Rancang Bangun Sistem Monitoring Deteksi Dini Kebakaran Ruang Server Berbasis Iot
(Candra Supriadi, Priyadi)
DOI : 10.51903/432zjf74
- Volume: 3,
Issue: 3,
Sitasi : 0 03-Jan-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Penelitian ini bertujuan untuk merancang sistem monitoring deteksi dini kebakaran pada ruang server. Kebakaran merupakan ancaman serius yang dapat mengakibatkan kerusakan fatal pada peralatan di ruang server dan potensi kehilangan data pada storage. Untuk menunjang penelitian yang memanfaatkan otomatisasi dan hal yang bersifat real time, maka diperlukan komunikasi antara sensor-sensor dan software yang juga disebut teknologi Internet of Things (IoT). Dalam penelitian ini, sensor-sensor yang dimaksud yaitu Flame Sensor yang berguna sebagai pendeteksi radiasi dari nyala api, Sensor MQ 2 sebagai pendeteksi asap dan Sensor DHT 11 untuk mendeteksi perubahan suhu yang signifikan. Untuk mempermudah dalam pemantauan, juga di lengkapi dengan laman web server yang dapat diakses dengan mudah serta menggunakan beberapa output, antara lain buzzer sebagai sirine bahaya, pilot lamp untuk memberikan sinyal visual adanya suhu yang tidak normal serta outpur exhaust fan untuk membantu sirkulasi udara di dalam ruang server. Implementasi dalam rancang bangun sistem monitoring ini diharapkan dapat membantu memastikan performa server dalamkondisi yang selalu optimal dan mengurangi resiko kebakaran yang lebih fatal serta dapat mengurangi beban kerja staf pengelola di Dinas Kependudukan dan Pencatatan Sipil Kabupaten Semarang.
|
0 |
2025 |
Sistem Pendukung Keputusan Penentuan Pembelian Laptop Kualitas Terbaik Di Guava Komputer Dengan Metode AHP Berbasis Web
(Dani Sasmoko, Candra Supriadi)
DOI : 10.51903/avceqq43
- Volume: 3,
Issue: 3,
Sitasi : 0 03-Jan-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Guava Komputer adalah toko yang menyediakan berbagai produk komputer dan laptop, termasuk laptop, desktop, aksesori, perangkat keras, dan perangkat lunak dari merek-merek terkemuka. Namun, dalam proses bisnisnya, toko ini menghadapi masalah dimana pelanggan sering kesulitan memilih laptop yang sesuai dengan kebutuhan mereka, akibat banyaknya tawaran yang diberikan oleh pegawai toko. Selain itu, pegawai juga merasa kesulitan saat melayani banyak pengunjung. Untuk mengatasi masalah ini, diterapkan sistem pendukung keputusan berbasis web menggunakan metode Analytical Hierarchy Process (AHP), yang dikembangkan dengan bahasa pemrograman PHP dan basis data MySQL. Metode AHP membantu dalam menentukan urutan alternatif dan memilih alternatif terbaik berdasarkan kriteria yang ditetapkan. Hasil penelitian ini menunjukkan bahwa sistem ini efektif membantu pelanggan menemukan laptop yang sesuai dengan kebutuhan mereka, dengan nilai tertinggi yang disarankan. Sistem ini diuji dengan skor validitas 4,63 (sangat baik) dan efektivitas 90% (sangat efektif), serta telah berhasil diuji oleh penguji internal dan eksternal, menunjukkan bahwa sistem ini bekerja sesuai harapan dan memberikan informasi yang valid dan efektif.
|
0 |
2025 |
INOVASI IOT UNTUK PENGELOLAAN DAN KEAMANAN RUANG ARSIP: IMPLEMENTASI ESP32 DENGAN SENSOR API DAN SUHU DHT11
(Candra Supriadi, Dwi Setiawan, Lawrence Adi Supriyono, Safira Fegi Nisrina)
DOI : 10.69714/r6pe6h76
- Volume: 1,
Issue: 4,
Sitasi : 0 31-Oct-2024
| Abstrak
| PDF File
| Resource
| Last.30-Jul-2025
Abstrak:
This study aims to design and develop a prototype IoT-based archive room monitoring system to enhance security and efficiency in archive management at the Village Office of Desa Pingit, Pringsurat District, Temanggung Regency. The system utilizes a UV Flame Detector for fire detection and a DHT11 sensor for monitoring temperature and humidity, with an ESP32 as the main controller connected via Wi-Fi. Integrated with the Telegram app, users can receive real-time notifications and updates on archive room conditions, facilitating remote monitoring. Testing results indicate that the system effectively detects fire presence and accurately provides temperature and humidity updates. This innovation is expected to aid in risk management and archive protection, offering a practical solution for modern archive room management.
|
0 |
2024 |
SISTEM INFORMASI PENGHITUNGAN HASIL PRODUK BERBASIS INTERNET OF THINGS
(Muhammad Abdul Khalim, Andreas Heri Kurniawan, Candra Supriadi)
DOI : 10.55606/jutiti.v2i1.369
- Volume: 2,
Issue: 1,
Sitasi : 0 22-Aug-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Perkembangan teknologi saat ini sangat pesat, hal ini dapat dibuktikan dengan banyaknya alat-alat yang diciptakan manusia untuk mempermudah dalam kehidupan. Didalam industri berbagai macam pekerjaan dilakukan dengan cepat sehingga dengan counter yang bersifat manual akan menghambat seperti barang-barang.Pada PT. APPAREL ONE INDONESIA untuk menghitung sebuah outputan harus di lakukan dengan manual atau dengan menekan satu persatu, maka dari itu peneliti memecahkan solusi dengan membuat sistem penghitungan barang otomatis berbasis Internet of Things (IoT). Sistem utama dirancang menggunakan Sensor ultrasonik,sensor berat dan Nodemcu esp8266. Dengan metode prototype untuk mensimulasikan sistem ini sebelum di terapkan di lapangan produksi untuk mengetahui cara kerja sistem. Berdasarkan pengujian dengan cara object didekatkan dengan sensor ultrasonik dan berat untuk mengetahui jumlah barang secara otomatis yang dihasilkan setiap harinya, tanpa harus melakukan penghitungan secara manual. Selain penghitungan otomatis, sistem ini juga melakukan penginputan secara otomatis dan data tersebut tersimpan di database
|
0 |
2022 |
Enhancing Performance Using New Hybrid Intrusion Detection System
(Candra Supriadi, Charli Sitinjak, Fujiama Diapoldo Silalahi, Nia Dharma Pertiwi, Sigit Umar Anggono)
DOI : 10.51903/jmi.v1i1.134
- Volume: 1,
Issue: 2,
Sitasi : 0 12-Aug-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
|
0 |
2022 |
Enhancing Performance Using New Hybrid Intrusion Detection System
(Candra Supriadi, Charli Sitinjak, Fujiama Diapoldo Silalahi, Nia Dharma Pertiwi, Sigit Umar Anggono)
DOI : 10.51903/jtie.v1i1.134
- Volume: 1,
Issue: 2,
Sitasi : 0 12-Jul-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
|
0 |
2022 |
Sensitivitas Sistem Pencarian Artikel Bahasa Indonesia Menggunakan Metode n-gram Dan Tanimoto Cosine
(Candra Supriadi, Hidriyanto Dwi Purnomo, Irwan Sembiring)
DOI : 10.26623/transformatika.v18i1.2184
- Volume: 18,
Issue: 1,
Sitasi : 0 29-Jul-2020
| Abstrak
| PDF File
| Resource
| Last.09-Jul-2025
Abstrak:
The human need for technology and the availability of adequate infrastructure is evidence that technology is now a part of basic human needs. The increasing number of journals and scientific papers, it must be more selective in selecting and sorting even though there are already many online service providers and journal portals. Research on search engines and plagiarism and recommendation systems has been carried out with various methods deemed appropriate to improve the performance of the system itself, this paper has the purpose of calculating the similarity between one article with another article by implementing n-gram and tanimoto cosine. The number of articles tested was forty-three titles and abstracts, tested fifty times with randomly selected keywords, by breaking down each title and abstract sentence into n characters (n = 2 to 8) including spaces and punctuation, then counted similarity with the query or keyword used for system testing. The test was conducted using several threshold variations from n = 2 to 8. After observing fifty times the threshold test of 0.15 has the highest accuracy at n = 4 at 0.92, the highest precision at n = 3 at 0.42 and the highest recall at the test n = 2 = 0.44 .
|
0 |
2020 |
MANAGEMENT DAN TATA KELOLA AUDIT SISTEM INFORMASI
(Candra Supriadi, Laksamana Rajendran Haidar)
DOI : 10.51903/jtikp.v9i2.160
- Volume: 9,
Issue: 2,
Sitasi : 0 04-Sep-2018
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Abstract The function in the development of information technology in human activities today is indeed developing very rapidly. Information empowerment technology has become a major facility in business activities. In information technology in the part of business contributes greatly to fundamental changes to structural, operational and organizational management. Human resources has provide a large influence in the management of information systems in an information technology organization that develops significantly, it also results in important changes in accounting and financial governance. The function of Information Technology in the development of financial bookkeeping in each part varies. Rapid of development of information systems is in line with the rate of development of financial accounting. In terms of internal control, data processing and improving the quality and quality of information, it is very influential in the development of information technology. Computer-based Accounting Information Systems in generating financial information also affect the audit process. The development of information systems that ultimately provide new opportunities as the auditor
|
0 |
2018 |