISTEM INFORMASI PENGELOLAAN DATA ALUMNI BERBASIS CODEIGNITER PHP FRAMEWORK Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 5, No 2 (2018): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v5i2.240

Abstract

Data management of alumni who still use the printed document means that data management can not be done quickly and there are still frequent errors and difficult to update. This problem can be overcome with a method that is developing the programming system. One of them with software. With this information management system software is expected to help the data management of alumni. Furthermore, the information management system software is expected to produce the information needed effectively and efficiently when in making decisions in managing human resources coming from the alumni. In order to be able to establish fellow alumni relationships for the better. Keywords: alumni data, web application, codeigniter
APLIKASI SISTEM PAKAR UNTUK DIAGNOSIS KERUSAKAN HARDWARE KOMPUTER DESKTOP PADA LABORATORIUM KOMPUTER DI SEKOLAH Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 4, No 1 (2017): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v4i1.73

Abstract

In this paper will describe the design of an application program using the programming language Visual Basic.Net, to assist in diagnosing damage to the desktop computer and find a solution to repair the hardware. By applying the diagnosis expert system on a desktop computer hardware damage is expected to ease in finding damage to computer hardware and get the right solution to repair the damage, so as to facilitate and accelerate time to repair a troubled computer. Through this expert system, we can create reports on the diagnosis of a computer, so we can print the report to be given to the technician.
ANALISIS DAN PERANCANGAN SISTEM INFORMASI PERSEDIAAN BARANG PADA TOKO XYZ Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 9, No 1 (2022): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v9i1.838

Abstract

The Inventory Information System in XYZ Store still uses the manual method, namely by recording books. With the creation of a Web-based Inventory Information System, it is hoped that it can assist in managing inventory and provide accurate information for users. This Goods Inventory Information System can assist in managing inventory, providing detailed information on the purchase of goods, demand for goods and report data on purchases of goods and requests for goods. This inventory information system is designed and built using the PHP programming language and MySQL database. Keywords: Inventory of goods, Purchase of Goods, Demand for goods, Information System, PHP, MySQL.
KONFIGURASI SISTEM KEAMANAN JARINGAN Alcianno G Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 6, No 1 (2019): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v6i1.280

Abstract

Along with the development of technology in the world of computing, human needs are also increasingly complex in its use for the development of these technologies. This is something that is only natural and supports each other between both technology and human needs. Technology will continue to be created from time to time, from the simple to the very sophisticated technology. With technology, it is expected that all human activities can be solved more easily, quickly and accurately. One of them is the existence of a network system. Through the network there are many conveniences that can be felt including sharing hardware, sharing software, facilitating communication between network users and sharing data and information more easily. Long distances are no longer a barrier to being able to get data and information quickly and safely. In network systems also need to be considered the security problem in order to avoid things that are not desirable, such as being attacked by a virus or reading data by unwanted parties.
TEKNOLOGI E-LIBRARY Alcianno Ghobadi Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 1, No 1 (2014): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v1i1.33

Abstract

As one of the facilities in the process of learning, the school library has a main function, namely education, in addition to other functions, namely the storage, preservation and recreational library materials. The usual services of the school library are the provision of reading materials for its users, namely students, teachers and employees. While for teachers, library materials in the library are expected to be used to expand the horizon of their knowledge in teaching. Similarly, employees, library materials are expected to help them to better appreciate their respective duties. For this reason the school library collection should not always be a textbook lesson. Important, broader and deeper information science usually can be obtained from various sources such as encyclopedias, magazines, journals, e-books, the Internet, e-library and other scientific text books. Meanwhile, as a recreation, students can take advantage of a collection of fiction or story books. This can be done for example by applying the e-library. E-library or a library of electronic storage of information, documents, audiovisual, graphics and materials stored in various types of media , such as printed books, magazines, reports and posters up to microfiche, slides, films, videos , compact discs, audio tapes, optical discs, magnetic tape, diskette or floppy discs, and other media being developed.
Pengamanan Komputer Menggunakan Kriptografi CIPHER BLOCK CHAINING (CBC) Alcianno G. Gani
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 3, No 2 (2016): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v3i2.65

Abstract

In cryptography, a mode of operation is an algorithm that uses a block cipher to encrypt messages of arbitrary length in a way that provides confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixedlength group of bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block.Most modes require a unique binary sequence, often called an Initialization Vector (IV), for each encryption operation. The IV has to be non-repeating and, for some modes, random as well. The initialization vector is used to ensure distinct ciphertexts are produced even when the same plaintext is encrypted multiple times independently with the same key. Block ciphers have one or more block size(s), but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the last part of the data be padded to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a stream cipher; such ciphers are capable of encrypting arbitrarily long sequences of bytes or bits.Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded integrity protection as an entirely separate cryptographic goal. Some modern modes of operation combine confidentiality and authenticity in an efficient way, and are known as authenticated encryption modes.