cover
Contact Name
Johan Reimon Batmetan
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
danang@stekom.ac.id
Editorial Address
Jl. Majapahit No.304, Pedurungan Kidul, Kec. Pedurungan, Semarang, Provinsi Jawa Tengah, 52361
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Technology Informatics and Engineering
ISSN : 29619068     EISSN : 29618215     DOI : 10.51903
Core Subject : Science,
Power Engineering Telecommunication Engineering Computer Engineering Control and Computer Systems Electronics Information technology Informatics Data and Software engineering Biomedical Engineering
Articles 161 Documents
REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS Maya Utami Dewi; Sulartopo Sulartopo; Ahmad Solechan
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.147

Abstract

The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.
IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION Nuris Dwi Setiawan; Bagus Sudirman; Sigit Umar Anggono
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.148

Abstract

Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.
CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM Joseph Teguh Santoso; Fujiama Diapoldo Silalahi; Laksamana Rajendra Haidar
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.149

Abstract

Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
THREAT ATTRIBUTES HANGING IN THE WILD ANDROID Irda Yunianto; Mars Caroline Wibowo; Budi Raharjo
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.150

Abstract

Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense. This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.
Construction of LGBT People in Digital Media (Framing Analysis of CNN Indonesia News) Teguh Agum Pratama; Safira Putri Miranti; Yola Amanda; Arya Dwi Putra; Muzhirah Muzhirah
Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i3.152

Abstract

This article aims to analyze media perceptions in the coverage of Medan Mayor Boby Nasution on the rejection of LGBT in Medan City. LGBT should not have happened in Indonesia, especially in the city of Medan because it has violated Pancasila, cultural and religious norms that have become legal provisions in Indonesia. This study implements a qualitative descriptive method with framing analysis techniques in the form of documentation and media observations. The results include: the movement of the LGBT group does not have the space or scope to accept it in Indonesia, because its existence itself has been banned by regulations and applicable social norms, because in essence this group only brings a disaster of deviation to teenagers who have absolutely no element of benefit for the people.
Frame Work Of Sensor In Smart House Using Orange Technology. Melyani Melyani
Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i3.153

Abstract

Now days, the home environment is still much less supportive of life for the elderly, most elderly living at home need a companion to help them. Safety, health, happiness and independence will be difficult for them to get even the elderly will be further away from the surrounding environment. Based on population projection 2017 data there are 23.66 million elderly people in Indonesia and predicted in 2020 there are 27.08 million people elderly. Smart homes that are currently widely studied have not focused on elderly; most smart homes only provide a sense of security and convenience for adult residents. And this will be a problem that until now has not solved the improvement of human life through technology to get happiness, care and health especially for the elderly. In many cases of the elderly, it is easier to send them to live in a nursing home and that keeps them separated from their families for the rest of their lives. That's what makes them less happiness. Orange Technology is a collection of technological elements to improve human life by getting happiness, Care and health. This study reviewed the journals of scientific databases such as IEEE explore, ACM digital library and Proquest published from 2002 to 2017. From the search results obtained 54 papers that will answer the scientific questions of this research. The result of this research is a framework of smart house that has Sensor, Monitoring, Wireless, Scalability, Low cost, GPS and ease of installation and maintenance as components of smart house of orange technology for elderly.
Nutritional Status Classification Of Stunting In Toddlers Using Naive Bayes Classifier Method Risky Devandra Hartana; Enny Itje Sela
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i1.154

Abstract

Stunting in toddlers is one of the prevalent issues of malnutrition in Indonesia. The causes of Stunting are diverse, and one contributing factor is the insufficient nutritional intake required for toddlers. The categorization of Stunting nutritional status in toddlers is crucial to identify those experiencing Stunting, enabling appropriate interventions to prevent more serious health problems in the future. This research aims to develop a classification model for short nutritional status in toddlers using the Naive Bayes Classifier method. The data utilized in this study originate from anthropometric measurements of toddlers in the Malebo area, Kandangan, Temanggung, Central Java. The anthropometric data include weight, height, and age of the toddlers. This data is then processed using the Naive Bayes Classifier method to classify the nutritional status of Stunting in toddlers. The results of this research are expected to assist in identifying toddlers experiencing Stunting, facilitating appropriate interventions to prevent more serious health issues in the future. Additionally, the Naive Bayes Classifier method employed can be applied in similar studies to enhance the quality of life, especially for children in Indonesia, particularly in the Malebo area, Kandangan, Temanggung, Central Java.
Internet Of Things (IoT) Integration In Telecommunication Networks: Challenges and Opportunities Agi Nanjar; Titi Safitri Maharani; Priyo Agung Prastyo; Muhammad Taufik Nur Hidayat; Imam kharits najibulloh
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i1.156

Abstract

This research delves into the challenges and opportunities posed by integrating Internet of Things (IoT) into telecommunication networks. It focuses on understanding IoT fundamentals, identifying hurdles like security and data management, and exploring prospects such as new services and operational streamlining. By analyzing government roles and strategic planning, it aims to harness the full potential of IoT-telecom convergence. Adopting a qualitative approach, this study aims to offer profound insights into the complexities of this integration. Through examining challenges and opportunities, it strives to contribute significantly to technological and societal advancement. Emphasizing literature review techniques and focused data analysis, this research aims to inform policy, foster innovation, and deepen comprehension of advanced technology's impact. IoT links physical devices to the internet, enabling innovations like smart homes and environmental monitoring, while telecom networks facilitate data exchange with a focus on infrastructure development and security. Integration of IoT into these networks enhances efficiency and security, with forecasts indicating continued expansion of IoT's role in telecom networks.
Warehouse Inventory System Design in Implementing the CodeIgniter Framework and Scrum Method Muhammad Yogi Sardi; Uc. Mariance
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i1.157

Abstract

When collecting data, sometimes you need tools to make it neater and better at collecting data. The infrastructure section of the Pancabudi Development University which records all incoming and outgoing goods is so large and on a university scale it makes the infrastructure less effective. The research carried out built an Inventory Warehouse System. The research results of the warehouse inventory system that was built were very well used at the Pancabudi Development University in the Facilities and Pre-Means section in warehouse data collection. This system makes it easier for UNPAB Sapras to monitor data on incoming and outgoing goods and can record all types of conditions of goods carried out. The implementation of the Warehouse Inventory System is carried out using data on goods in the UNPAB warehouse. This results in orderly and neat digital data collection. Apart from that, it is more effective because it applies the Scrum method and applies the CodeIgniter framework.
IoT Oxymeter Starter Prototype As An Employee Health Monitoring Tool In The Blynk Integrated Palm Industry Muhammad Akbar Syahbana Pane; Rahmad Dian; Ratu Mutiara Siregar; Balqis Nurmauli Damanik; Asnita Yani; Alisarjuni Padang; Khairul Saleh
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i1.158

Abstract

One of the main challenges faced by workers in the palm oil industry is routine health monitoring. Therefore, innovation is needed in the form of health monitoring tools that can facilitate and increase the efficiency of employee health monitoring. The Internet of Things (IoT) has become an increasingly popular solution to overcome these challenges. The use of this technology is expected to increase employee health resilience, detect potential health problems early, and provide a quick response to health conditions that require medical attention.

Page 4 of 17 | Total Record : 161


Filter by Year

2022 2025


Filter By Issues
All Issue Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 2 (2025): AUGUST | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 1 (2025): APRIL | JTIE : Journal of Technology Informatics and Engineering Vol. 3 No. 3 (2024): December (Special Issue: Big Data Analytics) | JTIE: Journal of Technology Info Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 1 (2024): April : Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering Vol. 2 No. 3 (2023): December : Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering Vol. 2 No. 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering Vol. 2 No. 1 (2023): April : Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering Vol. 1 No. 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering More Issue