Agus Harjoko
Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Text Detection In Indonesian Identity Card Based On Maximally Stable Extremal Regions Angga Maulana Purba; Agus Harjoko; Mohammad Edi Wibowo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 2 (2019): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.41259

Abstract

Most of Indonesian organizations either it is government or non government sometime required their member to provide their identity card (E-KTP) as legal document collection in their database. This collection of image usually being used as manual verification method. These document images acquired by each person with their own device, there are variations of angles they are used to acquire the image. This situation created problems in text recognition by OCR softwares especially in text detection part, orientation and noise will affect their accuracy. These cases making the text detection more complex and cannot be solved by simple vertical projection profile of black pixels.  This research proposed a method to improve text detection in identity document by fixing the orientation first, then using MSER regions to form text region. We fix the orientation using the line that made by Progressive Probabilistic Hough Transform. Then we used MSER to obtain all candidate regions and Horizontal RLSA acts as connector between those candidate. The orientation fixing strategy reach average of margin error 0.377o (in 360o system) and the text detection method reach 84.49% accuracy in best condition.
Classification of Traffic Vehicle Density Using Deep Learning Abdul Kholik; Agus Harjoko; Wahyono Wahyono
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 14, No 1 (2020): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.50376

Abstract

The volume density of vehicles is a problem that often occurs in every city, as for the impact of vehicle density is congestion. Classification of vehicle density levels on certain roads is required because there are at least 7 vehicle density level conditions. Monitoring conducted by the police, the Department of Transportation and the organizers of the road currently using video-based surveillance such as CCTV that is still monitored by people manually. Deep Learning is an approach of synthetic neural network-based learning machines that are actively developed and researched lately because it has succeeded in delivering good results in solving various soft-computing problems, This research uses the convolutional neural network architecture. This research tries to change the supporting parameters on the convolutional neural network to further calibrate the maximum accuracy. After the experiment changed the parameters, the classification model was tested using K-fold cross-validation, confusion matrix and model exam with data testing. On the K-fold cross-validation test with an average yield of 92.83% with a value of K (fold) = 5, model testing is done by entering data testing amounting to 100 data, the model can predict or classify correctly i.e. 81 data.
Steganographic Model for encrypted messages based on DNA Encoding Alfian Abdul Jalid; Agus Harjoko; Anny Kartika Sari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 15, No 1 (2021): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.61767

Abstract

Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more security to ensure its confidentiality. One way of securing information is by hiding the information in certain media using steganography techniques. Steganography is a method of hiding information into other files to make it invisible. One of the most frequently used steganographic methods is Least Significant Bit (LSB).In this study, the LSB method will be modified using DNA Encoding and Chargaff's Rule. Chargaff's Rule or complementary base pairing rule is used to construct a complementary strand. The modification of the LSB method using DNA encoding and Chargaff's Rule is expected to increase the security of the information.The MSE test results show the average value of the LSB method is 0.000236368, while the average value for the DNA Encoding-based Steganography method is 0.000770917. The average PSNR value for the LSB method was 76.82 dB while the DNA Encoding-based Steganography method had an average value of 70.88 dB. The time of inserting and extracting messages using the Steganography method based on DNA Encoding is relatively longer than the LSB method because of its higher algorithmic complexity. The message security of the DNA Encoding-based Steganography method is better because there is encryption in the algorithm compared to the LSB method which does not have encryption.
Transliteration of Hiragana and Katakana Handwritten Characters Using CNN-SVM Nicolaus Euclides Wahyu Nugroho; Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 15, No 3 (2021): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.66062

Abstract

Hiragana and katakana handwritten characters are often used when writing words in Japanese. Japanese itself is often used by native Japanese as well as people learning Japanese around the world. Hiragana and katakana characters themselves are difficult to learn because many characters are similar to one another. In this study, hiragana and basic katakana, dakuten, handakuten, and youon were used, which were taken from the respondents using a questionnaire. This study used the CNN method which will be compared with a combination of the CNN and SVM methods which have been designed to identify each character that has been prepared. Preprocessing of character images uses the methods of image resizing, grayscaling, binarization, dilation, and erosion. The preprocessed results will be input for CNN as a feature extraction tool and SVM as a tool for character recognition. The results of this study obtained accuracy with the following parameters: 69×69 image size, 3 patience values, val_loss monitor callbacks, Nadam optimization function, 0.001 learning rate value, 30 epochs value, and SVM RBF kernel. If using a system that only uses the CNN network, the accuracy is 87.82%. The results obtained when using a combination of CNN and SVM were 88.21%.
On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System Bryan Andi Gerrardo; Agus Harjoko; Nai Wei Lo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 16, No 2 (2022): April
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.67669

Abstract

 The job recruitment process takes a lot of process and number of documents. It is very well known for applicants to exaggerated and falsify their work history data. It may put a company at legal risk and significant commercial losses. Generally, company use third-party to verify applicant’s work history data which is time-consuming and costly. It also makes companies relies on third-party which may not trustworthy and cause several other risks. Generally, experience letters is used as a proof of work history documents of employee. However, the process of publishing an experience letter may contain conflict of interest between company and employee. Yet, publishing an experience letter is not mandatory in several places. In this research, we propose a system to verify applicant’s work history data by using performance appraisal as proof of work history and utilizing Blockchain to provide secure system, tampered-proof and real-time verification. The proposed approach also minimizes trust issues and privacy of data sharing by adding encryption and digital signature schema using Elliptic Curve Cryptography (ECC) algorithm. Furthermore, we have implemented a prototype to demonstrate how the proposed system work using a Quorum-based consortium blockchain.