14 research outputs found

    A Good Accuracy in Apple Fruits Quality Based on Back Propagation Neural Network and Feature Extraction

    Get PDF
    Apel merupakan varietas buah yang memounyai banyak jenis. Aple ang secara visual tampak sama, bisa jadi merupakan variates yang berbeda misalnya jenis apel Grany smith, Apel golden dan apel malang. Ketiga apel tersebut sama-sama berwarna hijau. Secara kasat mata warna saja tidak cukup untuk mengklasifikasi, sehingga perlu adanya pemnafaatan teknologi yang dapat membantu proses klasifikasi menjadi lebih akurat. Pengolahancitra digital, lewat proses segmentasi warna menggunakan algoritma Back Propagation Neural Network (BPNN) dapat digunakan untuk proses klasifikasi jenis apel. Dalam penelitian ini digunakan 12 macam apel yaitu apel Golden, apel Grany Smith, apel Braeburn, apel Red delicious, apel Malang, apel Red Yellow, apel Red, apel Anna, apel Golden Delicious, apel Fuji, apel Gala, dan aepl Honeycrisp. Pemnafaatan fitur ekstraksi warna dan ciri membuktikan bahwa akurasi dapat mencapai nilai optimal hingga 93%., presisi 94% dan recal 94% dengan menggunakan ekstraksi fitur RG

    LSB STEGANO PADA KOMBINASI KRITPOGRAFI SIMETRIS CAESAR-VIGENERE

    Get PDF
    Dalam perkembangan teknologi komunikasi data, dan banyaknya problem mengenai manipulasi data maka perlu tindak lanjut mengenai teknik untuk mengamankan data. Steganografi adalah sebuah teknik untuk menyembunyikan pesan dengan menggunakan sebuah media atau juga disebut cover. Sedangkan LSB (Least Significant Bit) adalah sebagai algoritma atau metode menyembunyikan pesan yang akan disisipkan. Seperti pada perangkat keamanan lainnya, steganografi dapat digunakan pengamanan seperti citra dengan watermarking dengan alasan untuk perlindungan copyright. Metode LSB yang digunakan pada teknik steganography tergolong mudah pada penerapannya. Dasar dari metode ini adalah bilangan berbasis biner atau dengan kata lain angka 1 dan angka 0. Metode LSB berhubungan dengan ukuran 1 bit dan ukuran 1 byte. 1 byte yang terdiri dari 8 bit data. Dalam penelitian ini penulis menggabungkan metode LSB dengan Teknik Super Enkripsi kriptografi metode Caesar Cipher dan Vigenere Cipher. Kontribusi yang diberikan pada peneliitan ini adalah mnelakukan proses LSB pada bit ke 7 dan ke 8 sehingga impercepibility meningkat. Dari hasil penggabungan metode antara LSB dan kriptografi akan sulit dipecahkan, karena memiliki dua tingkat keamanan. Dari hasil penelitian dapat diambil kesimpulan bahwa sistem pengamanan pesan menggunakan kriptografi dan steganografi terbagi menjadi empat, yaitu Encode, Decode, Enkripsi dan Dekripsi. Tujuan utama untuk mengamankan subtansi data rahasia dengan cara menyamarkan dengan sebuah media agar sulit untuk teridentifikasi

    IMPLEMENTATION OF FUZZY MEMBERSHIP FUNCTION TO DETERMINNE AUTOMATIC WATERINNG TIME

    Get PDF
    Global warming impacted to agriculture, thereby affecting the world's food supply. UNICEF calls on every country to be able to meet its food needs independently. Indonesia, as an agricultural country, has the potential to meet food needs independently. One effort that can be made is to combine existing agricultural systems with technology through the application of IoT. In this research, it was applied to citrus plants using DHT11 temperature and air humidity sensors and soil moisture sensor YL69. Data processing uses a fuzzy algorithm approach, using two input variables, namely temperature and humidity variables and soil moisture variables. Meanwhile, the resulting output variable is the time for watering the plants. At the fuzzification stage, each variable is grouped into three memberships. For temperature and humidity variables are divided into hot, medium and cold membership. Soil moisture variables are divided into wet, medium and dry membership. And the time variables consists of short, medium and long time membership. In the defuzzification stage, it is calculated by calculating the center of area value for each graphic area resulting from the fuzzification stage. Furthermore, to test the system, the testing carried out resulted in an error value of 5.19 percent. Based on test and trial that be done, the result shows that average volume of water that flows every second when watering plants is 36.5 ml per second

    SISTEM ENTERPRISE RESOURCE PLANNING (ERP) MODUL OPERASI BERBASIS ONLINE UNTUK USAHA KECIL MENENGAH (UKM)

    Get PDF
    Setiap bisnis menghadapi tantangan yang sama yaitu memberikan produk-produk berkualitas dengan layanan yang unggul dan biaya yang minimal untuk memaksimalkan keuntungan yang sama. Transaksi yang melibatkan berbagai data tentang organisasi, misalnya, jumlah persediaan barang, jumlah uang yang masuk dan keluar, jumlah barang yang harus dibuat, dan lain-lain. Tanpa bantuan sistem, sebuah organisasi harus mengolah data secara manual. Dokumen hasil transaksi bisnis juga harus dibuat secara manual. ERP adalah perangkat lunak yang dikemas berupa sistem untuk berbisnis, mampu untuk berbagi data yang umum dan mengakses informasi secara realtime. Online ERP juga disebut Software as a service. Data yang digunakan dikelola terpusat di internet  oleh vendor ERP dan diakses melalui web browser. Dengan menggunakan sistem ERP berbasis Online dapat memberikan layanan ERP yang lebih maksimal, karena dapat diakses kapanpun dan dimanapun. Kata Kunci: cloud , ERP, web browser

    Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit)

    Get PDF
     The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096

    Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features

    Get PDF
    Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that affects the character detection process. Punctuation marks, clothing, Swara script, vowels, and consonants are parts of the script that are often found in Javanetest scripts. Preserving Javanese script in the digital era, of course, must use technology that can support the digitization of Javanese script through the script detection process. The concept of script image is the image of Javanese script in ancient manuscripts. The process of character detection using certain techniques can be carried out to extract characters so that they can be read. Detection of Javanese characters can be found by finding a testing image. Here, we had been used 10 words images consisting of 3 to 5 syllables with the vowel aiu. Dataset process by Linear Binary Pattern (LBP) feature extraction, which is used to characterize images and describe image textures locally. LBP has been used in r=4 and preprocessing is also done by thresholding with d=0.3. This process can be done using the K-Nearest Neighbor algorithm. In 10 datasets of Javanese script words, an average accuracy value of 90.5% was obtained. The accuracy value of 100% is the highest and 50% is the lowest

    Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES)

    Get PDF
    Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai tingkat keamanan yang baik salah satunya yaitu Data Encryption Standard (DES). DES melakukan enkripsi dengan kunci simteris dengan panjang 64 bit kunci yang didapat dari kunci eksternal. Beberapa penelitian sebelumnya telah menggunakan DES pada media teks, dalam makalah ini DES akan digunakan pada media gambar. Gambar yang digunakan berukuran 512x512 piksel, dengan pesan berupa file .txt dengan panjang bervariasi antara 8 byte sampai dengan 1024 byte. Penggunaan file pesan yang bervariasi digunakan untuk mengetahui performa DES, baik dari segi waktu enkripsi dan dekripsi maupun hasil proses dekripsi. Hasil eksperimen menggunakan sejumlah pesan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) tertinggi 86.7532 dB, dan waktu enkripsi pesan dengan ukuran kurang dari 64 bit tidak lebih dari 1 detik, sedangkan waktu dekripsi lebih cepat disbanding waktu enkripsi

    Improved Javanese script recognition using custom model of convolution neural network

    Get PDF
    Handwriting recognition in Javanese script is not widely developed with deep learning (DL). Previous DL and machine learning (ML) research is generally limited to basic characters (Carakan) only. This study proposes a deep learning model using a custom-built convolutional neural network to improve recognition accuracy performance and reduce computational costs. The main features of handwritten objects are textures, edges, lines, and shapes, so convolution layers are not designed in large numbers. This research maximizes optimization of other layers such as pooling, activation function, fully connected layer, optimizer, and parameter settings such as dropout and learning rate. There are eleven main layers used in the proposed custom convolutional neural network (CNN) model, namely four convolution layers+activation function, four pooling layers, two fully connected layers, and a softmax classifier. Based on the test results on the Javanese script handwritten image dataset with 120 classes consisting of 20 basic character classes and 100 compound character classes, the resulting accuracy is 97.29%

    Community Empowerment Through Financial Management Training and Business Development of The Borobudur Homestay in Candirejo Village, Magelang District

    Get PDF
    Background: Community-based tourism is increasingly being considered a more sustainable alternative. Tourism Villages can be a step towards realizing sustainable tourism. This is because the tourism village has the opportunity to open up as much participation as possible for the local community. However, this does not mean anything if managers, including accommodation providers, need qualified organizational and financial management skills. Contribution: This activity aims to provide knowledge to homestay managers in Candirejo Village to properly manage business finances based on SAK EMKM (Standar Akuntansi Keuangan Entitas Mikro, Kecil, dan Menengah) Method: The method used by researchers is through training and empowerment of homestay managers Results: The result of this activity is an increased understanding of SAK EMKM in Candirejo Village. After the training, homestay managers have also started implementing SAK EMKM in their financial reports. As a result, the financial position can be monitored, financial leaks can be minimized, and homestay business management can be carried out more effectively and efficiently. Conclusion: The activities that were held went well. This is known from the excellent understanding of SAK EMKM after the training was give
    corecore