Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JOIN (Jurnal Online Informatika)

Comparison of EfficientNetB0 and EfficientNetB7 Models in Classifying Malaria Based on Blood Cells Kiki, Muhammad Rizkiansyah Maulana; Sari, Zamah; Rizki, Didih
JOIN (Jurnal Online Informatika) Vol 9 No 2 (2024)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v9i2.1195

Abstract

Malaria is a disease caused by the bite of malaria mosquitoes, which spreads through blood. Malaria mosquitoes will spread the Plasmodium parasite through their bites. Early malaria identification is essential so the disease can be prevented immediately. Through data science, which utilizes the CNN model, the classification of blood infected with parasites can be predicted accurately. This research uses data obtained from Kaggle website with 27,558 image samples. The data is divided into two classes, parasite-infected and uninfected, which are then divided again into two types. The first class is training data divided into 80% of the total data and the other 20% as validation data. This research used two test scenarios to obtain a more effective classification model. The first scenario uses Hyperparameter Tuning and the EfficientNetB0 model with classification results of 95%. Meanwhile, the classification achievement for scenario two was 99% by utilizing EfficientNetB7.
Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication Sari, Zamah; Chandranegara, Didih Rizki; Khasanah, Rahayu Nurul; Wibowo, Hardianto; Suharso, Wildan
JOIN (Jurnal Online Informatika) Vol 7 No 1 (2022)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v7i1.839

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a nonattacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
The Implementation of Restricted Boltzmann Machine in Choosing a Specialization for Informatics Students Nastiti, Vinna Rahmayanti Setyaning; Sari, Zamah; Chintia Eka Merita, Bella
JOIN (Jurnal Online Informatika) Vol 8 No 1 (2023)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v8i1.917

Abstract

Choosing a specialization was not an easy task for some students, especially for those who lacked confidence in their skill and ability. Specialization in tertiary education became the benchmark and key to success for students’ future careers. This study was conducted to provide the learning outcomes record, which showed the specialization classification for the Informatics students by using the data from the students of 2013-2015 who had graduated. The total data was 319 students. The classification method used for this study was the Restricted Boltzmann Machine (RBM). However, the data showed imbalanced class distribution because the number of each field differed greatly. Therefore, SMOTE was added to classify the imbalanced class. The accuracy obtained from the combination of RBM and SMOTE was 70% with a 0.4 mean squared error.