cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 1,585 Documents
Analisis dan Perancangan Sistem Informasi Persediaan, Pembelian, dan Penjualan pada Toko Sinar Jaya Saputra, Wawan
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2669

Abstract

Increased sales and business systems development is a main beam that moves Toko Sinar Jaya on sales of goods primary to secondary to achieving progress in its business. The purpose of this paper is to analyze the potential of information systems strategy implementation and also to develop information systems at Toko Sinar Jaya and to design an application system based on an analysis of existing systems. The research methodology used is the method of analysis and design methods, in which the analysis method used consisted of literature study method, field surveys, and interviews of business processes that are running, whereas in the method of design using object-oriented design and design analysis. Result to be achieved is to provide facilities such as applications that are useful for recording data inventory, purchasing, and sales for Toko Sinar Jaya. 
Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong Iskandar, Karto; Putranto, Andrew Thejo
ComTech: Computer, Mathematics and Engineering Applications Vol 7, No 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2494

Abstract

A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms. 
Analisa Pengaruh Modifikasi Mesin Press Body Area 5a Line Terhadap Peningkatan Kapasitas Produksi Di PT. Astra Daihatsu Motor Nasution, Januar; Putranto, Wisnu Adi
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2806

Abstract

Analysis or the analysis is defined as a study conducted on a discussion of the problems studied in depth to find out the real situation. In this study, analysis of the modifications carried out to assess the influence of such modifications in an increase in production capacity of PT. Astra Daihatsu Motor. Taking into account the physical and technical aspects of data in the field, didapatlah data supporting this research, for subsequent use as a reference from the financial aspect to determine the magnitude of the cost involved in this modification. The purpose of this study was to find the value of the initial investment required in the modification, finding the investment payback period, benefit gained as well as determining whether modification is appropriate or not to apply. Data collection conducted broadly divided into two data technical and financial aspects, and then after that the data is processed through the method of calculation of production, Stoke per Hour (SPH), Gross Stroke per Hour (GSPH). This study also provides recommendations to companies to assess whether the modification is feasible or not to do, from the point of view of project feasibility studies. 
Mobile Application for Inventory Control in a Minimart Darnis, Febriyanti
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 2 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i2.3755

Abstract

The goal of the research was to design a mobile application of inventory system in a minimart. In an application of using the mobile-based inventory minimart, J2EE system development used Waterfall method with the stages of analysis, design, coding, and implementation. The control of application inventory items at the minimart was intended for mobile-based users who controlled the supply of goods on the markets. It was to facilitate employee minimart in organizing, processing, monitoring the movement of inventory items that occurred in the minimart. The application of control inventory-based mobile minimart was to make users inventory, with a menu that was available in the form of product items, a promotion that had a limited promotion item reservations. The application can make employees in a minimart organize, process, and monitor the movement of inventory item more easily.
Aplikasi Hybrid Firefly Algorithm untuk Pemecahan Masalah Traveling Salesman: Studi Kasus pada PT Anugerah Mandiri Success Sudirwan, J.; Fadlilah, Siti Nur; Teguh, Teguh
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2281

Abstract

Determining a good route is a major problem in a transport process in the company. This case study aims to overcome the problem of determining the route or often called the Traveling Salesman Problem (TSP) is optimal. This problem will be solved by the optimization method in determining the route, which is more systematic in PT Anugerah Mandiri Success. Metaheuristic methods, such as Hybrid Firefly Algorithm is used to assist the system in the process of determining the route. Hybrid Firefly Algorithm combines heuristic method of Nearest Neighbor Heuristic with metaheuristic method of Levy Flight Discrete Firefly Algorithm. The indicators used in this case study are the total distance traveled and total fuel used. Methods Object Oriented Analysis andDesign (OOAD) is used to develop an information system, which consists of determining system requirements, system architecture design, and design to the trials of the system were developed. The results of the constructedsystem provide a solution in the form of route determination with a total distance of 165.1 kilometers with a fuel consumption of 11,793 liters. These results are much better when compared with historical data that has a totaldistance of 260.8 kilometers with a fuel consumption of 18,628 liters.
Pendeteksian Bagian Tubuh Manusia untuk Filter Pornografi dengan Metode Viola-Jones Senjaya, Benny; Gunawan, Alexander A. S.; Hakim, Jerry Pratama
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 1 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i1.2447

Abstract

Information Technology does help people to get information promptly anytime and anywhere. Unfortunately, the information gathered from the Internet does not always come out positive. Some information can be destructive, such as porn images. To mitigate this problem, the study aims to create a desktop application that could detect parts of human body which can be expanded in the future to become an image filter application for pornography. The detection methodology in this study is Viola-Jones method which provides a complete framework for extracting and recognizing image features. A combination of Viola-Jones method with Haar-like features, integral image, boosting algorithm, and cascade classifier provide a robust detector for the application. First, several parts of the human body are chosen to be detected as the data training using the Viola-Jones method. Then, another set of images (similar body parts but different images) are run through the application to be recognized. The result shows 86.25% of successful detection. The failures are identified and show that the inputted data are completely different with the data training.
Aplikasi Online Mobile Repository System Ricky, Michael Yoseph
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2829

Abstract

In order to support the decision making process effectively and efficiently, a lot of companies invest in information technology for data management and storage. The information technology is emphasized in data storage of daily transactions in large numbers in a medium, so that data can be easily processed. Online Mobile Repository System is a system that uses a temporary storage system which is practical and can be accessed online. Thus, the system simplifies data access and organization anywhere and anytime. The design of this system uses the methods of literature review, interviews, field studies, and combined design studies. The research results in a data storage system which is organized, safe and structured to support the meeting process. 
An Analysis of Bitcoin Acceptance in Indonesia Gunawan, Fergyanto E.; Novendra, Rizki
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3885

Abstract

This research intended to understand the factors affecting the acceptance of Bitcoin technology in Indonesia. It adopted the model of Unified Theory of Acceptance and Use of Technology (UTAUT), which took into account four influencing factors. Those were performance expectancy, effort expectancy, social influence, and facilitating conditions. The factors of gender and age were assumed to moderate the relations between those four factors and use and behavioral intention. The empirical data for those factors were collected by questionnaires from 49 respondents. The statistical significance of the relationships was evaluated by multivariate regression analysis. The result is a model that matches the data with R2 = 0,678. It demonstrates a high level of fitness. The analysis suggests that the performance expectancy factor and the social influence factor greatly affect the behavioral intention to use Bitcoin with the values of t-statistic of 3,835 (p-value = 0,000) for the former factor and 1,948 (0,059) for the latter factor. However, the social influence factor has less profound effect on the behavioral intention.
Program Aplikasi Steganografi Menggunakan Metode Spread Spectrum pada Perangkat Mobile Berbasis Android Rojali, Rojali; Salman, Afan Galih; Nugraha, Teddy
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 2 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i2.2305

Abstract

The exchange of traffic information in cyberspace grows fast. In all areas of life utilize technology to exchange information. One of the media owned by many people is mobile device such as mobile phone and tablet computer. In fact many people have been using mobile devices for information exchange function, and expect information to be transmitted quickly, accurately, and safely. The information security sent will be very important when the information is confidential. One way to secure information sent is the concealment of information into a media so that information hidden is beyond recognition by the human senses, which is commonly referred to steganography. This research studied and implemented steganography using spread spectrum Method on Android-based mobile devices. The results showed that the inserted image before and after the message was inserted is not different with PSNR value of about 75.
Analisis Hubungan Balok Kolom Beton Bertulang Proyek Pembangunan Gedung DPRD-Balai Kota DKI Jakarta Setiawan, Agus
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 1 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i1.2471

Abstract

In terms of structural design of reinforced concrete buildings for earthquake-resistant, the beamcolumn joint is a critical area that needs to be accurately designed properly so that the area is able to dissipate energy in the event of an earthquake. The ability of beam-column joint to deform in the inelastic region provides a structure that has a good ductility, so as to minimize the damage caused by earthquake shaking. This study aims to analyze the design of beam-column connection at the Parliament Building-City Hall of Jakarta. The analysis performed refers to the ”Tata Cara Perhitungan Struktur Beton Untuk Bangunan Gedung”, SNI 03-2847-2002. The analysis results shows that the terms of detailing in the field implementation have not been fulfilled properly.

Page 29 of 159 | Total Record : 1585


Filter by Year

2010 2025


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue