p-Index From 2021 - 2026
5.919
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Prosiding SNATIF Journal of ICT Research and Applications Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics JADECS (Journal of Art, Design, Art Education and Culture Studies) Jurnal Teknologi dan Sistem Komputer SISFOTENIKA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Indonesian Journal of Information System Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING Indonesian Journal of Electrical Engineering and Computer Science Abdimasku : Jurnal Pengabdian Masyarakat Jurnal Teknik Informatika (JUTIF) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Computing Theories and Applications Jurnal Informatika: Jurnal Pengembangan IT Journal of Fuzzy Systems and Control (JFSC) Journal of Information System and Application Development Journal of Multiscale Materials Informatics Journal of Future Artificial Intelligence and Technologies
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : JOURNAL OF APPLIED INFORMATICS AND COMPUTING

Comparison of EfficientNetB1 Model Effectiveness in Identifying Fish Diseases in South Asian Fish Diseases and Salmon Fish Diseases Afridiansyah, Rahmanda; Setiadi, De Rosal Ignatius Moses
Journal of Applied Informatics and Computing Vol. 8 No. 2 (2024): December 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i2.8677

Abstract

The purpose of this study is to evaluate the effectiveness of the EfficientNetB1 model in identifying fish diseases across two distinct datasets: South Asian Fish Diseases and Salmon Fish Diseases. The South Asian Fish Diseases dataset includes seven categories: red bacterial disease, aeromoniasis, gill bacterial disease, fungal saprolegniasis, parasitic disease, and white tail viral disease. The Salmon dataset is divided into two parts: FreshFish and InfectedFish. Using the EfficientNetB1 algorithm, each dataset was separately trained and tested to predict species and disease. Results showed an accuracy of 98.14% for the South Asian Fish Diseases dataset and 99.18% for the Salmon Diseases dataset. These findings support the argument that the model possesses sufficient capability to detect diseases affecting various fish species. This suggests that the model could be a valuable tool in the aquaculture industry for disease management and detection strategies.
Model Pembelajaran Mesin untuk Deteksi Penipuan Kartu Kredit yang Dioptimalkan Menggunakan SMOTE-Tomek dan Rekayasa Fitur Wibowo, Mochammad Abdurrochman Ari; Setiadi, De Rosal Ignatius Moses
Journal of Applied Informatics and Computing Vol. 8 No. 2 (2024): December 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i2.8732

Abstract

In today's digital economy, credit cards are essential and both credit card usage and theft have increased significantly in recent years. Credit card fraud can be categorized using machine learning models using data from suspicious transaction history. However, credit data is often imbalanced. Therefore, machine learning models are biased towards the majority class resulting in poor performance on publicly accessible Kaggle credit card classification datasets. We balance the class distribution in the dataset using a hybrid synthetic minority oversampling strategy to address this difficulty. The findings show that the random forest machine learning model combined with oversampling techniques combined with feature engineering and cross-validation yields optimal results of more than 99% for all assessment measures. It performs better compared to three other models, namely decision tree, gradient boosting, and XGBoost. It can be concluded that the use of feature engineering, cross-validation, and oversampling are useful approaches to handle imbalanced credit card data and ultimately help in preventing credit card transaction fraud.
Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security Amir Musthofa; Moses Setiadi, De Rosal Ignatius
Journal of Applied Informatics and Computing Vol. 9 No. 4 (2025): August 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i4.9569

Abstract

In today's digital era, ensuring the confidentiality of image data is crucial due to the widespread use of images in fields such as medical imaging, military communication, and multimedia applications. This study proposes a layered image encryption method by integrating three chaotic systems: Logistic Map, Henon Map, and Sine Map. Each layer in the encryption process applies a different chaotic map to sequentially perform pixel permutation, XOR-based substitution, and modulus-based substitution. Key generation is carried out by producing pseudo-random number sequences derived from the iterations of each chaotic map: the Logistic Map (using specific initial and control parameters), the Henon Map (with two initial condition variables), and the Sine Map (based on a sine function), all of which are highly sensitive to initial conditions and control parameters. These sequences are then used as keys in each encryption stage. The proposed method strengthens the principles of confusion and diffusion, thereby enhancing the security and randomness of the encrypted images. Evaluation was conducted using metrics such as histogram analysis, entropy, chi-square, correlation coefficient, PSNR, and BER. The experimental results demonstrate that the method produces encrypted images with strong statistical characteristics and high resilience against common cryptographic attacks. Thus, this approach makes a significant contribution to the development of secure and efficient image encryption techniques based on chaos theory.
Comparative No-Reference Evaluation of Classical Image Sharpening Techniques under Varying Degradation Conditions Santoso, Siane; Setiadi, De Rosal Ignatius Moses; Pramunendar, Ricardus Anggi
Journal of Applied Informatics and Computing Vol. 9 No. 6 (2025): December 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i6.11430

Abstract

This research conducts a comparative evaluation of four image sharpening methods: Unsharp Masking, Laplacian of Gaussian, High-Boost Filtering, and Adaptive High-Boost Filtering. These methods are tested on low-contrast, blurred, normal, and high-contrast images. The assessment uses No Reference Image Quality Assessment metrics, specifically BRISQUE and NIQE, along with intensity histogram analysis and visual inspection. Results show that High-Boost Filtering improves global contrast, reducing BRISQUE scores to 26.28 for low-contrast images and 27.56 for high-contrast images, although it can cause halo artifacts. Unsharp Masking performs best on blurred images, lowering BRISQUE to 26.65, but it is more sensitive to noise. The Laplacian of Gaussian yields relatively low NIQE scores, such as 3.04 in low-contrast and 3.10 in high-contrast images; however, its output often appears coarse in texture. Adaptive High-Boost Filtering performs best on normal images, achieving a BRISQUE score of 11.89, but shows limited improvement in other cases. Notably, alignment between NIQE scores and perceptual evaluation is only observed in high-contrast images. These results confirm that no single technique is universally optimal, emphasizing the importance of selecting sharpening methods based on specific image degradation characteristics. Additionally, this observation highlights that BRISQUE more reliably reflects perceived image quality, whereas NIQE occasionally diverges from subjective judgments.
Co-Authors Abdul Syukur Abdussalam Abdussalam Abdussalam Abdussalam Abdussalam Abere, Reuben Akporube Abugor Okpako, Ejaita Achmad Nuruddin Safriandono Adhitya Nugraha Adigwe, Wilfred Adimabua Ojugo, Arnold Adityawan, Harish Trio Afotanwo, Anderson Afridiansyah, Rahmanda Aghaunor, Tabitha Chukwudi Aghware, Fidelis Obukohwo Agustina, Feri Ahmad Salafuddin Ajib Susanto Akazue, Maureen Ifeanyi Akbar Aji Nugroho Akbar, Ismail Akhmad Dahlan Ako, Rita Erhovwo Akrom, Muhamad Alvin Faiz Kurniawan Amir Musthofa Anak Agung Gede Sugianthara Andik Setyono Antonio Ciputra Antonius Erick Handoyo Araaf, Mamet Adil Arya Kusuma Binitie, Amaka Patience Budi Widjajanto Budi, Setyo Cahaya Jatmoko Chaerul Umam Chaerul Umam Christian, Henry Christy Atika Sari Chukwudi Aghaunor, Tabitha Cinantya Paramita Ciputra, Antonio Danu Hartanto Daurat Sinaga Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Devi Purnamasari Dhendra Marutho Dian Kristiawan Nugroho Dumebi Okpor, Margaret Dutta, Pushan Kumar Dwi Puji Prabowo Dwi, Bernadetta Sri Endah Eboka, Andrew Okonji Edy Winarno Egia Rosi Subhiyakto Ejeh, Patrick Ogholuwarami Eko Hari Rachmanto Eko Hari Rachmawanto Eko Septyasari Elkaf Rahmawan Pramudya Eluemnor Anazia, Kizito Emordi, Frances Uche Enadona Oweimeito, Amanda Erhovwo Ako, Rita Erlin Dolphina Erna Zuni Astuti Etika Kartikadarma Farah Zakiyah Rahmanti Farooq, Omar Farroq, Omar Ferda Ernawan Firnando, Fadel Muhamad Fittria Shofrotun Ni'mah Florentina Esti Nilawati Florentina Esti Nilawati Gan, Hong-Seng Geteloma, Victor Ochuko Ghosal, Sudipta Kr Giovani Ardiansyah Gomiasti, Fita Sheila Hanny Haryanto Henry Christian Herowati, Wise Heru Agus Santoso Ibnu Gemaputra Ramadhan Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibor, Ayei Egu Ihya Ulumuddin, Dimas Irawan Imanuel Harkespan Imanulloh, Satrio Bagus Indra Gamayanto Islam, Hussain Md Mehedul Isworo Nugroho Iwan Setiawan Wibisono Jutono Gondohanindijo, Jutono Kartikadarma , Etika Kusuma, Edi Jaya Kusuma, Muh Galuh Surya Putra L. Budi Handoko Lalang Erawan M. Dalvin Marno Putra Md Kamruzzaman Sarker Md Kamruzzaman Sarker Minh T. Nguyen, Minh T. Mohammad Rizal, Mohammad Muchamad Akbar Nurul Adzan Muhamada, Keny Mulyono, Ibnu Utomo Wahyu Musfiqur Rahman Sazal Muslikh, Ahmad Rofiqul Mustofa, Fachrul Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Nova Rijati Nugroho, Sandy Ochuko Geteloma, Victor Octara Pribadi Odiakaose , Christopher Chukwufunaya Odiakaose, Chris Chukwufunaya Odiakaose, Christopher Chukwufunaya Ojugo, Arnold Adimabua Okpor, Margaret Dumebi Omar Farooq Omoruwou, Felix Pradana, Akbar Ganang Prajanto Wahyu Adi, Prajanto Wahyu Pratama, Nizar Rafi Purnamasari, Devi Rachman, Rahadian Kristiyanto Ricardus Anggi Pramunendar Robet Robet Ruri Suko Basuki Sahu, Aditya Kumar Santoso, Siane Sarker, Md Kamruzzaman Sasono Wibowo Setiawan, Marcell Adi Setyoko, Bimo Haryo Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Stefanus Santosa Sudibyo, Usman Sukamto, Titien S Sunarjo, Macellino Setyaji Suyud Widiono Syahputra, Zulfikar Adi Syahroni Wahyu Iriananda, Syahroni Wahyu T Sutojo T. Sutojo Tan Samuel Permana Tan Samuel Permana Titien S sukamto Trisnapradika, Gustina Alfa Ugbotu, Eferhire Valentine Valentine Ugbotu, Eferhire Warto - Wellia Shinta Sari Wellia Shinta Sari Wibowo, Mochammad Abdurrochman Ari Wijaya, Nantalira Niar Wijayanti, Ella Budi Yoro, Rume Elizabeth Yusianto Rindra Zuama, Leygian Reyhan