Pub Date : 2022-07-01DOI: 10.12962/j20882033.v33i1.13904
Reza Fauzan, Ice Krisnahati, Bima Dinda Nurwibowo, Della Aulia Wibowo
{"title":"A Systematic Literature Review on Progressive Web Application Practice and Challenges","authors":"Reza Fauzan, Ice Krisnahati, Bima Dinda Nurwibowo, Della Aulia Wibowo","doi":"10.12962/j20882033.v33i1.13904","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.13904","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87849428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.12962/j20882033.v33i1.11729
E. Saputro, Ahmad Rizaldi, Tahan Simamora, N. K. Erliyanti, R. Yogaswara
{"title":"A Biodiesel Production Technology from Used Cooking Oil: A Review","authors":"E. Saputro, Ahmad Rizaldi, Tahan Simamora, N. K. Erliyanti, R. Yogaswara","doi":"10.12962/j20882033.v33i1.11729","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.11729","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73448933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of In Vitro Flowering Method for Tomato (Solanum Lycopersicum L.)","authors":"Siska Citra Dewi, Vincentius Riandaru Prasetyo, J. Sukweenadhi, Fenny Irawati, Wina Dian Savitri","doi":"10.12962/j20882033.v33i1.12459","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12459","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74009275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-24DOI: 10.12962/j20882033.v33i1.12027
Akbar Noto Ponco Bimantoro, Umi Laili Yuhana
Computerized adaptive testing (CAT) is a context-based adaptive assessment. How-ever, the assessment result may not be valid because the examinee might cheat or guess the answers. Although there are many guessing detection methods, there are not many discussions about their implementation into CAT. Therefore, this paper presents an example of a modification of an existing software so the newly modified software can detect guessed answers and be able to select questions adaptively. The system can detect assuming behavior by recording the examinee’s answer time. Also, the designed system can like questions adaptively by connecting Fuzzy logic, which calculates what level the question should select for the next iteration. The system is responded well by elementary and college students. A total of 56.6% felt the system was straightforward to use. The detection methods can detect guessing behavior of about 73%. However, the system’s sensitivity is low if the method is forced to classify answers which answered in a long response time / general guessing. Never-theless, when we limit the data classified within 10s response time (rapid-guessing), the method’s sensitivity rises to 68.78%.
{"title":"Adaptive Assessment and Guessing Detection Implementation","authors":"Akbar Noto Ponco Bimantoro, Umi Laili Yuhana","doi":"10.12962/j20882033.v33i1.12027","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12027","url":null,"abstract":"Computerized adaptive testing (CAT) is a context-based adaptive assessment. How-ever, the assessment result may not be valid because the examinee might cheat or guess the answers. Although there are many guessing detection methods, there are not many discussions about their implementation into CAT. Therefore, this paper presents an example of a modification of an existing software so the newly modified software can detect guessed answers and be able to select questions adaptively. The system can detect assuming behavior by recording the examinee’s answer time. Also, the designed system can like questions adaptively by connecting Fuzzy logic, which calculates what level the question should select for the next iteration. The system is responded well by elementary and college students. A total of 56.6% felt the system was straightforward to use. The detection methods can detect guessing behavior of about 73%. However, the system’s sensitivity is low if the method is forced to classify answers which answered in a long response time / general guessing. Never-theless, when we limit the data classified within 10s response time (rapid-guessing), the method’s sensitivity rises to 68.78%.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86924804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-22DOI: 10.12962/j20882033.v32i3.6950
P. A. Darwito, Mega Arintika Yuliana
{"title":"Model Reference Adaptive Control for Single Phase Buck Boost Inverter","authors":"P. A. Darwito, Mega Arintika Yuliana","doi":"10.12962/j20882033.v32i3.6950","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.6950","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91130393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-20DOI: 10.12962/j20882033.v33i1.12402
Faiz Ainun Karima, A. M. Shiddiqi
Uneven distribution is common in setting up access points where some areas collide and others have no signals (blank spots). As a result, proper access point positioning on the WI-FI network is required to optimize the number of access points used and the signal strength received while maintaining the same coverage area’s functionality. In this study, signal strength measurement is used to obtain the estimated distance using the Received Signal Strength Indicator (RSSI) method. The server analyzes using the K-Means Clustering algorithm to cluster the observation area. The output of this clustering is the mapping of dense regions (traffic) and loose regions to determine the coverage areas of each access point (AP). This approach is meant to optimize the placement of access points in terms of their number and specifications. The experimentation indicates that the use of K-Means clustering method significantly optimized the distribution model of access points on a Wi-Fi network.
在设置接入点时,一些区域相互碰撞,而另一些区域没有信号(空白点),接入点分布不均匀是常见的。因此,需要在WI-FI网络上进行适当的接入点定位,以优化使用的接入点数量和接收的信号强度,同时保持相同覆盖区域的功能。本研究采用接收信号强度指标(Received signal strength Indicator, RSSI)法测量信号强度,获得估计距离。服务器使用K-Means聚类算法对观测区域进行聚类分析。这种聚类的输出是密集区域(流量)和松散区域的映射,以确定每个接入点(AP)的覆盖区域。这种方法旨在根据接入点的数量和规格优化接入点的放置。实验表明,使用K-Means聚类方法可以显著优化Wi-Fi网络上接入点的分布模型。
{"title":"Optimization of Access Point Positioning on Wi-Fi Networks Using the K-Means Clustering Method","authors":"Faiz Ainun Karima, A. M. Shiddiqi","doi":"10.12962/j20882033.v33i1.12402","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12402","url":null,"abstract":"Uneven distribution is common in setting up access points where some areas collide and others have no signals (blank spots). As a result, proper access point positioning on the WI-FI network is required to optimize the number of access points used and the signal strength received while maintaining the same coverage area’s functionality. In this study, signal strength measurement is used to obtain the estimated distance using the Received Signal Strength Indicator (RSSI) method. The server analyzes using the K-Means Clustering algorithm to cluster the observation area. The output of this clustering is the mapping of dense regions (traffic) and loose regions to determine the coverage areas of each access point (AP). This approach is meant to optimize the placement of access points in terms of their number and specifications. The experimentation indicates that the use of K-Means clustering method significantly optimized the distribution model of access points on a Wi-Fi network.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78778452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-18DOI: 10.12962/j20882033.v33i1.12226
E. Tamakloe, Benjamin Kommey
{"title":"A Smart GSM-Based Home Electrical Appliances Remote Control System","authors":"E. Tamakloe, Benjamin Kommey","doi":"10.12962/j20882033.v33i1.12226","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12226","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77737859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-08DOI: 10.12962/j20882033.v32i3.11625
Nafingatun Ngaliah, D. Siahaan, I. K. Raharjana
Software requirements query is the first stage in software requirements engineering. Elicitation is the process of identifying software requirements from various sources such as interviews with resource persons, questionnaires, document analysis, etc. The user story is easy to adapt according to changing system requirements. The user story is a semi-structured language because the compilation of user stories must follow the syntax as a standard for writing features in agile software development methods. In addition, user story also easily understood by end-users who do not have an information technology background because they contain descriptions of system requirements in natural language. In making user stories, there are three aspects, namely the who aspect (actor), what aspect (activity), and the why aspect (reason). This study proposes the extraction of user stories consisting of who and what aspects of online news sites using feature extraction and maximum entropy as a classification method. The systems analyst can use the actual information related to the lessons obtained in the online news to get the required software requirements. The expected result of the extraction method in this research is to produce user stories relevant to the software requirements to assist systems analysts in generating requirements. This proposed method shows that the average precision and recall are 98.21% and 95.16% for the who aspect; 87,14% and 87,50% for what aspects; 81.21% and 78.60% for user stories. Thus, this result suggests that the proposed method generates user stories relevant to functional software.
{"title":"User Story Extraction from Online News with FeatureBased and Maximum Entropy Method for Software Requirements Elicitation","authors":"Nafingatun Ngaliah, D. Siahaan, I. K. Raharjana","doi":"10.12962/j20882033.v32i3.11625","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.11625","url":null,"abstract":"Software requirements query is the first stage in software requirements engineering. Elicitation is the process of identifying software requirements from various sources such as interviews with resource persons, questionnaires, document analysis, etc. The user story is easy to adapt according to changing system requirements. The user story is a semi-structured language because the compilation of user stories must follow the syntax as a standard for writing features in agile software development methods. In addition, user story also easily understood by end-users who do not have an information technology background because they contain descriptions of system requirements in natural language. In making user stories, there are three aspects, namely the who aspect (actor), what aspect (activity), and the why aspect (reason). This study proposes the extraction of user stories consisting of who and what aspects of online news sites using feature extraction and maximum entropy as a classification method. The systems analyst can use the actual information related to the lessons obtained in the online news to get the required software requirements. The expected result of the extraction method in this research is to produce user stories relevant to the software requirements to assist systems analysts in generating requirements. This proposed method shows that the average precision and recall are 98.21% and 95.16% for the who aspect; 87,14% and 87,50% for what aspects; 81.21% and 78.60% for user stories. Thus, this result suggests that the proposed method generates user stories relevant to functional software.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78067887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.12962/j20882033.v32i3.13003
P. Manek, A. F. Septiyanto, Adi Setyo Nugroho
{"title":"A Semantic Comparison of Feature Requirements Extraction Methods","authors":"P. Manek, A. F. Septiyanto, Adi Setyo Nugroho","doi":"10.12962/j20882033.v32i3.13003","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.13003","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74804252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.12962/j20882033.v32i3.12998
Evi Triandini, Marco Ariano Kristyanto, Ravi Vendra Rishika, Franky Rawung
{"title":"A Systematic Literature Review of The Role of Ontology in Modeling Knowledge in Software Development Processes","authors":"Evi Triandini, Marco Ariano Kristyanto, Ravi Vendra Rishika, Franky Rawung","doi":"10.12962/j20882033.v32i3.12998","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.12998","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73842710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}