cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 52 Documents
Search results for , issue "Vol 4, No 1 (2013): ComTech" : 52 Documents clear
Perancangan Model Sistem Informasi Penunjang Operasional pada Lembaga Bimbingan Belajar Oktavia, Tanty
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2691

Abstract

 Tutoring institution is an organization which focuses in education. The objective of this institution is improving the quality of learning of all students to achieve the desired target. The operational activities of this institution consist of registration, scheduling, evaluation, and administration supporters. It will be less effective if the processes are done manually. Therefore, many institutions are starting to restructure the model of information systems to support the company’s operations. This study describes about designing an information system model using object oriented approach based on the methodology introduced by Satzinger, where each phase is represented by using UML diagrams. The result achieved in this research is to produce a general model of information systems in supporting the operations of a tutoring institution. Designing an information system that is compatible with business processes can maximize the company's operations to run efficiently and effectively so as provides a competitive advantage from its competitors.
Manajemen Risiko Teknologi Informasi: Studi Kasus pada Perusahaan Jasa Viyanto, Achmad Reza; Latuihamallo, Okhran Steve; Tua, Franky Mangihut; Gui, Anderes; Suryanto, Suryanto
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2682

Abstract

The purpose of this study is to identify and quantify risks that may occur any time in the application of information technology in a company, as well as to provide information on the risks associated with the security of information technology system of the company. The methods used are: data collection and analysis techniques. Data collection includes: literature and field studies, in which the field study is conducted by interview and observation. Analytical technique used in the measurement of risk is OCTAVE-S. The results found the risks associated with security management, contingency planning, vulnerability management, as well as design and security architecture. It iscocluded from this this study that there are still a lot of risks that can threaten companies such as lack of contingency and disaster recovery plan.
Perancangan Sistem Informasi Signature Verification System For Banking Arin, Ikrar Adinata
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2741

Abstract

Every teller of Bank XYZ Teller needs to verify and validate the customer's signature for withdrawal transactions done at the bank in order to avoid manipulation of original signature of the customer. If the amount of withdrawals money made is very large number (typically for corporate customers), the risk of manipulation becomes higher. Therefore, there is a need to implement a kind of software applications which  functions as a tool to verify the signatures of banking customers. The author conducted a Signature Verification System for businees operational of Bank XYZ.
Analisa Rasio Parkir Mobil untuk Kantor Swasta di Jakarta Tedja, Michael
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.3930

Abstract

Jakarta's economy grew rapidly accompanied by the rapid growth of private office buildings in different areas of the city. This condition causes the need for car parking facilities at any existing private office buildings. Given the past 20 years, the Jakarta administration has never revised standard parking requirement in Jakarta. It causes the need be reviewed, to the extent appropriate parking ratio for a private office in the current period. This research is carried out on a number of park buildings at offices in Jakarta, the lower and upper limits of the implementation, then compared to the city standard parking. The results showed that the ratio standard park in Jakarta is no longer eligible based on the facts found.
Analisis dan Perancangan Sistem Informasi Penjualan dan Persediaan pada PT. Xyz Luhukay, Devyano; Kurniawan, Yohannes; Titan, Titan
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2696

Abstract

Based on an analysis conducted, PT XYZ may face problems on their business process since it is still executed with a non-computerized system. The purpose of this study is to improve the effectiveness and efficiency of the business processes perFormance running at the company. Besides, this study may support PT XYZ to monitor their business activities primarily from sales and inventory. The focus of the analysis and design of the inFormation systems lies in the records of beef suppies and sales transaction. A procedure and design of an integrated inFormation system in the Form a desktop application is the output of this study. 
Analisis dan Perancangan Data Warehouse untuk Penjualan, Identifikasi Status Distributor, dan Perpanjangan Masa Aktif Distributor pada PT Harmoni Dinamik Indonesia Prajena, Gredion
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2792

Abstract

The purpose of this study is to analyze sales data from warehouse to distributors, identification of distributor status, and extension periods of active distributors. From the analysis, a data warehouse application is created with user interfaces that are easy to understand so as it can facilitate executive decision making. The analysis is done through the following steps: survey of the running system, analysis of the data obtained from the survey, identification of the information needed for data warehouse creation and identification requirements of the system to be built. Meanwhile, designing a data warehouse uses the Nine-Step Methodology of Ralph Kimball. The result is a data warehouse containing relevant and required information for executives to make decisions. The data warehouse application displays information to the user interface that is easy to understand and quick in making the report. The data needed by the company have been analyzed and produce useful information for executives. In addition, the reports can be generated quickly and the results of the analysis shown in the form of charts and pivot facilitate decision making more rapidly and precisely.
Implementasi Rfid pada Perusahaan Penyewaan Mobil Karmawan, I Gusti Made
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2687

Abstract

Radio Frequency Identification (RFID) is an identification technology based on radio waves. At this time, we will describe the application of RFID technology in a rental car company. The study discusses about information about how to implement RFID within the enterprise, the role of RFID in the enterprise, how to use RFID, and everything else related to RFID in the enterprise. The  main purpose of writing this paper  is to make easy for reader finding information about general description of RFID and its application to a  car rental company. Furthermore,  methodology components are type and source of Data, data collection technique, hypotheses and data analysis technique. Finally, a conclusion is made that that RFID is an identification technology that is relatively new and feasible at the car rental company which is an alternative to barcodes that have been widely used. The presence of RFID also provides a very beneficial effect to the company, as has been displayed through charts of various aspects of the company in the results section.
Pembuatan Sistem Informasi dengan Analisis dan Perancangan Berorientasi Objek Pelawi, Dewan
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2711

Abstract

To generate an information system which is in accordance with the needs of company requires an analysis of business processes by observing the running system. Solutions for problems found when doing the business are observed using the systems approach. Object-oriented analysis and design is a method currently used to build an information system. The system development with "Object Oriented Analysis & Design (OOAD)" method stated by Satzinger includes making activity diagram, event table, class diagram, usecase diagrams, usecase description, state chart diagram, deployment and software architecture, first-cut design class diagram, simple sequence diagram (SSD), the sequence diagram (first-cut, view layer, data access layer), communication diagram, updated design class diagram, package diagram, persistent object, user interface. The result obtained after performing all phases is an information system that fits the company needs which is expected to improve the performance and effectiveness in business processes and also support the company's business goals.
Perancangan Man Hour Integrated Control Application pada Perusahaan Barbasis Project Yuniarti, Rahayu Ary
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2746

Abstract

The purpose of the study is to analyze and design an integrated application for managing man hour called Manhour Integrated Control Application (MICA) for a project-based company. Users can easily monitor the progress of man hour’s usage using this application which can be accessed from different project sites. The methodology used in the study are (1) analysis towards the business process followed by identification of user requirement by interview with user, document analysis and literature study; and (2) design for database and user interface. The result expected from the study is web-based integrated application which can help user control and monitor project’s progress based on man hour and man power allocation and can be accessed from project site.
Penggunaan Fisikal Model dalam Perancangan Arsitektur Prawata, Albertus
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 1 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i1.2678

Abstract

One important factor in architectural design process that are used is physical model. Information and design solutions for the architectural design process can be obtained using physical model. It is a tool that can be used to visualize the architecture design process from the conceptual to the final design. This paper explains the types and the use of physical model with their characteristics. It also describe information and solutions from the physical model that can be used during the architectural design process.

Filter by Year

2013 2013


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol. 11 No. 1 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 10 No. 2 (2019): ComTech Vol 10, No 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol. 9 No. 2 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol. 6 No. 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 1, No 2 (2010): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue