cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 63 Documents
Search results for , issue "Vol. 5 No. 2 (2014): ComTech" : 63 Documents clear
Pengembangan Aplikasi Game dengan Html5 dan Javascript untuk Mengukur Kecerdasan Anak Muhammad Ismail
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2213

Abstract

Educational games are the ideal medium to see the extent to which a student's performance will be assessed. However, to integrate educational games has the technical and practical challenges of their own. This study will be directed to the development of a game that can be used to measure the kind of intelligence and capabilities of a child based on the reference of Psychology Howard Gardner's theory kuisinoerThe purpose of writing is the development of gaming applications with HTML5 and JavaScript enabled to measure intelligence. The data taken from the distribution of questionnaires to 30 respondents were randomly. The data were analyzed by finding the average difference between the results of tests using questionnaires to play the game. From these results it can be concluded that there is a gap/difference between the average differences among the results of the two tests.
A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption Aswin Wibisurya; Timothy Yudi Adinugroho
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2215

Abstract

Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.
Analisa Penerapan Sistem pada Hospitality Industry Steeve Haryanto
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2217

Abstract

Analysis on the application of the system hospitality industry aims to determine whether the system from outside has a considerable influence on the number of luxury hotels in Jakarta as well as the factors that influence in picking the hospitality industry service system. The results of this survey are expected to be a consideration in implementing an information system in the field of hospitality industry. The method used in this paper is a literature review and analysis. The initial step in the analysis is to conduct a survey on the current system in hotels in Jakarta, and analysis of the survey results and the identification of the need for local companies to compete with foreign companies. Implementation of the system is no longer measured by how many facilities are available but the system is measured by how stable revenue generated calculations per dayrunning at a hotel with no lost posts.
Perancangan Sistem Informasi Impor & Ekspor (Sieb) Berbasis Web pada PT.Windu Eka Novan Zulkarnain
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2219

Abstract

Exports and imports are driving the nation's economy and state revenue sources. Customs as a state agency is assigned to manage the country's income. Customs and its staff are still experiencing difficulties in reporting receipt of export and import of plant or company. One of the policy is issued, each factory or company shall make the information system to determine information about the export of finished goods and raw material imports. The problem is the lack of standardization in the information that must be made by the manufacturer or company. The problem is the lack of standardization in the information that must be made by the manufacturer or company. This study makes the design of information systems based on web-based exports and imports that can be used by all factories or companies in Indonesia, particularly in PT.Windu Eka. The design method used is the SDLC (System Development Life Cycle) Analysis, Design and Testing Prototype. This information system consists of web-based software with PHP programming and MySQL database that aims to provide information online, so the reports more accessible and faster made to be reported to Customs.
Perancangan Sistem Penjadwalan Mesin Hybrid Flow Shop dengan Algoritma Levyflight Discrete Firefly Andrew Verrayo Limas; J. Sudirwan; Siti Nur Fadlilah
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2222

Abstract

The main issues that have been encountered in PT Surya Toto Indonesia is companies do not know how to measure the performance of the production process so as the utilization of resources that will be used isn’t yet to be known with efficiently. The purpose of this case studies is creating a better production processes by proposing a better and systematic scheduling information system. An Object Oriented Analysis and Design method is used to determine system’s requirements and design of the system architecture. Metaheuristic methods such as Discrete algorithms Levy-flight Firefly is used to improve the performance of the Hybrid Flow Shop machine scheduling become more better. Indicators that are used to determine the performance of the scheduling is makespan and lateness. Results from this algorithm is makespan value of 305.27 hours with lateness value of 10.92 which determine that there is no delays in scheduling. Scheduling information system was designed three primary capabilities, which are integrated data management, inventory management and a systematic and accurate scheduling system.
Implementation Octave-S and Iso 27001controls in Risk Management Information Systems Stephanus Stephanus
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2225

Abstract

Extensive use of information technology in companies put IT into a position which is of considerable concern, especially in large companies that put IT becomes a strategic part of the company. The importance of IT division, make the companies willing to pay big to get the benefits offered by IT itself, but on the other hand appears disappointment incurred from investments are not comparable with the results obtained. Until the threat appear and disrupt the business of the company. By doing risk management using the OCTAVE-S, particularly in smaller companies, can help companies to be growing, the company can find out the weaknesses and threats that may arise that could disrupt the company's business, helped by the standard controls that are owned by the ISO / EIC 27001 : 2005 helps companies to prepare implement ISO / EIC 27001:2005 later.
Analisis dan Pengukuran Tingkat Eksposur Resiko Teknologi Informasi dengan Metode Fmea Pada PT. Bank Central Asia, Tbk Roy Kurniawan
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2229

Abstract

The purpose of this paper is to help the PT. Bank Central Asia, Tbk in measuring the level of risk exposure and identify the need to control IT risk management at PT. Bank Central Asia, Tbk. Conducted research methodology, field observation, library research, interviews and gave questionnaires to the relevant parties, perform data analysis, as well as measuring the risk of using the approach of FMEA (Failure Mode and Effect Analysis). The results achieved in this study is to facilitate the management in making decisions related to the design, maintenance, and development of information technology at PT. Bank Central Asia, Tbk and also minimize the risk of the failure so that the utilization of existing information technology can provide more optimal results. The conclusion from this study is that there is a risk of potential failure that could hamper the existing business processes in PT. Bank Central Asia, Tbk. Highest risk or potential failure according to theRPN (Risk Priority Number) is a software and hardware damage, as well as the corrupted database due to the impact of operational risk.
Penerapan Dinamika Fluida dalam Perhitungan Kecepatan Aliran dan Perolehan Minyak di Reservoir Dwi Listriana Kusumastuti
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2232

Abstract

Water, oil and gas inside the earth are stored in the pores of the reservoir rock. In the world of petroleum industry, calculation of volume of the oil that can be recovered from the reservoir is something important to do. This calculation involves the calculation of the velocity of fluid flow by utilizing the principles and formulas provided by the Fluid Dynamics. The formula is usually applied to the fluid flow passing through a well defined control volume, for example: cylinder, curved pipe, straight pipes with different diameters at the input and output, and so forth. However, because of reservoir rock, as the fluid flow medium, has a wide variety of possible forms of the control volumes, hence, calculation of the velocity of the fluid flow is becoming difficult as it would involve calculations of fluid flow velocity for each control volume. This difficulties is mainly caused by the fact that these control volumes, that existed in the rock, cannot be well defined. This paper will describe a method for calculating this fluid flow velocity of the control volume, which consists of a combination of laboratory measurements and the use of some theories in the Fluid Dynamics. This method has been proofed can be used for calculating fluid flow velocity as well as oil recovery in reservoir rocks, with fairly good accuration.
Mempermudah Pengawasan Operasional dan Keuangan di Biro Perjalanan dengan Menggunakan Aplikasi Gtass Furry Arifin
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2234

Abstract

Some travel agencies have difficulty in monitoring the operational control and generating financial report. This is due to the operation of the data storage for business transactions conducted separately , and the reporting of the financial statements company are still found not in accordance with the bank reconciliation . In this study, the methodology the system development life cycle (SDLC) is used ranging from data collection through interview, observation and study of the literature up to the stage of application development, namely the analysis phase in the travel agency using the method of direct observation of the flow through the reporting process. After that, go into the design stages of database design methods and user interface. Global Travel Agency System Solutions (GTASS) product is the integration system designed specifically for the corporate travel agency that exists to facilitate control operations, such as creating a bill (invoice), Letter of Gurantee (LG) and financial oversight as receipts and expenditure of money. With the ease of processing, then the presentation of the financial statements can be done automatically. Important early financial supervision carried out by the travel agency due to an increase in sales without adequate consideration of financial supervision, will lead to the emergence of new problems, which in turn will hamper efforts to increase the sales.
Evaluasi Sistem Informasi Manajemen Perhotelan Berbasis Web pada PT. Xyz Suryanto Suryanto
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2235

Abstract

Information system in a company is expected to support their business processes. Therefore, it requires an evaluation of existing information system and provides recommendations hospitality management information system to meet the gap between existing information systems and user needs. The method of this study is divided into two, namely the method of data collection and analysis methods. Methods of data collection using interviews and observation techniques. Methods of data analysis using gap analysis, followed by a costbenefit analysis and IT Balanced Scorecard. The evaluation results through Fit/Gap Analysis states that the implementation of a management information system is feasible and able to meet all user needs. Cost Benefit Analysis provides an assessment of tangible benefits IT Balanced Scorecard provides an assessment of intangible benefits. The results of the two methods stated that the new information system worth to be implemented.

Filter by Year

2014 2014


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol. 11 No. 1 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 10 No. 2 (2019): ComTech Vol 10, No 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol. 9 No. 2 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol. 6 No. 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 1, No 2 (2010): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue