Claim Missing Document
Check
Articles

Found 24 Documents
Search

Perencanaan CAD CAM Mesin CNC Milling Router 3 Axis Dengan Perangkat Lunak Mastercam Fahlevi, Muhammad Reza; Syafri, Syafri; Susilawati, Anita
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 4, No 2 (2017): Wisuda Oktober Tahun 2017
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A CNC (Computer Numerically Controlled) machine is a machine tool that can work automatically. The CNC machine sends operational instructions that are inputted via a computer that is directly connected to the machine. This CNC machine uses PC (Personal Computer) as main control with windows platform for Operation System (OS). The CNC programming becomes an important element of the machine in work. The numerical signals are inputted into the Mach3 software as the main controls for the movement of axis (axes) x, y, and z as well as spindles. EIA-RS 274D programming format or G & M codes are used in this study for further adjustment of characters per character so that bug error does not occured on Mach3. Therefore, a CNC machine programming plan is created to adjust the machine, which can work according to the design of the Mastercam software. Mastercam software is selected because it has the completeness to design and obtain program instructions with simulation. Mastercam is a full-featured modeling software that combines 2D and 3D frame and surface geometry with editing and transformation capabilities. The G & M codes were generated by Mastercam that would be adjusted by removing G2 and G3 commands, which circular or unidirectional motion commands. In conclusion, this research revealed the program adjustment and program execution of a CNC program creating with CAD CAM system into the interface, therefore the CNC machine can be controlled by the PC device.Key words : CNC, Mastercam, G & M Codes, Mach3
ANALISIS KADAR LOGAM BERAT TIMBAL (PB) PADA PERAIRAN DAN TANAMAN KANGKUNG AIR (IPOMOEA AQUATICA FORSK.) DI DANAU JEMPANG, PENYINGGAHAN, KUTAI BARAT Fahlevi, Muhammad Reza; Sudrajat, Sudrajat; Susanto, Dwi
Natural Science: Journal of Science and Technology Vol 7, No 2 (2018): Volume 7 Number 2 (August 2018)
Publisher : Univ. Tadulako

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.162 KB)

Abstract

Tujuan penelitian ini adalah untuk mengetahui kadar logam Pb pada perairan dan Tanaman Kangkung di Danau Jempang, Kutai Barat, Kalimanatan Timur. Penelitian dilakukan dari bulan Juli 2017 sampai bulan Februari 2018. Analisis kadar logam berat Pb menggunakan Spektrofotometer Serapan Atom (SSA). Hasil analisa menunjukkan kadar Pb pada saat air pasang di statiun 1 yaitu 0,070 mg/L dan di statiun 2 sebesar 0,056 mg/L, pada saat air surut di statiun 1 sebesar 0,049 mg/L dan di statiun 2 sebesar 0,049 mg/L. Kadar logam berat Pb pada tanaman Kangkung, didapatkan hasil rata-rata pada saat air  pasang di statiun 1 yaitu 0,0029 mg/kg (Berat Basah)  dan di statiun 2 sebesar 0,0022 mg/kg. Pada saat air surut di statiun 1 adalah 0,0022 mg/kg dan di statiun 2 adalah 0,0017 mg/kg. Kesimpulan penelitian ini adalah bahwa kadar logam berat Pb dalam Kangkung di perairan Penyinggahan masih dalam batas aman apabila di konsumsi oleh masyarakat sesuai dengan peraturan BPOM yaitu di bawah 0,5 mg/kg
Legal Protection of Trade Secrets, Industrial Design And Integrated Circuit Layout Design In Indonesia Ali, Bujang; Jaya, Dipo Setia Hady Akbar; BA, RS Mohammad Al Amin; Fahlevi, Muhammad Reza; Acong, Acong
Bacarita Law Journal Vol 5 No 1 (2024): Agustus (2024) BACARITA Law Journal
Publisher : Programs Study Outside the Main Campus in Law Pattimura University ARU Islands Regency

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30598/bacarita.v5i1.14994

Abstract

The government of Indonesia is compelled to bring national rules for the protection of intellectual property rights into line with international norms as a result of the ratification of TRIPs. This study employs a qualitative descriptive research strategy rooted on normative legal theory. In order to assess how well national laws have met the international requirements set forth by TRIPs, data was gathered via literature reviews of primary, secondary, and tertiary legal sources. This study's overarching goal is to determine how well Indonesia's various laws pertaining to IPR—such as those pertaining to trade secrets, industrial design, and integrated circuit layout design—are in sync with the provisions of the TRIPS Agreement. The findings demonstrate that these three statutes have significantly incorporated the fundamental elements governed by TRIPs. Trade secret and integrated circuit layout design protection periods, for instance, have been tweaked to meet the bare minimum requirements imposed by TRIPs. Furthermore, national legislation have also strictly governed the exclusive rights that intellectual property holders have, such as the ability to sue for damages in a civil court and get compensation, and the criminal penalties that those who violate these rights face. Nevertheless, there were obstacles to proper legal enforcement and execution in the field, particularly with regard to the level of legal knowledge among corporate players and the general public, as this study also revealed. As a result, this study significantly advances the cause of bringing Indonesian intellectual property legislation up to par with global norms. To maximize the advantages for innovation and economic development that current legislation may provide, Indonesia has to adopt strategic initiatives including bolstering law enforcement and raising public understanding about the significance of preserving intellectual property rights.
Analisis Pengelompokan Data Pelelangan Barang Dengan Metode K-Means Clustering Fahlevi, Muhammad Reza; Putri, Dini Ridha Dwiki; Syahrin, Elvin
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.541

Abstract

Auction data is very important data for companies that are particularly engaged in credit distribution services. In this company, there is also an auction activity in which goods that have been pawned but have expired credit payments, the goods will be auctioned in general by the company. A large amount of existing customer auction data causes employees to experience several problems in managing large amounts of data and it is difficult to obtain accurate information in grouping auction data according to the amount of money borrowed. This application can help employees to obtain information in the method of grouping auction data by applying K-Means Clustering and can be better selected based on predetermined criteria. Testing the application for grouping the K-Means Clustering method using RapidMiner gave results based on 17 customer data types of  Small loans, 5 Medium loan types, and 2 customer data on Large loan types.
Implementasi Metode Pengembangan Multimedia Development Life Cycle (MDLC) Pada Website Pembelajaran Sistem Multimedia Putri, Dini Ridha Dwiki; Fahlevi, Muhammad Reza; Putri, Fetty Ade
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.543

Abstract

Learning Media has a very important role in the lecture process which is a guideline for increasing student knowledge in the field of interest. The Multimedia Development Life Cycle (MDLC) Development Method can be used in the development of Learning Multimedia Systems Websites for Multimedia Systems courses. The process of making interactive multimedia applications uses six stages, namely: Concept, Design, Material Collecting, Assembly, Testing, and Distribution. This learning website is equipped with practicum modules and video tutorials that can be downloaded. The making of this learning media uses the programming language PHP, HTML, and CSS on the Sublime Text 3 software and the MySQL database on Xampp. Testing this learning website uses Blackbox Testing to see errors in the assembly process before distribution. This research produces interactive multimedia learning media in the form of a website that can be accessed via the internet (online) which aims to facilitate the learning process for students and even the general public.
Implementasi Pelayanan Publik Birokrasi Di Indonesia Fahlevi, Muhammad Reza; Nuriah, Asma; Sinurat, Try Auliana; Sitanggang, Anggreni Tioda; Purba, Friskilawati; Pakpahan, Yezkyna R; Silaen, Theresya N.E; Ivanna, Julia
Journal of Law & Policy Review Vol 1, No 1 (2023): Journal of Law & Policy Review, June
Publisher : Mahesa Research Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34007/jlpr.v1i1.102

Abstract

The implementation of public policies is something important. Public policies that are made will only become 'paper tigers' if they are not successfully implemented. Therefore, the implementation of public policies needs to be done by considering various factors, so that the intended public policies can actually function as a tool to realize the desired expectations. In other words, the implementation of public policy is an effort to realize a decision or agreement that has been previously determined. In the early 1970s, implementation was seen as something that was not problematic in terms of policy, because it was assumed that after a policy was taken, it needed to be carried out just like that. This view has begun to change since the publication of Pressman and Wildavsky's study entitled Implementation in 1973. They examined federal government programs for unemployed inner-city residents of Oakland, California, the results of these studies showed that programs job creation has not been implemented in the manner anticipated by policy makers. Other studies have also confirmed that Great Society programs implemented by the Johson administration (1963-1968) in the United States did not achieve their desired goals and that the problem was in the way the program was implemented. Research in other countries as well, such as in England in the early 1970s found the same evidence, that the government was not successful in realizing policies aimed at bringing about social reform. The issue of public policy implementation has attracted the attention of social science experts, particularly political science and public administration, both in developed and developing countries.
Penerapan Metode SMART Dalam Sistem Pendukung Keputusan Rekomendasi Benih Tomat Fahlevi, Muhammad Reza; Putri, Dini Ridha Dwiki; Indriani, Ulfah; Putri, Fetty Ade; Nasution, Farhan Sya’bandi
Brahmana : Jurnal Penerapan Kecerdasan Buatan Vol 5, No 2 (2024): Edisi Juni
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/brahmana.v5i2.401

Abstract

The spread of tomatoes in Indonesia began from the Philippines and other Asian countries in the 18th century. Initially, the tomatoes first cultivated by the Inca and Aztec tribes were small-fruited and had low productivity. This is clearly different from the current conditions. Tomatoes produced now can weigh up to 0.4 kg each fruit or 8 kg each plant. In addition to their high quality and yield, tomato plants can also adapt to various agro-climatic conditions, from lowland, midland, to highland areas. There are even seeds that are resistant to certain pests and diseases. This research aims to develop a Decision Support System (DSS) using the SMART (Simple Multi Attribute Rating Technique) method to provide recommendations for tomato seeds. The SMART method allows the evaluation of seed alternatives based on various relevant criteria. The research results show that the SMART method is effective in helping farmers choose seeds that suit their specific conditions, improving agricultural efficiency and yields. The recommendation of good tomato seeds is based on five criteria: land recommendation, harvest age, yield potential, weight potential, and disease resistance. System testing results show that the recommended good and quality tomato seed is Gandhi F1, with an accuracy rate of 81.7%.
Aplikasi Penerapan TOPSIS Dalam Menentukan Kualitas Bibit Jambu Madu Fahlevi, Muhammad Reza; Dwiki Putri, Dini Ridha
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.249

Abstract

Honey guava is guava that has an extraordinarily sweet taste. The level of sweetness of honey guava can beat the sweetness of apples and other fruits. Quality seeds are the main thing to get planting that can provide optimal results. Quality seeds come from pure varieties, free from pests, diseases, and treatments suitable for this type of honey guava. This application can help farmers to obtain information on determining the best quality of honey guava seeds by applying the TOPSIS method and can be better selected based on the specified criteria. The application of the TOPSIS method uses the PHP programming language and MySQL database, which states that the best alternative is the alternative that has the shortest distance from the positive ideal solution and the farthest distance from the negative ideal solution, so the best alternative is the alternative that has the largest percentage, namely Green Deli guava. With a value of 77.97%.
Penerapan Teorema Bayes Dalam Mendiagnosa Gangguan Kepribadian Paranoid Dwiki Putri, Dini Ridha; Fahlevi, Muhammad Reza
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.246

Abstract

Paranoid personality disorder is a condition of thought patterns and behavior that are unhealthy and different from normal people. Pervasive distrust or suspicion of other people and feel that other people are jealous of them, as a result people with this personality get limited association from their surroundings. The aim of this research is to diagnose patients with paranoid personality disorder more effectively and efficiently so that treatment can be done. The method used is Bayes' Theorem which can help analyze predetermined symptoms. The implementation of this research uses the PHP programming language and MySQL database. The level of accuracy in knowing the diagnosis on early symptoms is 84.11%, so it can be a recommendation to help psychologists diagnose paranoid personality disorders.
Teknik Keamanan File Teks Menggunakan Kriptografi Dengan Algoritma One Time Pad Cipher Fahlevi, Muhammad Reza; Dwiki Putri, Dini Ridha; Doni, Rahmad
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.251

Abstract

Maintaining data that needs to be considered in system security is the authentication process. This process is carried out to ensure users who access data or information on the system are authorized users. There are several methods to authenticate, one of them using data encryption (cryptographic) techniques. Cryptography is applied to data or information by encoding or organizing the data needed only by those who have the key to which the data or information can be accessed. This research will implement the One Time Pad (OTP) algorithm to encode the data and information used. Data or information transferred in the application will form a ciphertext so that users will get a key to access the data or information. The making of this application is expected to guarantee the confidentiality and security of data properly, where the party that can access the original data or information is only the party that has the key.