Abwabul Jinan
Universitas Potensi Utama

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Komparasi Algoritma Support Vector Machine Dan Naive Bayes Pada Klasifikasi Ras Kucing Jaka Kusuma; Abwabul Jinan; Muhammad Zulkarnain Lubis; Rubianto Rubianto; Rika Rosnelly
Generic Vol 14 No 1 (2022): Vol 14, No 1 (2022)
Publisher : Fakultas Ilmu Komputer, Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Salah satu hewan peliharaan yang paling populer ialah kucing. Kucing dipilih menjadi hewan peliharaan manusia karena tingkahnya sangat lucu. Kucing memiliki variasi ras yang sangat banyak. Terdapat 315 ras kucing pada seluruh dunia yang mana setiap ras kucing mempunyai ciri-ciri tertentu, akibat banyaknya terjadi perkawinan silang antara kucing kampung dan kucing ras dalam penentuan ras kucing menjadi lebih sulit. Seiring perkembangan zaman yang begitu cepat, perkembangan teknologi informasi pengenalan objek citra menjadi subjek yang sangat menarik dan tentunya berkaitan erat dengan data informasi. Maka peneliti akan melakukan komparasi antara algoritma Support Vector Machine (SVM) dan Naive Bayes (NB) pada klasifikasi citra ras kucing dengan memanfaatkan model Deep Learning SqueezeNet sebagai proses ekstraksi fitur pada citra. Dari hasil penelitian ini akan membuktikan secara empiris perbedaan antara accuracy, precision dan recall dari setiap algoritma. Hasil yang diperoleh menunjukan bahwa, dalam hal klasifikasi yang terbaik yaitu algoritma Support Vector Machine (SVM) dengan nilai accuracy 88.4%, precision 88.5% dan recall 88.4% sedangkan yang terendah adalah algoritma Naive Bayes (NB) dengan nilai accuracy 79.5%, precision 79.9% dan recall 79.5%.
Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video Siregar, Manutur; Jinan, Abwabul; Muhammad Raja Gunung, Tar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4217

Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.