cover
Contact Name
Johan Reimon Batmetan
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
danang@stekom.ac.id
Editorial Address
Jl. Majapahit No.304, Pedurungan Kidul, Kec. Pedurungan, Semarang, Provinsi Jawa Tengah, 52361
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Technology Informatics and Engineering
ISSN : 29619068     EISSN : 29618215     DOI : 10.51903
Core Subject : Science,
Power Engineering Telecommunication Engineering Computer Engineering Control and Computer Systems Electronics Information technology Informatics Data and Software engineering Biomedical Engineering
Articles 161 Documents
The Efficient Approach in Peer-to-Peer Systems to Achieve High Efficiency Lukman Santoso; Marcus Gunadi Wibawa; Muhamad Syarifudin; Priyadi Priyadi; Titi Christiana
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.137

Abstract

Peer-to-peer systems nowadays are widely used because of the scalability and high reliability. File replication and consistency maintenance are widely used techniques to achieve high system performance. These techniques are connected to each other. The connection of these techniques is consistency maintenance is needed in file replication to keep the consistency between a file and the replicas. Traditional file replication and consistency maintenance methods need a high cost. The usage of IRM (Integrated file Replication and Consistency Maintenance inP2P systems) which will achieve high efficiency at a significantly lower cost can be used to solve this problem. IRM reduces redundant file replicas, consistency maintenance overhead, and unnecessary file updates.
ANALYSIS RENDEZVOUS-BASED TECHNIQUES RELATE TO POWER CONSERVATION Agus Waryanto; Antonius Juniadhi Soekendar; Ely Andra Widharta; Greget Widhiati; Irdha Yunianto
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.138

Abstract

Power conservation is a vibrant area of research on wireless sensor networks. Several research papers have shown that using mobile sync in the sensor field, which collects data from sensor nodes via single or multi-hop communication, can save significant energy. However, sinks move slowly, which increases sensor network delays, especially in delay-sensitive applications. To address this issue, various rendezvous-based techniques are described in which a subset of sensor nodes are selected from the field as rendezvous points (RPs). The remaining nodes transfer the captured data to the next RP, where the data is buffered. The RP is then used to build a path for the mobile sink to tour and collect the buffered data. This article describes various rendezvous-based techniques and analyzes their strengths and weaknesses in terms of energy savings.
Analysis of Ag2+ and Cu2+ electroplating on the aluminum layer thickness level: A reanalysis Aming Sungkowo; Yanuar Zulardiansyah Arief; Rosyid Ridlo Al-Hakim
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.139

Abstract

We reanalyze the effect of silver (Ag2+) and copper (Cu2+) coating solutions for the thickness of the layer on aluminum (Al) materials with increased electrical currents 0.4A, 0.8A, 1A, 1.2A, and 1.4A and increased thickness layer (10µm, 20µm, 30µm, 40µm, and 50µm), as well as the previous study was conducted. We used the electroplating method and thickness test, as well as the Brinell hardness test for both coating solutions. The results show statistically significant (p-value < 0.05, one-tailed) between high electric current and aluminum (Al) coating process with silver (Ag2+) and copper (Cu2+), as well as silver (Ag2+), get the faster coating process time. The Brinell hardness test shows a statistically significant difference (p-value < 0.05, one-tailed) between the high thickness layer and HB value (Ag-coated and Cu-coated).
High electric current and hours can increase layer thickness and decrease white rust corrosion using Zn2+ electroplating Slamet Riyadi; Yanuar Zulardiansyah Arief; Antonius Darma Setiawan; Agung Pangestu; Rosyid Ridlo Al-Hakim
Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i2.140

Abstract

Electroplating was the process of coating metal surfaces using the electrochemical method. We used alkaline zinc (Zn2+) plating that was anti-corrosion coating, cheapest, evenly adhesion, as well as better-looking crushing. This study aims to test and measure the thickness of the layer on spark plugs with variations in different electrical currents 300, 400, and 500A and increased hours during the coating process, investigate the corrosion resistance of white rust on the surface and analyze the changes in alkaline zinc concentration and temperature that affect the thickness of the layer, respectively. The results, such as 1st sample 13 pcs, 300A, and thickness of 7.26-micron with white rust 9 pcs. 2nd sample 13 pcs, 400A, and thickness of 9.15-micron white rust 5 pcs. 3rd sample 13 pcs, 500A, and thickness of 12.75-micron white rust 3 pcs. The high electric current (500A) and 45 hours of the experiment would influence the lowest white rust corrosion level. The high alkaline zinc solution with an optimum 36°C solution temperature and 500A electric current would undoubtedly deposit the white rust until 3 pcs.
BLACK BOX APPROACH TO MONITORING CONTAINER MICROSERVICES IN FOG COMPUTING Danang Danang; Nuris Dwi Setiawan; Indra Ava Adianta
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.141

Abstract

In recent years IoT has developed very rapidly. IoT devices are used to monitor and control physical objects to transform the physical world into intelligent spaces with computing and communication capabilities. Compared to cloud computing, fog computing is used to support latency-sensitive applications at the edge of the network which allows client requests to be processed faster. This study aims to propose a monitoring framework for containerized black box microservices in a fog computing environment to evaluate CPU overhead, as well as to determine the operating status, service characteristics, and dependencies of each container. This study proposes a monitoring framework to integrate computing resource usage and run-time information from service interactions using a black box approach that seeks to integrate service-level information and computing resource information into the same framework. The proposed framework is limited to observing information monitoring after the server receives a request. This study uses JMeter to simulate user actions, which send requests to the server, and this research assumes the user knows the IP address of the server. For container monitoring methods in fog computing, all are indirect monitoring methods. The results of this study indicate that the proposed framework can provide operational data for visualization that can help system administrators evaluate the status of running containers using a black box approach. System administrators do not need to understand and modify target microservices to gather service characteristics from containerized microservices. Regarding future research, it is suggested to expand the exploration of modified system information, and that part of the container management tool code can be pre-tried so that the framework proposed in this study can provide real-time quantitative indexes for the load balancing algorithm to help optimize the load balancing algorithm.
HYBRID MODEL MACHINE LEARNING FOR DETECTING HOAXES Budi Hartono; Munifah; Sindhu Rakasiwi
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.142

Abstract

Unlimited availability of content provided by users on social media and websites facilitates aggregation around a broad range of people's interests, worldviews, and common narratives. However, over time, the internet, which is a source of information, has become a source of hoaxes. Since the public is commonly flooded with information, they occasionally find it difficult to distinguish misinformation disseminated on net platforms from true information. They may also rely massively on information providers or platform social media to collect information, but these providers usually do not verify their sources. The purpose of this research is to propose the use of machine learning techniques to establish hybrid models for detecting hoaxes. The research methodology used here is a feature extraction experiment, in which a series of features will be analyzed and grouped in an experiment to detect hoax news and hoax, especially in the political sphere by considering five modalities. The outcome of this research indicates that the relation between publisher Prejudice and the attitude of hyper-biased news sources makes them more possible than other sources to spread illusive articles, besides that the correlation between political Prejudice and news credibility is also very strong. This shows that the experiment using a hybrid model to detect hoaxes works. well. To achieve even better results in future research, it is highly recommended to analyze user-based features in terms of attitudes, topics, or credibility.
MACHINE LEARNING TECHNIQUE FOR CREDIT CARD SCAM DETECTION Fujiama Diapoldo Silalahi; Toni Wijanarko Adi Putra; Edy Siswanto
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.143

Abstract

Credit Card (CC) scam In financial markets is a growing nuisance. CC scams increasing rapidly and causing large amounts of financial losses for organizations, governments, and public institutions, especially now that all payment methods for e-commerce shopping can be done much more easily through digital payment methods. For this reason, the purpose of this study is to detect scam CC transactions from a given dataset by performing a predictive investigation on the CC transaction dataset using machine learning techniques. The method used is a predictive model approach, namely logistic regression models (LR-M), random forests (RF), and XGBoost combined along particular resampling techniques that have been practiced to anticipate scams and the authenticity of CC transactions. Model performance was calculated grounded Re-call Curve (RC), precision, f1-score, PR, and ROC. The experimental results show that the random forest in combination with the hybrid resampling approach of SMOTE and removal of Tomek Links works better than other models. The random forest model and XGBoost accomplished are preferred over the LR-M as long as their global f1 score is without re-sampling. This demonstrates the strength of one technique that can provide greater achievement alike in the existence of class inequality dilemmas. Each approach, at the same time when used with Ran-Under, will give a great memory score but fails cursedly in the language of accuracy. Compared to the coordinate model sine re-sampling, the accuracy and RS are not repaired in cases where Tomek linker displacement was used. RF and xgboost perform quite well in terms of f1-S when Ran-Over is used. SMOTE increases the random forest draw score and xgboost but the precision score (PS) decreases slightly. Completely, during a hybrid solution of Tomek delinker and SMOTE was practiced with random forest, it gave equitable attention and RS in the PR-AUC. XGboost failed to increase the PS even though the same re-sampling technique was used. For future research, a fee-delicate study method can be applied as long as fee misclassifications. So for future research, it is very necessary to consider this behavior change and it is also very important to develop predictive models. In addition to this, much larger data is needed so that detailed studies on handling non-stationary properties in CC scam detection can be carried out better.
ADVANCED MALICIOUS SOFTWARE DETECTION USING DNN Sulartopo Sulartopo; Dani Sasmoko; Zaenal Mustofa; Arsito Ari Kuncoro
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.144

Abstract

The special component of malicious software analysis is advanced malicious software analysis which implicates interested the main framework of malicious software that can be executed after executing it and aggressive malicious software investigation depend on inquisitive of the practice of malicious software after running it in a composed habitat. Advanced malicious software analysis is usually performed by contemporary anti-malicious software operating systems using signature-based analysis. The purpose of this research is to propose also decide a DNN for the progressive identification of portable files to study the features of portable executable malicious software to minimize the occurrence of distorted likeness when aware of advanced malicious software. The model proposed in this study is a NN with a Dropout model contrary to a resolution tree model to examine how well it performs in detecting real malicious PE files. Setup-skeptic methods are used to extract features from files. The dataset is used to train the proposed approach and measure outcomes by alternative common malicious software datasets. The results from this study illustrate that the use of simple DNNs to study PE vector elements is not only efficient but more fewer system comprehensive than the traditional interested disclosure approach. The model proposed in this study achieves an A-UC of ninety-nine point eight with ninety accurate specifics at one percent inaccurate specific on the R-OC curve. For shows that this model has the potential to complement or replace conventional anti-malicious software operating systems so for future research, it is proposed to implement this model practically.
APPLICATION OF SOLAR ENERGY TO MEASURE PHOTOVOLTAIC CAPACITY AND BATTERY OPTIMIZATION Unang Achlison; Iman Saufik Suasana; Dendy Kurniawan
Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i1.145

Abstract

This study uses the Markov Decision Model (MDP) to implement battery degradation and optimize battery use in Photovoltaic and the battery system model created. The battery optimization scheme for home loads uses the application of solar energy to optimally measure photovoltaic and battery capacity against each other. The different qualities of the standard used in this study are described starting from system characteristics and charge settings to an analysis of MDP and battery degeneration. Various systems undergo a list of analyses to implement awareness reasoning although developing battery volume and photovoltaic for the current system. The parametric span of cosmic and battery central tariff, the tariff of power worn taken away the framework, tariff of battery degeneration, time of year, photovoltaic generator size, battery size, and Health Status (SoH) of batteries were carried out to determine the optimal volume estimate and analyze the trade-offs essential in a mix scheme. This is then used to treasure trove the minimum amount of fee of the scheme with photovoltaic and battery application. This study support decision of the essential sizing deliberation for photovoltaic and battery-managed home loads linked to the services grid. Insightful that the battery can be used more destructively, also it can be formed lower and run at a greater C speed. This study analyzes actual fog computing research tools and storage composition algorithms for fog computing and develops a fog computing monitoring framework to provide data for fog computing storage composition algorithms. The framework proposed in this study provides granular container virtual hardware resource information and black box monitoring of service layer information associated with microservices. Framework usefulness on Raspberry Pis and CPU overhead of framework tested. The results of this study present the framework proposed could be used on single-chip microcomputers with relatively inadequate computational performance. In addition, a minimal effect on the battery degeneration system on the MDP decision due to the low system C-rate limit for the battery and interesting behavior of total fee and demand is also found. For future research, testing different maximum C levels should be considered to determine the photovoltaic size and battery system affected. Various battery optimization systems can be proved to check the benefit and disbenefits in the microgrid system case study. Lastly, collecting a scheme for actual-time reproduction to know how nice the operation is performing is the next stage of implementing MDP for battery management and system development.
VIRTUAL SYNCHRONOUS GENERATOR-BASED OVERSIGHT AND PREDICTIVE MODELS FOR MARS Migunani Migunani; Moh Muthohir; Dwi Setiawan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.146

Abstract

This research serves the virtual Synchronous Generator finding and oversight building of the Multi-port Autonomous Reconfigurable Solar (MARS) structure to bring backing to the alternating-curring network under various events on the network and presents a “model-based predictive control” (MBPC) oversight finding for the MARS structure to bring backing to the MARS structure alternating-curring network while the density innovation is recognized in the system. The main objective is to nominate a “model-based predictive control” leading oversight design that can bring density backing while unexpected density alteration. In this study, a comprehensive application of a virtual Synchronous Generator-based oversight innovation for the MARS structure is given. The expected oversight finding and control architecture of the MARS structure is evaluated by simulation on the “PSCAD”/EMTDC simulation platform to show performance under various operating conditions and calculated in the “Opal-RT” offline simulation model that also can be adapted to complete the certified “control-hardware -in-the- loops” (c-HIL). The dominant density backing performance is a conceivable combined improvement for each current network-unified capability transistors system. By increasing infiltration of transistors system-based stuff, passivity and immediate density feedback potentially decrease. Leading “model-based predictive control” (MBPC) finding to provide density backing to current topologies of unified “photovoltaic” (PV), battery-based “energy storage system”s” (ESS), and “high-voltage direct current” (HVDC) method named “multi-port autonomous reconfigurable solar” (MARS) is suggested. The expected oversight finding for regularly based on virtual Synchronous Generator-based oversight. Simulation of the MARS-HVDC method by the recommended oversight approach was assumed and authorized for MARS related to a “small short circuit ratio” (SCR) network in a “PSCAD”/EMTDC assumed habitat. The expected oversight finding displays superior work in the phrase of increasing rock bottom frequency and increasing constant-area frequency concerning no density oversight. The results of this research indicate that the MARS architecture by Synchronous Generator -based oversight brings exceptional heat backing by inserting higher active potential to the structure while equitable stage error compared to the Virtual Synchronous Generator - based oversight mode. The Synchronous Generator-based oversight mode is also balanced and brings better work in the phase of density rock bottom and balance-area increase. In the great feedback, the Synchronous Generator-based oversight mode is good than the Virtual Synchronous Generator-based oversight mode for each short circuit ratio set tested. MBPC-based oversight is entrenched in a virtual Synchronous Generator-based oversight algorithm. The recommended oversight innovation and control architecture of the MARS structure was calculated on the MARS structure in the “PSCAD”/EMTDC simulation environment. The simulation results show an increase in nadir frequency and steady-state frequency provided by the Multi-port Autonomous Reconfigurable Solar (MARS) structure via MBPC control. In future research, leading oversight methods are required to bring steady action down to unsteady error.

Page 3 of 17 | Total Record : 161


Filter by Year

2022 2025


Filter By Issues
All Issue Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 2 (2025): AUGUST | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 1 (2025): APRIL | JTIE : Journal of Technology Informatics and Engineering Vol. 3 No. 3 (2024): December (Special Issue: Big Data Analytics) | JTIE: Journal of Technology Info Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 3 No. 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 2 No. 3 (2023): December : Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering Vol. 2 No. 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering Vol. 2 No. 1 (2023): April : Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering Vol. 1 No. 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering More Issue