JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
https://journal.iteba.ac.id/index.php/jurnal_quancom
<p><strong>Jurnal Quancom</strong> : Jurnal Quantum Komputer adalah jurnal yang fokus pada bidang Teknik komputer atau rekayasa komputer khusus yang mengkombinasikan teknik elektro dan ilmu komputer. Jurnal ini secara konten akan mempublikasi berkaitan erat dengan perancangan, pengembangan dan sistem -sistem berbasis komputer. Artikel yang dapat diisi dalam jurnal Teknik Komputer ini mencakup: Internet of Things (IoT), Robotic, Artificial Intelligence, network. Jurnal ini akan terbit dua kali dalam setahun, pada <strong>Juni</strong> dan <strong>Desember</strong>.</p>LPPM-ITEBAen-USJURNAL QUANCOM: QUANTUM COMPUTER JURNAL2988-1005Inovasi Helm Infanteri Terintegrasi Battlefield Management System Untuk Monitoring Area Pertempuran Secara Real-Time
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/770
<p>This study aims to design and develop an Army infantry helmet system integrated with a Battlefield Management System (BMS) to support real-time monitoring of soldier conditions and combat strategies. The system integrates various sensors, including heart rate monitoring, hazardous gas detection (MQ-135), gyroscopic orientation (MPU6050), digital compass (HMC5883L), and GPS positioning (NEO-6M), managed by Arduino and NodeMCU microcontrollers. Sensor data is transmitted using LoRa communication modules and forwarded via the MQTT protocol to a monitoring system built with Grafana for real-time interactive dashboard visualization. The system is designed to provide periodic data on soldiers’ physical conditions and surrounding environments, aiming to enhance the speed and accuracy of strategic decisions on the battlefield. The prototype was tested in a simulated environment with a focus on sensor accuracy, transmission stability, and visualization reliability, showing promising results as an initial step toward IoT-based military monitoring and protection systems.</p>Mardhiah MasrilGhaly RisyadiRuri Hartika ZainFirdaus
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-31321810.62375/jqc.v3i2.770Penerapan Intrusion Detection dan Prevention System untuk Mendeteksi Serangan Metasploit Menggunakan Snort dan Wireshark
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/428
<p>Network security is crucial as cyberattacks continue to rise. One common type of attack is a Remote Exploit, which exploits vulnerabilities in insecure protocols or open ports to remotely access a computer's operating system and steal data. A popular tool used for such attacks is the Metasploit Framework, which is widely used for network security testing. Metasploit includes a module called exploit/multi/handler, which facilitates receiving connections from a target after a security vulnerability is successfully exploited. Additionally, payloads such as linux/x64/meterpreter/reverse_tcp are often utilized to gain control of the target device. Meterpreter is a sophisticated payload that enables attackers to execute commands, extract data, or install malicious programs on the target computer. The reverse_tcp feature ensures the victim's computer establishes a connection back to the attacker, making access easier and less detectable. To protect networks against such threats, tools like Security Information and Event Management (SIEM) systems can be combined with Intrusion Detection Systems (IDS) such as Snort. IDS tools monitor network traffic, detect suspicious activities, and issue alerts when threats are identified. Additionally, tools like Wireshark can be used for analyzing network data, while VirusTotal helps check whether detected files or data contain viruses. By combining these tools, network security can be enhanced to better combat increasingly sophisticated threats.</p>Asri yohana SiraitRivka Salvita SilalahiSamuel Volder Naibaho
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-313291810.62375/jqc.v3i2.428Penerapan Teknik Steganografi Teks pada Format File PDF
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/420
<p>This research aims to implement steganography by embedding text messages into PDF files using metadata methods and securing the messages through AES encryption. The project consists of several stages, beginning with the selection of a PDF file to serve as the medium for embedding. Users can then input the message they wish to embed. This message will subsequently be encrypted using the AES method, which is designed to protect the content from unauthorized access. Following this, the encrypted message will be embedded into the PDF file via metadata, ensuring that the structure and appearance of the PDF remain unchanged. During the extraction phase, users possessing the appropriate key can retrieve the embedded message and decrypt it to read its content. The implementation results demonstrate that this method successfully maintains the confidentiality of the message without compromising the structure or appearance of the PDF file, ensuring that the message is accessible only to those with the correct decryption key, thereby enhancing the security of sensitive information storage and transmission.</p>Calvin SilaenFrans PanjaitanMarihot Tambunan
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-3132192510.62375/jqc.v3i2.420Hybrid Cryptosystem dengan Algoritma 3DES dan AES dalam Pengamanan File Text
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/424
<p>This research aims to improve the security of text data by implementing a hybrid cryptosystem that combines the 3DES and AES algorithms, both of which are symmetric cryptographic algorithms that have proven to be effective. This research utilizes the Python programming language and cryptography library to implement the algorithm with CBC mode of operation and PKCS7 padding. The encryption process begins by randomly generating a symmetric key for each session, which is then encrypted using the recipient's public key. The 3DES algorithm is implemented to provide additional protection through three rounds of encryption, while AES is used for efficiency and speed in data processing. In the decryption stage, the recipient uses the private key to unlock the encrypted symmetric key, and then uses the key to decrypt the encrypted data. The results obtained show that the combination of these two algorithms increases resistance to attacks such as brute force and chosen plaintext, providing an optimal balance between efficiency and security in securing text data. With these results, the hybrid cryptosystem approach can be applied in various applications that require text data protection, offering a robust and reliable security solution in the secure exchange of information.</p>Vlen SimanjuntakDavid Kristian SilalahiYulanda Pasaribu Pasaribu
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-3132263410.62375/jqc.v3i2.424Rancang Bangun Sistem Monitoring Suhu & Ph Akuarium Ikan Hias Berbasis IOT (Internet OF Things) Menggunakan Framework Laravel dan Bot Telegram
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/402
<table width="672"> <tbody> <tr> <td width="466"> <p>Indonesia possesses significant potential in marine ornamental fish resources with high economic value. One of the main challenges in maintaining koi (Cyprinus carpio), which is popular for its attractive shape and colors, is maintaining a stable aquarium environment. Fluctuations in water temperature and pH can adversely affect the health of the fish, thus an effective monitoring system is necessary. This study employs a waterfall development method to design and build a temperature and pH monitoring system based on the Internet of Things (IoT). The system is developed using the Laravel framework and a Telegram bot to enable real-time monitoring of water conditions and provide automatic notifications to the owner when water conditions fall outside safe limits. Testing results show that the system successfully detects water temperature with an error margin between 1.44% and 2.50%. The results of the pH sensor testing show that the measured pH values range from 6.24 to 7.14. The percentage error in the measurements varies from 2.19% to 14.53% compared to the reference pH value of 7.3. The notification system also performs well, sending alerts when the water pH is below 6.5 or above 7.8, and when the water temperature is below 22°C or above 30°C. The web application effectively displays real-time temperature and pH data and allows control of pH and temperature through commands from the web interface.</p> </td> </tr> </tbody> </table>azmayusufLuki HernandoZainul MunirMuhammad Jufri
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-3132354010.62375/jqc.v3i2.402Perancangan Sistem Pencatat Kecepatan Angin Untuk Studi Kelayakan Pembangunan Pembangkit Listrik Tenaga Bayu (Pltb) Berbasis Internet Of Things (Iot)
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/403
<table width="672"> <tbody> <tr> <td width="466"> <p>Wind is one of the potential renewable energy sources that is gaining increasing attention in efforts to diversify energy resources. This study aims to design and implement a wind speed recording system based on the Internet of Things (IoT) to facilitate feasibility studies for wind energy utilization. The system uses an Anemometer sensor to measure wind speed, a NodeMCU ESP8266 as the microcontroller, and a 20x4 I2C LCD to display data in real-time. The generated data will be transmitted wirelessly via a Wi-Fi network to the Arduino IoT Cloud platform, where it can be accessed and analyzed remotely. The main challenge in designing the wind speed recording system is integrating various hardware and software components to ensure system interoperability and optimal performance. To address this issue, a modular approach was taken using standard interfaces and phased integration testing. Furthermore, the wind speed recording system was tested in two highland areas and two coastal areas, all of which are open areas, namely Bukit Tiban Ayu, Bukit Tangga Seribu, Pantai Cipta Land located in Sekupang District, and the second Barelang Bridge. The measurements yielded average wind speed recordings of approximately 0.60 m/s at Bukit Tiban Ayu and Pantai Cipta Land, around 0.88 m/s at Bukit Tangga Seribu, and 1.02 m/s at the second Barelang Bridge. The measurement results at these four locations did not meet the wind energy utilization standards. The data generated from this study can be used by (wind power plant) developers as an analysis in determining the feasibility of locations for development.</p> </td> </tr> </tbody> </table>Rahmadi HusadaJoni Eka CandraLuki HernandoM Abrar Masril
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-3132414510.62375/jqc.v3i2.403Analisis Concern Report Dan Stop Work Authority Terhadap Tingkat Keselamatan Kerja Karyawan di Pt XY
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/776
<p>Occupational health and safety is a crucial aspect in manufacturing industries as it directly affects employee productivity and well-being. PT XY still faces occupational accident risks despite implementing an Occupational Health and Safety Management System. This study aims to analyze the effect of Concern Report Card and Stop Work Authority implementation on employee safety levels. This research uses a descriptive method with a cross-sectional approach. Data were collected through document studies, field observations, and interviews, including work accident data in 2023 and the implementation data of Concern Report and Stop Work in 2024 in the machine shop and weldshop departments. Data analysis was conducted using the Ryan–Joiner normality test and multiple linear regression. The results show that Concern Report and Stop Work significantly affect employee safety improvement with p-values < 0.05. The implementation of both programs successfully reduced workplace accidents and achieved zero accident conditions for eight months in 2024. Therefore, Concern Report and Stop Work are effective tools for improving safety culture in manufacturing industries.</p>Yopy MardiansyahDelia Meldra
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-12-312025-12-3132464910.62375/jqc.v3i2.776