Kilat
KILAT Journal is a scientific journal published by STT-PLN. KILAT Journal is published twice in one year in April and October and contains the results of research in the fields of Mechanical Engineering, Electrical Engineering, Civil Engineering and Information Engineering, Law and Economics related to studies in the field of Renewable Energy, Electricity, Telecommunications, Control Systems , Electronics, Architecture, Computer Systems, and Information Systems.
Articles
12 Documents
Search results for
, issue
"Vol 7 No 2 (2018): KILAT"
:
12 Documents
clear
ENKRIPSI DATA MENGGUNAKAN ADVANCED ENCRYPTION STANDART 256
Yudi Wiharto;
Ari Irawan
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (722.874 KB)
|
DOI: 10.33322/kilat.v7i2.352
Cryptography is important in securing data and information. Confidential, important information may not be publicly or otherwise protected. It is not impossible for anyone to see, damage, steal or misuse important data from an agency or company through a computer network. The solution is with cryptography or a method of data security that can maintain the confidentiality and authenticity of a data or information. This method is intended for confidential information when sent through network access, such as LAN or internet, cannot be utilized by unauthorized parties. Cryptography supports the aspect of information security, namely protection of confidentiality. Therefore the need to maintain the confidentiality of data and information is a cryptographic application. The process in the form of encryption and decryption used by the user to secure the data without changing the contents of the data. This application has a 32-character key but in its use is made into 2 keys, namely public and private key where the public key is the key filled by the user in accordance with the desire, while the private key is the default key entered by the application at random to meet the length of 32 characters. The AES algorithm used is the AES256 algorithm where this algorithm uses the principle with the number of rounds by key.
PENGARUH EVALUASI TES FORMATIF TERHADAP HASIL BELAJAR MATEMATIKA DITINJAU DARI TINGKAT KEMANDIRIAN BELAJAR MAHASISWA STT-PLN JAKARTA DENGAN MENGGUNAKAN ANALISIS VARIAN ANOVA
Dwi Anggaini;
Miftahul Fikri;
Denny Setiawan
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (434.906 KB)
|
DOI: 10.33322/kilat.v7i2.353
Research is a study that aims to find out the truth by researching and analyzing the influence of student learning independence in formative tests on student mathematics learning outcomes. The study was conducted at the Technical High School - PLN Jakarta in the even semester of 2017/2018 school year with a sample of 52 students using cluster random sampling technique. To retrieve data using questionnaire instruments to capture data on student learning independence variables and use tests to measure students' mathematics learning outcomes. Data analysis was performed using one-way ANOVA to prove the validity of the research hypothesis. Based on the results of the data analysis test, it can be concluded that there is an interaction between formative tests and students' learning independence towards mathematics learning outcomes and is directly proportional to learning independence.
KLASIFIKASI PESAN GANGGUAN PELANGGAN MENGGUNAKAN METODE NAIVE BAYES CLASSIFIER
Haryono Haryono;
Pritasari Palupiningsih;
Yessy Asri;
Andi Nikma Sri Handayani
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (3210.193 KB)
|
DOI: 10.33322/kilat.v7i2.354
The application of customer disturbance message classifiers is made because of the process of reporting the interruption by the customer must be done by selection of data disorders by one by the admin to be able to follow-up from the existing customer reports. Naive Bayes is one of machine learning methods that uses probability calculations where the algorithm takes advantage of probability and statistical methods that predict future probabilities based on past experience. The application of the naive bayes classifier method with text mining as the initial data processor of the disorder messaging application can be concluded that this study yields an accuracy of probability values of 95 percent and proves that the Naive Bayes method can be used to help classify interference messages sent by customers.
SELF ADAPTIVE SOFTWARE DENGAN TEKNIK CASE-BASED REASONING UNTUK MENINGKATKAN PERFORMA APPLICATION SERVER
Muhamad Nur;
Domo Pranowo Kuswandono
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2560.561 KB)
|
DOI: 10.33322/kilat.v7i2.355
Performance of application server is an important attribute that must be maintained quality and stability, because application server operated in dynamic environment with fluctuating user loads and resource levels, its potentially caused unpredictable errors. In order application server performance still optimal, it is need maintains configuration application parameters. But, do that process need deep observation each environment condition changed and of course the cost and time. The approach that can be used is self-adaptive (autonomic computing). Self-adaptive can configure application parameters automatically. Best combination application parameters configuration can be stored on a repository and used as reference when decide new decision for configuration of application server parameters when similar condition is occurred. Cased-based reasoning can do the process. Best approach will be used is self-adaptive with case-based reasoning. This research implements the approach on an experiment application that deployed on glassfish application server. The results show that self-adaptive with case-based reasoning can improve application server performance with significant improvement.
SISTEM PENDUKIUNG KEPUTUSAN PADA SISTEM SELEKSI PENERIMAAN GURU MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING
Nurjaya Nurjaya;
Maulana Ardhiansyah;
Rezki Suryana
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2180.774 KB)
|
DOI: 10.33322/kilat.v7i2.356
Teacher is an important element in the support system, therefore function and position of teachers in improving the quality of learners need to be considered seriously. Basically, teachers are professionals in the field of education that has the task of teaching, educating, and guiding students to become a man is impersonal. Thus, teachers have an important position and responsibilities of a very great deal in the success or failure of educational programs. In order to facilitate the selection process for the teachers, the school can use the Decision Support System Decision Support System that is used as a tool for decision makers to expand the capabilities of the decision makers, but not to replace the judgment of the decision makers. The method used is the Simple Additive weighting, Simple Additive Weighting (SAW) suitable for decision-making process because it can determine the weight values for each attribute, followed by indexing process that will select the best alternative from a number of the best alternative. It can be concluded from this study that the SAW method is very relevant to solve the problem of decision makers.
PERANCANGAN SISTEM KEAMANAN RUMAH BERBASIS IoT DENGAN NodeMCU ESP8266 MENGGUNAKAN SENSOR PIR HC-SR501 DAN SENSOR SMOKE DETECTOR
M. Reza Hidayat;
Christiono Christiono;
Budi Septiana Sapudin
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2616.439 KB)
|
DOI: 10.33322/kilat.v7i2.357
Along with the development of science and technology, problems often occur that threaten security at home. These problems originate from a level of security that does not meet security standards at home. Various problems that can threaten home security conditions are fire hazards that can be caused by neglect of home temperature regulation and electrochemical equipment that is uncontrolled by the homeowner or thief danger that can easily enter the house. The design of the home security system prototype is programmed and controlled by the NodeMCU ESP-8266 to transmit all data from sensor readings to the interface on the Cayenne dashboard. PIR sensor (HC-SR501) has a digital output, if the sensor detects a movement, the NodeMCU ESP-8266 will give a logical value of one. Gas sensor concentration (MQ-02) in testing has an average difference of 2.79 ppm (part per million). The reading results of all sensors will be measured through the Internet of Things interface displayed on the Cayenne dashboard, the simulated gas concentration with gas matches with the difference results, test results and analysis results of 2.79 ppm (part per million) and if the gas sensor (MQ -02) Exceeds the specified parameters, the buzzer will sound. PIR sensor testing (HC-SR501) will work optimally by human movement if at an angle of 45˚ because the success rate is 100% in ten experiments and in the 90˚ angle the success rate is 80%.
DESAIN SISTEM KONTROL PENGGERAK MULA GENERATOR MAGNET PERMANEN PLTMH MENGGUNAKAN PLANETERY GEAR
Rizki Pratama Putra;
Samsurizal Samsurizal;
Novi Gusti Pahiyanti
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (3590.54 KB)
|
DOI: 10.33322/kilat.v7i2.358
Voltage and frequency stability of a micro hydro power plant requires a simple, reliable and efficient control system. This study aims to design a control system using planetary gear which is known to provide fast speed adjustments to respond to the changing rate of water flow. In this study the system design will be created using matlab simulink. The system will then be simulated with various turbine rotation conditions to see the reliability and stability of the frequency and voltage produced by the permanent magnet generator used in micro hydro power plant. The results obtained are the control system seems can stabilize the generator rotor rotation so that the resulting voltage frequency remains constant even though the input load and water flow rate are dynamic. From the simulation results it is also found that the efficiency of the control system is directly proportional to the difference in mechanical input and electric power output of the system.
RANCANG BANGUN SISTEM PEMESANAN CATERING DAN DEKORASI DI SUMBAWA BESAR BERBASIS ANDROID
Rodianto Rodianto;
Arni Safitri
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2116.464 KB)
|
DOI: 10.33322/kilat.v7i2.359
The catering and decorating process in Sumbawa is still conventional. So that the service procedure which applied for now are still less effective and efficient. This process incude to the owners of catering and decoration that could does a mistake, among others, the double order, the order making was not in order due to the accumulation of order notes, especially when crowded customers ordered by telephone or short message which could occur human error such as forgetting the order customer, and pen or order paper that runs out. The software is built by using the programming languages PHP, MySQL, Java and Android Studio. The purpose of making this ordering system is to help the owner of catering nusiness and decoration in Sumbawa besar to improving the quality of their business in the eyes of customers. This ordering system has a service that makes customers know the that location of the place of residence of the business owner as to minimize the occurrence of customer concers for message that are not served. The method used is a method of data collection and software development. The software development process model is used in the waterfall model which consist (1) analysis, (2) design, (3) coding, (4) program testing, (5) maintance.
PENERAPAN TEKNOLOGI CACHE SERVER BERBASIS IoT DENGAN RASPBERRY Pi3 MENGGUNAKAN METODE FORWARD CHAINNING
Subandri Subandri;
Sabar Hanadwiputra
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2026.105 KB)
|
DOI: 10.33322/kilat.v7i2.360
With the rapid technological development, the growing number of Internet clients over time, the internet access response is slow and it takes filtering of a few websites that can harm users. For that required cache proxy server to speed up internet access time and website filtering. The use of proxy servers usually still use the standard configuration on the proxy server. This configuration can be set or modified (tuning) in such a way as to create a proxy server that is reliable and have better performance. The play on the proxy server is done by changing some parameters that are inside the proxy server application and adapted to the needs of usage on the internet network. The application used to create this proxy server is squid that runs on raspberry pi3 with a rasbian operating system. Squid applications are mostly used in local and internet networks for storing web cache, blocking multiple websites, managing bandwidth up to access restrictions.
ANALISIS WIRELESS POWER TRANSMISSION SYSTEM DALAM ASPEK REGULASI MENGGUNAKAN METODE BENCHMARK
Samsurizal Samsurizal
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2956.206 KB)
|
DOI: 10.33322/kilat.v7i2.361
Wireless technology has developed very rapidly both in terms of providing infrastructure and supporting technology that is on the side of the mobile computing device that has been widely used by people. Charging the battery is one of the primary needs of modern society. To support community activities that the higher the level of mobility, power bank is a solution. However, the ability of power banks are still limited in terms of charging. Thus, the wireless charging technology, or better known as the Wireless Power Transmission (WPT). Wireless Power Transmission is a technology that allows electrical energy from the power source to an electrical load is transmitted without any interconnection. Wireless Power Transmission especially useful for devices connected to the cable dangerous. This is new technology but the market has seen demand increase significantly. Various types of applications, that the technology Wireless Power Transmission (WPT) is applied, the expected and the study of the current WPT is underway. Also, ongoing standardization activities in several standardization organizations.as well as the issuance of Wireless Power Transmission Regulations in some countries so expect the harmonization of rules / law in the implementation of Wireless Power Transmission in everyday life, Clarity and certainty of legal framework for the implementation of the regulatory function of the business operations of Wireless Power Transmission.