Hoga Saragih
Jurusan Teknik Elektro, Fakultas Teknik, Universitas 17 Agustus 1945 Jakarta Jln Sunter Permai Raya, Sunter Agung Podomoro, Jakarta Utara 14350

Published : 21 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : CommIT (Communication

Design Simulation Program of Runway Capacity Using Genetic Algorithm At Soekarno-Hatta Airport Saragih, Hoga; Wibowo, Indra Sulistyo; Utomo, Wisnu Darjono Tulodo
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.552

Abstract

The purposes of this research are to calculate the capacity of runway with runway capacity simulation software using Genetic Algorithm, and to analyze the efforts which have more profound effect.The result of the hourly runway capacity with the mathematical calculation is 42 operations for arrival only, 110 operations for departure only and 64 operations for mix. To enhance the runway capacity, some strategies are researched, such as reduction of separation to meet criteria set by FAA’s rule, addition of the exit taxiway, addition of the runway according to master plan of Soekamo-Hatta Airport and changing the runway utilization strategies. Out of the four strategies, the most efficient solution is changing the runway utilization strategies (with capacity increase of 35,9 %) and reduction in separation (with capacity increase of 34,4 %). However, the addition of runway has the highest capacity increase, that is 53,9 %..Key Words: genetic algorithm, simulation, runway capacity.
PERENCANAAN STRATEGIS TEKNOLOGI INFORMASI PADA PT ABC Saragih, Hoga; Pangestu, Harta
CommIT (Communication and Information Technology) Journal Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v4i1.532

Abstract

The aims of the research is to analyze business environment and IS/IT at the company, where the method used are interviews and observation in the company. With Balanced Score Card (BSC) and Critical Success Factor (CSF) tool, the real picture of the business environment could be obtained. Result of analysis of this research is an output in the form of IT division strategy i.e. target application needed to support business, technology and human resource to support the target application. From the resulting analysis, it can be conclude that existing business environment should be supported by target application, technology, and human resource to support business strategy.Keywords: Balance Score Card (BSC), Critical Success Factor (CSF), strategy
IT LONG TAIL STRATEGY FOR SOFTWARE PACKAGE COMPANY Winata, Andreas; Theodore, Lydia; Saragih, Hoga
CommIT (Communication and Information Technology) Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v4i2.546

Abstract

Long Tail Strategy is a business strategy which explains that the total revenue from the sale of non-popular products may exceed the total income from popular products. This may happen since generally there is only a small number of popular products, which is in great demand, while there are many of the non-popular types which is sold in small amounts. This research aims to better understand the role of IT behind the success of the Long Tail strategy. Results show stages of how to develop IT strategy, including identification, analysis, determines on a strategy, until implementation. The results of this study will help software developers to plan IT strategy by implementing an accurate Long Tail Strategy.Keywords: Long Tail, IT Strategy, Services, Software Package
SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL Neforawati, Indri; Saragih, Hoga
CommIT (Communication and Information Technology) Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v2i2.504

Abstract

Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time. Usually, to open a door key one must use a key, so to access a lot of doors must have a lot of different keys. But if the phone is used as an electronic key access control must implement all the keys are not needed anymore, just with one phone can open many locks. Simulation of an electronic lock is designed to use the phone as a remote control, and the computer as a central controller. Communication between mobile phones and computers using Bluetooth. While functioning as a door lock which is connected via parallel port of computer. This electronic key system to apply Access Control using RC4 encryption and MD5 Hashing. Design modules are built using NetBeans IDE 4.1 and the MySQL database, with some additional libraries. Libraries that are mobility netbeans 4.1, mysql-connector-java-3.0.9, BlueCove, Bluelet-Benhui. Phones that use must support the Java MIDP 2.0 and JSR-82.Keywords: Hashing MD5, Enkripsi RC4, NetBeans IDE 4.1, mysql-connector-java-3.0.9