Claim Missing Document
Check
Articles

Found 2 Documents
Search

Maintenance Tasks for 20 Kv Medium-Voltage Switchgear Based on Technical Judgment Experience and Manufacturer Soetadji, Prabowo; Sutikno , Tole; Fadlil , Abdul
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1578

Abstract

A 20 kV medium-voltage switchgear is an important equipment in the electricity system that distributes electricity generated by the 20 kV electric power generator to electricity users. Calor Emag, Merlin Gerin, Alsthom, Fuji, AEG, Schneider, Meidensha, Goldstar, Modalek, Areva, and Siemens are among the companies that make products. This study describes a method for maintaining 20 kV medium-voltage switchgear, an essential equipment in the electricity system. In less technical terms, the failure rate is high at the beginning of an asset's life, which follows the curve of the bathtub. However, the failure rate quickly declines as we identify and discard defective components and eliminate early sources of potential failures, such as installation errors. This study introduces a novel approach by examining the relationship between maintenance tasks, which are based on technical judgment and experiences, and the maintenance tasks provided by the manufacturer for 20 kV medium voltage switchgear. The goal is to develop and deliver the most effective maintenance method for 20 kV medium voltage switchgear, to prevent malfunctions or even catastrophic explosions, while maintaining the lowest possible maintenance costs. Total use of labor over 2 years (24 months) for daily, monthly, 3 monthly, and 2 yearly is 3554-man hours (MH). It provides a comprehensive approach to preventing malfunctions and explosions, resulting in optimal maintenance costs and performance.
A Classification Data Packets Using the Threshold Method for Detection of DDoS Sukma Aji; Davito Rasendriya Rizqullah Putra; Riadi, Imam; Fadlil , Abdul; Faiz , Muhammad Nur; Arif Wirawan Muhammad; Purwaningrum, Santi; Sari, Laura
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2224

Abstract

Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.