cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Computer Engineering
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
This e-Journal consists of research and scientific publications of the Computer Engineering, STMIK Jakarta.
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "2003" : 6 Documents clear
USE OF SOFTWARE PROGRAMS AS ZERO Fill HELP IN OVERCOMING THE PROBLEM AROUND HARD DRIVE Eko Prasetyo Nugroho; Fivtatianti Fivtatianti, Skom, MM
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Zero Fill, is a software tool programs that are designed for hard disk drive specially branded Quantum. This software is a tool programs that function to format the hard drive. Where is the type of format here is the first format or in other words the software to format the hard drive is working under conditions of low- level or commonly referred to as a low- level format. The advantages of this software is able to fix and remove all existing data within the disk, such as files, folders, directories, file table, partition, boot record and the virus if it exists, so that the drive you've experienced the process of Zero Fill, existing data on the disk is not can be recovered.
MODULE DESIGN DOT MATRIX LCD 16x2 DISPLAY TEXT FOR WALKING CHARACTHER MICROCONTROLER AT89C51 Erwin Kurniawan; Drs. Soebijantoro, MMEng Drs. Soebijantoro, MMEng
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

World of advertising is very necessary in every large and small companies, with theexistence of any advertising that is placed where it will be increasingly well knowncompany. But the ads need to be made very attractive to the recipient information in alanguage that is easy to remember by using the electronic ads to appear moreattractive with the current character format varied.In this tool is used as a viewer character LCD (writing) runs. The key pad functionsas a giver of the input signal to determine the current paper format. Obviously to beable to run the text-based microcontroller, the need for programs that can control it.
TECHNICAL ANALYSIS OF SECURITY AND WIRELESS LAN SOLUTION Muhammad Yudhistira; Fivtatianti H, S.kom., MM
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Most of the Wireless LAN (WLAN) currently use the 2.4 gigahertz frequency band(GHz), the only part of the radio spectrum frequency (RF), which is left in the worldwho have yet to perangakat license.By using the Wireless LAN RF means that clients are located in the service accesspoint (AP) can receive data transmitted from the access point. Because radio wavespropagate through the ceiling, floor or wall, the data transmission can reach intendedrecipients who are not in the room a different building or outside the building that hasthe AP.802.11 WLAN protocol standard that has many weaknesses in terms of security. Ahacker / intruder with easy to use analysis software to identify the 802.11 Service SetIdentifier (SSID). By using these utilities, a hacker can monitor frames sent over theWLAN.Wired Equivalent Privacy (WEP) which is used to encrypt each set of frames, but ahacker can easily break the WEP encryption of information after an active networkmonitoring.
MODEM PLC AS ONE COMPONENT OF THE INTERNET CONNECTION VIA POWER CABLE Mohamad Fauzi; Luyung Dinaini, SKom, MM
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Communication via the power cord (Power Line Communication), is something the local loop network technology, known as a technology "Las Mile", which utilizes telecommunications network Infrastructure. In Indonesia it is still common. however, the parties involved in this case the PLN (State Electricity Company) has been disseminating the use of electrical cable as a medium of computer networks, eg for accessing the Internet and collaborate antarkomputer very quickly. PLC technology has many advantages, diataranya terms of the cost of using the Internet with modern furniture is very cheap because the PLC is used that is fixed tariff rate, where in so we can pay to use the internet service this month both internet usage and long distance telephone, modem berbedadengan ordinary all use electricity and telephone tariffs, so that both of them became swollen fees (expensive), another advantage is speed of data transfer where the data access rate of about 3.2 up to 5.6 megabits per second. This is the same value as in the use of cellular networks for personal and internet access was very adequate. meaning for the transfers amounted to 50 Megabytes of data, only takes about one minute, another advantage that is flexible, and access without cable, so that using reknologi PLC can be made as a means to accelerate the improvement of the quality of human resources and their economic growth in Indonesia in general.
CAR ALARM SYSTEM WIT H DESIGN DELAY TIME Ersyat Andi Pribowo; Fivtatianti Hendajani, SKom, MM
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

There are many alarms that have been made of people, i n general, the alarm system is switched on or off via a switch that is placed outside the car seat, or car refueling site.  Alarms are made in this writing, has a switch which is placed in the lounge car. At the time of turn on the switch, the alarm system is inactive for a while until the owner of the car is outside the car. In an active alarm system, if the car door is opened, the alarm started counting up the numbers that have been determined, the new alarm will provide warning signals such as sirens, hor ns honking, the lights of my life and the engine switched off or not. This warning signal is only live for a while, and then the alarm will be active again. It was a matter for the owner an opportunity to ensure the alarm system so that the warning signal will not be alive.
WORKING ALARM SYSTEM ANALYSIS USING PASSWORD Andrie Dwi Apriano; Lingga Hermanto, Drs, SSI, MM
Jurnal Sistem Komputer 2003
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Statistics show that each year a robbery in our country growing, the robbers did nothesitate to commit an act of violence against his victims even to commit murder.Most robberies occur by opening a door or window with one way. The simplest wayto combat this robbery is by preventing the open door or window with a lock.To reduce the increase in robberies of symptoms that often occur in our countryespecially in major cities, the author wants to put forward a robbery alarm system.Not a professional and expensive, but a simple and inexpensive system, but very ableto prevent the robbery and the robber so shocked and terrified him to cancel hisintention to conduct the robbery.

Page 1 of 1 | Total Record : 6