cover
Contact Name
Ari Zulsafar
Contact Email
zulsapar@telkomuniversity.ac.id
Phone
+6282262130800
Journal Mail Official
jurnalcepat@telkomuniversity.ac.id
Editorial Address
Program Studi S1 Teknik Komputer Fakultas Teknik Elektro, Gedung Deli Lt. 2 Jl. Telekomunikasi Terusan Buah Batu Bandung, Jawa Barat, 40257 Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of Computer Engineering: Progress, Application and Technology
Published by Universitas Telkom
ISSN : -     EISSN : 29636728     DOI : https://doi.org/10.25124/cepat.v2i01
Core Subject : Science,
CEPAT is a peer-reviewed journal that is published quarterly (every three months) in February, May, August and November. CEPAT is published by the Department of Computer Engineering, School of Electrical Engineering, Telkom University, and was first published in May 2022. CEPAT aims to encourage developments in computer technology which covers various topics related to Computer Engineering, including its research Progress, Application, and Technology. This journal scopes are including but not limited to Computer Engineering, Computer System, Computer Application, Computer Technology, Multimedia Application, Mobile Computing & Applications, Internet of Things, UI/UX, Information Systems and Technologies, E-Learning & Distance Learning, Infrastructure Systems and Services, E-Government, E-Business & E-Commerce, Artificial Intelligence, Embedded System, Network & Data Communication, Databases, Big Data, Data Mining, Software Engineering, Computer Network, Computer Architecture, Computer Security, Soft Computing and Intelligent System, Computer Apps in Electrical/Telecommunication Engineering, Data Science & Analysis, Applied Science, Data Processing in Remote Sensing Technology, Ionospheric Monitoring Data, Computer and Information Engineering.
Articles 84 Documents
Study of Neuromarketing in Consumer Behavior due to Product Logos Color Changes Effect Rahmadani, Denta; Fauzi, Hilman; Lubis, Reza Armanda; Ariyanti, Maya
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 1 No 02 (2022): November 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i02.5245

Abstract

Consumer behavior can be detected by conducting surveys, but this method lacks the depth of analysis to measure consumer behavior. By utilizing technological and scientific advances through the study of neuroscience, especially in neuromarketing, it is hoped to improve the ability to analyze consumer behavior. Neuromarketing has been widely used to measure consumer behavior through several stimuli, including logo colors. Neuromarketing to the human brain's response is done using electroencephalography (EEG) signal analysis. Data collection was carried out on six students aged 19-24 years. Subjects were given a stimulus of five original logo colors and five logo colors recolored with the number of questions in three sessions. Pre-processing uses a butterwort horde four bandpass filter with a theta-band frequency band in the frequency range of 4-8 Hz. Data on color changes using questionnaires and EEG signal data is processed on spatial and spectral domains to view active areas of short-term memory. The result obtained is the effect of the change in logo color on consumer memory and the active location of short-term memory on the logo's color. Using spatial selection, the number of channels was reduced from 16 to 4 channels or by 75%. The selected channels are in the memory and visual areas.
Visual Object of Tracking Humans at Night Based on Thermal Cameras Remelko, Ullima Fathonah
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 01 (2023): May 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i03.5268

Abstract

Pedestrian safety on pedestrian lanes on the side of highways or roads in housing with heavy or quiet traffic conditions needs to be a public concern. Security that must be considered, object tracking is needed to carry out surveillance in improving pedestrian security, and it is also necessary to install thermal camera devices to find out the position of objects such as humans, in various positions of viewpoints that can be applied and applied to monitor the environment. To classify objects such as humans who are in dark or low-light conditions, namely by using the Kernelized Correlation Filter (KCF) tracking method, Support Vector Machines (SVM), and L1 Tracker Using Accelerated Proximal Gradient Approach (L1APG) based on a distance of 10 meters, 15 meters, 20 meters and the size of the object in the dataset. The results of the study with 1684 image inputs. Good performance for each success plot distance on the SVM method is 99.25%, 99.75%, 98.74% because it can track successfully based on the object being traced. Good performance for each precision plot distance on the KCF method of 51.88%, 46.8%, 63.81% has precise accuracy results against the object being tracked.
5G Mobile Private Security Analysis Based on Cloud Computing Yolanda Sari, Michelle Octavia
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 1 No 02 (2022): November 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i02.5269

Abstract

As time passes by, the increasing demands from 4G technology services to 5G technology are getting bigger. In line with the development of 5G, there are several open sources such as Free5gc, Open5gs which already provide core 5G network services so that they can help create and simulate private 5G networks. By using free5gc open source, it still needs more attention from the security side, especially from common attacks such as DDoS. Then the attack scenario is carried out from the inner network side, namely from the UE with the TCP SYN Flood and Ping of Death attack methods. The results of the attack contained comparisons for CPU and memory usage parameters. Then the TCP SYN Flood attack had an impact on the core network function components, namely Access and Mobility Management (AMF), which in 5G services experienced errors or crashes after receiving large packets. Thus, users cannot use the service because if an error occurs in the core network function (AMF), then the connection to gNB and the UE will also be lost
Content Management System Development for Medical Web Applications Adrian, Monterico; Ahmad, Munawar
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 01 (2023): May 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i03.5297

Abstract

The world of the web and the internet today has become one of the centers for exchanging information between humans, one of which is shown by the development of web applications in the form of content management systems (CMS). By being based on JavaServer Pages (JSP), which has the advantages of being platform-independent, inexpensive and free, and easy to develop, it is possible to become an alternative solution to meet today's general medical needs, namely online and web-based, extensible and customizable. , robust and efficient, secure and authenticated, and easy to develop and maintain. there is a need that turns out to be equally owned and used by only a few medical institutions or there is even a need that is shared by all of them. These needs are developed and used as a standard so that web applications in the medical field are universal and can be used by any medical institution, anywhere, and anywhere. As a result, medical needs that can be implemented into a web application and can be universally applicable.
Significance of Accuracy Comparison in Real-Time Kinematic and Single Point Positioning On-Board Application in Vehicles Andrian, Taufan Zandy
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 1 No 02 (2022): November 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i02.5299

Abstract

Vehicle tracking using the positioning system that is used today is the single point positioning method implementation, but the accuracy of the method is still inadequate for further features to be applied. Therefore, an accuracy improvement is needed. By applying the Real Time Kinematic (RTK) method which has an centimeter level of accuracy, the IndiCar webapp made by PT. Telkom Indonesia offers further features in driving, such as sudden vehicle movements detection, to accidents indications. Accuracy comparisons can also be made to define how significant the difference in accuracy of the two methods. The tests show quite significant results. At single point positioning, the largest deviation is at 20 m and the smallest at 1.0960 m, while in the RTK method, the largest deviation is at a value of 80 cm while the smallest at 0.92 cm. The standard deviation value is then used in the calculation of accuracy. With CEP calculations, the single point positioning method produces accuracy at 5.4659 m, while the RTK method provides a more precise level of accuracy, with a value of 18.22 cm. These results show that the RTK method can be an alternative, to improve accuracy in the use of positioning systems.
TBC Bacteria Detection in Microscopic Image With Watershed Countur Method Dawwas, Rodan Hilmi
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 01 (2023): May 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i03.5315

Abstract

Tuberculosis (TB) is an infectious disease that can be detected using a sputum sample. TB cases in Indonesia have spread throughout the region; the highest cases are in West Java. This problem makes the government do some handling and prevention of TB disease. The Bandung City Health Office (DKKB) conducted a cross-test to diagnose TB using a sputum sample. So in this study, a TB bacteria detection system, namely Mycobacterium Tuberculosis (MTB), will be made in sputum samples and their number to diagnose TB. Detection and calculation of the number of MTB are done by processing the image on the sputum sample using the watershed contour detection method. In this study, sputum sample data were obtained from DKKB. The acquisition of microscopic images at each point of the field of view is carried out using an SLR camera connected directly to the microscope to replace the function of the ocular lens. In this study, the microscopic sputum sample images were classified into positive and negative using the watershed and colorspace methods and were tested on a total of 90 microscopic images. From the system testing results, the system accuracy level is 100%, and the system precision is 100% for the detection of TB diagnosis. The system processing time averaged 5.811 seconds for 90 images used.
Application Of Artificial Intelligence In Indonesian Debate Education Game Raharjo, Hanif Kukuh; F, Andi Nurfita; Rosyidin, Nurya Fahru; Purboyo, Tito Waluyo; Nugrahaeni, Ratna Astuti
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 01 (2023): May 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i03.5393

Abstract

Over time, educational games that exist is increasing. It is very unfortunate that there are some educational games that are too focused on the educational aspect so that they forget their identity as games that aim to relieve fatigue. This research was conducted to avoid this problem. To provide an interesting experience from the game being played, the artificial intelligence system is implemented, the first one is Bezier Curve Algorithm. An algorithm that forms a curve trajectory that will become a cross motion of obstacles. Finite State Machine for the Non-Player Character (NPC) behavior. The last one is Fuzzy Mamdani algorithm, it is an algorithm that will be used in calculating the score in the game. By applying all the algorithm to some aspects of the game, there will be an interesting experience in every game play, because one gameplay will not be similar to the previous one. This game was developed on the Android platform. The test was conducted on 33 high school/vocational high school students with the age range (15-20 years). The results obtained, 97% of respondents agree that the game is interesting for them and 90.9% feel interested in Indonesian debate after playing the game.
NDNS performance with variation of topology and prefix on named data networking Daffa, Muhammad; Yovita, Leanna Vidya; Wibowo, Tody Ariefianto
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 01 (2023): May 2022
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v1i03.5428

Abstract

NDNS is DNS embedded in Named Data Network (NDN) architecture as a distributed database system to support NDN caching and know the content's location. In this research, the simulation performed using two topologies, Abilene and PAN-Europe with changes to their prefixes. This simulation conducted to see performance of NDNS with minimal ability to cache on NDN router or Caching Resolver. From simulation results, the variation of prefix at Second Level Domain and Top Level Domain there is no difference in average delay in both topologies, namely 1% increase in average delay as the variation of prefix increases. There is a decrease in the Cache Hit Ratio by 0.16% (Abilene) and 0.18% (PAN-Europe) because the probability of getting cached data decreases as the prefix varies. In the change in interest frequency, there is an increase of 0.4% in average delay and the Cache Hit Ratio decreases by 0.08% in both topologies as the frequency of interest per second increases. NDNS with cache in Router and Caching Resolver get 43% lower average delay (Abilene) and 44% (PAN-Europe) than NDN with cache in Router and 57% lower (Abilene) and 60% (PAN-Europe) than NDNS with cache in Caching Resolver only.
IoT-Based Banknotes Saving Automation System Prasasti, Anggunmeka Luhur; Septiawan, Reza Rendian; Alfarisi, Muhammad Haekal
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 02 (2023): November 2023
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v2i01.5499

Abstract

Many problems occur with traditional savings, such as users not knowing the nominal amount that has been saved later, and the authenticity of the money saved. To overcome this problem, the "Savings Storage Automation System with IoT-Based Banknotes" tool was created, this tool aims to help users save money easily and safely. The system design is based on Arduino Mega. The inputs on the Arduino Mega consist of a GY-33 TCS34725 as a color sensor and a keypad to perform functions. The output produced is in the form of nominal data of banknotes that can be seen by the user through an LCD and sent to a database, checking the authenticity of the money is done manually by using ultraviolet. The method used to identify the nominal banknotes is based on the reading of each RGB value and color temperature on each nominal banknote. The average accuracy of reading currency values on real banknotes reaches 88%, while in testing counterfeit banknotes it is 14%. Testing execution time when entering money into savings is 3.57 seconds and data to the database is 6.57 seconds.
Design an Enemy Non-Player Character in Maze Game Using Finite State Machine Algorithm Refnaldi, Irfan Ainul Afif
CEPAT Journal of Computer Engineering: Progress, Application and Technology Vol 2 No 02 (2023): November 2023
Publisher : Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/cepat.v2i01.5779

Abstract

Educational games are very suitable for learning for children because the gameplay is not so heavy and is based on the same conditions as everyday life, which certainly does not contain bad elements that are inappropriate for children. The output of educational games that will be used for learning must really be considered because the age of kindergarten children is the age at which children's character and manners are formed. In this research, the writer will develop a game with a labyrinth concept which carries the theme "Caring for the Environment". The author adds the Non-Player Character (NPC) feature in the game which requires behavior design using the Finite State Machine algorithm with three working principles State, Event (happening), Action. The result of this research is that all the features in the developed game design have been implemented and function properly, especially the finite state machine method which is applied to NPC behavior. The Maze Game Educational Game that was developed succeeded in attracting the interest of the children who played it and the "Care for the Environment" content in this game was easy for children to understand.