Stunting in toddlers is one of the prevalent issues of malnutrition in Indonesia. The causes of Stunting are diverse, and one contributing factor is the insufficient nutritional intake required for toddlers. The categorization of Stunting nutritional status in toddlers is crucial to identify those experiencing Stunting, enabling appropriate interventions to prevent more serious health problems in the future. This research aims to develop a classification model for short nutritional status in toddlers using the Naive Bayes Classifier method. The data utilized in this study originate from anthropometric measurements of toddlers in the Malebo area, Kandangan, Temanggung, Central Java. The anthropometric data include weight, height, and age of the toddlers. This data is then processed using the Naive Bayes Classifier method to classify the nutritional status of Stunting in toddlers. The results of this research are expected to assist in identifying toddlers experiencing Stunting, facilitating appropriate interventions to prevent more serious health issues in the future. Additionally, the Naive Bayes Classifier method employed can be applied in similar studies to enhance the quality of life, especially for children in Indonesia, particularly in the Malebo area, Kandangan, Temanggung, Central Java.
{"title":"Nutritional Status Classification Of Stunting In Toddlers Using Naive Bayes Classifier Method","authors":"Risky Devandra, Enny Itje","doi":"10.51903/jtie.v3i1.154","DOIUrl":"https://doi.org/10.51903/jtie.v3i1.154","url":null,"abstract":"Stunting in toddlers is one of the prevalent issues of malnutrition in Indonesia. The causes of Stunting are diverse, and one contributing factor is the insufficient nutritional intake required for toddlers. The categorization of Stunting nutritional status in toddlers is crucial to identify those experiencing Stunting, enabling appropriate interventions to prevent more serious health problems in the future. This research aims to develop a classification model for short nutritional status in toddlers using the Naive Bayes Classifier method. The data utilized in this study originate from anthropometric measurements of toddlers in the Malebo area, Kandangan, Temanggung, Central Java. The anthropometric data include weight, height, and age of the toddlers. This data is then processed using the Naive Bayes Classifier method to classify the nutritional status of Stunting in toddlers. The results of this research are expected to assist in identifying toddlers experiencing Stunting, facilitating appropriate interventions to prevent more serious health issues in the future. Additionally, the Naive Bayes Classifier method employed can be applied in similar studies to enhance the quality of life, especially for children in Indonesia, particularly in the Malebo area, Kandangan, Temanggung, Central Java.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"20 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140264001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nuris Dwi Setiawan, Bagus Sudirman, Sigit Umar Anggono
Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.
{"title":"IMPACT OF EMBEDDED CLS ON EYE TRACKING REPLICATION","authors":"Nuris Dwi Setiawan, Bagus Sudirman, Sigit Umar Anggono","doi":"10.51903/jtie.v1i3.148","DOIUrl":"https://doi.org/10.51903/jtie.v1i3.148","url":null,"abstract":"Using different programming languages when software advancement is a familiar method in current software advancement. Nevertheless, using various languages that can hinder developer capacity is not widely known. This research simulated an unplanned controlled study examining the adoption of various languages in the situation of a directory programming task. Participants in this study were given programming tasks written in Java and one of three SQL-like embedded languages. Simple “SQL” over authority, “Java” program only, and a more Java-like hybrid embedded language. Furthermore, to transcribe the responses to the online quest and the participators' “task” solutions, the participators' eye movements were also recorded with an eye tracker. \u0000 “Eye Tracker” or in this study call as “Eye-Trc” is the methodology of the study of software development that has developed nowadays and grants more in-depth info about how developers accomplish programming tasks. This Eye-Trc method is used as a data collection method in this study. Eye-Trc data was get by thirty-one participators (university background and Industrial Background) for different programming tasks. To analyze the impact of inter-group inconstant and professional experience and in-group “task” variables on the dependent variable Time in completion, this study used a mixed model ANOVA. The outcome of this study indicates that an important impact on productivity was not found, this is different from the initial research because of the language used. \u0000However, the same effect was found from the participators' expertise in programming activity indicating that more competent programmers were easy to full fill “polyglot programming tasks” more efficiently. In addition, it was raised that participators viewed the specimen code with the same proportion (time) for bringing “task” reckless of skills or language alternative provided. dominant-stage exploration management also remains mostly consistent over the experiences or language alternatives. Overall, it can be concluded that the programming stage of the linguist doesn’t have an important impact. The top-stage strategies that participators used came to be identical reckless of the language alternative presented to them. As a suggestion for future research, the impact of various characteristics of polyglot programming languages should be studied in depth for the conclusions reached to remain correct across various polyglot programming contexts.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense. This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.
{"title":"THREAT ATTRIBUTES HANGING IN THE WILD ANDROID","authors":"Irda Yunianto, Mars Caroline Wibowo, Budi Raharjo","doi":"10.51903/jtie.v1i3.150","DOIUrl":"https://doi.org/10.51903/jtie.v1i3.150","url":null,"abstract":"Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense. \u0000This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maya Utami Dewi, Sulartopo Sulartopo, Ahmad Solechan
The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.
{"title":"REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS","authors":"Maya Utami Dewi, Sulartopo Sulartopo, Ahmad Solechan","doi":"10.51903/jtie.v1i3.147","DOIUrl":"https://doi.org/10.51903/jtie.v1i3.147","url":null,"abstract":"The main threat by comparable methods lately is the temporary downtime for accurate-current network dispatch errors. Throughout a temporary outage, Power Electronic based power sources stop operating, giving rise to possible security defiance towards the network, in this research, the potentially viable choice to serve continuous work temporarily for the scheme is provided with consideration of identifying upgrades to existing photovoltaic generators (photovoltaic generators discrete) and an upgrade in the separate establishment of existing “photovoltaic” and “Energy Storage Systems” discrete hybrid photovoltaics. This study aims to find a series of power sources with Power Electronic interfaces that are connected to a low “Short Circuit Ratio” network and “Low Inertia” grid to operate without a moment's stoppage. \u0000The proposed method was proved by adopting PSS/e on a method where power electronics-occupying assets produce the majority of energy. Inverter models along with temporary shutdown through an equal 3-period fault were advanced in PSS/e. together with increasing infiltration of “Power Electronics” established multitude and resources, progressive completion is needed to improve network stability in low a) areas and low inertia networks. The requirements for progressive solvent arose out of the steady variation in the paradigm of the power grid from the dominant systems of traditional electric machines to the high penetration of systems based on power electronics. A technical comparison was made between distinct categories of resolution (divergent photovoltaic and divergent hybrid photovoltaic) to operate a photovoltaic generator's weak “Short Circuit Ratios” also “Low Inertia” grating (grid). \u0000The results of this study indicate that the proposed solution is calculated nether disparate running term and error class adopting the Electromagnetic Transient model. Moreover, to analyze distinct solvents, a specialized proportion is served on discrete hybrid photovoltaic generators. The proposed solution is the development of conventional increase as well as contemporary condensers, deter capacitors, and reducers to advanced photovoltaic generators and hybrid photovoltaic generators to provide voltage support to ensure continuous working through lopsided dispatch streak disturbances, and another solution is photovoltaic-energy generation. Integrated storage system connected to High Voltage dc and high voltage ac transmission network.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research serves the virtual Synchronous Generator finding and oversight building of the Multi-port Autonomous Reconfigurable Solar (MARS) structure to bring backing to the alternating-curring network under various events on the network and presents a “model-based predictive control” (MBPC) oversight finding for the MARS structure to bring backing to the MARS structure alternating-curring network while the density innovation is recognized in the system. The main objective is to nominate a “model-based predictive control” leading oversight design that can bring density backing while unexpected density alteration. In this study, a comprehensive application of a virtual Synchronous Generator-based oversight innovation for the MARS structure is given. The expected oversight finding and control architecture of the MARS structure is evaluated by simulation on the “PSCAD”/EMTDC simulation platform to show performance under various operating conditions and calculated in the “Opal-RT” offline simulation model that also can be adapted to complete the certified “control-hardware -in-the- loops” (c-HIL). The dominant density backing performance is a conceivable combined improvement for each current network-unified capability transistors system. By increasing infiltration of transistors system-based stuff, passivity and immediate density feedback potentially decrease. Leading “model-based predictive control” (MBPC) finding to provide density backing to current topologies of unified “photovoltaic” (PV), battery-based “energy storage system”s” (ESS), and “high-voltage direct current” (HVDC) method named “multi-port autonomous reconfigurable solar” (MARS) is suggested. The expected oversight finding for regularly based on virtual Synchronous Generator-based oversight. Simulation of the MARS-HVDC method by the recommended oversight approach was assumed and authorized for MARS related to a “small short circuit ratio” (SCR) network in a “PSCAD”/EMTDC assumed habitat. The expected oversight finding displays superior work in the phrase of increasing rock bottom frequency and increasing constant-area frequency concerning no density oversight. The results of this research indicate that the MARS architecture by Synchronous Generator -based oversight brings exceptional heat backing by inserting higher active potential to the structure while equitable stage error compared to the Virtual Synchronous Generator - based oversight mode. The Synchronous Generator-based oversight mode is also balanced and brings better work in the phase of density rock bottom and balance-area increase. In the great feedback, the Synchronous Generator-based oversight mode is good than the Virtual Synchronous Generator-based oversight mode for each short circuit ratio set tested. MBPC-based oversight is entrenched in a virtual Synchronous Generator-based oversight algorithm. The recommended oversight innovation and control architecture of the MARS structure was calculated on the MARS structu
{"title":"VIRTUAL SYNCHRONOUS GENERATOR-BASED OVERSIGHT AND PREDICTIVE MODELS FOR MARS","authors":"Migunani Migunani, Moh Muthohir, Dwi Setiawan","doi":"10.51903/jtie.v1i3.146","DOIUrl":"https://doi.org/10.51903/jtie.v1i3.146","url":null,"abstract":"This research serves the virtual Synchronous Generator finding and oversight building of the Multi-port Autonomous Reconfigurable Solar (MARS) structure to bring backing to the alternating-curring network under various events on the network and presents a “model-based predictive control” (MBPC) oversight finding for the MARS structure to bring backing to the MARS structure alternating-curring network while the density innovation is recognized in the system. The main objective is to nominate a “model-based predictive control” leading oversight design that can bring density backing while unexpected density alteration. In this study, a comprehensive application of a virtual Synchronous Generator-based oversight innovation for the MARS structure is given. The expected oversight finding and control architecture of the MARS structure is evaluated by simulation on the “PSCAD”/EMTDC simulation platform to show performance under various operating conditions and calculated in the “Opal-RT” offline simulation model that also can be adapted to complete the certified “control-hardware -in-the- loops” (c-HIL). \u0000The dominant density backing performance is a conceivable combined improvement for each current network-unified capability transistors system. By increasing infiltration of transistors system-based stuff, passivity and immediate density feedback potentially decrease. Leading “model-based predictive control” (MBPC) finding to provide density backing to current topologies of unified “photovoltaic” (PV), battery-based “energy storage system”s” (ESS), and “high-voltage direct current” (HVDC) method named “multi-port autonomous reconfigurable solar” (MARS) is suggested. The expected oversight finding for regularly based on virtual Synchronous Generator-based oversight. Simulation of the MARS-HVDC method by the recommended oversight approach was assumed and authorized for MARS related to a “small short circuit ratio” (SCR) network in a “PSCAD”/EMTDC assumed habitat. The expected oversight finding displays superior work in the phrase of increasing rock bottom frequency and increasing constant-area frequency concerning no density oversight. \u0000The results of this research indicate that the MARS architecture by Synchronous Generator -based oversight brings exceptional heat backing by inserting higher active potential to the structure while equitable stage error compared to the Virtual Synchronous Generator - based oversight mode. The Synchronous Generator-based oversight mode is also balanced and brings better work in the phase of density rock bottom and balance-area increase. In the great feedback, the Synchronous Generator-based oversight mode is good than the Virtual Synchronous Generator-based oversight mode for each short circuit ratio set tested. MBPC-based oversight is entrenched in a virtual Synchronous Generator-based oversight algorithm. The recommended oversight innovation and control architecture of the MARS structure was calculated on the MARS structu","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph Teguh Santoso, Fujiama Diapoldo Silalahi, Laksamana Rajendra Haidar
Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
{"title":"CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM","authors":"Joseph Teguh Santoso, Fujiama Diapoldo Silalahi, Laksamana Rajendra Haidar","doi":"10.51903/jtie.v1i3.149","DOIUrl":"https://doi.org/10.51903/jtie.v1i3.149","url":null,"abstract":"Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. \u0000The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. \u0000The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Slamet Riyadi, Yanuar Zulardiansyah Arief, Antonius Darma Setiawan, Agung Pangestu, Rosyid Ridlo Al-Hakim
Electroplating was the process of coating metal surfaces using the electrochemical method. We used alkaline zinc (Zn2+) plating that was anti-corrosion coating, cheapest, evenly adhesion, as well as better-looking crushing. This study aims to test and measure the thickness of the layer on spark plugs with variations in different electrical currents 300, 400, and 500A and increased hours during the coating process, investigate the corrosion resistance of white rust on the surface and analyze the changes in alkaline zinc concentration and temperature that affect the thickness of the layer, respectively. The results, such as 1st sample 13 pcs, 300A, and thickness of 7.26-micron with white rust 9 pcs. 2nd sample 13 pcs, 400A, and thickness of 9.15-micron white rust 5 pcs. 3rd sample 13 pcs, 500A, and thickness of 12.75-micron white rust 3 pcs. The high electric current (500A) and 45 hours of the experiment would influence the lowest white rust corrosion level. The high alkaline zinc solution with an optimum 36°C solution temperature and 500A electric current would undoubtedly deposit the white rust until 3 pcs.
{"title":"High electric current and hours can increase layer thickness and decrease white rust corrosion using Zn2+ electroplating","authors":"Slamet Riyadi, Yanuar Zulardiansyah Arief, Antonius Darma Setiawan, Agung Pangestu, Rosyid Ridlo Al-Hakim","doi":"10.51903/jtie.v1i2.140","DOIUrl":"https://doi.org/10.51903/jtie.v1i2.140","url":null,"abstract":"Electroplating was the process of coating metal surfaces using the electrochemical method. We used alkaline zinc (Zn2+) plating that was anti-corrosion coating, cheapest, evenly adhesion, as well as better-looking crushing. This study aims to test and measure the thickness of the layer on spark plugs with variations in different electrical currents 300, 400, and 500A and increased hours during the coating process, investigate the corrosion resistance of white rust on the surface and analyze the changes in alkaline zinc concentration and temperature that affect the thickness of the layer, respectively. The results, such as 1st sample 13 pcs, 300A, and thickness of 7.26-micron with white rust 9 pcs. 2nd sample 13 pcs, 400A, and thickness of 9.15-micron white rust 5 pcs. 3rd sample 13 pcs, 500A, and thickness of 12.75-micron white rust 3 pcs. The high electric current (500A) and 45 hours of the experiment would influence the lowest white rust corrosion level. The high alkaline zinc solution with an optimum 36°C solution temperature and 500A electric current would undoubtedly deposit the white rust until 3 pcs.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We reanalyze the effect of silver (Ag2+) and copper (Cu2+) coating solutions for the thickness of the layer on aluminum (Al) materials with increased electrical currents 0.4A, 0.8A, 1A, 1.2A, and 1.4A and increased thickness layer (10µm, 20µm, 30µm, 40µm, and 50µm), as well as the previous study was conducted. We used the electroplating method and thickness test, as well as the Brinell hardness test for both coating solutions. The results show statistically significant (p-value < 0.05, one-tailed) between high electric current and aluminum (Al) coating process with silver (Ag2+) and copper (Cu2+), as well as silver (Ag2+), get the faster coating process time. The Brinell hardness test shows a statistically significant difference (p-value < 0.05, one-tailed) between the high thickness layer and HB value (Ag-coated and Cu-coated).
{"title":"Analysis of Ag2+ and Cu2+ electroplating on the aluminum layer thickness level: A reanalysis","authors":"Aming Sungkowo, Yanuar Zulardiansyah Arief, Rosyid Ridlo Al-Hakim","doi":"10.51903/jtie.v1i2.139","DOIUrl":"https://doi.org/10.51903/jtie.v1i2.139","url":null,"abstract":"We reanalyze the effect of silver (Ag2+) and copper (Cu2+) coating solutions for the thickness of the layer on aluminum (Al) materials with increased electrical currents 0.4A, 0.8A, 1A, 1.2A, and 1.4A and increased thickness layer (10µm, 20µm, 30µm, 40µm, and 50µm), as well as the previous study was conducted. We used the electroplating method and thickness test, as well as the Brinell hardness test for both coating solutions. The results show statistically significant (p-value < 0.05, one-tailed) between high electric current and aluminum (Al) coating process with silver (Ag2+) and copper (Cu2+), as well as silver (Ag2+), get the faster coating process time. The Brinell hardness test shows a statistically significant difference (p-value < 0.05, one-tailed) between the high thickness layer and HB value (Ag-coated and Cu-coated).","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IoT technology is useful for chicken farming to control the condition of the farm concerning some problems such as odour, temperature fluctuations and feeding time system. This study used MQ135 to detect ammonia odour level, DHT11 to check room temperature, and RTC3231 to regulate feeding time. The data obtained from the sensor was sent by wemos to the fire base and MySQL to be read on android so that it can be monitored directly by the breeder. When the ammonia level is above normal it will turn on the odour fan. If DHT11 reaches the value above 300C, it will turn on the cooling fan, and turn on the heating light when the temperature is below 250C. As RTC3231 sets the time at 07.00 and 14.00, the chicken feeder will automatically open to feed the chickens according to the time set. Table 1 and 2 show that the experiment obtained a value of 100% working well. This study succeeded in monitoring environmental conditions through Android and executing automatic feeding at the predetermined time. Thus, it can be concluded that the use of IoT technology for monitoring and feeding system automation in chicken farms is highly recommended.
{"title":"IoT-Based System of Monitoring Realtime Air Quality with MQ135 and Automatic Chicken Feeding","authors":"Dani Sasmoko, Reni Veliyanti, Rozi Azwar Pradana","doi":"10.51903/jtie.v1i1.136","DOIUrl":"https://doi.org/10.51903/jtie.v1i1.136","url":null,"abstract":"IoT technology is useful for chicken farming to control the condition of the farm concerning some problems such as odour, temperature fluctuations and feeding time system. This study used MQ135 to detect ammonia odour level, DHT11 to check room temperature, and RTC3231 to regulate feeding time. The data obtained from the sensor was sent by wemos to the fire base and MySQL to be read on android so that it can be monitored directly by the breeder. When the ammonia level is above normal it will turn on the odour fan. If DHT11 reaches the value above 300C, it will turn on the cooling fan, and turn on the heating light when the temperature is below 250C. As RTC3231 sets the time at 07.00 and 14.00, the chicken feeder will automatically open to feed the chickens according to the time set. Table 1 and 2 show that the experiment obtained a value of 100% working well. This study succeeded in monitoring environmental conditions through Android and executing automatic feeding at the predetermined time. Thus, it can be concluded that the use of IoT technology for monitoring and feeding system automation in chicken farms is highly recommended.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agus Waryanto, Antonius Juniadhi Soekendar, Ely Andra Widharta, Greget Widhiati, Irdha Yunianto
Power conservation is a vibrant area of research on wireless sensor networks. Several research papers have shown that using mobile sync in the sensor field, which collects data from sensor nodes via single or multi-hop communication, can save significant energy. However, sinks move slowly, which increases sensor network delays, especially in delay-sensitive applications. To address this issue, various rendezvous-based techniques are described in which a subset of sensor nodes are selected from the field as rendezvous points (RPs). The remaining nodes transfer the captured data to the next RP, where the data is buffered. The RP is then used to build a path for the mobile sink to tour and collect the buffered data. This article describes various rendezvous-based techniques and analyzes their strengths and weaknesses in terms of energy savings.
{"title":"ANALYSIS RENDEZVOUS-BASED TECHNIQUES RELATE TO POWER CONSERVATION","authors":"Agus Waryanto, Antonius Juniadhi Soekendar, Ely Andra Widharta, Greget Widhiati, Irdha Yunianto","doi":"10.51903/jtie.v1i1.138","DOIUrl":"https://doi.org/10.51903/jtie.v1i1.138","url":null,"abstract":"Power conservation is a vibrant area of research on wireless sensor networks. Several research papers have shown that using mobile sync in the sensor field, which collects data from sensor nodes via single or multi-hop communication, can save significant energy. However, sinks move slowly, which increases sensor network delays, especially in delay-sensitive applications. To address this issue, various rendezvous-based techniques are described in which a subset of sensor nodes are selected from the field as rendezvous points (RPs). The remaining nodes transfer the captured data to the next RP, where the data is buffered. The RP is then used to build a path for the mobile sink to tour and collect the buffered data. This article describes various rendezvous-based techniques and analyzes their strengths and weaknesses in terms of energy savings.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}