Tuesday, June 16, 2009

Final Test Fadilah Oky K. (065.07.007)

DESIGN ATTENDANCE APPLICATIONS LABORATORY
USING THE COMPUTER SYSTEM VERIFICATION
USER IN Trisakti University



Fadilah Oki Kurniawan
Jurusan teknik informatika
Fakultas teknologi industri,Universitas Trisakti
Jln.Kyai Tapa No. 1 Grogol Jakarta Barat
Email : fadill_ocee@yahoo.com


Abstract
Trisakti University as one of the universities in Jakarta has
computer laboratory for practical activities. Although, Maranatha Christian
University has owned an absence application which records the user's accessing the
computer in the laboratory, but the system can not track whether the user sit on its place
correctly or not. For that reason SMEs need a system to control and minimize the
risk of lost and damage the keyboard, mouse and computer table because the data have
Recorded in a database.
The main purpose of this research is to make a laboratory tracking absent
system software to record the use of computer laboratory facilities.




I. Introduction

At the time of this rapidly developing technology. The development of this technology increased the demand of human resources (HR), which have competence in the field and the technology to solve the problem that faces.
Trisakti University as one of the universities in Indonesia have been realized so that it provides facilities - facilities that help students and student learning. One of the facilities provided by the SME is a computer laboratory. Provision of this facility requires a control. These aim to be the facility can be maintained well.
In fact many computer and laboratory facilities in the computer are often damaged. This is evidence of damage is still the weak control of the system. Damage is generally caused by the student or the student is not responsible. Identification of the student or the student is very difficult because there is no record of a computer in the computer laboratory that can record and deny access when students enter the computer or student does not have the right to use computer.
Therefore the author tries to build an application controlling the computer in the computer laboratory that can record the entry and deny access if the computer user is not entitled to use the computer. With this application the laboratory that can be controlled well, so that the computer laboratory facilities damage caused by the student or the student is not responsible for initialization can be prevented and the computer by the students or the student is not entitled to can be overcome.
Attendance this application will handle:
1. The computer records that the student or student use.
2. Reports that the computer can be used as evidence of the use of
computers by students or student.
3. Protection against computer laboratory by the students or the student does not
entitled to use the computer.

II. Platform Theory

II.1 UML (Unified Modeling Language)
UML is a permodelan used at this time to
represents a unity of concept - the concept and notation used for
memodelkan a problem. The goal of UML was to become a common language used to create the object model that is based on the development of computer engineering.
UML memodelkan a program in the form of classes and objects. Class is the "pattern" of an object. Of a class can be made many similar objects.
Example: from a pattern xxx clothing brand, can be made a lot of (the object) xxx clothing brand, which has red, blue, green, and so forth.
Objects are things that have a nature.
Example:
Object: Bicycles
Characteristics: Color
Action: Rem
Object: Stone
Characteristics: Color
In the object program is a combination of variables and functions related to each other. Nature
object is often referred to as property and the action is often called the most method.Perbedaan light between the classroom with the class nature of the object is not terdefenisi while the object is terdefenisi.
The goal of this class diagram is to create a class to become a
model. In object-oriented application, classes have attributes, operations and relationships
with other classes. UML class diagram in this case can memodelkan with Sangay easy. Dimodelkan a class with a rectangle that has three parts. The top of the class name is then the attribute is set - the attributes of that class, and the bottom is the operation performed by the class.

II.2 Database (Database)
The database consists of two words, and the data base. The base can be defined as
storage while the data is a representation of the real world, which represents
an object is recorded in the form of numbers, letters, symbols, text. The principle is the main database for the data and the main goal is simplicity and speed in the return data.
The database used to store, retrieve and manipulate data almost
all types of companies, including business, education, hospitals, government and
library.
The database can avoid the data redudancy. Data is redudancy
duplication of data where some files have the same data so that the
dissipation capacity storage media. By using the database, change,
the addition and deletion of data more easily dilakukan.Basis data also support the initialization of a shared resource - the same by more than an application.
Database system is better known by the term Database Management System
(DBMS).
DBMS is a system of storage and the data that allow
some applications to access data in an integrated system so that it does not
occur redudancy data and data integrity can be maintained. Here is a picture of a DBMS that manage data storage in a database and served as a link between media applications with the database.

Examples of DBMS are:
• Oracle
• SQL Server
• Informix
• DB2




IV. Conclusion and Suggestions

This application has the ability as follows:
1. Saving the student that consists of a number of students and the name
students.
2. Computer stores information that consists of IP and computer name of the computer.
3. The computer stores information.
4. Impede access by the user entry that is not entitled or which are not listed.
In addition to these applications have the ability also has some deficiency that must be considered, namely:
1. The installation must use the default path. This is because this application has not been
have the ability to determine the directory path.
2. Access entrance to the windows operating system using a 'safe mode' so that the user is still allowed to know the local administrator password can access komputer.oleh recommended because it can save the administrator password with the password and make changes periodically.
3. Configuring the application is still in the form of a text that does not tersandikan (no encryption).

V. References

[1] Manfre, M. Creating A Windows Service with C #.
[Access Date: 25 October 2004]. [http://www.devhood.com].
[2] Schult, W. and A. Polze. Aspect-Oriented Programming with C # and. NET. Hasso-Plattner-Institute. Potsdam University, Germany in 2004.
[3] Object-Oriented Frameworks for Network Programming. Access Date: October 27, 2002].
[4] SoftTech Developer.Get Current logged on user.
[Access Date: 25 October 2004]. [http://www.planetsourcecode.com].

No comments:

Post a Comment