cover
Contact Name
Aji Prasetya Wibawa
Contact Email
aji.prasetya.ft@um.ac.id
Phone
+62818539333
Journal Mail Official
keds.journal@um.ac.id
Editorial Address
Gedung G4. Lantai 1 Jl. Semarang No.5, Malang
Location
Kota malang,
Jawa timur
INDONESIA
Knowledge Engineering and Data Science
ISSN : -     EISSN : 25974637     DOI : http://dx.doi.org/10.17977
Knowledge Engineering and Data Science (2597-4637), KEDS, brings together researchers, industry practitioners, and potential users, to promote collaborations, exchange ideas and practices, discuss new opportunities, and investigate analytics frameworks on data-driven and knowledge base systems.
Articles 81 Documents
Indonesian Sentence Boundary Detection using Deep Learning Approaches Joan Santoso; Esther Irawati Setiawan; Christian Nathaniel Purwanto; Fachrul Kurniawan
Knowledge Engineering and Data Science Vol 4, No 1 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i12021p38-48

Abstract

Detecting the sentence boundary is one of the crucial pre-processing steps in natural language processing. It can define the boundary of a sentence since the border between a sentence, and another sentence might be ambiguous. Because there are multiple separators and dynamic sentence patterns, using a full stop at the end of a sentence is sometimes inappropriate. This research uses a deep learning approach to split each sentence from an Indonesian news document. Hence, there is no need to define any handcrafted features or rules. In Part of Speech Tagging and Named Entity Recognition, we use sequence labeling to determine sentence boundaries. Two labels will be used, namely O as a non-boundary token and E as the last token marker in the sentence. To do this, we used the Bi-LSTM approach, which has been widely used in sequence labeling. We have proved that our approach works for Indonesian text using pre-trained embedding in Indonesian, as in previous studies. This study achieved an F1-Score value of 98.49 percent. When compared to previous studies, the achieved performance represents a significant increase in outcomes..
Detection of Disease and Pest of Kenaf Plant Based on Image Recognition with VGGNet19 Diny Melsye Nurul Fajri; Wayan Firdaus Mahmudy; Titiek Yulianti
Knowledge Engineering and Data Science Vol 4, No 1 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i12021p55-68

Abstract

One of the advantages of Kenaf fiber as an environmental management product that is currently in the center of attention is the use of Kenaf fiber for luxury car interiors with environmentally friendly plastic materials. The opportunity to export Kenaf fiber raw material will provide significant benefits, especially in the agricultural sector in Indonesia. However, there are problems in several areas of Kenaf's garden, namely plants that are attacked by diseases and pests, which cause reduced yields and even death. This problem is caused by the lack of expertise and working hours of extension workers as well as farmers' knowledge about Kenaf plants which have a terrible effect on Kenaf plants. The development of information technology can be overcome by imparting knowledge into machines known as artificial intelligence. In this study, the Convolutional Neural Network method was applied, which aims to identify symptoms and provide information about disease symptoms in Kenaf plants based on images so that early control of plant diseases can be carried out. Data processing trained directly from kenaf plantations obtained an accuracy of 57.56% for the first two classes of introduction to the VGGNet19 architecture and 25.37% for the four classes of the second introduction to the VGGNet19 architecture. The 5×5 block matrix input feature has been added in training to get maximum results.
Tanned and Synthetic Leather Classification Based on Images Texture with Convolutional Neural Network Faadihilah Ahnaf Faiz; Ahmad Azhari
Knowledge Engineering and Data Science Vol 3, No 2 (2020)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v3i22020p77-88

Abstract

Tanned leather is an output from complex processes called tanning. Leather tanning is an important step that used to protect the fiber or protein structure of animal’s skin. Another reason of tanning process is to prevent the animal’s skin from any defect or rot. After the tanning is complete, the leather can be applied to produce a wide variety of leather products. Thus, the leather prices usually more expensive because it takes longer time in process. Another way to get cheaper price is make non-animal leather that usually known as synthetic or imitation leather. The purpose of this paper is to classify the tanned leather and synthetic leather by using Convolutional Neural Network. The tanned leather consist of cow, goat and sheep leathers. The proposed method will classify into four class, they are cow, goat, sheep and synthetic leathers. In each class consist of 160 images with 448x448 pixels size as the input data. With CNN method, this research shows a good result for the accuracy about 92.1%.
Face Images Classification using VGG-CNN I Nyoman Gede Arya Astawa; Made Leo Radhitya; I Wayan Raka Ardana; Felix Andika Dwiyanto
Knowledge Engineering and Data Science Vol 4, No 1 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i12021p49-54

Abstract

Image classification is a fundamental problem in computer vision. In facial recognition, image classification can speed up the training process and also significantly improve accuracy. The use of deep learning methods in facial recognition has been commonly used. One of them is the Convolutional Neural Network (CNN) method which has high accuracy. Furthermore, this study aims to combine CNN for facial recognition and VGG for the classification process. The process begins by input the face image. Then, the preprocessor feature extractor method is used for transfer learning. This study uses a VGG-face model as an optimization model of transfer learning with a pre-trained model architecture. Specifically, the features extracted from an image can be numeric vectors. The model will use this vector to describe specific features in an image.  The face image is divided into two, 17% of data test and 83% of data train. The result shows that the value of accuracy validation (val_accuracy), loss, and loss validation (val_loss) are excellent. However, the best training results are images produced from digital cameras with modified classifications. Val_accuracy's result of val_accuracy is very high (99.84%), not too far from the accuracy value (94.69%). Those slight differences indicate an excellent model, since if the difference is too much will causes underfit. Other than that, if the accuracy value is higher than the accuracy validation value, then it will cause an overfit. Likewise, in the loss and val_loss, the two values are val_loss (0.69%) and loss value (10.41%).
Simple Modification for an Apriori Algorithm With Combination Reduction and Iteration Limitation Technique Adie Wahyudi Oktavia Gama; Ni Made Widnyani
Knowledge Engineering and Data Science Vol 3, No 2 (2020)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v3i22020p89-98

Abstract

Apriori algorithm is one of the methods with regard to association rules in data mining. This algorithm uses knowledge from an itemset previously formed with frequent occurrence frequencies to form the next itemset. An a priori algorithm generates a combination by iteration methods that are using repeated database scanning process, pairing one product with another product and then recording the number of occurrences of the combination with the minimum limit of support and confidence values. The a priori algorithm will slow down to an expanding database in the process of finding frequent itemset to form association rules. Modification techniques are needed to optimize the performance of a priori algorithms so as to get frequent itemset and to form association rules in a short time. Modifications in this study are obtained by using techniques combination reduction and iteration limitation. Testing is done by comparing the time and quality of the rules formed from the database scanning using a priori algorithms with and without modification. The results of the test show that the modified a priori algorithm tested with data samples of up to 500 transactions is proven to form rules faster with quality rules that are maintained.Keywords: Data Mining; Association Rules; Apriori Algorithms; Frequent Itemset; Apriori Modified;
Backpropagation Neural Network with Combination of Activation Functions for Inbound Traffic Prediction Purnawansyah Purnawansyah; Haviluddin Haviluddin; Herdianti Darwis; Huzain Azis; Yulita Salim
Knowledge Engineering and Data Science Vol 4, No 1 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i12021p14-28

Abstract

Predicting network traffic is crucial for preventing congestion and gaining superior quality of network services. This research aims to use backpropagation to predict the inbound level to understand and determine internet usage. The architecture consists of one input layer, two hidden layers, and one output layer. The study compares three activation functions: sigmoid, rectified linear unit (ReLU), and hyperbolic Tangent (tanh). Three learning rates: 0.1, 0.5, and 0.9 represent low, moderate, and high rates, respectively. Based on the result, in terms of a single form of activation function, although sigmoid provides the least RMSE and MSE values, the ReLu function is more superior in learning the high traffic pattern with a learning rate of 0.9. In addition, Re-LU is more powerful to be used in the first order in terms of combination. Hence, combining a high learning rate and pure ReLU, ReLu-sigmoid, or ReLu-Tanh is more suitable and recommended to predict upper traffic utilization
Segmentation Method for Face Modelling in Thermal Images Albar Albar; Hendrick Hendrick; Rahmad Hidayat
Knowledge Engineering and Data Science Vol 3, No 2 (2020)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v3i22020p99-105

Abstract

Face detection is mostly applied in RGB images. The object detection usually applied the Deep Learning method for model creation. One method face spoofing is by using a thermal camera. The famous object detection methods are Yolo, Fast RCNN, Faster RCNN, SSD, and Mask RCNN. We proposed a segmentation Mask RCNN method to create a face model from thermal images. This model was able to locate the face area in images. The dataset was established using 1600 images. The images were created from direct capturing and collecting from the online dataset. The Mask RCNN was configured to train with 5 epochs and 131 iterations. The final model predicted and located the face correctly using the test image.
Forecasting Stock Exchange Data using Group Method of Data Handling Neural Network Approach Marzieh Faridi Masouleh; Ahmad Bagheri
Knowledge Engineering and Data Science Vol 4, No 1 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i12021p1-13

Abstract

The increasing uncertainty of the natural world has motivated computer scientists to seek out the best approach to technological problems. Nature-inspired problem-solving approaches include meta-heuristic methods that are focused on evolutionary computation and swarm intelligence. One of these problems significantly impacting information is forecasting exchange index, which is a serious concern with the growth and decline of stock as there are many reports on loss of financial resources or profitability. When the exchange includes an extensive set of diverse stock, particular concepts and mechanisms for physical security, network security, encryption, and permissions should guarantee and predict its future needs. This study aimed to show it is efficient to use the group method of data handling (GMDH)-type neural networks and their application for the classification of numerical results. Such modeling serves to display the precision of GMDH-type neural networks. Following the US withdrawal from the Joint Comprehensive Plan of Action in April 2018, the behavior of the stock exchange data stream and commend algorithms has not been able to predict correctly and fit in the network satisfactorily. This paper demonstrated that Group Method Data Handling is most likely to improve inductive self-organizing approaches for addressing realistic severe problems such as the Iranian financial market crisis. A new trajectory would be used to verify the consistency of the obtained equations hence the models' validity.
Recognition of Handwritten Javanese Script using Backpropagation with Zoning Feature Extraction Anik Nur Handayani; Heru Wahyu Herwanto; Katya Lindi Chandrika; Kohei Arai
Knowledge Engineering and Data Science Vol 4, No 2 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i22021p117-127

Abstract

Backpropagation is part of supervised learning, in which the training process requires a target. The resulting error is transmitted back to the units below in its training process. Backpropagation can solve complicated problems because it consumes less memory than other algorithms. In addition, it also can produce solutions with a low error rate while executing less time. In image pattern recognition, backpropagation can be utilized for cultural preservation in many places worldwide, including Indonesia. It is used to recognize picture patterns in Javanese script writings. This study concluded that feature extraction approaches, zoning, and backpropagation could be utilized to distinguish handwritten Javanese characters. The best accuracy is attained at 77.00%, with the network architecture comprising 64 input neurons, 40 hidden neurons, a learning rate of 0.003, a momentum of 0.03, and an iteration of 5000. 
CNN based Face Recognition System for Patients with Down and William Syndrome Endang Setyati; Suharyono Az; Subroto Prasetya Hudiono; Fachrul Kurniawan
Knowledge Engineering and Data Science Vol 4, No 2 (2021)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v4i22021p138-144

Abstract

Down syndrome, also known as trisomy genetic condition, is a genetic disorder that affects many people. Williams syndrome is a hereditary disorder that can affect anyone at birth. It marks medical and cognitive issues, such as cardiovascular illness, developmental delays, and learning impairments. This is accompanied by exceptional verbal abilities, a gregarious attitude, and a passion for music. Down syndrome and William Syndrome are both genetic illnesses. However, it can be distinguished from the arrangement of chromosome 21. Down syndrome and William syndrome can also be identified by recognizing faces, or facial characteristics, such as observing particular facial features. Therefore, this research develops Convolutional Neural Network (CNN) architectures to recognize Down syndrome and William syndrome using a facial recognition approach. A total of 480 facial photos were used in the study, with 390 images used for training data and 90 images used for testing data. The identification class is divided into three categories, Down syndrome, William syndrome, and normal. There are 160 photos in each patient class. This research presents two CNN architectures using a grayscale image of 256×256 pixels. The first CNN architecture comprises 12 layers, while the second comprises 15 layers. The average accuracy results with 12 layers were 91% by attempting to train and test six times. With 15 layers, the average accuracy value is 89%. In comparison, the first architecture has the highest accuracy value.