cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
Leaders and Followers Algorithm for Balanced Transportation Problem Helen Yuliana Angmalisang; Harrychoon Angmalisang; Sylvia Jane Sumarauw
Computer Engineering and Applications Journal Vol 12 No 2 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i2.436

Abstract

Leaders and Followers algorithm is a metaheuristic algorithm which uses two sets of solutions and avoid comparison between random exploratory sample solutions and the best solutions. In this paper, it is used to solve the balanced transportation problem. There are some modifications in the proposed algorithm in order to fit the algorithm to the problem. The proposed algorithm is evaluated using 138 problems. The results are better than the results obtained by other algorithm from previous studies. Overall, Leaders and Followers algorithm has no difficulty in finding optimal solution, even in problems that have large dimension, number of supply and number of demands.
Littering Activities Monitoring using Image Processing Nyayu Latifah Husni; Ade Silvia Handayani
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.427

Abstract

Littering is a human behavior that become a habit since childhood. Even though there are rules that prohibit this behavior, the community still continues to do so. In order to limit this bad behavior, a device that can monitor and provide notifications is needed. In this research, a device is offered that can identify human activities in real time using webcam-based image processing. Then, it is processed by machine learning using the Recurrent Neural Network (RNN). The monitoring device produced in this research works by comparing the captured image data with a dataset. The captured image data will then be extracted features and form several coordinate points on the human body, then the system will classify these human activities into the category of normal activities or littering activities. This device will provide an output in the form of a warning every time the activity of littering is detected.
Classification of Atrial Fibrillation In ECG Signal Using Deep Learning Muhammad Fachrurrozi; Muhammad Naufal Rachmatullah; Raihan Mufid Setiadi
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.439

Abstract

Atrial fibrillation is a type of heart rhythm disorder that most often occurs in the world and can cause death. Atrial fibrillation can be diagnosed by reading an Electrocardiograph (ECG) recording, however, an ECG reading takes a long time and requires specialists to analyze the type of signal pattern. The use of deep learning to classify Atrial Fibrillation in ECG signals was chosen because deep learning has 10% higher performance compared to machine learning methods. In this research, an application for classification of Atrial Fibrillation was developed using the 1-Dimentional Convolutional Neural Network (CNN 1D) method. There are 6 configurations of the 1D CNN model that were developed by varying the configuration on the learning rate and batch size. The best model obtained 100% accuracy, 100% precision, 100% recall, and 100% F1 Score.
Nonparametric Regression Analysis of BE4DBE2 Relationship with n and z Variables using Naive Bayes and SVM Classification on Nuclear Data Ruben Cornelius Siagian
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.443

Abstract

This research article describes several analyses of nuclear data using various statistical methods. The first analysis uses linear regression to investigate the relationship between the independent variables (n and z) and the response variable (BE4DBE2). The second analysis uses a nonparametric regression model to overcome the assumptions of normality and linearity in the data. The third analysis uses the Naive Bayes method to classify nuclear data based on variables n and z. The fourth analysis uses a decision tree to classify nuclear data based on the same variables. Finally, the article describes an SVM analysis and a K-means analysis to classify and group nuclide data. The article presents clear and organized descriptions of each analysis, including visual representations of the results. The findings of each analysis are discussed, providing valuable insights into the relationships between the variables and the response variable. The article demonstrates the usefulness of statistical methods in analyzing nuclear data.
Robot Vision Pattern Recognition of the Eye and Nose Using the Local Binary Pattern Histogram Method Ahmad Zarkasi; Huda Ubaya; Kemahyanto Exaudi; Alif Almuqsit; Osvari Arsalan
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.444

Abstract

The local binary pattern histogram (LBPH) algorithm is a computer technique that can detect a person's face based on information stored in a database (trained model). In this research, the LBPH approach is applied for face recognition combined with the embedded platform on the actuator system. This application will be incorporated into the robot's control and processing center, which consists of a Raspberry Pi and Arduino board. The robot will be equipped with a program that can identify and recognize a human's face based on information from the person's eyes and nose. Based on the results of facial feature identification testing, the eyes were recognized 131 times (87.33%), and the nose 133 times (88.67%) out of 150 image data samples. From the test results, an accuracy rate of 88%, the partition rate of 95.23%, the recall of 30%, the specificity of 99%, and the F1-Score of 57.5% were obtained.
The Combination of Black Hat Transform and U-Net in Image Enhancement and Blood Vessel Segmentation in Retinal Images Cahyo Pambudi Darmo; Lucky Indra Kesuma; Dite Geovani
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.452

Abstract

Diabetic Retinopathy (DR) is a disorder of the eye caused by damage to blood vessels in the retina. Damage to the retinal blood vessels can be analyzed by segmenting the blood vessels on the image. This study proposes a combination of image enhancement and blood vessel segmentation in retinal images. Retinal image enhancement is carried out using the black hat transform method to obtain a detailed view of blood vessels in retinal images. Segmentation of blood vessels in retinal images is carried out using the U-Net architecture. The results of image enhancement are measured using MSE and PSNR. This study has an MSE value below 0.05 and a PSNR above 90dB. The MSE and PSNR values obtained show that the black hat transform method is very good at image enhancement. Segmentation has an accuracy value above 0.95 and a sensitivity value above 0.85. In addition, the specificity value and f1-score are above 0.8. This shows that the proposed stages of image enhancement and blood vessel segmentation are able to accurately recognize blood vessel features in retinal images.
Forecasting Of Intensive Care Unit Patient Heart Rate Using Long Short-Term Memory Firdaus Firdaus; Muhammad Fachrurrozi; Siti Nurmaini; Bambang Tutuko; Muhammad Naufal Rachmatullah; Annisa Darmawahyuni; Ade Iriani Sapitri; Anggun Islami; Masayu Nadila Maharani; Bayu Wijaya Putra
Computer Engineering and Applications Journal Vol 12 No 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v12i3.457

Abstract

Cardiac arrest remains a critical concern in Intensive Care Units (ICUs), with alarmingly low survival rates. Early prediction of cardiac arrest is challenging due to the complexity of patient data and the temporal nature of ICU care. To address this challenge, we explore the use of Deep Learning (DL) models, specifically Long Short-Term Memory (LSTM), Bidirectional LSTM (BiLSTM), and Gated Recurrent Unit (GRU), for forecasting ICU patient heart rates. We utilize a dataset extracted from the MIMIC III database, which poses the typical challenges of irregular time series data and missing values. Our research encompasses a comprehensive methodology, including data preprocessing, model development, and performance evaluation. Data preprocessing involves regularizing and imputing missing values, as well as data normalization. The dataset is partitioned into training, testing, and validation sets to facilitate model training and evaluation. Fine-tuning of hyperparameters is conducted to optimize each DL architecture's performance. Our results reveal that the GRU architecture consistently outperforms LSTM and BiLSTM in predicting heart rates, achieving the lowest RMSE and MAE values. The findings underscore the potential of DL models, particularly GRU, in enhancing the early detection of cardiac events in ICU patients.
Point of Interest (POI) Recommendation System using Implicit Feedback Based on K-Means+ Clustering and User-Based Collaborative Filtering Sulis Setiowati; Teguh Bharata Adji; Igi Ardiyanto
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.388

Abstract

Recommendation system always involves huge volumes of data, therefore it causes the scalability issues that do not only increase the processing time but also reduce the accuracy. In addition, the type of data used also greatly affects the result of the recommendations. In the recommendation system, there are two common types of data namely implicit (binary) rating and explicit (scalar) rating. Binary rating produces lower accuracy when it is not handled with the properly. Thus, optimized K-Means+ clustering and user-based collaborative filtering are proposed in this research. The K-Means clustering is optimized by selecting the K value using the Davies-Bouldin Index (DBI) method. The experimental result shows that the optimization of the K values produces better clustering than Elbow Method. The K-Means+ and User-Based Collaborative Filtering (UBCF) produce precision of 8.6% and f-measure of 7.2%, respectively. The proposed method was compared to DBSCAN algorithm with UBCF, and had better accuracy of 1% increase in precision value. This result proves that K-Means+ with UBCF can handle implicit feedback datasets and improve precision.
Optimization of Distributed RSA Encryption and Decription Processing Using Process Scheduling Method In Single Board Computer Cluster Architecture (SBC) Sofyan Nur Arief; Vipkas Al Hadid Firdaus; Arief Prasetyo
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.389

Abstract

Data security is still a major issue regarding the need for data confidentiality. The encryption process using the RSA algorithm is still the most popular method used in securing data because the complexity of the mathematical equations used in this algorithm makes it difficult to hack. However, the complexity of the RSA algorithm is still a major problem that hinders its application in a more complex application. Optimization is needed in the processing of this RSA algorithm, one of which is by running it on a distributed system. In this paper, we propose an approach with a FIFO process scheduling algorithm that runs on a single board computer cluster. The test results show that the allocation of resources in a system that uses a FIFO process scheduling algorithm is more efficient and shows a decrease in the overall processing time of RSA encryption.
Analysis and Implementation of Blowfish and LSB Algorithm on RGB Images using SHA-512 Ilham Firman Ashari; Mugi Praseptiawan
Computer Engineering and Applications Journal Vol 13 No 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v13i1.450

Abstract

The growth of the internet globally keeps increasing as time goes. There's a big amount of data type saved there too. Those data need to be secured so anyone who doesn't have the right to access them can access it. The purpose of this article is to secure text information into image media using the Blowfish method for encrypting text information and securing it using the Hash function SHA-512 and then embedded it in image media using the Least Significant Bit (LSB) method. The result of implementing those methods using image media sized 138Kb and 39.85Kb with plaintext measuring 27 and 85 characters shows that integrity data is secured with SHA-512 method. The test result using PSNR method to get the score of image quality after embedding information to the image shows that the average number of PSNR’s score is 70,74 dB which means the quality is good and has less difference from the original image.