Claim Missing Document
Check
Articles

Found 2 Documents
Search

The Modified Flocking Algorithm for Optimizing Non Player Character Movements Astria Sastra Dewi; Eka Wahyu Hidayat; Heni Sulastri
International Journal of Engineering and Emerging Technology Vol 5 No 2 (2020): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/IJEET.2020.v05.i02.p01

Abstract

Non player character is an important part of a game that can make gameplay more interesting and challenging. That reason also makes it important to study, especially for non player characters that are clustered in large numbers where programming of such non player characters is relatively difficult to do. Quite a lot of games with non player characters in the form of birds that are clustered but on average the game does not apply good movement so that the motion of birds is relatively slow, monotonous and unrealistic. In this research, we will try to modify the Flocking Algorithm, as one of the popular algorithms for non player character groups, so that birds can fly scattered in terrain while maintaining flocking. In its implementation, the new algorithm was successfully designed and inserted in flocking, which was then applied to a 3D game. The test results are quite satisfactory with only 6.6% collisions on 100 agents with a maximum frame rate of 10 fps. Non player characters succeeded well toward 3 targets in less than 2 minutes and the results of beta testing were an average of 81% of respondents "VERY AGREE" The implementation of the Flocking Algorithm and its modification worked well and resulted in a realistic movement of non player characters.
ANALISIS INFEKSI MALWARE PADA PERANGKAT ANDROID DENGAN METODE HYBRID ANALYSIS Asep Solahudin Rusdi; Nur Widiyasono; Heni Sulastri
JURNAL ILMIAH INFORMATIKA Vol 7 No 02 (2019): Jurnal Ilmiah Informatika (JIF)
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1000.196 KB) | DOI: 10.33884/jif.v7i02.1355

Abstract

Android is the most widely used operating system in the world with a percentage of 76.82% in the Android operating system market share. This fact makes the developers of malicious software (malware) make mobile phone users with the Android operating system as the main target of malware attacks. Attackers can modify application code by entering malicious code, repacking the application and publishing the application in the Android application market. The malware samples used in this study were Judy adware and Marcher banking trojans. This study aims to determine the behavior or characteristics of the malware samples using static and dynamic analysis. The analysis shows that Judy committed ad-fraud by clicking on advertisements without the user's knowledge and Marcher had the ability to collect credential information from the victim's financial account.