ComTech最新文献

筛选
英文 中文
The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images 利用双密钥图像改进Flip(2,2)视觉密码图像
ComTech Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2501
Ratna Dewi, Putri Kartika Sari
{"title":"The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images","authors":"Ratna Dewi, Putri Kartika Sari","doi":"10.21512/COMTECH.V7I3.2501","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2501","url":null,"abstract":"The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong 宾士学校家长和学生在移动应用中使用Web服务的情况
ComTech Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2494
Karto Iskandar, Andrew Thejo Putranto
{"title":"Usage of Web Service in Mobile Application for Parents and Students in Binus School Serpong","authors":"Karto Iskandar, Andrew Thejo Putranto","doi":"10.21512/COMTECH.V7I3.2494","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2494","url":null,"abstract":"A web service is a service offered by a device electronically to communicate with other electronic device using the World wide web. Smartphone is an electronic device that almost everyone has, especially student and parent for getting information about the school. In BINUS School Serpong mobile application, web services used for getting data from web server like student and menu data. Problem faced by BINUS School Serpong today is the time-consuming application update when using the native application while the application updates are very frequent. To resolve this problem, BINUS School Serpong mobile application will use the web service. This article showed the usage of web services with XML for retrieving data of student. The result from this study is that by using web service, smartphone can retrieve data consistently between multiple platforms.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management Method In It Project: A Review It项目中的风险管理方法综述
ComTech Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2491
Ikhtiar Faahakhododo, I. Rianto
{"title":"Risk Management Method In It Project: A Review","authors":"Ikhtiar Faahakhododo, I. Rianto","doi":"10.21512/COMTECH.V7I3.2491","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2491","url":null,"abstract":"In the development of a software, there are several aspects that must be taken to ensure that the process can produce a useful product and make a profit. This article clarified some of the methods of risk management exist. There was two techniques to determine the risks used in this study, those were Metrics of Process Structure and Referential Model or could be referred as the Comparison to the Referential Model technique. That technique will produce Software Process Meta Model, Model of Risk Management, and Manage Risks in Project models. Those models were used to help managers in mapping the risks of the project.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review 社交媒体信息披露的潜在威胁:系统文献综述
ComTech Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2499
B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo
{"title":"Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review","authors":"B. Yulianto, Fredy Purnomo, E. D. Madyatmadja, M. Meyliana, Harjanto Prabowo","doi":"10.21512/COMTECH.V7I3.2499","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2499","url":null,"abstract":"Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamification of Learning: Can Games Motivate Me to Learn History? 学习的游戏化:游戏能激励我学习历史吗?
ComTech Pub Date : 2016-09-30 DOI: 10.21512/COMTECH.V7I3.2503
Andry Chowanda, Alan Darmasaputra Chowanda
{"title":"Gamification of Learning: Can Games Motivate Me to Learn History?","authors":"Andry Chowanda, Alan Darmasaputra Chowanda","doi":"10.21512/COMTECH.V7I3.2503","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I3.2503","url":null,"abstract":"This article presented empirical finding of the effect of gamification for learning. Evidence in the findings of the empirical study that explores two education games that were developed earlier with a total of 64 participants was presented. The first game was a computer game with historical themes of Ken Arok and Ken Dedes of Singhasari Kingdom. The second game was an Android-based mobile game with Historicity of the Bible themes of Moses. Prior research showed that more than 50 percent of junior and senior high school students in Jakarta demonstrated their apathy to several subjects in their school. They also disclosed that they were having difficulty in following their class in particular with a difficult subject such as History subject. With the popularity of games, the gamification of learning was investigatd to enhance the interest of the students to master a particular subject. The results show that there is a statistical significance increase of the students score and interest in history subject in a group that was using the games to help them in the subject compared to a group that reading books about the particular subject alone 0.001 . Furthermore, the participants also reported that playing games was helping them to remember difficult names and event timeline in the historical events","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm 使用Dijkstra算法实现动态权值最短路径
ComTech Pub Date : 2016-09-30 DOI: 10.21512/comtech.v7i3.2534
Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama
{"title":"Shortest Path with Dynamic Weight Implementation using Dijkstra’s Algorithm","authors":"Elizabeth Nurmiyati Tamatjita, Aditya W. Mahastama","doi":"10.21512/comtech.v7i3.2534","DOIUrl":"https://doi.org/10.21512/comtech.v7i3.2534","url":null,"abstract":"Shortest path algorithms have been long applied to solve daily problems by selecting the most feasible route with minimum cost or time. However, some of the problems are not simple. This study applied the case using Dijkstra's algorithm on a graph representing street routes with two possible digraphs: one-way and twoway. Each cost was able to be changed anytime, representing the change in traffic condition. Results show that the usage of one way digraph in mapping the route does make the goal possible to reach, while the usage of twoway digraph may cause confusion although it is probably the possible choice in the real world. Both experiments showed that there are no additional computation stresses in re-calculating the shortest path while going halfway to reach the goal.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Power of the Test for the Winsorized Modified Alexander-Govern Test winsorization Modified Alexander-Govern Test的检验能力
ComTech Pub Date : 2016-07-25 DOI: 10.21512/COMTECH.V7I4.3764
Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya
{"title":"The Power of the Test for the Winsorized Modified Alexander-Govern Test","authors":"Tobi Kingsley Ochuko, Suhaida Abdullah, Zakiyah Zain, S. S. S. Yahaya","doi":"10.21512/COMTECH.V7I4.3764","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I4.3764","url":null,"abstract":"This research examined the usage of the parametric method in comparing two or more means as independent group test, for instance, the Alexander-Govern (AG) test. The utilization of mean as the determinant for the center of distribution of variance diversity takes place in testing, and the test provides excellence in maintaining the amount of Type I error and giving immense sensitivity for a regular data. Unfortunately, it is ineffective on irregular data, leading to the application of trimmed mean upon testing as the determinant for the center of distribution under irregular data for two group condition. However, as the group quantity is more than two, the estimator unsuccessfully provides excellence in maintaining the amount of Type I error. Therefore, an estimator high in effectiveness called the MOM estimator was introduced for the testing as the determinant for the center of distribution. Group quantity in a test does not affect the estimator, but it unsuccessfully provides excellence in maintaining the amount of Type I error under intense asymmetry and unevenness. The application of Winsorized modified one-step M-estimator (WMOM) upon the Alexander-Govern testing takes place so that it can prevail against its drawbacks under irregular data in the presence of variance diversity, can eliminate the presence of the outside observation and can provide effectiveness for the testing on irregular data. Statistical Analysis Software (SAS) was used for the analysis of the tests. The results show that the AGWMOM test gave the most intense sensitivity under g = 0,5 and h = 0,5, for four group case and g = 0 and h = 0, under six group case, differing from three remaining tests and the sensitivity of the AG testing is said suffices and intense enough.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67821501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia K-Means算法在印尼省贫困聚类分析中的应用
ComTech Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2254
A. D. Sano, Hendro Nindito
{"title":"Application of K-Means Algorithm for Cluster Analysis on Poverty of Provinces in Indonesia","authors":"A. D. Sano, Hendro Nindito","doi":"10.21512/COMTECH.V7I2.2254","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2254","url":null,"abstract":"The objective of this study was to apply cluster analysis or also known as clustering on poverty data of provinces all over Indonesia.The problem was that the decision makers such as central government, local government and non-government organizations, which involved in poverty problems, needed a tool to support decision-making process related to social welfare problems. The method used in the cluster analysis was kmeans algorithm. The data used in this study were drawn from Badan Pusat Statistik (BPS) or Central Bureau of Statistics on 2014.Cluster analysis in this study took characteristics of data such as absolute poverty of each province, relative number or percentage of poverty of each province, and the level of depth index poverty of each province in Indonesia. Results of cluster analysis in this study are presented in the form of grouping of clusters' members visually. Cluster analysis in the study can be used to identify more quickly and efficiently on poverty chart of all provinces all over Indonesia. The results of such identification can be used by policy makers who have interests of eradicating the problems associated with poverty and welfare distribution in Indonesia, ranging from government organizations, non-governmental organizations, and also private organizations.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X 用六西格玛方法减少小松Hd465-7拖运机作业停机时间
ComTech Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2245
H. Purba
{"title":"Reducing The Operational Stop Time of Hauller Komatsu Hd465-7 by Using the Six Sigma’s Approach in PT X","authors":"H. Purba","doi":"10.21512/COMTECH.V7I2.2245","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2245","url":null,"abstract":"An operational stop time is a condition where heavy equipment is not working as usual. It is important to avoid this condition since excessive idling wastes an enormous amount of fuel and money. However, the operational stop time of a dump truck Hauller HD465-7 is 2.83 minutes, which is far above the normal standard. This project aims to optimize the improvement of an operational stop time by using a Six Sigma method with optimize plan selection. This will return the operational stop time to the standard range within 1.25 to 1.65 minutes. These steps of define, measure, analyze, improve, and control are applied to the standardization process according to the rules and criteria established by the Six Sigma. The result found that the Six Sigma’s approach which was applied in PT X has reduced the cost from US$1,105,300 to US$963,000 every month. An improvement have been made to matching fleet by combining six fleet of dump trucks at driving speed of 22 km per hour and the average simulated haul distance was 2,000 meters.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling 将预防性维修计划整合为概率机器故障和批量生产计划
ComTech Pub Date : 2016-06-01 DOI: 10.21512/COMTECH.V7I2.2247
Zahedi Zahedi, A. Salim
{"title":"Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling","authors":"Zahedi Zahedi, A. Salim","doi":"10.21512/COMTECH.V7I2.2247","DOIUrl":"https://doi.org/10.21512/COMTECH.V7I2.2247","url":null,"abstract":"This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run) up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.","PeriodicalId":31095,"journal":{"name":"ComTech","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67819236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信