ComTech: Computer, Mathematics and Engineering Applications
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Articles
87 Documents
Search results for
, issue
"Vol 1, No 2 (2010): ComTech"
:
87 Documents
clear
BFC Method For Prediction of Transient Head on Seepage Path
Hartono, Sherly
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2612
Seepage causes weakening of levees and can cause levee failure or overtopping due to levee settlement. A numerical method, called the boundary fitted coordinate (BFC) method, was developed to determine seepage through a levee and the transient head on the seepage path due to the changing water level during a flood. The BFC transforms the physical coordinate system into a computational curvilinear coordinate system. The grid generated in this method accurately represents the boundary of the system regardless of its complexity.
Simulasi Penggunaan Ipv6 Pada PD. Pumas Jaya Menggunakan Metode Manual Tunneling
Elidjen, Elidjen;
Tanun, Shellyana;
Santoso, Budi;
Citronegoro, Cipto
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2571
Internet usage trends with IPv4 addresses that only have 32-bit addresses could no longer cope with the large allocation of the required addresses. Internet Engineering Task Force (IETF) has issued a new standard of Internet protocol called IPv6 to anticipate this problem. PD. Pumas Jaya, which started in 1996 in the field of marine products in particular marinated seafood, such as salted fish, rebon shrimp, cuttlefish, anchovies and other marine products to anticipate the need for this in its network. However, IPv6 can not simply be used to replace IPv4 as the existing network infrastructure with IPv4. This research discussed IPv6 simulation tunneling with manual methods so that an IPv6 site can communicate with other IPv6 site even if separated by an infrastructure that supports only IPv4.
Analisis dan Perancangan E-Learning Sebagai Fasilitas Pendukung Proses Pembelajaran (Studi Kasus: SMAK Kalam Kudus Ii )
Putranto, Agus;
Gautama, Idris;
Citra, Daniel
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2560
Information and technology nowadays develop rapidly in every sector, including in education. Saome problem occurs in studying process, so that needed a system which is able to produce an E-Learning aplication that can be used to support the studying process at SMAK Kalam Kudus II. This observation try to analyze and design an E-Learning aplication at SMAK Kalam Kudus II. The final result is an E-Learning aplication that can be used to support the studying process at SMAK Kalam Kudus II between teachers ad students and also a facility such as lesson?s schedule, test? schedule, download lessons and tasks, score and a media like forum that can link between parents and teachers.
Pemantauan dan Pengaturan Proxy Server Dalam Pengaksesan Internet Dengan Otentikasi Berbasis Web
Santoso, Januar;
Wijaya, Normandito;
Siswandi, Khowi
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2594
The quick expanding user of World Wide Web (WWW) has been made a development in proxy server in limited access to the users. Therefore, it needs the limit with designing and implementing proxy server configuration system and authentication in internet web-based usage so it will ease in supervising and using internet facility. The method used is analysis and web-based system design. The expected result is the easier in supervising and controlling internet facility using proxy server and reducing the leaking of internet facility usage through authentication (security).
Analisa Perencanaan Strategis Sistem Informasi di Departemen Manajemen Aset Bina Nusantara
Arifin, Firman
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2626
The objective of this paper is to analyse portofolio application and information technology that is used today in Asset Management Department of Bina Nusantara so it could be made a strategic planning information system that could accommodate business needs. The discussion is focused to a strategic analysis that is applied today and its improvement in the future including information technology structure. The conclusion from this paper is along with a good information technology strategic planning, expected work effectivity and efficiency could be reached.
Perancangan E-Learning Dengan Pendekatan Addie Model (Kasus : Mata Pelajaran Bahasa Inggris – SD Ipeka Tomang)
Siswono, Siswono;
Liona, Yurika
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2354
Problem faced by SD IPEKA Tomang is not reaching its predicted target in English subject. This is caused by less understanding among students in important parts of English which reflected in making sentences or writing essays. Teachers have difficulty in explaining about grammar usage to students, which is the basic knowledge in making sentences. In order to avoid this problem, SD IPEKA Tomang is adding or replacing the teaching media into a computer media. In doing this analysis and designing of e-learning is using ADDIE Model approach. This research is done through stages of analysis, design, and development. Analysis stage uses Gap Analysis approach to understand the needs of e-learning.
Meningkatkan Kualitas Blended Learning: Case Study Menggunakan CoI Model
Asalla, Lydiawati Kosasih
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2585
This article discusses several considerations in the education industry to achieve good quality learning by using advances in technology such as blended learning, and it uses the Community of Inquiry model as a comparison to raise quality of the blending learning program. Other aspects include on how to raise quality of a discussion as an improvement of knowledge management.
Latex Sebagai Alternatif Aplikasi Untuk Penulisan Jurnal Comtech
Kanigoro, Bayu;
Moniaga, Jurike V.
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2386
Tulisan ini akan memaparkan penggunaan TeX/LaTeX sebagai alternatif dalam penulisan jurnal ComTech dengan menjelaskan instruksi-instruksi LaTeX yang digunakan untuk mengatur tampilan judul tulisan sampai dengan tubuh tulisan sesuai dengan spesifikasi yang telah ditetapkan jurnal ComTech. Hasil dari kompilasi tersebut mendekati susunan format yang telah ditetapkan oleh jurnal ComTech yang dipersiapkan untuk pengolah kata Word Processor.
Pemanfaatan E-Application Dalam Peningkatan Proses Audit Mutu Internal (Studi Kasus : Universitas Bina Nusantara)
Tho, Cuk;
Wihendro, Wihendro;
Kurniawan, Yohannes
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2408
This paper shows the use of e-application to assist the implementation of internal quality audit, which is one of the conditions to be met within the requirements of ISO 9000 Quality Assurance System. E-application that is used other than as a data repository is also used as a workflow. Where is the workflow that is made will ensure that the repairs is carried out in accordance with what has been planned. As one of the ISO documentation requirements in Clause 4.2.4 that a document should be done traceable, then the use of e-application is very helpful in conducting the search trail. In addition, the e-application allows auditors and auditees in filling the audit results, since it can be accessed from anywhere as well as due to web-based, it can be done from any computer without the need of an installation. E-application that was developed to function as a workflow and data repository that can be used as part of monitoring and data history which will help to improve the performance of the unit hence also improves performance of Bina Nusantara University.
Analisa dan Perancangan Jaringan Berbasis VPN Pada PT. Finroll
Kerta, Johan Muliadi;
Wennoris, David;
Gunawan, Tonny;
Erny, Erny
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2576
Along with the development of the company to run operations such as data communication and perform other transactions to relations and vice versa, PT Finroll just uses the public network such as sending email to their partners. Data information is not safe in public because it can be tapped or intercepted by unauthorized person. With the Virtual Private Network (VPN), PT Finroll can do business in secure environment to their partners. The methodologies used in this research are data collection that was started by surveying, interviewing, and analyzing the current network topology, performance and design requirements that support network design. From these results, PT Finroll can increase productivity and performance from competition in their business. In addition, with this research company has a better ability to increase their competitiveness in present and the future.