p-Index From 2021 - 2026
6.835
P-Index
This Author published in this journals
All Journal PROSIDING SEMINAR NASIONAL Autotech: Jurnal Pendidikan Teknik Otomotif Universitas Muhammadiyah Purworejo E-Bisnis : Jurnal Ilmiah Ekonomi dan Bisnis Elkom: Jurnal Elektronika dan Komputer PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer MANAJEMEN Journal of Engineering, Electrical and Informatics (JEEI) Jurnal Universal Technic Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Jurnal Publikasi Ilmu Komputer dan Multimedia Jurnal Publikasi Ilmu Manajemen Jurnal Penelitian Rumpun Ilmu Teknik Jurnal Publikasi Teknik Informatika (JUPTI) Jurnal Sains dan Ilmu Terapan Jurnal Sistem Informasi dan Ilmu Komputer Pandawa : Pusat Publikasi Hasil Pengabdian Masyarakat Jurnal Elektronika dan Teknik Informatika Terapan Journal of Technology Informatics and Engineering Seminar Nasional Teknologi dan Multidisiplin Ilmu Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika Router : Jurnal Teknik Informatika dan Terapan Repeater: Publikasi Teknik Informatika dan Jaringan Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi International Journal of Computer Technology and Science International Journal of Information Engineering and Science International Journal of Electrical Engineering, Mathematics and Computer Science Jurnal Bengawan Solo: Pusat Kajian Penelitian dan Pengembangan Daerah Kota Surakarta Systematic Literature Review Journal Journal of New Trends in Sciences Router : Jurnal Teknik Informatika dan Terapan Journal of Engineering, Electrical and Informatics Global Science: Journal of Information Technology and Computer Science Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

ROBOTIC AUTOMATION ON COMPUTER NUMERICAL CONTROL MACHINE Danang Danang; Zaenal Mustofa; Edy Siswanto
Journal of Engineering, Electrical and Informatics Vol. 2 No. 2 (2022): Juni: Journal of Engineering, Electrical and Informatics:
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v2i2.914

Abstract

Along with the advancement of robot technology, Computer Numerical Control (CNC) machine robot automation is becoming more popular. While some Computer Numerical Control engine process independently with a part catcher, a perpendicular granting center requires an extraneous individual to keep the engine processing. Collective and Mechanical robots be the main options for robotize perpendicular Computer Numerical Control grating machines. This study aims to specifically investigate and find the most effective type of robot to be used as a machine capable of maintaining the Haas VF-2 perpendicular crushing center. The method used in this study is the Overal Equipment Effectiveness (OEE) model approach with five different actions, starting with scope, unit setting, evaluation, fee calculation, and integration of the evaluation to present the value of each cell. The purpose of the model used in this study is to determine which robot is more effective for use in industry. As the result, this study demonstrates the important difference between the robot cells on the site and the overall effectiveness of the equipment, besides that the fee differences in the production of robot cells are not too large, but if the focus is on adding robots then the fee differences must be considered carefully. The hazard assessment proved surprising. This study shows that the risk factors in VF-2 treatment using cooperative robots and mechanical robots can be ignored. The impact of takt time also has an important role. Taking each factor into account for the production machining of the VF-2 mechanical robot is more conducive to use because its performance level is almost two times better and in terms of use, it is also much safer. For future work, maintaining a continual level of danger estimate during working on various parts is a very important thing to pay attention to. In addition, when the geometry and materials of machine parts are developed, the collective allocation is no longer valid, so danger estimates must be carried out more carefully to ensure operator safety.
Web-Based Inventory Information System For Monitoring Stock, At PT. Sarah Ayu Semarang Branch Danang Danang; Wijaya Heti Susanti
Journal of Engineering, Electrical and Informatics Vol. 3 No. 1 (2023): Februari : Journal of Engineering, Electrical and Informatics
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v3i1.2861

Abstract

Sarah Ayu Semarang Branch is a company that operates in the rental and sales of children's toys. To fulfill the wishes of several outlets in Semarang, the company has a storage warehouse, but the documentation currently used is still simple by recording stock of goods by looking directly at the existing goods, calculating using a calculator and recording it in a book as a report to the management. In this way, differences often occur between real (real) goods stock with monthly goods recording from the head office. This research discusses a web -based inventory information system for monitoring stock at PT. Sarah Ayu Semarang Branch. By designing an application that is capable of processing, documenting, calculating order transactions, and storing inventory in the warehouse. By having minimum stock and maximum stock, the company can find out the amount of inventory that is running out and over stock, while the company can easily find out the final stock amount of goods in the warehouse. Web- Based Inventory Information System is also really needed in companies to help warehouse divisions, administration and leaders in making decisions. To build the system using the PHP programming language MYSQL database . With this inventory information system, it is hoped that the company will be able to carry out planning in making decisions and monitoring inventory properly, and be able to carry out stock control functions including items that are running out or over stock , while also being able to produce reports that are accurate, fast and precise.
Interface-Based Loan Fund Performance Monitoring And Evaluation System At BKM Ngesrep Semarang Lilis SuryanI; Danang Danang; Khoirur Rozikin
Journal of Engineering, Electrical and Informatics Vol. 3 No. 3 (2023): Oktober: Journal of Engineering, Electrical and Informatics
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v3i3.2868

Abstract

The monitoring and evaluation system is a routine process of collecting data and measuring progress on program objectives/monitoring changes, which focuses on processes and outputs. Monitoring involves accounting for what is done. Monitoring involves observing the quality of the services provided while evaluation is the use of social research methods to systematically investigate program effectiveness/assess the program's contribution to change (goal/objective) and assess the need for improvement, continuation or expansion of the program (recommendations). The first aim of this system is to be able to process data efficiently and accurately, the second aim is to assist the financial management unit (UPK) in inputting loan fund installments to make it easier to process data so as not to make calculation errors and record errors and to improve services to Community Self-Help Groups (KSM) better as borrowers, the third objective is to facilitate monitoring of loan fund evaluation which can be monitored and evaluated at any time, both the rate of return of loan funds and the level of loan fund congestion. In this system, the interface-based monitoring and evaluation model is one of the services provided by the operating system as a means of interaction between the user and the operating system. The interface is an operating system component that comes into direct contact with the user. This application was created using Microsoft Visual Basic 6.0 and a Client Server-based MySQL database.
Decision Making System For Selection Of Prospective Scholarship Recipients Using The Saw (Simple Additive Waighting) Method At Vocational School Bina Negara Gubug Uswatul Chasanah; Danang Danang; Teguh Setiadi
Journal of Engineering, Electrical and Informatics Vol. 4 No. 1 (2024): February : Journal of Engineering, Electrical and Informatics
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v4i1.2871

Abstract

The selection system at Bina Negara Gubug Vocational School Jl. KH. Hasan Anwar No.9 Gubug currently processes data on the criteria for each student for each type of scholarship. It does not yet have a database system but uses a computerized system with Microsoft Excel, so there are often delays in the selection process in preparing the selection report for scholarship recipients. This research uses the Research and Development (R & D) development model by Borg and Gall with 6 steps of development, namely Research and Information Collecting, Planning, Develop Premilinary Form of Product, Premilinary Field Testing, Main Product Revision, Main Field Testing. The scholarship selection decision support system application product uses the SAW (Simple Additive Waighting) method. Visual Basic 6.0 development software and Microsoft Access database. This system can provide a useful solution for the decision-making system for selecting scholarship recipients for schools so that a better and faster selection can be achieved.
Systematic Literature Review on the Application of Blockchain in Enhancing Server Security: Research Methods for Mitigating Ransomware and Malware Attacks Danang Danang; Maya Utami Dewi; Widya Aryani
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i4.186

Abstract

This study aims to explore the application of blockchain in enhancing server security to mitigate ransomware and malware attacks in critical infrastructures such as healthcare, finance, and government sectors. Using a systematic literature review (SLR) approach, the research collects articles from four major databases (IEEE Xplore, Scopus, ScienceDirect, and SpringerLink) published between 2020 and 2024. The search focuses on keywords related to blockchain, server security, ransomware, malware, and attack mitigation. The results indicate that blockchain enhances data integrity, transaction security, and strengthens access control to protect sensitive data. Moreover, integrating blockchain with intrusion detection systems (IDS) and using smart contracts accelerates threat detection and response, allowing for automatic blocking and data recovery from attacks. This technology reduces reliance on manual intervention and increases operational efficiency. However, the main challenges in its implementation include high implementation costs, scalability, and technical complexity. Nevertheless, blockchain offers significant solutions for mitigating ransomware and malware attacks while enhancing the reliability and efficiency of systems. In conclusion, blockchain provides an effective solution for server security and cyber threat mitigation, although challenges related to cost and scalability need to be addressed. Further research is required to develop more efficient blockchain protocols and integrate them with other technologies to enhance threat detection and response speed.
Sistem Monitoring Gas, Suhu dan Kelembapan Ruangan Berbasis IoT: (Studi Kasus Apotek Waras Barokah) Aldo Raditya Pangestu; Danang Danang; Iman Saufik Suasana; Sulartopo Sulartopo; Nuris Dwi Setiawan
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 5 No. 2 (2025): Juli : Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v5i2.1422

Abstract

Maintaining optimal environmental conditions in pharmacies is crucial for preserving the quality of pharmaceutical products and ensuring the well-being of staff and patients. This study presents the development of a real-time environmental monitoring system based on Internet of Things (IoT) technology, specifically implemented at Apotek Waras Barokah. The system is equipped with a DHT22 sensor to measure ambient temperature and humidity, as well as an MQ-135 sensor to detect harmful gases such as ammonia, carbon monoxide, and carbon dioxide. These sensors are integrated with the NodeMCU ESP8266 microcontroller, which transmits data via WiFi to the Blynk platform for continuous observation. In addition, the system incorporates an automatic notification feature through the Telegram application to promptly alert users when critical thresholds are exceeded. Two fans are activated through relay modules to stabilize room conditions when necessary, while real-time data is also displayed locally using an LCD I2C. Test results indicate that the system performs reliably in detecting environmental anomalies and provides responsive control actions. This research contributes an efficient and scalable prototype that supports safer pharmaceutical storage and has the potential to be adopted in various healthcare settings.
Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment Danang Danang; Eko Siswanto; Nuris Dwi Setiawan; Priyo Wibowo
International Journal of Computer Technology and Science Vol. 2 No. 3 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i3.291

Abstract

Growth rapid computing cloud, especially on academic, government, and service platforms. public, has trigger improvement frequency and complexity Distributed Denial of Service (DDoS) attacks. Intelligent DDoS attacks AI based capable copy pattern Then cross user valid, so that difficult detected and mitigated. The majority approach mitigation moment This nature reactive, no scalable, and tends to sacrifice availability service for authorized users. Research​ This aiming develop architecture proactive and adaptive defense​ For ensure continuity service during attack ongoing. Security model proposed hybrid​ integrating Zero Trust Architecture (ZTA), adaptive bandwidth control, and isolation service container -based. Architecture consists of from three layer Main: (1) ZTA Policy Engine which performs verification identity and assessment behavior through tokens and policies intelligent; (2) Adaptive Bandwidth Load Balancer which automatically dynamic separate and arrange Then cross based on reputation and level trust ; and (3) Containerized Service Cluster which groups request to in different containers For user trusted and not known . Components addition such as blockchain -based smart contracts are used For recording request and verification access , as well as lightweight AI module used for profiling then cross in real-time. Simulation results show that this model succeed increase availability service for user trusted during attack , press false positive rate , as well as optimize allocation source power. Integration of zero trust policies with intelligence Then cross and segmentation service in real-time forming framework effective and scalable defense​ to modern DDoS threats . In conclusion , the study This contributes a robust , adaptive , and modular architectural model for maintain continuity cloud services in condition network at risk .
Hybrid CNN GRU Framework for Early Detection and Adaptive Mitigation of DDoS Attacks in SDN using Image Based Traffic Analysis Danang Danang; Indra Ava Dianta; Agustinus Budi Santoso; Siti Kholifah
International Journal of Information Engineering and Science Vol. 2 No. 3 (2025): August : International Journal of Information Engineering and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijies.v2i2.292

Abstract

The threat of Distributed Denial of Service (DDoS) is increasing develop along with increasing use of the Internet of Things (IoT) and Software-Defined Networking (SDN) architecture . Although SDN provides convenience in management network , properties its centralized control make it prone to to flooding attacks that can paralyze controller performance . Detection method conventional , such as approach statistics and machine learning, still own limitations in matter accuracy , high false positive rate , and dependence on extracted features manually . To overcome problem said , research This propose a hybrid deep learning based DDoS detection and mitigation model that combines Convolutional Neural Network (CNN) to extraction feature spatial from RGB and Gated Recurrent Unit (GRU) images for understand temporal correlation between traffic data network . System tested through network test-bed Mininet based with Ryu/Floodlight controller, using simulation DDoS attacks (Hping3, LOIC) and normal traffic (video streaming, HTTP server). Traffic data cross recorded in PCAP format, processed become RGB image measuring 200×200 pixels, and labeled based on type traffic . Evaluation results with metric accuracy , precision, recall, F1-score, and MCC show that the CNN–GRU model has performance more superior compared to baseline approaches such as CNN-only, GRU-only, as well as classical ML methods such as SVM and Random Forest. In addition , the system capable apply mitigation adaptive through automatic flow rule creation on edge switches. Findings This confirm that effective deep learning- based spatial -temporal hybrid approach in increase detection early and response DDoS attacks on SDN networks adaptive and real-time.  
Federated Hybrid CNN GRU and COBCO Optimized Elman Neural Network for Real Time DDoS Detection in Cloud Edge Environments Danang Danang; Maya Utami Dewi; Greget Widhiati
International Journal of Electrical Engineering, Mathematics and Computer Science Vol. 2 No. 2 (2025): June : International Journal of Electrical Engineering, Mathematics and Compute
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijeemcs.v2i2.293

Abstract

Improvement amount Distributed Denial of Service (DDoS) attacks in cloud infrastructure and edge computing demands solution adaptive, distributed, and efficient detection in a way computing. Research This propose an optimized Federated Learning (FL) based DDoS detection model using Centroid Opposition-Based Bacterial Colony Optimization (COBCO) to training the Elman Neural Network (ENN). The proposed architecture consists of of two components Main: on the edge node side, a hybrid Convolutional Neural Network–Gated Recurrent Unit (CNN–GRU) model is used to extraction feature local from traffic data network, while on the server side, model parameters from each node are collected and used for training an optimized ENN with COBCO. Approach This aim increase accuracy detection at a time maintain efficiency local data communication and privacy. In progress experimental, model tested use three benchmark datasets: NSL-KDD, CICIDS2017, and CICDDoS2019. The preprocessing process includes feature encoding categorical, normalization numeric, class balancing using SMOTE, as well as validation cross (k-fold). Initial results show that combination of FL, CNN–GRU, and COBCO–ENN produces improvement significant in accuracy and time convergence compared to approach conventional such as PSO, GA, and non- federative models. In addition, the proposed model capable maintain performance detection tall although executed in edge environment with limitations source Power.  Study This give contribution important in development system scalable, privacy-preserving, and adaptive intelligent DDoS detection to dynamics Then cross modern network. Integration of FL and COBCO in ENN training shows potential big for used in implementation real in cloud-edge infrastructure. In addition, the proposed model demonstrates strong scalability and adaptability, making it highly suitable for dynamic and evolving network environments.
Sistem Pendeteksi Bencana Kebakaran Menggunakan ESP32 Dan Arduino Berbasis WEB: Studi Kasus Di Toko Citra Berkah Karangawen Demak Muhammad Ainun Najib; Sulartopo Sulartopo; Dani Sasmoko; Danang Danang; Iman Saufik Suasana
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 2 No. 1 (2024): Februari : Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v2i1.62

Abstract

Fire is a threat to human safety, property and the environment. With the increasingly rapid development and progress of development, the risk of fires is increasing. Shophouses or shophouses are places that are prone to fires. The increasingly dense population and the construction of office buildings have created a vulnerability in the event of a fire. Preventive efforts must be carried out by each individual and work unit, so that casualties from fire incidents can be minimized. Fires can cause moral, material and even human life losses. Fires that hit public facilities, of course, cause losses to many people. Shophouse fires often occur suddenly due to short circuits, gas explosions or due to sparks from cigarettes/matches. The research carried out this time focuses on creating a fire detection system using ESP32 and Arduino. The system uses three sensors, namely a temperature sensor, a gas sensor and a fire sensor. Temperature sensors are useful for monitoring room temperature conditions, fire sensors are useful for detecting the presence of fire in a fire disaster and gas sensors are useful for detecting the presence of smoke that appears as a result of a fire disaster. This system uses an ESP32 microcontroller and uses the Arduino IDE application. The results of the fire detection system are expected to reduce the occurrence of fire accidents and also losses caused by fire accidents.