Claim Missing Document
Check
Articles

Found 3 Documents
Search

Decision Table with Inventory Turnover Ratio to Solve Operational and Strategic Issues Surjandy Surjandy; Ita Ratnasari
Journal of Information Systems Engineering and Business Intelligence Vol. 4 No. 1 (2018): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (332.249 KB) | DOI: 10.20473/jisebi.4.1.32-38

Abstract

The research was conducted at PT CPC  using qualitative research methodology. It focused on group discussion to identify problem statements and analyst selling data to make an inventory distribution model strategy. The aims are to determine whether decision table could be implemented in the current situation in PT CPC, and the combination method between decision table and inventory turnover ratio indicator can solve PT CPC problem.The results find that a simple decision table is hard to be implemented due to the complexity of the problem. However, the combination of the decision table with an indicator of inventory can be used as a solution to the problem at PT CPC.
Review on Realization of AES 256bit Encryption with Raspberry Pi Erick Fernando; Surjandy Surjandy; Muhamad Irsan; Hetty Rohayani A H; Fachruddin Fachruddin
IJNMT (International Journal of New Media Technology) Vol 6 No 1 (2019): IJNMT (International Journal of New Media Technology)
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1489.269 KB) | DOI: 10.31937/ijnmt.v6i1.1070

Abstract

In this article, it aims to present the AES encryption on the Raspberry Pi mini pc. this application also aims to illustrate that this AES algorithm can be applied with small resources. This research was conducted with an experimental approach, which carried out the implementation process in mini pc hardware and xampp software (php, apache). This AES algorithm is tested by PHP programming with Apache web server with text data. The results of the study, that the AES algorithm can run well with a hard minimum, like raspberry mini pc with a very fast time in the process, speed in the process and a lot of text data. So, AES algorithm can be widely adopted for various applications from raspberry PI mini pc computers with strong practicality in information security and reliability.
The Influencing factors of Female Passenger Background in Online Transportation with Perceived Ease of Use Meyliana Meyliana; Surjandy Surjandy; Erick Fernando; Firman Anindra
ComTech: Computer, Mathematics and Engineering Applications Vol. 10 No. 1 (2019): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v10i1.5713

Abstract

This research aimed to explore the correlation or influence factors between the background of female passengers with perceived ease of use factors in Online Transportation Application (OTA). This research was explanatory and descriptive (causal) research. The respondents were the female users of OTA. The total of respondents was 408 people. SPSS applications were used to process the data. Then, the cross-tabulation was to find the correlation or influence factors. In the end, the researchers find 19 factors that are essential for future research.