Journal of Renewable Energy and Smart Device
Journal of Renewable Energy and Smart Device (JORESD) is a journal that publishes high-quality scientific articles in Indonesian or English in the form of research results (top priority) and or reviews in the field of electronics, engineering and renewable energy. This journal covers, but is not limited to the following areas: Computer Engineering Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, VLSI Design-Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security Control and Computer Systems Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modeling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems. Electronics To Study Microelectronic System, Electronic Materials (semiconductors and optics), Design and Implementation of Application Specific Integrated Circuits (ASIC), System-on-a-Chip (SoC) and Electronic Instrumentation Using CAD Tools, Sensors Information technology Digital Signal Processing, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation Informatics Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems. Data and Software engineering Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data) Biomedical Engineering Biomedical Physics, Biomedical Transducers and instrumentation, Biomedical System Design and Projects, Medical Imaging Equipment and Techniques, Telemedicine System, Biomedical Imaging and Image Processing, Biomedical Informatics and Telemedicine, Biomechanics and Rehabilitation Engineering, Biomaterials and Drug Delivery Systems. Power Engineering Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Smart Grid, Electric Traction, Electric Vehicles, Electromagnetic Compatibility, Electrical Engineering Materials(Conductors, Superconducors, Dielectrics and Magnetics), High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, Power System Protection, SCADA, Electrical Measurements Telecommunication Engineering Antenna and Wave Propagation, Modulation and Signal Processing for Telecommunication, Wireless and Mobile Communications, Information Theory and Coding, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services, Security Network, and Radio Communication. JORESD publishes original empirical research (e.g., quantitative, qualitative, and mixed methods designs), project descriptions/evaluations, systematic literature reviews (including meta-analyses), methodological reviews, policy analyses, and theoretical or conceptual positions related to the use and innovative applications of technology in education. JORESD publishes the latest research and critical analysis on technology in education for educational theorists, researchers, practitioners, and policy makers.
Articles
6 Documents
Search results for
, issue
"Vol. 2 No. 2 Mei 2025"
:
6 Documents
clear
Strategi Pemulihan Data dalam Sistem Terdistribusi terhadap Ancaman Siber (Studi pada Jurusan Teknik Informatika dan Komputer
Muhammad Zulfahrizi Zubair;
T., Veronika Asri;
Sarmila Aulia
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.251
Ancaman siber menjadi tantangan utama dalam pengelolaan data pada sistem terdistribusi, khususnya di lingkungan akademik seperti jurusan teknik. Artikel ini bertujuan untuk mengidentifikasi permasalahan keamanan data yang dihadapi serta merancang strategi pemulihan data yang efektif terhadap potensi serangan siber. Metode yang digunakan adalah studi kualitatif melalui observasi, wawancara, dan analisis dokumentasi di lingkungan jurusan teknik. Hasil penelitian menunjukkan bahwa sistem saat ini belum memiliki mekanisme pemulihan data yang memadai dan rentan terhadap serangan seperti ransomware dan distributed denial-of-service (DDoS). Strategi pemulihan data yang diusulkan meliputi penerapan backup data terjadwal, penggunaan teknologi enkripsi, segmentasi jaringan, serta peningkatan literasi keamanan siber bagi pengelola sistem. Dengan menerapkan strategi ini, ketahanan sistem terhadap ancaman siber dapat ditingkatkan secara signifikan, sekaligus menjamin kontinuitas layanan data dan informasi akademik. Studi ini memberikan kontribusi praktis bagi pengembangan kebijakan keamanan data di lingkungan pendidikan tinggi yang semakin terdigitalisasi.
Analisis Integritas Data Dalam Mekanisme Berbagi File Google Drive: Studi Kasus Pengujian End-To-End
Alamsyah, Aan;
Prasojo, Kholik;
Rais, Nurul Aulia
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.252
Ensuring data integrity is a critical aspect of cloud storage systems, especially in file-sharing mechanisms between users. This study aims to analyze how well Google Drive preserves data integrity during file transfers by employing an end-to-end testing approach. The method used is experimental, involving a systematic procedure: creating test files in various formats, calculating initial hash values, uploading them to Google Drive, downloading from different accounts or devices, and re-calculating the hash values after transfer. The results show that hash values remain identical before and after the file-sharing process across all tested files, ranging from small text documents to large ISO files. These findings indicate that Google Drive reliably maintains data integrity during cross-user and cross-device sharing, with no undetected modifications to file contents. This study contributes to a technical understanding of data reliability within modern cloud storage services.
Analisis Perbandingan File Sharing Pada Sistem Terdistribusi Berbasis Cloud
Hasana, Uswatul;
Massikki, Massikki;
Azzahra, Isna Aulia
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.253
This study examines the performance and features comparison of three cloud-based file sharing services Google Drive, Dropbox, and OneDrive within the context of distributed systems. The primary objective is to analyze upload and download speed, security features, collaboration ease, and free storage capacity of each platform. A comparative method with direct experimentation was employed, where files sized 10 MB, 50 MB, and 100 MB were tested on each platform to obtain average transfer times. The results indicate that Dropbox excels in data transfer speed, Google Drive offers larger free storage and superior real-time collaboration features, while OneDrive stands out for its integration with Microsoft Office applications. All three services demonstrate high levels of data security and availability due to the implementation of distributed systems supporting data encryption, replication, and load balancing. This study provides insights for users to choose a storage platform that suits their needs and encourages further development of more efficient and secure cloud systems.
Perancangan Modul Keamanan Website dan Basis Data dalam Lingkup Sistem Terdistribusi dengan Strategi Pembelajaran Berbasis Case Method
Ramli, Hartini;
Kadir, Muh. Yasin;
Hatima, Husnul;
Dini, Juliano Nufiansyach;
Al'Safinat.R, Reyna Buryani;
Azhari, Reynaldi Nafzal
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.254
In today's digital era, information systems have evolved from centralized models to distributed systems that span across various platforms and geographic locations. While this transformation enhances efficiency and scalability, it also increases security risks, particularly concerning websites and databases, which are core components of digital services. This module is designed to provide in-depth understanding of information security within distributed systems, focusing on the protection of websites and databases. The learning approach applies the case method, placing students in real or simulated scenarios to analyze, solve problems, and design security solutions based on the principle of defense in depth. This module aims to enhance students' critical thinking and technical skills in addressing ever-evolving information system security threats.
Analisis Performa Load balancing pada Web Server Menggunakan Nginx
Khaidir;
Prasojo, Kholik;
Herlina;
Fadhlurrahman, A. Muhammad Fuad
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.255
The rapid development of information technology, particularly in the use of web-based services, has resulted in increased data traffic to servers. Without proper management, this may lead to decreased system performance. Load balancing is an approach introduced in technology education to teach technical solutions for server load management. This study aims to analyze the impact of implementing load balancing using Nginx software on web server performance. The method applied is a quantitative experiment involving two testing scenarios: before and after the implementation of load balancing using the Round Robin algorithm. The testing environment was built using virtualization with the Ubuntu Server operating system, and performance measurements were conducted using Apache Benchmark and JMeter. The analyzed parameters include latency, throughput, and response time. The findings show that implementing load balancing can significantly improve system efficiency, making it a relevant learning case in computer networking and system administration courses..
Implementasi dan Evaluasi Sistem Keyword Spotting Real-Time berbasis Google Speech API pada Asisten Cerdas Sederhana di Google Colaboratory
Singgih Astaguna T;
Muhammad Fauzan Yusuf;
Izza Etthiyyah RN;
Sari, Dessy Ana Laila
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61220/joresd.v2i2.256
The development of voice recognition technology, particularly Keyword Spotting (KWS) , offers significant potential for critical applications such as emergency response systems in the healthcare sector. The use of cloud-based Application Programming Interfaces (APIs) like the Google Speech API provides an accessible development pathway for these applications , but its performance in specific contexts, such as for the Indonesian language, requires thorough evaluation. This study aims to implement and evaluate the performance of a real-time KWS system based on the Google Speech API within a simple smart assistant prototype designed for healthcare emergency scenarios. The system was implemented on Google Colaboratory using a Text-based KWS approach. Quantitative testing was conducted with two male participants who uttered five Indonesian target keywords ("Hi", "Tolong", "Aduh", "Oke", "Salam") , with 25 repetitions for each keyword, resulting in a total of 250 test samples. System performance was measured using the Success Rate metric, calculated from the classification of True Positives (TP) and False Negatives (FN). The results show that the system was functionally implemented with a combined detection success rate of 62.8%. Significant performance variation was found both among keywords (highest success rate for 'Tolong' at 72.0% ) and between participants (77.6% vs. 48.0% ), highlighting speaker dependency. It is concluded that the Google API-based KWS approach is feasible for rapid prototyping, but the current accuracy and performance variability indicate the need for more robust and specific model development before it can be relied upon for critical healthcare applications.