cover
Contact Name
Muhammad Yusuf
Contact Email
snast@gmail.com
Phone
+6282282677899
Journal Mail Official
snast@akprind.ac.id
Editorial Address
Institut Sains & Teknologi AKPRIND Jl. Kalisahak 28 Kompleks Balapan Yogyakarta 55222
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Prosiding SNAST
ISSN : 1979911X     EISSN : -     DOI : -
SNAST merupakan seminar nasional rutin yang diselenggarakan oleh IST AKPRIND Yogyakarta, sejak tahun 2008 dan diselenggarakan setiap 2 tahun sekali
Articles 200 Documents
PEMETAAN DAMPAK KERUSAKAN AKIBAT GEMPA BERDASARKAN MIKROTREMOR SEBAGAI USULAN PENATAAN WILAYAH KOTA Nur Ayu Diana Citra Dewi S.P; Didik Purwanto
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The territory of Indonesia has long been known as a region with high seismic activity. This is due to the location of Indonesia which lies at the meeting of four major tectonic plates, namely the Euresia, Indo-Australian, Pacific and Philipine plates. The meeting of the plates resulted in tectonic mechanisms and the geological conditions of Indonesia becoming more complicated. Indonesia also has an island-arc structure with unique physiographic characteristics such as deep ocean trenches, geanticline belts, volcanic inner arcs, and marginal basins.Based on these conditions, it is necessary to analyze the earthquake zonation of Indonesia in the form of maximum acceleration of bedrock for the design of earthquake resistant seismic building with a certain risk. Assessment of vulnerable zones or the risk of earthquake damage in residential areas in Jember urban centers should be done carefully and systematically, in order to estimate the vulnerable building zones of damage can be known and studied.The results of this study, in the form of data processing from mikrotremor then made zonation map vulnerable damage during the earthquake. This map contains a zone that can be used as a place to develop settlements and zones that can not be developed according to the type of land and as a proposal to the municipality as a future arrangement of the area. In the study area has a low average VS value, which is about 50-300 m / s. It identifies that the subsurface layer in the study area is dominated by an alluvium sediment layer. This shows that some areas in Jember have soft soil conditions. Sub surface geological characteristics that cause damage to buildings where areas prone to damage to the northern part of the Research Area with low Vs and fo values is a soft soil type with large building damage occurring.
KESETIMBANGAN ADSORPSI ION LOGAM CHROM VI OLEH ZEOLIT PADA BERBAGAI UKURAN PARTIKEL Syarifah Aini; Supratikno _
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The waste of heavy metal such as chrom metal ion needs further process by certain technics. One of them is adsorbent one by applying the equilbrium principle of adsorption. Zeolite is the suitable adsorbent to use to absorb the metal ion of chrom. The purpose of the study is to determine the suitable model for equilbrium adsorption of metal ion of chrom VI by zeolite together with its parameter values and to know the maximum power absorbtion of zeolite toward metal ion of chrom VI. The production of the solution of metal ion of chrom VI in various concentration such as concentration of 10 ppm, 30 ppm, 50 ppm, and 70 ppm. Each of the solution is added by 40 gram of zeolit and stirred for 30 minutes then filtered and the filtrat is analyzed by spectrophotometer. The experiment is conducted by the various particle size of zeolite such as 50 mesh, 100 mesh, and 170 mesh. The study uses the method of application model of isoterm adsorption equilbrium that covers 5 equations that is Linier Adsorption (Henry’s Law), Isotherm Adsorption of Freundlich, Isotherm Adsorption of Langmuir, Isotherm of Brunauer-Emmett-Teller (BET), the Equation of Sigmoidal Chapman. From these five models then data fitting is conducted to find the model that closer to the data. Data matching is conducted by minimizing that is run by Matlab program. The result of study shows that the suitable and closer model is the model of Isotherm adsorbtion of Freundlich in its equilbrium constant 0,0018 l/g. The maximum concentration of metal ion of chrom VI absorbed by zeolite is 5,6402 mg/g to the 170 mesh of particle size. The study can be concluded that the smaller size of particle of adsorbent the bigger material concentration absorbed.
THE CRITICAL SUCCESS FACTORS MODEL FOR IMPLEMENTATION OF ENTERPRISE ARCHITECTURE IN PDAM TIRTA RAHARJA Editha Dewi Purnama Sari
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Implementation of Enterprise Architecture (EA) is define as a way that can help align and retain business-Information Technology (IT) to acquire economic, technological, and strategic advantage. In regard on current technology advances, businesses in organizations are required to be more rapidly adapted. Therefore, implementation of EA becomes the right choice. However, it is not easy to achieve goals in EA implementation because it is inflexible and complexity of the business an IT structure in the organization, so that the implementation of EA in the organization fails. There is a critical success factor (CSF) taken as a reference that the successful implementation of EA. Specifiacally, these factors are Communication and Support, EA Model, Business Driven Approach, Organizational Culture, Training/Education, Governance, and Stakeholder Participant. Each of these factors has the potential to support the successful implementation of EA. This study aims to examine the relationship and influence of critical success factors on the Successful Implementation of EA. This research uses quantitative research method involving PDAM Tirta Raharja, IS Student, and general public with survey data of 12 articles (journals and conference papers), online questionnaire filled by 40 respondents and data analysis using SPSS 23 software with Multiple Regression Test. The result of this research is CFS Model for EA implementation, there are 4 CSF which have significant influence that is Communication and Support, Business Based Approach, Stakeholder and Organizational Culture. Finally, it provides critical success factors (CSFs) to achieve successful EA implementation and to benefit companies.
KENDALI LAJU TETESAN INFUS DENGAN MENGGUNAKAN KONTROL PID Liya Yuni Astutik; Diki Mardiantoro; Binti Khoirun Na’im; Sulfan Bagus Setyawan; Hanum Arrosida
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Now in health technology benefitable by intravenous therapy (IV) to used replace liquid and can balancing electrolyte in body. But in now using intravenous therapy (IV) uncontrol and unmonitoring can make people was flebitis (blood artery infection caused by chemical and drug irritation.In that condition then we proposed a intravenous therapy drop rate control based on PID. In that reseach will be expended in four work process. In first process is readability intravenous therapy drop who will do by photodiode sensors, in second process is to control automatic intravenous therapy drop rate used with PID controller who will do by Motor Servo when get instruction from smartphone, in third process is readability blockage Intravenous therapy liquid or doesn’t based on there are or no drip intravenous therapy and the fourth process is early warning system for Intravenous therapy liquid as one way to anticipation for Intravenous therapy liquid wear out on patient. Based on experiment shown that control automatic intravenous therapy drop rate had a good result. Getting it being showed of setting time value that can be reached is 16 second And error steady state value is 13 drips
PERANCANGAN SISTEM DOORLOCK MENGGUNAKAN RFID DAN ANDROID BERBASIS ARDUINO NANO Gatot Santoso; Slamet Hani
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The more modern the technology turns out to be followed by the higher criminals in an area. The crime rate in Indonesia has increased from year to year. The types of crime found are also increasing, for example the rate of theft from year to year continues to increase. Therefore, the technology needed to avoid the theft, such as theft at home then use the automatic door locks.The use of RFID technology (Radio Frequency Identification) to automate the system of open-door muscle. With the solution then it is possible made a software using Arduino Nano program. Arduino Nano program is applied to create a security system that can work automatically, which can open the door by automatically using Android and RFID as inputs and also as a control. In the operation of this automatic door, not only rely on controls that use the backup system, but on the side of the control using servo and selenoid motors. So it will produce motor servo motion output becomes smooth.From the measurement of the input components, it can be seen in the standby RFID voltage condition of 3.3 V. While for the servo motor of 10.87 V and bluetooth of 3.3V - 5 V. The distance obtained from RFID measurements based on the tags made on RFID is 5 cm - 10 cm. As for bluetooth also based on the maximum distance bluetooth with android is 1 m - 12 m. The output of the buzzer will be active when the applied voltage is between 3.3 V - 5 V, if the voltage is less or exceeded then the buzzer does not work.
IMPLEMENTASI METODE DISCRETE WAVELET TRANSFORM (DWT) DALAM SISTEM IDENTIFIKASI TELAPAK KAKI MANUSIA DENGAN KLASIFIKASI SUPPORT VECTOR MACHINE (SVM) Adinda Maulida; Rita Magdalena; Yunendah Nur Fu’adah
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tvelhe deopment of information and technology have a good impact in modern life. One of them is the introduction of individuals created automatically to facilitate the search for information related to identity. In order not to difficult identification of individuals properly, used methods of recognizing physical characteristics to identify individuals or commonly known as biometrics. Many physical features can be used, such as fingerprints, nasal bones, teeth, and so on as long as they are still members of the body. One is the sole of the foot. Discrete Wavelet Transform (DWT) is a computation method that can be used to support digital identification system. In this study the steps to obtain the parameters required to achieve optimal accuracy include the acquisition of footprint image data, pre-processing, DWT feature extraction to the classification process using the Support Vector Machine (SVM). The process of classification and class determination using SVM algorithm by changing kernel parameters in each test. The highest accuracy of the system used in this final project is the SVM OAO of 72% with the fastest computation time of 66.72 seconds so that the algorithm can be said optimally in the system..
RANCANG BANGUN SISTEM PEMANTAUAN DAN PENGENDALIAN BEBAN LISTRIK BERBASIS INTERNET OF THINGS (IoT) Erwan Eko Prasetiyo; Farid Ma’ruf
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the human needs today is electricity. Almost all human activities everyday can not be separated from the use of electricity. However, the basic electricity tariff is now increasing. Efforts to save electricity are needed to reduce waste of electricity costs. One way to save electricity proposed in this research is load monitoring and control system based Internet of Things (IoT). This research aims to design, implement and know the performance of monitoring system and load control based on Internet of Things (IoT). Tools used in the design of this system include: NodeMCU Microcontroller ESP8266, Relay Driver, LED indicator, Current sensor. Research stages include literature study, problem and goal formulation, data collection, media design, implementation, result analysis, conclusion and report writing. Analysis of the results of research conducted by performing system performance test functionality of each part and performance test system as a whole. The results showed that the design of monitoring system and load control based on Internet of Things (IoT) is divided into 3 (three) main parts namely input, process and output. The input section consists of ACS712 current sensors as an electric load current detector. The process part consists of an integrated microcontroller in the NodeMCU ESP8266 device. The output section consists of 4-channel relays as circuit breakers and electrical load connectors. Implementation of the system is designed in two parts, namely hardware and software. Hardware consists of nodeMCU 12E microcontroller and ACS712 sensor while the software consists of Arduino IDE as its compiler and Cayenne as Internet of Thigs (IoT) service. System performance with 4 load points can work well according to plan. Power monitoring and control system can be done through computer or smartphone device. All sensors and displays can function properly but the speed still depends on the speed of internet connection.
PEMANFAATAN REAL TIME DATABASE UNTUK APLIKASI BERBASIS LOKASI Erna Kumalasari Nurnawati; Rochmad Suseno; Muhammad Sholihul Masnuh; Renna Yanwastika Ariyana
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Database design plays a very important role in the success and strength of an application. Factor normalization of design, non-duplication and optimization of memory usage become the main factor in assessment of a database. Research on location-based applications applied to mobile device system has been done by using object-based database and relational database, but the use of real time database has not been done. This study aims to build a real time database based (real time database) that will be applied to location-based applications. The method that will be used in this research is to design a database using Unified Modified Language (UML) by creating a Use Case, Class Diagram to explain the structure and activities of users and using Firebase to build a real time database and create an activity scenario for all actors involved. This research also builds a prototype of location-based applications for delivery and pick-up of goods within the scope of the Yogyakarta location. Location data is taken from Google Maps and uses several libraries from the Application Programming Interface (API). Testing of the database design is carried out with prototypes in the form of applications for delivery and pick-up of goods, where the inter location and pick-up is valid in real time on the officers. Database updates can be done in real time.
METODE LVQ BERBASIS PARAMETER HSV UNTUK PENENTUAN UANG RUPIAH PALSU I Gusti Ayu Agung Diatri Indradewi; Made Suci Ariantini
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The government has socialized the 3D method (Visible, Feeling, and Diterawang) to prevent people from accidentally transacting using counterfeit money. In addition to this method, counterfeit money scanners that use ultraviolet light are also commonly used. However, the use of methods or scanners must be accompanied by a human eye to determine whether the money is genuine or false. Along with the development of technology, the technique of making counterfeit money will also develop so that supporting techniques are needed that can be used to help identify counterfeit money automatically. In this study, the data used is only original and fake banknotes with a nominal value of Rp. 100,000.00. Image acquisition is done with the help of a digital camera and a light source from ultraviolet lights. Pre-processing in the form of pruning on the image of banknotes produces an image measuring 210 × 64 pixels. The feature extraction stage is done by changing the RGB image value to the HSV color space. The HSV value of the image is then used as an input vector on the LVQ network to determine the authenticity of the banknote image. The method test used for 100 real money images and 80 fake images yields the best performance when the learning level α (0) = 0,1 in epoch = 4 with an MSE value of 0,088889. Classification with the best accuracy occurs when the rate of learning α (0) = 0,1 in epoch = 1 with the level of truth classification is 87,2%.
ANALISIS DAN IMPLEMENTASI SISTEM KEAMANAN JARINGAN KOMPUTER DENGAN METODE INTRUSION DETECTION SYSTEM (STUDI KASUS: HORISON ULTIMA RISS HOTEL) Catur Iswahyudi; Agradira Dwi Wahyuda; Erfanti Fatkhiyah
PROSIDING SNAST Prosiding SNAST 2018
Publisher : IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ultima Riss Horizon Hotel has applications and documents requiring network connections to be accessed online by both hotel staff and visitors. For security reasons, Ultima Riss Horizon Hotel requires a system to secure transaction data and other documents. The threat encountered is an intruder trying to take control of the server using root access to the company's central database server. One solution to this problem is to apply the Intrusion Detection System (IDS) method to maintain system security that can detect and reduce the risk of computer network security intrusions from intruders. This study aims to improve network security at Horison Ultima Riss Hotel by creating a monitoring system that can provide information in case of an attack on the network system. The method used is IDS approach using Snort, firewall, and other applications. Furthermore, an analysis of the reports generated by IDS Snort and the firewall as a precaution prior to the attack. The test results show that the firewall and IDS Snort capable of recording activities suspected of being a threat of disruption to the network and analyze the packets based on existing rules to recognize the existence of an attack attempt from the intruder.

Page 6 of 20 | Total Record : 200