Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2501
Ratna Dewi, Putri Kartika Sari
The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.
{"title":"The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images","authors":"Ratna Dewi, Putri Kartika Sari","doi":"10.21512/COMTECH.V7I3.2501","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2501","url":null,"abstract":"The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"213-223"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2494
Karto Iskandar, Andrew Thejo Putranto
A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.
web服务是由一个设备通过万维网与其他电子设备进行电子通信而提供的服务。智能手机是一种电子设备,几乎每个人都有,尤其是学生和家长获取有关学校的信息。在BINUS School Serpong移动应用程序中,web服务用于从web服务器获取数据,如学生和菜单数据。BINUS School Serpong目前面临的问题是,在使用本机应用程序时,应用程序更新非常耗时,而应用程序更新非常频繁。为了解决这个问题,BINUS学校的手机应用程序将使用web服务。本文展示了如何使用带有XML的web服务检索学生数据。这项研究的结果是,通过使用网络服务,智能手机可以在多个平台之间一致地检索数据。
{"title":"Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong","authors":"Karto Iskandar, Andrew Thejo Putranto","doi":"10.21512/COMTECH.V7I3.2494","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2494","url":null,"abstract":"A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"59 1","pages":"181-189"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2491
Ikhtiar Faahakhododo, I. Rianto
In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.
{"title":"Risk Management Method In It Project: A Review","authors":"Ikhtiar Faahakhododo, I. Rianto","doi":"10.21512/COMTECH.V7I3.2491","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2491","url":null,"abstract":"In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"173-180"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2499
B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo
Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.
{"title":"Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review","authors":"B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo","doi":"10.21512/COMTECH.V7I3.2499","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2499","url":null,"abstract":"Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"201-211"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2503
Andry Chowanda, Alan Darmasaputra Chowanda
This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events
{"title":"Gamification of Learning: Can Games Motivate Me to Learn History?","authors":"Andry Chowanda, Alan Darmasaputra Chowanda","doi":"10.21512/COMTECH.V7I3.2503","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2503","url":null,"abstract":"This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"225-232"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/comtech.v7i3.2534
Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama
Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.
{"title":"Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm","authors":"Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama","doi":"10.21512/comtech.v7i3.2534","DOIUrl":"https://doi.org/10.21512/comtech.v7i3.2534","url":null,"abstract":"Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"161-171"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.21512/COMTECH.V7I4.3764
Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya
This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.
{"title":"The Power of the Test for the Winsorized Modified Alexander-Govern Test","authors":"Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya","doi":"10.21512/COMTECH.V7I4.3764","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I4.3764","url":null,"abstract":"This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"307-323"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2254
A. D. Sano, Hendro Nindito
The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.
{"title":"Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia","authors":"A. D. Sano, Hendro Nindito","doi":"10.21512/COMTECH.V7I2.2254","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2254","url":null,"abstract":"The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"141-150"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2245
H. Purba
An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.
{"title":"Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X","authors":"H. Purba","doi":"10.21512/COMTECH.V7I2.2245","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2245","url":null,"abstract":"An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"56 1","pages":"91-103"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2247
Zahedi Zahedi, A. Salim
This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run) up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.
{"title":"Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling","authors":"Zahedi Zahedi, A. Salim","doi":"10.21512/COMTECH.V7I2.2247","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2247","url":null,"abstract":"This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run) up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"105-112"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}