Claim Missing Document
Check
Articles

Found 17 Documents
Search

Testing and Comparison of SN754410N and L293D Driver IC Variants Phoa, Victor; Rakhmad, Hariyono
Jurnal Arus Elektro Indonesia Vol 10 No 1 (2024)
Publisher : Fakultas Teknik, Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/jaei.v10i1.39120

Abstract

The popular transistor-based driver L293D has been produced by several different manufacturers and some have increased functions such as the SN754410N IC. However, replacing driver ICs from the same or different manufacturers sometimes found compatibility problems such as driver unresponsiveness in controlling the motor. To find out the scientific reasons that cause this problem, this study tested the current-carrying ability and switching delay for ICs from ST, HLF, and SN754410N fabrications. From the test results, it was found that there were differences in the ability to conduct current, and differences in the duration of the switching delay, and it was also found that the IC was damaged as much as 10 percent of the samples from the ST fabrication.
Implementasi Dompet Digital Polije Berbasis IoT dan Blockchain FIRMANSYAH, MUHAMMAD HAFIDH; Dewanto, Wahyu Kurnia; Rakhmad, Hariyono
JURNAL PENGABDIAN MASYARAKAT AKADEMISI Vol. 2 No. 1 (2024): Januari
Publisher : CV. ALIM'SPUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59024/jpma.v2i1.504

Abstract

urrently, the implementation of IoT devices has been widely utilized by various parties in supporting the increasingly complex aspects of human life. IoT devices have become a favorite among hardware and software developers due to their ease of use and flexibility in adapting to the evolving systems of today. One of the uses of IoT is in the realm of digital economics, where digital economy represents a new way of prioritizing technology and ease in the buying and selling transaction process between sellers and buyers. In the past, payment processes for goods or services used to involve paper money and coins, but nowadays, payments are made using digital media. However, the current digital payment methods still rely on centralized storage technology. Therefore, if the data held at the center is damaged or compromised, it can disrupt the flow of financial transactions, and user data privacy becomes a subsequent concern.
Pencegahan Perundungan Anak Dengan Memanfaatkan Teknologi Digital Studi Kasus UPTD SPF SDN Nangkaan Bondowoso Dewanto, Wahyu Kurnia; Arifianto, Aji Seto; Rakhmad, Hariyono; Firmansyah, Muhammad Hafidh; Kasiyati, Kasiyati
SEJAGAT : Jurnal Pengabdian Masyarakat Vol. 1 No. 3 (2025): February
Publisher : P3M Politeknik Negeri Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25047/sejagat.v1i3.5374

Abstract

Bullying among students is increasingly prevalent, driven by various factors, including environmental influences and the impact of globalization. This issue poses significant challenges for teachers, who are often expected to monitor all students throughout the school day despite limited resources and time. The aim of this study is to explore effective strategies for preventing bullying in schools by integrating technological and creative approaches. The research employs a mixed-methods approach, combining quantitative analysis of bullying incidents with qualitative data from interviews and observations. The study focuses on the implementation of CCTV technology to enhance student behavior monitoring and prevent bullying incidents. Additionally, it investigates the use of arts-based activities as a means to help students channel excess energy into positive, creative outlets, thus reducing the likelihood of engaging in bullying behavior. The findings suggest that the combination of technological supervision and arts-based interventions significantly reduces the incidence of bullying in schools. The conclusion emphasizes the effectiveness of a holistic approach that incorporates both advanced monitoring tools and emotional support activities, highlighting the potential for these strategies to create a safer and more supportive school environment where students can thrive both emotionally and socially.
Community-Based Circular Agribusiness: Market Validation, Pricing Logic, and Value-Chain Coordination for Village Livestock Waste Fertilizer in Rural Indonesia Putra, Dhanang Eka; Rakhmad, Hariyono; Hudori, Huda Ahmad; Chairina, Raden Roro Lia; Umami, Mochamad Rizal
Smart Society Vol. 5 No. 2 (2025): Smart Society
Publisher : FOUNDAE (Foundation of Advanced Education)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/smartsociety.v5i2.815

Abstract

Village livestock waste presents both an environmental burden and an underutilized resource capable of strengthening rural livelihoods when transformed into marketable organic fertilizer. This study develops a community-based circular agribusiness model that integrates market validation, pricing analysis, and value-chain coordination to improve the commercial feasibility of waste-to-fertilizer initiatives in rural Indonesia. A convergent mixed-methods design was implemented, combining a Price Sensitivity Meter survey with Cost–Volume–Profit and Break-Even Point calculations, supported by a simplified Value Chain Analysis involving farmers, processors, kiosks, and local cooperative actors. Data were collected from 60 small-scale livestock households, 150 fertilizer users, and 12–15 key informants across Arjasa District. Findings indicate an acceptable price range of IDR 40,000–80,000 per 25-kg bag, with an optimal price point near IDR 60,000. At this level, contribution margins remain positive across direct, cooperative, and kiosk channels, with the break-even requirement estimated at 180–230 bags per month. The value-chain assessment reveals constraints related to moisture variability, inconsistent granulometry, and high last-mile distribution costs. Proposed coordination measures include minimum quality standards, scheduled collection and delivery routes, and simple offtake agreements with a 3–5% quality-based incentive. Together, these elements form a replicable empowerment-oriented model that enhances income stability, reduces waste, and supports community-driven resource governance. The study demonstrates that circular agribusiness, when anchored in market evidence and locally manageable coordination mechanisms, can contribute to socio-economic resilience and strengthen community participation in sustainable rural development
Node-RED dan Robotik pada Sistem Penyiraman Otomatis berbasis IoT Wahyu Kurnia Dewanto; Aji seto Arifianto; Hariyono Rakhmad; Hermawan Arief Putranto; Muhammad Hafidh Firmansyah
Jurnal Teknologi Informasi dan Multimedia Vol. 6 No. 3 (2024): November
Publisher : Sekawan Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v6i3.609

Abstract

The Internet of Things (IoT) technology offers great potential in the agricultural sector, especially in the automation of plant irrigation systems. Many farmers face challenges with water use efficiency and real-time land condition monitoring. Manual irrigation systems often lead to water wastage. Currently, many centralized irrigation systems use a one-by-one watering approach, requiring multiple sensors to monitor each plant's condition, making them less efficient. To address this issue, this research developed an automated irrigation system controlled by Node-RED and robotic technology. The system is designed to require only one sensor to monitor the entire agricultural area, while still efficiently distributing water to many plants. Node-RED manages data from soil moisture and environmental temperature sensors, then activates the watering robot to distribute water according to the plants' needs. The system was tested by comparing manual and automatic methods using polybags. The soil moisture sensor sends data to Node-RED, which activates the watering robot when soil moisture falls below a set threshold. Test results show that the automated system can save up to 20% of water usage compared to manual methods, while keeping soil moisture within the optimal range. This system also enables real-time monitoring and control, providing a more efficient, timely, and resource-saving solution.
Evaluasi Kinerja Algoritma Deep Learning Untuk Deteksi Dini Serangan Siber Pada Jaringan Komputer Abdul Kohar; Aulia Rizky Muhammad Hendrik Noor Asegaff; Brian Sebastian Salim; Hamid Wijaya; Hariyono Rakhmad
Jurnal Pengabdian Masyarakat dan Riset Pendidikan Vol. 4 No. 3 (2026): Jurnal Pengabdian Masyarakat dan Riset Pendidikan Volume 4 Nomor 3 (Januari 202
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jerkin.v4i3.4517

Abstract

Perkembangan serangan siber yang semakin kompleks dan dinamis menuntut penerapan sistem deteksi intrusi yang mampu melakukan deteksi dini dengan akurasi tinggi. Penelitian ini bertujuan untuk mengevaluasi kinerja algoritma deep learning dalam mendeteksi serangan siber pada jaringan komputer melalui metode studi literatur. Studi ini mengkaji berbagai penelitian terdahulu yang relevan, termasuk penerapan arsitektur Convolutional Neural Network (CNN), VGGNet-16, dan Transformer-based deep learning, serta membandingkan performa algoritma berdasarkan metrik akurasi, precision, recall, dan F1-score. Hasil analisis menunjukkan bahwa algoritma deep learning secara konsisten lebih unggul dibandingkan pendekatan machine learning tradisional maupun metode konvensional berbasis signature dalam mengenali pola serangan yang kompleks dan dinamis. Model deep learning mampu mengekstraksi fitur secara otomatis dari data jaringan berdimensi tinggi, meningkatkan efektivitas deteksi dini, dan adaptif terhadap serangan baru, termasuk zero-day attack. Meskipun demikian, evaluasi literatur juga menunjukkan adanya variasi kinerja yang dipengaruhi oleh perbedaan dataset, metode evaluasi, dan konteks penerapan, sehingga menekankan pentingnya standardisasi evaluasi kinerja algoritma. Penelitian ini memberikan pemahaman komprehensif mengenai tren, tantangan, dan potensi pengembangan algoritma deep learning untuk sistem keamanan jaringan, sekaligus menjadi acuan bagi penelitian selanjutnya dalam meningkatkan efektivitas deteksi dini serangan siber.
Computational Modeling and Simulation of Nonlinear Dynamical System Stability in Applied Mathematics Aji Priyambodo; Hariyono Rakhmad; Muhammad Shakir
International Journal of Applied Mathematics and Computing Vol. 2 No. 2 (2025): April: International Journal of Applied Mathematics and Computing
Publisher : Asosiasi Riset Ilmu Matematika dan Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijamc.v2i2.271

Abstract

Nonlinear dynamical systems represent a fundamental area of study in applied mathematics due to their relevance across various disciplines, including physics, biology, and engineering. Their inherent complexity, characterized by phenomena such as bifurcation, chaos, and sensitivity to parameter variations, often limits the effectiveness of traditional manual analysis, particularly when addressing high-dimensional or computationally intensive models. This study aims to address these challenges by applying computational modeling and numerical simulation techniques to analyze the stability of nonlinear dynamical systems. The research employs analytical methods, including equilibrium point identification and linearization, which are then validated and extended through the fourth-order Runge-Kutta numerical method. Simulations were conducted to visualize equilibrium points, phase portraits, and parameter-driven bifurcation phenomena. The findings demonstrate a strong correspondence between analytical and numerical approaches, with minimal error margins (≤1%) observed in equilibrium point estimation, thus confirming the reliability of computational methods. Moreover, the bifurcation analysis revealed critical transitions such as pitchfork and Hopf bifurcations, which indicate sudden shifts from stability to instability behaviors that are difficult to capture through manual calculations alone. The integration of computational approaches provides clear advantages, offering systematic exploration of parameter spaces and detailed visualizations of system dynamics, thereby expanding the scope of stability analysis. In conclusion, this study emphasizes that computational modeling is not only an effective complement to analytical methods but also a necessary strategy for advancing the understanding of nonlinear dynamical systems in applied mathematics.