cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 1,585 Documents
E-Learning dengan Menggunakan COI Framework Kosasih, Lydiawati; Iqbal, Muhammad
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2523

Abstract

This study discusses some considerations in education to achieve a good quality of learning by utilizing technological advances such as E-Learning. This study uses a model of Community of Inquiry (COI) as a comparative study to improve the quality of E-Learning program. Implementation of COI model in discussionforum on BiNusMaya through E-Learning is able to improve the quality of a discussion as improvement of knowledge management. This study aims to provide a proposal to the Department of Information Systems Bina Nusantara University in enhancing the effectiveness of the use of discussion forums on BiNusMaya (ELearning). By presenting the survey results related to the Binusmaya current condition,s such constraints and development expectations of both the lecturers and students for Binusmaya can be described. In addition, the application of CoI model is presented in a learning process especially when meeting outside of class (without face-to-face). The results of this study is expected to be the basis for developing a COI model design and implementation plan in Management Information Systems course, that may improve the quality of the use of discussion forums as part of the knowledge management process in future study.
Sistem Nilai dengan Bobot Komponen yang Dinamis Studi Kasus Binus Internasional Iskandar, Karto
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2764

Abstract

Every institution must have an assessment system to determine the graduation of the students. Commonly universities implement static scoring systems to simplify the counting and operational process. Similarly, Bina Nusantara University implements a static scoring system. Along with the development of business models, the need for cooperation with foreign universities and quality improvement, Binus International requires a dynamic component scoring which results in changes in database design and information systems. This research uses literary study, database designing and system designing. This research aims to analyze and design a database and a scoring system at Binus International in order to support the assessment process with a dynamic component scoring. The results are a design of a dynamic scoring system. It can be concluded that the scoring system with dynamic value components is more suitable for Binus International. For further development the scoring systems is expected to be created using the online scoring data collection by the lecturers with a simpler process that considers the encription element. 
Pola Aktivitas Ibu Rumah Tangga Terhadap Pemanfaatan Ruang Terbuka di Rumah Susun Mariana, Yosica
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2964

Abstract

In flat environments, housewives are most found staying throughout the day. They use existing open spaces in housing project to interact with other residents. To find out, discover and analyze the correlation between the pattern of open space utilization and the pattern of activity of housewives at flats, this research was conducted using descriptive analysis method bases on case studies on some flats in urban areas, namely Kebon Kacang Flat (KK), Kemayoran Flat (K), Taman Surya Flat (TS) and Pasar Jumat Flat (PJ). Subjects were housewives (residents of the flats); sampling is taken by stratified random sampling. The survey was conducted by interview to obtain data on activity patterns of the mother. Subsequently, observation was conducted to get an overview of the activity patterns of mothers and use of open space including non-physical and physical data of these open spaces. The implementation was done in three stages: preparation (literature study and data collection by remote sensing), interpretation, field test and re-interpretation (width, location, quality of open spaces and activities, professions of women at these locations), and result presentation. 
Perancangan Program Aplikasi Kriptografi Menggunakan Algoritma Magenta dengan Panjang Kunci 128 Bit Wibisono, Steffie Hugh; Santoso, Djunaidy
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 1 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i1.2240

Abstract

Along with the development of computer technology, the growing crimes against the computer. Crimes against the computer makes people increasingly competing to make the algorithms-algorithms that can maintain the confidentiality of data. Algorithms algorithm Magenta is one of the many algorithms that exist today. Magenta algorithms have been developed since 1990 by using a simple and transparent technique that can be implemented in hardware and software. First time algorithms are analyzed using the butterfly structure - the structure of the butterfly which was then replaced by a Fast Hadamard Transform (FHT) shuffle structure which has the advantage of providing some structure in each level. In 1994 there was a slight change in the use of hardware that was not processed according to plan so that now the algorithm used by Deutsche Telekom Magenta for secure management of sensitive data with 128-bit key length. These algorithms break the 128-bit key length into 16 blocks with each block containing the 8-bit and one other advantage of this algorithm is the recursive part is calculated repeatedly at each iteration.
Rancangan Sistem Informasi Penggajian Pada Perusahaan Jasa Bengkel Permatasari, Angelina; Cristian, Lianawati
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2405

Abstract

The aim of the research is to analyze existing problems on companies in the automotive service industry, namely, analyzing the current payroll system, identifying needs, and modify and design a better payroll system accordingly. Methods used are analysis methods and design methods. Analysis methods conducted are literature study, field observation, survey on current system, needs analysis survey, identifying information needs, interview, and design methods used is Object Oriented Analysis and Design (OOAD). Obtained results are improved payroll system which has been done manually before. It can be concluded that a computerized payroll information system can solve existing problems and old procedures. 
Perancangan Aplikasi J2me Untuk Point Reward Hartanto, Jaka
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2375

Abstract

As the development of communication technology, celular phone was no longer functioned as communication media but also as business media. This improvement could also be utilized as alternative of marketing strategy, one of it was point reward system which aimed to increase customer retention. The methology that would be used i.e. analitical analisys, literature and application design that of designing J2ME application to interact with customer. In analysis phase, several activities were: questionnaire which was spread to customer, interviewed the tenant and observed current marketing and promotion system in a mall. Information needed then analyzed as input. The input later be used in design phase to obtain the finals result in accordance with the requirements. 
Aplikasi Pemasaran Berbasis Web PT XYZ Hendarti, Henny; Mariani, Vini
ComTech: Computer, Mathematics and Engineering Applications Vol 4, No 2 (2013): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v4i2.2664

Abstract

Marketing plays an important role in determining the success of a company's sales. Marketing of goods or services over the Internet opens an opportunity for a company to expand the business into new markets, and compete with other businesses in the same field. It is because the internet offers wider selection of good products, service products, and prices. Thus, customers can be sure in choosing and buying of goods and services. For that e-marketing is introduced as an marketing strategy that integrates internet and marketing. A study was conducted to develop e-marketing application for PT XYZ as a company that produces and sells men’s apparel and accessories. The methodology used in developing the e-marketing application is library research, field research, and a seven-stage approach to build e-marketing. The e-marketing strategy developed is expected to expand market share and increase sales. Additionally, it is expected to be a powerful strategy to build relationships with customers, providing information of both company and its products.
Winsorized Modified One Step M-Estimator As a Measure of the Central Tendency in the Alexander-Govern Test Ochuko, Tobi Kingsley; Abdullah, Suhaida; Zain, Zakiyah; Yahaya, Sharipah Syed Soaad
ComTech: Computer, Mathematics and Engineering Applications Vol 7, No 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2505

Abstract

This research dealt with making comparison of the independent group tests with the use of parametric technique. This test used mean as its central tendency measure. It was a better alternative to the ANOVA, the Welch test and the James test, because it gave a good control of Type I error rates and high power with ease in its calculation, for variance heterogeneity under a normal data. But the test was found not to be robust to non-normal data. Trimmed mean was used on the test as its central tendency measure under non-normality for two group condition, but as the number of groups increased above two, the test failed to give a good control of Type I error rates. As a result of this, the MOM estimator was applied on the test as its central tendency measure and is not influenced by the number of groups. However, under extreme condition of skewness and kurtosis, the MOM estimator could no longer control the Type I error rates. In this study, the Winsorized MOM estimator was used in the AG test, as a measure of its central tendency under non-normality. 5,000 data sets were simulated and analysed for each of the test in the research design with the use of Statistical Analysis Software (SAS) package. The results of the analysis shows that the Winsorized modified one step M-estimator in the Alexander-Govern (AGWMOM) test, gave the best control of Type I error rates under non-normality compared to the AG test, the AGMOM test, and the ANOVA, with the highest number of conditions for both lenient and stringent criteria of robustness. 
Analisis dan Perancangan Sistem Informasi Manajemen pada Akademis AMIK ASM LAKSI 31 Inayatulloh, Inayatulloh
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2801

Abstract

The purpose of this article is to develop a computer-based Academic management information system for AMIK LAKSI 31 ASM by using Internet technology which functions to integrate internal processes with the academic learning process. The method of this research includes analysis of campus internal administration process of teaching and learning and development of a computer-based application that supports the process. In analyzing the campus administrative processes, several activities are carried out in order to get both information required and design of application built in accordance with needs. The result obtained is an academic information system model to be used in ASM AMIK LAKSI 31 based on web that can help the institution to improve efficiency and effectiveness of administrative processes and learning process. 
Selection of Raw Material Suppliers Using Analytical Hierarchy Process in Food and Beverage Company, South Jakarta Haekal, Jakfat; Setio, Herawan
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 2 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i2.3747

Abstract

The purpose of this research was to see the selection of raw material suppliers as an assessment of supplier performance. Data were obtained from the results of assessment of the experts in food and beverage company in South Jakarta. The rate selection of suppliers was based on several criteria. There was the suitability in some products with the demand for tolerance of 10% about mismatch delivery, 10% of the accuracy of the product delivery, 5% of products quality, 5% of product prices, 5% of the easiness of information or data, and 10% of the problem-solving action. The results show that 40% of suppliers get a warning letter regarding their performance from January to June 2016, 20% of suppliers have already gotten a reprimand directly from the company, 20% of suppliers have been deactivated from the list of suppliers, because they cannot meet the target value which equals to 4,05, only 20% of the supplier can maintain its performance.

Page 21 of 159 | Total Record : 1585


Filter by Year

2010 2025


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue