cover
Contact Name
Dodi Siregar
Contact Email
dodi.729ar@gmail.com
Phone
+6281361223297
Journal Mail Official
dodi.729ar@gmail.com
Editorial Address
Jl. Sisingamangaraja No. 338 Simpang Limun, Medan-20219
Location
Kota medan,
Sumatera utara
INDONESIA
EXPLORER
ISSN : -     EISSN : 27744647     DOI : https://doi.org/10.47065/explorer.v2i1.148
Core Subject : Science,
EXPLORER Journal of Computer Science and Information Technology is a scientific journal published by the FKPT (Forum Kerjasama Pendidikan Tinggi). This journal contains scientific papers from Academics, Researchers, and Practitioners about research on Computer Science and Information Technology. EXPLORER Journal of Computer Science and Information Technology is published twice a year in January and July. The paper is an original script and has a research base on Computer Science and Information Technology. The scope of the paper includes several studies but is not limited to the study Artificial Intelligence, Computer Graphics and Animation, Image Processing, Cryptography, Computer Network Security, Modelling and Simulation, Multimedia, Computer Architecture Design, Computer Vision and Robotics, Parallel and Distributed Computing, Operating System, Information System, Mobile Computing, Natural Language Processing, Data Mining, Machine Learning, Expert System and Geographical Information System. Thus, we invite Academics, Researchers, and Practitioners to participate in submitting their work to this journal.
Articles 5 Documents
Search results for , issue "Vol 5 No 2 (2025): July 2025" : 5 Documents clear
Rancangan Monitoring Lalu Lintas Pedesaan menggunakan Metode Background Subtraction Sanjaya, Tedy; Siregar, Rosyidah
Explorer Vol 5 No 2 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i2.2000

Abstract

Vehicle monitoring in rural tourist areas is an essential aspect of traffic management and safety. Video-based monitoring systems can be an effective solution for detecting and counting passing vehicles. This study proposes the use of the Background Subtraction method to detect objects, particularly vehicles, in monitoring videos recorded in tourist areas. This method utilizes the difference between the background and moving objects to identify passing vehicles, enabling automated monitoring without manual intervention. A comparison between manual counting and the automated system on five test videos showed perfect consistency, with no discrepancies in the detected number of vehicles. In a 5-second video, the system detected 4 vehicles, matching the manual count. A 6-second video recorded 2 and 1 vehicles, with identical results between the system and manual calculations. Videos lasting 11 minutes and 18 seconds each recorded 2 vehicles, with no difference between the two counting methods. The use of the Background Subtraction method achieves high detection accuracy in counting vehicles entering tourist areas, even under varying lighting conditions and environmental disturbances. This confirms that the Background Subtraction method is effective for traffic monitoring in rural areas and can be successfully applied to manage traffic in such regions.
Analisis Faktor-Faktor yang Mempengaruhi Keputusan Pembelian pada Game Genshin Impact Menggunakan Klasifikasi Naive Bayes Wiranata, Hadi; Sucipto, Sucipto; Nugroho, Arie
Explorer Vol 5 No 2 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i2.2004

Abstract

The growth of the online gaming industry has led to the emergence of microtransaction-based business models, where players can purchase virtual items using real money. One of the games implementing this model is Genshin Impact, which has attracted a wide audience through its gacha system and diverse character content. This study aims to identify the factors that influence players' decisions to purchase virtual items in Genshin Impact using the Naive Bayes classification method. Data were collected through an online questionnaire involving 314 respondents. The analyzed variables include play duration, satisfaction with the gacha system, costumes, storyline, social influence, and previous purchase experience. The model was developed using the Gaussian Naive Bayes algorithm and validated through the Stratified K-Fold Cross-Validation method. The results show that the model achieved an accuracy of 80.57% in classifying purchase decisions. While the model performed well in identifying players who made purchases, its performance in classifying non-purchasing players requires improvement. This research is expected to serve as a reference for understanding player purchasing behavior and developing digital marketing strategies in the online gaming industry.
Penerapan Sistem Keamanan (Firewall) Pada Jaringan Smart Home Batubara, Algazali Raihan; Faisal, Ilham; Lubis, Imran
Explorer Vol 5 No 2 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i2.2013

Abstract

Currently, technological developments are increasingly advanced and developing, technological developments that are very rapid with the development of the times to meet human needs. One of them is the need for safe and comfortable home technology. The application of technology in the house is to use the concept of smart home by using firewall network security. Firewall on a smart home network is a concept where Internet of Things devices are safe from hacking by unknown people and cannot be controlled by other smartphone devices. Simulation is an important part of the application of the concept that will be carried out, especially to find out that research and studies are carried out using the simulation method as a way to solve problems. Cisco Packet Tracer 7.3 is an application that can help in terms of simulating Internet of Things devices. The results obtained from the firewall security concept simulation are that in the use of IoT devices such as house doors, windows, garages, lights, webcams and air conditioners are guaranteed to be secure because the devices that have permissions that can be connected.
Membangun Animasi 2D Mitigasi Bencana Banjir Daerah Pinggiran Sungai Deli Menggunakan Metode 2D Hybird Animation Septiawan, Ade Peruzi; Khairani, Sumi
Explorer Vol 5 No 2 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i2.2140

Abstract

Flooding is a natural disaster that frequently occurs in Medan City, particularly in residential areas located along the banks of the Deli River. To minimize the negative impacts of this disaster, educational media is needed to enhance public understanding of flood mitigation efforts. This study aims to develop an educational animation using the 2D Hybrid Animation method as a means of delivering information on flood disaster mitigation, specifically in Sei Mati Subdistrict, Medan Maimun District. This method combines traditional hand-drawn techniques with digital processing using Adobe Animate software, resulting in engaging and informative 2D animations. Based on trial results involving 25 respondents regarding flood disaster mitigation, the average pre-test score was 42, while the post-test score reached 94. This indicates an improvement of 41.6%. These results show that the animation media is effective in increasing respondents’ understanding of flood mitigation.
Pengamanan Data Inventaris Menggunakan Algoritma Kriptografi Tripple DES dan RC4 Hutauruk, Simon Ricardo Valentino; Khairani, Mufida
Explorer Vol 5 No 2 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i2.2178

Abstract

Data security is an essential aspect of information management, particularly inventory data, which includes assets, supplies, and logistics. If this data is misused, it can lead to financial and operational losses. This research develops an inventory data security system that utilizes the Triple Data Encryption Standard (Triple DES) and Rivest Cipher 4 (RC4) cryptographic algorithms. The system is capable of protecting the item name and price columns in the inventory, as well as providing a decryption feature for encrypted data. Additionally, the security of the application is strengthened through user authentication. Combining these two cryptographic algorithms offers an optimal security solution, considering system performance and speed without disrupting daily operations.

Page 1 of 1 | Total Record : 5