cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 87 Documents
Search results for , issue "Vol 1, No 2 (2010): ComTech" : 87 Documents clear
Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea Yosanny, Agustinna
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2618

Abstract

Rapid development of Information Technology causes information can access easier without space boundaries. Image is a form of information, which contains many information. Some image contains confidential information that cannot distribute to unauthorized persons. Therefore, image encryption application is create to encrypt part of image that has confidential information. The image encryption application is encrypt image by applying DES, Triple DES, and IDEA algorithms. The research was applying analysis and design methodology. The analysis methodology was undertaken through literature study and algorithm research and testing. The design methodology was undertaken through database, features, system, and screen layout design. Results of the research are image encryption application that can encrypt part of image and or all of image by applying three algorithms such as DES, Triple DES, and IDEA. This application is show comparation of these algorithms. In conclusion, method of encryption can apply to image, so that confidential information of the image can protect from unauthorized person. 
Pengendalian Intern Terhadap Sistem Pengawasan Produksi Dan Sistem Biaya (Studi Kasus PT. XYZ) Julisar, Julisar
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2347

Abstract

Business use internal control to guide their operations, safeguard assets and prevent abuses their system. Management is responsible for designing and applying five elements of internal control. The results from the evaluation of Internal Control in Production Control System and Cost System are the company has a good enough internal control in both their systems, such as, implement the segregation of duties, effective and efficiency in their manual operation procedure, controlling their documents and assets. But one thing the company needs to be done is the using of pre-numbered form. Most of all their forms have not been a pre-numbered form.
Solusi Deret Pangkat Tetap Dengan Fungsi Pembangkit Gunawan, Alexander A.S.
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2409

Abstract

This article discusses about the sum of powers , which closed solutions empirically have been discovered by Jacob Bernoulli in 1731 in The Art of Conjecture. In this paper, we will find a closed solution of the sum of powers by using the Generating Function. By learning how to derive the closed solution of the sum of powers, the Generating Function can be used to solve the more general series forms.  
Analisa dan Perancangan Sistem Informasi Akuntansi Penjualan (Point of Sales) pada Koperasi Karyawan Bina Nusantara Udiono, Tangkas
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2668

Abstract

The diversity of the sales transaction and the high frequency of sales in retail stores now requires store owners to be gave the best service is speed and accuracy of the data presented remains the main choice, not to mention the number of items owned, couse enormous amounts sometimes cause difficulties to provide a unique characteristic feature of each item. Cash register machines are not able to gradually overcome the kinds of sales that various kinds, and happens due to the emergence of the sales transaction itself such as the purchase or cancel the presentation of consolidated sales. So the point of sales aims to cover all the deficiencies that existed at the machine registers cash 
Building Learning Culture Towards A Learning Organization to Empower Employee’s Knowledge Maryani, Maryani; Donna, Marihut; Hapsari, Nilam
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2700

Abstract

This paper contains the application of knowledge management in PT Unilever to create a learning culture within the organization. Which consists of: knowledge sharing, informal sharing, online sharing and other sources. With the implementation of cultural sharing between employees, the module is already owned by PT Unilever as many as 250 modules. With the application of Knowledge Management PT Unilever awarded a global level, the Most Admired Knowledge Enterprise (MAKE) Award in the year 2005-2007 to the level of Indonesia and 2008 for the Asian level. In the end, knowledge-owned companies, creating a good performance by individuals or companies, and will create sustainable growth for the company. Sustainable growth is what is expected by the whole company in running its business activities. 
Pemanfaatan Video Streaming Pada Sistem Keamanan Rumah Dengan Menggunakan Mobile Devices Mahatmaputra, Samuel
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2370

Abstract

This research has been produced a function prototype of video streaming with JPEG/MJPEG picture quality in a residential security system using mobile device (cell phone). The security system is an early warning system which server will deliver text messaging to client if there is an event in the censor of home webcam to detect movement. The prototype is divided into two types, server and client. The client will be installed a mobile application that automatically activated if there is inbound message in specific port. Meanwhile, the application in user client is completed with functionality to visit particular webpage, one touch call to security phone numbers to do setting (previous research result). And, as the research objective this year, user will see the video streaming in a good quality from the object. 
Peranan Teknologi Informasi dalam Pengembangan E-Learning pada Fakultas Mipa di Indonesia Polla, Gerardus
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2659

Abstract

The fast development of information technology has changed paradigm of human life in almost all aspects and their activities, including education. This paper is purposed to discuss about IT ability and its function in supporting all education events and activities. One of education need development alternatives in science and mathematics (MIPA) faculty in Indonesia is the needs of IT development that could support long distance educational system in a virtual university form. This paper also describes about how IT support educational theories like constructivist, colaborative learning that has been transformed in learning method from teacher-centered into student-centered in creating student culture of self-learning in MIPA faculty. 
Analisis dan Perancangan Sistem Karcis Elektronik Pada Gerbang Masuk Busway Dengan Menggunakan RFID Liawatimena, Suryadiputra
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2650

Abstract

The aim of this study is to use Radio Frequency technology to facilitate human activities, especially used in Busway entrances. In this research methodologies used include field survey to the BP Transjakarta; literature study by reading manuals, text books, journals, and articles on the Internet, and conduct laboratory experiments on the Bina Nusantara University Hardware Research Laboratory in designing and making the minimum system . Based on the results of an experiment and taking data on the minimum system, it can be concluded in general the performance of the system is running well, but the response time was not optimal. Some improvements to the system needed to improve system performance, such as raising response time, improved data security, and online systems. 
Pemanfaatan Web Application Dalam Peningkatan Efisiensi dan Efektifitas Kerja Administrasi (Studi Kasus: Pemesanan dan Pembuatan Surat Keterangan) Reina, Reina
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2568

Abstract

The purpose of this study was to determine the extent to which the use of a web application to improve efficiency and effectiveness of administrative work. The research method used consisted of the analysis phase, study libraries to support application design and data collection based on observations. Results of evaluation and observation data before and after implementation of the system showed that the use of a web application to improve efficiency and effectiveness of administrative work, e.g. by decreasing the length of time the making of letter, an increase in the percentage of the making of timeliness, accuracy of data validation and provide facilities for students in order letter as well as convenience for staff in the making of letter. Another thing is the ease in monitoring the accuracy of the making of letter. 
Keamanan Dalam Electronic Commerce Wajong, Andre Michael Ricky; Putri, Carolina Rizki
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2623

Abstract

The objective of this paper is to give information and understanding about security threat that could happen in security system in e-commerce. The approach used is how the transaction system is, how the security is applied, and also the possible security threat in e-commerce. The result of this research is that there are still gaps in e-commerce. It is hoped that the business actors will be more realized about the security importance and more aware about the possible threat. 

Filter by Year

2010 2010


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue