PUBLIKASI 2020-2021
Publikasi
PUBLIKASI 2018 - 2019
April 2020
Real Time Catalog Of Uniqueness Face Using The Camshift And Gabor Wavelet Algorithims
Publisher: IOP Publishing
Moving image
processing uses continuous moving images such as recording live video as a
data set. The process of developing a unique database catalog application of
student face recognition begins with storing the results of real time
recordings of each face. Face tracking uses the CamShift algorithm to
identify skin color based on the Hue histogram value. To bring out the
special features of a face image that has been convoluted to the kernel, the
Gabor Wavelet method is used. 2D Gabor Wavelet kernel which is obtained by
modulating 2D sine waves at certain frequencies and orientations with a
gaussian envelope. Training data taken from the live video of student
activities consists of 30 data sets. Stages start from file
conversion-tracking video to multiple frames-RGB-HSV conversion-Calculate
Histogram-Face detection and finally face recognition process.
|
Assessing the Impact of Digital Opportunity on Financial Inclusion
Data Mining Klasifikasi Data Nasabah Kredit KSU Taman Mandiri Menggunakan Algoritma C4.5
kredit
meminjam. Setiap data nasabah calon peminjam dipelajari untuk melihat pola
nasabah dalam simpan pinjam pada koperasi. Digunakan Data Mining untuk
mengekstraksi dan mengidentifikasi informasi. Teknik Data Mining Decision
Tree, jawaban akan sebuah sistem untuk membantu dan mencari keputusan
dengan memperhitungkan faktor-faktor yang terjadi. Penelitian ini bertujuan
menilai nasabah dari record data dalam memutuskan nasabah pengambil kredit.
Analisa data, terdiri dari 16 data sample, 7 data nasabah lancar dan 9 data
nasabah macet pembayaran. Setiap percabangan menyatakan kondisi yang harus
dipenuhi dan tiap ujung pohon menyatakan kelas data. Pada Node 1
diperoleh atribut dengan Gain tertinggi: Penghasilan,
sebesar 0,6853. Pada Node 1.1 diperoleh atribut
dengan Gain tertinggi: umur, sebesar 0,6215. Gain tertinggi
adalah jangka waktu: 0,9179. Ada tinggal dua nilai dari atribut jangka
waktu, 31-60, 15-30 hari. nilai atribut 31-60 mengklasifikasikan kasus
menjadi satu yaitu keputusannya “macet” demikian juga dengan 15-30 hari
mengklasifikasi kasus menjadi satu yaitu keputusanya “lancar” sehingga tidak
perlu melakukan perhitungan lebih lanjut.
Keywords Data nasabah; Pola nasabah; Decision Tree; Data
Mining; Algoritma C4.5
|
Diagnosa Penyakit Fibroadenoma Mammae Menggunakan Metode Certainty Factor Dengan Penelusuran Forward Chaining
Mammae
Fibroadenoma Disease (FAM) is a benign neoplasm that has dense and capsule
features. Is the most common type of breast disease. Usually attacks women
under 25 years. In this study detection of Fibroadenoma Mammae (FAM) was
carried out using the Forward Chaining method. Aims to detect early FAM
disease. To prove a certain or uncertain event. The CF hypothesis is
influenced by evidence. CF part of the Expert System is suitable for
diagnosing something that is uncertain. The CF method can only process 2
weights in one calculation. There are no rules for combining weights, because
for any combination the results will remain the same. In the expert system
application design method Forward Chaining, CF (H, E) the value of certainty
given by experts to a rule, while CF (E, e) is the value of trust given by
the user to the symptoms experienced.
Keywords
Fibroadenoma Mammae; Certainty Factor; Forward
Chaining; Bobot Gejala
|
Bagian LSB yang diubah menjadi nilai
dari pesan yang akan disisipkan. Setelah dibubuhi pesan rahasia, setiap pixel
dibangun kembali menjadi gambar yang utuh menyerupai dengan media gambar
semula. Algoritma Hill Cipher yang digunakan untuk menentukan posisi enkrip
plaintext menjadi sebuah ciphertext yang secara acak. 2. Pengujian pesan teks
menggunakan algoritma hill cipher berhasil dilakukan sesuai tepat dengan alur
atau langkah-langkahnya sehingga menghasilkan cipherteks yang berupa
pengacakan huruf abjad. Kata Kunci : Citra, Data Rahasia, Kriptografi,
Algoritma Hill Chiper, LSB
|
Abstract. The accreditation aims
assuring the quality the quality of the institution education. The
institution needs the comprehensive documents for giving the information
accurately before reviewed by assessor. Therefore, academic documents should
be stored effectively to ease fulfilling the requirement of accreditation.
However, the data are generally derived from various sources, various types,
not structured and dispersed. This paper proposes designing a data warehouse
to integrate all various data to prepare a good academic document for
accreditation in a university. The data warehouse is built using nine steps
that was introduced by Kimball. This method is applied to produce a data
warehouse based on the accreditation assessment focusing in academic part.
The data warehouse shows that it can analyse the data to prepare the
accreditation assessment documents.
|
DOES DIGITAL OPPORTUNITY AFFECT FINANCIAL INCLUSION?
Financial inclusion has
become a major policy concern after the 2008 financial crisis which mainly
impacted the bottom of the pyramid (those with low and irregular income,
living in remote areas, disabled people, those who do not have legal
documents, and other marginalized groups) who are generally unbanked and
majority of them are from developing countries. Since then, many
international organizations have focused their activities on financial
inclusion such as World Bank, Asian Development Bank, and others, including
developing countries such as Indonesia (Bank Indonesia, 2013). According to
the World Bank, the Indonesia Financial Inclusion Index in 2017 is 48.9
percent. This shows that the number of population aged more than 15 years old
that have formal saving account is 48.9 percent of such population category.
In addition, based on financial literacy and inclusion survey conducted by
Financial Services Authority of Indonesia (OJK), the index in 2017 is
recorded at 69 percent. Meanwhile, the government has targeted the financial
inclusion index in 2019 is 75 percent (OJK, 2018b). There is quite wide gap
to fulfil 2019 target with only about 1 year left. Therefore, in order to
achieve the target government should not take "business as usual" approach.
One way to accelerate the financial inclusion index is by adopting the use of
technology.
47th International
Scientific Conference on Economic and Social Development – Prague, 14-15
November 2019
|
Real Time Database Seleksi Wajah Digital Menggunakan Algoritma CAMshift
rekaman video digunakan untuk data set menentukan ciri tertentu yang
dimiliki mahasiswa nantinya tersimpan dalam katalog database file
digital. Dimulai dari konversi video .mp4 menjadi format .AVI.
Algoritma CAMShift menggunakan dasar warna HSV untuk pelacakan posisi wajah
(tracking) dan mengenal wajah (recognition). Video durasi 1-2 detik
menghasilkan 45-200 frame format PNG. Algoritma CamShift melakukan
penghitungan nilai Hue data sample. Hasil seleksi area bounding box disimpan
dalam database wajah. Tracking wajah menggunakan Meanshift switching
Matlab–OpenGL.
|
The Comparison of Signature Verification Result Using 2DPCA Method and SSE Method
the rate of speed and
validation verify to be a reference of quality information and reliable
results. Everyone has signature characteristics but it will be difficult to
match original signatures with a clone. Two Dimensional Principal Component
Analysis (2DPCA) method, Sum Equal Error (SSE) method includes a method that
can provide accurate data verification value of 90% - 98%. Results of scanned
signatures, converted from RGB image - grayscale - black white (binary
color). The extraction process of each method requires experimental data as a
data source in pixel size. Digital image consists of a collection of pixels
then each image is converted in a matrix. Preprocessing Method 2 DPCA each
data is divided into data planning and data testing. Extraction on SSE
method, each data sought histogram value and total black value.
|
Texture Features Extraction of Human Leather Ports Based on Histogram
Skin problems general are
distinguished on healthy and unhealthy skin. Based on the pores, unhealthy
skin: dry, moist or oily skin. Skin problems are identified from the image
capture results. Skin image is processed using histogram method which aim to
get skin type pattern. The study used 7 images classified by skin type,
determined histogram, then extracted with features of average intensity,
contrast, slope, energy, entropy and subtlety.
|
Binary Image Object Identification Using Fuzzy Logic and Labeling Breadh-First
the colors are derived from the results of eyes responded the
reflected rays of the color of the object. Fuzzy logic that is to determine a
color area along with the degree of its membership. The image can be
identified from the dominant color, with the image of the binary value of 1
is stated in black and white were declared a value of 0. Keywords: Dominant Color,
Binary Image, Fuzzy Logic, Labeling
|
Indonesian
Batik has a variety of styles. Coloring techniques affect the color quality
of batik. Color is very important to show staining breakthroughs. The colors
R (Red) G (Green) and B (Blue) have a close color correlation level so that
it is difficult to segment. Segmentation is the process of partitioning
digital images into several segments. The segmentation process is carried out
on 15 batik sample data. The first step, each sample is converted from RGB -
XYZ - Lab color.
|
Image segmentation functions to separate one object from another object. Separation is carried out based on regional boundaries which have the same form or composition. The form of light energy is worth 0 to infinity. The function of light intensity f (x, y) indicates the position of the image coordinates. Color segmentation is obtained through preprocessing conversions and transformations that produce color value values. The color of digital images results in light intensity, namely RGB, CMYK, HSV, Color Space.
|
Optimasi Penugasan Pegawai Menggunakan Metode Hungarian
various
ways that companies use to minimize expenses, including maximizing available
resources. The division of work is seriously handled aiming that each employee
gets a maximum wage according to the work hours specified by the company.
Completion of the Hungarian method that is the number of employees employed
must be equal to the amount of work that must be completed then in the study
the data source of seven employees and seven jobs resulted in a minimum total
funding. Optimization is the process of optimizing available resources in
order to get effective and efficient results.
|
PENENTUAN KARYAWAN LEMBUR DENGAN METODE ANALYTICAL HIERARCHY PROCESS (AHP)
Cara menentukan lembur bagi karyawan akan
menggunakan Metode AHP (Analytical Hierarchy Process). Indikator yang
dipergunakan dalam penentuan lembur karyawan menjadi kriteria dalam
pembobotan. Indikator penentuan karyawan lembur terdiri dari tiga kriteria
yaitu sikap, kemampuan dan kontribusi. Output utama dari sistem, memuat
alternatif yang memiliki bobot paling tinggi sehingga diperoleh nama karyawan
yang harus lembur untuk memenuhi kebutuhan perusahaan. Keunggulan Metode AHP
adalah mempermudah menghitung kriteria kinerja berdasarkan pertimbangan
prioritas yang dapat mempermudah dalam penentuan karyawan lembur.
|
PENERAPAN TEKNIK WORKSHOP PADA PEMBUATAN BLOG BAGI PEMULA DI SMA AL WASHLIYAH 12 PERBAUNGAN
Didukung template yang sudah tersedia,
pembuat blog pemula lebih mudah memulai dan mengembangkannya menjadi media
yang menarik yang dapat menunjang
pembelajaran. Teknik pembelajaran dilaksanakan dalam
bentuk workshop. Kata workshop
dapat diartikan sebagai tempat berkumpulnya para pelaku aktivitas melakukan
interaksi saling menjual gagasan yang ditujukan untuk memecahkan suatu
permasalahan tertentu. Pembelajaran pembuatn blog dalam
bentuk workshop dilakukan
satu hari. Materi
pembelajaran pembuatan blog
difokuskan menggunakan blogger.com dan wordpress.com. Tujuan workshop
untuk mendorong siswa mempergunakan fasilitas teknologi komputer yang tidak
berbayar guna menambah skil dan berbagi ilmu pengetahuan. Capaian akhir
diharapkan setiap siswa sudah memiliki alamat blog. Kata kunci: pengabdian,
workshop, blog, blogger, wordpress
|
Sistem Pakar Diagnosa Penyakit Pohon Karet dengan Metode Certainty Factor
Certainty Factor adalah metode untuk
membuktikan apakah suatu fakta tertentu atau tidak tertentu dalam bentuk
metrik yang biasanya digunakan dalam sistem pakar. Metode ini sangat cocok
untuk sistem pakar yang mendiagnosis sesuatu yang tidak pasti. Untuk
menerapkan metode Certainty Factor ke sistem pakar, diperlukan data yang akan
dimasukkan ke dalam sistem, diproses dan ditampilkan hasil diagnosis penyakit
tanaman karet. Input: data jenis penyakit tanaman karet dan data gejala
penyakit.
|
Implementasi Metode Linear Congruent Method (LCM) pada Simulasi Ujian Akhir Sekolah Menengah Kejuruan Lolomatua
Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital
Algoritma Hill Chiper
menggunakan matriks berukuran m x m sebagai kunci untuk melakukan enkripsi
dan dekripsi.Satu cara untuk mendapatkan kembali naskah asli tentunya dengan
menerka kunci dekripsi, jadi proses menerka kunci dekripsi harus menjadi
sesuatu yang sulit. memecahkan chiperteksmenjadi palinteks tanpa mengetahui
kunci yang digunakan. Bagian LSB yang diubah menjadi nilai dari pesan yang
akan disisipkan. Setelah dibubuhi pesan rahasia, setiap pixel dibangun
kembali menjadi gambar yang utuh menyerupai dengan media gambar semula.
Algoritma Hill Cipher yang digunakan untuk menentukan posisi enkrip plaintext
menjadi sebuah ciphertext yang secara acak. 2. Pengujian pesan teks
menggunakan algoritma hill cipher berhasil dilakukan sesuai tepat dengan alur
atau langkah-langkahnya sehingga menghasilkan cipherteks yang berupa
pengacakan huruf abjad. Kata Kunci : Citra, Data Rahasia, Kriptografi,
Algoritma Hill Chiper, LSB
SISTEM PAKAR MENENTUKAN JENIS GANGGUAN PERKEMBANGAN ANAK MENGGUNAKAN METODE CERTAINTY FACTOR
The age of the child until
the age of 10 years is a period of children can absorb and learn all the
information obtained quickly. Children developmental disorders can be seen
from the way they behave, interact and from daily communication. System
analysis activities to observe certain and uncertain events, then document
the needs that will be met in the new system. The system that is built is
capable of performing calculations for diagnosing disorders in child
development using the certainty factor method. The system displays the
results of the diagnosis of child development, presentation of the level of
confidence in the results of the diagnosis and can display control of the
types of developmental disorders in children. Users who have been identified
who can use this expert system are general users, users who can diagnose a
child's developmental disorders and can see the results of the diagnosis.
Keywords
Child Development; Expert
System; Certainty; Certainty Factor;
Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital
Algoritma Hill Chiper
menggunakan matriks berukuran m x m sebagai kunci untuk melakukan enkripsi
dan dekripsi.Satu cara untuk mendapatkan kembali naskah asli tentunya dengan
menerka kunci dekripsi, jadi proses menerka kunci dekripsi harus menjadi
sesuatu yang sulit. memecahkan chiperteksmenjadi palinteks tanpa mengetahui
kunci yang digunakan. Bagian LSB yang diubah menjadi nilai dari pesan yang
akan disisipkan. Setelah dibubuhi pesan rahasia, setiap pixel dibangun
kembali menjadi gambar yang utuh menyerupai dengan media gambar semula.
Algoritma Hill Cipher yang digunakan untuk menentukan posisi enkrip plaintext
menjadi sebuah ciphertext yang secara acak. 2. Pengujian pesan teks
menggunakan algoritma hill cipher berhasil dilakukan sesuai tepat dengan alur
atau langkah-langkahnya sehingga menghasilkan cipherteks yang berupa
pengacakan huruf abjad. Kata Kunci : Citra, Data Rahasia, Kriptografi,
Algoritma Hill Chiper, LSB
|
SISTEM PAKAR MENENTUKAN JENIS GANGGUAN PERKEMBANGAN ANAK MENGGUNAKAN METODE CERTAINTY FACTOR
The age of the child until
the age of 10 years is a period of children can absorb and learn all the
information obtained quickly. Children developmental disorders can be seen
from the way they behave, interact and from daily communication. System
analysis activities to observe certain and uncertain events, then document
the needs that will be met in the new system. The system that is built is
capable of performing calculations for diagnosing disorders in child
development using the certainty factor method. The system displays the
results of the diagnosis of child development, presentation of the level of
confidence in the results of the diagnosis and can display control of the
types of developmental disorders in children. Users who have been identified
who can use this expert system are general users, users who can diagnose a
child's developmental disorders and can see the results of the diagnosis.
Keywords
Child Development; Expert
System; Certainty; Certainty Factor;
|
Salt sugar and fat intake in the human body
in daily food patterns. To avoid non-communicable diseases, it is necessary
to optimize food intake levels. Productive age, in this case between 15-55
years have uncontrolled eating patterns to choose fast food. If this is not
monitored, it will cause various diseases. The importance of evolutionary
algorithms for solving complex problems that are difficult to solve
analytically can use mathematical models. The purpose of this study is to
determine the composition of the ideal intake for productive generations with
a minimum cost that must meet the minimum threshold for each nutritional
component. Based on the mathematical model built, an analysis is carried out
to find the optimal solution. Optimization is an effort or activity to get
the best results with the given requirements. There are 5 main components in
the Genetic Algorithm, namely Fitness, Value, Selection, Crossover, and
Mutation. The results showed optimization of the intake of selected
chromosomes as the best results, obtained on chromosome offSpring: 10,
Fitness value: 12737.34.
Keywords— Productive Age;
Optimization; Genetic Algorithm; Chromosome
|
Comments
Post a Comment