cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 6 Documents
Search results for , issue " Vol 8, No 4 (2017): ComTech" : 6 Documents clear
The Development of Data Warehouse from Payment Point Services of IT Business Solution Provider Irfandhi, Kornelius
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4032

Abstract

The goals of the research is to develop a data warehouse loaded from operational database of payment point service in IT business solution provider. The development scope is data analysis using Online Analytical Processing (OLAP) tools for identifying the trends of transaction and agent registration, and create reports and dashboards. The data warehouse was developed with Kimball method as known as the nine-step design methodology. The data and requirement were collected by observation and interview with Chief Technology Officer (CTO). The data warehouse was analyzed by OLAP tool provided by Pentaho Business Analytics software with additional plugin Pivot4J. The obtained results are the trends of transactionand agent registration between 2014 and 2015. It can be concluded that developed data warehouse can be used as ananalysis tool to know the trends information.
The Implementation of Quality Function Deployment (QFD) in Tire Industry Hadi, Hari Abdul; Purba, Humiras Hardi; Indarto, Kurnia Sigma; Simarmata, Rorio Gomgom Paska; Putra, Guntur Pratama; Ghazali, Dabith; Aisyah, Siti
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3792

Abstract

This research had two main objectives. The first research objective was to make the right design of new product according to customer requirements with the implementation of Quality Function Deployment (QFD) in the tire industry. The second research objective was to enhance competitiveness based on the renewal of marketing strategy and consumer needs, non-explosive prohibition, non-slip tires, no bulgy, and competitive prices. The research was carried out by using costumer satisfaction rating by comparing with the competitor companies. Based on calculation using QFD method, it shows that split liner has the highest percentage of technical requirement in tire industry about 30,57%. The second factor is pattern design about 25,98%. Then, the third factor is compound technology about 22,68%. Therefore, the researchers can recommend several strategies for the quality improvement based on customer needs for the tire industry.
Analysis of Wollongong City Council using 7s’s of Galliers and Sutherland Methods Gamayanto, Indra
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4022

Abstract

The research analyzed website of Wollongong City Council (WCC) and all the plans done by the WCC. It also showed details an Information Systems (IS) strategic plan for WCC. Although the WCC already had an integrated system, there were several key issues. The framework used to devise IS plan was seven stages (7S) of Gallier and Sutherland (G&S). The approach assisted WCC in locating the current stage of its Information Technology (IT) maturity. From the analysis undertaken, it finds that IT currently is within stages 4 and stage 5 in seven stages. The final result will be the framework of the design as recommendations to the WCC.
An Analysis of Bitcoin Acceptance in Indonesia Gunawan, Fergyanto E.; Novendra, Rizki
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3885

Abstract

This research intended to understand the factors affecting the acceptance of Bitcoin technology in Indonesia. It adopted the model of Unified Theory of Acceptance and Use of Technology (UTAUT), which took into account four influencing factors. Those were performance expectancy, effort expectancy, social influence, and facilitating conditions. The factors of gender and age were assumed to moderate the relations between those four factors and use and behavioral intention. The empirical data for those factors were collected by questionnaires from 49 respondents. The statistical significance of the relationships was evaluated by multivariate regression analysis. The result is a model that matches the data with R2 = 0,678. It demonstrates a high level of fitness. The analysis suggests that the performance expectancy factor and the social influence factor greatly affect the behavioral intention to use Bitcoin with the values of t-statistic of 3,835 (p-value = 0,000) for the former factor and 1,948 (0,059) for the latter factor. However, the social influence factor has less profound effect on the behavioral intention.
Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN) Abdurohman, Maman; Prasetiawan, Dani; Yulianto, Fazmah Arif
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3902

Abstract

This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.
Editorial Page and Table of Content Manik, Ngarap Imanuel
ComTech: Computer, Mathematics and Engineering Applications Vol 8, No 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4357

Abstract

Page 1 of 1 | Total Record : 6


Filter by Year

2017 2017


Filter By Issues
All Issue Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue