首页 > 最新文献

ComTech最新文献

英文 中文
The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images 利用双密钥图像改进Flip(2,2)视觉密码图像
Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2501
Ratna Dewi, Putri Kartika Sari
The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.
翻转(2,2)视觉加密(FVC)是一种用于将两个秘密图像加密为两个双重透明的技术。这两个透明度可以发送给客观的人。将两个透明片叠加得到第一秘密图像,将一个透明片与翻转的另一个透明片叠加得到第二秘密图像。但是,结果解密过程中仍然存在噪声,解密后的秘密图像质量与原始秘密图像质量不一致。本文提出了一种提高解密图像质量的新算法。在此过程中,将解密过程中得到的两个秘密图像与两个原始秘密图像进行比较。将解密图像与原始秘密图像相减后得到的每个像素的不同值插入到两个密钥图像中。这种改进的实验结果具有很好的相似性。可以消除解密过程中的噪声,从而重建出与原秘密图像相似的两张秘密图像。
{"title":"The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images","authors":"Ratna Dewi, Putri Kartika Sari","doi":"10.21512/COMTECH.V7I3.2501","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2501","url":null,"abstract":"The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"213-223"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong 宾士学校家长和学生在移动应用中使用Web服务的情况
Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2494
Karto Iskandar, Andrew Thejo Putranto
A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.
web服务是由一个设备通过万维网与其他电子设备进行电子通信而提供的服务。智能手机是一种电子设备,几乎每个人都有,尤其是学生和家长获取有关学校的信息。在BINUS School Serpong移动应用程序中,web服务用于从web服务器获取数据,如学生和菜单数据。BINUS School Serpong目前面临的问题是,在使用本机应用程序时,应用程序更新非常耗时,而应用程序更新非常频繁。为了解决这个问题,BINUS学校的手机应用程序将使用web服务。本文展示了如何使用带有XML的web服务检索学生数据。这项研究的结果是,通过使用网络服务,智能手机可以在多个平台之间一致地检索数据。
{"title":"Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong","authors":"Karto Iskandar, Andrew Thejo Putranto","doi":"10.21512/COMTECH.V7I3.2494","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2494","url":null,"abstract":"A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"59 1","pages":"181-189"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management Method In It Project: A Review It项目中的风险管理方法综述
Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2491
Ikhtiar Faahakhododo, I. Rianto
In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.
在一个软件的开发中,有几个方面必须采取,以确保该过程可以产生一个有用的产品,并赚取利润。本文阐明了风险管理存在的一些方法。在本研究中使用了两种技术来确定风险,它们是过程结构度量和参考模型,或者可以参考与参考模型技术的比较。该技术将产生软件过程元模型、风险管理模型和管理项目模型中的风险。这些模型被用来帮助管理人员绘制项目的风险图。
{"title":"Risk Management Method In It Project: A Review","authors":"Ikhtiar Faahakhododo, I. Rianto","doi":"10.21512/COMTECH.V7I3.2491","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2491","url":null,"abstract":"In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"173-180"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review 社交媒体信息披露的潜在威胁:系统文献综述
Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2499
B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo
Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.
随着社交媒体的发展,对用户的各种潜在威胁也在不断增加。这些类型的威胁通常是因为用户意外或不知情地在社交媒体上泄露了他们的信息或身份而发生的。需要了解信息披露所产生的威胁,以便用户能够了解所产生的风险并采取预防措施。本研究旨在总结社交媒体信息泄露所带来的潜在威胁。采用的研究方法是系统的文献综述,对讨论特定主题的文献进行探索和总结。研究结果表明,潜在的威胁主要是社会威胁和身份盗窃。
{"title":"Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review","authors":"B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo","doi":"10.21512/COMTECH.V7I3.2499","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2499","url":null,"abstract":"Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"201-211"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamification of Learning: Can Games Motivate Me to Learn History? 学习的游戏化:游戏能激励我学习历史吗?
Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2503
Andry Chowanda, Alan Darmasaputra Chowanda
This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events
本文提出了游戏化对学习效果的实证研究结果。实证研究的结果表明,这两款教育游戏是在早期开发的,共有64名参与者。第一款游戏是一款以Singhasari王国的Ken Arok和Ken Dedes为历史主题的电脑游戏。第二款游戏是基于android平台的手机游戏,以摩西为主题。先前的研究表明,雅加达超过50%的初中和高中学生对学校的几门课程表现出冷漠。他们还透露,特别是在历史等较难的科目上,他们很难跟上课堂。随着游戏的普及,研究了学习的游戏化,以提高学生掌握某一学科的兴趣。结果表明,与单独阅读有关特定主题书籍的小组相比,使用游戏帮助他们学习历史主题的小组的学生得分和兴趣有统计学意义的增加0.001。此外,参与者还报告说,玩游戏有助于他们记住历史事件中困难的名字和事件时间表
{"title":"Gamification of Learning: Can Games Motivate Me to Learn History?","authors":"Andry Chowanda, Alan Darmasaputra Chowanda","doi":"10.21512/COMTECH.V7I3.2503","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2503","url":null,"abstract":"This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"225-232"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm 使用Dijkstra算法实现动态权值最短路径
Pub Date : 2016-09-30 DOI: 10.21512/comtech.v7i3.2534
Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama
Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.
长期以来,最短路径算法一直被应用于以最小的成本或时间选择最可行的路径来解决日常问题。然而,有些问题并不简单。本研究使用Dijkstra算法对具有两种可能的有向图(单向和双向)的街道路线图进行了应用。每个费用可以随时改变,代表交通状况的变化。结果表明,在路径映射中使用单向有向图确实可以使目标达到,而使用双向有向图可能会引起混淆,尽管这可能是现实世界中可能的选择。两个实验都表明,在到达目标的中途重新计算最短路径没有额外的计算压力。
{"title":"Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm","authors":"Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama","doi":"10.21512/comtech.v7i3.2534","DOIUrl":"https://doi.org/10.21512/comtech.v7i3.2534","url":null,"abstract":"Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"161-171"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Power of the Test for the Winsorized Modified Alexander-Govern Test winsorization Modified Alexander-Govern Test的检验能力
Pub Date : 2016-07-25 DOI: 10.21512/COMTECH.V7I4.3764
Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya
This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.
本研究检验了参数方法在比较两个或多个均值作为独立组检验时的使用,例如,Alexander-Govern (AG)检验。利用均值作为方差多样性分布中心的行列式发生在检验中,该检验在保持I型误差的数量和对常规数据的巨大灵敏度方面提供了卓越的性能。不幸的是,它对不规则数据是无效的,导致在两组条件下不规则数据的分布中心的决定因素是在检验后的裁剪均值。然而,由于组数量大于两个,估计器无法在保持第一类误差的数量方面提供卓越。因此,引入了一种高效的估计量——MOM估计量作为分布中心的行列式进行检验。测试中的组数量不影响估计量,但在强烈的不对称和不均匀情况下,它不能成功地提供保持I型误差量的卓越性。将Winsorized modified one-step M-estimator (WMOM)应用于Alexander-Govern检验,克服了在存在方差多样性的不规则数据下存在的缺点,消除了外部观测的存在,为不规则数据的检验提供了有效性。采用统计分析软件(SAS)对试验进行分析。结果表明,AGWMOM试验在g = 0,5和h = 0,5条件下灵敏度最高,在4组g = 0和h = 0条件下灵敏度最高,在6组g = 0和h = 0条件下灵敏度最高。
{"title":"The Power of the Test for the Winsorized Modified Alexander-Govern Test","authors":"Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya","doi":"10.21512/COMTECH.V7I4.3764","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I4.3764","url":null,"abstract":"This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"307-323"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia K-Means算法在印尼省贫困聚类分析中的应用
Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2254
A. D. Sano, Hendro Nindito
The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.
本研究的目的是应用聚类分析或也称为聚类对印度尼西亚各省的贫困数据。问题是,涉及贫穷问题的中央政府、地方政府和非政府组织等决策者需要一种工具来支持与社会福利问题有关的决策过程。聚类分析采用kmeans算法。本研究使用的数据来自2014年巴丹市中央统计局(BPS)。本研究的聚类分析采用了印度尼西亚各省的绝对贫困、各省的相对贫困数量或百分比、各省的深度指数贫困水平等数据特征。本研究的聚类分析结果以聚类成员分组的形式直观地呈现出来。研究中的聚类分析可以更快速有效地识别印度尼西亚各省的贫困图表。政府组织、非政府组织和私人组织等决策者可以利用这种鉴定的结果,他们有兴趣消除印度尼西亚与贫穷和福利分配有关的问题。
{"title":"Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia","authors":"A. D. Sano, Hendro Nindito","doi":"10.21512/COMTECH.V7I2.2254","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2254","url":null,"abstract":"The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"141-150"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X 用六西格玛方法减少小松Hd465-7拖运机作业停机时间
Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2245
H. Purba
An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.
运行停止时间是指重型设备不能正常工作的状态。避免这种情况非常重要,因为过度空转会浪费大量的燃料和金钱。然而,HD465-7自卸卡车的作业停车时间为2.83分钟,远远超过正常标准。本项目旨在利用六西格玛方法优化方案选择,优化生产停止时间的改进。这将使运行停止时间在1.25至1.65分钟内恢复到标准范围。这些定义、测量、分析、改进和控制的步骤根据六西格玛建立的规则和标准应用于标准化过程。结果发现,在PT X中应用的六西格玛方法使成本从每月1,105,300美元减少到963,000美元。将6辆自卸卡车组合在一起,以22公里/小时的速度行驶,平均模拟运输距离为2000米,对匹配车队进行了改进。
{"title":"Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X","authors":"H. Purba","doi":"10.21512/COMTECH.V7I2.2245","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2245","url":null,"abstract":"An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"56 1","pages":"91-103"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling 将预防性维修计划整合为概率机器故障和批量生产计划
Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2247
Zahedi Zahedi, A. Salim
This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run) up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.
讨论了批量生产调度与机器维修调度的集成模型。批量生产调度使用最小化总实际流程时间标准,机器维护调度使用基于威布尔分布的机器故障概率。该模型假设在规划范围内没有不合格部件。该模型显示,增加的批数(生产运行的长度)达到一定限度,将最小化的总实际流动时间。同时,生产周期的增加会导致PM数量的增加。最后通过一个算例说明了该模型和算法的工作原理。
{"title":"Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling","authors":"Zahedi Zahedi, A. Salim","doi":"10.21512/COMTECH.V7I2.2247","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2247","url":null,"abstract":"This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run) up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"105-112"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ComTech
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1