Claim Missing Document
Check
Articles

Found 20 Documents
Search

Segmentasi Citra Ikan Tuna Dengan Otomatisasi Parameter Dbscan Menggunakan Jumlah Titik Puncak Pada Histogram Saputra, Wanvy Arifha; Chandranegara, Didih Rizki; Arifin, Agus Zainal
POROS TEKNIK Vol. 10 No. 1 (2018)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/porosteknik.v10i1.658

Abstract

Segmentasi pada citra ikan tuna menggunakan Density-Based Spatial Clustering of Application (DBSCAN) membutuhkan dua parameter utama, yaitu Eps dan MinPts. Parameter tersebut dapat melakukan segmentasi citra tanpa mengetahui jumlah kluster. Setiap citra memiliki nilai parameter yang berbeda untuk mendapatkan hasil segmentasi yang terbaik. Input nilai parameter dengan metode manual memiliki kelemahan dalam mendapatkan nilai yang optimal dan secara subjektif dalam menentukan nilai parameter tersebut. Kelemahan dalam mendapatkan nilai parameter yang optimal dapat menyebabkan nilai parameter yang salah dan akan berpengaruh pada hasil segmentasi dari setiap citra. Kami mengajukan metode baru yaitu segmentasi citra ikan tuna dengan otomatisasi parameter DBSCAN menggunakan jumlah titik puncak pada histogram, sehingga mendapatkan nilai parameter yang optimal untuk segmentasi dari setiap citra. Untuk mendukung hal tersebut, kami menggunakan Eps Spatial, Eps Color dan MinPts di algoritma DBSCAN. Parameter tersebut mengambil nilai dari jumlah titik puncak pada histogram dalam ruang warna yang berbeda. Hasil dari metode ini dapat melakukan segmentasi citra ikan tuna dibuktikan dengan 30 citra yang telah digunakan dan mendapatkan akurasi diatas 90&. Jadi ini dapat melakukan segmentasi tanpa mengetahui nilai parameter tersebut.
Keystroke Dynamic Authentication Using Combined MHR (Mean of Horner’s Rules) and Standard Deviation Chandranegara, Didih Rizki; Sumadi, Fauzi Dwi Setiawan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (319.671 KB) | DOI: 10.22219/kinetik.v4i1.719

Abstract

Keystroke Dynamic Authentication used a behavior to authenticate the user and one of biometric authentication. The behavior used a typing speed a character on the keyboard and every user had a unique behavior in typing. To improve classification between user and attacker of Keystroke Dynamic Authentication in this research, we proposed a combination of MHR (Mean of Horner’s Rules) and standard deviation. The results of this research showed that our proposed method gave a high accuracy (93.872%) than the previous method (75.388% and 75.156%). This research gave an opportunity to implemented in real login system because our method gave the best results with False Acceptance Rate (FAR) is 0.113. The user can be used as a simple password and ignore a worrying about an account hacking in the system.
Controller Based Proxy for Handling NDP in OpenFlow Network Sumadi, Fauzi Dwi Setiawan; Chandranegara, Didih Rizki
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.116 KB) | DOI: 10.22219/kinetik.v4i1.720

Abstract

A significant method should be deployed in OpenFlow environment for reducing the complexity during the implementation of IPv6 neighbor discovery protocol (NDP) in multicast manner. This paper was performed for deploying reactive-based application in controller’s northbound layer for handling as well as cutting the Neighbor solicitation packet’s journey. The application had a capability for storing each of the incoming Neighbor Solicitation (NS) and Neighbor Advertisement (NA) packet information. Therefore, the controller could reply the NS packet directly by using OFPT_PACKET_OUT message that contained the NA packet extracted from the reactive application. The experiment’s result showed that the proposed approach could reduce the NS response time up to 71% than the normal result produced by the traditional/learning switch application.
Analisa Data Pesawat Terbang Menggunakan Metode Elimination Void Data dan Smoothing Data Chandranegara, Didih Rizki; Arifianto, Sofyan; Wibowo, Hardianto
POROS TEKNIK Vol. 12 No. 1 (2020)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/porosteknik.v12i2.874

Abstract

Perkembangan transportasi udara saat ini semakin meningkat, sehingga data yang disediakan juga semakin banyak. Oleh karena itu perlu dilakukan analisa-analisa terkait data penerbangan yang ada. Sehingga hasil analisa tersebut sangat berguna sebagai bahan evaluasi pihak otoritas penerbangan. Penelitian ini melakukan analisa terhadap data pesawat yang di sebarkan secara periodik menggunakan sistem yang bernama Automatic Dependent Surveillance-Broadcast (ADS-B). Hasil dari penelitian ini menunjukkan bahwa data penerbangan yang sangat besar dapat direduksi sehingga dapat menghemat ruang penyimpanan data dari pihak tertentu tanpa mengurangi informasi yang di peroleh sebelumnya.
ClusterMix K-Prototypes Algorithm to Capture Variable Characteristics of Patient Mortality With Heart Failure Novidianto, Raditya; Wibowo, Hardianto; Chandranegara, Didih Rizki
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 2, May 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i2.1209

Abstract

Cardiovascular Disease (CVD) is one of the leading causes of many death worldwide, leading to heart failure incidence. The World Health Organization (WHO) says the number of people dying from cardiovascular disease from heart failure each year has an average of 17,9 million deaths each year, about 31 percent of the total deaths globally. Identify the mortality factors of heart failure patients that need to be formed, which reduces death due to heart failure. One of them is by using variable mortality due to heart failure by applying the k-prototypes algorithm. The clustering result is formed 2 clusters that are considered optimal based on the highest silhouette coefficient value of 0,5777. The results of the study were carried out as segmentation of patients with variable mortality of heart failure patients, which showed that cluster 1 is a cluster of patients who have a low risk of the chance of mortality due to heart failure and cluster 2 is a cluster of patients with a high risk of mortality due to heart failure. The segmentation is based on the average value of each variable of heart failure mortality factor in each cluster compared to normal conditions in serum creatine variables, ejection fraction,  age,  serum sodium, blood pressure, anemia,  creatinine phosphokinase,  platelets, smoking, gender, and diabetes.
Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication Didih Rizki Chandranegara; Hardianto Wibowo; Agus Eko Minarno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14815

Abstract

Account security was determined by how well the security techniques applied by the system were used. There had been many security methods that guaranteed the security of their accounts, one of which was Keystroke Dynamic Authentication. Keystroke Dynamic Authentication was an authentication technique that utilized the typing habits of a person as a security measurement tool for the user account. From several research, the average use in the Keystroke Dynamic Authentication classification is not suitable, because a user's typing speed will change over time, maybe faster or slower depending on certain conditions. So, in this research, we proposed a combination of the Scaled Manhattan Distance method and the Mean of Horner's Rules as a classification method between the user and attacker against the Keystroke Dynamic Authentication. The reason for using Mean of Horner’s Rules can adapt to changes in values over time and based on the results can improve the accuracy of the previous method.
Sentiment Analysis on Work from Home Policy Using Naïve Bayes Method and Particle Swarm Optimization Rista Azizah Arilya; Yufis Azhar; Didih Rizki Chandranegara
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 7, No 3 (2021): December
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v7i3.22080

Abstract

At the beginning of 2020, the world was shocked by the coronavirus, which spread rapidly in various countries, one of which was Indonesia. So that the government implemented the Work from Home policy to suppress the spread of Covid-19. This has resulted in many people writing their opinions on the Twitter social media platform and reaping many pros and cons of the community from all aspects. The data source used in this study came from tweets with keywords related to work from home. Several previous studies in this field have not implemented feature selection for sentiment analysis, although the method used is not optimal. So that the contribution in this study is to classify public opinion into positive and negative using sentiment analysis and implement PSO for feature selection and Naïve Bayes for classifiers in building sentiment analysis models. The results showed that the best accuracy was 81% in the classification using Naive Bayes and 86% in the classification using naive Bayes based on PSO through a comparison of 90% training data and 10% test data. With the addition of an accuracy of 5%, it can be concluded that the use of the Particle Swarm Optimization algorithm as a feature selection can help the classification process so that the results obtained are more effective than before.
Analisa Data Pesawat Terbang Menggunakan Metode Elimination Void Data dan Smoothing Data Didih Rizki Chandranegara; Sofyan Arifianto; Hardianto Wibowo
POROS TEKNIK Vol. 12 No. 1 (2020)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/porosteknik.v12i2.874

Abstract

Perkembangan transportasi udara saat ini semakin meningkat, sehingga data yang disediakan juga semakin banyak. Oleh karena itu perlu dilakukan analisa-analisa terkait data penerbangan yang ada. Sehingga hasil analisa tersebut sangat berguna sebagai bahan evaluasi pihak otoritas penerbangan. Penelitian ini melakukan analisa terhadap data pesawat yang di sebarkan secara periodik menggunakan sistem yang bernama Automatic Dependent Surveillance-Broadcast (ADS-B). Hasil dari penelitian ini menunjukkan bahwa data penerbangan yang sangat besar dapat direduksi sehingga dapat menghemat ruang penyimpanan data dari pihak tertentu tanpa mengurangi informasi yang di peroleh sebelumnya.
Implementasi Website Profil Madrasah Muhammadiyah Al-Munawarroh Malang Sebagai Media Informasi Bagi Masyarakat Didih Rizki Chandranegara; Christian Sri Kusuma Aditya; Fauzi Dwi Setiawan Sumadi
JPPM (Jurnal Pengabdian dan Pemberdayaan Masyarakat) VOL. 4 NOMOR 2 SEPTEMBER 2020 JPPM (Jurnal Pengabdian dan Pemberdayaan Masyarakat)
Publisher : Lembaga Publikasi Ilmiah dan Penerbitan (LPIP)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.798 KB) | DOI: 10.30595/jppm.v4i2.6095

Abstract

Madrasah Muhammadiyah Al-Munawarroh adalah madrasah yang terletak di Malang dan salah satu madrasah yang berkembang. Untuk menunjang perkembangan tersebut, dibuat sebuah website profile yang dapat memberikan informasi kepada masyarakat secara cepat. Metode yang digunakan dalam pembuatan website adalah metode RAD (Rapid Application Development). Metode ini digunakan karena kami ingin melibatkan pihak madrasah dalam pembuatan website, agar website yang dibuat dapat bermanfaat secara penuh dan sesuai dengan kebutuhan penyebaran informasi bagi madrasah. Hasil dari pembuatan website profile menunjukkan bahwa pihak madrasah dapat dengan mudah menyebarkan informasi-informasi penting seperti jadwal pendaftaran siswa, informasi mengenai madrasah hingga informasi lowongan pekerjaan yang ada di madrasah.
Keystroke Dynamic Authentication Using Combined MHR (Mean of Horner’s Rules) and Standard Deviation Didih Rizki Chandranegara; Fauzi Dwi Setiawan Sumadi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (319.671 KB) | DOI: 10.22219/kinetik.v4i1.719

Abstract

Keystroke Dynamic Authentication used a behavior to authenticate the user and one of biometric authentication. The behavior used a typing speed a character on the keyboard and every user had a unique behavior in typing. To improve classification between user and attacker of Keystroke Dynamic Authentication in this research, we proposed a combination of MHR (Mean of Horner’s Rules) and standard deviation. The results of this research showed that our proposed method gave a high accuracy (93.872%) than the previous method (75.388% and 75.156%). This research gave an opportunity to implemented in real login system because our method gave the best results with False Acceptance Rate (FAR) is 0.113. The user can be used as a simple password and ignore a worrying about an account hacking in the system.