首页 > 最新文献

Jurnal Teknologi dan Sistem Komputer最新文献

英文 中文
Regional clustering based on economic potential with a modified fuzzy k-prototypes algorithm for village developing target determination 基于经济潜力的区域聚类与改进模糊k-原型算法确定村庄发展目标
Pub Date : 2022-01-20 DOI: 10.14710/jtsiskom.2021.14247
Hermawan Prasetyo
The clustering algorithm can group regions based on economic potential with mixed attributes data, consisting of numeric and categorical data. This study aims to group villages according to their economic potential in determining village development targets in Demak Regency using the fuzzy k-prototypes algorithm and modified Eskin distance to measure the distance of categorical attributes. The data used are PODES2018 data and the 2019 Wilkerstat Mapping. Village clustering produces three village clusters according to their economic potential, namely low, medium, and high economic clusters. Clusters of high economic potential are located on the main transportation routes of Semarang–Kudus and Semarang–Grobogan. However, villages on the main transportation route are still included in the low economic cluster. Considering the status of the urban/rural village classification, most of these villages are included in the urban village category. The results of this clustering can be used to determine village development targets in increasing the Village Developing Index in Demak Regency.
聚类算法可以根据经济潜力对区域进行分组,并使用由数字和分类数据组成的混合属性数据。本研究旨在根据村庄的经济潜力对其进行分组,以确定Demak Regency的村庄发展目标,使用模糊k-原型算法和修正的Eskin距离来测量类别属性的距离。使用的数据是PODES2018数据和2019年Wilkerstat地图。村庄集群根据其经济潜力产生三个村庄集群,即低、中、高经济集群。具有较高经济潜力的集群位于三宝垄-库都斯和三宝垄–格罗博甘的主要交通路线上。然而,主要交通路线上的村庄仍然属于低经济集群。考虑到城市/农村村庄分类的现状,这些村庄大多被纳入城市村庄类别。该聚类结果可用于确定德马克县村庄发展指数的村庄发展目标。
{"title":"Regional clustering based on economic potential with a modified fuzzy k-prototypes algorithm for village developing target determination","authors":"Hermawan Prasetyo","doi":"10.14710/jtsiskom.2021.14247","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.14247","url":null,"abstract":"The clustering algorithm can group regions based on economic potential with mixed attributes data, consisting of numeric and categorical data. This study aims to group villages according to their economic potential in determining village development targets in Demak Regency using the fuzzy k-prototypes algorithm and modified Eskin distance to measure the distance of categorical attributes. The data used are PODES2018 data and the 2019 Wilkerstat Mapping. Village clustering produces three village clusters according to their economic potential, namely low, medium, and high economic clusters. Clusters of high economic potential are located on the main transportation routes of Semarang–Kudus and Semarang–Grobogan. However, villages on the main transportation route are still included in the low economic cluster. Considering the status of the urban/rural village classification, most of these villages are included in the urban village category. The results of this clustering can be used to determine village development targets in increasing the Village Developing Index in Demak Regency.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45630957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of beneficiaries for the rehabilitation of uninhabitable houses using the K-Nearest Neighbor algorithm 使用K-最近邻算法对不适合居住的房屋修复的受益人进行分类
Pub Date : 2022-01-20 DOI: 10.14710/jtsiskom.2021.14110
An-Naas Shahifatun Na’iema, Harminto Mulyo, Nur Aeni Widiastuti
The registrars for rehabilitation programs for uninhabitable settlements are increasing every year. The large data processing of registrants may result in inaccuracies and need a long time to determine livable houses (RTLH) and unfit for habitation (non RTLH). This study aims to apply the K-Nearest Neighbor algorithm in classifying the eligibility of recipients of uninhabitable house rehabilitation assistance. The data used in this study were 1289 data with 13 attributes from the Jepara Regency Public Housing and Settlement Service. Data processing begins with attribute selection, categorization, outlier data cleaning, and data normalization and method application. The proposed system has the best classification at k of 5 with an accuracy of 97.93%, 96.88% precision, 99.53% recall, and an AUC value of 0.964.
不适合居住的定居点的康复项目的登记人数每年都在增加。注册人的大量数据处理可能会导致不准确,并且需要很长时间来确定宜居房屋(RTLH)和不适合居住的房屋(非RTLH)。本研究旨在应用K-最近邻算法对不适合居住的房屋康复援助接受者的资格进行分类。本研究中使用的数据是来自杰帕拉县公共住房和安置服务局的1289个具有13个属性的数据。数据处理从属性选择、分类、异常数据清理、数据规范化和方法应用开始。所提出的系统在k为5时具有最佳分类,准确率为97.93%,准确度为96.88%,召回率为99.53%,AUC值为0.964。
{"title":"Classification of beneficiaries for the rehabilitation of uninhabitable houses using the K-Nearest Neighbor algorithm","authors":"An-Naas Shahifatun Na’iema, Harminto Mulyo, Nur Aeni Widiastuti","doi":"10.14710/jtsiskom.2021.14110","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.14110","url":null,"abstract":"The registrars for rehabilitation programs for uninhabitable settlements are increasing every year. The large data processing of registrants may result in inaccuracies and need a long time to determine livable houses (RTLH) and unfit for habitation (non RTLH). This study aims to apply the K-Nearest Neighbor algorithm in classifying the eligibility of recipients of uninhabitable house rehabilitation assistance. The data used in this study were 1289 data with 13 attributes from the Jepara Regency Public Housing and Settlement Service. Data processing begins with attribute selection, categorization, outlier data cleaning, and data normalization and method application. The proposed system has the best classification at k of 5 with an accuracy of 97.93%, 96.88% precision, 99.53% recall, and an AUC value of 0.964.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
River water level measurement system using Sobel edge detection method 河流水位测量系统采用索贝尔边缘检测法
Pub Date : 2022-01-20 DOI: 10.14710/jtsiskom.2021.14119
Faiz Miftakhur Rozaqi, W. Wahyono
Flood is a natural disaster that often occurs in Indonesia. Therefore, a flood warning system is required to reduce the number of losses due to flooding. In this study, a Sobel edge detection-based framework is proposed to measure the river water level, which is expected to be used as an early flood warning system. Sobel edge detection is used to determine the edge of the water surface, which is then taken by the position of the pixels, and the height is calculated by comparing the image with actual conditions. The test results of the system implemented on the prototype show that this system has an RMSE less than 0.6986 mm and can run at 12 fps which in the future can be implemented directly on rivers.
洪水是印尼经常发生的自然灾害。因此,需要一个洪水预警系统来减少洪水造成的损失。本文提出了一种基于Sobel边缘检测的河流水位测量框架,该框架有望用于洪水预警系统。采用Sobel边缘检测确定水面边缘,然后取像素点的位置,通过与实际情况对比图像计算高度。在样机上实现的系统测试结果表明,该系统的RMSE小于0.6986 mm,运行速度可达12fps,将来可直接在河流上实现。
{"title":"River water level measurement system using Sobel edge detection method","authors":"Faiz Miftakhur Rozaqi, W. Wahyono","doi":"10.14710/jtsiskom.2021.14119","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.14119","url":null,"abstract":"Flood is a natural disaster that often occurs in Indonesia. Therefore, a flood warning system is required to reduce the number of losses due to flooding. In this study, a Sobel edge detection-based framework is proposed to measure the river water level, which is expected to be used as an early flood warning system. Sobel edge detection is used to determine the edge of the water surface, which is then taken by the position of the pixels, and the height is calculated by comparing the image with actual conditions. The test results of the system implemented on the prototype show that this system has an RMSE less than 0.6986 mm and can run at 12 fps which in the future can be implemented directly on rivers.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46822175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TATOPSIS: A decision support system for selecting a major in university with a two-way approach and TOPSIS TATOPSIS:一个基于双向方法和TOPSIS的大学专业选择决策支持系统
Pub Date : 2022-01-20 DOI: 10.14710/jtsiskom.2021.14074
Dewi Wardani, Widyaswari Mahayanti, Haryono Setiadi, Maria Ulfa, E. Wihidayat
Several problems can occur when students feel they have made the wrong choice of major in university. Choosing a major is one of the problems that students often face. Therefore, this study aims to develop a Decision Support System (DSS) to help students find majors that match their interests and abilities. This DSS proposes a two-way approach by considering students and the major's requirements, standards, and characteristics. The DSS utilizes the TOPSIS method; therefore, it is called TATOPSIS, which stands for Two-way Approach TOPSIS. It showed that the two-way approach in Scenario 1 (without score normalization) and Scenario 3 (with score normalization) shows better agreement results in 78.33% and 73.33% than the two-way approach for Scenario 2, Scenario 4, and the student-one-way approaches.
当学生觉得自己在大学里选择了错误的专业时,可能会出现一些问题。选择专业是学生经常面临的问题之一。因此,本研究旨在开发一个决策支持系统(DSS),帮助学生找到符合他们兴趣和能力的专业。该DSS通过考虑学生和专业的要求、标准和特点,提出了一种双向方法。DSS采用TOPSIS方法;因此,它被称为TATOPSIS,代表双向方法TOPSIS。结果表明,情景1(无分数归一化)和情景3(有分数归一化)中的双向方法显示出比情景2、情景4和学生单向方法更好的一致性结果,分别为78.33%和73.33%。
{"title":"TATOPSIS: A decision support system for selecting a major in university with a two-way approach and TOPSIS","authors":"Dewi Wardani, Widyaswari Mahayanti, Haryono Setiadi, Maria Ulfa, E. Wihidayat","doi":"10.14710/jtsiskom.2021.14074","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.14074","url":null,"abstract":"Several problems can occur when students feel they have made the wrong choice of major in university. Choosing a major is one of the problems that students often face. Therefore, this study aims to develop a Decision Support System (DSS) to help students find majors that match their interests and abilities. This DSS proposes a two-way approach by considering students and the major's requirements, standards, and characteristics. The DSS utilizes the TOPSIS method; therefore, it is called TATOPSIS, which stands for Two-way Approach TOPSIS. It showed that the two-way approach in Scenario 1 (without score normalization) and Scenario 3 (with score normalization) shows better agreement results in 78.33% and 73.33% than the two-way approach for Scenario 2, Scenario 4, and the student-one-way approaches.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45043425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SVM optimization using a grid search algorithm to identify robusta coffee bean images based on circularity and eccentricity 基于支持向量机优化的网格搜索算法识别罗布斯塔咖啡豆图像
Pub Date : 2022-01-04 DOI: 10.14710/jtsiskom.2021.13807
Herlina Apriani, J. Jaman, Riza Ibnu Adam
Coffee variety is one of the main factors affecting the quality and price of coffee, so it is important to recognize coffee varieties. This study aims to optimize the recognition of robusta coffee beans based on circularity and eccentricity image features using a support vector machine (SVM) and Grid search algorithm. The methods used included image acquisition, preprocessing, feature extraction, classification, and evaluation. Circularity and eccentricity are used in the feature extraction process, while the grid search algorithm is used to optimize SVM parameters in the classification process for four different kernels. This study produced the best classification model with the highest accuracy of 94% for the RBF and Polynomial kernels.
咖啡品种是影响咖啡品质和价格的主要因素之一,因此认清咖啡品种很重要。本研究旨在利用支持向量机(SVM)和网格搜索算法优化基于圆形和偏心图像特征的罗布斯塔咖啡豆识别。使用的方法包括图像采集、预处理、特征提取、分类和评价。在特征提取过程中使用圆度和偏心率,在分类过程中使用网格搜索算法对四种不同核进行SVM参数优化。本研究产生了RBF和多项式核的最佳分类模型,准确率高达94%。
{"title":"SVM optimization using a grid search algorithm to identify robusta coffee bean images based on circularity and eccentricity","authors":"Herlina Apriani, J. Jaman, Riza Ibnu Adam","doi":"10.14710/jtsiskom.2021.13807","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.13807","url":null,"abstract":"Coffee variety is one of the main factors affecting the quality and price of coffee, so it is important to recognize coffee varieties. This study aims to optimize the recognition of robusta coffee beans based on circularity and eccentricity image features using a support vector machine (SVM) and Grid search algorithm. The methods used included image acquisition, preprocessing, feature extraction, classification, and evaluation. Circularity and eccentricity are used in the feature extraction process, while the grid search algorithm is used to optimize SVM parameters in the classification process for four different kernels. This study produced the best classification model with the highest accuracy of 94% for the RBF and Polynomial kernels.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47933388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequence-based prediction of protein-protein interaction using autocorrelation features and machine learning 基于序列的蛋白质相互作用预测,使用自相关特征和机器学习
Pub Date : 2022-01-04 DOI: 10.14710/jtsiskom.2021.13984
Syahid Abdullah, W. Kusuma, S. Wijaya
Protein-protein interaction (PPI) can define a protein's function by knowing the protein's position in a complex network of protein interactions. The number of PPIs that have been identified is relatively small. Therefore, several studies were conducted to predict PPI using protein sequence information. This research compares the performance of three autocorrelation methods: Moran, Geary, and Moreau-Broto, in extracting protein sequence features to predict PPI. The results of the three extractions are then applied to three machine learning algorithms, namely k-Nearest Neighbor (KNN), Random Forest, and Support Vector Machine (SVM). The prediction models with the three autocorrelation methods can produce predictions with high average accuracy, which is 95.34% for Geary in KNN, 97.43% for Geary in RF, and 97.11% for Geary and Moran in SVM. In addition, the interacting protein pairs tend to have similar autocorrelation characteristics. Thus, the autocorrelation method can be used to predict PPI well.
蛋白质-蛋白质相互作用(PPI)可以通过了解蛋白质在蛋白质相互作用的复杂网络中的位置来定义蛋白质的功能。已确定的PPI数量相对较少。因此,进行了几项利用蛋白质序列信息预测PPI的研究。本研究比较了三种自相关方法:Moran、Geary和Moreau-Broto在提取蛋白质序列特征以预测PPI方面的性能。然后将三次提取的结果应用于三种机器学习算法,即k近邻(KNN)、随机森林和支持向量机(SVM)。具有三种自相关方法的预测模型可以产生具有高平均精度的预测,在KNN中Geary的平均精度为95.34%,在RF中Geary为97.43%,在SVM中Geary和Moran为97.11%。此外,相互作用的蛋白质对往往具有相似的自相关特性。因此,自相关方法可以很好地预测PPI。
{"title":"Sequence-based prediction of protein-protein interaction using autocorrelation features and machine learning","authors":"Syahid Abdullah, W. Kusuma, S. Wijaya","doi":"10.14710/jtsiskom.2021.13984","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.13984","url":null,"abstract":"Protein-protein interaction (PPI) can define a protein's function by knowing the protein's position in a complex network of protein interactions. The number of PPIs that have been identified is relatively small. Therefore, several studies were conducted to predict PPI using protein sequence information. This research compares the performance of three autocorrelation methods: Moran, Geary, and Moreau-Broto, in extracting protein sequence features to predict PPI. The results of the three extractions are then applied to three machine learning algorithms, namely k-Nearest Neighbor (KNN), Random Forest, and Support Vector Machine (SVM). The prediction models with the three autocorrelation methods can produce predictions with high average accuracy, which is 95.34% for Geary in KNN, 97.43% for Geary in RF, and 97.11% for Geary and Moran in SVM. In addition, the interacting protein pairs tend to have similar autocorrelation characteristics. Thus, the autocorrelation method can be used to predict PPI well.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45363200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data scaling performance on various machine learning algorithms to identify abalone sex 识别鲍鱼性别的各种机器学习算法的数据缩放性能
Pub Date : 2021-08-10 DOI: 10.14710/jtsiskom.2021.14105
Willdan Aprizal Arifin, I. Ariawan, A. A. Rosalia, L. Lukman, Nabila Tufailah
This study aims to analyze the performance of machine learning algorithms with the data scaling process to show the method's effectiveness. It uses min-max (normalization) and zero-mean (standardization) data scaling techniques in the abalone dataset. The stages carried out in this study included data normalization on the data of abalone physical measurement features. The model evaluation was carried out using k-fold cross-validation with the number of k-fold 10. Abalone datasets were normalized in machine learning algorithms: Random Forest, Naïve Bayesian, Decision Tree, and SVM (RBF kernels and linear kernels). The eight features of the abalone dataset show that machine learning algorithms did not too influence data scaling. There is an increase in the performance of SVM, while Random Forest decreases when the abalone dataset is applied to data scaling. Random Forest has the highest average balanced accuracy (74.87%) without data scaling.
本研究旨在分析具有数据缩放过程的机器学习算法的性能,以显示该方法的有效性。它在鲍鱼数据集中使用最小-最大(归一化)和零均值(标准化)数据缩放技术。本研究所进行的阶段包括对鲍鱼物理测量特征数据进行数据归一化。使用k倍交叉验证进行模型评估,k倍数量为10。在机器学习算法中对鲍鱼数据集进行了归一化:随机森林、朴素贝叶斯、决策树和SVM(RBF核和线性核)。鲍鱼数据集的八个特征表明,机器学习算法不会对数据缩放产生太大影响。当鲍鱼数据集应用于数据缩放时,SVM的性能有所提高,而随机森林则有所下降。随机森林在没有数据缩放的情况下具有最高的平均平衡精度(74.87%)。
{"title":"Data scaling performance on various machine learning algorithms to identify abalone sex","authors":"Willdan Aprizal Arifin, I. Ariawan, A. A. Rosalia, L. Lukman, Nabila Tufailah","doi":"10.14710/jtsiskom.2021.14105","DOIUrl":"https://doi.org/10.14710/jtsiskom.2021.14105","url":null,"abstract":"This study aims to analyze the performance of machine learning algorithms with the data scaling process to show the method's effectiveness. It uses min-max (normalization) and zero-mean (standardization) data scaling techniques in the abalone dataset. The stages carried out in this study included data normalization on the data of abalone physical measurement features. The model evaluation was carried out using k-fold cross-validation with the number of k-fold 10. Abalone datasets were normalized in machine learning algorithms: Random Forest, Naïve Bayesian, Decision Tree, and SVM (RBF kernels and linear kernels). The eight features of the abalone dataset show that machine learning algorithms did not too influence data scaling. There is an increase in the performance of SVM, while Random Forest decreases when the abalone dataset is applied to data scaling. Random Forest has the highest average balanced accuracy (74.87%) without data scaling.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43092386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time currency recognition on video using AKAZE algorithm 基于AKAZE算法的视频实时货币识别
Pub Date : 2021-07-18 DOI: 10.14710/JTSISKOM.2021.13970
F. Adhinata, R. Adhitama, A. Segara
Currency recognition is one of the essential things since everyone in any country must know money. Therefore, computer vision has been developed to recognize currency. One of the currency recognition uses the SIFT algorithm. The recognition results are very accurate, but the processing takes a considerable amount of time, making it impossible to run for real-time data such as video. AKAZE algorithm has been developed for real-time data processing because of its fast computation time to process video data frames. This study proposes the faster real-time currency recognition system on video using the AKAZE algorithm. The purpose of this study is to compare the SIFT and AKAZE algorithms related to a real-time video data processing to determine the value of F1 and its speed. Based on the experimental results, the AKAZE algorithm is resulting F1 value of 0.97, and the processing speed on each video frame is 0.251 seconds. Then at the same video resolution, the SIFT algorithm results in an F1 value of 0.65 and a speed of 0.305 seconds to process one frame. These results show that the AKAZE algorithm is faster and more accurate in processing video data.
货币识别是必不可少的事情之一,因为任何国家的每个人都必须了解货币。因此,计算机视觉已经发展到识别货币。其中一种货币识别采用SIFT算法。识别结果非常准确,但处理过程需要相当长的时间,因此无法运行视频等实时数据。AKAZE算法因其处理视频数据帧的计算时间快而被开发用于实时数据处理。本研究提出了一种基于AKAZE算法的更快的视频实时货币识别系统。本研究的目的是比较与实时视频数据处理相关的SIFT和AKAZE算法,以确定F1的值及其速度。从实验结果来看,AKAZE算法得到的F1值为0.97,每帧视频的处理速度为0.251秒。在相同的视频分辨率下,SIFT算法处理一帧的F1值为0.65,速度为0.305秒。结果表明,AKAZE算法处理视频数据的速度更快,精度更高。
{"title":"Real-time currency recognition on video using AKAZE algorithm","authors":"F. Adhinata, R. Adhitama, A. Segara","doi":"10.14710/JTSISKOM.2021.13970","DOIUrl":"https://doi.org/10.14710/JTSISKOM.2021.13970","url":null,"abstract":"Currency recognition is one of the essential things since everyone in any country must know money. Therefore, computer vision has been developed to recognize currency. One of the currency recognition uses the SIFT algorithm. The recognition results are very accurate, but the processing takes a considerable amount of time, making it impossible to run for real-time data such as video. AKAZE algorithm has been developed for real-time data processing because of its fast computation time to process video data frames. This study proposes the faster real-time currency recognition system on video using the AKAZE algorithm. The purpose of this study is to compare the SIFT and AKAZE algorithms related to a real-time video data processing to determine the value of F1 and its speed. Based on the experimental results, the AKAZE algorithm is resulting F1 value of 0.97, and the processing speed on each video frame is 0.251 seconds. Then at the same video resolution, the SIFT algorithm results in an F1 value of 0.65 and a speed of 0.305 seconds to process one frame. These results show that the AKAZE algorithm is faster and more accurate in processing video data.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46003704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced image security using residue number system and new Arnold transform 利用剩余数系统和新的阿诺德变换增强图像安全性
Pub Date : 2021-07-18 DOI: 10.14710/JTSISKOM.2021.14038
A. N. Babatunde, Afeez Adeshina Oke, A. A. Oloyede, Aisha Oiza Bello
This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving the classical discrete Arnold transform with quasi-affine properties, applying image scrambling and encryption research. The design of the method is explicit to three moduli set {2n, 2n+1+1, 2n+1-1}. These moduli set includes equalized and shapely moduli leading to the effective execution of the residue to binary converter. The study employs an arithmetic residue to the binary converter and an improved Arnold transformation algorithm. The encryption process uses MATLAB to accept a digital image input and subsequently convert the image into an RNS representation. The images are connected as a group. The resulting encrypted image uses the Arnold transformation algorithm. The encrypted image is used as input at decryption using the anti-Arnold (Reverse Arnold) transformation algorithm to convert the picture to the original RNS (original pixel value). Then the RNS was used to retransform the original RNS to its binary form. Security analysis tests, like histogram analysis, keyspace, key sensitivity, and correlation coefficient analysis, were administered on the encrypted image. Results show that the hybrid system can use the improved Arnold transform algorithm with better security and no constraint on image width and size.
为了改善传统二维离散阿诺德变换中图像置乱和加密效果,本文引入了一种新的三模剩余数系统(RNS)和新阿诺德变换。研究重点是改进具有准仿射性质的经典离散阿诺德变换,应用图像置乱和加密研究。该方法的设计明确为三个模集{2n, 2n+1+1, 2n+1-1}。这些模集包括均等模和形模,可以有效地实现剩余二进制变换器。该研究采用了二值变换器的算术残差和改进的Arnold变换算法。加密过程使用MATLAB接受数字图像输入,随后将图像转换为RNS表示。这些图像作为一个组连接在一起。生成的加密图像使用Arnold变换算法。加密后的图像作为解密时的输入,使用反阿诺德(Reverse Arnold)变换算法将图像转换为原始RNS(原始像素值)。然后使用RNS将原始RNS重新转换为二进制形式。对加密图像进行安全分析测试,如直方图分析、键空间、键灵敏度和相关系数分析。结果表明,该混合系统可以使用改进的Arnold变换算法,具有更好的安全性,并且不受图像宽度和大小的约束。
{"title":"Enhanced image security using residue number system and new Arnold transform","authors":"A. N. Babatunde, Afeez Adeshina Oke, A. A. Oloyede, Aisha Oiza Bello","doi":"10.14710/JTSISKOM.2021.14038","DOIUrl":"https://doi.org/10.14710/JTSISKOM.2021.14038","url":null,"abstract":"This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving the classical discrete Arnold transform with quasi-affine properties, applying image scrambling and encryption research. The design of the method is explicit to three moduli set {2n, 2n+1+1, 2n+1-1}. These moduli set includes equalized and shapely moduli leading to the effective execution of the residue to binary converter. The study employs an arithmetic residue to the binary converter and an improved Arnold transformation algorithm. The encryption process uses MATLAB to accept a digital image input and subsequently convert the image into an RNS representation. The images are connected as a group. The resulting encrypted image uses the Arnold transformation algorithm. The encrypted image is used as input at decryption using the anti-Arnold (Reverse Arnold) transformation algorithm to convert the picture to the original RNS (original pixel value). Then the RNS was used to retransform the original RNS to its binary form. Security analysis tests, like histogram analysis, keyspace, key sensitivity, and correlation coefficient analysis, were administered on the encrypted image. Results show that the hybrid system can use the improved Arnold transform algorithm with better security and no constraint on image width and size.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47666119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious URLs detection using data streaming algorithms 使用数据流算法检测恶意URL
Pub Date : 2021-07-09 DOI: 10.14710/JTSISKOM.2021.13965
K. Adewole, Muiz O. Raheem, M. Abdulraheem, I. D. Oladipo, A. Balogun, Omotola Fatimah Baker
As a result of advancements in technology and technological devices, data is now spawned at an infinite rate, emanating from a vast array of networks, devices, and daily operations like credit card transactions and mobile phones. Datastream entails sequential and real-time continuous data in the inform of evolving stream. However, the traditional machine learning approach is characterized by a batch learning model. Labeled training data are given apriori to train a model based on some machine learning algorithms. This technique necessitates the entire training sample to be readily accessible before the learning process. The training procedure is mainly done offline in this setting due to the high training cost. Consequently, the traditional batch learning technique suffers severe drawbacks, such as poor scalability for real-time phishing websites detection. The model mostly requires re-training from scratch using new training samples. This paper presents the application of streaming algorithms for detecting malicious URLs based on selected online learners: Hoeffding Tree (HT), Naïve Bayes (NB), and Ozabag. Ozabag produced promising results in terms of accuracy, Kappa and Kappa Temp on the dataset with large samples while HT and NB have the least prediction time with comparable accuracy and Kappa with Ozabag algorithm for the real-time detection of phishing websites.
由于技术和技术设备的进步,数据现在以无限的速度产生,从大量的网络、设备和日常操作中产生,如信用卡交易和移动电话。数据流在不断发展的信息流中需要连续的和实时的连续数据。然而,传统的机器学习方法以批处理学习模型为特征。先验地给出标记的训练数据来训练基于某些机器学习算法的模型。这种技术要求在学习过程之前可以很容易地访问整个训练样本。在这种情况下,由于培训成本高,培训过程主要是离线完成的。因此,传统的批量学习技术存在着严重的缺陷,如对网络钓鱼网站的实时检测可扩展性差。该模型大多需要使用新的训练样本从零开始重新训练。本文介绍了基于选定在线学习器的流算法在检测恶意url中的应用:Hoeffding Tree (HT), Naïve Bayes (NB)和Ozabag。Ozabag算法在大样本数据集的准确率、Kappa和Kappa Temp方面取得了令人满意的结果,而HT和NB算法的预测时间最短,准确率相当,Kappa和Ozabag算法用于实时检测网络钓鱼网站。
{"title":"Malicious URLs detection using data streaming algorithms","authors":"K. Adewole, Muiz O. Raheem, M. Abdulraheem, I. D. Oladipo, A. Balogun, Omotola Fatimah Baker","doi":"10.14710/JTSISKOM.2021.13965","DOIUrl":"https://doi.org/10.14710/JTSISKOM.2021.13965","url":null,"abstract":"As a result of advancements in technology and technological devices, data is now spawned at an infinite rate, emanating from a vast array of networks, devices, and daily operations like credit card transactions and mobile phones. Datastream entails sequential and real-time continuous data in the inform of evolving stream. However, the traditional machine learning approach is characterized by a batch learning model. Labeled training data are given apriori to train a model based on some machine learning algorithms. This technique necessitates the entire training sample to be readily accessible before the learning process. The training procedure is mainly done offline in this setting due to the high training cost. Consequently, the traditional batch learning technique suffers severe drawbacks, such as poor scalability for real-time phishing websites detection. The model mostly requires re-training from scratch using new training samples. This paper presents the application of streaming algorithms for detecting malicious URLs based on selected online learners: Hoeffding Tree (HT), Naïve Bayes (NB), and Ozabag. Ozabag produced promising results in terms of accuracy, Kappa and Kappa Temp on the dataset with large samples while HT and NB have the least prediction time with comparable accuracy and Kappa with Ozabag algorithm for the real-time detection of phishing websites.","PeriodicalId":56231,"journal":{"name":"Jurnal Teknologi dan Sistem Komputer","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44900728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Jurnal Teknologi dan Sistem Komputer
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1