Shintami Chusnul Hidayati
Institut Teknologi Sepuluh Nopember

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Identification of chronic obstructive pulmonary disease using graph convolutional network in electronic nose Dava Aulia; Riyanarto Sarno; Shintami Chusnul Hidayati; Alfian Nur Rosyid; Muhammad Rivai
Indonesian Journal of Electrical Engineering and Computer Science Vol 34, No 1: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v34.i1.pp264-275

Abstract

Chronic obstructive pulmonary disease (COPD) is a progressive lung dysfunction that can be triggered by exposure to chemicals. This disease can be identified with spirometry, but the patient feels uncomfortable, affecting the diagnosis results. Other disease markers are being investigated, including exhaled breath. This method can be applied easily, is non-invasive, has minimal side effects, and provides accurate results. This study applies the electronic nose method to distinguish healthy people and COPD suspects using exhaled breath samples. Twenty semiconductor gas sensors combined with machine learning algorithms were employed as an electronic nose system. Experimental results show that the frequency feature of the sensor responses used by the principal component analysis (PCA) method combined with graph convolutional network (GCN) can provide the highest accuracy value of 97.5% in distinguishing between healthy and COPD subjects. This method can improve the detection performance of electronic nose systems, which can help diagnose COPD.
IMPROVED LIP-READING LANGUAGE USING GATED RECURRENT UNITS Nafa Zulfa; Nanik Suciati; Shintami Chusnul Hidayati
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 2, Juli 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i2.a1080

Abstract

Lip-reading is one of the most challenging studies in computer vision. This is because lip-reading requires a large amount of training data, high computation time and power, and word length variation. Currently, the previous methods, such as Mel Frequency Cepstrum Coefficients (MFCC) with Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN) with LSTM, still obtain low accuracy or long-time consumption because they use LSTM. In this study, we solve this problem using a novel approach with high accuracy and low time consumption. In particular, we propose to develop lip language reading by utilizing face detection, lip detection, filtering the amount of data to avoid overfitting due to data imbalance, image extraction based on CNN, voice extraction based on MFCC, and training model using LSTM and Gated Recurrent Units (GRU). Experiments on the Lip Reading Sentences dataset show that our proposed framework obtained higher accuracy when the input array dimension is deep and lower time consumption compared to the state-of-the-art.
Network Intrusion Detection System with Time-Based Sequential Cluster Models using LSTM and GRU Ravi Vendra Rishika; Baskoro Adi Pratomo; Shintami Chusnul Hidayati
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 23, No. 1, January 2025
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v23i1.a1241

Abstract

Technological development and the growth of the internet today have a positive and revolutionary impact in various areas of human life, such as banking, health, science, and more. The presence of Open Data and Open API also facilitates the exchange of data and information between entities without the restrictions imposed by different regions and geographical areas. However, information openness not only has a positive impact but also makes data vulnerable to data theft, viruses, and various other types of cyber attacks. The large-scale data exchange that occurs across the network poses a challenge in detecting unusual activity and new cyber attacks. Therefore, the existence of an Intrusion Detection System (IDS) is urgently essential. The IDS helps system administrators detect cyber attacks and network anomalies, thus minimizing the risk of data leaks and intrusions. The research developed a new approach using time-based sequential clustered data sets in the Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU) models. This IDS model was implemented using the CIC-IDS 2018 data set, which has more than 4 million data lines. The capabilities and uniqueness of the LSTM and GRU models are used to classify and determine various attacks in IDS based on sequential data sets ordered by time and clustered according to the destination ports and protocols, such as TCP and UDP. The model was evaluated using the accuracy, precision, recall, and F-1 scores matrix, and the results showed that the time-based sequential clustered models in LSTM and GRU have an accurities of up to 97.21%. This suggests that this new approach is good enough to be applied to the future IDS models.