Claim Missing Document
Check
Articles

A Comparison Support Vector Machine, Logistic Regression And Naïve Bayes For Classification Sentimen Analisys user Mobile App Baihaqi, Kiki Ahmad; Setyawan, Iwan; Manongga, Danny; Purnomo, Hendryanto Dwi; Hendry, Hendry; Fauzi, Ahmad; Hananto, Aprilia
International Journal of Artificial Intelligence Research Vol 7, No 1 (2023): June 2023
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v7i1.962

Abstract

Data is the most important thing, the use of data can be useful to get an evaluation from the user of a system or application that is built based on mobile. Not only, the assessment or acceptance results of mobile applications during the trial stage are considered important, assessments and comments from direct users are also important things that can be input for mobile application developers. Data mining, or known in English as data mining, is the answer to the process of retrieving data on any media. In this research, data mining is carried out on the media mobile application download service provider Google Playstore, which provides data in the form of comments and ratings. After scraping the data and obtaining the latest data parameters determined by the latest 2000 comments, the data is pre-processed by removing the emot icon character and eliminating unneeded variables so that the data obtained can be processed to the next stage, namely classification based on ratings and sentiment comments. The algorithms used or compared in this research are Support Vector machine, logistic regression and naïve bayes which are known to be reliable in data mining processing. In this research, the accuracy results are 88% for SVM, 90.5% for Logistic Regression and 91% for naïve bayes.
SOSIALISASI PENGGUNAAN DETEKSI KENDARAAN BERMOTOR DENGAN COMPUTER VISION Kiki Ahmad Baihaqi; Ahmad Fauzi; Jamaludin Indra
JURNAL BUANA PENGABDIAN Vol. 7 No. 1 (2025): JURNAL BUANA PENGABDIAN
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat, Universitas Buana Perjuangan Karawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36805/jurnalbuanapengabdian.v7i1.9949

Abstract

erkembangan teknologi pengolahan cita digital berkembang pesat dari waktu kewaktu, merambah semua sendi-sendi dan bidang kehidupan. Pada Pengabdian masyarakat ini bertujuan untuk mengimplementasikan teknologi computer vision dalam deteksi kendaraan bermotor sebagai solusi untuk memantau dan mengontrol lalu lintas secara efisien. Dengan memanfaatkan metode deteksi objek yang canggih, penelitian ini akan mengembangkan sistem yang mampu mengenali jenis-jenis kendaraan, menghitung jumlah kendaraan yang melintas, serta memonitor kondisi lalu lintas secara real-time. Implementasi teknologi ini diharapkan dapat meningkatkan pengaturan lalu lintas yang lebih efektif dan mengurangi potensi kemacetan di area yang diuji coba. Hasilnya berupa pengetahuan yang diberikan ke peserta dan menunjukan hasil penelitian berupa prototype.
CLASSIFICATION OF RICE PLANTS AFFECTED BY RATS USING THE SUPPORT VECTOR MACHINE (SVM) ALGORITHM Nofie Prasetiyo; Baihaqi, Kiki Ahmad; Lestari, Santi Arum Puspita; Cahyana, Yana
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 2 (2024): JUTIF Volume 5, Number 2, April 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.2.1949

Abstract

In the era of Indonesia's agrarian economy which is supported by the agricultural sector, rice plants play an important role in meeting food needs. However, pest attacks, especially field mice, can cause significant losses in rice production. To overcome this, this research proposes the use of the Support Vector Machine (SVM) algorithm with the Particle Swarm Optimization method in predicting rat pest attacks on rice plants. This research involves the process of collecting data from drone photos to identify affected agricultural land. The preprocessing stage involves changing colors from RGB to GRAY and zoom augmentation. Feature extraction is carried out using Histogram of Oriented Gradients (HOG) and Local Binary Pattern (LBP). Testing was carried out involving the SVM/SVC model and performance evaluation was carried out using accuracy, precision and recall metrics. The preprocessing test results showed an increase in performance with training accuracy of 68.33%. However, the actual prediction on the original image results in a low accuracy of around 25%. However, image testing after involving the entire process, including preprocessing and model prediction, shows a higher level of accuracy, reaching around 90%.
IMPLEMENTATION OF THE YOLOV8 METHOD TO DETECT WORK SAFETY HELMETS Direja, Azhar Ferbista; Cahyana, Yana; Rahmat, Rahmat; Baihaqi, Kiki Ahmad
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.3.2005

Abstract

Work safety helmets are an important tool in OHS (Occupational Health and Safety) that must be used by workers. Workers who work with heavy equipment must wear work safety helmets as an obligation. Unfortunately, there are still many workers who do not comply with this rule. They will only wear helmets if there is supervision from a supervisor. However, if the supervisor is not on site, many workers will remove their helmets. The need for supervision of workers is important in reducing work accidents. From these problems, a work safety helmet detection model was created using the YOLOv8 method. This implementation aims to increase the accuracy values ​​obtained and can reduce workload and increase efficiency in checking violations of the use of work safety helmets among workers. The method used consists of several stages, namely image acquisition of 670 images, image labeling, preprocessing, augmentation in roboflow, YOLOv8x model training with 100 epochs, image testing with a distance of 1, 3, 5 meters between the object and the camera, evaluation of test results. Based on the results of training with 467 images, the mAP50 reached 99.5%. Meanwhile, the test results with 100 images showed an accuracy of 99%.
ANALYSIS AND IMPLEMENTATION OF AES-128 ALGORITHM IN SUKAHARJA KARAWANG VILLAGE SERVICE SYSTEM Fariz Duta Nugraha; Kiki Ahmad Baihaqi; Hilda Yulia Novita; Siregar, Amril Mutoi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.3.2038

Abstract

Data security in databases is needed in the industrial era 4.0 to prevent attacks and unwanted things from happening, one of the biggest cases that has been widely reported is data leakage, in this study aims to implement and analyze the Advanced Encryption Standard Algorithm, one of the data security algorithms with a block chiper type that has 4 transformations (SubByte, ShiftColumn, MixColumn, AddRoundKey), or what we usually call the Cryptography method. Cryptography is a method that is often used to secure important data in databases, in this article the Advanced Encryption Standard Algorithm is used to secure citizen data and family card data in the Sukaharja Karawang Village service system. The method in this research is the observation method, the data is obtained from each head of the neighborhood in Sukaharja Karawang Village with the permission of the head of Sukaharja Karawang Village. Citizen data and family cards were encrypted and analyzed for resource requirements in storing encryption results and time in returning and displaying original data. The results of the analysis obtained the amount of resources required 1.5MB to store family card data, which before encryption required 352KB. Citizen data requires a resource of 6.5MB, before encryption it takes 1.5MB. As for the AES resilience test stage using the Bruteforce attack method with the help of Hashcat software version 6.2.5 with 4 trial processes, One encrypted address data was taken for this test, but out of 4 attempts none of them showed that the data could be cracked.
Comparison Model Optimal Machine Learning Model With Feature Extraction for Heart Attack Disease Classification Salsa Desmalia; Amril Mutoi Siregar; Kiki Ahmad Baihaqi; Tatang Rohana
Scientific Journal of Informatics Vol. 11 No. 2: May 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i2.4561

Abstract

Purpose: The purpose of this study is to classify the number of people affected by heart disease and those not affected by heart disease based on various categories of heart attack causes. This study aims to urge people to take better care of their health and to serve as a reference for doctors to educate patients about the dangers of heart attacks. Methods: The model will be constructed via a machine learning methodology. The algorithms utilized in its development encompass the Support Vector Machine (SVM) algorithm, the K-Nearest Neighbor (k-NN) algorithm, and the Random Forest (RF) algorithm.  This study utilizes principal component analysis (PCA) as a means of extracting optimized features from the dataset, employing techniques for dimension reduction prior to modeling the data. Result: Cumulative explication of the concept of variance constitutes a foundational aspect of PCA (principal component analysis) within the scope of the current research, namely a dimensionality reduction technique employed in multivariate data analysis to facilitate model development, thereby enabling the creation of more optimal and comprehensive models. In this research, the dimensions of training data are incorporated during the process of model creation.   The results show KNN model exhibits the highest performance, with an accuracy of 86%, precision of 86%, recall of 91%, and F1-score of 88%. Furthermore, evaluation using the ROC metric also provides a relatively favorable value, 0.85. Novelty: Researchers used 1190 patient data sourced from Kaggle. Before modeling the algorithm, researchers conducted EDA & Preprocessing which includes missing values to find data that does not have information, then duplicate data to find duplicated data, there are 270 duplicated data, then the duplicated data is deleted so that the data becomes 737, then PCA implementation is carried out.  PCA is reducing features automatically without changing the data.
Identifikasi Penyakit Diabetes Mellitus Menggunakan Algoritma Support Vector Machine dan Random Forest Agusti, Anggi Renata; Fauzi, Ahmad; Baihaqi, Kiki Ahmad; Rohana, Tatang
JURNAL RISET KOMPUTER (JURIKOM) Vol. 12 No. 4 (2025): Agustus 2025
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v12i4.8686

Abstract

Diabetes mellitus is a chronic metabolic disease that is increasingly common in Indonesia, estimated to affect more than 10.8 million people in 2020. This disease needs to be recognized early to prevent serious complications that can increase morbidity and mortality. By comparing the two methods, this study was conducted to determine whether one approach shows a better level of accuracy and to develop a classification model based on patient data. The research data was provided by the Anggadita Health Center which includes demographic data, lifestyle, and health assessment results from 1001 patients. One of the research steps is data pre-processing to evaluation. SVM and RF modeling can evaluate models using accuracy, precision, recall, and F1-score metrics. Based on the test results, the Random Forest algorithm showed the best performance with an accuracy of 99%, precision of 99%, recall of 100%, and F1-score of 99%, while SVM got an accuracy of 91%, precision of 0.93%, recall of 0.91%, and F1-score of 0.92%. This shows how well Random Forest separates patients with and without diabetes. This study is expected to be one of the references in obtaining information for making medical decision support systems so that health workers can be faster and more accurate in diagnosing diabetes mellitus.
Detection of Rice Leaf Pests Based on Images with Convolution Neural Network in Yollo v8 Fauzi, Ahmad; Baihaqi, Kiki Ahmad; Pertiwi, Anggun; Devianto, Yudo; Dwiasnati, Saruni
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol. 13 No. 1 (2024): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v13i1.2008

Abstract

Detection of rice leaf pests is important in agriculture because it can help farmers determine appropriate preventive measures. One method that can be used to detect rice leaf pests is digital image processing technology. In this research, proof of suitability for solving this case was carried out between the Convolutional Neural Network (CNN) algorithm which was run offline with R-CNN and YOLOv8 for detecting rice leaf pests. At the data preparation stage, images of rice leaves were taken from various sources with a total of 100 images taken from website data and 10 images taken from the research site. Next, preprocessing and data augmentation are carried out to improve image quality and increase data variation. At the model training stage, a training and evaluation process is carried out using two types of algorithms, namely R-CNN and YOLOv8. The accuracy of the testing results using the same data using Yolov8 obtained 87.0% accuracy and 79% precision, while using R-CNN the results obtained were 85% for accuracy and 75% for precision with data divided into 80 training data 20 validation data and 10 testing data. Labeling the dataset uses Makesensei which has been completely standardized, with the resulting parameters being the spots on rice leaves.
Analisis Sentimen Rencana Penerapan Cukai Pada Minuman Manis Kemasan Menggunakan Algoritma Naive Bayes dan Logistic Regression Gozali, Gozali; Baihaqi, Kiki Ahmad; Sukmawati, Cici Emilia; Wahiddin, Deden
Building of Informatics, Technology and Science (BITS) Vol 7 No 1 (2025): June (2025)
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v7i1.7411

Abstract

The plan to impose excise tax on packaged sweetened beverages (PSB) is proposed as a strategic measure to reduce sugar consumption among the public. This policy has elicited various responses from society, especially on social media platforms such as TikTok. The purpose of this study is to evaluate public sentiment towards the PSB excise tax policy by analyzing comments posted on the TikTok platform, comparing the performance of the Naive Bayes and Logistic Regression algorithms. Data were collected from comments on news videos about the implementation of the excise tax on PSB posted by official journalist accounts on TikTok, using the TikTok Comments Scraper available on the apipy website, resulting in 1,332 comments. The data were processed through preprocessing steps including text cleaning, tokenization, stemming, and word weighting using TF-IDF. After expert sentiment labeling, the data were then split into training and testing sets with an 80:20 ratio. Evaluation was conducted using a confusion matrix to obtain performance metrics such as accuracy, precision, recall, and F1-score for each model. The analysis revealed that negative comments dominated at 65.2%, while positive comments accounted for 34.8%. The Logistic Regression algorithm achieved an accuracy of 81.37%, precision of 86.22%, recall of 75.14%, and an F1-score of 77.06%. Meanwhile, the Naive Bayes algorithm obtained an accuracy of 79.85%, precision of 82.19%, recall of 74.17%, and an F1-score of 75.76%. It can be concluded that the majority of TikTok users still express negative responses to the PSB excise tax policy, and the Logistic Regression algorithm demonstrates superior performance in sentiment classification compared to the Naive Bayes algorithm.