Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ford Lumban Gaol is active.

Publication


Featured researches published by Ford Lumban Gaol.


Journal of Networks | 2013

The Measurement of Optimization Performance of Managed Service Division with ITIL Framework using Statistical Process Control

Kasman Suhairi; Ford Lumban Gaol

The purpose of the Configuration Management process is carrying and all IT assets, status, configuration, and relationship between each other being well documented. This documentation is useful, among others, for some purposes. The first objective is to create clarity in the relationship between key performance indicators (KPI) an IT services with the infrastructure. Changes to the configuration of those devices would obviously very disturbing the performance of IT services. The second objective is the accuracy of the information which will be used by the Service Delivery processes. So a Service Desk staff who need to get information about how a user at a branch office to connect to the networks headquarters, linked to issues of access to certain applications. Accurate network configuration information will be helpful Service Desk staff in helping the user solve the problem. The third objective is the accuracy of the information will be used for the IT audit.PT. XYZ is a telecommunications company which relatively new and aware of the increasing competitive competition in the telecommunications industry. PT. XYZ was starting its operation in 2006. The companys ambition is to develop progressively by increasing operational performance which closely linkages between operational performance improvements company with a bottom line of the company. Thus, it is a necessity / obligation for companies in the global era of integrated telecommunications services, to focus on Quality of services (QoS) provided to its customers, in order to survive in an increasingly competitive telecommunications business.


international conference on advances in computing, control, and telecommunication technologies | 2010

Exploring the Pattern of Habits of Users Using Web log Squential Pattern

Ford Lumban Gaol

Web mining consists of three aspects: Web content mining, Web structure mining, and web usage mining. The most important application of web mining is targeted advertising. Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential mining techniques is web usage mining, for mining web log accesses, where the sequences of web page accesses made by different web users over a period of time, through a server, are recorded. This paper proposes web log sequential pattern mining using Apriori-all algorithm. We called as Apriori-all Web log Mining. The experiment will be conducted base on the idea of Apriori-all algorithm, which first stores the original web access sequence database for storing non-sequential data. The experimental result will be given with analysis on further refinement.


Journal of Computer Science | 2013

SERVICE ORIENTED ARCHITECTURE GOVERNANCE IMPLEMENTATION IN A SOFTWARE DEVELOPMENT PROJECT AS AN ENTERPRISE SOLUTIONS

Ryan Rahmansyah; Ford Lumban Gaol

In this journal, discussed the way Service Oriented Architecture (SOA) governance applied in a company that is made to meet the business needs related wit h software development projects. The analysis is ba sed on the latest information from the company and the way in which the system implemented based on several methods and also references from existing best prac tice. Various methods used in building this kind of system, however, is used in the design of SOA gover nance that perform overall management within the organization. To analyze the application of SOA, us ed the method of SOA maturity that will be handle i n the application and subsequent assessment.


2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) | 2015

Attendance system on Android smartphone

Benfano Soewito; Ford Lumban Gaol; Echo Simanjuntak; Fergyanto E. Gunawan

Attendance system which is currently excist still has weaknesses. The first is the long queues in front of the attendace machine at the time to come to work and leave work. The second is cheating, employees can ask her/his friend to do attendance process. The third is mostly attendance system has not been connected with the payment system in human resouces software or in the finance department. The fourth, employees who work outside the office can not do attendance process. In this paper, we introduced an attendance system based finger print technology and GPS using a smartphone integrated with payment system that will eliminate all the problems above. Our research also based on prediction that in the next few year all the smart phone will have a fingerprint scanner.


asian conference on intelligent information and database systems | 2014

Performance Measurement of Higher Education Information System Using IT Balanced Scorecard

Nunik Afriliana; Ford Lumban Gaol

Extensive research was conducted at a private university in Indonesia into the performance of the higher education information system, called SIPERTI. The IT Balanced Scorecard framework consisting of its four perspectives: Corporate Contribution, User Orientation, Operational Excellence, and Future Orientation was employed to assess the system. The study was accomplished in the form of ai?źquestionnaire composed of five-point Likert scale statements. The questionnaire was addressed to the members of the faculties and staff of the university who used SIPERTI in their everyday work. The data obtained was statistically analysed including the tests of reliability and validity. A structured interview which followed the questionnaire allowed for the formulation of recommendations on SIPERTI performance improvement.


international conference on advanced communication technology | 2017

Server for SQLite database: Multithreaded HTTP server with synchronized database access and JSON data-interchange

Noprianto; Benfano Soewito; Sani Muhamad Isa; Karto Iskandar; Ford Lumban Gaol; Raymond Kosala

SQLite database engine is small, fast, reliable, and does not need a server to work. And, if needed, multiple applications may work with same SQLite database, optionally, using filesystem sharing services. However, file sharing option is not always available and reliable in certain conditions. In this paper, we propose a server for SQLite database. This server will be using HTTP as communication protocol. To enable multiuser application, this server will be multithreaded. However, access to the database file will be synchronized to help prevent database corruption. And, as data-interchange format, JSON will be used. We also run several tests to make sure that proposed server is usable. Test results show that the database file is not corrupted, while still maintain acceptable performance.


international seminar on intelligent technology and its applications | 2016

Smart mobile attendance system using voice recognition and fingerprint on smartphone

Benfano Soewito; Ford Lumban Gaol; Echo Simanjuntak; Fergyanto E. Gunawan

The attendance system has been known for a long time, ranging from manual system to automated and complicated system such as attendance system using biometrics. All those attendance system have several weakness, especially to control of employees who work outside the office. In this paper we introduced a attendance system that can be used to record the attendance of employees who are duty outside the building. Our system is also integrated with payroll system that make accounting department can easily calculate and report the salary included the overtime cost. The proposed attendance system used smartphone to verify the employee. The system provide two options for doing verification, such as fingerprint and voice recognition. In this research, we find that fingerprint verification has false positive 95% and the false negative of voice recognition is 5.88%.


international conference on computer control informatics and its applications | 2016

Software size measurement of knowledge management portal with use case point

Karto Iskandar; Ford Lumban Gaol; Benfano Soewito; Harco Leslie Hendric Spits Warnars; Raymondus Kosala

Knowledge Management portal is a system to support Knowledge Management process, in order to create, capture, develop, share, reuse and optimize the knowledge and particularly in Bina Nusantara University which has implemented Knowledge Management System (KMS) since 2002. However, this KMS need to be measured in order to know how better this KMS in term of the software size. The BINUS KMS will be measured in term of their software size in functionality perspective with use case point method. This metric of KMS will be used by management to know how better the software size, complexity level and effort to development in numbering. Measurement of software size with software metric such as Use Case Point upon use case diagram for BINUS knowledge Management Portal shows that the project has medium software size with score Use Case Point (UCP) = 108.56 and has estimate effort will be developed in 2,064 hours (or in 258 days or 51.6 weeks or 12.9 months) and has development cost for 516,000,000.00 rupiah (Indonesian currency). Use Case Point, estimate effort and project value will powerful to help management in order to make decision regarding the implementation of IT software project development in term of time, money and people.


Archive | 2014

Recent Trends in Nanotechnology and Materials Science

Ford Lumban Gaol; Jeffrey Webb

This research focused on studying the effects of a surface microstructure on S45C carbon steel using different pH values of electroless Ni-P plating. Meanwhile, the authors make an effort to improve the surface hardness and wear resistance of S45C steels through various heat treatments. The experimental results show that the specimens using acid and alkaline baths of pH5 and pH8 resulted in maximum hardness; the hardness values were the HV0.05 701 and HV0.05 803, respectively. Moreover, pH5 and pH8 of Ni-P deposition after 350 and 300 C and soaked for 1 h heat treatment, in which the highest hardness appeared, were HV0.05 1027 and HV0.05 1066, respectively. The specimens underwent the main precipitate phase of Ni3P after heat treatment. Due to precipitation, strengthening of the Ni3P phase increased the surface hardness of specimens after heat treatment; thus, the wear depth was decreased and wear resistance was enhanced. The optimal wear depth (2.738 lm) and (2.923 lm) appeared in Ni-P deposition by pH5 and pH8 after 350 and 300 C and soaked for 1 h heat treatment, respectively.


Journal of Computers | 2013

Bresenham Algorithm: Implementation and Analysis in Raster Shape

Ford Lumban Gaol

One of the most important aspect that have to solve in raster objects is to describe the structure of the individual objects and their coordinate locations within the scene. We required to implement the graphics output primitives. The Output primitives are very important since the performance of the graphics depend on the Primitives. Point positions and straight-line segments are the simplest geometric primitives. We focus on these parts in this research. In this paper we will implement and analysis how accurate and efficient raster line-generating algorithm, develop by Bresenham, that uses only incremental integer calculations. The implementation will be expanded to display circles and other curves. The analysis will be focus on numerical results, error produced, computation speed, and display. The language that used in this implementation is C++ with OpenGL.

Collaboration


Dive into the Ford Lumban Gaol's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge