Umar Zaky, Afwan Anggara, Muhammad Zakariyah, Ilham Fathullah
Stress in children can affect the way they think, act, and feel. The habit of using gadgets has several advantages and disadvantages, but there has been no in-depth study of the effect of using gadgets on stress levels in children. This study aims to determine the representation of the physiological condition of using gadgets on stress levels in children. A total of 18 electrocardiogram data were extracted with poincaré plot features. This research has found that there is no difference in the level of stress in children between before and after using gadgets in terms of autonomic nervous activity (Sig. > 0.05). However, there is an increase in sympathetic activity that occurs in children even though they have finished using gadgets. Such conditions certainly need to get more attention, especially related to the duration of gadget use and accessible content.
{"title":"Poincaré Plot Method for Physiological Analysis of the Gadget Use Effect on Children Stress Level","authors":"Umar Zaky, Afwan Anggara, Muhammad Zakariyah, Ilham Fathullah","doi":"10.15575/join.v7i1.809","DOIUrl":"https://doi.org/10.15575/join.v7i1.809","url":null,"abstract":"Stress in children can affect the way they think, act, and feel. The habit of using gadgets has several advantages and disadvantages, but there has been no in-depth study of the effect of using gadgets on stress levels in children. This study aims to determine the representation of the physiological condition of using gadgets on stress levels in children. A total of 18 electrocardiogram data were extracted with poincaré plot features. This research has found that there is no difference in the level of stress in children between before and after using gadgets in terms of autonomic nervous activity (Sig. > 0.05). However, there is an increase in sympathetic activity that occurs in children even though they have finished using gadgets. Such conditions certainly need to get more attention, especially related to the duration of gadget use and accessible content.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80763333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. N. Amali, M. R. Katili, S. Suhada, L. Hadjaratie, Hanifah Mardlatillah
Recent trends of studies on technology acceptance in local government had recently been popular; the studies focused on identifying the predictors of human behavior in potential acceptance or rejection of technology. This study investigated the use of information technology/information system (henceforth, IT/IS) acceptance in government as a means to improve the quality of public service and strive for transparent governance. A mixed-methods (quantitative and qualitative) study was conducted, and data were collected through questionnaires involving 125 respondents, interviews, and observations. Technology Acceptance Model (TAM) is used as a theoretical framework for behavioral information systems and Smart Partial least square (Smart PLS) analysis was employed in elaborating the complex correlation between the determinants. The result showed that the perceived ease-of-use (PEOU) contributed positively to the perceived usefulness (PU) and attitude towards using technology (ATUT). Moreover, the ATUT significantly contributed to Behavioral Intention of Use (BITU); further, the BITU also contributed to actual technology use (ATU). The PU, however, possessed a negative impact on the ATUT. These results further the information regarding the quality and performance of IT/IS services that can be used as a basis for higher-level decision-making.
{"title":"Technology Acceptance Model in Government Context: A Systematic Review on the Implementation of IT Governance in a Government Institution","authors":"L. N. Amali, M. R. Katili, S. Suhada, L. Hadjaratie, Hanifah Mardlatillah","doi":"10.15575/join.v7i1.853","DOIUrl":"https://doi.org/10.15575/join.v7i1.853","url":null,"abstract":"Recent trends of studies on technology acceptance in local government had recently been popular; the studies focused on identifying the predictors of human behavior in potential acceptance or rejection of technology. This study investigated the use of information technology/information system (henceforth, IT/IS) acceptance in government as a means to improve the quality of public service and strive for transparent governance. A mixed-methods (quantitative and qualitative) study was conducted, and data were collected through questionnaires involving 125 respondents, interviews, and observations. Technology Acceptance Model (TAM) is used as a theoretical framework for behavioral information systems and Smart Partial least square (Smart PLS) analysis was employed in elaborating the complex correlation between the determinants. The result showed that the perceived ease-of-use (PEOU) contributed positively to the perceived usefulness (PU) and attitude towards using technology (ATUT). Moreover, the ATUT significantly contributed to Behavioral Intention of Use (BITU); further, the BITU also contributed to actual technology use (ATU). The PU, however, possessed a negative impact on the ATUT. These results further the information regarding the quality and performance of IT/IS services that can be used as a basis for higher-level decision-making.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79913228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Time-dependent VRP (TDVRP) is one of the three VRP variants that have not been widely explored in research in the field of operational research, while Particle Swarm Optimization (PSO) is an optimization algorithm in the field of operational research that uses many variables in its application. There is much research conducted about TDVRP, but few of them discuss PSO's implementation. This article presented as a literature review which aimed to find a research gap about implementation of PSO to resolve TDVRP cases. The research was conducted in five stages. The first stage, a review protocol defined in the form of research questions and methods to perform the review. The second stage is references searching. The third stage is screening the search result. The fourth stage is extracting data from references based on research questions. The fifth stage is reporting the study literature results. The results obtained from the screening process were 37 eligible reference articles, from 172 search results articles. The results of extraction and analysis of 37 reference articles show that research on TDVRP discusses the duration of travel time between 2 locations. The route optimization parameter is determined from the cost of the trip, including the total distance traveled, the total travel time, the number of routes, and the number used vehicles. The datasets that are used in research consist of 2 types, real-world datasets and simulation datasets. Solomon Benchmark is a simulation dataset that is widely used in the case of TDVRP. Research on PSO in the TDVRP case is dominated by the discussion of modifications to determine random values of PSO variables.
{"title":"Systematic Literature Review Of Particle Swarm Optimization Implementation For Time-Dependent Vehicle Routing Problem","authors":"M. Diah, A. Setyanto, E. T. Luthfi","doi":"10.15575/join.v7i1.804","DOIUrl":"https://doi.org/10.15575/join.v7i1.804","url":null,"abstract":"Time-dependent VRP (TDVRP) is one of the three VRP variants that have not been widely explored in research in the field of operational research, while Particle Swarm Optimization (PSO) is an optimization algorithm in the field of operational research that uses many variables in its application. There is much research conducted about TDVRP, but few of them discuss PSO's implementation. This article presented as a literature review which aimed to find a research gap about implementation of PSO to resolve TDVRP cases. The research was conducted in five stages. The first stage, a review protocol defined in the form of research questions and methods to perform the review. The second stage is references searching. The third stage is screening the search result. The fourth stage is extracting data from references based on research questions. The fifth stage is reporting the study literature results. The results obtained from the screening process were 37 eligible reference articles, from 172 search results articles. The results of extraction and analysis of 37 reference articles show that research on TDVRP discusses the duration of travel time between 2 locations. The route optimization parameter is determined from the cost of the trip, including the total distance traveled, the total travel time, the number of routes, and the number used vehicles. The datasets that are used in research consist of 2 types, real-world datasets and simulation datasets. Solomon Benchmark is a simulation dataset that is widely used in the case of TDVRP. Research on PSO in the TDVRP case is dominated by the discussion of modifications to determine random values of PSO variables.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85223248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human-Computer Interaction (HCI) is a part of the development of a system in addition to the usability factor. Several methods were developed in HCI to produce a User Interface design that persuasively attracts the user’s interest. One of these methods was Kansei Engineering which involved psychological factors and user emotions in the stage. The study focused on developing the e-commerce User Interface for UMKM products which based on how to maximize the service and quality of e-Commerce because so far the development of the web-based UMKM e-Commerce product user interface has not paid attention to psychological factors. The Research followed Kansei Engineering Type 1 (KEPack) with the stages: (1) Research Initiation, (2) Collecting Kansei Words (KW), (3) Translating KW into SD scale, (4) Collecting Specimens, (5) Classifying Item / Category Specimens, (6) Evaluating Questionnaire Participants’ Data, (7) Multivariate Statistical Analysis, (8) Translating Statistical Data into Design Elements, (9) Creating Guideline Matrix Kansei Engineering. This study involved 40 participants, 20 Kansei Words, and ten specimens of UMKM e-Commerce products. The final result is the Kansei e-Commerce matrix guideline for web-based UMKM products, which had two main concepts, they were complexity consisting of formal, natural and simple emotion factors; and Uniqueness consisting of Comfortable, Soft, and Unique which consists of 8 main parts which divided into 65 design elements. The contribution of this Research in the informatics area is to provide recommendations for the appearance of web-based UMKM e-Commerce products based on the psychological factors of the user through the Kansei Engineering Stages.
{"title":"Kansei Engineering in Designing Web-Based e-Commerce UMKM Product","authors":"I. Isa, Indri Ariyanti","doi":"10.15575/join.v6i2.786","DOIUrl":"https://doi.org/10.15575/join.v6i2.786","url":null,"abstract":"Human-Computer Interaction (HCI) is a part of the development of a system in addition to the usability factor. Several methods were developed in HCI to produce a User Interface design that persuasively attracts the user’s interest. One of these methods was Kansei Engineering which involved psychological factors and user emotions in the stage. The study focused on developing the e-commerce User Interface for UMKM products which based on how to maximize the service and quality of e-Commerce because so far the development of the web-based UMKM e-Commerce product user interface has not paid attention to psychological factors. The Research followed Kansei Engineering Type 1 (KEPack) with the stages: (1) Research Initiation, (2) Collecting Kansei Words (KW), (3) Translating KW into SD scale, (4) Collecting Specimens, (5) Classifying Item / Category Specimens, (6) Evaluating Questionnaire Participants’ Data, (7) Multivariate Statistical Analysis, (8) Translating Statistical Data into Design Elements, (9) Creating Guideline Matrix Kansei Engineering. This study involved 40 participants, 20 Kansei Words, and ten specimens of UMKM e-Commerce products. The final result is the Kansei e-Commerce matrix guideline for web-based UMKM products, which had two main concepts, they were complexity consisting of formal, natural and simple emotion factors; and Uniqueness consisting of Comfortable, Soft, and Unique which consists of 8 main parts which divided into 65 design elements. The contribution of this Research in the informatics area is to provide recommendations for the appearance of web-based UMKM e-Commerce products based on the psychological factors of the user through the Kansei Engineering Stages.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84583311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the Covid-19 pandemic, the lecture process was carried out online, so it impacted other academic activities such as the preparation of lecture schedules. The results of observations at the Faculty of Engineering and Science found that the practice of lecture schedules was carried out manually, such as the schedule coordination process was carried out face-to-face between study programs, faculties, and lecturers to overcome conflicts in the use of rooms and teaching time. Changes in the teaching schedule need to be re-checked on the use of the room and the lecturer's teaching time because it has not been documented with the information system. Hence, this study aims to build an information system for preparing lecture schedules using the Greedy Best First Search Method based on the willingness of lecturers to teach. The system was developed using the RAD (Rapid Application Development) and testing using BlackBox testing. The results of this study succeeded in building a lecture scheduling information system that was able to generate lecture schedules automatically and quickly without having to coordinate face-to-face to support online lectures during the Covid-19 pandemic.
{"title":"Design of a Web-Based Lecture Scheduling Information System During Pandemic Covid-19 (Case Study: Faculty of Engineering and Science, Ibn Khaldun University)","authors":"Novita Br Ginting, Yuggo Afrianto, Suratun Suratun","doi":"10.15575/join.v6i2.727","DOIUrl":"https://doi.org/10.15575/join.v6i2.727","url":null,"abstract":"During the Covid-19 pandemic, the lecture process was carried out online, so it impacted other academic activities such as the preparation of lecture schedules. The results of observations at the Faculty of Engineering and Science found that the practice of lecture schedules was carried out manually, such as the schedule coordination process was carried out face-to-face between study programs, faculties, and lecturers to overcome conflicts in the use of rooms and teaching time. Changes in the teaching schedule need to be re-checked on the use of the room and the lecturer's teaching time because it has not been documented with the information system. Hence, this study aims to build an information system for preparing lecture schedules using the Greedy Best First Search Method based on the willingness of lecturers to teach. The system was developed using the RAD (Rapid Application Development) and testing using BlackBox testing. The results of this study succeeded in building a lecture scheduling information system that was able to generate lecture schedules automatically and quickly without having to coordinate face-to-face to support online lectures during the Covid-19 pandemic.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88888583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which 48.6% of the time variable is influenced by the size of variable, while the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
生成树协议STP (Spanning Tree Protocol)用于可管理的交换设备,在交换机之间使用多条路径连接。本研究旨在协助工程师提高STP网路的安全性。通过使用生成树协议和VLAN (Virtual Local Area network)集群缓解技术,提高STP网络的安全性。STP被攻击前、攻击后的测试数据和预期数据的测试结果。然后进行简单的线性回归分析,结果表明DoS攻击中时间与规模之间不存在显著关系,其中48.6%的时间变量受变量规模的影响,其余51.4%受其他变量的影响。根攻击占43.8%,时间变量受大小变量影响,其余56.2%受其他变量影响。Karl Pearson DoS与根的相关性,时间和规模之间存在显著的相关关系,DoS的相关系数为-0.697,而根的相关系数为-0.662,配对样本t检验(配对样本t检验)可以推断出使用BPDU保护和根保护缓解所做的预测。
{"title":"Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method","authors":"Yuliani Indrianingsih, Hero Wintolo, Eviana Yulianti Saputri","doi":"10.15575/join.v6i2.703","DOIUrl":"https://doi.org/10.15575/join.v6i2.703","url":null,"abstract":"Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which 48.6% of the time variable is influenced by the size of variable, while the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84534583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Dijaya, Rizky Bayu Wardana, Suprianto Suprianto
This research study develops a product promotion method for a canopy roofs. The development of this method is to apply a 3-dimensional (3D) catalog using Augmented Reality (AR) technology. By utilizing Augmented Reality technology, sellers do not need to create markets or miniature products that are commonly used to provide examples to consumers to save costs, attract consumer interest, and display objects that appear natural. Based on the tests that have been done, it is concluded that implementing Augmented Reality in the canopy sales promotion media using the Luther development method with the stages of analysis, design, implementation, testing, and maintenance. Implementation of Augmented Reality in canopy sales promotion media uses concept data from the types of canopies included in the Augmented Reality-based application, namely stainless and hollow types made using a 3D blender program. A marker as a sign to bring up 3D objects in the application. Markers are created using Photoshop and entered the database so that they can be stored online. System testing uses the BlackBox testing method where the program's functionality is running as desired.
{"title":"Interactive Digital Catalog for Canopy Workshop Using Augmented Reality","authors":"R. Dijaya, Rizky Bayu Wardana, Suprianto Suprianto","doi":"10.15575/join.v6i2.761","DOIUrl":"https://doi.org/10.15575/join.v6i2.761","url":null,"abstract":"This research study develops a product promotion method for a canopy roofs. The development of this method is to apply a 3-dimensional (3D) catalog using Augmented Reality (AR) technology. By utilizing Augmented Reality technology, sellers do not need to create markets or miniature products that are commonly used to provide examples to consumers to save costs, attract consumer interest, and display objects that appear natural. Based on the tests that have been done, it is concluded that implementing Augmented Reality in the canopy sales promotion media using the Luther development method with the stages of analysis, design, implementation, testing, and maintenance. Implementation of Augmented Reality in canopy sales promotion media uses concept data from the types of canopies included in the Augmented Reality-based application, namely stainless and hollow types made using a 3D blender program. A marker as a sign to bring up 3D objects in the application. Markers are created using Photoshop and entered the database so that they can be stored online. System testing uses the BlackBox testing method where the program's functionality is running as desired.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85787797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Syaripudin, D. Suparman, Y. A. Gerhana, A. Rahayu, Mimin Mintarsih, Rizka Alawiyah
The many verses in the Qur'an encourage finding the right way how to understand it thematically. The purpose of the research is to develop a chatbot application that can be used to explore and elaborate the content of verses in the Qur’an that hint at science. The support vector machine (SVM) algorithm classifies question and answers datasets in chatbot applications. The number of data sets used is 76, with test data as much as 10%. The test results show that the SVM algorithm is quite good in classifying, with an accuracy value of 87.5%. While the user test results obtained an average MOS of 8.4, which means the chatbot application developed is very effective in understanding the Qur'an, which implies science. This research is expected to provide an overview of the explanation of the Qur'an about science and technology.
{"title":"Chatbot for Signaling Quranic Verses Science Using Support Vector Machine Algorithm","authors":"U. Syaripudin, D. Suparman, Y. A. Gerhana, A. Rahayu, Mimin Mintarsih, Rizka Alawiyah","doi":"10.15575/join.v6i2.827","DOIUrl":"https://doi.org/10.15575/join.v6i2.827","url":null,"abstract":"The many verses in the Qur'an encourage finding the right way how to understand it thematically. The purpose of the research is to develop a chatbot application that can be used to explore and elaborate the content of verses in the Qur’an that hint at science. The support vector machine (SVM) algorithm classifies question and answers datasets in chatbot applications. The number of data sets used is 76, with test data as much as 10%. The test results show that the SVM algorithm is quite good in classifying, with an accuracy value of 87.5%. While the user test results obtained an average MOS of 8.4, which means the chatbot application developed is very effective in understanding the Qur'an, which implies science. This research is expected to provide an overview of the explanation of the Qur'an about science and technology.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82512176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Suheryadi, Willy Permana P, Reza Py, A. Sumarudin, Firdaus Firdaus
Traveling to a place using a private vehicle is an activity that many people do when visiting an area. The visitors leave their cars in several parking lots within a certain period. The resulted, them having difficulty finding vehicles in the parking lot. This study aims to assist parking service users in finding cars parked at the parking location using CCTV cameras. Apart from being used as a security system, cameras have installed in the parking lot can also be used to track the visitor's cars to the point where they park. The proposed method consists of three large blocks: background subtraction, vehicle recognition, and vehicle tracking. Results this study obtained in the test include the accuracy for the vehicle tracking process of about 91.5%, with a true positive rate of approximately 81.12%, and vehicle recognition about 70%.
{"title":"Vehicle Tracking to Determine Position in The Parking Lot Utilizing CCTV Camara","authors":"A. Suheryadi, Willy Permana P, Reza Py, A. Sumarudin, Firdaus Firdaus","doi":"10.15575/join.v6i2.671","DOIUrl":"https://doi.org/10.15575/join.v6i2.671","url":null,"abstract":"Traveling to a place using a private vehicle is an activity that many people do when visiting an area. The visitors leave their cars in several parking lots within a certain period. The resulted, them having difficulty finding vehicles in the parking lot. This study aims to assist parking service users in finding cars parked at the parking location using CCTV cameras. Apart from being used as a security system, cameras have installed in the parking lot can also be used to track the visitor's cars to the point where they park. The proposed method consists of three large blocks: background subtraction, vehicle recognition, and vehicle tracking. Results this study obtained in the test include the accuracy for the vehicle tracking process of about 91.5%, with a true positive rate of approximately 81.12%, and vehicle recognition about 70%.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81711007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As technology becomes more global, RPG games runs into a good development. One of which is a combination of RPG with another games. This journal aims to combine the breakout games and the RPG which has its characteristics. This game development uses prototyping method, in which analysing the necessity and determining the goals of the software. Then, prototype will be created and evaluated regularly so that the result can use 2D graphics. This game also can be used as a reference to reflexes practising. A modeling is conducted to design ‘use case,’ scenario process, activity diagram, class diagram, and sequence diagram as well as to conduct an interface design. A calibration that is used, is calibrating the programme which is created as well as the features in the programme itself. It can be concluded that the construction of RPG games combination and breakout using eclipse and libgdx works well. In addition, it uses the components such as TMX tile map, sprite, sprite batching, box2d and input handling.
{"title":"The Implementation of RPG Concept on Breakout Games Using LibGDX Framework","authors":"A. Nodas, D. Tjahjadi, Alfi Rahman","doi":"10.15575/join.v6i2.517","DOIUrl":"https://doi.org/10.15575/join.v6i2.517","url":null,"abstract":"As technology becomes more global, RPG games runs into a good development. One of which is a combination of RPG with another games. This journal aims to combine the breakout games and the RPG which has its characteristics. This game development uses prototyping method, in which analysing the necessity and determining the goals of the software. Then, prototype will be created and evaluated regularly so that the result can use 2D graphics. This game also can be used as a reference to reflexes practising. A modeling is conducted to design ‘use case,’ scenario process, activity diagram, class diagram, and sequence diagram as well as to conduct an interface design. A calibration that is used, is calibrating the programme which is created as well as the features in the programme itself. It can be concluded that the construction of RPG games combination and breakout using eclipse and libgdx works well. In addition, it uses the components such as TMX tile map, sprite, sprite batching, box2d and input handling.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81954298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}