Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JAIS (Journal of Applied Intelligent System)

CNN for Image Identification of Hiragana Based on Pattern Recognition using CNN Chaerul Umam; Andi Danang Krismawan; Rabei Raad Ali
Journal of Applied Intelligent System Vol 6, No 2 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i2.4586

Abstract

Hiragana is one of the letters in Japanese. In this study, CNN (Convolutional Neural Network) method used as identication method, while he preprocessing used thresholding. Then carry out the normalization stage and the filtering stage to remove noise in the image. At the training stage use maxpooling and danse methods as a liaison in the training process, wherea in testing stage using the Adam Optimizer method. Here, we use 1000 images from 50 hiragana characters with a ratio of 950: 50, 950 as training data and 50 data as testing data. Our experiment yield accuracy in 95%.
A Video Quality Testing : Review of Human Visual Aspect Andi Danang Krismawan; Lekso Budi Handoko
Journal of Applied Intelligent System Vol 6, No 2 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i2.4613

Abstract

Various types of video player applications have been widely used by the community. The emergence of the latest version and a variety of features make people need to make a choice to use a video player application with a good visual level. The type of video that is often played is a file with an MP4 extension. This file type is not heavy but is usually intended for long file durations such as movies. In this paper, we will use a dataset in the form of a movie file with an MP4 extension. The video player applications used include VLC, Quick time, Potplayer, KMPLayer, Media Player Classic (MPC), DivX Player, ACG Player, Kodi, MediaMonkey. Through various empirical calculations, such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structutral Similarity Index Measurement (SSIM), Threshold F-ratio, Visual Signal to Noise Ratio (VSNR), Visual Quality Metric (VQM), and Multiscale - Structutral Similarity Index Measurement (MS-SSIM) has analyzed the visual capabilities of each video player application. Experimental results prove that the KMPlayer application gets the best visual results compared to other selected applications.
A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang Lekso Budi Handoko; Andi Danang Krismawan
Journal of Applied Intelligent System Vol 6, No 2 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i2.4502

Abstract

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.