cover
Contact Name
Jonson Manurung
Contact Email
jhonson.geo@gmail.com
Phone
+6281361081639
Journal Mail Official
jurnal.fttp.unhan@gmail.com
Editorial Address
Alamat: Kawasan Indonesia Peace and Security Center (IPSC) Sentul Bogor Jawa Barat, Indonesia Telp: 021-87951555 ext. 7229/7224/7211 Fax: 021- 29618761 / 021-29618764 Email: jurnal.fttp.unhan@gmail.com
Location
Kota bogor,
Jawa barat
INDONESIA
Journal of Defense Technology and Engineering
ISSN : -     EISSN : 31102484     DOI : -
Journal of Defense Technology and Engineering is a peer-reviewed, open-access scientific journal dedicated to the advancement of research and development in the fields of defense technology, engineering innovation, and related interdisciplinary studies. Published by the Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia, Journal of Defense Technology and Engineering provides a platform for scholars, researchers, practitioners, and industry professionals to disseminate original research, technical reports, and review articles that address current and emerging challenges in defense and security. The journal welcomes contributions in a wide range of topics including but not limited to: Advanced weapon systems, Cybersecurity and cryptography, Military communication systems, Artificial intelligence in defense, Robotics and autonomous systems, Materials science and defense engineering, Strategic defense technologies, Simulation and modeling in military applications, Mechanical engineering for defense systems (e.g., propulsion, thermal systems, vehicle mechanics), Civil engineering in military infrastructure (e.g., fortification design, military base development, disaster-resistant structures), Electrical engineering in defense technology (e.g., radar systems, electronic warfare, power systems in defense equipment) Journal of Defense Technology and Engineering aims to foster scientific knowledge exchange and technological innovation that support national and international defense strategies. The journal is published biannually and adheres to strict ethical publishing standards to ensure the integrity and quality of each publication. ISSN (Online): [3110-2484] Publishing Frequency: Biannual (July and January) Language: English Publisher: Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia
Articles 10 Documents
Search results for , issue "Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering" : 10 Documents clear
Comparative study of the bearing capacity of square and rectangular shallow foundations based on Terzaghi and Meyerhof methods Sayed Ahmad Fauzan; Ricky Harianja; Ekodjati Tunggulgeni; Okri Asfino Putra; Muhammad Hamzah Fansuri; Pungky Dharma Saputra; Suprayogi Suprayogi; Fadhil Muhammad Nuryanto
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Foundation integrity is paramount in evaluating building reliability. This research investigates Building X, a two-story structure with shallow footing foundations on soft soil in East Jakarta. The study compares bearing capacity using Terzaghi and Meyerhof methods, with structural loads modeled in ETABS. Results show Terzaghi’s ultimate bearing capacity (qu) is 15076.00 kg/m2, while Meyerhof’s is 22017.68 kg/m2. Consequently, Terzaghi provides a more conservative Safety Factor (SF). The technical implications are critical for decisions: Terzaghi’s results serve as a lower-bound safety limit to prevent catastrophic shear failure, while Meyerhof offers comprehensive geometry-based parameters. Many points exhibit an SF below the 3.00 standard, with several below 1.00 under Terzaghi analysis. This study contributes to building audits by bridging classical theories with practical Building Functionality Certificate (SLF) requirements in soft soil regions. The findings underscore the necessity for future numerical validation using Plaxis 2D to account for complex non-linear soil-structure interactions and precise settlement behavior.
The effect of increased regiment activities on the health condition of cadets Nadiza Lediwara; Sembada Denrineksa Bimorogo; Aulia Khamas Heikmakhtiar; Azzam Amar Ma’ruf; Daffa Mahdy Brata
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to analyze the effect of increased regiment activities on the health conditions of student cadets at the Republic of Indonesia Defense University (UNHAN RI). Regiment activities, which include physical training, discipline building, and mental development, are considered to influence both physical and mental health aspects of cadets. This study employed a quantitative comparative design using a paired sample approach to examine changes in health conditions before and after an increase in regiment activity intensity. Data were collected using a structured questionnaire and analyzed using a paired sample t-test. The results indicate a statistically significant difference in cadets’ health conditions before and after the increase in regiment activity intensity, as indicated by a p-value of 1.029 × 10⁻⁶ (p < 0.05). These findings provide empirical evidence of the impact of regiment activity intensity on cadet health and highlight the importance of managing training intensity to support optimal health outcomes in military-based educational institutions.
Enhanced cyber attack detection using optimized random forest with SMOTE-based class balancing and feature selection Jonson Manurung; Adam Mardamsyah; Baringin Sianipar
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid expansion of interconnected enterprise networks has intensified cybersecurity threats, while traditional signature-based intrusion detection systems remain ineffective against evolving and imbalanced attack patterns, particularly zero-day and low-frequency attacks. This study aims to develop an optimized and practically deployable intrusion detection framework by leveraging a Random Forest classifier on the CIC-IDS2017 benchmark dataset, with emphasis on robust minority attack detection, computational efficiency, and interpretability for real-world security operations. The proposed method integrates comprehensive data preprocessing, Synthetic Minority Over-sampling Technique (SMOTE) for class imbalance mitigation, feature importance–driven dimensionality reduction, and exhaustive grid search–based hyperparameter optimization within a unified machine learning pipeline. Experiments conducted on 2.52 million network flow records demonstrate that the optimized model achieves 98.14% accuracy, 96.25% weighted F1-score, and 0.993 ROC-AUC, while maintaining stable performance across all attack categories, including minority classes such as Infiltration and Botnet with F1-scores exceeding 93%. Feature selection reduced dimensionality by 58.3% and training time by 63.2% without degrading performance, enhancing deployment feasibility in enterprise intrusion detection environments. Comparative analysis confirms that the proposed approach outperforms baseline Random Forest models, traditional machine learning methods, and recent deep learning approaches while requiring significantly lower computational resources. These findings indicate that a holistically optimized Random Forest framework offers a reliable, interpretable, and operationally efficient solution for real-world network security monitoring and cyber defense systems.
Cryptographic algorithm optimization for defense data security using quantum inspired algorithms Bagus Hendra Saputra; Jonson Manurung; Jeremia Paskah Sinaga
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid advancement of quantum computing poses a critical threat to classical public-key cryptographic systems widely used in defense communication infrastructures, while the practical deployment of post-quantum cryptography (PQC) remains constrained by excessive key sizes, computational overhead, and energy consumption in bandwidth- and latency-sensitive military environments. This study aims to develop and evaluate a quantum-inspired multi-objective optimization framework to enhance the operational feasibility of standardized PQC schemes without compromising cryptographic security. The proposed method applies a Quantum Genetic Algorithm (QGA) to optimize configuration parameters of CRYSTALS-Kyber and CRYSTALS-Dilithium by simultaneously balancing security strength, computational performance, resource efficiency, and deployability. Experiments were conducted using official NIST test vectors and defense-oriented communication scenarios, with performance evaluated across encryption and signature latency, throughput, key and signature sizes, memory footprint, and energy consumption, while security was validated against classical and quantum attack models. The results demonstrate that the optimized configurations achieve key and signature size reductions of up to 10.3%, throughput improvements of up to 15.5%, and energy consumption reductions of up to 12.5% compared to baseline NIST implementations, while fully maintaining NIST security levels and robust resistance to quantum adversaries. These improvements significantly enhance the suitability of PQC for tactical radios, satellite communications, and resource-constrained defense platforms. The findings indicate that quantum-inspired multi-objective optimization is a critical enabler for transitioning post-quantum cryptography from theoretical security constructs to deployable, mission-ready solutions in real-world defense systems.
Multimodal deep learning framework for detection and attribution of adversarial information operations on social media platforms Nick Holson M. Silalahi; Jonson Manurung; Bagus Hendra Saputra
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Adversarial information operations on social media platforms pose critical threats to national security, with state-sponsored actors exploiting multimodal content manipulation to conduct sophisticated disinformation campaigns. Existing detection approaches focus on single-modality analysis, lacking comprehensive frameworks for simultaneous detection, attribution, and coordination identification. This research develops an integrated multimodal deep learning framework combining RoBERTa-large transformer, Vision Transformer, Graph Convolutional Networks, and bidirectional LSTM, unified through cross-modal attention fusion with multi-task learning optimization. Experimental validation utilizes eight datasets including Russian IRA tweets (3.8M posts), Fakeddit (1M submissions), TweepFake (25K accounts), FakeNewsNet (23K articles), MM-COVID (6.7K posts), CREDBANK (60M tweets), and MEMES (12K items). Results demonstrate 93.24% detection accuracy, 79.34% attribution accuracy across 15 threat actor groups, 91.67% coordination F1-score, 88.62% narrative classification accuracy, and 448ms inference latency suitable for real-time deployment. Ablation studies reveal graph neural networks provide largest performance contribution (5.82% improvement), highlighting social network analysis importance for detecting coordinated behavior. Future directions include large-scale pre-training, adversarial training, continual learning, human-AI collaboration, multilingual expansion, federated learning, and causal inference methods.
Big data analytics framework for defense strategic intelligence and decision support systems Rochedi Idul Adha; Adam Mardamsyah; Khaerul Imam Phatoni
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The contemporary defense environment faces rapidly evolving threats, vast heterogeneous data, and linguistic diversity, creating significant challenges for timely and accurate intelligence analysis. This study aims to develop an integrated big data analytics framework that combines open-source intelligence, social media monitoring, and satellite imagery into a unified temporal knowledge graph to support multilingual, cross-modal threat assessment. The proposed methodology incorporates five key phases: multi-source data collection and preprocessing, multilingual transformer-based natural language processing for entity, relation, and event extraction, temporal knowledge graph construction, machine learning-driven analytical modeling for threat prediction and risk assessment, and comprehensive evaluation using both system performance and intelligence value metrics. Experimental results demonstrate that the framework achieves superior entity recognition (F1-score 0.882) and relation extraction (F1-score 0.869), reduces processing latency by 92.6% compared to baseline systems, and integrates 6.3 million entities across 15 languages. Multi-source data fusion improves assessment accuracy by 18.4%, enabling near real-time situational awareness and enhanced strategic decision-making. The system’s explainable reasoning and temporal modeling capabilities provide transparent, actionable intelligence for defense planners, addressing limitations of traditional single-modality and monolingual systems. These findings indicate that integrating multilingual NLP, cross-modal fusion, and temporal knowledge representation significantly enhances operational readiness and early warning capabilities, offering a practical framework adaptable to national and regional security contexts.
Security threat prediction model using graph neural networks and deep temporal learning Eryan Ahmad Firdaus; Adam Mardamsyah; Jeremia Paskah Sinaga
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The increasing complexity and interconnectedness of modern security threats, including terrorism, social unrest, and transnational conflicts, pose significant challenges for traditional intelligence and threat detection systems, which struggle to capture both relational and temporal dynamics of evolving security environments. This study aims to develop a predictive framework capable of providing early warnings of emerging security threats by integrating graph-based relational modeling with temporal sequence learning. We propose a hybrid architecture combining Graph Neural Networks (GNN) with bidirectional Long Short-Term Memory (LSTM) networks, enhanced with an attention-based fusion mechanism to jointly model actor interactions and temporal evolution. The framework leverages large-scale event data from GDELT and ACLED spanning 2015–2025, encompassing over 9.8 million events and 14,532 unique actors, and constructs dynamic, attributed security networks to capture multi-dimensional actor relationships. Experimental results demonstrate that the proposed GNN-LSTM model achieves an overall accuracy of 94.3% and an F1-score of 88.3% for critical threat detection, outperforming traditional machine learning baselines and providing early warnings up to nine days in advance. The model also offers interpretability by highlighting influential actors and key relational patterns contributing to threat escalation. These findings suggest that integrating relational and temporal information through hybrid deep learning architectures significantly enhances predictive accuracy and operational utility in security threat assessment, offering a practical tool for proactive decision-making and resource allocation in complex security environments.
Blockchain-enhanced security framework for defense supply chain management: an AI-driven smart contract approach with distributed ledger technology Hondor Saragih; Jonson Manurung; Hengki Tamando Sihotang; I Made Aditya Pradhana Putra
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Defense supply chains face critical security challenges including counterfeit components, unauthorized access, data tampering, and supply chain attacks that compromise operational integrity and national security. Existing blockchain implementations suffer from limited scalability, inadequate threat detection mechanisms, and insufficient integration with modern AI technologies for real-time security monitoring. This research develops an AI-Enhanced Blockchain Security Framework combining smart contracts with distributed ledger technology specifically designed for defense supply chain management. The framework employs multi-signature authentication, cryptographic verification, and machine learning-based anomaly detection across a three-layer architecture (blockchain layer, security layer, analytics layer). Validation using the DataCo supply chain dataset (180K operations) and Backstabber's knife collection attack patterns (174 documented attacks) demonstrates 94.7% attack detection accuracy, 87.3% reduction in unauthorized access attempts, and 99.2% data integrity verification rate. The system achieved 850 transactions per second (TPS) throughput with 1.8-second average latency and 40% cost reduction compared to traditional centralized systems. Smart contract execution showed 99.96% reliability across 10,000 test scenarios with automated enforcement of security policies. Statistical validation confirmed significant superiority over conventional approaches (p<0.001). Future work includes quantum-resistant cryptography, federated learning for privacy-preserving analytics, cross-chain interoperability, and integration with IoT sensors for real-time supply chain monitoring.
A secure image steganography framework for covert communication using asymmetric encryption and Huffman Compression Aulia Khamas Heikhmakhtiar; Nadiza Lediwara; Sembada Denrineksa Bimorogo
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper presents a secure data-hiding framework that combines asymmetric key cryptography, lossless data compression, and image steganography to enhance the confidentiality and imperceptibility of hidden communications. The proposed method encrypts the secret message using an asymmetric encryption scheme, compresses the resulting ciphertext using Huffman coding, and embeds the compressed data into a digital image using a spatial-domain steganographic technique. This multi-layered approach ensures that both the existence and the content of the secret message are protected. Experimental evaluations were conducted using standard image quality metrics, including Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index Measure (SSIM), to assess visual imperceptibility, along with performance analysis to evaluate computational overhead. The results demonstrate that the proposed method achieves high image quality with minimal distortion while maintaining strong cryptographic security. The integration of compression effectively reduces embedding payload, further improving steganographic performance. The findings indicate that the proposed framework provides a robust and practical solution for secure and covert data transmission.
A multi-objective Particle Swarm Optimization framework for defense logistics decision-making under dynamic and crisis conditions anindito anindito; Adam Mardamsyah; Jonson Manurung
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The complexity of decision-making in defense logistics systems has increased significantly due to demands for cost efficiency, distribution speed, and operational resilience in dynamic and crisis conditions. Conventional optimization approaches generally fail to capture these conflicting objectives simultaneously. This study aims to develop and evaluate a multi-objective optimization framework based on Multi-Objective Particle Swarm Optimization (MO-PSO) to support adaptive and performance-based defense logistics decision-making. The proposed method optimizes three main objective functions, namely minimizing operational costs, minimizing distribution time, and maximizing logistics readiness levels, with numerical parameter adjustments designed for the defense environment. Simulation results show that MO-PSO is capable of producing a more convergent and evenly distributed Pareto Front compared to comparison methods such as NSGA-II and standard MOPSO, with a 12.4–18.7% increase in hypervolume and a 21.3% decrease in solution dominance error. These findings indicate that the proposed approach is more effective in simultaneously balancing multi-objective trade-offs. Practically, the research results provide policy implications for defense planners in designing logistics strategies that are more efficient, responsive, and resilient to operational uncertainty.

Page 1 of 1 | Total Record : 10