Analisis Model Implementasi Tracking Pengiriman Barang Menggunakan Waterfall dan Rapid Application Development
(Unang Achlison, Joseph Teguh Santoso, Khoirur Rozikin, Fujiama Diapoldo)
DOI : 10.51903/teknik.v5i1.758
- Volume: 5,
Issue: 1,
Sitasi : 0 14-Jun-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
System Development Life Cycle (SDLC) is a common methodology used to develop information systems. The purpose of this study is to determine system development between the Waterfall and Rapid Application Development (RAD) models The advantage of using the waterfall method is that the quality of the resulting system will be good because the implementation is carried out in stages. The disadvantage of using the waterfall method is that the system development process takes a long time. The advantage of using the RAD Model method is that the integration of sensors/other applications can be processed faster and more effectively. The disadvantage of using the RAD method is the limitations of payment gateways, and chat bots.
|
0 |
2025 |
Enhancing AI Model Accuracy and Scalability Through Big Data and Cloud Computing
(Haris Jamaludin, Unang Achlison, Nur Rokhman)
DOI : 10.51903/jtie.v3i3.203
- Volume: 3,
Issue: 3,
Sitasi : 0 24-Dec-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Data's exponential growth and cloud computing advancements have significantly impacted artificial intelligence (AI) model development. This study investigates how big data techniques integrated with cloud computing enhance the scalability and accuracy of AI models across sectors such as healthcare, business, and cybersecurity. Adopting a qualitative methodology, the research examines secondary data from 2020–2024, including case studies and literature. Key findings reveal that cloud computing enables large-scale data processing with significant efficiency, achieving average speeds of 20–45 seconds for datasets ranging from 50–120 TB/day. AI model accuracy also improved across sectors, increasing by 20% on average—reaching 92% in cybersecurity, 90% in healthcare, and 85% in business applications. The study identifies deep learning algorithms as pivotal for leveraging cloud computing's flexibility, allowing for advanced data analysis and real-time insights. However, challenges in data security and privacy remain critical concerns. This research contributes by highlighting the transformative role of cloud computing in big data management and AI optimization, offering practical insights into enhancing predictive capabilities while addressing operational cost efficiency through scalable infrastructure. The findings emphasize the necessity of robust security protocols to mitigate risks and ensure sustainable AI applications. Future research should explore sector-specific implementations to refine and expand the practical utility of these integrated technologies.
|
0 |
2024 |
Analisis Pengisian Baterai Aki Kendaraan Listrik Menggunakan Sumber Daya dari Panel Surya dan PLN
(Unang Achlison, Joseph Teguh Santoso, Khoirur Rozikin, Fujiama Diapoldo Silalahi)
DOI : 10.51903/elkom.v17i2.2128
- Volume: 17,
Issue: 2,
Sitasi : 0 23-Dec-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Kendaraan listrik menggunakan sumber tenaga dari energi listrik yang akan diubah menjadi energi kinetik. Sumber energi listrik tersebut disimpan di dalam baterai. Proses pengisian baterai dapat dilakukan dengan menggunakan sumber tenaga dari Panel Surya dan PLN. Berdasarkan analisis hasil pengukuran dapat disimpulkan bahwa (1) pengisian ulang baterai menggunakan Panel Surya dari kondisi minimum hingga maksimum membutuhkan waktu 4 jam 38 menit, dan (2) pengisian ulang baterai menggunakan PLN dari kondisi minimum hingga maksimum membutuhkan waktu 2 jam.
|
0 |
2024 |
A Robust Authentication Method for Electronic Banking Transactions: Two-Way Challenge-Response Approach
(Unang Achlison, Miftahurrohman Miftahurrohman, Edy Siswanto)
DOI : 10.51903/jtie.v3i2.195
- Volume: 3,
Issue: 2,
Sitasi : 0 21-Aug-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The security of electronic banking transactions is becoming increasingly critical due to the rising threat of cyberattacks, which can result in financial and reputational damage to financial institutions. Despite the implementation of various authentication methods, vulnerabilities remain that can be exploited by attackers, particularly in the context of static passwords and tokens. This study aims to address these shortcomings by implementing the Two-Way Challenge-Response method, which offers a more robust and dynamic authentication approach. The method employed in this research involves the exchange of information between the client and server, where the challenges generated are unique to each authentication session. This process not only validates user identities but also ensures that the transmitted information cannot be predicted by third parties. The results of the study indicate that the application of this method significantly reduces the risk of attacks such as identity theft and replay attacks, while also enhancing the speed and efficiency of the authentication process. The implications of these findings suggest that the Two-Way Challenge-Response method can be an effective solution for enhancing the security of electronic banking transactions. By adopting this method, financial institutions can strengthen their security systems, increase user trust, and reduce the potential for losses due to cyberattacks. This research contributes significantly to the development of more secure authentication systems in the digital age
|
0 |
2024 |
ANALISIS KONSUMSI DAYA MOTOR JENIS BRUSSHES DIRECT CURRENT (BDC) DAN BRUSSHES LESS DIRECT CURRENT (BLDC) PADA KENDARAAN LISTRIK
(Unang Achlison, Joseph Teguh Santoso, Khoirur Rozikin, Fujiama Diapoldo)
DOI : 10.51903/jtikp.v15i1.856
- Volume: 15,
Issue: 1,
Sitasi : 0 01-Mar-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Electric vehicles are starting to be widely used among conventional vehicles. The use of a motor as a driver is a very important component for electric vehicles. The battery current and voltage supplied to the motor will determine the performance of the electric vehicle. Based on the analysis of current and voltage measurement results, it can be concluded that (1) the power requirements using the Brusshes Direct Current (BDC) motor type are greater, (2) Electric vehicles are more efficient when using the Brusshes Less Direct Current (BLDC) motor type.
|
0 |
2024 |
Analisis Latensi Video Streaming Antara Jaringan Berbasis Local Area Network dan Web
(Unang Achlison, Joseph Teguh Santoso, Khoirur Rozikin, Fujiama Diapoldo)
DOI : 10.51903/pixel.v15i2.1037
- Volume: 15,
Issue: 2,
Sitasi : 0 24-Jan-2023
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The current era is growing Live streaming which includes audio and video data. This research method collects data through the results of measuring Video Streaming latency (delay time) on variations of Local Area Network and Web-based computer networks. Based on the analysis of measurement results, the latency value (delay time) of Video Streaming on Local Area Network-based devices using Quality of Service (QoS) obtained a value of 8.58 ms and is smaller (optimal) compared to Web-based networks.
Keywords : Quality of Service, latency, LAN, Web
|
0 |
2023 |
Analisis Traffic Data ESP8266 pada Perangkat Middleware
(Unang Achlison, Khoirur Rozikin, Fujiama Diapoldo Silalahi, Yogiswara)
DOI : 10.51903/elkom.v15i1.818
- Volume: 15,
Issue: 1,
Sitasi : 0 01-Jul-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Almost every house already uses a Wifi network as internet access. With the help of this Wifi network, it is used as Middleware that can be controlled and monitored when outside the home. This study engineered data packet traffic using the ESP8266 wifi module on the Middleware device network to find out how fast the data packet capture time using wifi can be controlled and monitored when outside the home. Based on the analysis, the measurement results on the IoT device network to find out how fast the data time using wifi it reaches 2.95 kbps to 7.4 kbps.
|
0 |
2022 |
MEMBUAT REPORT DI VISUAL BASIC .NET MENGGUNAKAN KOMPONEN PRINT DOCUMENT
(Khoirur Rozikin, Unang Achlison)
DOI : 10.51903/informatika.v2i1.138
- Volume: 2,
Issue: 1,
Sitasi : 0 25-May-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Pada Visual Basic .Net untuk untuk membuat Report atau laporan data bisa menggunakan program bantu seperti Crystal Report atau menggunakan komponen di Visual Basic .Net yang bisa digunakan untuk membuat Report. Print Document adalah salah satu komponen di Visual Basic .Net yang bisa digunakan untuk membuat Report, komponen Print Document memiliki beberapa fungsi antara lain mengatur font, mengatur perataan teks, mencetak garis dan mencetak gambar.
Hasil desain Report data dari komponen Print Document tergantung dari jenis printer yang aktif, untuk melihat hasil Report data di layar kita membutuhkan jenis printer yang bisa mencetak dan menampilkan Report Data dalan format PDF, salah satu program yang bisa melakukan hal tersebut adalah AdobeReader.
|
0 |
2022 |
APPLICATION OF SOLAR ENERGY TO MEASURE PHOTOVOLTAIC CAPACITY AND BATTERY OPTIMIZATION
(Unang Achlison, Iman Saufik Suasana, Dendy Kurniawan)
DOI : 10.51903/jtie.v1i1.145
- Volume: 1,
Issue: 1,
Sitasi : 0 26-Apr-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
This study uses the Markov Decision Model (MDP) to implement battery degradation and optimize battery use in Photovoltaic and the battery system model created. The battery optimization scheme for home loads uses the application of solar energy to optimally measure photovoltaic and battery capacity against each other. The different qualities of the standard used in this study are described starting from system characteristics and charge settings to an analysis of MDP and battery degeneration. Various systems undergo a list of analyses to implement awareness reasoning although developing battery volume and photovoltaic for the current system. The parametric span of cosmic and battery central tariff, the tariff of power worn taken away the framework, tariff of battery degeneration, time of year, photovoltaic generator size, battery size, and Health Status (SoH) of batteries were carried out to determine the optimal volume estimate and analyze the trade-offs essential in a mix scheme. This is then used to treasure trove the minimum amount of fee of the scheme with photovoltaic and battery application.
This study support decision of the essential sizing deliberation for photovoltaic and battery-managed home loads linked to the services grid. Insightful that the battery can be used more destructively, also it can be formed lower and run at a greater C speed. This study analyzes actual fog computing research tools and storage composition algorithms for fog computing and develops a fog computing monitoring framework to provide data for fog computing storage composition algorithms. The framework proposed in this study provides granular container virtual hardware resource information and black box monitoring of service layer information associated with microservices. Framework usefulness on Raspberry Pis and CPU overhead of framework tested.
The results of this study present the framework proposed could be used on single-chip microcomputers with relatively inadequate computational performance. In addition, a minimal effect on the battery degeneration system on the MDP decision due to the low system C-rate limit for the battery and interesting behavior of total fee and demand is also found. For future research, testing different maximum C levels should be considered to determine the photovoltaic size and battery system affected. Various battery optimization systems can be proved to check the benefit and disbenefits in the microgrid system case study. Lastly, collecting a scheme for actual-time reproduction to know how nice the operation is performing is the next stage of implementing MDP for battery management and system development.
|
0 |
2022 |
Analisis Implementasi Temperature Screening Contactless berbasis Internet Of Things (IOT) Menggunakan Protokol Message Queue Telemetry Transport (MQTT)
(Unang Achlison, Khoirur Rozikin, Fujiama Diapoldo)
DOI : 10.51903/pixel.v14i2.617
- Volume: 14,
Issue: 2,
Sitasi : 0 27-Dec-2021
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Remote temperature monitoring is needed in hazardous area conditions or fast data retrieval is needed without being limited by distance. This condition can be overcome by monitoring and measuring the temperature from a remote location using internet technology that is currently developing, namely the Internet of things. There are many implementations of remote temperature monitoring systems, but the measurement results of these sensors sometimes have very significant differences even for measuring the temperature of the same object. This study aims to analyze the implementation of an effective and efficient remote temperature monitoring system. The temperature measurement process uses the LM35 and MLX 90614 sensors based on Internet of things technology using the Message Queue Telemetry Transport (MQTT) protocol. After obtaining the results of temperature measurements using different sensors, the measurement results are analyzed and compared with standard temperature measuring instruments to obtain an effective and efficient implementation. Based on the analysis, the results of temperature measurements using the MLX 90614 sensor are effective and efficient sensors.
|
0 |
2021 |