cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 1,585 Documents
Algorithmic Design Tools in Design Process Daryanto, Daryanto; Utama, Firza
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2770

Abstract

This article explores algorithmic design methods in a design process that uses natural phenomena as the basis of its architectural morphology. It implements digital morphogenesis in reaction to ecology and the influential forces of the building environment. This paper is divided into two equally important sections: the process description and the project implementation. The description of the process demonstrates the methods used and the idea involved in incorporating nature’s influential elements as part of the creative task. Meanwhile, the project implementation showed practical case of the outcome of that process. Tools for visualizing and simulating nature’s environment are showed using algorithmic design method. The tools create transformations in NURBS-based surfaces through the translation of their respective control point matrices. The tools generate several different alternatives to be tested and analyzed. 
Editorial Page and Table of Content Manik, Ngarap Imanuel
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 2 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i2.3279

Abstract

Investment Cost Model in Business Process Intelligence in Banking And Electricity Company Sundjaja, Arta Moro
ComTech: Computer, Mathematics and Engineering Applications Vol 7, No 2 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i2.2248

Abstract

Higher demand from the top management in measuring business process performance causes the incremental implementation of BPM and BI in the enterprise. The problem faced by top managements is how to integrate their data from all system used to support the business and process the data become information that able to support the decision-making processes. Our literature review elaborates several implementations of BPI on companies in Australia and Germany, challenges faced by organizations in developing BPI solution in their organizations and some cost model to calculate the investment of BPI solutions. This paper shows the success in BPI application of banks and assurance companies in German and electricity work in Australia aims to give a vision about the importance of BPI application. Many challenges in BPI application of companies in German and Australia, BPI solution, and data warehouse design development have been discussed to add insight in future BPI development. And the last is an explanation about how to analyze cost associated with BPI solution investment.
Seleksi Citra Berdasarkan Ciri dengan Algoritma Threshold Mengunakan Fuzzy Kurva S dan Fungsi Min Rangkuti, A. Haris
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 1 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i1.2411

Abstract

Image retrieval process of fruits and flowers with CBIR concept was represented by the colors and shapes using adaptive histogram method for color, and invariant moment for shape. To measure the similarity between the query image and the basis data image Euclidean distance function was used, where the result is f(x). Calculations for f (y) through the process of ‘fuzzy-ing’-S curve, where the value of f(x) guides the sigmoid function. The value f(y) on each image than the threshold value based image query. Basically, the algorithm displays the image based on Threshold features, by comparing the threshold value with the value f(y). A high grade value (approaching 1) indicates that the feature of the sample (query) image is similar to the basis data image, and vice versa. The process was continued by comparing the value grades of the image representation of color and form using min operator in fuzzy logic, so that it only displayed several images that have some resemblances in accordance with the original image. The advantage of threshold algorithm and the fuzzy function - compared to other methods – lies in the simplicity method in the image retrieval, so that the performance of CBIR becomes more reliable and effective.
Sistem Pencatatan Kehadiran Berbasis Java Card Octarina, Lidya
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2381

Abstract

The purposes of this research are to prevent jockey in exams, reduce the occurrence of error in attendance record at practicum or exams, and reduce error in filling students' attendance status to the attendance system. Three main parts of software development method are used; analysis, design, and literature method. Current system survey, analysis of the survey findings, identify the information, and identifying system requirements are implemented in analysis method. The design method that is used in this research is Unified Modeling Language (UML). The using of attendance recording system that uses Java Card-based application makes students identity card has a new function as the tool to make attendance. Conclusion of the research has shown that it can prevent identity fraud, minimize the time wasted in attendance system, reduce the printing paper, and reduce tagging errors eligibility status exam of students. 
Analisis dan Perancangan Operasional Sistem Berbasiskan CRM (Studi Kasus pada PT Terang Dunia Internusa) Oktavia, Tanty
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2670

Abstract

Article to design an operational system based Customer Relationship Management (CRM) that can connect customers with the company. It is expected that the exchange of information between both parties can be properly channeled, in short, accurate, and actual business-process occurs. Information is an important part in the business cycle because it includes all the transactions that are closely related business activities that occurred. The method used in designing this system is the Object Oriented Analysis and Design. Results to be achieved from this research are the formation of a web-based system that is able to become a liaison between the customer and the company, so the relationship can be well maintained. Customer satisfaction towards services obtained during the conduct of business transactions will have a positive impact for the company, as this can make the customers stay loyal to the company, as well as company profit can be increased as increasing customer loyalty.
Risk Management Method In It Project: A Review Faahakhododo, Ikhtiar; Rianto, Indra Dwi
ComTech: Computer, Mathematics and Engineering Applications Vol 7, No 3 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i3.2491

Abstract

In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.
Aplikasi Sewa Mobil Berbasis Web pada PT Indomobil Car Rental Pujadi, Tri
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 1 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i1.2807

Abstract

Indomobil Car Rental (IndoRent) is a rental firm providing service to customer by provides vehicle and qualified drivers. Firm has extensive network by utilizes all network from Indomobil Group. Besides it also have care service network that exists at several big cities in Indonesia. Common service problems for customer is limitation of the number of drivers to service customer, particularly at the busy days where it is difficult for customers to do reservation and get information to rent a car. Company website does not provide rent price and car amount information. This application design is developed from a financial application system therefore making it easy for users to conduct activity or transactions and service that progressively increases. Method for modelling by use of Rational Rose, meanwhile design web application utilizes Macromedia Dreamweaver, and Macromedia Flash MX and Swishmax for its animation.This application utilizes PHP and MySQL. The website of Indomobil Rental Car is expected to be more dynamic and can pull more visitors its, so increases firm performance. 
Predicting and Analyzing the Length of Study-Time Case Study: Computer Science Students Handhayani, Teny; Hiryanto, Lely
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 2 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i2.3756

Abstract

The length of study-time is one of the important issues in higher education. The goal of this research was to predict and analyze the length of studytime in the early stage of Computer Science students in X University. The research proposed Mutual Information (MI) as feature selection method and Support Vector Machine (SVM) as a classification method. There were two different sections of the experiments. The first experiment used two class targets that were grouped in ‘on time group’ and ‘late group’. The experiment result shows that the proposed method produces accuracy around 85%. The second experiment used three class targets, ‘on time group’, ‘late group’, and ‘very late group’. The experiment result of the proposed method produces accuracy around 80%. Mutual Information (MI) does not only successfully raise the accuracy but also uncovers the relationship between subjects and the class targets.
Wedding Organizer Order Management Kristin, Desi Maya; Lisanti, Yuliana
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2283

Abstract

This information system is used as a solution that can help to meet the requirements of the couples. The research methods are data collection, analysis and design. Data collection method implemented by surveys including interviews with 58 clients, 15 vendors, and 12 WO (Wedding Organizer) and by literature study that includes books and journal related. Object oriented is used as the method for system analysis and design. The result is a web based information system that connects vendors and clients in one online place. The web based application can be used to book the reception hall, catering food for guests, entertainments, bridal, car loan, prewed and receptions photos. The benefits of the web based applications are user can costumize or choose the packages, check the price information and get reports related to Wedding Organizer Order Management business process. The results of the qualitative interviews to 58 clients who already used the applications is the client get shorter time compare to clients who manage their own wedding reception.

Page 45 of 159 | Total Record : 1585


Filter by Year

2010 2025


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol. 11 No. 1 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 10 No. 2 (2019): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol 10, No 1 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol. 9 No. 2 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol. 7 No. 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol. 6 No. 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol. 4 No. 2 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol 1, No 2 (2010): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue