Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2501
Ratna Dewi, Putri Kartika Sari
The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.
{"title":"The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images","authors":"Ratna Dewi, Putri Kartika Sari","doi":"10.21512/COMTECH.V7I3.2501","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2501","url":null,"abstract":"The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"213-223"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2494
Karto Iskandar, Andrew Thejo Putranto
A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.
web服务是由一个设备通过万维网与其他电子设备进行电子通信而提供的服务。智能手机是一种电子设备,几乎每个人都有,尤其是学生和家长获取有关学校的信息。在BINUS School Serpong移动应用程序中,web服务用于从web服务器获取数据,如学生和菜单数据。BINUS School Serpong目前面临的问题是,在使用本机应用程序时,应用程序更新非常耗时,而应用程序更新非常频繁。为了解决这个问题,BINUS学校的手机应用程序将使用web服务。本文展示了如何使用带有XML的web服务检索学生数据。这项研究的结果是,通过使用网络服务,智能手机可以在多个平台之间一致地检索数据。
{"title":"Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong","authors":"Karto Iskandar, Andrew Thejo Putranto","doi":"10.21512/COMTECH.V7I3.2494","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2494","url":null,"abstract":"A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"59 1","pages":"181-189"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2491
Ikhtiar Faahakhododo, I. Rianto
In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.
{"title":"Risk Management Method In It Project: A Review","authors":"Ikhtiar Faahakhododo, I. Rianto","doi":"10.21512/COMTECH.V7I3.2491","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2491","url":null,"abstract":"In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"173-180"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2499
B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo
Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.
{"title":"Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review","authors":"B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo","doi":"10.21512/COMTECH.V7I3.2499","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2499","url":null,"abstract":"Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"201-211"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/COMTECH.V7I3.2503
Andry Chowanda, Alan Darmasaputra Chowanda
This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events
{"title":"Gamification of Learning: Can Games Motivate Me to Learn History?","authors":"Andry Chowanda, Alan Darmasaputra Chowanda","doi":"10.21512/COMTECH.V7I3.2503","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2503","url":null,"abstract":"This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"225-232"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.21512/comtech.v7i3.2534
Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama
Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.
{"title":"Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm","authors":"Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama","doi":"10.21512/comtech.v7i3.2534","DOIUrl":"https://doi.org/10.21512/comtech.v7i3.2534","url":null,"abstract":"Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"161-171"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.21512/COMTECH.V7I4.3764
Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya
This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.
{"title":"The Power of the Test for the Winsorized Modified Alexander-Govern Test","authors":"Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya","doi":"10.21512/COMTECH.V7I4.3764","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I4.3764","url":null,"abstract":"This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"307-323"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2254
A. D. Sano, Hendro Nindito
The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.
{"title":"Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia","authors":"A. D. Sano, Hendro Nindito","doi":"10.21512/COMTECH.V7I2.2254","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2254","url":null,"abstract":"The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"141-150"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2245
H. Purba
An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.
{"title":"Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X","authors":"H. Purba","doi":"10.21512/COMTECH.V7I2.2245","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2245","url":null,"abstract":"An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"56 1","pages":"91-103"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.21512/COMTECH.V7I2.2242
Gunaran Danny, K. Y. Nasus, Josep P. F Napitupulu, A. Makmur
As time passes, flood often occurs in the area of Gunung Sahari, Jakarta Utara. The flood damages concrete asphalt mixture and it needs particular improvement. Therefore, the purpose of this research is to know the effects of the added combination of limestone and calcium hydroxide on concrete asphalt mixture as a filler resistant to flood. Concrete asphalt mixture that filled with the combination of limestone and calcium hydroxide is a mixture that is made with non-uniform aggregat gradations, filler and liquid asphalt mixed and solidified in a heat state. Limestone and calcium hydroxide mixture is used because both materials included in the most numerous sedimentary rock. Concrete asphalt mixture with the filler combination of limestone and calcium hydroxide is made with optimum asphalt 5.4%, one variation level of limestone (15%), and calcium hydroxide (15%), and three variation levels of fillers (5%, 7.5%, and 15%) to get optimum asphalt levels and filler levels that are compatible with flood condition. Based on optimum asphalt 5.4% towards aggregate total weight and combined level of limestone and calcium hydroxide suitable for the conditions, 8.75 % towards fine aggregate weight. The characteristic value of limestone and calcium hydroxide mixture in maximum condition is VIM 4.55%, VMA 18.83%, stability 1031.26 kg and flow 4.93 mm, where the characteristic value meets the established specifications standard by Pekerjaan Umum Bina Marga. From the result, it is showed that the use of the mixture can decrease the value of stability and increase the value of flow, compared with asphalt and filler with normal levels.
随着时间的推移,洪水经常发生在古南撒哈拉地区,雅加达Utara。洪水对混凝土沥青混合料的破坏,需要特别的改进。因此,本研究的目的是了解添加石灰石和氢氧化钙组合作为抗洪水填料对混凝土沥青混合料的影响。石灰石和氢氧化钙组合填充的混凝土沥青混合料是由不均匀的骨料级配、填料和液体沥青混合而成的混合物,在热状态下固化而成。之所以使用石灰石和氢氧化钙的混合物,是因为这两种材料包含在沉积岩中最多。以最佳沥青5.4%、石灰石1个变化水平(15%)、氢氧化钙1个变化水平(15%)、填料3个变化水平(5%、7.5%、15%)配制石灰石-氢氧化钙填料组合混凝土沥青混合料,得到与洪水条件相适应的最佳沥青水平和填料水平。以最佳沥青为基础,骨料总重为5.4%,石灰石和氢氧化钙的组合水平适宜,细骨料重量为8.75%。石灰石和氢氧化钙混合料在最大工况下的特征值为VIM 4.55%, VMA 18.83%,稳定性1031.26 kg,流量4.93 mm,符合Pekerjaan Umum Bina Marga制定的规范标准。结果表明,与正常水平的沥青和填料相比,掺加该混合料会降低混凝土的稳定性值,增加混凝土的流动值。
{"title":"The Influence of Limestone And Calcium Hydroxide Addition in Asphalt Concrete Mixture","authors":"Gunaran Danny, K. Y. Nasus, Josep P. F Napitupulu, A. Makmur","doi":"10.21512/COMTECH.V7I2.2242","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2242","url":null,"abstract":"As time passes, flood often occurs in the area of Gunung Sahari, Jakarta Utara. The flood damages concrete asphalt mixture and it needs particular improvement. Therefore, the purpose of this research is to know the effects of the added combination of limestone and calcium hydroxide on concrete asphalt mixture as a filler resistant to flood. Concrete asphalt mixture that filled with the combination of limestone and calcium hydroxide is a mixture that is made with non-uniform aggregat gradations, filler and liquid asphalt mixed and solidified in a heat state. Limestone and calcium hydroxide mixture is used because both materials included in the most numerous sedimentary rock. Concrete asphalt mixture with the filler combination of limestone and calcium hydroxide is made with optimum asphalt 5.4%, one variation level of limestone (15%), and calcium hydroxide (15%), and three variation levels of fillers (5%, 7.5%, and 15%) to get optimum asphalt levels and filler levels that are compatible with flood condition. Based on optimum asphalt 5.4% towards aggregate total weight and combined level of limestone and calcium hydroxide suitable for the conditions, 8.75 % towards fine aggregate weight. The characteristic value of limestone and calcium hydroxide mixture in maximum condition is VIM 4.55%, VMA 18.83%, stability 1031.26 kg and flow 4.93 mm, where the characteristic value meets the established specifications standard by Pekerjaan Umum Bina Marga. From the result, it is showed that the use of the mixture can decrease the value of stability and increase the value of flow, compared with asphalt and filler with normal levels.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":"7 1","pages":"83-90"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}