Claim Missing Document
Check
Articles

Found 18 Documents
Search

Sistem Pendeteksi Bencana Kebakaran Menggunakan ESP32 Dan Arduino Berbasis WEB: Studi Kasus Di Toko Citra Berkah Karangawen Demak Muhammad Ainun Najib; Sulartopo Sulartopo; Dani Sasmoko; Danang Danang; Iman Saufik Suasana
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 2 No. 1 (2024): Februari : Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v2i1.62

Abstract

Fire is a threat to human safety, property and the environment. With the increasingly rapid development and progress of development, the risk of fires is increasing. Shophouses or shophouses are places that are prone to fires. The increasingly dense population and the construction of office buildings have created a vulnerability in the event of a fire. Preventive efforts must be carried out by each individual and work unit, so that casualties from fire incidents can be minimized. Fires can cause moral, material and even human life losses. Fires that hit public facilities, of course, cause losses to many people. Shophouse fires often occur suddenly due to short circuits, gas explosions or due to sparks from cigarettes/matches. The research carried out this time focuses on creating a fire detection system using ESP32 and Arduino. The system uses three sensors, namely a temperature sensor, a gas sensor and a fire sensor. Temperature sensors are useful for monitoring room temperature conditions, fire sensors are useful for detecting the presence of fire in a fire disaster and gas sensors are useful for detecting the presence of smoke that appears as a result of a fire disaster. This system uses an ESP32 microcontroller and uses the Arduino IDE application. The results of the fire detection system are expected to reduce the occurrence of fire accidents and also losses caused by fire accidents.
Transformasi Proyek Melalui Keajaiban Kecerdasan Buatan: Mengeksplorasi Potensi AI Dalam Project Management Sulartopo Sulartopo; Siti Kholifah; Danang Danang; Joseph Teguh Santoso
Jurnal Publikasi Ilmu Manajemen Vol. 2 No. 2 (2023): Juni: Jurnal Publikasi Ilmu Manajemen
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jupiman.v2i2.2477

Abstract

The aim of this research is to discuss the potential of applying AI to improve PM activities and how project managers can objectively comment on issues of responsibility in taking action, accountability in decision making and the still important need for human reasoning. In the context of project management, AI has introduced new methods and techniques that enable project managers to work more quickly and efficiently. However, the unique complexity of projects can become a bottleneck in automating complex activities. The novelty of this research lies in its focus on exploring potential applications of artificial intelligence in project management. This study captures and discusses state-of-the-art research regarding AI applications in PM, providing strong evidence to highlight the benefits of AI techniques in providing intelligent solutions by learning from previous data even with incompleteness and uncertainty in an automated, efficient and reliable manner. The method used in this research is a literature review on the application of artificial intelligence in project management. Related research in the project management domain was collected to prepare a database for review. Then, the current use of AI in real-time projects and enterprises is evaluated for a more in-depth analysis. The research results show that AI has the potential to significantly improve project management processes in developing planning phases, conducting project charters, and integrated change control. The potential application of AI to enhance PM activities can objectively comment on issues of responsibility in taking action, accountability in decision making, and the critical need for human reasoning. AI is anticipated to categorize, measure and forecast potential risks associated with project performance and their relevant impacts, to carry out reliable investigations and analysis in advance regarding broad aspects of project management.
ADVANCED MALICIOUS SOFTWARE DETECTION USING DNN Sulartopo Sulartopo; Dani Sasmoko; Zaenal Mustofa; Arsito Ari Kuncoro
Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.144

Abstract

The special component of malicious software analysis is advanced malicious software analysis which implicates interested the main framework of malicious software that can be executed after executing it and aggressive malicious software investigation depend on inquisitive of the practice of malicious software after running it in a composed habitat. Advanced malicious software analysis is usually performed by contemporary anti-malicious software operating systems using signature-based analysis. The purpose of this research is to propose also decide a DNN for the progressive identification of portable files to study the features of portable executable malicious software to minimize the occurrence of distorted likeness when aware of advanced malicious software. The model proposed in this study is a NN with a Dropout model contrary to a resolution tree model to examine how well it performs in detecting real malicious PE files. Setup-skeptic methods are used to extract features from files. The dataset is used to train the proposed approach and measure outcomes by alternative common malicious software datasets. The results from this study illustrate that the use of simple DNNs to study PE vector elements is not only efficient but more fewer system comprehensive than the traditional interested disclosure approach. The model proposed in this study achieves an A-UC of ninety-nine point eight with ninety accurate specifics at one percent inaccurate specific on the R-OC curve. For shows that this model has the potential to complement or replace conventional anti-malicious software operating systems so for future research, it is proposed to implement this model practically.
REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS Maya Utami Dewi; Sulartopo Sulartopo; Ahmad Solechan
Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.147

Abstract

The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.
Perancangan Aplikasi Tutorial Turnitin Untuk Melacak Plagiasi Menggunakan Metode Prototype Haris Jamaludin; Sulartopo Sulartopo; Nuris Dwi Setiawan
Elkom: Jurnal Elektronika dan Komputer Vol. 17 No. 1 (2024): Juli : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v17i1.2049

Abstract

This study focuses on creating a Turnitin tutorial application to track plagiarism using the prototype method approach. The purpose of this application is to make it easier for users to understand and utilize Turnitin as a reliable plagiarism detection tool in academic writing. The prototype method was chosen because it allows for rapid iteration and improvement based on user feedback, which is very important to improve the quality of the application. The development stages include creating an initial prototype, testing functions, and collecting feedback for design refinement. This study aims for the application to be developed to provide clear guidance and effective solutions in identifying and preventing plagiarism, while deepening users' understanding of the use of Turnitin. Thus, this application is expected to strengthen academic integrity and support ethical writing practices through integrated plagiarism detection technology.
Pengaruh Efikasi Diri dan Pengetahuan Manajemen Keuangan Bisnis Terhadap Intensi Berwirausaha Heni Dwi Listyaningrum; Henny Kumalasari Widodo; Sulartopo Sulartopo
Journal of Management and Social Sciences Vol. 2 No. 2 (2023): May : Journal of Management and Social Sciences
Publisher : Sekolah Tinggi Ilmu Administrasi Yappi Makassar Jl. Sumba no 46, Kota Makassar, Sulawesi Selatan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jimas.v2i2.1117

Abstract

Abstract Main problem: the influence of self-efficacy and business financial management knowledge on entrepreneurial intentions. Objective: to determine and analyze the influence of self-efficacy and business financial management knowledge on entrepreneurial intentions. Originality: the influence of self-efficacy and business financial management knowledge on entrepreneurial intentions. Method: this exploration is quantitative and is applied due to the influence of two or more factors explicitly when building a relationship. Results: self-efficacy has a positive and extraordinary impact on the desire for entrepreneurship. Knowledge of financial management influences the desire for entrepreneurship in central java.
Rancang Bangun Sistem Keamanan Ruang Persandian Menggunakan RFID dan Sensor PIR Berbasis IOT Eni Muhadi; Sulartopo Sulartopo; Danang Danang; Dani Sasmoko; Nuris Dwi Setiawan
Router : Jurnal Teknik Informatika dan Terapan Vol. 2 No. 1 (2024): Maret : Router: Jurnal Teknik Informatika dan Terapan
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/router.v2i1.47

Abstract

This Space Security System is a system that utilizes the existing Internet Network to monitor a room remotely or from a different location. With the aim of making it easier to limit employee access rights and monitor the presence of people in the room.So the author made a room security system tool using the Internet of Things (IOT) which was implemented at the Demak Regency Communication and Information Service. The way this system works is only employees who have access rights who can enter the room by attaching an RFID card to the RFID Reader sensor, and the way the PIR sensor works is to monitor human presence, when there is infrared or human emission it will send data to the web if it is in the room has people and the red LED lights up and the buzzer sounds, while the push button button is when the push button button is pressed the solenoid will open. By making this design, it will help improve room security at the Demak Regency Communication and Information Service, especially the Encryption Room
The Effect of Performance Appraisal, Reward, and Punishment on Machining Employee Performance at PT. Musashi Auto Parts Indonesia Slamet Prastiyanto; Sulartopo Sulartopo
Jurnal Akuntansi, Ekonomi dan Manajemen Bisnis Vol. 5 No. 3 (2025): November : Jurnal Akuntansi, Ekonomi dan Manajemen Bisnis
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jaemb.v5i3.8159

Abstract

This study aims to explore the effects of Performance Appraisal systems, rewards, and punishment on the efficiency of employees working at PT. Musashi Autoparts Indonesia. This study was conducted in order to address the lack of a holistic evaluation system, equitable rewards, and justifiable punishment within the organization to enhance productivity and performance standards. This study employs associative quantitative research, which contains descriptive and verification techniques. The study’s respondents were all 43 employees, and these were collected using saturated sampling. The data was collected using a questionnaire which was analyzed based on the Likert scale. The data was analyzed using the most recent version of SPSS, and processed through validity and reliability tests, multiple linear regression, T and F tests. The research results show that each of the variables which in this case are Performance Appraisal, reward and punishment, all have a significant effect on employee performance. Of all the variables, it is rewards that have the most significant effect on performance. In light of these results, the study suggests that the company is to enhance the RP system by recognizing and rewarding top performers as well as refining the performance appraisal system to make it more objective and transparent, and set a constructive, measurable punishment system which should help to bolster employee motivation.