cover
Contact Name
Johan Reimon Batmetan
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
danang@stekom.ac.id
Editorial Address
Jl. Majapahit No.304, Pedurungan Kidul, Kec. Pedurungan, Semarang, Provinsi Jawa Tengah, 52361
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Technology Informatics and Engineering
ISSN : 29619068     EISSN : 29618215     DOI : 10.51903
Core Subject : Science,
Power Engineering Telecommunication Engineering Computer Engineering Control and Computer Systems Electronics Information technology Informatics Data and Software engineering Biomedical Engineering
Articles 5 Documents
Search results for , issue "Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering" : 5 Documents clear
VIRTUAL SYNCHRONOUS GENERATOR-BASED OVERSIGHT AND PREDICTIVE MODELS FOR MARS Migunani Migunani; Moh Muthohir; Dwi Setiawan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.146

Abstract

This research serves the virtual Synchronous Generator finding and oversight building of the Multi-port Autonomous Reconfigurable Solar (MARS) structure to bring backing to the alternating-curring network under various events on the network and presents a “model-based predictive control” (MBPC) oversight finding for the MARS structure to bring backing to the MARS structure alternating-curring network while the density innovation is recognized in the system. The main objective is to nominate a “model-based predictive control” leading oversight design that can bring density backing while unexpected density alteration. In this study, a comprehensive application of a virtual Synchronous Generator-based oversight innovation for the MARS structure is given. The expected oversight finding and control architecture of the MARS structure is evaluated by simulation on the “PSCAD”/EMTDC simulation platform to show performance under various operating conditions and calculated in the “Opal-RT” offline simulation model that also can be adapted to complete the certified “control-hardware -in-the- loops” (c-HIL). The dominant density backing performance is a conceivable combined improvement for each current network-unified capability transistors system. By increasing infiltration of transistors system-based stuff, passivity and immediate density feedback potentially decrease. Leading “model-based predictive control” (MBPC) finding to provide density backing to current topologies of unified “photovoltaic” (PV), battery-based “energy storage system”s” (ESS), and “high-voltage direct current” (HVDC) method named “multi-port autonomous reconfigurable solar” (MARS) is suggested. The expected oversight finding for regularly based on virtual Synchronous Generator-based oversight. Simulation of the MARS-HVDC method by the recommended oversight approach was assumed and authorized for MARS related to a “small short circuit ratio” (SCR) network in a “PSCAD”/EMTDC assumed habitat. The expected oversight finding displays superior work in the phrase of increasing rock bottom frequency and increasing constant-area frequency concerning no density oversight. The results of this research indicate that the MARS architecture by Synchronous Generator -based oversight brings exceptional heat backing by inserting higher active potential to the structure while equitable stage error compared to the Virtual Synchronous Generator - based oversight mode. The Synchronous Generator-based oversight mode is also balanced and brings better work in the phase of density rock bottom and balance-area increase. In the great feedback, the Synchronous Generator-based oversight mode is good than the Virtual Synchronous Generator-based oversight mode for each short circuit ratio set tested. MBPC-based oversight is entrenched in a virtual Synchronous Generator-based oversight algorithm. The recommended oversight innovation and control architecture of the MARS structure was calculated on the MARS structure in the “PSCAD”/EMTDC simulation environment. The simulation results show an increase in nadir frequency and steady-state frequency provided by the Multi-port Autonomous Reconfigurable Solar (MARS) structure via MBPC control. In future research, leading oversight methods are required to bring steady action down to unsteady error.
REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS Maya Utami Dewi; Sulartopo Sulartopo; Ahmad Solechan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.147

Abstract

The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.
IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION Nuris Dwi Setiawan; Bagus Sudirman; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.148

Abstract

Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.
CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM Joseph Teguh Santoso; Fujiama Diapoldo Silalahi; Laksamana Rajendra Haidar
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.149

Abstract

Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
THREAT ATTRIBUTES HANGING IN THE WILD ANDROID Irda Yunianto; Mars Caroline Wibowo; Budi Raharjo
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.150

Abstract

Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense. This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.

Page 1 of 1 | Total Record : 5


Filter by Year

2022 2022


Filter By Issues
All Issue Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 2 (2025): AUGUST | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 1 (2025): APRIL | JTIE : Journal of Technology Informatics and Engineering Vol. 3 No. 3 (2024): December (Special Issue: Big Data Analytics) | JTIE: Journal of Technology Info Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 3 No. 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 2 No. 3 (2023): December : Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering Vol. 2 No. 2 (2023): August : Journal of Technology Informatics and Engineering Vol. 2 No. 1 (2023): April : Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering Vol. 1 No. 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering More Issue