Claim Missing Document
Check
Articles

Found 11 Documents
Search

Data Mining Application Analyzing Customer Purchase Patterns Using The Apriori Algorithm Prayugo, Moh. Lambang; Wibowo, Dibyo Adi; Hidajat, Moch. Sjamsul; Mintorini, Ery; Ali, Rabei Raad
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10308

Abstract

The study aims to implement Data Mining with Apriori Algorithm and Association Methods (shop cart analysis) to analyze the sales pattern of Kaffa Beauty Shop stores as a case study. Sales information obtained from stores is used to find out the repeated buying habits of cosmetic products. This analysis provides store owners with valuable information to make more useful decisions about product inventory management, marketing strategies, and other aspects of their business. The Apriori Algorithm implementation follows steps including data preprocessing, subsetting, frequent dataset search, and strong association rules (strong Association Rules). The results of the analysis show that there are important purchasing patterns among some cosmetic products that can be the basis of a more effective sales strategy. The study helps understand how data mining and Apriori Algorithms can be applied in business contexts such as Kaffa Beauty Shop stores. Therefore, the results of this analysis are expected to contribute greatly to improving business efficiency and optimizing marketing strategies for store owners and stakeholders. The research is also expected to show the enormous potential of data analysis to support optimal business decision making.
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1491

Abstract

Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that affects the character detection process. Punctuation marks, clothing, Swara script, vowels, and consonants are parts of the script that are often found in Javanetest scripts. Preserving Javanese script in the digital era, of course, must use technology that can support the digitization of Javanese script through the script detection process. The concept of script image is the image of Javanese script in ancient manuscripts. The process of character detection using certain techniques can be carried out to extract characters so that they can be read. Detection of Javanese characters can be found by finding a testing image. Here, we had been used 10 words images consisting of 3 to 5 syllables with the vowel aiu. Dataset process by Linear Binary Pattern (LBP) feature extraction, which is used to characterize images and describe image textures locally. LBP has been used in r=4 and preprocessing is also done by thresholding with d=0.3. This process can be done using the K-Nearest Neighbor algorithm. In 10 datasets of Javanese script words, an average accuracy value of 90.5% was obtained. The accuracy value of 100% is the highest and 50% is the lowest.
Testing Data Security Using a Vigenere Cipher Based on the QR Code Rachmawanto, Eko Hari; Gumelar, Rizky Syah; Nabila, Qotrunnada; Sari, Christy Atika; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1734

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
FOOTBALL PLAYER TRACKING, TEAM ASSIGNMENT, AND SPEED ESTIMATION USING YOLOV5 AND OPTICAL FLOW Hartono, Matthew Raymond; Sari, Christy Atika; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4165

Abstract

Football analysis is indispensable in improving team performance, developing strategy, and assessing the capabilities of players. A powerful system that combines YOLOv5 for object detection with optical flow tracks football players, assigns them to their respective teams, and estimates their speeds accurately. In the most crowded scenarios, the players and the ball are detected by YOLOv5 at 94.8% and 93.7% mAP, respectively. KMeans clustering based on jersey color assigns teams with 92.5% accuracy. Optical flow is estimating the speed with less than 2.3%. The perspective transformation using OpenCV improves trajectory and distance measurement, overcoming the challenges in overlapping players and changing camera angles. Experimental results underlined the system's reliability for capturing player speeds from 3 to 25 km/h and gave insight into the dynamic nature of team possession. However, there is still some challenge: 6% accuracy degradation in high overlap and illuminative changes. The future work involves expanding the dataset for higher robustness and ball tracking, which will comprehensively explain the dynamics of a match. The paper presents a flexible framework for automated football video analysis that paves the way for advanced sports analytics. This would also, in turn, enhance informed decision-making by coaches, analysts, and broadcasters by providing them with actionable metrics during training and competition. The proposed system joins the state-of-the-art YOLOv5 with optical flow and thereby forms the backbone of near-future football analysis.
A Combination of SHA-256 and DES for Visual Data Protection Wintaka, Aristides Bima; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72615

Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.
Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5 Pratama, Reza Arista; Rachmawanto, Eko Hari; Irawan, Candra; Erawan, Lalang; Laksana, Deddy Award Widya; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.75091

Abstract

The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it becomes more difficult to crack; therefore, to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5, including avalanche effect tests, encryption and decryption execution times, and entropy values of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES-128 algorithm with the MD-5 key can be used as an alternative for securing documents with stronger security, while maintaining standard processing times
Comparison of DenseNet-121 and MobileNet for Coral Reef Classification Hadi, Heru Pramono; Rachmawanto, Eko Hari; Ali, Rabei Raad
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 23 No. 2 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3683

Abstract

Coral reefs are a type of marine organism that has beauty and benefits for other sea creatures’ ecosystems. However, despite its beauty and usefulness, coral reefs are vulnerable to damage such as coral bleaching, which can impact other coral reef ecosystems. This research aims to classify digital images of healthy, bleached, and dead coral reefs. This research method is DenseNet-121 and MobileNet is based on Convolutional Neural Networks. This research uses a dataset from 1582 coral reef image data with three main classes: 720 were bleached, 150 were dead, and 712 were healthy. The testing process is carried out using several forms of split datasets, namely 60:10:30, 50:10:40, and 70:10:20. The test results obtained with a data sharing percentage of 60:10:30 show that MobileNet architecture achieved 88.00% accuracy, and DenseNet-121 achieved 91.57% accuracy. Using a data split percentage of 50:10:40, MobileNet achieved 84.51% accuracy, and DenseNet- 121 achieved 90.52% accuracy. Meanwhile, with a data separation percentage of 70:10:20, MobileNet achieved 85.48% accuracy, and DenseNet-121 achieved 92.74% accuracy.
VGG-16 ARCHITECTURE ON CNN FOR AMERICAN SIGN LANGUAGE CLASSIFICATION Meitantya, Mutiara Dolla; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.4.2160

Abstract

Every country has its sign language such as in Indonesia there are 2 types namely Indonesian Sign Language System called SIBI and BISINDO (Indonesian Sign Language). American Sign Language (ASL) is a sign language that is widely used in the world. In this research, the classification of American Sign Language (ASL) using the Convolutional Neural Network (CNN) method using VGG-16 architecture with Adam optimizer. The data used is 14000 ASL image data with 28 classes consisting of letters A to Z plus space and nothing with a division of 90% training data and 10% validation data. From this research, the overall accuracy is obtained with a value of 98% and the accuracy value of validation data evaluation is 89.07%.
Enhancing MPEG-1 Video Quality Using Discrete Wavelet Transform (DWT) with Coefficient Factor and Gamma Adjustment Krismawan, Andi Danang; Susanto, Ajib; Rachmawanto, Eko Hari; Muslih, Muslih; Sari, Christy Atika; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.2.4422

Abstract

Low-quality video caused by compression artifacts, noise, and loss of detail remains a significant challenge in video processing, affecting applications in streaming, surveillance, and medical imaging. Existing enhancement techniques often struggle with excessive noise amplification or high computational complexity, making them inefficient for real-time applications. This study proposes an improved video enhancement method using Discrete Wavelet Transform (DWT) with optimized coefficient factor and gamma adjustment. DWT is a mathematical approach that decomposes video frames into frequency subbands, enabling selective enhancement of important details. To analyze the impact of different wavelets, this study evaluates Coif5, db1, sym4, and sym8 wavelets. The sym8 wavelet, known for its high symmetry and ability to minimize artifacts, achieves the best results in preserving fine details and structural integrity. The coefficient factor is dynamically adjusted to sharpen details while preventing noise amplification, and gamma adjustment is applied to optimize brightness and contrast. The proposed method was evaluated using Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and Structural Similarity Index (SSIM). Experimental results show that sym8 wavelet with gamma 0.7 and coefficient factor 0.3 provides the best balance, achieving an MSE of 0.062, a PSNR of 12.050 dB, and an SSIM of 0.674, outperforming Coif5, db1, and sym4 wavelets. The results indicate that wavelet selection significantly impacts video enhancement performance, with sym8 providing superior contrast enhancement and noise suppression. This study contributes to real-time video processing and AI-based applications, ensuring enhanced visual quality with minimal computational overhead.
Multi-Class Brain Tumor Segmentation and Classification in MRI Using a U-Net and Machine Learning Model Hendrik, Jackri; Pribadi, Octara; Hendri, Hendri; Hoki, Leony; Tarigan, Feriani Astuti; Wijaya, Edi; Ali, Rabei Raad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.5369

Abstract

Brain tumor diagnosis remains a critical challenge in medical imaging, as accurate classification and precise localization are essential for effective treatment planning. Traditional diagnostic approaches often rely on manual interpretation of MRI scans, which can be time-consuming, subjective, and prone to variability across radiologists. To address this limitation, this study proposes a two-stage framework that integrates machine learning (ML) based classifiers for tumor type recognition and a U-Net architecture for tumor segmentation. The classifier was trained to distinguish four tumor categories: glioma, meningioma, pituitary, and no tumor, while the U-Net model was employed to delineate tumor regions at the pixel level, enabling volumetric assessment. The novelty of this research lies in its dual focus that combines classification and segmentation within a single framework, which enhances clinical applicability by offering both diagnostic and spatial insights. Experimental results demonstrated that among the evaluated classifiers, XGBoost achieved the highest accuracy of 86 percent, surpassing other models such as Random Forest, SVC, and Logistic Regression, while the U-Net model delivered consistent segmentation performance across tumor types. These findings highlight the potential of hybrid ML and deep learning solutions to improve reliability, efficiency, and objectivity in brain tumor analysis. In real-world practice, the proposed framework can serve as a valuable decision-support tool, assisting radiologists in early detection, reducing diagnostic workload, and supporting personalized treatment strategies.