Claim Missing Document
Check
Articles

Found 3 Documents
Search

Pemeriksaan Kuat Tarik Belah Beton Dengan Persentase Substitusi Fly Ash Yang Berbeda Lubis, Julianto
Engineering and Technology International Journal Vol 6 No 03 (2024): Engineering and Technology International Journal (EATIJ)
Publisher : YCMM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55642/eatij.v6i03.895

Abstract

Kuat tarik belah beton merupakan salah satu parameter penting dalam melihat kekuatan beton. Nilai kuat tarik belah beton diperoleh dengan melakukan pengujian tekan dengan cara membebani benda uji secara lateral sampai benda uji mengalami retak sehingga didapat kekuatan tarik belah beton maksimum. Penelitian ini dilakukan untuk mengetahui nilai kuat tarik belah beton setelah melalui proses curing dimana persentase penggunaan fly ash dalam campuran beton divariasikan dengan 0%, 40% dan 80%. Pengujian dilakukan di laboratorium dengan menggunakan mesin uji compressor, timbangan analitis dengan benda uji berbentuk silinder ukuran tinggi 30 cm dan diameter 15 cm. Hasil pengujian menunjukkan bahwa semakin besar persentase substitusi campuran flyash, semakin kecil nilai kuat tarik belah beton yang dihasilkan.
Unraveling the Research Trends of Artificial Intelligence in Aviation: A Bibliometric Analysis Sulung, Sabam Danny; Nasrullah, Muhammad Nur Cahyo Hidayat; Wibowo, Untung Lestari Nur; Lubis, Julianto
Journal of Science Technology (JoSTec) Vol. 5 No. 1 (2023): Journal of Science Technology (JoSTec)
Publisher : PT Inovasi Pratama Internasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55299/jostec.v5i1.696

Abstract

This study employs bibliometric methods utilizing VOSviewer analysis of Scopus data from 2013 to 2023 to investigate trends in artificial intelligence (AI) research within the aviation industry. The analysis reveals a substantial increase in publication volume over time, peaking at 406 articles in 2022, signifying a heightened interest in AI implementation within the aviation sector. Key publication sources notably include conferences such as AIAA IEEE Digital Avionics Systems Conference Proceedings and ACM International Conference Proceeding Series. Leading contributions in publications emerge from countries such as the United States, China, India, Germany, the United Kingdom, and France, reflecting global involvement in AI research within the aviation industry. Citation analysis identifies highly cited articles addressing topics such as Digital Twin (DT) optimization processes in aviation, AI application in aircraft navigation, and machine learning for weather forecasting. These findings underscore researchers' interest in fundamental topics such as aviation, aircraft-related artificial intelligence, flight delay, and deep learning. Furthermore, co-citation analysis delineates research clusters, illustrating thematic similarities within AI research in the aviation industry. Overall, this bibliometric analysis provides comprehensive insights into the evolution of AI research in the aviation industry, potentially guiding researchers, practitioners, and stakeholders in directing research efforts, formulating policies, and understanding current trends in the application of artificial intelligence within the aviation sector.
Formal Verification for WiMAX Networks Using Enhanced Security Protocols Afrizal Zein; Lubis, Julianto
Journal of Science Technology (JoSTec) Vol. 5 No. 1 (2023): Journal of Science Technology (JoSTec)
Publisher : PT Inovasi Pratama Internasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55299/jostec.v5i1.763

Abstract

This study discusses the formal verification of the Worldwide Interoperability for Microwave Access (WiMAX) security protocol. WiMAX security specifications are defined as a security property that must be met by the protocol in a WiMAX network. The security properties that must be met include pseudonymity, information confidentiality, anti-tapping and session key secrecy. Several studies have found several failures to comply with the security properties set by the WiMAX IEEE 802.16-2004 and IEEE 802.16e-2005 standards. Some of the attacks that can occur include jamming, scrambling, DoS attacks, replay attacks, modification of management messages, downgrade attacks, interleaving attacks and other types of security attacks. From some of these attacks there are several solutions to improve security protocols to overcome these attacks so that they can comply with security protocols. Proof of security protocols in the ability to fulfill security properties can be done either formally or informally. The security protocol operational semantic model framework developed by Cas Cremers and Sjouke Mauw is used to carry out formal verification of proposed improvements to the authentication protocol and Privacy and Key Management (PKM) protocol. Modeling the proposed protocol with an operational semantic framework has been able to prove the proposed improvement of the authentication protocol and PKM by using timestamps, SS/BS identity encryption and adding digital signatures or message digest values ​​to ensure authentication is able to meet the specified security properties.