cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 1,585 Documents
Kajian dan Implementasi Real Time Operating System pada Single Board Computer Berbasis Arm Wiedjaja A; Handi M; Jonathan L; Benyamin Christian; Luis Kristofel
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 1 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i1.2591

Abstract

Operating System is an important software in computer system. For personal and office use the operating system is sufficient. However, to critical mission applications such as nuclear power plants and braking system on the car (auto braking system) which need a high level of reliability, it requires operating system which operates in real time. The study aims to assess the implementation of the Linux-based operating system on a Single Board Computer (SBC) ARM-based, namely Pandaboard ES with the Dual-core ARM Cortex-A9, TI OMAP 4460 type. Research was conducted by the method of implementation of the General Purpose OS Ubuntu 12:04 OMAP4-armhf-RTOS and Linux 3.4.0-rt17 + on PandaBoard ES. Then research compared the latency value of each OS on no-load and with full-load condition. The results obtained show the maximum latency value of RTOS on full load condition is at 45 uS, much smaller than the maximum value of GPOS at full-load at 17.712 uS. The lower value of latency demontrates that the RTOS has ability to run the process in a certain period of time much better than the GPOS.
Audit Sistem Informasi Penjualan Tunai dengan Pendekatan Resiko dan Pengawasan: Study Kasus pada PT. PKJ Iwan Kurniawan Widjaya
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 1 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i1.2592

Abstract

This research was conducted based on the evaluation about the performance of Sales information system in current system in PT PKJ. General control and application control had contributed in reducing any risk that migh occur in daily operations. Some recommendations had been submitted to the management in order to prevent any fraud or leak in any financial control. To improve the security and control in every process in sales and operational, system should have a proper control in input and output. Standarizations must be implemented in every step in applications to reduce the treats and vulnerabilities. This research can be used as a model for small medium company to grow better with proper control using optimalization of Information System and Technology in every aspect in the management.
Aplikasi E-Tour Guide dengan Fitur Pengenalan Image Menggunakan Metode Haar Classifier Derwin Suhartono; William Surya Permana; Antoni Wiguna; Ferlan Gisman Putra
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2593

Abstract

Smartphone has became an important instrument in modern society as it is used for entertainment and information searching except for communication. Concerning to this condition, it is needed to develop an application in order to improve smart phone functionality. The objective of this research is to create an application named E-Tour Guide as a tool for helping to plan and manage tourism activity equipped with image recognition feature. Image recognition method used is the Haar Classifier method. The feature is used to recognize historical objects. From the testing result done to 20 images sample, 85% accuracy is achieved for the image recognition feature.
Pemantauan dan Pengaturan Proxy Server Dalam Pengaksesan Internet Dengan Otentikasi Berbasis Web Januar Santoso; Normandito Wijaya; Khowi Siswandi
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2594

Abstract

The quick expanding user of World Wide Web (WWW) has been made a development in proxy server in limited access to the users. Therefore, it needs the limit with designing and implementing proxy server configuration system and authentication in internet web-based usage so it will ease in supervising and using internet facility. The method used is analysis and web-based system design. The expected result is the easier in supervising and controlling internet facility using proxy server and reducing the leaking of internet facility usage through authentication (security). 
Perancangan Knowledge Management System Pada IT Bina Nusantara menggunakan Blog, Wiki, Forum dan Document Karto Iskandar; Tony Tony; Claudia Henlly Phankova; Wongso Agustino
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 1 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i1.2595

Abstract

This research purpose is to design a Knowledge Management System (KMS) in Bina Nusantara IT to facilitate knowledge sharing and knowledge management dashboard view to see the development of employee knowledge achieved in KMS. The high turnover rate caused the walkout knowledge. The knowledge is not well structured so that employees often have difficulty in searching for knowledge. Methods of the research conducted by the method of Software Development Life Cycle (SDLC), model iterations. The next step is formulating a study literature to find references to these problems. Then do a system design in the form of UML diagrams user interface and database. The results achieved in the form of KMS-based design to support knowledge sharing among IT BINUS employees. The conclusion from this study is that spread knowledge can be identified, stored and reused. Through this system, documentation of knowledge is optimized so that it can be a solution for walkout knowledge. There are a variety of KM applications in the system, such as Blog, Wiki, Forum, and Document.
Analisis dan Perancangan Aplikasi Administrasi User Pada Server Radius Berbasis Web (Studi Kasus Binus@Ccess) Rony Baskoro Lukito; Elly Feriaty; Suyatno Salim; Sartika Kurniali
ComTech: Computer, Mathematics and Engineering Applications Vol. 1 No. 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2596

Abstract

Bina Nusantara University as one of the information technology-based educational institutions in Indonesia have used the Internet in learning activities. To meet the needs of Internet access, Binus provides students with BiNus@ccess Premium service. BiNus@ccess Premium already have an application to help admin to user management with the help of a centralized accounting system (which is provided by the RADIUS server). However, applications that use is still limited in some ways so that there are still many manual processes. Therefore we need an application that serves to replace the existing application but still supports the existing system. The methodology used to admin consists of interviews, questionnaires to users, observation to analyze the problem, designing application solutions, and evaluation by distributing questionnaires to the admin. With the RSIM applications, manual administrative processes can be eliminated because the user can perform the registration process and the addition of its own loans through the application by themselves. RSIM Applications can also provide solutions for prepaid voucher sales system because it provides the ability to generate a voucher, print vouchers, and see the voucher reports, list payment, and the sale report. Suggestions for further development is to create applications for the sale of voucher system with e-commerce or SMSgateway.. 
Analisis Explotasi Keamanan Web Denial of Service Attack Junita Juwita Siregar
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2597

Abstract

Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers that are meant to give the user an opportunity to take over one or several computers. denial of service attacks is one of the web security systems which can inhibit the activity of the work of a service even turn it off, so the authorized user cannot use the service. There is an attempt of certain parties to prevent a user access to a system or network by flooding the traffic network with so much data from unregistered users. It makes the user unable to log into the network system. The purpose of this paper is to analyze the cause of the denial of service attack on a web system using literature study. The result of this research is a method to overcome denial of service attack as well as the prevention techniques. This study concludes that securing techniques should be implemented extra carefully on DoS attacks (Denial-of-Service Attacks). Therefore, the attacker cannot overwhelm the network IP address and disrupt communication between a server and its client that may reject user’s request access to a system or a network service provided by a host.
Evaluasi Good Corporate Governance atas Kebutuhan Donatur pada Penerapan Crowdfunding di Indonesia: Studi Kuantitatif dan Kualitatif pada Efekrumahkaca.Net, Patungan.Net, dan Wujudkan.Com Nia Utami Tirdanatan; Vina Georgiana; Yen Sun
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 1 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i1.2598

Abstract

This research aims to evaluate the implementation of Good Corporate Governance (GCG) in ensuring the good management of crowdfunding entities in Indonesia. Research methodology is using both quantitative and qualitative approaches. Quantitative approach was conducted by analyzing the factors of the driving forces for donors in financially participating in crowdfunding initiatives. Conceptual framework is developed and a study was conducted to 96 donors from three Indonesian crowdfunding portals. The findings of quantitative study show that the main factor that drive the donors to participate is motivation to accomplish, social merit factors and good trust to the project creator. Based on that results, qualitative study was conducted to evaluate the implementation of Good Corporate Governance (GCG) principles in those three Indonesian crowdfunding portals. The evaluation explains that GCG principles has been well implemented by those administrators of crowdfunding portals. Nevertheless, serious concern should be taken in the area of accountability and financial reporting. The research provides insights for crowdfunding practitioners to be succesfully raise funding and for crowdfunding platforms to be sustainable in this business by implementing good corporate governance. This research takes a further step in explaining crowdfunding phenomenon in Indonesia.
Penerapan Sociotechnical System pada Data Collection System Dian Felita Tanoto; Yonathan Marcellinus; Monica Hidajat
ComTech: Computer, Mathematics and Engineering Applications Vol. 5 No. 1 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i1.2599

Abstract

Humans and technology are two things that can not be separated. The rate of population growth, which is growing rapidly, proportional to the needs of people in many ways. Each activity and human needs, should be documented, so any activity and human needs can be predicted. Therefore, the data need to be collected and stored properly, effectively, and accuratel. Socio-Technical System is expected to assist and facilitate human in performing the collection and storage of data. Socio-Technical System can be applied by taking into account various aspects ranging from social, psychological, computer science, and technical. Methods of Socio-Technical implementation consists of requirements analysis, system design, implementation, testing, deployment, maintenance. In the testing phase, it should be noted the social and psychological aspects of the user. 
Pembangunan Database Destinasi Pariwisata Indonesia dan Implementasinya pada Sistem Berbasis Web Yosafati Hulu
ComTech: Computer, Mathematics and Engineering Applications Vol. 4 No. 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2600

Abstract

Regarding to: (1) the increasing region’s need in developing tourism destinations; (2) the needs of tourists in selecting appropriate attractions according to specified criteria; (3) the need of travel businesses to offer sights of interest in accordance with the needs of potential tourists, (4) the need to deepen and continue our previous research titled "Development of Tourism Destination Media Potential and Utilizing Local Resources in the Era of Autonomy and Regional Expansion ", we need to develop a complete database of tourism destinations in Indonesia that can facilitate those needs. We build a web-based database that is capable of storing complete information about Indonesian tourism destinations in thorough, systematic, and structured way. It is also able to classify a variety of attractions based on attributes such as: location (the name of the island, province, district), type/ tourism products, how to achieve the object, cost, and a variety of informal information, such as the ins and outs of the attraction area incorporated by the local or tourist experiences. The research will focus on deepening and refinement of the model and database structure design and implementation with the collection, processing, and data entry of primary and secondary data which amounts to approximately 140 tourism destinations in Indonesia. The research is arranged in stages as follows: (1) designing models and the database structure, (2) making a web-based program, (3) installation and hosting ; (4) data collection, (5) data processing and data entry, (6) evaluation and improvement/ refinement. Once developed, the database can be used as a starting point in the development of Data Warehouse, Decision Support System, and Expert System for Indonesian tourism industry.

Filter by Year

2010 2025


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol. 11 No. 1 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 10 No. 2 (2019): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol 10, No 1 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol. 9 No. 2 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol. 7 No. 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol. 6 No. 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol. 4 No. 2 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 1, No 2 (2010): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue