Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

Threat Construction for Dynamic Enemy Status in a Platformer Game using Classical Genetic Algorithm Harisa, Ardiawan Bagus; Nugroho, Setiawan; Umaroh, Liya; Astuti, Yani Parti
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 3, August 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i3.1724

Abstract

Digital game genre such as Action-Platformer is widely popular among buyers on a platform like Steam. The non-playable character enemies in the game are important in action games. Unfortunately, they usually have static attributes like health points, damage, and enemy movement. Using the combination of procedural content generation and dynamic difficulty adjustment with a classical genetic algorithm, we drive the threat value of a platform to construct the enemy status, resulting in more dynamic enemies. We use the threat value as an input parameter calculated from the enemies’ stats in every platform, such as total damage that the enemy might produce, the player’s health point, and the enemy’s movement speed. We conclude that using a classical genetic algorithm may produce dynamic enemy status through the desired threat or danger set by the game designer as an input parameter. Moreover, the game designer may limit the generation with constraints.
Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking Astuti, Erna Zuni; Sari, Christy Atika; Rachmawanto, Eko Hari; Astuti, Yani Parti; Oktaridha, Harwinanda; Isinkaye, Folasade Olubusola
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1768

Abstract

The development of an increasingly sophisticated internet allows for the distribution of digital images that can be done easily. However, with the development of increasingly sophisticated internet networks, it becomes an opportunity for some irresponsible people to misuse digital images, such as taking copyrights, modification and duplicating digital images. Watermarking is an information embedding technique to show ownership descriptions that can be conveyed into text, video, audio, and digital images. There are 2 groups of watermarking based on their working domain, namely the spatial domain and the transformation domain. In this study, three domain transformation techniques were used, namely Singular Value Descomposition (SVD), Discrete Cosine Transform (DCT) and Canny Edge Detection Techniques. The proposed attacks are rotation, gaussian blurness, salt and pepper, histogram equalization, and cropping. The results of the experiment after inserting the watermark image were measured by the Peak Signal to Noise Ratio (PSNR). The results of the image robustness test were measured by the Correlation Coefficient (Corr) and Normalized Correlation (NC). The analysis and experimental results show that the results of image extraction are good with PSNR values from watermarked images above 50dB and Corr values reaching 0.95. The NC value obtained is also high, reaching 0.98. Some of the extracted images are of fairly good quality and are similar with the original image.