{"title":"Purchasing decision behavior of kudus residents on amanda brownies","authors":"Shynes Firda, D. Lusianti, Faridhatun Faidah","doi":"10.52465/josre.v1i2.146","DOIUrl":"https://doi.org/10.52465/josre.v1i2.146","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000This study aims to analyze the effect of brand image, price perception, and product quality on purchasing decisions for Amanda Brownies Kudus products. The problem in this study is that there was a decrease in the percentage of the top brand index value for the branded brownies category carried out by the frontier consulting agency, price perception by consumers who judge Amanda's brownies to be more expensive than another competitor. Several consumer reviews state that the quality of brownie products is still lacking. The sample in this study amounted to 110 respondents, using a purposive sampling technique. This study uses multiple linear regression analysis. The results of this study indicated that brand image has a positive and significant effect on purchasing decisions, price perceptions have a negative and insignificant effect on purchasing decisions, and product quality has a positive and significant effect on purchasing decisions. Brand image, price perception, and product quality positively and significantly affect purchasing decisions. \u0000 \u0000 \u0000 \u0000","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132382517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of the tsukamoto fuzzy method in controlling the dryer for shrimp cracker hygienization","authors":"K. Tyas, Achmad Ubaidillah Ms, D. Rahmawati","doi":"10.52465/josre.v1i2.143","DOIUrl":"https://doi.org/10.52465/josre.v1i2.143","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000The process of drying crackers is traditionally carried out on the side of the road and open places. The impact of drying on product quality, especially hygiene because it is directly contaminated with dust, pollutants and pathogenic microbes. Drying depends on the sun's heat which affects the continuity of production and the level of drought. How to identify food hygiene using an inductive proximity sensor functions as a metal content detector. Because the metal content when ingested by humans is very dangerous. Drying is affected by temperature, moisture content and capacity. Oven drying application is equipped with an inductive proximity sensor and a DS18B20 temperature sensor. The Fuzzy Tsukamoto method for weight problems is grouped into a separate set. So that it can process oven temperature data. The control system for drying 3 shelves of crackers totaling 250 takes 25.6 minutes, drying 5 shelves of crackers totaling 410 takes 31.6 minutes. The drying process temperature is 30OC-70OC, the temperature used is a minimum of 60OC and a maximum of 65OC. Drying near the maximum temperature experiences a slowdown. If drying is done traditionally with the help of sunlight it takes longer. \u0000 \u0000 \u0000 \u0000","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the Greedy Algorithm to Maximize Advantages of Cutting Steel Bars in the Factory Construction","authors":"Rini Muzayanah, Endi Adika Tama","doi":"10.52465/josre.v1i1.112","DOIUrl":"https://doi.org/10.52465/josre.v1i1.112","url":null,"abstract":"Indonesia is one of the countries that is currently exuberant with development issues in order to balance the ongoing process of global modernization. In the infrastructure development process, the developer will enter into a contract with the contractor. This study aims to analyze the performance of the greedy algorithm in optimizing steel cutting with maximum profit to construction companies. The methods used include literature studies, program design, and program trials where the algorithm used is a greedy one. From the results obtained, it is evident that the Greedy algorithm can provide optimal steel cutting solutions because it works by calculating and deviating from all available separation settings, so there is no need to recalculate if the program performs that step.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130622603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Lestari, Dwika Ananda Agustina Pertiwi, M. A. Muslim
{"title":"Increasing package delivery efficiency through the application of the prim algorithm to find the shortest route on the expedition route","authors":"A. Lestari, Dwika Ananda Agustina Pertiwi, M. A. Muslim","doi":"10.52465/josre.v1i1.105","DOIUrl":"https://doi.org/10.52465/josre.v1i1.105","url":null,"abstract":"One of the changes is in terms of shopping. Previously, people shopped through physical stores, but since the emergence of online shopping platforms, people have started to switch to using the marketplace as a place to make buying and selling transactions. This platform utilizes expedition services to send packages in the form of ordered goods from sellers to buyers. This activity presents a new problem, which is related to the efficiency of package delivery by courier services so that goods can arrive as quickly as possible in the hands of buyers. Graph modeling to solve a problem related to the shortest path and the fastest path is adapted in this paper. The algorithm used is Prim's Algorithm, which is an algorithm to determine the minimum spanning tree of a connected weighted graph. The test results show that the algorithm is suitable for increasing packet delivery efficiency by determining the shortest path based on the minimum spanning tree concept. By taking a sample of travel routes on the island of Java, the best route was obtained with a total distance of 1,771 kilometers connecting cities from the city of Jakarta to the city of Banyuwangi.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Aziz Kurnia Rianto, Halimah Salsabila, J. Jumanto
{"title":"Analysis of quality of service (QoS) Wi-Fi Network in UNNES digital center building using wireshark","authors":"Nur Aziz Kurnia Rianto, Halimah Salsabila, J. Jumanto","doi":"10.52465/josre.v1i1.108","DOIUrl":"https://doi.org/10.52465/josre.v1i1.108","url":null,"abstract":"The need for the internet is a very absolute target in today's all-digital era. The traffic of information that is so dense and always dynamic every second makes everyone want speed in capturing information circulating. The speed in gathering information in this all-digital era cannot be separated from the internet and networks. UNNES Digital Center is one of the facilities owned by Semarang State University which is used as a digital-based learning center to support the realization of the Smart Digital Campus. The availability of qualified network services at the UNNES Digital Center is needed to support the all-digital-based student learning process. This research was done to find out how fast and good the quality of the internet network provided by the UNNES Digital Center is. In the research conducted, the network analysis step uses the Quality of Service (QoS) method. In obtaining research data that will be used as a basis for analyzing throughput, packet loss, delay, and network jitter, Wireshark software is used as a tool. The research results show that the quality of the Digital Center's internet network is very good and very adequate for digital learning activities. This is evidenced by a network throughput value of 6122.37 /kbits/s, a packet loss value of 0.7%, a delay of 214 ms with a moderate or quite good value and jitter = 0.511 ms.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131893762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes","authors":"Ahlam Umniyatur Rohmah, D. Djuniadi","doi":"10.52465/josre.v1i1.111","DOIUrl":"https://doi.org/10.52465/josre.v1i1.111","url":null,"abstract":"Data security is one of the main factors in the world of information technology. The human need for information is increasing along with the changing times today. To maintain the authenticity of the information presented, it is necessary to have a high level of security. In this study, a data security simulation will be designed using the TEA (Tiny Encryption Algorithm) algorithm which includes a block cipher encryption algorithm and includes a symmetric key cryptography algorithm with the advantage of being on the Feistel network. The practicum was analyzed based on the process of encrypting and decrypting messages in text format. The software used to simulate the TEA (Tiny Encryption Algorithm) algorithm using Cryptool2 software which is open source software is used to explain the concept of cryptography. This research is used to decipher, schema, and implement the TEA (Tiny Encryption Algorithm) algorithm in the form of simulating encryption and decryption of text messages (both text and text files) so that text messages are sent in the safest way from the sender to the recipient.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134445578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arko Dwiantoro, Ilham Maulana, Nabila Putri Damayanti, Reyhan Nandita Al Zahra
{"title":"Artificial intelligence (AI) imaging for enhancement of parking security","authors":"Arko Dwiantoro, Ilham Maulana, Nabila Putri Damayanti, Reyhan Nandita Al Zahra","doi":"10.52465/josre.v1i1.110","DOIUrl":"https://doi.org/10.52465/josre.v1i1.110","url":null,"abstract":"Parking is a public facility found in an agency or office that is used to store vehicles. There are lots of vehicles that can enter the parking area. Therefore, we need an area management and parking system. Artificial Intelligence (AI) is the knowledge that makes computers able to imitate human intelligence so that computers can do things that humans do. This research is motivated by crime cases that often occur in parking lots. This is because there is still a lack of security in the place. The purpose of this study is to increase security and ease of scanning on motorcycle license plates to get parking tickets automatically and face scans. That way, if a crime occurs in the monitoring area, the camera can easily recognize the face of the perpetrator, which makes the incident process easy.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"716 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133498146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Raihan, Adam Satrio Kanza, Ahlam Umniyatur Rohmah, Dina Zhafira Khairani
{"title":"Analysis and recommendations for business process improvement for retail companies using the business process improvement (BPI) Method","authors":"A. Raihan, Adam Satrio Kanza, Ahlam Umniyatur Rohmah, Dina Zhafira Khairani","doi":"10.52465/josre.v1i1.109","DOIUrl":"https://doi.org/10.52465/josre.v1i1.109","url":null,"abstract":"Retail companies are businesses that involve direct interaction between sellers of goods or services and consumers, meaning that retail businesses do not have a processing process from raw materials to finished products. In the process of editing and recapping goods data, there are 2 main businesses, namely editing data, sending copies of goods data, and storing new data in the cashier’s GIS database. After the evaluation, it was found that simplification could be made to make it more efficient. Based on the results of the evaluation of the business process, it was found that the root cause of the editing time and recap of goods data was long. Business process recommendations are made and the results are obtained, eliminating the process of providing a copy of new item data to the warehouse clerk and storing new item data in the cashier’s GIS database.","PeriodicalId":105983,"journal":{"name":"Journal of Student Research Exploration","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}