Reza Fauzan, Ice Krisnahati, Bima Dinda Nurwibowo, Della Aulia Wibowo
{"title":"A Systematic Literature Review on Progressive Web Application Practice and Challenges","authors":"Reza Fauzan, Ice Krisnahati, Bima Dinda Nurwibowo, Della Aulia Wibowo","doi":"10.12962/j20882033.v33i1.13904","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.13904","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87849428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Saputro, Ahmad Rizaldi, Tahan Simamora, N. K. Erliyanti, R. Yogaswara
{"title":"A Biodiesel Production Technology from Used Cooking Oil: A Review","authors":"E. Saputro, Ahmad Rizaldi, Tahan Simamora, N. K. Erliyanti, R. Yogaswara","doi":"10.12962/j20882033.v33i1.11729","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.11729","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73448933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of In Vitro Flowering Method for Tomato (Solanum Lycopersicum L.)","authors":"Siska Citra Dewi, Vincentius Riandaru Prasetyo, J. Sukweenadhi, Fenny Irawati, Wina Dian Savitri","doi":"10.12962/j20882033.v33i1.12459","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12459","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74009275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Assessment and Guessing Detection Implementation","authors":"Akbar Noto Ponco Bimantoro, Umi Laili Yuhana","doi":"10.12962/j20882033.v33i1.12027","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12027","url":null,"abstract":"Computerized adaptive testing (CAT) is a context-based adaptive assessment. How-ever, the assessment result may not be valid because the examinee might cheat or guess the answers. Although there are many guessing detection methods, there are not many discussions about their implementation into CAT. Therefore, this paper presents an example of a modification of an existing software so the newly modified software can detect guessed answers and be able to select questions adaptively. The system can detect assuming behavior by recording the examinee’s answer time. Also, the designed system can like questions adaptively by connecting Fuzzy logic, which calculates what level the question should select for the next iteration. The system is responded well by elementary and college students. A total of 56.6% felt the system was straightforward to use. The detection methods can detect guessing behavior of about 73%. However, the system’s sensitivity is low if the method is forced to classify answers which answered in a long response time / general guessing. Never-theless, when we limit the data classified within 10s response time (rapid-guessing), the method’s sensitivity rises to 68.78%.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86924804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Reference Adaptive Control for Single Phase Buck Boost Inverter","authors":"P. A. Darwito, Mega Arintika Yuliana","doi":"10.12962/j20882033.v32i3.6950","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.6950","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91130393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Access Point Positioning on Wi-Fi Networks Using the K-Means Clustering Method","authors":"Faiz Ainun Karima, A. M. Shiddiqi","doi":"10.12962/j20882033.v33i1.12402","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12402","url":null,"abstract":"Uneven distribution is common in setting up access points where some areas collide and others have no signals (blank spots). As a result, proper access point positioning on the WI-FI network is required to optimize the number of access points used and the signal strength received while maintaining the same coverage area’s functionality. In this study, signal strength measurement is used to obtain the estimated distance using the Received Signal Strength Indicator (RSSI) method. The server analyzes using the K-Means Clustering algorithm to cluster the observation area. The output of this clustering is the mapping of dense regions (traffic) and loose regions to determine the coverage areas of each access point (AP). This approach is meant to optimize the placement of access points in terms of their number and specifications. The experimentation indicates that the use of K-Means clustering method significantly optimized the distribution model of access points on a Wi-Fi network.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78778452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smart GSM-Based Home Electrical Appliances Remote Control System","authors":"E. Tamakloe, Benjamin Kommey","doi":"10.12962/j20882033.v33i1.12226","DOIUrl":"https://doi.org/10.12962/j20882033.v33i1.12226","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77737859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Story Extraction from Online News with FeatureBased and Maximum Entropy Method for Software Requirements Elicitation","authors":"Nafingatun Ngaliah, D. Siahaan, I. K. Raharjana","doi":"10.12962/j20882033.v32i3.11625","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.11625","url":null,"abstract":"Software requirements query is the first stage in software requirements engineering. Elicitation is the process of identifying software requirements from various sources such as interviews with resource persons, questionnaires, document analysis, etc. The user story is easy to adapt according to changing system requirements. The user story is a semi-structured language because the compilation of user stories must follow the syntax as a standard for writing features in agile software development methods. In addition, user story also easily understood by end-users who do not have an information technology background because they contain descriptions of system requirements in natural language. In making user stories, there are three aspects, namely the who aspect (actor), what aspect (activity), and the why aspect (reason). This study proposes the extraction of user stories consisting of who and what aspects of online news sites using feature extraction and maximum entropy as a classification method. The systems analyst can use the actual information related to the lessons obtained in the online news to get the required software requirements. The expected result of the extraction method in this research is to produce user stories relevant to the software requirements to assist systems analysts in generating requirements. This proposed method shows that the average precision and recall are 98.21% and 95.16% for the who aspect; 87,14% and 87,50% for what aspects; 81.21% and 78.60% for user stories. Thus, this result suggests that the proposed method generates user stories relevant to functional software.","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78067887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Comparison of Feature Requirements Extraction Methods","authors":"P. Manek, A. F. Septiyanto, Adi Setyo Nugroho","doi":"10.12962/j20882033.v32i3.13003","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.13003","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74804252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evi Triandini, Marco Ariano Kristyanto, Ravi Vendra Rishika, Franky Rawung
{"title":"A Systematic Literature Review of The Role of Ontology in Modeling Knowledge in Software Development Processes","authors":"Evi Triandini, Marco Ariano Kristyanto, Ravi Vendra Rishika, Franky Rawung","doi":"10.12962/j20882033.v32i3.12998","DOIUrl":"https://doi.org/10.12962/j20882033.v32i3.12998","url":null,"abstract":"","PeriodicalId":14549,"journal":{"name":"IPTEK: The Journal for Technology and Science","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73842710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}