Journal of Informatics, Electrical and Electronics Engineering
Fokus kajian Journal of Informatics, Electrical and Electronics Engineering, yaitu: 1. Control System, 2. Artificial Intelligence, 3. Informatics Engineering, 4. Electronics, 5. Advanced energy material, 6. Automatic power control, 7. Battery technology, 8. Distributed generation, 9. Distribution system, 10. Electric power generation, 11. Electric vehicle, 12. Electrical machine, 13. Energy optimization, 14. Energy conversion, 15. Energy efficiency, 16. Energy exploitation, 17. Energy exploration, 18. Energy management, 19. Energy mitigation, 20. Energy storage, 21. Energy system, 22. Fault diagnostics, 23. Green energy, 24. Green technology, 25. High voltage, 26. Insulation technology, 27. Intelligent power optimization, 28. Monitoring operation, 29. Motor drives, 30. Natural energy source, 31. Power control, 32. Power data transaction, 33. Power economic, 34. Power electronics, 35. Power engineering, 36. Power generation, 37. Power optimization, 38. Power quality, 39. Power system analysis, 40. Power system information, 41. Power system optimization, 42. Protection system, 43. Renewable energy, 44. SCADA, 45. Security operation, 46. Smart grid, 47. Stability system, 48. Storage system, and 49. Transmission system
Articles
72 Documents
Sistem Pendukung Keputusan Perangkingan Dalam Pengajuan Mesin EDC Dengan Metode Oreste
Doni Almahera
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 4 (2022): Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The BCA Merchant analyst team found difficulties in determining the decision to submit the best prospective Merchant because it was still manual. Sometimes it resulted in decisions that were not right on target when they were given but the EDC machine was not used by the business owner because the business location was not strategic and quiet, as a result Bank BCA suffered losses due to spend cost or machine maintenance costs every month. To overcome this problem, decision making for the submission of BCA EDC machines using the ORESTE method is applied so that the problem has been resolved. Ranking in the Oreste Method in this study takes the highest value based on data calculated from predetermined variables and criteria. The end of the calculation based on the Oreste method will give the highest to lowest preference value, the highest result is the best value from the calculation process carried out in the application for the EDC machine and the proper and unworthy merchants are found in its teaching.
Implementasi Algoritma Learning Vector Quantization Untuk Pengenalan Barcode Barang
Junita Gea
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 1 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Problems in barcode recognition during the barcode identification process. Where when the barcode has noise (damage) then the barcode becomes difficult to recognize. Learning Vector Quantization (LVQ) is a classification method in which each output unit presents a class. LVQ is used for grouping and is also one of the artificial neural networks which is a competitive learning algorithm supervised version of the Kohonen Self-Organizing Map (SOM) algorithm. The purpose of this algorithm is to approach the distribution of vector classes in order to minimize errors in classifying. LVQ learning models are trained significantly to be faster than other algorithms such as the Back Propagation Neural Network. This can summarize or reduce large datasets for a small number of vectors. Based on the results of barcode recognition testing using LVQ algorithm success with training data as much as 4 and conducted calrifikas trial of two data namely: {1,1,1,0} and {1,0,1,1}. Obtained accuracy value generated as much as 90% barcode recognized. The more training data used, LVQ will have a more complete knowledge.
Implementasi Metode High Pass Filtering Dan Metode Contras Streching Dalam Perbaikan Kualitas Citra
Elprina Simarmata
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 2 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Digital image is an image that can be defined as a function of f (x, y) which has discrete spatial coordinates and brightness levels. However, not all digital images have a visual appearance that satisfies the human eye. Image enhancement is one of the initial processes in image processing (image preprocessing). One of the methods used is contrast stretching and edge sharpening. This Contrast Stretching method can be used to improve the quality of digital images related to lighting, namely by adjusting the brightness and contrast of a digital image, while the High Pass Filtering method is used to clarify the edges of the object.
Perancangan Aplikasi Duplicate PDF Scanner Menerapkan Algoritma MD2
Felisiana Apustriani Gulo
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 2 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
We are now in the era of the digital world. Many industries have switched to digital technology such as photos, videos, music, and so on. Of course, this change brings many benefits for us in terms of speed and data access. The ease of accessing the internet also has a major impact on human life. The ease of accessing documents online is very helpful if you want to find and download pdf documents online. With this convenience, many of the same pdf files are downloaded more than once. This will definitely burden the storage space. To distinguish one pdf file from another, it is done by viewing and reading the contents of the pdf file. This is very inconvenient and time consuming. To overcome this, we need a practical way that can be used to search for the same pdf document so that it can delete duplicate pdf files. One way that can be used to overcome this problem is to use a hash function, one of the hash functions in cryptography is the MD 2 algorithm or Message Digest 2. By using the hash function, the identity of the pdf file can be generated. If the pdf files are the same it will produce the same hash value as well. This will make it easier to group the same pdf documents so that it will speed up the process of deleting the same pdf files. With the pdf file scanner application, pdf files will be searched for all folders and will group pdf files based on the same hash value. So that it will be easier for users to delete the same pdf file.
Implementasi Teknik Steganografi Menggunakan Algoritma Cardan Grille
Sartika Lumbangaol
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 2 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Data security and confidentiality is an activity that aims to secure data, especially data that is confidential and important. If there is a break-in and theft of information of an important data in a file, it will be detrimental to the parties concerned. Therefore it takes Steganography technique is a technique that can hide messages or confidential information into other messages so that other people are not aware of the existence of the message to be hidden. In this study, the authors build a text data security system using the Cardan Grille Algorithm. whose main function is to hide messages, not to encrypt messages, so Cardan Grille is more often used for steganography. To do Cardan Grille, you need a perforated sheet and in the holes will be filled with letters, which are filled with letters, which are filled with messages and after that the sheet will be lifted and filled with the remaining sentences.
Penerapan Kombinasi Algoritma Sequitur Dan Punctured Elias Code Untuk Kompresi File Teks
Juni Leuwarta Ompusunggu
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 2 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Text files have a large size that affects the storage space and the sending process. This size is a factor in how much storage space will be used and how long it will take to send files. The longer the text, the bigger the size. large size can be overcome by doing the compression process. Compression is done to reduce the size of a file. Compression algorithms that can be used are sequitur algorithm and punctured elias code algorithm. The advantage of the sequitur algorithm is that it replaces 2 characters side by side with 1 terminal character in the character set, while the advantage of the punctured elias code algorithm is that there are two codes, namely P1 and P2. Text file compression is done by reading the input string in the text file (*txt and *.doc) and encoding the string using punctured elias code P1 and P2. The two algorithms will be combined to produce a smaller size than the previous size.
Perancangan Aplikasi Pembelajaran Desain Grafis Corel Draw X7 Dengan Menggunakan Learning Management System
Julita P Ayu Hutabarat
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 2 (2022): Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Learning is a process of teaching and learning activities that are designed systematically, carried out between teachers and students, in order to achieve the designed learning objectives. The learning process must be designed in a system that is paying attention to an object as a whole. A good learning method is a method that is able to bring students to achieve an educational goal and train students' abilities in various activities, especially in Corel Draw Graphic Design subjects. Corel Draw is a vector graphics editor application that is used for designing, such as logo design, banners. , banners, covers etc. As for the many tools that exist in the Corel Draw X7 application, it is one of the obstacles experienced by Class XI SMK students in graphic design learning. The application of conventional learning models is still considered less effective. In addition, even with the addition of time, learning is still considered less effective. To overcome the existing problems, the author intends to design a corel draw X7 learning application by applying the Learning Management System model. Learning Management System is a web-based technology that helps in planning, distribution, and evaluation of a learning process. LMS provides an integrated platform for learning materials, delivery, and management that can be accessed by students, material makers, and administrators. This LMS is a learning model that contains trainings that use services to collect and deliver learning content quickly and precisely so that it will make it easier for students to understand learning to achieve the target of completing learning on time both online and offline as well as near or far distance learning.
Perancangan Aplikasi Absensi Karyawan Dengan Deteksi Wajah Menggunakan Metode Eigenface
Susi Tamba
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 1 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Attendance is one of the most important repetitive transactions, because it is related to the productivity of employees and is one of the indicators of controlling human resources (HR) which aims to increase the potential of human resources and is used for efficiency. Current technological developments make it possible to create a system that can assist humans in recognizing a digital image. One area that is currently being developed is pattern recognition. This technology identifies a person's special physical characteristics. Examples of pattern recognition, for example, are face recognition, iris recognition, and fingerprint recognition. specific databases. Broadly speaking, the process of facial recognition is that the webcam camera captures the face. Then obtained a value of R, G, B. By using the initial processing, after that the facial processing stage is carried out using the eigenface method. In this eigenface method there are several core stages, namely: converting faces into matrices, calculating the FlatVector average, determining the eigenface values ??and carrying out the face identification process by looking for the eigenface values ??that are close to it. One of these facial recognition can be developed to become an attendance application that can be applied in the company to prevent manipulation of absenteeism by employees.
Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoitma RSA Pada Pengamanan Data Audio
Muhammad Rido Hasibuan
Journal of Informatics, Electrical and Electronics Engineering Vol. 2 No. 1 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The RSA algorithm has two keys, namely the public key and the private key. This algorithm has security which lies in the difficulty in calculating discrete algorithms. Both encryption and decryption keys are integers. The RSA algorithm is a type of asymmetric cryptography algorithm, which consists of two keys, namely the public key for encryption and the private key for decryption. In the RSA algorithm, the distributed key is a public key which is not required to be kept secret while the private key is either stored or not distributed. Everyone who has the public key can perform the encryption process but the results of the encryption can only be read by the person who has the private key. To increase the strength of the algorithm, the key used to perform the encryption and decryption process will be modified first using a randomization algorithm, namely the Quicksort Algorithm. The Quicksort algorithm is a sorting algorithm developed by Tony Hoare, the average sorting performance is O (n log n) to sort n items. The purpose of using the Quicksort algorithm is to make the resulting key more difficult to guess, making it difficult for cryptanalysts to read the message or information.
Implementasi Parameter Sistem Pentanahan Generator Melalui Transformator Distribusi Menggunakan Labview
Ayu Fitriani;
Muhammad Fadlan Siregar;
Syafriwel;
Syofyan Anwar Syahputra
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 4 (2022): Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Determination of the generator neutral grounding system through a distribution transformer can be done through manual calculations. Many parameters are considered in the calculation to get the appropriate results there is the possibility of repeated calculations. This is very difficult and causes a large difference in the calculation results. Therefore, a computer-based computing system is needed to overcome this kind of problem. Several papers have developed the calculation of the required generator neutral earthing magnitude which considers the voltage level, short-circuit fault current and protection system against ground faults. This paper discusses modeling in designing generator neutral ground using the LabView Graphical User Interface (GUI) application. The goal is to be easier, faster and more accurate. As the implementation of the modeling used data from std C62.92.2TM-2017.