scholarly journals Analisis Keamanan Dalam Desain Database PMB (Penerimaan Mahasiswa Baru) Dengan MySQL

2020 ◽  
Vol 5 (4) ◽  
pp. 314
Author(s):  
Sofyan Pariyasto ◽  
Ema Utami ◽  
Suwanto Raharjo

Keamanan dalam desaian suatu database merupakan hal yang sangat penting untuk diterapkan dalam membangun sebuah sistem informasi. Sering kali dalam implementasi keamanan database tidak begitu diperhatikan, baik dari segi tipe data, panjang data, maupun paramter yang berkaitan dengan transaksi data. Kesalahan dalam desain database biasanya baru akan disadari pada saat aplikasi sudah selesai dan sudah digunakan. Untuk memastikan sebuah sistem informasi berjalan dengan lancar maka akan digunakan analisa data berdasarkan rentang data tertinggi dan data terendah. Dengan menggunakan analisa rentang data maka data yang nilainya lebih rendah dari paremeter yang ditentukan akan dirubah ke nilai terendah yang sesuai dengan paramter. Begitu juga data yang nilainya lebih tinggi dari paramter yang telah ditentukan akan dirubah ke nilai tertinggi yang sesuai dengan parameter. Dari hasil pengujian yang dilakukan sebelum adanya filter check dan patameter tipe data dengan memasukan data yang berupa huruf, angka minus serta angka yang melebihi batas atas pada kolom nilai, data masih bisa tersimpan ke database. Pengujian selanjutnya dilakukan dengan memasukan angka -2,-3,-4,-5,-7,-7 serta angka diatas ambang batas atas 12,13,14,15,16,17, dari hasil pengujian yang dilakukan dapat disimpulkan bawah sebuah database dengan fungsi trigger jauh lebih aman dibandingkan dengan database yang hanya menerapkan fungsi pembatasan berdasarkan tipe datanya saja.Kata Kunci —Keamanan Desain Database MySQL, Analisis Keamanan DatabaseSecurity in the design of a database is very important to be applied in building an information system. Often in the implementation of a database security is not given much attention, both in terms of data types, length, and parameters relating to data transactions. Errors in database design are usually only noticed when the application is complete and has been used. To ensure an information system runs well, data analysis will be used based on the highest and lowest data ranges. By using data range analysis, data whose value is lower than the specified parameter will be changed to the lowest value in accordance with the parameters. Data whose value is higher than predetermined parameters will be changed to the highest value in accordance with parameters. Results of tests conducted before the filter check and data type patameter by entering data in the form of letters, minus numbers and numbers that exceed the upper limit in the value column, data can still be saved to database. Further testing is done by entering the numbers -2, -3, -4, -5, -7, -7 and numbers above the upper threshold of 12,13,14,15,16,17, from some of the results of tests conducted can be concluded below a database with a trigger function is more secure than a database that only applies restrictions based on its data type.Keywords— Security Database Design MySQL, Security Analysis Database

2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Ana Paula Henriques de Gusmão ◽  
Cristina Pereira Medeiros

This paper arose from the perceived need to make a contribution towards assessing a strategic information system by using a new method for eliciting the weights of criteria. This is considered one of the most complex and important stages in multicriteria models. Multicriteria models have been proposed to support decisions in the context of information systems given that problems in this field deal with many conflicting criteria. The new procedure for eliciting the weights of the criteria has the advantage of requiring less effort from the decision-maker and, thus, the risk of inconsistent answers is minimized. Therefore, a model based on this new procedure is proposed and applied using data from a glass packaging factory that needs to select a single information system from a set of systems previously identified as relevant. The results obtained are consistent both with the performance of alternatives and with the additive model used to evaluate the alternatives.


JURNAL PUNDI ◽  
2019 ◽  
Vol 3 (1) ◽  
Author(s):  
Gusti Cahyani ◽  
Dewi Zulvia

This study attempts to know how big the influence of ethics audit ( x1 ) and fee audit ( x2 ), simultaneously and partial on the quality of an audit ( y ) in office accountant the public city, using data collection method in the form of a questionnaire about 66 respondents.In the analysis data using the validity, reliabilitas.dan the assumption that the classic normality, multikolinearitas, heteroskedastisitas.The method of analysis used analytics linear regression multiple regression, the determinan, the f, the t, and the r2 by using the tools spss16.0.The result showed, the audit ethics have influence on variables quality program audit fees in the research also has an effect on variables the quality of a partial audit and simultaneous.


2021 ◽  
Author(s):  
Raissa Barreto Lima ◽  
Thaís Machado Belitardo de Carvalho ◽  
Matheus Campos Ribeiro de Souza ◽  
Lara Teixeira de Oliveira ◽  
Ana Carolina Pachêco de Menezes Rios ◽  
...  

Background: Neural tuberculosis is an infection of the central nervous system caused by the bacterium Mycobacterium tuberculosis. Bearing in mind that neural tuberculosis is the most severe form of extrapulmonary tuberculosis and results in significant morbidity and mortality rates, it is important to analyze its sociodemographic characteristics in Brazil. Objectives: To describe the sociodemographic characteristics of neural tuberculosis cases in Brazil in the period from 2010 to 2020. Design and Setting: Cross-sectional, retrospective, and descriptive study, carried out using data collected from the Notifiable Diseases Information System (SINAN) and the Hospital Information System (SIH / SUS) of confirmed cases and hospitalizations for neural tuberculosis. Methods: Variables used: region, sex, age group, color/race and year of service. Results: In the period from 2010 to 2020, the number of notified cases of meningoencephalic tuberculosis was 7.451, with mean cases per year of 677.36. The Southeast region was the most affected with 43.8% of the total cases, followed by the South and Northeast regions, with 24.1% and 20.1%, respectively. There was a wide predominance in individuals aged 30-39 years (42.8%) and in the age group 40-59 years (35.9%). The male sex was the most affected with 63.3% of the total. Conclusions: The study shows a predominance of cases in the South and Southeast regions, with a significant prevalence of males and age groups of 20- 59. This could be an alert for new prevention and health promotion strategies for the most affected groups.


Author(s):  
Nur Indah Dwi Susanti ◽  
Rima Vien Permata Hartanto ◽  
Mohammad Muchtarom

<p><em>The objectives of research were (1) to find out the forms of modelling in Personality Competency of Civic Education teacher in SMP Negeri 1 Mojolaban, and (2) to find out the implication of Civic Education teacher’s modelling to creating the students’ discipline character in SMP Negeri 1 Mojolaban. This research employed a qualitative research approach, with descriptive qualitative research type. Data source derived from informant, place, event, and document. The sampling technique used was purposive sampling one. Techniques of collecting data used were interview, observation, and document analysis. Data validation was carried out using data and method triangulations. Data analysis was conducted using an interactive model of analysis.  Considering the result of research, the following conclusions could be drawn. (1) The forms of role model in personality competency of Civic Education teacher were as follows: The personality of a disciplined teacher, democratic, patient, tolerant, broad-insight teacher personalities. (2) The implication of Civic Education teachers to the creation of students’ discipline character was as follows: the students could receive and imitate one of Civic Education teachers’  modelling, indicated with their coming early to classroom when the lesson began, students completing school attribute and uniform, students attending the lesson in the classroom and no truancy, students always attending flag ceremony, and maintaining the cleanliness at school. However, role model is the most decisive factor in creating the students’ discipline; it could be seen from the students showing the discipline character only in the classroom Civic Education teachers class VII while the other teacher’s class had not shown the discipline character yet.   </em></p><p><em> </em></p><strong><em>Keywords:</em></strong><em> Personality Competency, Civic Education, Modelling, Discipline                                      Chara</em>


2015 ◽  
Vol 14 (1) ◽  
pp. 64-70
Author(s):  
Suryadi Suryadi

Abstrak Tujuan penelitian ini adalah untuk memahami secara komprehensif strategi retorika dalam wacana opini surat kabar. Metode yang digunakan adalah anaksis isi (content analysis). Data dikumpulkan melalui seleksi pada wacana opini Surat Kabar Kompas mulai Januari sampai dengan Desember terbitan tahun 2013 dengan topik yang sama, penuks berbeda. Berdasarkan penektian yang telah dilakukan dalam wacana opini Surat Kabar Kompas penuks opini cenderung menjelaskan sehingga ragam yang dipilih berupa ragam eksplanasi meski opini termasuk eksposisi. Strategi retorika yang digunakan penuks cenderung menggunakan pembenaran (46,4%) yang lebih bersifat subjektif dibanding strategi data yang paling sedikit digunakan (3,6%). Kata Kunci: strategi retorika, wacana opini, eksposisi, eksplanasi. Abstract The aim of the research was to describe the rhetorical strategy using in Kompas opinion texts comprehensively. The content analysis using to analyse the data, the opinion text from Kompas January to December 2013 from different writer with the same topic. The result showed that writer tend to using explanation rather than exposition. The rhetorical strategy mostly that writer using was warrant (46,4%) and very title using data strategy (3,6%). Keywords: Rhetorical strategy, opinion text, exposition, explanation


Author(s):  
P.J. Lee

A basin or subsurface study, which is the first step in petroleum resource evaluation, requires the following types of data: • Reservoir data—pool area, net pay, porosity, water saturation, oil or gas formation volume factor, in-place volume, recoverable oil volume or marketable gas volume, temperature, pressure, density, recovery factors, gas composition, discovery date, and other parameters (refer to Lee et al., 1999, Section 3.1.2). • Well data—surface and bottom well locations; spud and completion dates; well elevation; history of status; formation drill and true depths; lithology; drill stem tests; core, gas, and fluid analyses; and mechanical logs. • Geochemical data—types of source rocks, burial history, and maturation history. • Geophysical data—prospect maps and seismic sections. Well data are essential when we construct structural contour, isopach, lithofacies, porosity, and other types of maps. Geophysical data assist us when we compile number-of-prospect distributions and they provide information for risk analysis.


2012 ◽  
Vol 3 (1) ◽  
pp. 21-30
Author(s):  
Jean Damascène Mazimpaka

Spatial databases form the foundation for a Spatial Data Infrastructure (SDI). For this, a spatial database should be methodically developed to accommodate its role in SDI. It is desirable to have an approach to spatial database development that considers maintenance from the early stage of database design and in a flexible way. Moreover, there is a lack of a mechanism to capture topological relations of spatial objects during the design process. This paper presents an approach that integrates maintenance of topological integrity constraints into the whole spatial database development cycle. The approach is based on the concept of Abstract Data Types. A number of topological classes have been identified and modelling primitives developed for them. Topological integrity constraints are embedded into maintenance functions associated with the topological classes. A semi-automatic transformation process has been developed following the principles of Model Driven Architecture to simplify the design process.


2019 ◽  
Vol 118 (3) ◽  
pp. 289-306 ◽  
Author(s):  
Zachary Wurtzebach ◽  
R Justin DeRose ◽  
Renate R Bush ◽  
Sara A Goeking ◽  
Sean Healey ◽  
...  

Abstract In 2012, the US Forest Service promulgated new regulations for land-management planning that emphasize the importance of scientifically credible assessment and monitoring strategies for adaptive forest planning and the maintenance or restoration of ecological integrity. However, in an era of declining budgets, the implementation of robust assessment and monitoring strategies represents a significant challenge for fulfilling the intent of the new planning rule. In this article, we explore opportunities for using data and products produced by the USDA Forest Service’s Forest Inventory and Analysis (FIA) Program to support the implementation of the 2012 Planning Rule. FIA maintains a nationally consistent statistical sample of field plots that covers most national forests with hundreds of plots. We suggest that leveraging FIA data and products can generate efficiencies for assessment, planning, and monitoring requirements detailed in the 2012 Planning Rule, and help fulfill the adaptive intent of the new planning rule. However, strong national leadership and investment in regional-level analytical capacity, FIA liaisons, and decision-support tools are essential for systematically realizing the benefits of FIA data for forest planning across the National Forest System.


Sign in / Sign up

Export Citation Format

Share Document