cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 1,585 Documents
Cloud Computing dan Dampaknya Terhadap Bisnis James Tandy; Siswono Siswono
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2496

Abstract

The purpose of this paper is to provide an overview of cloud computing and its development as well as the advantages and disadvantages of cloud computing implementation at some companies. Some literature studies from journals, textbooks and internet sources are discussed. Based on these searches it is known that the cloud computing as a technology that utilizes internet services uses a central server to the virtual nature of data and application maintenance purposes. The existence of Cloud Computing itself causes a change in the way thetechnology information system works at an company. Security and data storage systems have become important factors for the company.Cloud Computing technology provides a great advantage for most enterprises.
Perancangan Sistem Informasi Penjualan dan Persediaan pada PT Selatan Jaya Prima Perkasa Stephanie Surja; Rini Wongso
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2497

Abstract

This study aims to analyze the organization needs in sales and stock company process that related with the current business process at PT Selatan Jaya Prima Perkasa. The result will be used for developing an integrated system that can be the solution for the company needs in running their sales and to control theirinventory stock status as the main business of the company. The analyzed result in the company needs will be documented using unified modeling language. This information system is expected to simplify ease the company’s activitis in sales process and inventory stock control. This system will also minimize the data lost and human error usually caused by manual process of transactional data storage.
Risk Management in Information Technology Project: An Empirical Study Kornelius Irfandhi
ComTech: Computer, Mathematics and Engineering Applications Vol. 7 No. 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2498

Abstract

The companies are facing some risks due to changes in a dynamic environment. If risks are not managed properly, it will have some negative impacts on the companies at the present and the future. One important function of the Information Technology (IT) governance is risk management. Risk management in IT project aims to provide a safe environment for IT projects undertaken. Risk management becomes an important process for the success of IT projects. This article discussed the risk of IT project and whether there was a relationship between risk management and the success of the project. The method used was performing a literature review of several scientific articles which published between 2010 and 2014. The results of this study are the presence of risk management and risk manager influence the success of the project. Risk analysis and risk monitoring and control also have a relationship with the subjective performance of IT projects. If risk management is applied properly, the chance of the success of the projects undertaken can be increased. 
Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review Budi Yulianto; Fredy Purnomo; Evaristus Didik Madyatmadja; Meyliana Meyliana; Harjanto Prabowo
ComTech: Computer, Mathematics and Engineering Applications Vol. 7 No. 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2499

Abstract

Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 
Perancangan Sistem Monitoring dan Evaluasi Bantuan Usaha Pertanian pada Kementerian Pertanian Ri Yohannes Kurniawan; Devyano Luhukay; Titan Titan
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2500

Abstract

The main problems of current system in agriculture ministry is sub-optimal information retrieval of realization and development of agriculture capital and production facilities subvention. Therefore, this research aims to analyze and design information system for monitoring and evaluation of subvention of agriculture capital and production facilities. This information system is developed based on internet technology to help the main team (agriculture minister and technical team of directorate agriculture department), coach team of provincial agriculture office, and technical team of district/city agriculture office to access the accurate information related realization and development of agriculture business any where and any time. It is designed with OOAD (object oriented analysis and design) method by using UML notation (use case diagram, class diagram, component architecture and user interface design). This research produces a design of information system for subvention monitoring and evaluation of agriculture capital and production facilities for the ministry of agriculture RI.
The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images Ratna Dewi; Putri Kartika Sari
ComTech: Computer, Mathematics and Engineering Applications Vol. 7 No. 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2501

Abstract

The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.
Aplikasi Wisata Berplatform Android dengan Teknologi QR Code Afan Galih Salman
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2502

Abstract

As a country renowned for its natural beauty, Indonesia has many interesting attractions to visit. An example is the attraction of animals shown at Ragunan Zoo. At Ragunan Zoo visitors not only enjoy the tour, but also learn about animals shown. However, information about the animals is only provided on the board. Therefore,Ragunan Zoo needs a technology that provides more information, efficiently and as a guide to explore the tourist attractions. The purpose of this research is to design an android-based mobile application that can provide information more than what is show on the board as well as provides digital mapinformation. The application generated in this study implements the QR code scanning to obtain information as well as locations of digital map attraction.
Gamification of Learning: Can Games Motivate Me to Learn History? Andry Chowanda; Alan Darmasaputra Chowanda
ComTech: Computer, Mathematics and Engineering Applications Vol. 7 No. 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2503

Abstract

This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001. Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events   
Aplikasi Sistem Informasi Penjualan Berbasis Web pada Toko Velg YQ Josef Bernadi
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2504

Abstract

The rapid development of information technology gets along with an advance in data processing. Data recording process of sales for company is one of the numerous examples. A system that is able to keep records inventory and profit-loss company is needed to support purchase and sales process. The faster the recording and order process, the more rapid information delivery will be. This research describes factors in making sales information system, payment and reports of YQ wheel store. This research results in a sales information system that facilitates the sales process as well as provides product information of YQ wheel store.
Winsorized Modified One Step M-Estimator As a Measure of the Central Tendency in the Alexander-Govern Test Tobi Kingsley Ochuko; Suhaida Abdullah; Zakiyah Zain; Sharipah Syed Soaad Yahaya
ComTech: Computer, Mathematics and Engineering Applications Vol. 7 No. 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2505

Abstract

This research dealt with making comparison of the independent group tests with the use of parametric technique. This test used mean as its central tendency measure. It was a better alternative to the ANOVA, the Welch test and the James test, because it gave a good control of Type I error rates and high power with ease in its calculation, for variance heterogeneity under a normal data. But the test was found not to be robust to non-normal data. Trimmed mean was used on the test as its central tendency measure under non-normality for two group condition, but as the number of groups increased above two, the test failed to give a good control of Type I error rates. As a result of this, the MOM estimator was applied on the test as its central tendency measure and is not influenced by the number of groups. However, under extreme condition of skewness and kurtosis, the MOM estimator could no longer control the Type I error rates. In this study, the Winsorized MOM estimator was used in the AG test, as a measure of its central tendency under non-normality. 5,000 data sets were simulated and analysed for each of the test in the research design with the use of Statistical Analysis Software (SAS) package. The results of the analysis shows that the Winsorized modified one step M-estimator in the Alexander-Govern (AGWMOM) test, gave the best control of Type I error rates under non-normality compared to the AG test, the AGMOM test, and the ANOVA, with the highest number of conditions for both lenient and stringent criteria of robustness. 

Filter by Year

2010 2025


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol. 11 No. 1 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 9, No 2 (2018): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol. 7 No. 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol. 4 No. 2 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 1, No 2 (2010): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech Vol 1, No 1 (2010): ComTech More Issue