Claim Missing Document
Check
Articles

Found 38 Documents
Search

Metode Penentuan Keyframe Berdasarkan Kesamaan Event Pada Pengelompokanframe Video Menggunakan Histogram Bin Warna HCL Ire Puspa Wardhani; Lussiana, ETP; Sunny Arief Sudiro; Sarifuddin Madenda; Prihandoko
Prosiding Seminar SeNTIK Vol. 2 No. 1 (2018): Prosiding SeNTIK 2018
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini merupakan bagian dari penelitian tentang pencarian video berbasis konten dimana salah satu prosesnya adalah pengelompokan frame video dengan menggunakan metode penentuan keyframe berdasarkan kesamaan event dengan menggunakan histogram bin warna, salah satu tahapan proses penentuan keyframe diawali dengan proses ekstraksi file video yaitu memisahkan frame-frame dalam video tersebut, selanjutnya, frame-frame tersebut diekstraksi berdasarkan fitur warna local dan global dengan menggunakan histogram bin warna 3D. Prosespengelompokan frame-frame ini berada dalam satu event yang sama, sehinggahasilnya berupa cuplikan-cuplikan atau klip-klip video event. Metode penentuan keyframe ini sebagai ID yang akan merepresentasikan setiap klip video event dan menghasilkan tiga jenis data, pertama adalah keyframe-keyframe dengan fitur bin warnanya masing-masing sebagai ID dari setiap klip video event. Kedua adalah klip-klip video event yang masing-masing berisikan kelompok frame sesuai dengan event atau event saat pembuatan video, dan Ketiga adalah data file video itu sendiri. Tiga data ini kemudian disimpan dalam sebuah basis data,, dan metode penentuan keyframe ini sangat berhubungan dengan klip video event yang diwakilkannya dan setiap klip video event memiliki keterhubungan dengan file videonya sendiri sehingga nantinya akan berpengaruh terhadap hasil pencarian dan temu kembali video berbasis konten
An optimized transfer learning-based approach for Crocidolomia pavonana larvae classification Risnawati, Risnawati; Rodiah, Rodiah; Madenda, Sarifuddin; Tri Susetianingtias, Diana
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i3.pp2270-2281

Abstract

The increasing demand for mustard greens has driven farmers to continuously improve mustard greens cultivation. One of the challenges in mustard greens cultivation is the presence of insect pests. A significant pest in mustard greens is Crocidolomia pavonana (C. pavonana). C. pavonana damages plants by feeding on various parts, especially the leaves. The initial step in controlling them is insect pest monitoring. Monitoring aims to establish the control threshold. C. pavonana larvae have four instar stages: instar 1, 2, 3, and 4. Identification of the instar larval stages utilizes deep convolutional neural network (CNN) to classify C. Pavonana larvae on mustard greens using ResNet50V2 and DenseNet169 architectures optimized to enhance classification accuracy. The classification evaluation results show that both DenseNet169 and ResNet50V2 models achieve high accuracy, with DenseNet169 reaching the highest accuracy at 97.1%, while ResNet50V2 achieves an accuracy of 94.2%. The lower loss values on the test data compared to the validation data indicate that the deep learning models have successfully captured the patterns in C. pavonana images for classification. This classification process is expected to be one of the activities in monitoring the instar larvae to improve the accuracy of insecticide spraying and enhance mustard greens production.
Multi-Label Classification of Indonesian Voice Phishing Conversations: A Comparative Study of XLM-RoBERTa and ELECTRA Hidayat, Ahmad; Madenda, Sarifuddin; Hustinawaty, Hustinawaty
Journal of Applied Data Sciences Vol 6, No 3: September 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i3.858

Abstract

Mobile phones have become a primary means of communication, yet their advancement has also been exploited by cybercriminals, particularly through voice phishing schemes. Voice phishing is a form of social engineering fraud carried out via telephone conversations to illegally obtain personal or financial information. The complexity of voice phishing continues to increase, as a single conversation may involve multiple fraudulent schemes simultaneously, necessitating the application of multi-label classification to comprehensively identify all motives of fraud. Previous studies have predominantly utilized single-label approaches and foreign-language data, making them less relevant to the Indonesian language context and unable to produce speaker segmentation outputs for conversational analysis. This study contributes by developing a multi-label voice phishing classification system specifically for Indonesian telephone conversations to address this gap. Audio data were collected from open sources and simulated recordings, resulting in a total of 300 samples labeled into six categories: five phishing modes and one non-phishing category. The proposed system consists of a preprocessing pipeline that includes noise reduction, speaker segmentation, automatic transcription, and text cleaning to preserve the context of two-way conversations. Two machine learning models based on transformer architectures, XLM-RoBERTa and ELECTRA, are employed to identify various fraud schemes that may occur simultaneously within a single conversation. The dataset was split into training, validation, and testing sets with two division ratios for performance evaluation. Several combinations of hyperparameters were tested to obtain the most optimal model configuration. Evaluation was conducted using a supervised learning approach and various performance metrics. The experimental results show that XLM-RoBERTa achieved the highest average accuracy of 97.04 ± 1.15% and the highest average F1-score of 92.66 ± 2.59%. These results highlight the novelty of applying multi-label classification in the Indonesian language context for voice phishing detection, contributing to more effective fraud identification in real-world telephony systems.
Solar module defects classification using deep convolutional neural network Cahyaningtyas, Rizqia; Madenda, Sarifuddin; Bertalya, Bertalya; Indarti, Dina
International Journal of Advances in Intelligent Informatics Vol 11, No 3 (2025): August 2025
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v11i3.1818

Abstract

Solar modules are essential components of a solar power plant, that are designed to withstand scorching heat, storms, strong winds, and other natural influences. However, continuous usage can cause defects in solar modules, preventing them from producing electrical energy optimally. This paper proposes the development of a deep learning-based system for identifying and classifying solar module surface defects in solar power plants. Module surface condition are classified into five categories: clean, dirt, burn, crack, and snail track. The dataset used consists of 8,370 images, including primary image data acquired directly from the mini solar power plant at the Renewable Energy Laboratory of PLN Institute of Technology, and secondary image data obtained from public repositories. The limitation in the number of images in each category was overcome using data augmentation techniques. The proposed classification model combines Deep Convolutional Neural Networks (DCNN) with transfer learning models (DenseNet201, MobileNetV2, and EfficientNetB0) to perform supervised image classification. Training and testing results on the three models demonstrated that the combination of DCNN + DenseNet201 provided the best performance, with a classification accuracy of 97.85%, compared to 97.25% accuracy for DCNN + EfficientNetB0 and 94.98% for DCNN + MobileNetV2. This research shows that DCNN-based image classification reliably diagnoses solar module defects and supports using RGB images for surface defect classification. Applying the developed system to solar power plant maintenance management can help in accelerating the process of identifying panel defects, determining defect types, and performing panel maintenance or repairs, while ensuring optimal power production.
Fine-tuning GloVe Embedding with Contextual Information for Synthetic Batik Pattern Generation Khalida, Rakhmi; Madenda, Sarifuddin; Harmanto, Suryadi; Wiryana , I Made
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 11 No. 3 (2025): September
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v11i3.30738

Abstract

Batik is an Indonesian cultural heritage that is rich in philosophical and symbolic meanings. To support preservation and innovation, this research examines the use of Generative Adversarial Networks (GAN) in generating synthetic batik patterns based on natural language description. The main challenge lies in the interpretation of semantically complex cultural texts. This research proposes a fine-tuning approach of the GloVe word insertion model with a batik domain-specific corpus. The dataset consists of 3,100 batik images of Parang and Kawung motifs, each accompanied by 10 textual descriptions. Two approaches were evaluated: GloVe generalized pre-training and GloVe enhanced. The GAN architecture combines multimodal input and up sampling techniques to generate images from text. Intrinsic evaluation results showed that the customized GloVe model improved the average cosine similarity value to 0.99. A paired t-test between the general model and the refined results yielded p < 0.01, indicating a statistically significant improvement. Extrinsic evaluation using Fréchet Inception Distance (FID) and Inception Score (IS) showed an improvement in visual quality: FID decreased from 64.5 to 48.1, and IS increased from 2.37 to 3.23. These findings demonstrate the effectiveness of semantic enhancement for improving the synthesis of culturally meaningful visuals. In addition to the technical contribution, this study demonstrates the potential of AI in the preservation of Indonesia's cultural heritage through.
A New Chaos Function Developed through the Composition of the MS Map and the Circle Map Mursidah, Ichsani; Suryadi, S; Madenda, Sarifuddin; Harmanto, Suryadi
Proceeding International Conference on Mathematics and Learning Research 2023: Proceeding International Conference on Mathematics and Learning Research
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rise of digital data theft makes researchers try to find better methods for digital data protection. Confidential digital data can be secured by encryption methods, one of which is the chaos function. We propose in this paper a new chaos function which is a composition of MS Map and Circle Map functions. This function has chaotic nature and is named the MS Circle Map. The sensitivity and randomness tests of the MS Circle map function are carried out using a bifurcation diagram, Lyapunov Exponent, and NIST. The analysis result of the bifurcation diagram shows that the MS Circle map has a good density at the value of r E (0,4). Besides that, the Lyapunov Exponent has a non-negative value at r E [0.4, 4], X0 = 0.9, r = 3.8, W = 0.5 λ = 2.1 which is the domain Xn E (0, 1) and parameter values r, E, and Ω, K are any real numbers. The results of the NIST randomness level test show that the MSC Map function all passed the randomness test of 16 NIST tests.
Detection of errors in the Indonesian standard mushaf based on pixels to support accelerated verification Widyaningsih, Tri Wahyu; Madenda, Sarifuddin; Salim, Ravi Ahmad; Nugraha, Nurma
International Journal of Advances in Intelligent Informatics Vol 11, No 4 (2025): November 2025
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v11i4.1820

Abstract

One effort to maintain the validity of the Al-Qur’an manuscript is the conduct of pentashihan, the analysis and verification of manuscripts by experts (pentashih). Currently, manuscript verification without translation takes 30 working days. Therefore, to support pentashih in checking the manuscript, technology is needed to speed up the pentashih process and avoid analysis errors caused by pentashih fatigue. This study conducts a writing analysis of the target manuscript by referring to the template manuscript, implementing image pre-processing stages, analysing using SSIM, and using the pixel-matching method. This method analyses and checks the manuscript's writing by comparing two block images using pixel-value analysis. Block images are the result of pre-processing the manuscript images before image matching analysis is performed. Image preprocessing consists of cropping the outer frame, cropping the inner frame, segmenting the page into row images, adjusting the margins, aligning the sizes, segmenting the row into block images, and aligning the positions between the two block images. The calculation of pixel value differences is performed at the same positions in each column and row of the template and target block images. Block image positions with pixel values ≥ 200 occur in 5 consecutive columns, adjacent rows with a distance = 1, and an SSIM value ≥ 0.9, both images meet the mismatch criteria. These findings indicate that the proposed approach provides an efficient and accurate solution for automating the verification of the Indonesian Standard Mushaf.
LC Map: a robust chaotic function for enhancing cryptographic security through key sensitivity and randomness analysis Makmun, Makmun; MT, Suryadi; Madenda, Sarifuddin
International Journal of Advances in Intelligent Informatics Vol 11, No 4 (2025): November 2025
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v11i4.1854

Abstract

The security of digital image data has become increasingly critical in modern communication systems. While chaos-based cryptography offers a promising solution, many existing algorithms lack rigorous security validation. This paper introduces the Logistic-Circle Map (LC Map), a novel one-dimensional compound chaotic system designed to provide a robust and efficient foundation for image encryption. By composing the Logistic Map and the Circle Map, the LC Map exhibits a broader chaotic range and higher dynamical complexity. The performance and security of an LC Map-based encryption scheme are extensively validated using a comprehensive dataset of 24 digital images. Security analysis demonstrates that the algorithm is highly resistant to brute-force, statistical, and differential attacks. It provides a vast key space and demonstrates very strong key sensitivity, both confirmed through experimental evaluation. Test results show near-ideal performance on standard security metrics, with a Number of Pixels Change Rate (NPCR) approaching 99.6%, a Unified Average Changing Intensity (UACI) approaching 33.4%, and an information entropy value nearing the theoretical maximum of 8. Further quantitative comparative analysis demonstrates the superiority of the LC Map in balancing security and computational efficiency. Thus, the LC Map is presented as a rigorously validated component for the development of future image cryptosystems.