Claim Missing Document
Check
Articles

Found 11 Documents
Search

Data Mining Application Analyzing Customer Purchase Patterns Using The Apriori Algorithm Prayugo, Moh. Lambang; Wibowo, Dibyo Adi; Hidajat, Moch. Sjamsul; Mintorini, Ery; Ali, Rabei Raad
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10308

Abstract

The study aims to implement Data Mining with Apriori Algorithm and Association Methods (shop cart analysis) to analyze the sales pattern of Kaffa Beauty Shop stores as a case study. Sales information obtained from stores is used to find out the repeated buying habits of cosmetic products. This analysis provides store owners with valuable information to make more useful decisions about product inventory management, marketing strategies, and other aspects of their business. The Apriori Algorithm implementation follows steps including data preprocessing, subsetting, frequent dataset search, and strong association rules (strong Association Rules). The results of the analysis show that there are important purchasing patterns among some cosmetic products that can be the basis of a more effective sales strategy. The study helps understand how data mining and Apriori Algorithms can be applied in business contexts such as Kaffa Beauty Shop stores. Therefore, the results of this analysis are expected to contribute greatly to improving business efficiency and optimizing marketing strategies for store owners and stakeholders. The research is also expected to show the enormous potential of data analysis to support optimal business decision making.
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1491

Abstract

Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that affects the character detection process. Punctuation marks, clothing, Swara script, vowels, and consonants are parts of the script that are often found in Javanetest scripts. Preserving Javanese script in the digital era, of course, must use technology that can support the digitization of Javanese script through the script detection process. The concept of script image is the image of Javanese script in ancient manuscripts. The process of character detection using certain techniques can be carried out to extract characters so that they can be read. Detection of Javanese characters can be found by finding a testing image. Here, we had been used 10 words images consisting of 3 to 5 syllables with the vowel aiu. Dataset process by Linear Binary Pattern (LBP) feature extraction, which is used to characterize images and describe image textures locally. LBP has been used in r=4 and preprocessing is also done by thresholding with d=0.3. This process can be done using the K-Nearest Neighbor algorithm. In 10 datasets of Javanese script words, an average accuracy value of 90.5% was obtained. The accuracy value of 100% is the highest and 50% is the lowest.
Testing Data Security Using a Vigenere Cipher Based on the QR Code Rachmawanto, Eko Hari; Gumelar, Rizky Syah; Nabila, Qotrunnada; Sari, Christy Atika; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1734

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
FOOTBALL PLAYER TRACKING, TEAM ASSIGNMENT, AND SPEED ESTIMATION USING YOLOV5 AND OPTICAL FLOW Hartono, Matthew Raymond; Sari, Christy Atika; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4165

Abstract

Football analysis is indispensable in improving team performance, developing strategy, and assessing the capabilities of players. A powerful system that combines YOLOv5 for object detection with optical flow tracks football players, assigns them to their respective teams, and estimates their speeds accurately. In the most crowded scenarios, the players and the ball are detected by YOLOv5 at 94.8% and 93.7% mAP, respectively. KMeans clustering based on jersey color assigns teams with 92.5% accuracy. Optical flow is estimating the speed with less than 2.3%. The perspective transformation using OpenCV improves trajectory and distance measurement, overcoming the challenges in overlapping players and changing camera angles. Experimental results underlined the system's reliability for capturing player speeds from 3 to 25 km/h and gave insight into the dynamic nature of team possession. However, there is still some challenge: 6% accuracy degradation in high overlap and illuminative changes. The future work involves expanding the dataset for higher robustness and ball tracking, which will comprehensively explain the dynamics of a match. The paper presents a flexible framework for automated football video analysis that paves the way for advanced sports analytics. This would also, in turn, enhance informed decision-making by coaches, analysts, and broadcasters by providing them with actionable metrics during training and competition. The proposed system joins the state-of-the-art YOLOv5 with optical flow and thereby forms the backbone of near-future football analysis.
A Combination of SHA-256 and DES for Visual Data Protection Wintaka, Aristides Bima; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72615

Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.
Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5 Pratama, Reza Arista; Rachmawanto, Eko Hari; Irawan, Candra; Erawan, Lalang; Laksana, Deddy Award Widya; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.75091

Abstract

The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it becomes more difficult to crack; therefore, to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5, including avalanche effect tests, encryption and decryption execution times, and entropy values of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES-128 algorithm with the MD-5 key can be used as an alternative for securing documents with stronger security, while maintaining standard processing times
VGG-16 ARCHITECTURE ON CNN FOR AMERICAN SIGN LANGUAGE CLASSIFICATION Meitantya, Mutiara Dolla; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2160

Abstract

Every country has its sign language such as in Indonesia there are 2 types namely Indonesian Sign Language System called SIBI and BISINDO (Indonesian Sign Language). American Sign Language (ASL) is a sign language that is widely used in the world. In this research, the classification of American Sign Language (ASL) using the Convolutional Neural Network (CNN) method using VGG-16 architecture with Adam optimizer. The data used is 14000 ASL image data with 28 classes consisting of letters A to Z plus space and nothing with a division of 90% training data and 10% validation data. From this research, the overall accuracy is obtained with a value of 98% and the accuracy value of validation data evaluation is 89.07%.
Enhancing MPEG-1 Video Quality Using Discrete Wavelet Transform (DWT) with Coefficient Factor and Gamma Adjustment Krismawan, Andi Danang; Susanto, Ajib; Rachmawanto, Eko Hari; Muslih, Muslih; Sari, Christy Atika; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.2.4422

Abstract

Low-quality video caused by compression artifacts, noise, and loss of detail remains a significant challenge in video processing, affecting applications in streaming, surveillance, and medical imaging. Existing enhancement techniques often struggle with excessive noise amplification or high computational complexity, making them inefficient for real-time applications. This study proposes an improved video enhancement method using Discrete Wavelet Transform (DWT) with optimized coefficient factor and gamma adjustment. DWT is a mathematical approach that decomposes video frames into frequency subbands, enabling selective enhancement of important details. To analyze the impact of different wavelets, this study evaluates Coif5, db1, sym4, and sym8 wavelets. The sym8 wavelet, known for its high symmetry and ability to minimize artifacts, achieves the best results in preserving fine details and structural integrity. The coefficient factor is dynamically adjusted to sharpen details while preventing noise amplification, and gamma adjustment is applied to optimize brightness and contrast. The proposed method was evaluated using Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM). Experimental results show that sym8 wavelet with gamma 0.7 and coefficient factor 0.3 provides the best balance, achieving an MSE of 0.062, a PSNR of 12.050 dB, and an SSIM of 0.674, outperforming Coif5, db1, and sym4 wavelets. The results indicate that wavelet selection significantly impacts video enhancement performance, with sym8 providing superior contrast enhancement and noise suppression. This study contributes to real-time video processing and AI-based applications, ensuring enhanced visual quality with minimal computational overhead.
Multi-Class Brain Tumor Segmentation and Classification in MRI Using a U-Net and Machine Learning Model Hendrik, Jackri; Pribadi, Octara; Hendri, Hendri; Hoki, Leony; Tarigan, Feriani Astuti; Wijaya, Edi; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.5369

Abstract

Brain tumor diagnosis remains a critical challenge in medical imaging, as accurate classification and precise localization are essential for effective treatment planning. Traditional diagnostic approaches often rely on manual interpretation of MRI scans, which can be time-consuming, subjective, and prone to variability across radiologists. To address this limitation, this study proposes a two-stage framework that integrates machine learning (ML) based classifiers for tumor type recognition and a U-Net architecture for tumor segmentation. The classifier was trained to distinguish four tumor categories: glioma, meningioma, pituitary, and no tumor, while the U-Net model was employed to delineate tumor regions at the pixel level, enabling volumetric assessment. The novelty of this research lies in its dual focus that combines classification and segmentation within a single framework, which enhances clinical applicability by offering both diagnostic and spatial insights. Experimental results demonstrated that among the evaluated classifiers, XGBoost achieved the highest accuracy of 86 percent, surpassing other models such as Random Forest, SVC, and Logistic Regression, while the U-Net model delivered consistent segmentation performance across tumor types. These findings highlight the potential of hybrid ML and deep learning solutions to improve reliability, efficiency, and objectivity in brain tumor analysis. In real-world practice, the proposed framework can serve as a valuable decision-support tool, assisting radiologists in early detection, reducing diagnostic workload, and supporting personalized treatment strategies.
Comparative Study of Machine Learning Algorithms for Performing Ham or Spam Classification in SMS Astuti, Erna Zuni; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Scientific Journal of Informatics Vol 11, No 1 (2024): February 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i1.47364

Abstract

Purpose: Fraud is rampant in the current era, especially in the era of technology where there is now easy access to a lot of information. Therefore, everyone needs to be able to sort out whether the information received is the right information or information that is fraudulent. In this research, the process of classifying messages including ham or spam has been carried out. The purpose of this research is to be able to build a model that can help classify messages. The purpose of this research is also to determine which machine learning method can accurately and efficiently perform the ham or spam classification process on messages.Methods: In this research, the ham or spam classification process has been using machine learning methods. The machine learning methods used are the classification process with Random Forest, Logistic Regression, Support Vector Classification, Gradient Boosting, and XGBoost Classifier algorithms. Results: The results obtained after testing in this study are the classification process using the Random Forest algorithm getting an accuracy of 97.28%, Logistic Regression getting an accuracy of 94.67%, with Support Vector Classification getting an accuracy of 97.93%, and using XGBoost Classifier getting an accuracy of 96.47%. The best precision value obtained in this study is 98% when using the random forest algorithm. The best recall value is 94% when using the SVC algorithm. While the best f1-score value is 95% when using the SVC algorithm.Novelty: This research has been compared with several algorithms. In previous research, it is still very rarely done using XGBoost to classify the ham or spam in messages. We focus on giving brief information based con comparison algorithm and show the best algorithm to classify classify the ham or spam in messages. And for the novelty that exists from this research, the machine learning model built gets better accuracy when compared to previous research.