Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Teknik Informatika (JUTIF)

Comparative Analysis of Augmentation and Filtering Methods in VGG19 and DenseNet121 for Breast Cancer Classification Seneng, I Kadek; Ayu, Putu Desiana Wulaning; Huizen, Roy Rudolf
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 3 (2025): JUTIF Volume 6, Number 3, Juni 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.3.4397

Abstract

Breast cancer is one of the most prevalent malignancies and a leading cause of mortality among women worldwide. Mammography plays a crucial role in early detection, yet challenges in manual interpretation have led to the adoption of Convolutional Neural Networks (CNNs) to improve classification accuracy. This study evaluates the performance of Visual Geometry Group (VGG19) and Densely Connected Convolutional Networks (DenseNet121) in mammogram classification. It examines the impact of data augmentation and image enhancement techniques, including Contrast-Limited Adaptive Histogram Equalization (CLAHE), Median Filtering, and Discrete Wavelet Transform (DWT), as well as the influence of varying epochs and learning rates. A novel approach is introduced by assessing data augmentation effectiveness and exploring model adaptations, such as layer incorporation and freezing during training. Classification performance is enhanced through fine-tuning strategies combined with image enhancement techniques, reducing reliance on data augmentation. These findings contribute to medical imaging and computer science by demonstrating how CNN modifications and enhancement methods improve mammogram classification, providing insights for developing robust deep learning-based diagnostic models. The highest performance was achieved using VGG19 with DWT, a learning rate of 0.0001, and 20 epochs, yielding 98.04% accuracy, 98.11% precision, 98% recall, and a 97.99% F1-score. Data augmentation did not consistently enhance results, particularly in clean datasets. Increasing epochs from 10 to 20 improved accuracy, but performance declined at 30 epochs. The confusion matrix showed high accuracy for Benign (100%) and Cancer (99.5%), with more misclassifications in the Normal class (94.5%).
Design and Evaluation of a Hybrid AES-ECC Model for Secure Server Communication using REST API Saputra, Made Wisnu Adhi; Huizen, Roy Rudolf; Hostiadi, Dandy Pramana
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4989

Abstract

Security in server-to-server communication is essential, especially in open networks vulnerable to data breaches and service disruptions. However, many existing solutions rely on a single cryptographic algorithm, limiting their ability to address diverse threats. This study aims to develop and evaluate a hybrid security model by combining the Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) to ensure confidentiality, integrity, and authenticity of transmitted data. An experimental approach is applied through direct implementation in server communication. The model uses AES for symmetric encryption, ECC for dynamic session key exchange, and JSON Web Token (JWT) reinforced by nonce, timestamp, and HMAC-SHA256 for authentication and integrity verification. Test results show the model detects payload modification, replay attacks, JWT manipulation, and passive interception, with processing time still within an acceptable range. Communication efficiency is maintained with negligible payload overhead. The novelty of this research lies in integrating hybrid encryption with stateless authentication and integrity validation into a unified architecture. This integration allows security elements to be delivered systematically via REST API, making the model easy to adopt in existing architectures. The results of this study contribute to the advancement of secure API-based communication frameworks in the field of informatics, providing a practical, adaptable, and scalable solution for protecting data in distributed information systems.