ComTech最新文献

筛选
英文 中文
The Proposed Maintenance Task for Plastic Injection Machine Using Reliability and Risk Centered Maintenance (RRCM) method in Manufacturing Industry 基于可靠性和风险中心维修方法的注塑机维修任务建议
ComTech Pub Date : 2019-12-31 DOI: 10.21512/comtech.v10i2.5900
Liza Nafiah Maulidina, F. T. D. Atmaji, J. Alhilman
{"title":"The Proposed Maintenance Task for Plastic Injection Machine Using Reliability and Risk Centered Maintenance (RRCM) method in Manufacturing Industry","authors":"Liza Nafiah Maulidina, F. T. D. Atmaji, J. Alhilman","doi":"10.21512/comtech.v10i2.5900","DOIUrl":"https://doi.org/10.21512/comtech.v10i2.5900","url":null,"abstract":"The objective of this research was to determine the optimal maintenance time interval for the selected critical components and the total cost of maintenance of a plastic injection machine. In determining the critical components, a risk matrix was used, and three components were selected, namely, hydraulic hose, barrel, and motor. Using the Reliability and Risk Centered Maintenance (RRCM) method, the researchers got a proposed maintenance policy and the total maintenance cost. Based on the result, it shows that there are seven proposed maintenance tasks with three scheduled oncondition tasks and four scheduled restoration tasks with an average maintenance interval of two months. The total maintenance cost proposed is IDR91.595.318. The cost is smaller compared to the actual maintenance costs of the company.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45024377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Development of Data Warehouse from Payment Point Services of IT Business Solution Provider 从IT业务解决方案提供商的支付点服务看数据仓库的开发
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.4032
Kornelius Irfandhi
{"title":"The Development of Data Warehouse from Payment Point Services of IT Business Solution Provider","authors":"Kornelius Irfandhi","doi":"10.21512/COMTECH.V8I4.4032","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.4032","url":null,"abstract":"The goals of the research is to develop a data warehouse loaded from operational database of payment point service in IT business solution provider. The development scope is data analysis using Online Analytical Processing (OLAP) tools for identifying the trends of transaction and agent registration, and create reports and dashboards. The data warehouse was developed with Kimball method as known as the nine-step design methodology. The data and requirement were collected by observation and interview with Chief Technology Officer (CTO). The data warehouse was analyzed by OLAP tool provided by Pentaho Business Analytics software with additional plugin Pivot4J. The obtained results are the trends of transaction and agent registration between 2014 and 2015. It can be concluded that developed data warehouse can be used as ananalysis tool to know the trends information.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44293831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benthix VR: A Virtual Reality Simulation Application to Preserve Traditional Benthik Game Benthix VR:保留传统Benthix游戏的虚拟现实仿真应用
ComTech Pub Date : 2017-12-31 DOI: 10.21512/comtech.v8i4.4036
Abas Setiawan, A. Nugraha, Hanny Haryanto, I. Gamayanto
{"title":"Benthix VR: A Virtual Reality Simulation Application to Preserve Traditional Benthik Game","authors":"Abas Setiawan, A. Nugraha, Hanny Haryanto, I. Gamayanto","doi":"10.21512/comtech.v8i4.4036","DOIUrl":"https://doi.org/10.21512/comtech.v8i4.4036","url":null,"abstract":"This research aimed to preserve Benthik traditional game using Benthix VR. Benthix VR used the Virtual Reality Interface Design (VRID) development model. The development phase of the VRID model started from High Level to Low-Level phase. The High-Level Design (HLD) phase consisted of identifying data elements and multiple objects, and modeling component objects. The output from the HLD phase would be input to the Low-Level Design (LLD) phase. The LLD phase was a phase of repetition and fine-tunes from the modeling of several component objects thoroughly. Testing of Benthix VR was conducted on 34 respondents with five assessment aspects. Those were enjoyment, realism, interactivity, usability, and impact. The average result of the questionnaire assessment of all aspects is 3,18824. These results indicate that users feel that Benthix VR is comfortable, realistic, interactive, and fascinating. Moreover, they are also interested in playing Benthik in the real world after using the application.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44365760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Wollongong City Council using 7s’s of Galliers and Sutherland Methods 运用Galliers和Sutherland方法对卧龙岗市议会的分析
ComTech Pub Date : 2017-12-31 DOI: 10.21512/comtech.v8i4.4022
I. Gamayanto
{"title":"Analysis of Wollongong City Council using 7s’s of Galliers and Sutherland Methods","authors":"I. Gamayanto","doi":"10.21512/comtech.v8i4.4022","DOIUrl":"https://doi.org/10.21512/comtech.v8i4.4022","url":null,"abstract":"The research analyzed website of Wollongong City Council (WCC) and all the plans done by the WCC. It also showed details an Information Systems (IS) strategic plan for WCC. Although the WCC already had an integrated system, there were several key issues. The framework used to devise IS plan was seven stages (7S) of Gallier and Sutherland (G&S). The approach assisted WCC in locating the current stage of its Information Technology (IT) maturity. From the analysis undertaken, it finds that IT currently is within stages 4 and stage 5 in seven stages. The final result will be the framework of the design as recommendations to the WCC.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49143823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of Bitcoin Acceptance in Indonesia 印尼对比特币的接受度分析
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.3885
F. Gunawan, Rizki Novendra
{"title":"An Analysis of Bitcoin Acceptance in Indonesia","authors":"F. Gunawan, Rizki Novendra","doi":"10.21512/COMTECH.V8I4.3885","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.3885","url":null,"abstract":"This research intended to understand the factors affecting the acceptance of Bitcoin technology in Indonesia. It adopted the model of Unified Theory of Acceptance and Use of Technology (UTAUT), which took into account four influencing factors. Those were performance expectancy, effort expectancy, social influence, and facilitating conditions. The factors of gender and age were assumed to moderate the relations between those four factors and use and behavioral intention. The empirical data for those factors were collected by questionnaires from 49 respondents. The statistical significance of the relationships was evaluated by multivariate regression analysis. The result is a model that matches the data with R2 = 0,678. It demonstrates a high level of fitness. The analysis suggests that the performance expectancy factor and the social influence factor greatly affect the behavioral intention to use Bitcoin with the values of t-statistic of 3,835 (p-value = 0,000) for the former factor and 1,948 (0,059) for the latter factor. However, the social influence factor has less profound effect on the behavioral intention.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41516406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN) 在软件定义网络(SDN)中使用熵方法改进分布式拒绝服务(DDOS)检测
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.3902
M. Abdurohman, Dani Prasetiawan, F. A. Yulianto
{"title":"Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN)","authors":"M. Abdurohman, Dani Prasetiawan, F. A. Yulianto","doi":"10.21512/COMTECH.V8I4.3902","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.3902","url":null,"abstract":"This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45329343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Technopreneurship Project Management System with Coaching and Mentoring Features 以辅导辅导为特色的科技创业项目管理系统
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.4135
Stephanus Eko Wahyudi, Kartika Gianina Tileng
{"title":"Enhancing Technopreneurship Project Management System with Coaching and Mentoring Features","authors":"Stephanus Eko Wahyudi, Kartika Gianina Tileng","doi":"10.21512/COMTECH.V8I4.4135","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.4135","url":null,"abstract":"This research aimed to find the system features for remote, synchronous, and asynchronous communication and collaboration among the students. The research design was through an exploratory case study. The data collection method was in-depth interview with experienced supervisors and the subject coordinators. The result of the research is the necessary features to be included in the updated version of the information systems. The various coaching and mentoring features can support subject coordinators, supervisors, and students and allow them to complete the subject on time and in accordance with the standards","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41521877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Implementation of Quality Function Deployment (QFD) in Tire Industry 质量功能展开(QFD)在轮胎工业中的实施
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.3792
H. A. Hadi, H. Purba, Kurnia Sigma Indarto, Rorio Gomgom Paska Simarmata, Guntur Pratama Putra, Dabith Ghazali, S. Aisyah
{"title":"The Implementation of Quality Function Deployment (QFD) in Tire Industry","authors":"H. A. Hadi, H. Purba, Kurnia Sigma Indarto, Rorio Gomgom Paska Simarmata, Guntur Pratama Putra, Dabith Ghazali, S. Aisyah","doi":"10.21512/COMTECH.V8I4.3792","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.3792","url":null,"abstract":"This research had two main objectives. The first research objective was to make the right design of new product according to customer requirements with the implementation of Quality Function Deployment (QFD) in the tire industry. The second research objective was to enhance competitiveness based on the renewal of marketing strategy and consumer needs, non-explosive prohibition, non-slip tires, no bulgy, and competitive prices. The research was carried out by using costumer satisfaction rating by comparing with the competitor companies. Based on calculation using QFD method, it shows that split liner has the highest percentage of technical requirement in tire industry about 30,57%. The second factor is pattern design about 25,98%. Then, the third factor is compound technology about 22,68%. Therefore, the researchers can recommend several strategies for the quality improvement based on customer needs for the tire industry.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41528853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Question Categorization using Lexical Feature in Opini.id 基于词汇特征的opinion .id问题分类
ComTech Pub Date : 2017-12-31 DOI: 10.21512/COMTECH.V8I4.4026
C. Saputra, Derwin Suhartono, Rini Wongso
{"title":"Question Categorization using Lexical Feature in Opini.id","authors":"C. Saputra, Derwin Suhartono, Rini Wongso","doi":"10.21512/COMTECH.V8I4.4026","DOIUrl":"https://doi.org/10.21512/COMTECH.V8I4.4026","url":null,"abstract":"This research aimed to categorize questions posted in Opini.id. N-gram and Bag of Concept (BOC) were used as the lexical features. Those were combined with Naive Bayes, Support Vector Machine (SVM), and J48 Tree as the classification method. The experiments were done by using data from online media portal to categorize questions posted by user. Based on the experiments, the best accuracy is 96,5%. It is obtained by using the combination of Bigram Trigram Keyword (BTK) features with J48 Tree as classifier. Meanwhile, the combination of Unigram Bigram (UB) and Unigram Bigram Keyword (UBK) with attribute selection in WEKA achieves the accuracy of 95,94% by using SVM as the classifier.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45469992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filtering and Wavelet Transform Algorithm for Old Document Image Restoration 旧文档图像复原的滤波和小波变换算法
ComTech Pub Date : 2017-09-30 DOI: 10.21512/comtech.v8i3.3995
R. S. Samosir
{"title":"Filtering and Wavelet Transform Algorithm for Old Document Image Restoration","authors":"R. S. Samosir","doi":"10.21512/comtech.v8i3.3995","DOIUrl":"https://doi.org/10.21512/comtech.v8i3.3995","url":null,"abstract":"The aim of this research was to develop image restoration system using filtering and wavelet transform algorithm. Data collection was through observation and system was developed using prototyping model. Result of this research is a computer based on system to restore image containing noise. Based on the research process, filtering and wavelet transform algorithm can used to restore old document image from interferences (noise).","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43739693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信