cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 77 Documents
Search results for , issue "Vol 2, No 2 (2011): ComTech" : 77 Documents clear
Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT) Kerta, Johan Muliadi; Adiprabowo, Panji; Kusmiyati, Eva; Rahardjo, Sylvia Astri Wulandari
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2838

Abstract

Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On system that utilizez Lightweight Directory Access Protocol (LDAP). In addition, Remote Authentication Dial-In User Service (RADIUS) is managed in accordance with the needs of the institution. Single Sign On system designed runs well and is able to provide conveniences for the user to use the services of existing applications, as it provides a standard email address to the user's identity. It also helps administrators to perform control of users trying to login. 
Penerapan Teori Motivasi dalam Perancangan Aplikasi Edutainment Soegandi, Andreas; Halim, Adriani
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2935

Abstract

The purpose of this study was to develop an edutainment application which engages user’s interest like a game application does. The application development implemented motivation theory by Malone and Lepper. The result of this study showed that implementing Malone and Lepper’s motivation theory on edutainment application concerning global warming gives positive result in engaging user’s interest. This application is expected to enhance user’s awareness about global warming. 
Editorial Page and Table of Content Manik, Ngarap Imanuel
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.3277

Abstract

Aplikasi Migrasi Database dan Replikasi Bi-Directional Ricky, Michael Yoseph
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2828

Abstract

This study aims to analyze and design a migration and replication configurations in an enterprise using several methods such as literary study and direc survey to the company; analysis on hangar systems, process migration and replication as well as existing problems; and a prototype design for migration process implementated with Oracle SQL Developer and replication process implementated with Oracle GoldenGate. The study resluts ini a prototype for migration and replication configuration processes using Oracle's Golden Gate which can produce two sets of identical data for backup and recovery. Also a simple tool is designed to assist active-active replication process as well as active-passive one. The migration process from MySQL database to Oracle database using Oracle GoldenGate can not be done because GoldenGate Oracle has bugs related to the binary log, so database migration is done using Oracle SQL Developer. However, bi-directional replication between Oracle database using Oracle GoldenGate can ensure data availability and reduce the workload of primary database. 
Penelitian Morfologi Teritisan dengan Sistem Kinetik dan Efektifitasnya pada Bangunan Kantor Sjarifudin, Firza Utama
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2926

Abstract

Shading device serves as a shade and protection against negative influences caused by the uncertain external conditions. This article discusses the study of kinetic shading system and evaluates its effectiveness against a wide range of environmental factors and their effects on building. The study performs simulation of thermal factors, day lighting, airflow, and energy generation. Morphological types of shading device to be tested are systems of overhang, folded, horizontal louvre, and vertical louvre. The test results demonstrate that kinetic system obtains more advantages and effectiveness than the standard and static systems do. Therefore, it can be concluded that this study is able to be used as a reference for designing kinetic shading device which is responsive to environmental factors. 
Evaluasi Sistem Informasi Penjualan Kredit dan Piutang Dagang Karmawan, I Gusti Made
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2958

Abstract

This study evaluates the implementation of management control and internal controls in application of sales systems information as a basis to support and produce accurate information in decision making. The methods used are bibliography study, interview, observation and questionnaire in the form of check lists. Following is an analysis conducted on the survey findings and the identification of strengths and weaknesses of internal control. Then audit is performed using Audit around the Computer method. From the evaluation results obtained the strengths and weaknesses of internal control. Weaknesses are found to be expressed in the form of problem findings, the potential risks and recommendations for corrective actions. This study succeeded in obtaining the evaluation results for boundary control, input, output, security and operational in the information system of credit sales and account receivables. 
Sonic Logging Vs PIT untuk Mendeteksi Integritas Pondasi Tiang Liong, Gouw Tjie
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2853

Abstract

Non destructive testing on piles can be divided into two main categories. The first category is to find out the integrity of the piles, such as pile integrity testing (PIT) and sonic logging. The second category is to find out the pile capacity, such as dynamic load testing/pile driving analysis. Since the early 1990s, the application of the tests was brought into practice and gained its popularity in Indonesia. However, the basic theory behind the testing has not been widely disseminated. This study tries to elaborate the first category of the testing, i.e. the pile integrity testing and sonic logging. The basic theory, the advantages and disadvantages, the application, the limitation and the interpretation of those techniques shall be discussed. Comparison on case studies of those testing methods also shall be given. 
Analisis Seleksi Citra Mirip dengan Memanfaatkan Konsep CBIR dan Algoritma Threshold Rangkuti, Abdul Haris
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2819

Abstract

Content base image retrieval (CBIR) is the concept of image retrieval by comparing the existing image on the sample to that of the database (query by example). CBIR process based on color is carried out using adaptive color histogram concept, while one based on shape is performed using moment concept. Following up the process results, a sorting process is done based on a threshold value of the sample image through the utilization threshold algorithm. The image displayed is be sorted from the one that is nearly similar to the query image (example) to the resemblance of the lowest (aggregation value). The threshold value of the query image used as reference is compared with the aggregation value of the image database. If the comparison in the search for similarities by using the concept of fuzzy logic approaches 1, the comparison between the threshold value and the aggregation value is almost the same. Otherwise, if it reaches 0, the comparison results in a lot of differences. 
Perancangan Sistem Informasi Administrasi pada Perusahaan Jasa Penyaluran Tenaga Kerja ke Luar Negeri: Studi Kasus pada PT XYZ Oktavia, Tanty
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2844

Abstract

Running the business process of labor supply is not easy since it involves several parties, and n supported by elements of the documents obtained from internal and external parties. PT XYZ as a company dealing with labor supply service to foreign countries has not had any competent information systems in supporting its business processes. Therefore, this research is expected to produce a draft of information system and database applications that can support the administrative activities of labor supply of the company. The research used both analysis and design methods. Analytical method includes survey of the current system done by observation, interviews, identification of the information needs of the survey results and identification of system requirements. The design method consists of designing a model system using UML notation, designing databases and user interfaces for supporting applications. The information system applications resulted in this research can be a competitive advantage in marketing their employment services and improve business processes of PT XYZ.
Gaya Arsitektur di Perumahan Dinas Militer Angkatan Darat, Cimahi, Jawa Barat Ardiani, Milla
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2810

Abstract

Cimahi is a city in West Java that owns many relics of the Dutch architectural heritage built in the early 20th century. The majority of buildings are military buildings that have a hierarchy according to the military rank, seen from the styles presented at the army's military housing. The building style has no longer presented either Indische empire style or modern colonial style. The architectural style in the transitional period at that time adapted the tropical climate of Indonesia with the visible formation of the Dutch. This paper is the result of research done by observation and a survey at the Army Military Housing, Cimahi, West Java. Data were analyzed quantitatively to analyze the number of houses and ornaments dismantled and its original form. In addition, qualitative methods are also used to analyze the demolitions done by the building occupants. 

Filter by Year

2011 2011


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue