Jurnal Ilmiah Teknik http://journal.admi.or.id/index.php/JUIT <div style="border: 3px #086338 Dashed; padding: 10px; background-color: #dedede; text-align: left;"> <ol> <li><strong>Journal Title </strong>: Jurnal Ilmiah Teknik (JUIT)</li> <li><strong>Initials </strong>: JUIT</li> <li><strong>Frequency </strong>: Januari, Mei, September</li> <li><strong>Print ISSN </strong>: 2828-6936</li> <li><strong>Online ISSN </strong>: 2828-6901</li> <li><strong>Editor in Chief </strong>: Ahcmad Fauzan, ST., MT</li> <li><strong>DOI </strong>: 10.56127</li> <li><strong>Publisher </strong>: Asosiasi Dosen Muda Indonesia</li> </ol> </div> <p style="text-align: justify;"><strong>Jurnal Ilmiah Teknik (JUIT)</strong>,<strong> </strong>ISSN: <a href="https://issn.brin.go.id/terbit/detail/20220308050951950" target="_blank" rel="noopener">2828-6936</a> (cetak), ISSN: <a href="https://issn.brin.go.id/terbit/detail/20220308100970340" target="_blank" rel="noopener">2828-6901</a> (online) adalah jurnal yang ditujukan untuk publikasi artikel ilmiah yang diterbitkan oleh Asosiasi Dosen Muda Indonesia dan di payungi Oleh Yayasan Dosen Muda Indonesia. Jurnal ini adalah jurnal Ilmu Teknik yang bersifat peer-review dan terbuka. Bidang kajian dalam jurnal ini termasuk sub rumpunIlmu Teknik Mesin, Elektro, Kimia, Sipil, Metalurgi, Teknik Industri, Teknik Informatika, Sistem Informasi dan Ilmu Komputer. Jurnal Ilmu Teknik menerima artikel dalam bahasa Inggris dan bahasa Indonesia dan diterbitkan 3 kali setahun: <strong>Januari, Mei, September.</strong> Silakan buat Artikel Template baru lalu kirimkan naskah Anda.</p> <div> <p><strong style="font-size: 0.875rem;">Indexed by:</strong></p> </div> <div> <table style="height: 133px;" width="688"> <tbody> <tr> <td style="width: 132.275px;"><a href="https://scholar.google.com/citations?user=W8cXS8kAAAAJ&amp;hl=id" target="_blank" rel="noopener"><img src="https://ejurnal.politeknikpratama.ac.id/public/site/images/admin/gs-88b3394f11408605d6e41cdbd883722f.jpg" alt="" width="1536" height="576" /></a></td> <td style="width: 132.275px;"><a href="https://garuda.kemdikbud.go.id/journal/view/26245" target="_blank" rel="noopener"><img src="https://ejurnal.politeknikpratama.ac.id/public/site/images/admin/garuda-978c6e33dc35b905c8fd7ca95049331f.jpg" alt="" width="1280" height="480" /></a></td> <td style="width: 132.275px;"><a href="https://journals.indexcopernicus.com/search/details?id=123191&amp;lang=en" target="_blank" rel="noopener"><img src="https://ejurnal.politeknikpratama.ac.id/public/site/images/admin/copernicus-36d5958ba63ae6b1a7c4fd8d5f2c8a89.png" alt="" width="1536" height="576" /></a></td> <td style="width: 132.275px;"><img src="https://ejurnal.politeknikpratama.ac.id/public/site/images/admin/ddimension.png" alt="" width="1536" height="576" /></td> <td style="width: 132.3px;"> </td> </tr> <tr> <td style="width: 132.275px;"> </td> <td style="width: 132.275px;"> </td> <td style="width: 132.275px;"> </td> <td style="width: 132.275px;"> </td> <td style="width: 132.3px;"> </td> </tr> </tbody> </table> </div> Asosiasi Dosen Muda Indonesia en-US Jurnal Ilmiah Teknik 2828-6936 HASIL ANALISIS STATISTIK, DIFERENSIAL, DAN KUALITAS CITRA TERHADAP KOMPOSISI LOGISTIC CIRCLE MAP http://journal.admi.or.id/index.php/JUIT/article/view/456 <p>The problem of data security is still a matter of concern in the digital era like today. An effective security method is needed and it is difficult to break into. Encryption is an effective method of ensuring data security. The encryption algorithm is built using a chaotic cipher base so that performance in securing data and information increases. The new chaotic composition resulting from two chaotic maps will have better randomness. Logistic Map and Circle Map were chosen because they have good randomness. The new chaotic composition is called the Logistic Circle Map (LC Map). By bifurcation diagram test, Lyapunov Exponent, and NIST random test, the best density occurs at X_0=0.9 , K = 1000, r = 3.7 and Ω = 0.4. The new chaotic composition parameters have passed all 16 NIST (National Institute of Standards and Technology) tests. There are four parameters used in this study in order to obtain a sufficiently high key space, namely 1.296 ×〖 10〗^84 combinations and having a high level of lock sensitivity of 10−17. The image encryption algorithm of the LC Map function has high resistance against various attacks. This can be proven by carrying out key space tests, sensitivity tests for key spaces, histogram tests, entropy, correlation coefficients, and differential tests using the UACI NPCR. The test results on digital image decryption using the Mean Square Error (MSE) show a result of 0 and the Peak Signal to Noise Ratio (PSNR) shows a result of ∞. That is, the encrypted image is similar to the original image.</p> Makmun Makmun Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 01 10 10.56127/juit.v2i1.456 APLIKASI PEMBELAJARAN HURUF HIJAIYAH BERBASIS ANDROID http://journal.admi.or.id/index.php/JUIT/article/view/473 <p>Making the Belajar Mengaji application discusses learning hijaiyah letters. This study aims to help parents introduce hijaiyah letters to their children. In addition, it can make it easier for users to understand and learn hijaiyah letter material and its punctuation anywhere and anytime. The Belajar Mengaji application can be used by users to view material in the form of hijaiyah letters and punctuation marks and is equipped with practice questions about hijaiyah letters to hone users' skills, which are also equipped with sound effects.Belajar Mengaji application was created using Android Studio with Java and XML Programming Language. The method used in this study is the SDLC (System Development Life Cycle) method, which consists of planning, analysis, design, manufacture, and implementation, as well as device testing. This application has been successfully created and implemented on an Android smartphone with a minimum layer criterion of 5 inches and the Android 5.1 (Lollipop) operating system, so that it is running as expected.</p> Widya Khafa Nofa Dewi Anggraini Puspa Hapsari Dinda Salsabila Putri Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 11 19 10.56127/juit.v2i1.473 PROSES PEMBUATAN HOUSING BEARING GEARBOX 3Z2M21 DENGAN MATERIAL FCD 400 http://journal.admi.or.id/index.php/JUIT/article/view/474 <p>Fundamental, detailed and in-depth understanding of technology is carried out through the use of concrete pumps used to move fluid from one place to a higher place, high pressure and circulation. One of the important components of the pumping system in the industry is the Gearbox Bearing Housing which functions as a bearing housing so that the bearing can move and continue the shaft work system on the pump. The material used to make the Gearbox Bearing Housing is based on FCD 400. The manufacturing process for the Gearbox Bearing Housing is a lathe where in this process the workpiece is fed by rotating the workpiece and then touching it to a chisel which is moved in translation parallel to the axis of rotation. of the workpiece. The outer diameter is 700 mm, while the inner diameter is 340 mm and D2 is 440 mm. Drilling Machine Process, the machining process is the process of expanding or enlarging a hole that can be done with a drill bar. For the size of the holes, namely the diameter of 22 mm as many as 16 holes, the diameter of 20 mm as many as 16 holes and for the diameter of 12 mm there are 4 holes. Grinding Machine Process is a finishing process that is used to remove parts of the workpiece that are uneven. In the manufacture of Gearbox Bearing Housing, checks are carried out on the workpiece to determine whether or not an item is produced. If the workpiece is said to be feasible, it will be packaged to be marketed, if not, the workpiece will be destroyed.</p> Abdul Rahman Agung Ramadhan Eko Aprianto Nugroho Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 20 28 10.56127/juit.v2i1.474 SISTEM PENDETEKSI WAJAH BERMASKER SECARA REAL TIME MENGGUNAKAN METODE CNN http://journal.admi.or.id/index.php/JUIT/article/view/475 <p>In this study, a masked face detection system using the Convolutional Neural Network (CNN) method was tested. System testing was carried out to determine the success of the CNN method on a masked face detection system in real time if the mouth and nose parts of the face are not covered or covered by a mask or by anything other than a mask. This research was divided into 3 stages, namely dataset training, face detection, and testing in real time with various facial positions. This system successfully detects whether a face is masked or not in the dataset model with an accuracy of 99%. In real time, this system has succeeded in detecting well at various positions of facial appearance and on faces that are covered by a mask or hand on the nose and mouth.</p> Nurul Adhayanti Fathan Triyanto Nugroho Romdhoni Susiloatmadja Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 29 34 10.56127/juit.v2i1.475 ANALISIS USABILITY LAYANAN BCA MOBILE BANKING BERDASARKAN PERSEPSI PENGGUNA MENGGUNAKAN HEURISTIC EVALUATION http://journal.admi.or.id/index.php/JUIT/article/view/469 <p>BCA is the biggest private bank in Indonesia, which is the choice for the public and has an important role in the Indonesian economy. One of the major services is BCA Mobile Banking. BCA also wants the growth of digital services based on the user experience of its customers who feel comfortable, safe and loyal. The purpose of this research is to analyze the interface design and usability of BCA Mobile Banking services using the Heuristic Evaluation method and to analyze the influence of sex, age and duration of user experience.</p> <p>The research method consists of 5 steps, develop a research model and compile the instrument, test the validity and reliability of the instrument, collect the data, process the data and analyze the data.</p> <p>The results of this research are that users have a high level of satisfaction with BCA m-banking services, the level of satisfaction is influenced by sex, age and duration of user experience in service. BCA Mobile Banking has implemented interface design and usability.</p> Aviarini Indrati Bayu Saputra Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 35 42 10.56127/juit.v2i1.469 PENJADWALAN PROYEK PEMBUATAN ROLLING MACHINE MENGGUNAKAN METODE JALUR KRITIS http://journal.admi.or.id/index.php/JUIT/article/view/480 <p>Scheduling is very important in the basis of project planning so that it can run smoothly and can be completed on time. Before the project is carried out, it is necessary to have a project management stage which includes the planning stage, the scheduling stage and the coordination of these stages. Estimation of completion time for the production of rolling machine projects scheduled by PT. X is 36 days, the actual time in working on the rolling machine project is 32 days, then the estimated time for completing the iron rolling machine project using Microsoft Project is 27 days. The sequence of work processes using the critical path starts with number 1.1-1.2-2.1-4.1-4.2-4.3-4.7-4.8-6.1-6.2-6.3-7.1-7.2-7.3-7.4-7.5-7.6-7.7-7.8-7.9-7.10-8.1-8.2.</p> Ratih Wulandari Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 43 48 10.56127/juit.v2i1.480 SISTEM DETEKSI PEMAKAIAN MASKER PADA WAJAH SECARA REAL TIME MENGGUNAKAN FRAMEWORK TENSORFLOW DAN LIBRARY OPENCV http://journal.admi.or.id/index.php/JUIT/article/view/496 <p>At the end of December 2019, there was a mysterious virus that attacked the city of Wuhan in China. Which at the beginning of 2020 the new virus was a new type, namely (SARS-CoV-2) and the disease was called Coronavirus disease 19 (COVID-19). The World Health Organization (WHO) provides instructions to maintain a minimum distance of 1 meter, always wash hands with soap, and always use a mask when leaving the house. The purpose of this writing is to create a program to detect wearing masks on the face, which makes it easier for users to detect who is wearing a mask or not. The method used in this writing uses the SDLC model or System Data Life Cycle by carrying out five stages namely, planning, analysis, design, implementation, and testing. The design uses flowcharts and navigation structures as well as two UML diagrams, namely use case diagrams and activity diagrams. Then for making the program using Python as a programming language, Tensorflow as a framework, Keras and Opencv as libraries, and Visual Studio Code as a text editor. From the results of trials that have been carried out using three different devices and with different specifications, this system can detect mask objects very well and this detection system can also detect more than one person wearing a mask, or not wearing a mask.</p> Althaf Adhari Rachman Ivan Maurits Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 49 59 10.56127/juit.v2i1.496 PERENCANAAN JADWAL INDUK PRODUKSI PADA PRODUK TEMPE DI RUMAH TEMPE INDONESIA http://journal.admi.or.id/index.php/JUIT/article/view/497 <p>Rumah Tempe Indonesia is a business sector that produces various processed soybeans, one of which is tempeh with two brands, namely Tempekita and Tempe Kim's. Rumah Tempe Indonesia has also started implementing a make to stock production system in its business processes. However, until now Rumah Tempe Indonesia has not implemented a specific method to support the production system it implements. This production system can cause problems including the amount of production that does not match consumer needs, causing a shortage or excess of products which are very inefficient for the company's business continuity.</p> <p>These problems can be solved through production planning using the selected aggregate planning strategy or the strategy that produces the lowest total production costs. This strategy is implemented in the preparation of a production master schedule to estimate the quantity of tempe products that must be met in the next period. In this study, two strategies were used, namely the level strategy with a production cost of 1,403,904,740.04, - and the chase strategy with a production cost of 1,404,149,544.96, -. Based on these considerations of production costs, the strategy chosen to be continued in making the master production schedule is the level strategy.</p> <p>The Master Production Schedule is made based on the calculation results of the disaggregation process on the production units of each brand for each period. The amount of Tempekita and Tempe Kim's production based on the Master Production Schedule (JIP) respectively for the 1st period was 2790 and 13099 pcs, the 2nd period was 1901 and 10624 pcs, the 3rd period was 2104 and 10421 pcs, the 3rd period 4th period 3224 and 8897 pcs, 5th period 4196 and 8329 pcs, 6th period 4117 and 8004 pcs, 7th period 3735 and 8790 pcs, 8th period 4799 and 7726 pcs, 7th period 9th of 3700 and 7613 pcs, 10th period of 5409 and 7116 pcs, 11th period of 5329 and 6792 pcs, 12th period of 5070 and 7455 pcs.</p> Bellinda Ayustina Arief Nurdini Ardhy Lazuardy Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 60 75 10.56127/juit.v2i1.497 APLIKASI MEMO ONLINE (E-MEMO) LABORATORIUM TEKNIK INFORMARTIKA BERBASIS ANDROID http://journal.admi.or.id/index.php/JUIT/article/view/503 <p>Practicum is one of the academic activities that must be carried out by students at Gunadarma University. It's not just one department that does practicums, but all majors do practicums. One of the practicums that students must do is the Informatics Engineering Laboratory which is intended for students of the Faculty of Industrial Technology. In practicums in several majors, including practicum in the Informatics Engineering Laboratory, if the practitioner does not take part in the practicum for any reason, except for getting a special case, they must make a memo as the practitioner's identity to take part in the practicum again. To make a memo, the practitioner must come to the Informatics Engineering Laboratory Staff room to make a memo. The practitioner can make memos if the practitioner follows the specified time to make memos. Not only does the memo maker have to comply with the time the memo is written, but taking memos also must comply with the time the memo is taken. It can take quite a long time to get the memo because you have to come on time to the Informatics Engineering Laboratory Staff room and wait to pick up the memo. Therefore, the author took the initiative to create a mobile application called "Online Memo Application (E-Memo) Android Based Informatics Engineering Laboratory". With this application, the practitioner can make memos anywhere and anytime and also the practitioner can come to the Informatics Engineering Laboratory Staff room to validate the memo which is useful for checking the authenticity of the memo. This application is made with the Dart programming language with the Flutter framework. This application is also made using Android Studio and Firebase as a place to accommodate data on practitioners who have made memos. This application runs on Android Version 5.0 with the code name Nougat and above.</p> Robby Nugraha Ivan Maurits M Achsan Isa Al Anshori Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 76 82 10.56127/juit.v2i1.503 PERBAIKAN PENGENDALIAN PERSEDIAAN MELALUI PERAMALAN PERMINTAAN MENGGUNAKAN METODE TREN ANALISIS http://journal.admi.or.id/index.php/JUIT/article/view/507 <p>Forecasting is an activity to predict a value in the future using past data. PT. Daun Biru Engineering<br>is a company focusing on industry and energy generation maintenance technology. In carrying out its business<br>activities, the company has never done quantitative forecasting of future product demand, so the company is<br>not responsive enough in preparing for production, especially in inventory control which results in expensive<br>inventory costs. Based on these problems, it is necessary to analyze demand forecasting to improve inventory<br>control using the trend analysis method. There are three trend models used, namely, linear, quadratic and<br>exponential models. The exponential trend model was chosen as the best model, with forecasting results for<br>the period June - December 2021 including 49, 52, 55, 58, 62, 66 and 70 units. The total estimated inventory<br>cost is Rp. 4,631,873,967.93.</p> Anita Anita Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 83 92 10.56127/juit.v2i1.507 PEMANFAATAN WEBSITE SEBAGAI MEDIA PROMOSI DAN PENJUALAN DI UKM NADIRA CATERING http://journal.admi.or.id/index.php/JUIT/article/view/508 <p class="Normal1" style="text-align: justify; text-indent: .5in;"><span lang="EN" style="color: black;">The role of MSMEs is very large for Indonesia's economic growth, with their number reaching 99% of all business units. The development of MSMEs in Indonesia is considered quite rapid when viewed from the large number of MSMEs, so it is not surprising that MSMEs are a pillar of economic growth in the country. However, when the Covid 19 pandemic hit all countries, including Indonesia, MSMEs were one of the types of businesses most affected by the pandemic. Sales have decreased so that it also has an impact on the MSME's income. Nadira Catering is one of the MSMEs engaged in the accommodation and provision of food and drink which is located in the South Tambun area, Bekasi district. With a sales method that still only sells on the spot and customers come to the location to order catering services. When the pandemic hit, Nadira Catering was also affected because the number of buyers who ordered their services was much reduced. It is hoped that this website will help Nadira Catering to promote its products to a wider area so that it can attract new potential buyers to transact with Nadira Catering. This website can also help catering management to record, organize and make reports related to sales at Nadira Catering. This website is made user friendly so that users can easily find product information or make product purchases.</span></p> Arimbi Kurniasari Copyright (c) 2023 Jurnal Ilmiah Teknik 2023-01-16 2023-01-16 2 1 93 101 10.56127/juit.v2i1.508