Skip to main content

Publikasi

PUBLIKASI 2020-2021

Publikasi 

PUBLIKASI 2018 - 2019
April 2020

Real Time Catalog Of Uniqueness Face Using The Camshift And Gabor Wavelet Algorithims 

Publisher: IOP Publishing
Moving image processing uses continuous moving images such as recording live video as a data set. The process of developing a unique database catalog application of student face recognition begins with storing the results of real time recordings of each face. Face tracking uses the CamShift algorithm to identify skin color based on the Hue histogram value. To bring out the special features of a face image that has been convoluted to the kernel, the Gabor Wavelet method is used. 2D Gabor Wavelet kernel which is obtained by modulating 2D sine waves at certain frequencies and orientations with a gaussian envelope. Training data taken from the live video of student activities consists of 30 data sets. Stages start from file conversion-tracking video to multiple frames-RGB-HSV conversion-Calculate Histogram-Face detection and finally face recognition process. 

Assessing the Impact of Digital Opportunity on Financial Inclusion


Data Mining Klasifikasi Data Nasabah Kredit KSU Taman Mandiri Menggunakan Algoritma C4.5
kredit meminjam. Setiap data nasabah calon peminjam dipelajari untuk melihat pola nasabah dalam simpan pinjam pada koperasi. Digunakan Data Mining untuk mengekstraksi dan mengidentifikasi informasi. Teknik Data Mining Decision Tree, jawaban akan sebuah sistem untuk membantu dan mencari keputusan dengan memperhitungkan faktor-faktor yang terjadi. Penelitian ini bertujuan menilai nasabah dari record data dalam memutuskan nasabah pengambil kredit. Analisa data, terdiri dari 16 data sample, 7 data nasabah lancar dan 9 data nasabah macet pembayaran. Setiap percabangan menyatakan kondisi yang harus dipenuhi dan tiap ujung pohon menyatakan kelas data. Pada Node 1 diperoleh atribut dengan Gain tertinggi: Penghasilan, sebesar 0,6853. Pada Node 1.1 diperoleh atribut dengan Gain tertinggi: umur, sebesar 0,6215. Gain tertinggi adalah  jangka waktu: 0,9179. Ada tinggal dua nilai dari atribut jangka waktu, 31-60, 15-30 hari. nilai atribut 31-60 mengklasifikasikan kasus menjadi satu yaitu keputusannya “macet” demikian juga dengan 15-30 hari mengklasifikasi kasus menjadi satu yaitu keputusanya “lancar” sehingga tidak perlu melakukan perhitungan lebih lanjut.
Keywords Data nasabah; Pola nasabah; Decision Tree; Data Mining; Algoritma C4.5 

Diagnosa Penyakit Fibroadenoma Mammae Menggunakan Metode Certainty Factor Dengan Penelusuran Forward Chaining
Mammae Fibroadenoma Disease (FAM) is a benign neoplasm that has dense and capsule features. Is the most common type of breast disease. Usually attacks women under 25 years. In this study detection of Fibroadenoma Mammae (FAM) was carried out using the Forward Chaining method. Aims to detect early FAM disease. To prove a certain or uncertain event. The CF hypothesis is influenced by evidence. CF part of the Expert System is suitable for diagnosing something that is uncertain. The CF method can only process 2 weights in one calculation. There are no rules for combining weights, because for any combination the results will remain the same. In the expert system application design method Forward Chaining, CF (H, E) the value of certainty given by experts to a rule, while CF (E, e) is the value of trust given by the user to the symptoms experienced.
Keywords
Fibroadenoma Mammae; Certainty Factor; Forward Chaining; Bobot Gejala
Bagian LSB yang diubah menjadi nilai dari pesan yang akan disisipkan. Setelah dibubuhi pesan rahasia, setiap pixel dibangun kembali menjadi gambar yang utuh menyerupai dengan media gambar semula. Algoritma Hill Cipher yang digunakan untuk menentukan posisi enkrip plaintext menjadi sebuah ciphertext yang secara acak. 2. Pengujian pesan teks menggunakan algoritma hill cipher berhasil dilakukan sesuai tepat dengan alur atau langkah-langkahnya sehingga menghasilkan cipherteks yang berupa pengacakan huruf abjad. Kata Kunci : Citra, Data Rahasia, Kriptografi, Algoritma Hill Chiper, LSB

Abstract. The accreditation aims assuring the quality the quality of the institution education. The institution needs the comprehensive documents for giving the information accurately before reviewed by assessor. Therefore, academic documents should be stored effectively to ease fulfilling the requirement of accreditation. However, the data are generally derived from various sources, various types, not structured and dispersed. This paper proposes designing a data warehouse to integrate all various data to prepare a good academic document for accreditation in a university. The data warehouse is built using nine steps that was introduced by Kimball. This method is applied to produce a data warehouse based on the accreditation assessment focusing in academic part. The data warehouse shows that it can analyse the data to prepare the accreditation assessment documents.

DOES DIGITAL OPPORTUNITY AFFECT FINANCIAL INCLUSION?

Financial inclusion has become a major policy concern after the 2008 financial crisis which mainly impacted the bottom of the pyramid (those with low and irregular income, living in remote areas, disabled people, those who do not have legal documents, and other marginalized groups) who are generally unbanked and majority of them are from developing countries. Since then, many international organizations have focused their activities on financial inclusion such as World Bank, Asian Development Bank, and others, including developing countries such as Indonesia (Bank Indonesia, 2013). According to the World Bank, the Indonesia Financial Inclusion Index in 2017 is 48.9 percent. This shows that the number of population aged more than 15 years old that have formal saving account is 48.9 percent of such population category. In addition, based on financial literacy and inclusion survey conducted by Financial Services Authority of Indonesia (OJK), the index in 2017 is recorded at 69 percent. Meanwhile, the government has targeted the financial inclusion index in 2019 is 75 percent (OJK, 2018b). There is quite wide gap to fulfil 2019 target with only about 1 year left. Therefore, in order to achieve the target government should not take "business as usual" approach. One way to accelerate the financial inclusion index is by adopting the use of technology.
47th International Scientific Conference on Economic and Social Development – Prague, 14-15 November 2019

Real Time Database Seleksi Wajah Digital Menggunakan Algoritma CAMshift

rekaman video digunakan untuk data set menentukan ciri tertentu yang dimiliki mahasiswa nantinya tersimpan dalam katalog database file digital.  Dimulai dari konversi video .mp4 menjadi format .AVI. Algoritma CAMShift menggunakan dasar warna HSV untuk pelacakan posisi wajah (tracking) dan mengenal wajah (recognition). Video durasi 1-2 detik menghasilkan 45-200 frame format PNG. Algoritma CamShift melakukan penghitungan nilai Hue data sample. Hasil seleksi area bounding box disimpan dalam database wajah. Tracking wajah menggunakan Meanshift switching Matlab–OpenGL.

The Comparison of Signature Verification Result Using 2DPCA Method and SSE Method

the rate of speed and validation verify to be a reference of quality information and reliable results. Everyone has signature characteristics but it will be difficult to match original signatures with a clone. Two Dimensional Principal Component Analysis (2DPCA) method, Sum Equal Error (SSE) method includes a method that can provide accurate data verification value of 90% - 98%. Results of scanned signatures, converted from RGB image - grayscale - black white (binary color). The extraction process of each method requires experimental data as a data source in pixel size. Digital image consists of a collection of pixels then each image is converted in a matrix. Preprocessing Method 2 DPCA each data is divided into data planning and data testing. Extraction on SSE method, each data sought histogram value and total black value.

Texture Features Extraction of Human Leather Ports Based on Histogram
Skin problems general are distinguished on healthy and unhealthy skin. Based on the pores, unhealthy skin: dry, moist or oily skin. Skin problems are identified from the image capture results. Skin image is processed using histogram method which aim to get skin type pattern. The study used 7 images classified by skin type, determined histogram, then extracted with features of average intensity, contrast, slope, energy, entropy and subtlety.

Binary Image Object Identification Using Fuzzy Logic and Labeling Breadh-First
the colors are derived from the results of eyes responded the reflected rays of the color of the object. Fuzzy logic that is to determine a color area along with the degree of its membership. The image can be identified from the dominant color, with the image of the binary value of 1 is stated in black and white were declared a value of 0. Keywords: Dominant Color, Binary Image, Fuzzy Logic, Labeling
Indonesian Batik has a variety of styles. Coloring techniques affect the color quality of batik. Color is very important to show staining breakthroughs. The colors R (Red) G (Green) and B (Blue) have a close color correlation level so that it is difficult to segment. Segmentation is the process of partitioning digital images into several segments. The segmentation process is carried out on 15 batik sample data. The first step, each sample is converted from RGB - XYZ - Lab color.

Image segmentation functions to separate one object from another object. Separation is carried out based on regional boundaries which have the same form or composition. The form of light energy is worth 0 to infinity. The function of light intensity f (x, y) indicates the position of the image coordinates. Color segmentation is obtained through preprocessing conversions and transformations that produce color value values. The color of digital images results in light intensity, namely RGB, CMYK, HSV, Color Space.

Optimasi Penugasan Pegawai Menggunakan Metode Hungarian
various ways that companies use to minimize expenses, including maximizing available resources. The division of work is seriously handled aiming that each employee gets a maximum wage according to the work hours specified by the company. Completion of the Hungarian method that is the number of employees employed must be equal to the amount of work that must be completed then in the study the data source of seven employees and seven jobs resulted in a minimum total funding. Optimization is the process of optimizing available resources in order to get effective and efficient results.

PENENTUAN KARYAWAN LEMBUR DENGAN METODE ANALYTICAL HIERARCHY PROCESS (AHP)

 Cara menentukan lembur bagi karyawan akan menggunakan Metode AHP (Analytical Hierarchy Process). Indikator yang dipergunakan dalam penentuan lembur karyawan menjadi kriteria dalam pembobotan. Indikator penentuan karyawan lembur terdiri dari tiga kriteria yaitu sikap, kemampuan dan kontribusi. Output utama dari sistem, memuat alternatif yang memiliki bobot paling tinggi sehingga diperoleh nama karyawan yang harus lembur untuk memenuhi kebutuhan perusahaan. Keunggulan Metode AHP adalah mempermudah menghitung kriteria kinerja berdasarkan pertimbangan prioritas yang dapat mempermudah dalam penentuan karyawan lembur.

PENERAPAN TEKNIK WORKSHOP PADA PEMBUATAN BLOG BAGI PEMULA DI SMA AL WASHLIYAH 12 PERBAUNGAN

 Didukung template yang sudah tersedia, pembuat blog pemula lebih mudah memulai dan mengembangkannya menjadi media yang menarik yang  dapat  menunjang  pembelajaran.  Teknik  pembelajaran  dilaksanakan  dalam  bentuk workshop.  Kata workshop dapat diartikan sebagai tempat berkumpulnya para pelaku aktivitas melakukan interaksi saling menjual gagasan yang ditujukan untuk memecahkan suatu permasalahan tertentu. Pembelajaran pembuatn blog  dalam  bentuk  workshop  dilakukan  satu  hari.  Materi  pembelajaran  pembuatan  blog  difokuskan menggunakan blogger.com dan wordpress.com. Tujuan workshop untuk mendorong siswa mempergunakan fasilitas teknologi komputer yang tidak berbayar guna menambah skil dan berbagi ilmu pengetahuan. Capaian akhir diharapkan setiap siswa sudah memiliki alamat blog. Kata kunci: pengabdian, workshop, blog, blogger, wordpress

Sistem Pakar Diagnosa Penyakit Pohon Karet dengan Metode Certainty Factor

Certainty Factor adalah metode untuk membuktikan apakah suatu fakta tertentu atau tidak tertentu dalam bentuk metrik yang biasanya digunakan dalam sistem pakar. Metode ini sangat cocok untuk sistem pakar yang mendiagnosis sesuatu yang tidak pasti. Untuk menerapkan metode Certainty Factor ke sistem pakar, diperlukan data yang akan dimasukkan ke dalam sistem, diproses dan ditampilkan hasil diagnosis penyakit tanaman karet. Input: data jenis penyakit tanaman karet dan data gejala penyakit.

Implementasi Metode Linear Congruent Method (LCM) pada Simulasi Ujian Akhir Sekolah Menengah Kejuruan Lolomatua

Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital
Algoritma Hill Chiper menggunakan matriks berukuran m x m sebagai kunci untuk melakukan enkripsi dan dekripsi.Satu cara untuk mendapatkan kembali naskah asli tentunya dengan menerka kunci dekripsi, jadi proses menerka kunci dekripsi harus menjadi sesuatu yang sulit. memecahkan chiperteksmenjadi palinteks tanpa mengetahui kunci yang digunakan. Bagian LSB yang diubah menjadi nilai dari pesan yang akan disisipkan. Setelah dibubuhi pesan rahasia, setiap pixel dibangun kembali menjadi gambar yang utuh menyerupai dengan media gambar semula. Algoritma Hill Cipher yang digunakan untuk menentukan posisi enkrip plaintext menjadi sebuah ciphertext yang secara acak. 2. Pengujian pesan teks menggunakan algoritma hill cipher berhasil dilakukan sesuai tepat dengan alur atau langkah-langkahnya sehingga menghasilkan cipherteks yang berupa pengacakan huruf abjad. Kata Kunci : Citra, Data Rahasia, Kriptografi, Algoritma Hill Chiper, LSB

SISTEM PAKAR MENENTUKAN JENIS GANGGUAN PERKEMBANGAN ANAK MENGGUNAKAN METODE CERTAINTY FACTOR
The age of the child until the age of 10 years is a period of children can absorb and learn all the information obtained quickly. Children developmental disorders can be seen from the way they behave, interact and from daily communication. System analysis activities to observe certain and uncertain events, then document the needs that will be met in the new system. The system that is built is capable of performing calculations for diagnosing disorders in child development using the certainty factor method. The system displays the results of the diagnosis of child development, presentation of the level of confidence in the results of the diagnosis and can display control of the types of developmental disorders in children. Users who have been identified who can use this expert system are general users, users who can diagnose a child's developmental disorders and can see the results of the diagnosis.

Keywords
Child Development; Expert System; Certainty; Certainty Factor;

Salt sugar and fat intake in the human body in daily food patterns. To avoid non-communicable diseases, it is necessary to optimize food intake levels. Productive age, in this case between 15-55 years have uncontrolled eating patterns to choose fast food. If this is not monitored, it will cause various diseases. The importance of evolutionary algorithms for solving complex problems that are difficult to solve analytically can use mathematical models. The purpose of this study is to determine the composition of the ideal intake for productive generations with a minimum cost that must meet the minimum threshold for each nutritional component. Based on the mathematical model built, an analysis is carried out to find the optimal solution. Optimization is an effort or activity to get the best results with the given requirements. There are 5 main components in the Genetic Algorithm, namely Fitness, Value, Selection, Crossover, and Mutation. The results showed optimization of the intake of selected chromosomes as the best results, obtained on chromosome offSpring: 10, Fitness value: 12737.34.
Keywords— Productive Age; Optimization; Genetic Algorithm; Chromosome












Comments

Popular posts from this blog