cover
Contact Name
Johan Reimon Batmetan
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
danang@stekom.ac.id
Editorial Address
Jl. Majapahit No.304, Pedurungan Kidul, Kec. Pedurungan, Semarang, Provinsi Jawa Tengah, 52361
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Technology Informatics and Engineering
ISSN : 29619068     EISSN : 29618215     DOI : 10.51903
Core Subject : Science,
Power Engineering Telecommunication Engineering Computer Engineering Control and Computer Systems Electronics Information technology Informatics Data and Software engineering Biomedical Engineering
Articles 161 Documents
ADVANCED MALICIOUS SOFTWARE DETECTION USING DNN Sulartopo Sulartopo; Dani Sasmoko; Zaenal Mustofa; Arsito Ari Kuncoro
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.144

Abstract

The special component of malicious software analysis is advanced malicious software analysis which implicates interested the main framework of malicious software that can be executed after executing it and aggressive malicious software investigation depend on inquisitive of the practice of malicious software after running it in a composed habitat. Advanced malicious software analysis is usually performed by contemporary anti-malicious software operating systems using signature-based analysis. The purpose of this research is to propose also decide a DNN for the progressive identification of portable files to study the features of portable executable malicious software to minimize the occurrence of distorted likeness when aware of advanced malicious software. The model proposed in this study is a NN with a Dropout model contrary to a resolution tree model to examine how well it performs in detecting real malicious PE files. Setup-skeptic methods are used to extract features from files. The dataset is used to train the proposed approach and measure outcomes by alternative common malicious software datasets. The results from this study illustrate that the use of simple DNNs to study PE vector elements is not only efficient but more fewer system comprehensive than the traditional interested disclosure approach. The model proposed in this study achieves an A-UC of ninety-nine point eight with ninety accurate specifics at one percent inaccurate specific on the R-OC curve. For shows that this model has the potential to complement or replace conventional anti-malicious software operating systems so for future research, it is proposed to implement this model practically.
APPLICATION OF SOLAR ENERGY TO MEASURE PHOTOVOLTAIC CAPACITY AND BATTERY OPTIMIZATION Unang Achlison; Iman Saufik Suasana; Dendy Kurniawan
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.145

Abstract

This study uses the Markov Decision Model (MDP) to implement battery degradation and optimize battery use in Photovoltaic and the battery system model created. The battery optimization scheme for home loads uses the application of solar energy to optimally measure photovoltaic and battery capacity against each other. The different qualities of the standard used in this study are described starting from system characteristics and charge settings to an analysis of MDP and battery degeneration. Various systems undergo a list of analyses to implement awareness reasoning although developing battery volume and photovoltaic for the current system. The parametric span of cosmic and battery central tariff, the tariff of power worn taken away the framework, tariff of battery degeneration, time of year, photovoltaic generator size, battery size, and Health Status (SoH) of batteries were carried out to determine the optimal volume estimate and analyze the trade-offs essential in a mix scheme. This is then used to treasure trove the minimum amount of fee of the scheme with photovoltaic and battery application. This study support decision of the essential sizing deliberation for photovoltaic and battery-managed home loads linked to the services grid. Insightful that the battery can be used more destructively, also it can be formed lower and run at a greater C speed. This study analyzes actual fog computing research tools and storage composition algorithms for fog computing and develops a fog computing monitoring framework to provide data for fog computing storage composition algorithms. The framework proposed in this study provides granular container virtual hardware resource information and black box monitoring of service layer information associated with microservices. Framework usefulness on Raspberry Pis and CPU overhead of framework tested. The results of this study present the framework proposed could be used on single-chip microcomputers with relatively inadequate computational performance. In addition, a minimal effect on the battery degeneration system on the MDP decision due to the low system C-rate limit for the battery and interesting behavior of total fee and demand is also found. For future research, testing different maximum C levels should be considered to determine the photovoltaic size and battery system affected. Various battery optimization systems can be proved to check the benefit and disbenefits in the microgrid system case study. Lastly, collecting a scheme for actual-time reproduction to know how nice the operation is performing is the next stage of implementing MDP for battery management and system development.
VIRTUAL SYNCHRONOUS GENERATOR-BASED OVERSIGHT AND PREDICTIVE MODELS FOR MARS Migunani Migunani; Moh Muthohir; Dwi Setiawan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.146

Abstract

This research serves the virtual Synchronous Generator finding and oversight building of the Multi-port Autonomous Reconfigurable Solar (MARS) structure to bring backing to the alternating-curring network under various events on the network and presents a “model-based predictive control” (MBPC) oversight finding for the MARS structure to bring backing to the MARS structure alternating-curring network while the density innovation is recognized in the system. The main objective is to nominate a “model-based predictive control” leading oversight design that can bring density backing while unexpected density alteration. In this study, a comprehensive application of a virtual Synchronous Generator-based oversight innovation for the MARS structure is given. The expected oversight finding and control architecture of the MARS structure is evaluated by simulation on the “PSCAD”/EMTDC simulation platform to show performance under various operating conditions and calculated in the “Opal-RT” offline simulation model that also can be adapted to complete the certified “control-hardware -in-the- loops” (c-HIL). The dominant density backing performance is a conceivable combined improvement for each current network-unified capability transistors system. By increasing infiltration of transistors system-based stuff, passivity and immediate density feedback potentially decrease. Leading “model-based predictive control” (MBPC) finding to provide density backing to current topologies of unified “photovoltaic” (PV), battery-based “energy storage system”s” (ESS), and “high-voltage direct current” (HVDC) method named “multi-port autonomous reconfigurable solar” (MARS) is suggested. The expected oversight finding for regularly based on virtual Synchronous Generator-based oversight. Simulation of the MARS-HVDC method by the recommended oversight approach was assumed and authorized for MARS related to a “small short circuit ratio” (SCR) network in a “PSCAD”/EMTDC assumed habitat. The expected oversight finding displays superior work in the phrase of increasing rock bottom frequency and increasing constant-area frequency concerning no density oversight. The results of this research indicate that the MARS architecture by Synchronous Generator -based oversight brings exceptional heat backing by inserting higher active potential to the structure while equitable stage error compared to the Virtual Synchronous Generator - based oversight mode. The Synchronous Generator-based oversight mode is also balanced and brings better work in the phase of density rock bottom and balance-area increase. In the great feedback, the Synchronous Generator-based oversight mode is good than the Virtual Synchronous Generator-based oversight mode for each short circuit ratio set tested. MBPC-based oversight is entrenched in a virtual Synchronous Generator-based oversight algorithm. The recommended oversight innovation and control architecture of the MARS structure was calculated on the MARS structure in the “PSCAD”/EMTDC simulation environment. The simulation results show an increase in nadir frequency and steady-state frequency provided by the Multi-port Autonomous Reconfigurable Solar (MARS) structure via MBPC control. In future research, leading oversight methods are required to bring steady action down to unsteady error.
REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS Maya Utami Dewi; Sulartopo Sulartopo; Ahmad Solechan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.147

Abstract

The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.
IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION Nuris Dwi Setiawan; Bagus Sudirman; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.148

Abstract

Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.
CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM Joseph Teguh Santoso; Fujiama Diapoldo Silalahi; Laksamana Rajendra Haidar
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.149

Abstract

Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
THREAT ATTRIBUTES HANGING IN THE WILD ANDROID Irda Yunianto; Mars Caroline Wibowo; Budi Raharjo
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering
Publisher : Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.150

Abstract

Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense. This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.
Enhancing Performance Using New Hybrid Intrusion Detection System Candra Supriadi; Charli Sitinjak; Fujiama Diapoldo Silalahi; Nia Dharma Pertiwi; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.134

Abstract

Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
A DIGITAL PRINTING APPLICATION AS AN EXPRESSION IDENTIFICATION SYSTEM. Arman Arman; Prasetya Prasetya; Feny Nurvita Arifany; Fertilia Budi Pradnyaparamita; Joni Laksito
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.135

Abstract

Human Computer Interaction (HCI), a growing research field in science and engineering, aims to provide a natural way for humans to use computers as tools. Humans prefer to interact with each other mainly through speech, but also through facial expressions and gestures, for certain parts of the speech and displays of emotions. The identity, age, gender, and emotional state of a person can be obtained from his face. The impression we receive from the expression reflected on the face affects our interpretation of the spoken word and even our attitude towards the speaker himself. Although emotion recognition is an easy task for humans, it still proves to be a difficult task for computers to recognize user`s emotional state. Advances in this area promise to arm our technological environment by means for more effective interactions with humans, and hopefully the impact of facial expressions on cognition will increase rapidly in the future. Will do. In recent years, the adoption of digital has increased rapidly, and the quality has improved significantly. Digital printing has resulted in fast delivery and needs-based costs. This article describes a sophisticated combination classifier approach, an empirical study of ensembles, stacking, and voting. These three approaches were tested on Nave Bayes (NB), Kernel Naive Bayes (kNB), Neural Network (NN), Auto MultiLayer Perceptron (Auto MLP), and Decision Tree (DT), respectively. The main contribution of this paper is the improvement of the classification accuracy of facial expression recognition tasks. In both persondependent and nonpersondependent experiments we showed that using a combination of these classifier combinations gave significantly better results than using individual classifiers. It has been observed from experiments that the overall voting technique by voting achieves the best classification accuracy.
IoT-Based System of Monitoring Realtime Air Quality with MQ135 and Automatic Chicken Feeding Dani Sasmoko; Reni Veliyanti; Rozi Azwar Pradana
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.136

Abstract

IoT technology is useful for chicken farming to control the condition of the farm concerning some problems such as odour, temperature fluctuations and feeding time system. This study used MQ135 to detect ammonia odour level, DHT11 to check room temperature, and RTC3231 to regulate feeding time. The data obtained from the sensor was sent by wemos to the fire base and MySQL to be read on android so that it can be monitored directly by the breeder. When the ammonia level is above normal it will turn on the odour fan. If DHT11 reaches the value above 300C, it will turn on the cooling fan, and turn on the heating light when the temperature is below 250C. As RTC3231 sets the time at 07.00 and 14.00, the chicken feeder will automatically open to feed the chickens according to the time set. Table 1 and 2 show that the experiment obtained a value of 100% working well. This study succeeded in monitoring environmental conditions through Android and executing automatic feeding at the predetermined time. Thus, it can be concluded that the use of IoT technology for monitoring and feeding system automation in chicken farms is highly recommended.

Page 2 of 17 | Total Record : 161


Filter by Year

2022 2025


Filter By Issues
All Issue Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 2 (2025): AUGUST | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 1 (2025): APRIL | JTIE : Journal of Technology Informatics and Engineering Vol. 3 No. 3 (2024): December (Special Issue: Big Data Analytics) | JTIE: Journal of Technology Info Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 3 No. 1 (2024): April : Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering Vol. 2 No. 3 (2023): December : Journal of Technology Informatics and Engineering Vol. 2 No. 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering Vol. 2 No. 1 (2023): April : Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering Vol. 1 No. 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering More Issue