cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
JAIS (Journal of Applied Intelligent System)
ISSN : 25020493     EISSN : 25029401     DOI : -
Core Subject :
Journal of Applied Intelligent System (JAIS) is published by LPPM Universitas Dian Nuswantoro Semarang in collaboration with CORIS and IndoCEISS, that focuses on research in Intelligent System. Topics of interest include, but are not limited to: Biometric, image processing, computer vision, knowledge discovery in database, information retrieval, computational intelligence, fuzzy logic, signal processing, speech recognition, speech synthesis, natural language processing, data mining, adaptive game AI.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol 2, No 1 (2017): April 2017" : 5 Documents clear
Plasmodium Falciparum Identification in Thick Blood Preparations Using GLCM and Support Vector Machine (SVM) Farah Zakiyah Rahmanti; Novita Kurnia Ningrum; Septian Enggar Sukmana; Prajanto Wahyu Adi
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1388

Abstract

Malaria is one of the serious diseases that require rapid handling, otherwise it can lead to death. One of the causes of malaria parasites is plasmodium falciparum which can cause severe or fatal malaria. Handling a medical late can increase the risk of death. Therefore, it takes a rapid identification system with a high percentage of accuracy to reduce the risk of death. This research aims to build an identification system of plasmodium falciparum in thick blood film using Gray Level Co-occurrence Matrix (GLCM) and Support Vector Machine (SVM). The GLCM is used to get texture feature values such as contrast, correlations, energy, and homogeneity from images. Those values is processed and as an input of classification using SVM. The research result using SVM for accuracy value of  plasmodium falciparum identification can reach 93.33%.
Recommendation System for Major University Determination Based on Student’s Profile and Interest Desi Purwanti Kusumaningrum; Noor Ageng Setiyanto; Erwin Yudi Hidayat; Khafiizh Hastuti
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1389

Abstract

Failure study on university students is one of the serious problems we face today. Data from the Centre for Education Statistics Research and Development of the Ministry of National Education Republic of Indonesia showed that the percentage of students graduate on time from 2001 to 2011 only reached 51.97%. In addition, cases of students dropping out at the beginning of the semester is also quite significant. One of the causes of failure of this study was the selection of major’s errors when applying to university. This study offers a selection subject recommendation system that builds on the profile data and student’s interest using the technique of Association Rule. Results of the rules of the relationship will then be matched with prospective students using questionnaires dynamic, so expect new students get recommendations more valid subject fit the profile and interest respectively. The system built on this research utilizes student data stored on the academic system of Dian Nuswantoro University. This model however can be adapted by all the universities that has a system of academic information. At the end of this system is expected to be used to minimize failures caused students study majors election mistakes
Estimation of Students’ Graduation Using Multiple Linear Regression Method Bintang Dewi Fajar Kurniatullah; Yuventius Tyas Catur Pramudi
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1415

Abstract

Utilization of students’ academic data to produce information used by management in monitoring students’ study period on Information System Department. Multiple linier regression method will produce multiple linier regression equation used for estimating students’ graduation equipped with prototype. According to analysis carried out by using nine variable SKS1, SKS2, SKS3, SKS4, IPS1, IPS2, IPS3, IPS4, and the number of repeated courses of 2008 to 2012 the multiple linier regression equation is Y = 13.49  +  0.099 X1  + (-0.068) X2 + 0.025 X3 + (-0.059) X4 + (-0.585) X5 + (-0.443) X6 + (-0.155) X7 + (-0.368) X8 + (-0.082) X9. From the equation there is an error of MSE and RMSE that is equal to 0.1168 and 0.3418. The prototype uses a PHP-based program using sublime text and XAMPP. The prototype monitoring the students’ study time in this research is very helpful if supported by management. Keywords: Data mining, multiple linear regression, estimation, monitoring, study time
Gentree of Tool for Syntactic Analysis Based On Younger Cocke Kasami Algorithm - Wijanarto; Ajib Susanto; Desi Purwanti Kusumaningrum
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1387

Abstract

Syntactic analysis is a series of processes in order to validate a string that is received by a language. Understanding the process of reduction rules to become a tree is the part that is difficult to explain. This paper describes the results of the design tool to automate an input string into a decrease in the rules to trees in the visualized with images either in the form of files or display, performance evaluation tools and analysis of students' understanding of the tool by the algorithm Cocke Younger Kasami (cyk) was selected as one of the cases for parsing techniques in the Context Free Grammar (CFG) in the form of Chomsky Normal Form (CNF). These results indicate that the model successfully implemented into the application named genTree (Generator Tree), application performance gained a significant number of measurements of the variations in the complexity of the grammar and the input string by 29.13% with the complexities 7 and 8:50% with the complexity of 20, while for long input string against time processing algorithm can be a value of 3.3 and 66.98% as well as 29 and 6:19%, also obtained differences in the ability of the t-test on a group of students control against the experimental group with a value of t = 5.336 with df 74, p value of 0.001 , on the level of signfikansi 0.05% (5%). Also terapat increase in the percentage of correct answers was 58% in the variation of difficulty, 83% of the variation was easy. Sebalikanya wrong answer decline by 60% in difficult variation, the variation was 100% and 57% for easy variation. Recently there is a change decrease in the percentage of students who are not doing as much as 60% in the variation of difficulty, 44% of the variation was 13% on the variations easily can be concluded that the applications run efficiently and optimally, but also can effectively improve students' understanding in beajar automata with case cyk algorithm. Keywords—Tool, Analysis, Syntax, Algorithms, Trees
Secure Image Steganography Algorithm Based on DCT with OTP Encryption De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1330

Abstract

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography

Page 1 of 1 | Total Record : 5