p-Index From 2021 - 2026
6.835
P-Index
This Author published in this journals
All Journal PROSIDING SEMINAR NASIONAL Autotech: Jurnal Pendidikan Teknik Otomotif Universitas Muhammadiyah Purworejo E-Bisnis : Jurnal Ilmiah Ekonomi dan Bisnis Elkom: Jurnal Elektronika dan Komputer PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer MANAJEMEN Journal of Engineering, Electrical and Informatics (JEEI) Jurnal Universal Technic Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Jurnal Publikasi Ilmu Komputer dan Multimedia Jurnal Publikasi Ilmu Manajemen Jurnal Penelitian Rumpun Ilmu Teknik Jurnal Publikasi Teknik Informatika (JUPTI) Jurnal Sains dan Ilmu Terapan Jurnal Sistem Informasi dan Ilmu Komputer Pandawa : Pusat Publikasi Hasil Pengabdian Masyarakat Jurnal Elektronika dan Teknik Informatika Terapan Journal of Technology Informatics and Engineering Seminar Nasional Teknologi dan Multidisiplin Ilmu Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika Router : Jurnal Teknik Informatika dan Terapan Repeater: Publikasi Teknik Informatika dan Jaringan Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi International Journal of Computer Technology and Science International Journal of Information Engineering and Science International Journal of Electrical Engineering, Mathematics and Computer Science Jurnal Bengawan Solo: Pusat Kajian Penelitian dan Pengembangan Daerah Kota Surakarta Systematic Literature Review Journal Journal of New Trends in Sciences Router : Jurnal Teknik Informatika dan Terapan Journal of Engineering, Electrical and Informatics Global Science: Journal of Information Technology and Computer Science Jurnal Sistem Informasi dan Ilmu Komputer
Claim Missing Document
Check
Articles

Transformasi Proyek Melalui Keajaiban Kecerdasan Buatan: Mengeksplorasi Potensi AI Dalam Project Management Sulartopo Sulartopo; Siti Kholifah; Danang Danang; Joseph Teguh Santoso
Jurnal Publikasi Ilmu Manajemen Vol. 2 No. 2 (2023): Juni: Jurnal Publikasi Ilmu Manajemen
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jupiman.v2i2.2477

Abstract

The aim of this research is to discuss the potential of applying AI to improve PM activities and how project managers can objectively comment on issues of responsibility in taking action, accountability in decision making and the still important need for human reasoning. In the context of project management, AI has introduced new methods and techniques that enable project managers to work more quickly and efficiently. However, the unique complexity of projects can become a bottleneck in automating complex activities. The novelty of this research lies in its focus on exploring potential applications of artificial intelligence in project management. This study captures and discusses state-of-the-art research regarding AI applications in PM, providing strong evidence to highlight the benefits of AI techniques in providing intelligent solutions by learning from previous data even with incompleteness and uncertainty in an automated, efficient and reliable manner. The method used in this research is a literature review on the application of artificial intelligence in project management. Related research in the project management domain was collected to prepare a database for review. Then, the current use of AI in real-time projects and enterprises is evaluated for a more in-depth analysis. The research results show that AI has the potential to significantly improve project management processes in developing planning phases, conducting project charters, and integrated change control. The potential application of AI to enhance PM activities can objectively comment on issues of responsibility in taking action, accountability in decision making, and the critical need for human reasoning. AI is anticipated to categorize, measure and forecast potential risks associated with project performance and their relevant impacts, to carry out reliable investigations and analysis in advance regarding broad aspects of project management.
Kajian Wellness Tourism Dari Perspektif Sosial Budaya Zellius Ragiliawan; Hanif Assabib Rosyid; Rizky Ni'ma Febriani; Budi Santoso; Danang Danang
Jurnal Bengawan Solo Pusat Kajian Penelitian dan Pengembangan Daerah Kota Surakarta Vol. 2 No. 1 (2023): Juni : Jurnal Bengawan Solo
Publisher : Badan Riset dan Inovasi Daerah Kota Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58684/jbs.v2i1.32

Abstract

The city of Surakarta with an area of 46.72 km2 is known as a city of arts and culture which presents many historical places, various arts and culture, traditions, religion and various craft creations combined with tourism activities. Referring to the information provided by the Culture and Tourism Office of the City of Surakarta, there are several historical tours in the City of Surakarta, namely the Loji Gandrung Building and the Vastenburg Fort. In these places we can trace the history that has occurred in the city of Surakarta. Besides that, Surakarta City also offers other tourist destinations. Other tourist destinations in Surakarta City, namely culinary tourism, batik village tours, cultural tourism, nature tourism, religious tourism, and many others.
BLACK BOX APPROACH TO MONITORING CONTAINER MICROSERVICES IN FOG COMPUTING Danang Danang; Nuris Dwi Setiawan; Indra Ava Adianta
Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.141

Abstract

In recent years IoT has developed very rapidly. IoT devices are used to monitor and control physical objects to transform the physical world into intelligent spaces with computing and communication capabilities. Compared to cloud computing, fog computing is used to support latency-sensitive applications at the edge of the network which allows client requests to be processed faster. This study aims to propose a monitoring framework for containerized black box microservices in a fog computing environment to evaluate CPU overhead, as well as to determine the operating status, service characteristics, and dependencies of each container. This study proposes a monitoring framework to integrate computing resource usage and run-time information from service interactions using a black box approach that seeks to integrate service-level information and computing resource information into the same framework. The proposed framework is limited to observing information monitoring after the server receives a request. This study uses JMeter to simulate user actions, which send requests to the server, and this research assumes the user knows the IP address of the server. For container monitoring methods in fog computing, all are indirect monitoring methods. The results of this study indicate that the proposed framework can provide operational data for visualization that can help system administrators evaluate the status of running containers using a black box approach. System administrators do not need to understand and modify target microservices to gather service characteristics from containerized microservices. Regarding future research, it is suggested to expand the exploration of modified system information, and that part of the container management tool code can be pre-tried so that the framework proposed in this study can provide real-time quantitative indexes for the load balancing algorithm to help optimize the load balancing algorithm.
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review Tanveer Shah; Danang Danang
Systematic Literature Review Journal Vol. 1 No. 1 (2025): Januari: Systematic Literature Review Journal
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70062/slrj.v1i1.52

Abstract

This study aims to address the challenges and propose solutions for the Optimization of Blockchain-Based Cybersecurity Systems to Enhance Resilience Against Ransomware Attacks using a Systematic Literature Review (SLR) approach. Blockchain is increasingly recognized as a transformative technology in cybersecurity due to its decentralized structure, transparency, and robustness in securing data. Despite these advantages, its widespread adoption is hindered by several challenges, including scalability, interoperability, high energy consumption, and limited access to representative ransomware datasets. This research highlights that integrating blockchain with advanced technologies such as data analytics, machine learning, and Explainable AI (XAI) can significantly enhance its effectiveness in combating ransomware.The findings reveal that Graph Convolutional Neural Networks (GCN) enable real-time detection of ransomware patterns in network traffic with an accuracy of up to 95%. Furthermore, Layer-2 solutions like the Lightning Network and sharding effectively alleviate the load on main blockchains, thereby increasing transaction throughput. Efficient consensus mechanisms, including Proof of Stake (PoS) and Delegated Proof of Stake (DPoS), address energy consumption issues, making blockchain more adaptable to IoT and resource-constrained environments. These approaches have proven successful in enabling early detection, mitigation, and prevention of ransomware in IoT systems, cloud infrastructures, and smart grid networks. The implications of this study underscore the potential of blockchain as a critical component of proactive and adaptive cybersecurity systems. However, overcoming existing challenges requires further development of hybrid frameworks that integrate blockchain with data analytics and machine learning technologies. In addition, efforts should focus on standardizing global security protocols to enhance interoperability and creating robust, diverse ransomware datasets to support more accurate detection systems. Future research should also explore methods to minimize latency and improve blockchain efficiency in real-time cybersecurity applications.
Pemanfaatan Teknologi Internet of Things untuk Monitoring Kualitas Air Sungai di Wilayah Perkotaan Danang Danang; Nuris Dwi Setiawan; Eko Siswanto
Journal of New Trends in Sciences Vol. 2 No. 1 (2024): Februari: Journal of New Trends in Sciences
Publisher : CV. Aksara Global Akademia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59031/jnts.v2i1.784

Abstract

The rapid urbanization and industrialization of cities have significantly contributed to the rising pollution levels, especially in urban rivers, where water quality is often compromised. Monitoring water quality in real-time is essential for mitigating the adverse effects of water contamination. This research aims to design and implement an Internet of Things (IoT)-based system for real-time monitoring of water quality in urban rivers, focusing on the continuous collection and analysis of environmental data. The system utilizes a range of sensors to measure critical water quality parameters, including pH, temperature, dissolved oxygen (DO), turbidity, and various contaminants, all of which transmit data wirelessly to a central server for further processing. The study evaluates the accuracy, reliability, and efficiency of the IoT system in detecting water pollution and its ability to deliver real-time insights. Findings demonstrate that the IoT system offers a higher level of precision and faster detection compared to conventional monitoring methods, making it an effective tool for real-time pollution detection and decision-making. Additionally, the integration of the IoT system with a user-friendly visualization platform enhances the accessibility of the data for stakeholders, enabling them to monitor the water quality effectively. The study suggests that IoT-based water quality monitoring systems present a sustainable long-term solution for urban water management, offering cost and time savings. Moreover, the research highlights the importance of cross-sector collaboration to support the development and deployment of IoT technologies and recommends further advancements in sensor technologies to monitor additional water quality parameters.  
Rancang Bangun Sistem Keamanan Ruang Persandian Menggunakan RFID dan Sensor PIR Berbasis IOT Eni Muhadi; Sulartopo Sulartopo; Danang Danang; Dani Sasmoko; Nuris Dwi Setiawan
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 1 (2024): Maret : Router: Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Profesi Telekomunikasi dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i1.47

Abstract

This Space Security System is a system that utilizes the existing Internet Network to monitor a room remotely or from a different location. With the aim of making it easier to limit employee access rights and monitor the presence of people in the room.So the author made a room security system tool using the Internet of Things (IOT) which was implemented at the Demak Regency Communication and Information Service. The way this system works is only employees who have access rights who can enter the room by attaching an RFID card to the RFID Reader sensor, and the way the PIR sensor works is to monitor human presence, when there is infrared or human emission it will send data to the web if it is in the room has people and the red LED lights up and the buzzer sounds, while the push button button is when the push button button is pressed the solenoid will open. By making this design, it will help improve room security at the Demak Regency Communication and Information Service, especially the Encryption Room
FINANCIAL ACCOUNTING INFORMATION SYSTEM AS AN ANALYSIS OF COOPERATIVE PROFIT PLANNING USING THE WEB-BASED COST VOLUME PROFIT (CVP) METHOD (Case Study: at KSPPS Mitra Amanah Sejahtera Abadi, Kendal) Dewi Retno Putri; Danang Danang
Journal of Engineering, Electrical and Informatics Vol. 1 No. 1 (2021): Februari : Journal of Engineering, Electrical and Informatics
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v1i1.811

Abstract

The research was conducted at KSPPS Mitra Amanah Sejahtera Abadi. Which is located at Ds. Sidorejo Rt. 02 / Rw. 05 Kec. Brangsong Kab. Kendal. Data recording and management previously applied to the MASA Cooperative is still manual. Transaction data such as daily dropping, dropping per AO, daily withdrawals and general ledgers and journals will be entered manually into the book. And the resulting data is inaccurate, and there has also been no good profit planning in the cooperative so far, only comparing revenues and expenses and fulfilling cooperative activities, so that the cooperative lacks funds or capital for the following year so it has to hold SHU members from being distributed and used as capital for the following year. To simplify and speed up the transaction process and making reports and planning for cooperative profits, an accounting information system application is made for cooperatives. This is to facilitate the secretary / member in recording and making financial reports and planning the profit of the cooperative, the secretary / member only needs to input the application data once and the report can be directly covered in one application and the secretary / member can print it. This study aims to facilitate the presentation of the profit planning analysis report which is applied to the cooperative each year. The use of bookkeeping that has been applied so far is felt to have several weaknesses which cause several problems. Therefore, cooperatives need to develop a new system, namely a computer-based financial accounting information system.The Cost Volume Profit method is expected to be able to carry out good profit planning and more valid financial records so that it can reduce the risk of errors and the process is much faster.
ROBOTIC AUTOMATION ON COMPUTER NUMERICAL CONTROL MACHINE Danang Danang; Zaenal Mustofa; Edy Siswanto
Journal of Engineering, Electrical and Informatics Vol. 2 No. 2 (2022): Juni: Journal of Engineering, Electrical and Informatics:
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v2i2.914

Abstract

Along with the advancement of robot technology, Computer Numerical Control (CNC) machine robot automation is becoming more popular. While some Computer Numerical Control engine process independently with a part catcher, a perpendicular granting center requires an extraneous individual to keep the engine processing. Collective and Mechanical robots be the main options for robotize perpendicular Computer Numerical Control grating machines. This study aims to specifically investigate and find the most effective type of robot to be used as a machine capable of maintaining the Haas VF-2 perpendicular crushing center. The method used in this study is the Overal Equipment Effectiveness (OEE) model approach with five different actions, starting with scope, unit setting, evaluation, fee calculation, and integration of the evaluation to present the value of each cell. The purpose of the model used in this study is to determine which robot is more effective for use in industry. As the result, this study demonstrates the important difference between the robot cells on the site and the overall effectiveness of the equipment, besides that the fee differences in the production of robot cells are not too large, but if the focus is on adding robots then the fee differences must be considered carefully. The hazard assessment proved surprising. This study shows that the risk factors in VF-2 treatment using cooperative robots and mechanical robots can be ignored. The impact of takt time also has an important role. Taking each factor into account for the production machining of the VF-2 mechanical robot is more conducive to use because its performance level is almost two times better and in terms of use, it is also much safer. For future work, maintaining a continual level of danger estimate during working on various parts is a very important thing to pay attention to. In addition, when the geometry and materials of machine parts are developed, the collective allocation is no longer valid, so danger estimates must be carried out more carefully to ensure operator safety.
Web-Based Inventory Information System For Monitoring Stock, At PT. Sarah Ayu Semarang Branch Danang Danang; Wijaya Heti Susanti
Journal of Engineering, Electrical and Informatics Vol. 3 No. 1 (2023): Februari : Journal of Engineering, Electrical and Informatics
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v3i1.2861

Abstract

Sarah Ayu Semarang Branch is a company that operates in the rental and sales of children's toys. To fulfill the wishes of several outlets in Semarang, the company has a storage warehouse, but the documentation currently used is still simple by recording stock of goods by looking directly at the existing goods, calculating using a calculator and recording it in a book as a report to the management. In this way, differences often occur between real (real) goods stock with monthly goods recording from the head office. This research discusses a web -based inventory information system for monitoring stock at PT. Sarah Ayu Semarang Branch. By designing an application that is capable of processing, documenting, calculating order transactions, and storing inventory in the warehouse. By having minimum stock and maximum stock, the company can find out the amount of inventory that is running out and over stock, while the company can easily find out the final stock amount of goods in the warehouse. Web- Based Inventory Information System is also really needed in companies to help warehouse divisions, administration and leaders in making decisions. To build the system using the PHP programming language MYSQL database . With this inventory information system, it is hoped that the company will be able to carry out planning in making decisions and monitoring inventory properly, and be able to carry out stock control functions including items that are running out or over stock , while also being able to produce reports that are accurate, fast and precise.
Interface-Based Loan Fund Performance Monitoring And Evaluation System At BKM Ngesrep Semarang Lilis SuryanI; Danang Danang; Khoirur Rozikin
Journal of Engineering, Electrical and Informatics Vol. 3 No. 3 (2023): Oktober: Journal of Engineering, Electrical and Informatics
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jeei.v3i3.2868

Abstract

The monitoring and evaluation system is a routine process of collecting data and measuring progress on program objectives/monitoring changes, which focuses on processes and outputs. Monitoring involves accounting for what is done. Monitoring involves observing the quality of the services provided while evaluation is the use of social research methods to systematically investigate program effectiveness/assess the program's contribution to change (goal/objective) and assess the need for improvement, continuation or expansion of the program (recommendations). The first aim of this system is to be able to process data efficiently and accurately, the second aim is to assist the financial management unit (UPK) in inputting loan fund installments to make it easier to process data so as not to make calculation errors and record errors and to improve services to Community Self-Help Groups (KSM) better as borrowers, the third objective is to facilitate monitoring of loan fund evaluation which can be monitored and evaluated at any time, both the rate of return of loan funds and the level of loan fund congestion. In this system, the interface-based monitoring and evaluation model is one of the services provided by the operating system as a means of interaction between the user and the operating system. The interface is an operating system component that comes into direct contact with the user. This application was created using Microsoft Visual Basic 6.0 and a Client Server-based MySQL database.