Tri Puspa Rinjeni, Nur Aini Rakhmawati, Reny Nadlifatin
{"title":"A Systematic Literature Review on Personalized Adaptive Gamification","authors":"Tri Puspa Rinjeni, Nur Aini Rakhmawati, Reny Nadlifatin","doi":"10.1109/CENIM56801.2022.10037386","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037386","url":null,"abstract":"The development of adaptive and personalized gamification according to its users is the focus of current research to maximize learning systems. The same games may have different consequences and responses in different users; therefore, gamification should be adaptive and personalized. A variety of approaches are used to investigate personalized adaptive gamification. For this reason, this study aims to develop a Systematic Literature Review (SLR) that summarizes current research and finds new gaps in personalized adaptive gamification. The development of SLR in this study discovers twenty-three papers taken from reputable sources from 2017 to 2022. This study identified user characteristics, game elements, and implementations of personalized adaptive gamification. Analysis shows that Hexad Player Type is famous for its user characteristics, while leaderboard is the gamification element that is frequently used. Moodle Learning Management System and Chi-Square Test are the most popular platform and analytics tools.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130111740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raide Firdaus, A. Arifin, M. Fatoni, T. A. Sardjono
{"title":"Control System of Drain, Bypass, and Dialysate Fluid Conditioning Mechanisms in Ultrafiltration Processes in Hemodialysis Machines","authors":"Raide Firdaus, A. Arifin, M. Fatoni, T. A. Sardjono","doi":"10.1109/CENIM56801.2022.10037468","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037468","url":null,"abstract":"One solution for treating chronic kidney disease is to replace the kidney function as a filtration device with hemodialysis to filter dirty blood. This study aims to regulate the dialysate fluid, both the direction of the flow of the dialysate fluid and the speed of the flow of the dialysate fluid. In this study, instrumentation has been developed to regulate the direction of flow of dialysate fluid and the speed of flow of dialysate fluid. There are two control system blocks, namely the bypass valve control system and the pump speed control system. The control system used is to use a fuzzy logic controller for the two control systems that will run sequentially. The results obtained after conducting this research are that the bypass valve control system has an accuracy rate of 100%, while the pump control system has an accuracy rate of 98.75%.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hafizha Silmi Nur Rahkmi, Silmi Ath Thahirah Al Azhima, Mariya Al Qibtiya, N. F. A. Hakim
{"title":"Modification of CPW Antenna Using Various Slot Shapes for Wireless Communication System","authors":"Hafizha Silmi Nur Rahkmi, Silmi Ath Thahirah Al Azhima, Mariya Al Qibtiya, N. F. A. Hakim","doi":"10.1109/CENIM56801.2022.10037289","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037289","url":null,"abstract":"The antenna is one of the important components in a wireless communication system because it can receive and transmit signals. In this article, we will discuss modifying the CPW antenna by adding a slot in the patch section. The antenna is made using an FR4 substrate with dimensions of 43mm x 40mm. The initial design of the antenna will change the patch section by adding slots. The shape of the slot is made to vary with the size that is adjusted. Modification of the patch antenna using slots can make the reflection coefficient of the antenna higher. The basic design of the antenna has a resonant frequency of 2.2GHz - 5.5GHz. After modification, the resonant frequency of the antenna can reach 1.9GHz - 7.7GHz. The radiation pattern is omnidirectional for all modifications. The highest gain is 5.66dB from the three modifications.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Personal Health Record Using Database System and Blockchain Access Control Based on Smartphone","authors":"Muhammad Akbar Maulana, A. Arifin, M. Nuh","doi":"10.1109/CENIM56801.2022.10037448","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037448","url":null,"abstract":"Healthcare is one of the rapidly growing domains with the development of technology and information in order of providing improved health and medical services to the community. The development of information technology predicts blockchain as a future solution for medical information and storage technology. With the large number of medical information sources made of medical records, blockchain provide alternative options for the transition of medical record information from clinical-centered to patient-centered. The need for data protection and data sharing in this transition makes blockchain with chain information systems able to provide additional security in access control of medical records. In this research, we explores and analyzes the need for integrating and managing Personal Health Records from patient medical records, by implementing the technology of blockchain. Accompanied by a NoSQL database system, the design of a system to perform patient-centered-based medical record management can be initiated using smartphones as the media. The results of the analysis were developed in the form of the myHealth Medical Record Management application covering 4 categories of the user interface. The application was developed in Flutter Framework alongside Google Firebase as an authenticator and database provider, combined with a connection to an Ethereum-based blockchain client running on a virtual machine. The application can be installed on the smartphone with the Android Operating System. Blockchain provides an average response time of 850.0333 milliseconds covering 9 smart contract functions and also database system can provide download and upload processes in 19 different types of medical record attachment with an average speed of 0.517 kilobytes per second and 0.9344 kilobytes per second respectively. It is proposed that with this application, patient-centered medical records can develop and educate users for an independent medical record management system","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117118857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Maulana Damaringrat, M. Nuh, M. Fatoni, T. A. Sardjono
{"title":"Blood Leakage Detection System in Hemodialysis Machine Filtration Process","authors":"Mohammad Maulana Damaringrat, M. Nuh, M. Fatoni, T. A. Sardjono","doi":"10.1109/CENIM56801.2022.10037441","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037441","url":null,"abstract":"Chronic kidney disease worldwide is currently on the rise and is a serious health problem. One of the important components that must be monitored is the Blood Leak Detector (BLD). In hemodialysis machines, BLD has an important role to protect patients from blood loss and unsterile dialysate infusion due to rupture of the dialyser membrane. In this study, a detection system was designed that aims to detect blood leakage using a turbidity sensor and a TCS3200 color sensor. The detection method in this system uses a fuzzy logic system with RGB input from the TCS3200 color sensor which will be uploaded to the microcontroller and the turbidity sensor will detect the amount of blood that is leaking. After testing, the BLD instrumentation system has 100% succeeded in detecting blood leakage with a minimum blood leakage of 1.5 mL.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. B. Raharjo, Putu Krisna Andyartha, William Handi Wijaya, Yudhi Purwananto, D. Purwitasari, Nyoman Juniarta
{"title":"Reliability Evaluation of Microservices and Monolithic Architectures","authors":"A. B. Raharjo, Putu Krisna Andyartha, William Handi Wijaya, Yudhi Purwananto, D. Purwitasari, Nyoman Juniarta","doi":"10.1109/CENIM56801.2022.10037281","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037281","url":null,"abstract":"Software is continuously evolving as business processes that needed to be solved become increasingly complex. Software architecture is an important aspect during software design, with monolithic and microservices being two of the most common with their own advantages and disadvantages. Monolithic is a unified system with a relatively fast development time. Meanwhile, microservices facilitates low coupling and high cohesion, prioritizing maintenance, and ease of modification post-development. This research compares microservices and monolithic API-based thesis monitoring systems. Implementations are done using PHP, Redis, PostgreSQL, Docker, and Heroku. Reliability evaluations are done through automated tests with Apache JMeter. Metrics used are maturity, availability, fault tolerance, and recoverability based on the ISO/IEC 25010 reliability quality characteristics. The conclusion section showed that microservices are more reliable than the monolithic by demonstrating much better fault tolerance and recoverability, with comparable maturity and availability.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134318229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adnan Maulana, S. Mardi, E. M. Yuniarno, Y. Suprapto
{"title":"Behavior NPC Prediction Using Deep Learning","authors":"Adnan Maulana, S. Mardi, E. M. Yuniarno, Y. Suprapto","doi":"10.1109/CENIM56801.2022.10037328","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037328","url":null,"abstract":"Playing video games is one way to break up the monotony of an otherwise boring day. However, a significant number of people quickly tire of playing some of the games that are available to them. This study will result in the development of a strategy that will give a rapid response during combat and may boost NPC abilities. This will be done so that this problem can be circumvented. There is a non-player character that is considered to be one of the most important in the game (NPC). NPCs that are autonomous and adaptive may change their behavior in reaction to the decisions made by the player as well as the conditions in their environment. Previous research has made use of the neural network methodology to forecast the behavior of NPCs; however, this method has a drawback in that the predicted behavior is not necessarily as desired, which leads to a poor level of accuracy. This study attempts to answer the problem of inadequate accuracy by using as its three input parameters the power of the non-player character (NPC), the distance between the player and the NPC, and the power of the opponent. The outcomes of the test indicate that the machine learning technique may be used to identify the results of the NPC behavior analysis as well as the level of accuracy reached.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wrist Rehabilitation Using A 3D Mouse-Joystick Prototype Base Virtual Reality Game With Myoelectric Signal Evaluation System For Post-Stroke Patients","authors":"Ariezqa Farasyfa, A. Arifin, E. A. Suprayitno","doi":"10.1109/CENIM56801.2022.10037302","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037302","url":null,"abstract":"Stroke is a world health problem caused by cerebrovascular disorders and causes weaknesses (hemiparesis). Weakening that occurs makes the wrist rigid and make patients unable to live independently for daily activity. This research proposed system rehabilitation uses a 3D mouse-joystick prototype as a rehabilitation media equipped with MPU 6050 sensor is used to control games in a virtual world. Myoelectric-based evaluation to see the development of muscle capabilities using maximum voluntary contraction methods. Based on research in subject 1 achieve maximum strength in the flexion carpi radial muscles at 89% and 92 % for extention carpi ulnaris. Subject 2 can achieve muscle strength at 79% of flexion carpi radialis and 89% extention carpi ulnaris. Both subjects need more than 50% of their muscle strength. The results obtained were taken manually, for their infiltration database experiment can be done with the Internet of Things makes it easy to see development of the subject.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Semantic Segmentation Deep Learning Methods for Building Extraction","authors":"Anisa Aizatin, I. B. Nugraha","doi":"10.1109/CENIM56801.2022.10037426","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037426","url":null,"abstract":"Urban planners use building extraction on satellite imagery to support government policies. However, the complex depiction of buildings in satellite imagery makes building extraction difficult. One way to extract buildings in satellite imagery is by semantic segmentation deep learning. This study aims to find a suitable deep learning semantic segmentation method by comparing the performance of UNet, UNet++, DeepLabV3, and DeepLabV3+ that combined with ResNet-101 and ResNet-50 as feature extraction algorithms and trained on two public datasets with different characteristics. UNet++ produces the highest performance for predicting both datasets, but with different feature extraction algorithms. MBD feature extraction is more suitable using ResNet-101 while AICrowd uses ResNet-50. However, if we consider time-consuming, DeepLabV3+ and UNet are more efficient for training building datasets because of consuming less time with quietly performance","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blood Leak Detection System in Hemodialysis Due to Venous Needle Dislodgement","authors":"Zahrotus Syarifah, T. A. Sardjono, M. Fatoni","doi":"10.1109/CENIM56801.2022.10037432","DOIUrl":"https://doi.org/10.1109/CENIM56801.2022.10037432","url":null,"abstract":"Venous Needle Dislodgement (VND) is one of the life-threatening complications that might occur during hemodialysis. In this research, a device that can identify blood leakage caused by VND has been developed, allowing it to activate the blood pump and produce audible and visual alerts. The sensor is made up of four Light Dependent Resistor (LDR) sensors that are arranged in an array to look for the presence of blood. The sensor can identify a drop of 0.05 ml blood within 0.5-1 second. The accuracy of the sensor is 99.92%, 100%, 99.96%, and 99.89%. The Hetero Associate Memory (HAM) approach is used to determine the level of risk displaying 100% and 100% sensitivity in the results of specificity testing. When blood is discovered by sensors with three levels of risks, the system has the ability to activate auditory and visual alerts and stop the blood pump.","PeriodicalId":118934,"journal":{"name":"2022 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}