{"title":"Netiquette concept at the assessment of college student social competence with TOPSIS method","authors":"Rianto Rianto, S. Mulyani","doi":"10.28989/compiler.v10i2.1114","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1114","url":null,"abstract":"Social competence of students college is important during the process of implementing the practicum, from social competence we can find out capable the students are in several ways such as the ability to collaborate, speak in forums, reduce social conflicts in the environment, make a network and much more. In this study, it provides a model solution for assessing social competence in students college when carrying out practicum. The purpose of the study was to develop an assessment model by measuring students' social competence during the implementation of the practicum. The number of correspondents in the study was 78 students taken from the number of practicum students in Aerospace Engineering. The data analysis technique uses the TOPSIS method, where the results of this study will obtain the best ranking of 78 KP students who have the highest social competence value. The model of the assessment can be used by lecturers of the Aerospace Engineering, Adisutjipto Aerospace Technology Institute during the practicum process or after. With this assessment model, the advantages of the Adisutjipto Aerospace Technology Institute can synergize in creating graduates with a global and humanistic character.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83395549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of fake shallots using website-based haar-like features algorithm","authors":"Bambang Agus Setyawan, Mutaqin Akbar","doi":"10.28989/compiler.v10i2.978","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.978","url":null,"abstract":"Shallots is commonly used as essential cooking spices or complement seasoning. The high market demand for this commodity has triggered some people to counterfeit it. They mix the shallots with defective products of onions to get more benefits. It urges to provide a system that can help people to distinguish whether the shallot is original or fake. This research aims to provides an object recognition system for fake shallots utilizing the Haar-Like Feature algorithm. It used the cascade training data set of 59 positive images and 150 negative images with 50 comparison images. The identification process of the shallots was through the haar-cascade process, integrated image, adaptive boosting, cascade classifier, and local binary pattern histogram. This system was made based on the Django website using the python programming language. The test was conducted 30 times on Brebes shallots mixed with Mumbai's mini onions in a single and mixture test method. The test obtained an average percentage of 69.2% for the object recognition of Mumbai's mini onions.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83529791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STERILIZER CHAMBER DESIGN WITH TELEGRAM-BASED INTERNET OF THINGS (IoT) APPLICATIONS","authors":"Nurwijayanti Kusumaningrum, Reza Ananda","doi":"10.28989/compiler.v10i2.1111","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1111","url":null,"abstract":"","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"192 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73753755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Social Network Analysis: Identifying Influencers in The COVID-19 Vaccination Discussion on Twitter","authors":"Muhammad Habibi, Puji Winar Cahyo","doi":"10.28989/compiler.v10i2.1074","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1074","url":null,"abstract":"Social media analytics, especially Twitter, has experienced significant growth over the last few years. The data generated by Twitter provides valuable information to many stakeholders regarding user behavior, preferences, tastes, and characteristics. The presence of influencers on social media can invite interaction with other users. An influencer can affect the speed of spreading information on social media. This study looks at the influence of influencers and information dissemination channels on Twitter data related to COVID-19 vaccination in Indonesia as one of the hot Twitter discussion trends. This study applies Social Network Analysis (SNA) as a theoretical and methodological framework to show that interactions between users have differences on the network when the analyzed tweets are divided into mention and retweet networks. This study found that the key accounts in disseminating information related to Covid-19 vaccination were dominated by official accounts of government organizations and online news portals. The official Twitter account of government organizations turns out to have an essential role in disseminating information related to COVID-19 vaccination, namely the @KemenkesRI account belonging to the Ministry of Health of the Republic of Indonesia and the @Puspen_TNI account belonging to the TNI Information Center.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"09 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86174101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Syahidi, S. Subandi, Adistya Nadia Azura, Ida Hastuti
{"title":"VIRTUAL MUSEUM TOUR IN WASAKA BANJARMASIN TO INTRODUCE THE COLLECTION OF LEADERS AND LOCAL HEROES BASED ON MOBILE AUGMENTED REALITY TECHNOLOGY IN THE NEW NORMAL ERA","authors":"A. A. Syahidi, S. Subandi, Adistya Nadia Azura, Ida Hastuti","doi":"10.28989/COMPILER.V10I1.864","DOIUrl":"https://doi.org/10.28989/COMPILER.V10I1.864","url":null,"abstract":"Wasaka Museum is one of the museums in Banjarmasin City. However, the information obtained by visitors at this time is only from short writings near the object of the image, and museum guards cannot accompany visitors to get around. Furthermore, the interest of museum visitors has also decreased due to the unavailability of adequate information, minimal services, and the impact of the COVID-19 pandemic. The purpose of this research is to develop applications using Mobile Augmented Reality Technology as a means of promotion, trying to attract visitors with AR interaction treats, and the form of virtual museum tours. The methodology used is the Agile Development Method with the type of Extreme Programming (XP). Then the A/B Testing Method is used to select the user interface design. Marker-Based Tracking is a method of detecting markers so that 3D objects can appear. The conclusion is that the selected interface design is design B with a percentage of 76.9%, all the features in the application have functioned very well, and the results of the usability evaluation with a percentage of 83.33% have an excellent predicate which means that they can be recommended for further use at the Wasaka Museum Banjarmasin. in the New Normal Era.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88462659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fish detection using morphological approach based-on k-means segmentation","authors":"S. Saifullah, A. P. Suryotomo, B. Yuwono","doi":"10.28989/compiler.v10i1.946","DOIUrl":"https://doi.org/10.28989/compiler.v10i1.946","url":null,"abstract":"Image segmentation is a concept that is often used for object detection. This detection has difficulty detecting objects with backgrounds that have many colors and even have a color similar to the object being detected. This study aims to detect fish using segmentation, namely segmenting fish images using k-means clustering. The segmentation process is processed by improving the image first. The initial process is preprocessing to improve the image. Preprocessing is done twice, before segmentation using k-means and after. Preprocessing stage 1 using resize and reshape. Whereas after k-means is the contrast-limited adaptive histogram equalization. Preprocessing results are segmented using k-means clustering. The K-means concept classifies images using segments between the object and the background (using k = 8). The final step is the morphological process with open and close operations to obtain fish contours using black and white images based on grayscale images from color images. Based on the experimental results, the process can run well, with the ssim value close to 1, which means that image information does not change. Processed objects provide a clear picture of fish objects so that this k-means segmentation can help detect fish objects.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86031965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Marketplace Conversation Trends on Twitter Platform Using K-Means","authors":"Ulil Amri Nasron, Muhammad Habibi","doi":"10.28989/compiler.v9i1.579","DOIUrl":"https://doi.org/10.28989/compiler.v9i1.579","url":null,"abstract":"Businesses began to shift from the marketing process that used to use conventional media to switch to using the internet and social media. This is because the cost of marketing using the internet and social media is cheaper than using conventional media. The problem that is often faced by businesspeople when marketing on social media is that they rarely see a marketplace that is becoming a trend and is being discussed by consumers on social media, so the marketing process is carried out less than the maximum. This study aims to analyze conversation trends related to the marketplace on the Twitter platform. The method used in this study is the K-Means Clustering method. Based on the results of the study found that the application of the K-Means Clustering method can produce sufficient information as a basis for consideration of businesspeople in choosing a marketplace. Marketplace trend analysis results show that Shopee, Lazada, and Tokopedia are highly discussed marketplaces on Twitter.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75395475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion","authors":"Arif Budiman, Paradise Paradise","doi":"10.28989/compiler.v8i2.481","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.481","url":null,"abstract":"Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75745649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLAN Wireless Performance Analysis Of Central Access Point Management Topology According to the IEEE 802.11 Standard","authors":"A. Wicaksono, Chanief Budi Setiawan","doi":"10.28989/compiler.v8i2.525","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.525","url":null,"abstract":"Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad . The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated . To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic dataset","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"247 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73643868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haruno Sajati, Anggraini Kusumaningrum, Nur Hanifah
{"title":"Analysis of Combination Knowledge Acquisition of Haar Training for Object Detection on the Viola Jones Method","authors":"Haruno Sajati, Anggraini Kusumaningrum, Nur Hanifah","doi":"10.28989/compiler.v8i2.538","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.538","url":null,"abstract":"Viola Jones method uses the file classifier to object detection. The training process to create object classifier file requires very high computer resources and time which is directly proportional to the amount of training data. The amount of training data determines the accuracy of object detection. The long training process is caused because the computer has low specifications and the distribution of Haartraining files will speed up the process of vector file formation, minimize errors when cutting Haar features on positive objects and also minimize errors that occur during the training process. The problems that arise next are how to overcome this so that a better knowledge is obtained. This study provides analysis results of the process of merging knowledge acquisition and its effect on the accuracy of object detection using the Viola-Jones method with the final result undetected object decrease 52.62% and object detected increase 23.78 %","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"131 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79081660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}