Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Proceeding of International Conference Health, Science And Technology (ICOHETECH)

Expert System Detecting Symptoms of Game Addiction with The Forward Chaining Method and Certainty Factor Muhammad Mujib Al Khafid; Sri Sumarlinda; Rina Arum Prastyanti
Proceeding of International Conference on Science, Health, And Technology 2021: Proceeding of the 2nd International Conference Health, Science And Technology (ICOHETECH)
Publisher : LPPM Universitas Duta Bangsa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1840.473 KB) | DOI: 10.47701/icohetech.v1i1.1125

Abstract

Games are fun playing activities. In the past, most children and adolescents played games with physical activities, but nowadays children and adolescents play games with their gadgets. Excessive gaming activity can lead to addiction. Game addiction can cause mental illness, even physical illness. This study aims to help gamers as well as the general public to better understand the symptoms of game addiction and early solutions to game addiction. This study uses forward chaining as a plot, namely by collecting symptoms to find the level of addiction and certainty factors as a calculation by calculating the level of trust and distrust of symptoms. In this study, game addiction resulted in 3 levels, low level game addiction, medium level game addiction and high level game addiction.
Legal Protection For Victims of Crime Actions of Illegal Access to Personal Information Rina Arum Prastyanti; S. Andi Sutrasno; Devy Setyani
Proceeding of International Conference on Science, Health, And Technology 2021: Proceeding of the 2nd International Conference Health, Science And Technology (ICOHETECH)
Publisher : LPPM Universitas Duta Bangsa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.069 KB) | DOI: 10.47701/icohetech.v1i1.1159

Abstract

Illegal access crimes continue to increase from year to year. Accessing information belonging to other people is a violation of human rights, so a legal study is needed to measure how well the Indonesian government is in protecting the interests of its citizens. Especially in the field of technology and information through regulations or government decisions and judges. The objectives to be achieved in this research are: To find out the position of victims of crime in accessing personal information illegally in the Criminal Law justice system. To find out the form of legal protection for victims of crime to access personal information illegally. In this study, the research method used is juridical or normative research methods. This research method uses research on existing library materials to solve problems. The approach method used in this research is to use the statutory regulatory approach. In this study using primary legal materials and secondary legal materials: 1. Primary legal materials are materials that have juridical binding power, such as statutory regulations, court decisions, and agreements. The legal materials used include the Criminal Code. 2. Secondary legal materials are materials that do not have juridical binding power, namely draft laws and regulations, literature, and journals related to the focus of research. Techniques Analysis of the legal materials used in this research is qualitative data analysis including data classification activities in accordance with legal issues and provisions, then editing, presenting the results of the analysis in narrative form, and drawing conclusions. The position of a crime victim in accessing personal information illegally in the Criminal Procedure Code is only as a witness in a criminal case where the victim can only prove the suspect / defendant's guilt. Because in a criminal justice process, the witness (victim) plays a very important role in the effort to reveal a material truth. Legal protection for victims of crime from accessing personal information illegally as part of legal protection to the public, can be manifested in various forms, such as compensation, restitution and compensation. And adhering to the provisions of Law Number 11 of 2008 concerning Information and Electronic Transactions and the Criminal Code.
A Printed Elliptical Driver Dipole Antenna for Wireless Communications Hyeonjin Lee; Sehansol Cheong; Rina Arum Prastyanti
Proceeding of International Conference on Science, Health, And Technology Proceeding of the 3rd International Conference Health, Science And Technology (ICOHETECH)
Publisher : LPPM Universitas Duta Bangsa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (647.641 KB) | DOI: 10.47701/icohetech.v3i1.2214

Abstract

This work resents printed modified elliptical dipole antenna with a CPW-fed to CPS transmission. The proposed elliptical dipole antenna consiste of a CPW-fed to CPS transform, a pair of elliptical driver. The proposed antenna modified a conventional printed dipole antenna. The proposed antenna is realized a wide frequency bandwidth of 1.84GHz (4.72 – 6.56 GHz) at a return loss of less than -10 dB. The proposed antenna is able to support wireless communications applications.