cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol. 8 No. 4 (2017): ComTech" : 8 Documents clear
The Implementation of Quality Function Deployment (QFD) in Tire Industry Hari Abdul Hadi; Humiras Hardi Purba; Kurnia Sigma Indarto; Rorio Gomgom Paska Simarmata; Guntur Pratama Putra; Dabith Ghazali; Siti Aisyah
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3792

Abstract

This research had two main objectives. The first research objective was to make the right design of new product according to customer requirements with the implementation of Quality Function Deployment (QFD) in the tire industry. The second research objective was to enhance competitiveness based on the renewal of marketing strategy and consumer needs, non-explosive prohibition, non-slip tires, no bulgy, and competitive prices. The research was carried out by using costumer satisfaction rating by comparing with the competitor companies. Based on calculation using QFD method, it shows that split liner has the highest percentage of technical requirement in tire industry about 30,57%. The second factor is pattern design about 25,98%. Then, the third factor is compound technology about 22,68%. Therefore, the researchers can recommend several strategies for the quality improvement based on customer needs for the tire industry.
An Analysis of Bitcoin Acceptance in Indonesia Fergyanto E. Gunawan; Rizki Novendra
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3885

Abstract

This research intended to understand the factors affecting the acceptance of Bitcoin technology in Indonesia. It adopted the model of Unified Theory of Acceptance and Use of Technology (UTAUT), which took into account four influencing factors. Those were performance expectancy, effort expectancy, social influence, and facilitating conditions. The factors of gender and age were assumed to moderate the relations between those four factors and use and behavioral intention. The empirical data for those factors were collected by questionnaires from 49 respondents. The statistical significance of the relationships was evaluated by multivariate regression analysis. The result is a model that matches the data with R2 = 0,678. It demonstrates a high level of fitness. The analysis suggests that the performance expectancy factor and the social influence factor greatly affect the behavioral intention to use Bitcoin with the values of t-statistic of 3,835 (p-value = 0,000) for the former factor and 1,948 (0,059) for the latter factor. However, the social influence factor has less profound effect on the behavioral intention.
Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN) Maman Abdurohman; Dani Prasetiawan; Fazmah Arif Yulianto
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3902

Abstract

This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.
Analysis of Wollongong City Council using 7s’s of Galliers and Sutherland Methods Indra Gamayanto
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4022

Abstract

The research analyzed website of Wollongong City Council (WCC) and all the plans done by the WCC. It also showed details an Information Systems (IS) strategic plan for WCC. Although the WCC already had an integrated system, there were several key issues. The framework used to devise IS plan was seven stages (7S) of Gallier and Sutherland (G&S). The approach assisted WCC in locating the current stage of its Information Technology (IT) maturity. From the analysis undertaken, it finds that IT currently is within stages 4 and stage 5 in seven stages. The final result will be the framework of the design as recommendations to the WCC.
Question Categorization using Lexical Feature in Opini.id Christian Eka Saputra; Derwin Suhartono; Rini Wongso
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4026

Abstract

This research aimed to categorize questions posted in Opini.id. N-gram and Bag of Concept (BOC) were used as the lexical features. Those were combined with Naïve Bayes, Support Vector Machine (SVM), and J48 Tree as the classification method. The experiments were done by using data from online media portal to categorize questions posted by user. Based on the experiments, the best accuracy is 96,5%. It is obtained by using the combination of Bigram Trigram Keyword (BTK) features with J48 Tree as classifier. Meanwhile, the combination of Unigram Bigram (UB) and Unigram Bigram Keyword (UBK) with attribute selection in WEKA achieves the accuracy of 95,94% by using SVM as the classifier.
The Development of Data Warehouse from Payment Point Services of IT Business Solution Provider Kornelius Irfandhi
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4032

Abstract

The goals of the research is to develop a data warehouse loaded from operational database of payment point service in IT business solution provider. The development scope is data analysis using Online Analytical Processing (OLAP) tools for identifying the trends of transaction and agent registration, and create reports and dashboards. The data warehouse was developed with Kimball method as known as the nine-step design methodology. The data and requirement were collected by observation and interview with Chief Technology Officer (CTO). The data warehouse was analyzed by OLAP tool provided by Pentaho Business Analytics software with additional plugin Pivot4J. The obtained results are the trends of transactionand agent registration between 2014 and 2015. It can be concluded that developed data warehouse can be used as ananalysis tool to know the trends information.
Benthix VR: A Virtual Reality Simulation Application to Preserve Traditional Benthik Game Abas Setiawan; Alvin Satria Nugraha; Hanny Haryanto; Indra Gamayanto
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4036

Abstract

This research aimed to preserve Benthik traditional game using Benthix VR. Benthix VR used the Virtual Reality Interface Design (VRID) development model. The development phase of the VRID model started from High Level to Low-Level phase. The High-Level Design (HLD) phase consisted of identifying data elements and multiple objects, and modeling component objects. The output from the HLD phase would be input to the Low-Level Design (LLD) phase. The LLD phase was a phase of repetition and fine-tunes from the modeling of several component objects thoroughly. Testing of Benthix VR was conducted on 34 respondents with five assessment aspects. Those were enjoyment, realism, interactivity, usability, and impact. The average result of the questionnaire assessment of all aspects is 3,18824. These results indicate that users feel that Benthix VR is comfortable, realistic, interactive, and fascinating. Moreover, they are also interested in playing Benthik in the real world after using the application.
Enhancing Technopreneurship Project Management System with Coaching and Mentoring Features Stephanus Eko Wahyudi; Kartika Gianina Tileng
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.4135

Abstract

This research aimed to find the system features for remote, synchronous, and asynchronous communication and collaboration among the students. The research design was through an exploratory case study. The data collection method was in-depth interview with experienced supervisors and the subject coordinators. The result of the research is the necessary features to be included in the updated version of the information systems. The various coaching and mentoring features can support subject coordinators, supervisors, and students and allow them to complete the subject on time and in accordance with the standards

Page 1 of 1 | Total Record : 8


Filter by Year

2017 2017


Filter By Issues
All Issue Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue