cover
Contact Name
Urfan Taghiyev
Contact Email
u.taghiyev@newinera.com
Phone
-
Journal Mail Official
u.taghiyev@newinera.com
Editorial Address
Jl. Borong Raya Baru I, Makassar, South Sulawesi, Postal Code: 90233. Indonesia
Location
Unknown,
Unknown
INDONESIA
Journal La Multiapp
Published by Newinera Publisher
ISSN : 27163865     EISSN : 27211290     DOI : https://doi.org/10.37899/journallamultiapp
Core Subject : Engineering,
International Journal La Multiapp peer reviewed, open access Academic and Research Journal which publishes Original Research Articles and Review Article, editorial comments etc in all fields of Engineering, Technology, Applied Sciences including Engineering, Technology, Computer Sciences, Architect, Applied Biology, Applied Chemistry, Applied Physics, Material Engineering, Civil Engineering, Military and Defense Studies, Photography, Cryptography, Electrical Engineering, Electronics, Environment Engineering, Computer Engineering, Software Engineering, Electromechanical Engineering, Transport Engineering, Mining Engineering, Telecommunication Engineering, Aerospace Engineering, Food Science, Geography, Oil & Petroleum Engineering, Biotechnology, Agricultural Engineering, Food Engineering, Material Science, Earth Science, Geophysics, Meteorology, Geology, Health and Sports Sciences, Industrial Engineering, Information and Technology, Social Shaping of Technology, Journalism, Art Study, Artificial Intelligence, and other Applied Sciences.
Articles 274 Documents
TOGAF's Approach in Developing an Enterprise Architecture for the Information Technology Security Industry Hidayat, Rachmad Syarul; Indrajit , Richardus Eko; Dazki, Erick
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1524

Abstract

The information technology security industry, encompassing various activities such as risk identification and assessment, policy development, and solution implementation, plays a crucial role in maintaining the integrity and security of information systems. This study aims to develop and implement an efficient and effective enterprise architecture within the information security sector, focusing on three key core processes identified as the major revenue contributors: risk identification and assessment, security policy development, and security solution implementation. Utilizing the TOGAF-based Enterprise Architecture framework, this research identifies and designs architecture that integrates various systems, applications, and business processes, facilitating better alignment within the organization. The architecture design process involves a thorough analysis of operational needs and business strategies, leading to the development of a model that enhances efficiency and reduces the risk of failure in technology implementation. The outcomes of this study are intended to provide practical guidance for information security companies to optimize operations, simplify system complexities, and achieve strategic goals more effectively. It is anticipated that the application of the designed architecture will have a significant positive impact on the company's ability to address challenges and dynamic needs within the information security industry.
Arduino Based Automatic Door Lock Design Using Personal Identification Number Pin Anton, Anton; Mujiyono, Sri
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1534

Abstract

Current developments require more innovation in everyday life, one of which is home or office door security. Initially, home or office door security was only with ordinary padlocks or door keys found in most houses in Indonesia which had shortcomings in terms of security and effectiveness. In the current era of digitalization, almost every line of human activity is no exception, technology is currently continuously developing more rapidly. This can be observed through the many sophisticated equipment that utilizes technology so that the work system can run automatically. Of course, this makes it much easier for someone to carry out their activities and the work they do is also more efficient. This research aims to design a door lock system that is able to increase security, effectiveness and comfort in accessing rooms, both home and office. This system utilizes an Arduino microcontroller as the brain of the system, a keypad as input for entering the PIN code. Users are allowed to open the door simply by entering a predetermined PIN code. The main advantage of this system is its ease of use and a better level of security compared to conventional door locks. The results of this research are a pin-based door lock system using Arduino and keypad. This system uses the Arduino IDE development application for writing program code and Proteus for work simulation.
Improving Industrial Quality Control by Machine Learning Techniques Alzaidi, Esraa Raheem
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1537

Abstract

In light of the development of computing systems and machine learning techniques, the development of industrial control processes in production processes has become easier, more accurate, and more flexible. Machine learning techniques, after being integrated with industrial control processes, have become one of the most important tools that achieve sustainability in the field of industry. Thus, economic sustainability is achieved. Through it, production systems can be improved, costs reduced, energy consumption reduced, quality increased, and future malfunctions predicted. Thus, reducing the cost of repair and maintenance. The study aims to clarify the importance of machine learning techniques in industrial control processes, and that integrating machine learning techniques with industrial control techniques contributes to achieving sustainability in the field of industry. The study also aims to identify the obstacles and challenges facing the field of machine learning techniques in the industrial control process and how to solve them. Through a combination of description, analysis, comparison and simulation methodologies, the results indicated that 10% to 20% of the total cost was saved, 1% to 10% of the energy consumed was saved, and the response was improved by a rate ranging between 10% and 20%. The results also indicated to improve system flexibility using machine learning techniques, increase product quality, and reduce operation time. The use of machine learning techniques to improve the proposed model led to an improvement in reducing the cost by 10%, improving energy consumption by 1%, and improving the response by 1%.
Impact of Feature Extraction on Multi-Aspect Sentiment Classification for Livin'byMandiri Using BiLSTM Atikah, Balqis Sayyidahtul; Sibaroni, Yuliant; Puspandari, Diyas
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1541

Abstract

Mobile applications are currently experiencing very rapid development including applications in the financial sector. Livin'byMandiri is one of the mobile applications used to transact online without the need to go to the bank. This makes it very easy for customers to transact anywhere and anytime. Application reviews are user reviews that reflect the reputation of the application among the community, these application reviews can be found anywhere, so many companies use application reviews as a reference in developing their applications in the future. However, people's opinions on apps can vary and are influenced by many aspects. Therefore, aspect-based sentiment analysis can be applied to app reviews to get better results. This research focuses on analyzing the sentiment of Livin'byMandiri app reviews on the Google Play Store. In this research, the Bidirectional LSTM (Bi-LSTM) method is combined with TF-IDF and Word2Vec feature extraction. From the results of the experiments that have been carried out, the best accuracy results for the access aspect are 81.18% and F1-Score of 81.03%, the service aspect produces an accuracy of 82.82% and F1-Score of 82.74%, and for the convenience aspect produces an accuracy of 77.28% and F1-Score of 77.19%. In this experiment, it is also found that feature extraction has an effect on sentiment analysis, this is evidenced by an increase in accuracy of more than 1% for each aspect when TF-IDF feature extraction is added and also the combination of TF-IDF and Word2vec in the initial model built using only the Neural Network embedding layer.
Comparative Analysis of Green Building Hospitals in Karawang and Pemalang Pontan, Darmawan; Irawan, Angga Ananda; Fawwaz, Arvyant Arrazaqi; Abidin, Dikky Safitra; Hevada T, Laska; Sumeru, Indrawati
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1561

Abstract

This study aims to analyze and compare the application of the green building concept in two hospitals in Indonesia, namely Permata Keluarga Karawang Hospital and Dr. M. Ashari Pemalang Regional General Hospital (RSUD). Using descriptive qualitative methods and case study approaches, data were collected through observation, interviews, documentation, and measurements in the field. The results show that both hospitals have applied green building principles in various aspects such as energy efficiency, environmental management, and B3 waste management. Permata Keluarga Karawang Hospital excels in the use of energy-saving technology and waste management, while Dr. M. Ashari Pemalang Hospital stands out in staff involvement and environmental management. However, there are still several aspects that need to be improved by both hospitals, such as bicycle parking facilities and rainwater intake systems, to achieve more optimal green building standards. In conclusion, both hospitals have shown a strong commitment to environmental sustainability through the implementation of the green building concept, but further improvements are still needed to achieve more optimal results.
Maintenance Tasks for 20 Kv Medium-Voltage Switchgear Based on Technical Judgment Experience and Manufacturer Soetadji, Prabowo; Sutikno , Tole; Fadlil , Abdul
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1578

Abstract

A 20 kV medium-voltage switchgear is an important equipment in the electricity system that distributes electricity generated by the 20 kV electric power generator to electricity users. Calor Emag, Merlin Gerin, Alsthom, Fuji, AEG, Schneider, Meidensha, Goldstar, Modalek, Areva, and Siemens are among the companies that make products. This study describes a method for maintaining 20 kV medium-voltage switchgear, an essential equipment in the electricity system. In less technical terms, the failure rate is high at the beginning of an asset's life, which follows the curve of the bathtub. However, the failure rate quickly declines as we identify and discard defective components and eliminate early sources of potential failures, such as installation errors. This study introduces a novel approach by examining the relationship between maintenance tasks, which are based on technical judgment and experiences, and the maintenance tasks provided by the manufacturer for 20 kV medium voltage switchgear. The goal is to develop and deliver the most effective maintenance method for 20 kV medium voltage switchgear, to prevent malfunctions or even catastrophic explosions, while maintaining the lowest possible maintenance costs. Total use of labor over 2 years (24 months) for daily, monthly, 3 monthly, and 2 yearly is 3554-man hours (MH). It provides a comprehensive approach to preventing malfunctions and explosions, resulting in optimal maintenance costs and performance.
Analysis of Excavation Methods Against Deformation in Highway Tunnels Aryanti, Dian Eka; Saptono, Singgih
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1579

Abstract

Cisumdawu tunnel is a highway tunnelling which composed of very weak rock mass conditions has an average compressive strength less than 1 MPa. It is located below groundwater level. The shape of tunnell is horseshoe, diameter of tunnel section 14,413 m and height 11,083 m. Cisumdawu tunnel is a shallow tunnel which has a maximum overburden of 52,8 m and minimum overburden approximately 14 m. In the case of shallow tunnel which has a large section could be lead an instability during tunnel construction. Tunnel deformation analysis is using an observation and numerical modelling approach with finite element method which is assisted by RS 2019 (Rocscience) software. Based on the research is obtained that excavation method greatly affects the level of deformation that occurs during tunnel construction. As tunnelling advanced, Vertical displacement in the longitudinal direction using three bench seven step excavation method is smaller than full face and bench excavtion method. The maximum displacement using three bench excavation method is -4.23 mm, the full face method is -5.51 mm and the bench method is -4.91 mm. The amount of displacement is affected by the length of excavation and stage in tunnelling. The rate of deformation is increasing as the length of excavation getting deeper, but this is applied in unsupported tunnel.
Application of a Question Answering System in the Ontology-Based Health Domain and Question Templates to Improve the Quality of Answers Yudhono, Efwandha; Shaufiah, Shaufiah; Sardi, Indra Lukmana
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1600

Abstract

Developing an effective Question Answering System (QAS) to address a wide range of health-related inquiries presents a significant challenge. This study introduces an innovative approach using an ontology-based QAS within the health domain, leveraging the Resource Description Framework (RDF) and SPARQL query language. By utilizing ontology, the system can more accurately map health concepts, improving the relevance and precision of its responses. Additionally, the incorporation of structured Question Templates enhances the system’s ability to understand and respond to diverse user queries. The system's performance was evaluated using Black Box Testing, which demonstrated that it consistently provides accurate and relevant answers. The system achieved a Mean Average Precision (MAP) of 79.6%, indicating its potential to effectively address a broad spectrum of health issues.
Analysis of Determining Order Quantity of Spare Parts in Oil and Gas Well Service Activities Using Monte Carlo Simulation Tikupadang, Lakun; Rusdiansyah, Ahmad
Journal La Multiapp Vol. 5 No. 3 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i3.1380

Abstract

This research aims to explore the analysis of determining the order quantity of spare parts in well service activities in the oil and gas (Migas) industry using the Monte Carlo simulation approach. The Migas industry requires efficient inventory management to maintain operational smoothness, but this need must be balanced with efforts to minimize excessive storage costs. Therefore, it is important to determine the optimal order quantity to meet operational needs while avoiding unnecessary inventory accumulation. The Monte Carlo simulation method was chosen because of its ability to address uncertainty in inventory analysis, allowing for modeling variations in demand, delivery lead times, and other factors affecting inventory management. It is expected that this approach will provide a better understanding of how decisions regarding the order quantity can be made more effectively in the context of well service activities in the Migas industry. The main expectation of this research is the development of a model that can assist Migas companies in optimizing the management of their spare parts inventory. Thus, it is hoped that this research will make a significant contribution to improving operational efficiency, reducing storage costs, and increasing customer service levels in the Migas industry. It is also hoped that the results of this research will pave the way for the development of inventory management strategies that are more adaptive and responsive to dynamic business environments.
Identification of Tampering in Arabic Text Documents Using Zero-Watermarking Algorithm Mohammed Abdulmaged, Shahbaa
Journal La Multiapp Vol. 5 No. 5 (2024): Journal La Multiapp
Publisher : Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journallamultiapp.v5i5.1490

Abstract

The internet makes sharing information easy, but protecting copyrights and verifying the authentication of online text remains a challenge. Current methods for securing Arabic text are limited. This research introduces a new tool: a zero watermark algorithm designed specifically for Arabic text. This new algorithm protects Arabic text by analyzing its content. It creates a watermark based on a chosen keyword (at least 6 characters, no duplicates), and how often each character appears in different forms (separate, connected), and positions (beginning, middle, and end) within the text. The proposed method was tested on nine different Arabic text samples of varying size, simulating various tampering attempts like inserting, deleting, and rephrasing text. The results are impressive, showing that the algorithm outperforms existing methods in detecting even minor changes.