cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
JAIS (Journal of Applied Intelligent System)
ISSN : 25020493     EISSN : 25029401     DOI : -
Core Subject :
Journal of Applied Intelligent System (JAIS) is published by LPPM Universitas Dian Nuswantoro Semarang in collaboration with CORIS and IndoCEISS, that focuses on research in Intelligent System. Topics of interest include, but are not limited to: Biometric, image processing, computer vision, knowledge discovery in database, information retrieval, computational intelligence, fuzzy logic, signal processing, speech recognition, speech synthesis, natural language processing, data mining, adaptive game AI.
Arjuna Subject : -
Articles 191 Documents
Penerapan Metode Fuzzy SAW Untuk Penyeleksian Beasiswa Bidik Misi (Studi Kasus : Universitas Potensi Utama) Wiwi Verina; Rofiqoh Dewi
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v1i3.1251

Abstract

Beasiswa bidikmisi adalah beasiswa yang diperuntukkan bagi calon mahasiswa yang berprestasi di Sekolah Menengah Atas (SMA) dan berasal dari kalangan kurang mampu yang diberikan pemerintah melalui Direktorat Jendral pendidikan Tinggi (Ditjen Dikti). Demikian halnya dengan Universitas Potensi Utama yang telah memiliki program pemberian beasiswa bidikmisi terhadap calon mahasiswa yang kurang mampu dan berprestasi dengan menerapkan Sistem Pendukung Keputusan (SPK) yang dapat memperhitungkan segala kriteria yang mendukung pengambilan keputusan guna membantu, mempercepat dan mempermudah proses pengambilan keputusan dalam menentukan mahasiswa yang berhak mendapatkan beasiswa bidikmisi. Metode yang dipakai dalam pengambilan keputusan seleksi beasiswa bidikmisi adalah Fuzzy SAW, metode tersebut dipilih karena metode tersebut merupakan suatu bentuk model pendukung keputusan dimana input utamanya menggunakan konsep dasar mencari penjumlahan terbobot. Penelitian dilakukan dengan mencari nilai bobot untuk setiap kriteria, kemudian dilakukan proses perangkingan yang akan menentukan alternatif yang optimal yaitu mahasiswa terbaik yang akan dipertimbangkan oleh pengambil keputusan untuk memperoleh beasiswa bidikmisi. Kata kunci—Sistem Pendukung Keputusan, Metode Fuzzy Saw, Beasiswa Bidik Misi.
Application Of Tourist Route Map Based On Modification Bidirectional A * Algorithm Panji Winata; - Wijanarto
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1599

Abstract

Tourism is an activity that has become a trend of human needs. The development of technology in the current era is very helpful in providing such information to tourists, one of which is information about the route in the planning of tourism activities. Tourists will certainly choose the optimal route in their journey to make their tours more effective. In order to determine the fastest route, this paper will present a mobile-based application that will help tourists to quickly reach the destination. The Efficient Modified Bidirectional A * algorithm is chosen because it will provide an efficient route with shorter distance, which is a modification of the A * algorithm. The results of the case study of 5 trips from the starting point toward the goal resulted in a high level of efficiency (3 cases) and quite good (3 cases) with values, 77.5%, 53%, 53.8%, 73%, 72.6 %. The above percentage is calculated by finding a proportional distance (d) of choice with the distance of all possible paths, then subtracting 1 by multiplying d by 100%. In the future work need to add the parameters of the busy road route or not to be selected more optimal.
Analisis Perbandingan Algoritma ID3 Dan C4.5 Untuk Klasifikasi Penerima Hibah Pemasangan Air Minum Pada PDAM Kabupaten Kendal Dana Melina Agustina; - Wijanarto
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v1i3.1256

Abstract

Program hibah air minum bertujuan untuk meningkatkan cakupan pelayanan air minum yang diprioritaskan bagi masyarakat berpenghasilan rendah dalam rangka meningkatkan derajat kualitas kesehatan masyarakat. Pengklasifikasian data masyarakat berperan untuk menentukan pemberian sambungan air minum secara objektif dan akurat. Dalam penelitian ini dilakukan perbandingan metode data mining yaitu algoritma ID3 dan C4.5 yang diterapkan pada data masyarakat berpenghasilan rendah pada PDAM Kabupaten Kendal dengan menggunakan RapidMiner. Hasil pengujian yang menunjukkan bahwa algoritma ID3 nilai akurasi sebesar 98,91%. Sedangkan pada algoritma C4.5 nilai accuracy sebesar 99,14%. Jadi algoritma C4.5 memiliki tingkat akurasi yang lebih besar dari pada algoritma ID3. Sehingga pada kasus penerima hibah pemasangan sambungan air minum diterapkan pada framework php dapat menentukan penerima hibah pemasangan sambungan air minum dengan menggunakan acuan pada algoritma C4.5 yang memiliki akurasi yang lebih baik. Kata kunci—Klasifikasi,Algoritma ID3,Algoritma C4.5, Air Minum, PDAM
Gentree of Tool for Syntactic Analysis Based On Younger Cocke Kasami Algorithm - Wijanarto; Ajib Susanto; Desi Purwanti Kusumaningrum
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1387

Abstract

Syntactic analysis is a series of processes in order to validate a string that is received by a language. Understanding the process of reduction rules to become a tree is the part that is difficult to explain. This paper describes the results of the design tool to automate an input string into a decrease in the rules to trees in the visualized with images either in the form of files or display, performance evaluation tools and analysis of students' understanding of the tool by the algorithm Cocke Younger Kasami (cyk) was selected as one of the cases for parsing techniques in the Context Free Grammar (CFG) in the form of Chomsky Normal Form (CNF). These results indicate that the model successfully implemented into the application named genTree (Generator Tree), application performance gained a significant number of measurements of the variations in the complexity of the grammar and the input string by 29.13% with the complexities 7 and 8:50% with the complexity of 20, while for long input string against time processing algorithm can be a value of 3.3 and 66.98% as well as 29 and 6:19%, also obtained differences in the ability of the t-test on a group of students control against the experimental group with a value of t = 5.336 with df 74, p value of 0.001 , on the level of signfikansi 0.05% (5%). Also terapat increase in the percentage of correct answers was 58% in the variation of difficulty, 83% of the variation was easy. Sebalikanya wrong answer decline by 60% in difficult variation, the variation was 100% and 57% for easy variation. Recently there is a change decrease in the percentage of students who are not doing as much as 60% in the variation of difficulty, 44% of the variation was 13% on the variations easily can be concluded that the applications run efficiently and optimally, but also can effectively improve students' understanding in beajar automata with case cyk algorithm. Keywords—Tool, Analysis, Syntax, Algorithms, Trees
Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting Christy Atika Sari; Eko Hari Rachmawanto; Danang Wahyu Utomo; Ramadhan Rakhmat Sani
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v1i3.1252

Abstract

Kriptografi sebagai salah satu cabang ilmu yang dapat digunakan untuk mengamankan data hingga saat ini terus dikembangkan melalui berbagai algoritma. Beberapa penelitian terkait mengenai kriptografi masih mengguankan media berupa teks saja, image saja, maupun file tertentu saja. Pada penelitian ini akan digunakan media berupa seluruh jenis file sebagai media inputan. Adapun algoritma yang dignuakan yaitu Vernam cipher dan Bit shiffting. Kedua algoritma ini dikenal cepat, mudah dan aman untuk digunakan. Percobaan yang dilakukan menggunakan 30 file berbeda ukuran maupun jenis file serta telah diuji melalui aplikasi yang dibangun dengan Visual Basic telah menghasilkan proses enkripsi dan dekripsi data yang berjalan dengan baik. File hasil enkripsi dapat dibuka dengan kunci yang telah ditetapkan dan tidak mengalami kerusakan, dan sebaliknya untuk proses dekripsi data juga demikian. Hasil percobaan menggunakan sampling file berukuran 1 kb hingga 24000 kb, dimana waktu terlama untuk mengenkripsi file yaitu 28,661 detik dan untuk proses dekripsi terlama membutuhkan waktu 27,222 detik. Kata kunci—Vernam cipher, Bit shiffting, Kriptografi, File
An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image Christy Atika Sari; Lalang Erawan; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi; Tan Samuel Permana
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1616

Abstract

Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.
Secure Image Steganography Algorithm Based on DCT with OTP Encryption De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1330

Abstract

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography
Expert System With Certainty Factor For Early Diagnosis Of Red Chili Peppers Diseases Fahrul Agus; Hernanda Eka Wulandari; Indah Fitri Astuti
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1455

Abstract

Red chili peppers (Capsicum annuum L.) plants classified as fruit and vegetables spices (herbs), that almost all people consume it for everyday purposes. Not only used for household consumption, but also used in various industries as a raw material. Utilization as raw materials in various industry makes red chili as vegetable crops of high economic value and has a great prospect. But its diseases are complex enough for causing farmers hard to diagnose and resulted in reduced production levels. One solution to this problem is the establishment of an expert system that can help farmers to diagnose major diseases of red pepper plant in a practical and accurate. The purpose of this research is to make the application of expert systems for diagnosing diseases of red chili. This application uses forward chaining to diagnose disease and calculate the value of possibilities with Certainty Factor. This method is to prove whether a fact that certainly would not have been shaped or metrics that are typically used in an expert system. This method is suitable for expert systems to diagnose something uncertain. Certainty Factor expressed confidence in an event or factual hypothesis based on evidence or expert judgment. The results of research is in the form of an expert system application that can diagnose diseases of red pepper plants with enough accuracy and can help in overcoming the problem of crop failure. Based on the data taken from tests performed in this study, the system can diagnose red chili plant disease with high accuracy.
Desain Kontrol Tracking Underactuated Autonomous Underwater Vehicle (AUV) dengan Pengaruh Gangguan Arus Laut Ilmi Rizki I; Trihastuti Agustinah
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v1i3.1253

Abstract

Paper ini membahas masalah gerak AUV pada bidang horizontal yang dipengaruhi oleh arah sudut yaw. Arah sudut yaw merupakan ukuran utama dalam mengatur gerak horizontal pada AUV. Pengaturan gerak pada AUV berupa perubahan arah sudut yaw merupakan permasalahan kontrol tracking AUV. Kontrol tracking pada paper ini digunakan untuk kebutuhan heading control. Heading control tersebut digunakan untuk mengatur arah sudut yaw AUV agar sesuai dengan sinyal referensi yaw yang diberikan. Kompleksitas dalam mendesain heading control akibat karakteristik-karakteristik dari dinamika AUV yang high nonlinear dan uncertainty parameter yang ditentukan oleh hydrodynamic forces dan environmental forces berupa gangguan ocean current menjadi permasalahan yang tidak mudah dipecahkan. Oleh karena itu dibutuhkan sebuah metode untuk mengatasi permasalahan tersebut, yaitu menggunaan metode State Dependent Riccati Equations berdasarkan Linear Quadratic Tracking (SDRE-LQT). Algoritma ini menghitung perubahan permasalahan tracking pada sudut yaw dan dapat mengatasi gangguan ocean current melalui perhitungan perubahan parameter dari AUV secara online melalui algebraic Riccati equation.sehingga sinyal kontrol yang diberikan ke plant dapat mengikuti perubahan kondisi dari plant itu sendiri, termasuk perubahan parameter akibat gangguan berupa ocean current. Hasil simulasi menunjukkan bahwa metode kontrol yang digunakan mampu membawa sudut yaw pada nilai yang diharapkan dan gangguan arus dapat diatasi dengan memberikan nilai sinyal kontrol yang baru secara online, sehingga AUV dapat melakukan  tracking secara otomatis pada kondisi ada atau tanpa gangguan ocean current dengan dengan nilai error steady state . Kata kunci — AUV, Tracking Control, SDRE-LQT, Ocean Current Disturbance
Comparison of Image Improvement Method on Parasite Images of Malaria Rika Rosnelly; Linda Wahyuni
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1645

Abstract

Improved image is a process on the image that initially has a quality that is less good or has noise. In this image improvement operation image quality will be improved so that the image produces better quality. Image improvement methods used are contrast stretching, histogram equalization, low pass filter and Gaussian filtering. In this study compare contrast stretching method, histogram equalization, low pass filter and Gaussian filtering to improve image quality. Performance of each method would be calculated by finding the value of Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). This study compares contrast stretching methods, histogram equalization, low pass filter and Gaussian filtering to improve image quality. Total data of malaria parasite image is 120. The data consist of image of malaria parasite falciparum, vivax, malariae along with stage that is ring, tropozoit, skizon and gametocyte. Evaluate the performance of each method by finding Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) values. The result is a contrast stretching provides better image quality against malaria parasite image.

Page 4 of 20 | Total Record : 191