ComTech: Computer, Mathematics and Engineering Applications
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Articles
87 Documents
Search results for
, issue
"Vol. 1 No. 2 (2010): ComTech"
:
87 Documents
clear
Pemantauan dan Pengaturan Proxy Server Dalam Pengaksesan Internet Dengan Otentikasi Berbasis Web
Januar Santoso;
Normandito Wijaya;
Khowi Siswandi
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2594
The quick expanding user of World Wide Web (WWW) has been made a development in proxy server in limited access to the users. Therefore, it needs the limit with designing and implementing proxy server configuration system and authentication in internet web-based usage so it will ease in supervising and using internet facility. The method used is analysis and web-based system design. The expected result is the easier in supervising and controlling internet facility using proxy server and reducing the leaking of internet facility usage through authentication (security).
Analisis dan Perancangan Aplikasi Administrasi User Pada Server Radius Berbasis Web (Studi Kasus Binus@Ccess)
Rony Baskoro Lukito;
Elly Feriaty;
Suyatno Salim;
Sartika Kurniali
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2596
Bina Nusantara University as one of the information technology-based educational institutions in Indonesia have used the Internet in learning activities. To meet the needs of Internet access, Binus provides students with BiNus@ccess Premium service. BiNus@ccess Premium already have an application to help admin to user management with the help of a centralized accounting system (which is provided by the RADIUS server). However, applications that use is still limited in some ways so that there are still many manual processes. Therefore we need an application that serves to replace the existing application but still supports the existing system. The methodology used to admin consists of interviews, questionnaires to users, observation to analyze the problem, designing application solutions, and evaluation by distributing questionnaires to the admin. With the RSIM applications, manual administrative processes can be eliminated because the user can perform the registration process and the addition of its own loans through the application by themselves. RSIM Applications can also provide solutions for prepaid voucher sales system because it provides the ability to generate a voucher, print vouchers, and see the voucher reports, list payment, and the sale report. Suggestions for further development is to create applications for the sale of voucher system with e-commerce or SMSgateway..
Analisa Dan Perancangan E-Service Portal Untuk Calon Mahasiswa Baru Pada Binus University
Eli Suryani;
Robby Wijaya;
Ricornus Pranata Wijaya;
Novita Maria Valentina
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2607
The purpose of this study is to analyze and design the application of e-service portal to help Marketing BINUS university to improve the speed and ease of service for Prospect students with the integration of transaction and information services required prospective students, and can be presented in a personalized to adds its own interesting experience for user. It would create a competitive advantage of the University which also potentially triggering an increase in the number of intake students. The methodology used is the method of analysis, which reviews and interviews conducted directly to the field, distributing questionnaires, observing and analyzing the data and needs, and using the design method, which includes design of business models, user interface design and database design. Results to be achieved is a web portal, where the system can facilitate prospective students to obtain the desired information services in full, and with a presentation that can be personalized and make transactions easier and faster. Conclusions obtained are BINUS University can take advantage of e-service in a web portal for prospective new students as supporting its competitive advantage in the utilization of information technology and support one of its primary missions to create service excellence in all fields.
BFC Method For Prediction of Transient Head on Seepage Path
Sherly Hartono
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2612
Seepage causes weakening of levees and can cause levee failure or overtopping due to levee settlement. A numerical method, called the boundary fitted coordinate (BFC) method, was developed to determine seepage through a levee and the transient head on the seepage path due to the changing water level during a flood. The BFC transforms the physical coordinate system into a computational curvilinear coordinate system. The grid generated in this method accurately represents the boundary of the system regardless of its complexity.
Analisis dan Perancangan Website Pembelajaran Bahasa Secara Mandiri di Self Access Language Learning Center Bina Nusantara
Hady Pranoto
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2613
The purpose of this research is to build an independent language learning applications using Internet technologies to facilitate the user in learning the language. The research method used is by analyzing the ongoing learning process; analyze the constraints and limitations of existing facilities and designing new processes to address existing constraints and limitations. In designing a language self learning website authors examine the existing through observation, interviews and questionnaires to the stakeholders who use the system. Observations also observed duration of the user in conducting learning activities, and provided space to accommodate the transaction. After analysis of the current system, author designing the new system using object-oriented design methods and using analysis tools UML. After completed the system design done system built using ASP.NET programming language. The Conclusions is an independent language learning applications using Internet technology giving easy way to facilitate the learning process in terms of accesing time and place, and the application also provide facilities for teacher to monitoring student self learning.
A Strategic Analysis of Allegro: A Custom Made Supply Chain Management Software
Zulfany Erlisa Rasjid
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2616
Allegro is a Supply Chain Management software which is used by one of the Buying Agent that has branches all over the world. Allegro is a tailor-made application specially build for the Buying Agent. Allegro thas a lot of capability, however it is not being used optimally. This paper analyszes the software such that it can be used optimally to support the company (Buying Agent) strategically and help the company to perform better by using Balance Score Card and KPI generated by the use of the system. The KPI is derived from the Business Objectives and the data in fact are all available in Allegro which is currently not used. As a conclusion, the writer suggested using all features available from Allegro and hence it will prove the overall performance of the company.
Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea
Agustinna Yosanny
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2618
Rapid development of Information Technology causes information can access easier without space boundaries. Image is a form of information, which contains many information. Some image contains confidential information that cannot distribute to unauthorized persons. Therefore, image encryption application is create to encrypt part of image that has confidential information. The image encryption application is encrypt image by applying DES, Triple DES, and IDEA algorithms. The research was applying analysis and design methodology. The analysis methodology was undertaken through literature study and algorithm research and testing. The design methodology was undertaken through database, features, system, and screen layout design. Results of the research are image encryption application that can encrypt part of image and or all of image by applying three algorithms such as DES, Triple DES, and IDEA. This application is show comparation of these algorithms. In conclusion, method of encryption can apply to image, so that confidential information of the image can protect from unauthorized person.
Keamanan Dalam Electronic Commerce
Andre Michael Ricky Wajong;
Carolina Rizki Putri
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2623
The objective of this paper is to give information and understanding about security threat that could happen in security system in e-commerce. The approach used is how the transaction system is, how the security is applied, and also the possible security threat in e-commerce. The result of this research is that there are still gaps in e-commerce. It is hoped that the business actors will be more realized about the security importance and more aware about the possible threat.
Analisa Perencanaan Strategis Sistem Informasi di Departemen Manajemen Aset Bina Nusantara
Firman Arifin
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2626
The objective of this paper is to analyse portofolio application and information technology that is used today in Asset Management Department of Bina Nusantara so it could be made a strategic planning information system that could accommodate business needs. The discussion is focused to a strategic analysis that is applied today and its improvement in the future including information technology structure. The conclusion from this paper is along with a good information technology strategic planning, expected work effectivity and efficiency could be reached.
Analisis dan Perancangan Aplikasi Inventori Berbasiskan Rfid Pada PT. ABC
Herwin Herwin;
Richard Saputra
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21512/comtech.v1i2.2633
The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirenments. The design method approach to Unified Modelling Language (UML). The results is an inventory application that uses Radio Frequency Identification (RFID) tags as a replacement label where RFID tags can store data. Conslusions from this research is minimizing the company’s financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company.