Claim Missing Document
Check
Articles

Found 7 Documents
Search

Data Mining Application Analyzing Customer Purchase Patterns Using The Apriori Algorithm Prayugo, Moh. Lambang; Wibowo, Dibyo Adi; Hidajat, Moch. Sjamsul; Mintorini, Ery; Ali, Rabei Raad
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10308

Abstract

The study aims to implement Data Mining with Apriori Algorithm and Association Methods (shop cart analysis) to analyze the sales pattern of Kaffa Beauty Shop stores as a case study. Sales information obtained from stores is used to find out the repeated buying habits of cosmetic products. This analysis provides store owners with valuable information to make more useful decisions about product inventory management, marketing strategies, and other aspects of their business. The Apriori Algorithm implementation follows steps including data preprocessing, subsetting, frequent dataset search, and strong association rules (strong Association Rules). The results of the analysis show that there are important purchasing patterns among some cosmetic products that can be the basis of a more effective sales strategy. The study helps understand how data mining and Apriori Algorithms can be applied in business contexts such as Kaffa Beauty Shop stores. Therefore, the results of this analysis are expected to contribute greatly to improving business efficiency and optimizing marketing strategies for store owners and stakeholders. The research is also expected to show the enormous potential of data analysis to support optimal business decision making.
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1491

Abstract

Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that affects the character detection process. Punctuation marks, clothing, Swara script, vowels, and consonants are parts of the script that are often found in Javanetest scripts. Preserving Javanese script in the digital era, of course, must use technology that can support the digitization of Javanese script through the script detection process. The concept of script image is the image of Javanese script in ancient manuscripts. The process of character detection using certain techniques can be carried out to extract characters so that they can be read. Detection of Javanese characters can be found by finding a testing image. Here, we had been used 10 words images consisting of 3 to 5 syllables with the vowel aiu. Dataset process by Linear Binary Pattern (LBP) feature extraction, which is used to characterize images and describe image textures locally. LBP has been used in r=4 and preprocessing is also done by thresholding with d=0.3. This process can be done using the K-Nearest Neighbor algorithm. In 10 datasets of Javanese script words, an average accuracy value of 90.5% was obtained. The accuracy value of 100% is the highest and 50% is the lowest.
Testing Data Security Using a Vigenere Cipher Based on the QR Code Rachmawanto, Eko Hari; Gumelar, Rizky Syah; Nabila, Qotrunnada; Sari, Christy Atika; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1734

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
FOOTBALL PLAYER TRACKING, TEAM ASSIGNMENT, AND SPEED ESTIMATION USING YOLOV5 AND OPTICAL FLOW Hartono, Matthew Raymond; Sari, Christy Atika; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4165

Abstract

Football analysis is indispensable in improving team performance, developing strategy, and assessing the capabilities of players. A powerful system that combines YOLOv5 for object detection with optical flow tracks football players, assigns them to their respective teams, and estimates their speeds accurately. In the most crowded scenarios, the players and the ball are detected by YOLOv5 at 94.8% and 93.7% mAP, respectively. KMeans clustering based on jersey color assigns teams with 92.5% accuracy. Optical flow is estimating the speed with less than 2.3%. The perspective transformation using OpenCV improves trajectory and distance measurement, overcoming the challenges in overlapping players and changing camera angles. Experimental results underlined the system's reliability for capturing player speeds from 3 to 25 km/h and gave insight into the dynamic nature of team possession. However, there is still some challenge: 6% accuracy degradation in high overlap and illuminative changes. The future work involves expanding the dataset for higher robustness and ball tracking, which will comprehensively explain the dynamics of a match. The paper presents a flexible framework for automated football video analysis that paves the way for advanced sports analytics. This would also, in turn, enhance informed decision-making by coaches, analysts, and broadcasters by providing them with actionable metrics during training and competition. The proposed system joins the state-of-the-art YOLOv5 with optical flow and thereby forms the backbone of near-future football analysis.
A Combination of SHA-256 and DES for Visual Data Protection Wintaka, Aristides Bima; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72615

Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.
Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5 Pratama, Reza Arista; Rachmawanto, Eko Hari; Irawan, Candra; Erawan, Lalang; Laksana, Deddy Award Widya; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.75091

Abstract

The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it becomes more difficult to crack; therefore, to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5, including avalanche effect tests, encryption and decryption execution times, and entropy values of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES-128 algorithm with the MD-5 key can be used as an alternative for securing documents with stronger security, while maintaining standard processing times
Comparison of DenseNet-121 and MobileNet for Coral Reef Classification Hadi, Heru Pramono; Rachmawanto, Eko Hari; Ali, Rabei Raad
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 23 No. 2 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3683

Abstract

Coral reefs are a type of marine organism that has beauty and benefits for other sea creatures’ ecosystems. However, despite its beauty and usefulness, coral reefs are vulnerable to damage such as coral bleaching, which can impact other coral reef ecosystems. This research aims to classify digital images of healthy, bleached, and dead coral reefs. This research method is DenseNet-121 and MobileNet is based on Convolutional Neural Networks. This research uses a dataset from 1582 coral reef image data with three main classes: 720 were bleached, 150 were dead, and 712 were healthy. The testing process is carried out using several forms of split datasets, namely 60:10:30, 50:10:40, and 70:10:20. The test results obtained with a data sharing percentage of 60:10:30 show that MobileNet architecture achieved 88.00% accuracy, and DenseNet-121 achieved 91.57% accuracy. Using a data split percentage of 50:10:40, MobileNet achieved 84.51% accuracy, and DenseNet- 121 achieved 90.52% accuracy. Meanwhile, with a data separation percentage of 70:10:20, MobileNet achieved 85.48% accuracy, and DenseNet-121 achieved 92.74% accuracy.